martin wrote:
Thanks very much for the reply. I read the info at both links and understand better now. The second URL states the following: "The [SFTP] protocol itself does not provide authentication and security; it expects the underlying protocol to secure this. SFTP is most often used as subsystem of SSH protocol version 2 implementations."
I disabled tunneling and verified the security by logging into my website's remote directories via WinSCP. Once remotely connected, without tunneling enabled there's still a locked SSH-2 icon and SFTP-3 text at the bottom right of the application window.
What I still don't understand is this: if SFTP is already secured with SSH-2 without tunneling enabled, then what additional security benefit does tunneling give for SFTP purposes? Your first URL makes tunneling sound like it is useful only as a proxy for SFTP purposes, and my home network has no access restrictions put on it by the host provider holding the files.
So does this mean that I only need tunneling in a public network that could be restricted from accessing the website files held by the host provider? Or is tunneling beneficial even in an unrestricted home network?