Home arrow MySQL arrow Page 4 - Using SSH in HeidiSQL and MySQL Query Browser: Encrypting Sessions

Step 2: Configure your MySQL Graphical User Interface (GUI) - MySQL

Using a MySQL GUI (Graphical User Interface) makes it easier, more efficient and user-friendly to work with a MySQL database. The two most popular MySQL GUIs, HeidiSQL and MySQL Query Browser, have their default connections to any MySQL server “unencrypted.” This is a problem, but we're going to fix it; just keep reading.

TABLE OF CONTENTS:
  1. Using SSH in HeidiSQL and MySQL Query Browser: Encrypting Sessions
  2. SSH Port Forwarding: The Solution
  3. Step 1: Enable Port Forwarding in Putty for MySQL SSH Application
  4. Step 2: Configure your MySQL Graphical User Interface (GUI)
By: Codex-M
Rating: starstarstarstarstar / 2
May 04, 2010

print this article
SEARCH DEV SHED

TOOLS YOU CAN USE

advertisement

Finally you are ready to connect to your MySQL server in SSH, because the port forwarding at local port 3307 has been enabled. Suppose you have the following MySQL log-in information below:  

MySQL username: codexm

MySQL password: coolguy  

It's VERY IMPORTANT that you execute step 2 while Putty is still connected to your SSH server. Do not disconnect the Putty connection that you made in step 1 or else you will not be able to connect to your MYSQL server in step 2. 

Using HeidiSQL

Follow the procedure below.  

1. Launch HeidiSQL.

2. Click "New" in the Session Manager.

3. Configure the following:  

Network Type: TCP/IP

Hostname: 127.0.0.1

User: codexm

Password: coolguy

Port: 3307

Compressed client/server protocol: Checked  

After entering the details above, it should look like the screen shot below:

 

4. Click OPEN. If there are no errors, you have successfully connected to your MySQL server using SSH, and HeidiSQL will then show you your databases.

Using MySQL Query Browser

If you are using the MySQL Query Browser, follow the procedure below.

1. Launch MySQL Query Browser.

2. Configure the options below:

Stored connection: (leave this blank)

Server hostname: 127.0.0.1

Port: 3307

Username: codexm

Password: coolguy

Default schema: (leave this blank)

After entering the above configuration details, it should look like the screen shot below:

There are two important things you need to note regarding the use of MySQL GUI.

First, there may be times when you can not establish a connection to your MySQL server even though you have perfectly followed the steps outlined in this tutorial. If this happens, you need to contact your web host and report that error. This might be due to some MySQL server restrictions they have  imposed.

Second, if you are not certain as to whether your connection has been encrypted, you can inspect the packets going out of your network card using Wireshark and compare them with the packets leaving your computer using an unencrypted MySQL session. The recommended test procedure, if you are interested in doing this, is as follows:

Step 1: Install Wireshark.

Step 2: Hit capture to make Wireshark capture packets from your network interface card.

Step 3: Just seconds after hitting capture, log in to your MySQL server using phpMyAdmin "unencrypted."

Step 4: Immediately after pressing login (around three seconds later), hit stop capture.

Step 5: Look for any POST entry in the packets gathered. You will surely get your username and password in "clear text" because they are not encrypted.

Now, using your MySQL GUI and Putty, configure them so that they will connect to your MySQL server using SSH. Repeat steps 1 and 2 above. In step 3, instead of hitting the login button in phpMyAdmin, you will hit the Connect/Open button in MySQL GUI.

Just seconds after hitting "Connect," hit stop capture in Wireshark. If you examine those capture packets very closely, you will not be able to understand them because they are not in "clear text form;" instead, they are encrypted.



 
 
>>> More MySQL Articles          >>> More By Codex-M
 

blog comments powered by Disqus
escort Bursa Bursa escort Antalya eskort
   

MYSQL ARTICLES

- Oracle Unveils MySQL 5.6
- MySQL Vulnerabilities Threaten Databases
- MySQL Cloud Options Expand with Google Cloud...
- MySQL 5.6 Prepped to Handle Demanding Web Use
- ScaleBase Service Virtualizes MySQL Databases
- Oracle Unveils MySQL Conversion Tools
- Akiban Opens Database Software for MySQL Use...
- Oracle Fixes MySQL Bug
- MySQL Databases Vulnerable to Password Hack
- MySQL: Overview of the ALTER TABLE Statement
- MySQL: How to Use the GRANT Statement
- MySQL: Creating, Listing, and Removing Datab...
- MySQL: Create, Show, and Describe Database T...
- MySQL Data and Table Types
- McAfee Releases Audit Plugin for MySQL Users

Developer Shed Affiliates

 


Dev Shed Tutorial Topics: