SSH, The Secure Shell


Daniel J. Barrett
Bok Engelsk 2005 · Electronic books.
Utgitt
Sebastopol : : O'Reilly Media, , 2005.
Omfang
1 online resource (668 p.)
Utgave
2nd ed.
Opplysninger
Description based upon print version of record.. - Table of Contents; Preface; Protect Your Network with SSH; Intended Audience; End-User Audience; Prerequisites; System-Administrator Audience; Prerequisites; Reading This Book; Our Approach; Which Chapters Are for You?; Supported Platforms; Disclaimers; Conventions Used in This Book; Comments and Questions; Safari Enabled; Acknowledgments; Introduction to SSH; 1.1 What Is SSH?; 1.2 What SSH Is Not; 1.3 The SSH Protocol; 1.3.1 Protocols, Products, Clients, and Confusion; 1.4 Overview of SSH Features; 1.4.1 Secure Remote Logins; 1.4.2 Secure File Transfer; 1.4.3 Secure Remote Command Execution. - 1.4.4 Keys and Agents1.4.5 Access Control; 1.4.6 Port Forwarding; 1.5 History of SSH; 1.6 Related Technologies; 1.6.1 rsh Suite (r-Commands); 1.6.2 Pretty Good Privacy (PGP) and GNU Privacy Guard (GnuPG); 1.6.3 Kerberos; 1.6.4 IPSEC and Virtual Private Networks; 1.6.5 Secure Remote Password (SRP); 1.6.6 Secure Socket Layer (SSL) Protocol; 1.6.7 SSL-Enhanced Telnet and FTP; 1.6.8 stunnel; 1.6.9 Firewalls; 1.7 Summary; Basic Client Use; 2.1 A Running Example; 2.2 Remote Terminal Sessions with ssh; 2.2.1 File Transfer with scp; 2.3 Adding Complexity to the Example; 2.3.1 Known Hosts. - 2.3.2 The Escape Character2.4 Authentication by Cryptographic Key; 2.4.1 A Brief Introduction to Keys; 2.4.2 Generating Key Pairs with ssh-keygen; 2.4.3 Installing a Public Key on an SSH Server Machine; 2.4.3.1 Instructions for OpenSSH; 2.4.3.2 Instructions for Tectia; 2.4.4 If You Change Your Key; 2.5 The SSH Agent; 2.5.1 Agents and Automation; 2.5.2 A More Complex Passphrase Problem; 2.5.3 Agent Forwarding; 2.6 Connecting Without a Password or Passphrase; 2.7 Miscellaneous Clients; 2.7.1 sftp; 2.7.2 slogin; 2.8 Summary; Inside SSH; 3.1 Overview of Features; 3.1.1 Privacy (Encryption). - 3.1.2 Integrity3.1.3 Authentication; 3.1.4 Authorization; 3.1.5 Forwarding (Tunneling); 3.2 A Cryptography Primer; 3.2.1 How Secure Is Secure?; 3.2.2 Public- and Secret-Key Cryptography; 3.2.3 Hash Functions; 3.3 The Architecture of an SSH System; 3.4 Inside SSH-2; 3.4.1 Protocol Summary; 3.4.2 SSH Transport Layer Protocol (SSH-TRANS); 3.4.2.1 Connection; 3.4.2.2 Protocol version selection; 3.4.2.3 Parameter negotiation; 3.4.2.4 Key exchange and server authentication; 3.4.2.5 Server authentication and antispoofing: some gory details; 3.4.2.6 Wonder security powers, activate!. - 3.4.3 SSH Authentication Protocol (SSH-AUTH)3.4.3.1 The authentication request; 3.4.3.2 The authentication response; 3.4.3.3 Getting started: the "none" request; 3.4.3.4 Public-key authentication; 3.4.3.5 Password authentication; 3.4.3.6 Hostbased authentication; 3.4.4 SSH Connection Protocol (SSH-CONN); 3.4.4.1 Channels; 3.4.4.2 Requests; 3.4.4.3 The finish line; 3.5 Inside SSH-1; 3.6 Implementation Issues; 3.6.1 Host Keys; 3.6.2 Authorization in Hostbased Authentication; 3.6.2.1 Hostbased access files; 3.6.2.2 Control file details; 3.6.2.3 Netgroups as wildcards; 3.6.2.4 Summary. - 3.6.3 SSH-1 Backward Compatibility. - Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively. Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide. This updated book thoroughly covers the
Emner
Sjanger
Dewey
ISBN
0596008953

Bibliotek som har denne