Barrett - SSH The Secure Shell - The Definitive Guide (O'Reilly, 2001).pdf
(
3220 KB
)
Pobierz
SSH, The Secure Shell: The Definitive Guide
SSH, The Secure Shell: The Definitive Guide
By
Daniel J. Barrett
,
Richard Silverman
Publisher: O'Reilly
•
Reviews
•
Reader Reviews
Pub Date: January 2001
ISBN: 0-596-00011-1
Pages: 558
•
Errata
Copyright
Preface
Protect Your Network with SSH
Intended Audience
Reading This Book
Our Approach
Which Chapters Are for You?
Supported Platforms
Disclaimers
Conventions Used in This Book
Comments and Questions
Acknowledgments
Chapter 1. Introduction to SSH
Section 1.1. What Is SSH?
Section 1.2. What SSH Is Not
Section 1.3. The SSH Protocol
Section 1.4. Overview of SSH Features
Section 1.5. History of SSH
Section 1.6. Related Technologies
Section 1.7. Summary
Chapter 2. Basic Client Use
Section 2.1. A Running Example
Section 2.2. Remote Terminal Sessions with ssh
Section 2.3. Adding Complexity to the Example
Section 2.4. Authentication by Cryptographic Key
Section 2.5. The SSH Agent
Section 2.6. Connecting Without a Password or Passphrase
Section 2.7. Miscellaneous Clients
Section 2.8. Summary
Chapter 3. Inside SSH
Section 3.1. Overview of Features
Section 3.2. A Cryptography Primer
Section 3.3. The Architecture of an SSH System
Section 3.4. Inside SSH-1
Section 3.5. Inside SSH-2
Section 3.6. As-User Access (userfile)
Section 3.7. Randomness
Section 3.8. SSH and File Transfers (scp and sftp)
Section 3.9. Algorithms Used by SSH
Section 3.10. Threats SSH Can Counter
Section 3.11. Threats SSH Doesn't Prevent
Section 3.12. Summary
Chapter 4. Installation and Compile-Time Configuration
Section 4.1. SSH1 and SSH2
Section 4.2. F-Secure SSH Server
Section 4.3. OpenSSH
Section 4.4. Software Inventory
Section 4.5. Replacing R-Commands with SSH
Section 4.6. Summary
Chapter 5. Serverwide Configuration
Section 5.1. The Name of the Server
Section 5.2. Running the Server
Section 5.3. Server Configuration: An Overview
Section 5.4. Getting Ready: Initial Setup
Section 5.5. Letting People in: Authentication and Access Control
Section 5.6. User Logins and Accounts
Section 5.7. Subsystems
Section 5.8. History, Logging, and Debugging
Section 5.9. Compatibility Between SSH-1 and SSH-2 Servers
Section 5.10. Summary
Chapter 6. Key Management and Agents
Section 6.1. What Is an Identity?
Section 6.2. Creating an Identity
Section 6.3. SSH Agents
Section 6.4. Multiple Identities
Section 6.5. Summary
Chapter 7. Advanced Client Use
Section 7.1. How to Configure Clients
Section 7.2. Precedence
Section 7.3. Introduction to Verbose Mode
Section 7.4. Client Configuration in Depth
Section 7.5. Secure Copy with scp
Section 7.6. Summary
Chapter 8. Per-Account Server Configuration
Section 8.1. Limits of This Technique
Section 8.2. Public Key-Based Configuration
Section 8.3. Trusted-Host Access Control
Section 8.4. The User rc File
Section 8.5. Summary
Chapter 9. Port Forwarding and X Forwarding
Section 9.1. What Is Forwarding?
Section 9.2. Port Forwarding
Section 9.3. X Forwarding
Section 9.4. Forwarding Security: TCP-wrappers and libwrap
Section 9.5. Summary
Chapter 10. A Recommended Setup
Section 10.1. The Basics
Section 10.2. Compile-Time Configuration
Section 10.3. Serverwide Configuration
Section 10.4. Per-Account Configuration
Section 10.5. Key Management
Section 10.6. Client Configuration
Section 10.7. Remote Home Directories (NFS, AFS)
Section 10.8. Summary
Chapter 11. Case Studies
Section 11.1. Unattended SSH: Batch or cron Jobs
Section 11.2. FTP Forwarding
Section 11.3. Pine, IMAP, and SSH
Section 11.4. Kerberos and SSH
Section 11.5. Connecting Through a GatewayHost
Chapter 12. Troubleshooting and FAQ
Section 12.1. Debug Messages: Your First Line of Defense
Section 12.2. Problems and Solutions
Section 12.3. Other SSH Resources
Section 12.4. Reporting Bugs
Chapter 13. Overview of Other Implementations
Section 13.1. Common Features
Section 13.2. Covered Products
Section 13.3. Table of Products
Section 13.4. Other SSH-Related Products
Chapter 14. SSH1 Port by Sergey Okhapkin (Windows)
Section 14.1. Obtaining and Installing Clients
Section 14.2. Client Use
Section 14.3. Obtaining and Installing the Server
Section 14.4. Troubleshooting
Section 14.5. Summary
Chapter 15. SecureCRT (Windows)
Section 15.1. Obtaining and Installing
Section 15.2. Basic Client Use
Section 15.3. Key Management
Section 15.4. Advanced Client Use
Section 15.5. Forwarding
Section 15.6. Troubleshooting
Section 15.7. Summary
Chapter 16. F-Secure SSH Client (Windows, Macintosh)
Section 16.1. Obtaining and Installing
Section 16.2. Basic Client Use
Section 16.3. Key Management
Section 16.4. Advanced Client Use
Section 16.5. Forwarding
Section 16.6. Troubleshooting
Section 16.7. Summary
Chapter 17. NiftyTelnet SSH (Macintosh)
Section 17.1. Obtaining and Installing
Section 17.2. Basic Client Use
Section 17.3. Troubleshooting
Section 17.4. Summary
Appendix A. SSH2 Manpage for sshregex
SSHREGEX(1) SSH2
Appendix B. SSH Quick Reference
Section 2.1. Legend
Section 2.2. sshd Options
Section 2.3. sshd Keywords
Section 2.4. ssh and scp Keywords
Section 2.5. ssh Options
Section 2.6. scp Options
Section 2.7. ssh-keygen Options
Section 2.8. ssh-agent Options
Section 2.9. ssh-add Options
Section 2.10. Identity and Authorization Files
Section 2.11. Environment Variables
Colophon
Index
Plik z chomika:
sigebryht
Inne pliki z tego folderu:
Aitchison - Pro DNS and BIND (Apress, 2005).pdf
(3214 KB)
Albitz - DNS and BIND 5e (O'Reilly, 2006).chm
(2412 KB)
Barrett - SSH The Secure Shell - The Definitive Guide (O'Reilly, 2001).pdf
(3220 KB)
Bausch - Google Hacks 3e (O'Reilly, 2006).chm
(5712 KB)
Beijnum - Running IPv6 (Apress, 2006).pdf
(3722 KB)
Inne foldery tego chomika:
Artificial Intelligence
Cryptography
Databases and SQL
Discrete Mathematics
Linux and UNIX
Zgłoś jeśli
naruszono regulamin