49. SSH, The Secure Shell, 1st Edition

    Author: Myanmar Ebook Store Genre: »
    Rating

    Chapter 1. Introduction to SSH
    Section 1.1. What Is SSH?
    Section 1.2. What SSH Is Not
    Section 1.3. The SSH Protocol
    Section 1.4. Overview of SSH Features
    Section 1.5. History of SSH
    Section 1.6. Related Technologies
    Section 1.7. Summary

    Chapter 2. Basic Client Use
    Section 2.1. A Running Example
    Section 2.2. Remote Terminal Sessions with ssh
    Section 2.3. Adding Complexity to the Example
    Section 2.4. Authentication by Cryptographic Key
    Section 2.5. The SSH Agent
    Section 2.6. Connecting Without a Password or Passphrase
    Section 2.7. Miscellaneous Clients
    Section 2.8. Summary

    Chapter 3. Inside SSH
    Section 3.1. Overview of Features
    Section 3.2. A Cryptography Primer
    Section 3.3. The Architecture of an SSH System
    Section 3.4. Inside SSH-1
    Section 3.5. Inside SSH-2
    Section 3.6. As-User Access (userfile)
    Section 3.7. Randomness
    Section 3.8. SSH and File Transfers (scp and sftp)
    Section 3.9. Algorithms Used by SSH
    Section 3.10. Threats SSH Can Counter
    Section 3.11. Threats SSH Doesn't Prevent
    Section 3.12. Summary

    Chapter 4. Installation and Compile-Time Configuration
    Section 4.1. SSH1 and SSH2
    Section 4.2. F-Secure SSH Server
    Section 4.3. OpenSSH
    Section 4.4. Software Inventory
    Section 4.5. Replacing R-Commands with SSH
    Section 4.6. Summary

    Chapter 5. Serverwide Configuration
    Section 5.1. The Name of the Server
    Section 5.2. Running the Server
    Section 5.3. Server Configuration: An Overview
    Section 5.4. Getting Ready: Initial Setup
    Section 5.5. Letting People in: Authentication and Access Control
    Section 5.6. User Logins and Accounts
    Section 5.7. Subsystems
    Section 5.8. History, Logging, and Debugging
    Section 5.9. Compatibility Between SSH-1 and SSH-2 Servers
    Section 5.10. Summary

    Chapter 6. Key Management and Agents
    Section 6.1. What Is an Identity?
    Section 6.2. Creating an Identity
    Section 6.3. SSH Agents
    Section 6.4. Multiple Identities
    Section 6.5. Summary

    Chapter 7. Advanced Client Use
    Section 7.1. How to Configure Clients
    Section 7.2. Precedence
    Section 7.3. Introduction to Verbose Mode
    Section 7.4. Client Configuration in Depth
    Section 7.5. Secure Copy with scp
    Section 7.6. Summary

    Chapter 8. Per-Account Server Configuration
    Section 8.1. Limits of This Technique
    Section 8.2. Public Key-Based Configuration
    Section 8.3. Trusted-Host Access Control
    Section 8.4. The User rc File
    Section 8.5. Summary

    Chapter 9. Port Forwarding and X Forwarding
    Section 9.1. What Is Forwarding?
    Section 9.2. Port Forwarding
    Section 9.3. X Forwarding
    Section 9.4. Forwarding Security: TCP-wrappers and libwrap
    Section 9.5. Summary

    Chapter 10. A Recommended Setup
    Section 10.1. The Basics
    Section 10.2. Compile-Time Configuration
    Section 10.3. Serverwide Configuration
    Section 10.4. Per-Account Configuration
    Section 10.5. Key Management
    Section 10.6. Client Configuration
    Section 10.7. Remote Home Directories (NFS, AFS)
    Section 10.8. Summary

    Chapter 11. Case Studies
    Section 11.1. Unattended SSH: Batch or cron Jobs
    Section 11.2. FTP Forwarding
    Section 11.3. Pine, IMAP, and SSH
    Section 11.4. Kerberos and SSH
    Section 11.5. Connecting Through a GatewayHost

    Chapter 12. Troubleshooting and FAQ
    Section 12.1. Debug Messages: Your First Line of Defense
    Section 12.2. Problems and Solutions
    Section 12.3. Other SSH Resources
    Section 12.4. Reporting Bugs

    Chapter 13. Overview of Other Implementations
    Section 13.1. Common Features
    Section 13.2. Covered Products
    Section 13.3. Table of Products
    Section 13.4. Other SSH-Related Products

    Chapter 14. SSH1 Port by Sergey Okhapkin (Windows)
    Section 14.1. Obtaining and Installing Clients
    Section 14.2. Client Use
    Section 14.3. Obtaining and Installing the Server
    Section 14.4. Troubleshooting
    Section 14.5. Summary

    Chapter 15. SecureCRT (Windows)
    Section 15.1. Obtaining and Installing
    Section 15.2. Basic Client Use
    Section 15.3. Key Management
    Section 15.4. Advanced Client Use
    Section 15.5. Forwarding
    Section 15.6. Troubleshooting
    Section 15.7. Summary

    Chapter 16. F-Secure SSH Client (Windows, Macintosh)
    Section 16.1. Obtaining and Installing
    Section 16.2. Basic Client Use
    Section 16.3. Key Management
    Section 16.4. Advanced Client Use
    Section 16.5. Forwarding
    Section 16.6. Troubleshooting
    Section 16.7. Summary

    Chapter 17. NiftyTelnet SSH (Macintosh)
    Section 17.1. Obtaining and Installing
    Section 17.2. Basic Client Use
    Section 17.3. Troubleshooting
    Section 17.4. Summary

    Appendix A. SSH2 Manpage for sshregex
    SSHREGEX(1) SSH2
    Appendix B. SSH Quick Reference
    Section 2.1. Legend
    Section 2.2. sshd Options
    Section 2.3. sshd Keywords
    Section 2.4. ssh and scp Keywords
    Section 2.5. ssh Options
    Section 2.6. scp Options
    Section 2.7. ssh-keygen Options
    Section 2.8. ssh-agent Options
    Section 2.9. ssh-add Options
    Section 2.10. Identity and Authorization Files
    Section 2.11. Environment Variables
    Colophon
    Index

    Leave a Reply

    Blogger templates

    Blogger news

    Blogroll