SSH, the Secure Shell: The Definitive Guide"O'Reilly Media, Inc.", 2001 - 540 頁 Secure your computer network with SSH! With transparent, strong encryption, reliable public-key authentication, and a highly configurable client/server architecture, SSH (Secure Shell) is a popular, robust, TCP/IP-based solution to many network security and privacy concerns. It supports secure remote logins, secure file transfer between computers, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well. SSH: The Secure Shell: The Definitive Guidecovers the Secure Shell in detail for both system administrators and end users. It demystifies the SSH man pages and includes thorough coverage of:
Whether you're communicating on a small LAN or across the Internet, SSH can ship your data from "here" to "there" efficiently and securely. So throw away those insecure .rhosts and hosts.equiv files, move up to SSH, and make your network a safe place to live and work. |
內容
Introduction to SSH | 1 |
11 What Is SSH? | 2 |
13 The SSH Protocol | 4 |
14 Overview of SSH Features | 5 |
15 History of SSH | 10 |
16 Related Technologies | 12 |
17 Summary | 18 |
Basic Client Use | 19 |
PerAccount Server Configuration | 293 |
81 Limits of This Technique | 294 |
82 Public KeyBased Configuration | 295 |
83 TrustedHost Access Control | 313 |
84 The User rc File | 315 |
Port Forwarding and X Forwarding | 316 |
91 What Is Forwarding? | 317 |
92 Port Forwarding | 318 |
22 Remote Terminal Sessions with ssh | 20 |
23 Adding Complexity to the Example | 22 |
24 Authentication by Cryptographic Key | 26 |
25 The SSH Agent | 32 |
26 Connecting Without a Password or Passphrase | 37 |
27 Miscellaneous Clients | 38 |
28 Summary | 40 |
Inside SSH | 41 |
31 Overview of Features | 42 |
32 A Cryptography Primer | 45 |
33 The Architecture of an SSH System | 49 |
34 Inside SSH1 | 52 |
35 Inside SSH2 | 72 |
36 AsUser Access userflle | 85 |
37 Randomness | 86 |
38 SSH and File Transfers scp and sftp | 88 |
39 Algorithms Used by SSH | 91 |
310 Threats SSH Can Counter | 100 |
311 Threats SSH Doesnt Prevent | 103 |
312 Summary | 107 |
Installation and CompileTime Configuration | 108 |
42 FSecure SSH Server | 129 |
43 OpenSSH | 130 |
44 Software Inventory | 134 |
45 Replacing RCommands with SSH | 135 |
46 Summary | 138 |
Serverwide Configuration | 139 |
51 The Name of the Server | 140 |
52 Running the Server | 141 |
An Overview | 143 |
Initial Setup | 148 |
Authentication and Access Control | 166 |
56 User Logins and Accounts | 187 |
57 Subsystems | 190 |
58 History Logging and Debugging | 192 |
59 Compatibility Between SSH1 and SSH2 Servers | 201 |
510 Summary | 203 |
Key Management and Agents | 204 |
61 What Is an Identity? | 205 |
62 Creating an Identity | 209 |
63 SSH Agents | 216 |
64 Multiple Identities | 235 |
65 Summary | 238 |
Advanced Client Use | 240 |
72 Precedence | 250 |
73 Introduction to Verbose Mode | 251 |
74 Client Configuration in Depth | 252 |
75 Secure Copy with scp | 284 |
76 Summary | 292 |
93 X Forwarding | 340 |
TCPwrappers and libwrap | 353 |
95 Summary | 359 |
A Recommended Setup | 360 |
102 CompileTime Configuration | 361 |
103 Serverwide Configuration | 362 |
104 PerAccount Configuration | 366 |
105 Key Management | 367 |
107 Remote Home Directories NFS AFS | 368 |
108 Summary | 371 |
Case Studies | 372 |
112 FTP Forwarding | 379 |
113 Pine IMAP and SSH | 400 |
114 Kerberos and SSH | 408 |
115 Connecting Through a GatewayHost | 428 |
Troubleshooting and FAQ | 437 |
122 Problems and Solutions | 440 |
125 Other SSH Resources | 459 |
460 | |
Overview of Other Implementations | 461 |
132 Covered Products | 462 |
134 Other SSHRelated Products | 470 |
SSH1 Port by Sergey Okhapkin Windows | 471 |
142 Client Use | 475 |
143 Obtaining and Installing the Server | 476 |
144 Troubleshooting | 478 |
145 Summary | 479 |
SecureCRT Windows | 480 |
152 Basic Client Use | 481 |
153 Key Management | 482 |
154 Advanced Client Use | 483 |
155 Forwarding | 484 |
156 Troubleshooting | 486 |
157 Summary | 487 |
FSecure SSH Client Windows Macintosh | 488 |
162 Basic Client Use | 489 |
163 Key Management | 490 |
164 Advanced Client Use | 491 |
165 Forwarding | 493 |
166 Troubleshooting | 495 |
167 Summary | 497 |
NiftyTelnet SSH Macintosh | 498 |
172 Basic Client Use | 499 |
173 Troubleshooting | 501 |
174 Summary | 502 |
SSH2 Manpage for sshregex | 503 |
SSH Quick Reference | 506 |
521 | |