SSH, the Secure Shell: The Definitive Guide

封面
"O'Reilly Media, Inc.", 2001 - 540 頁

Secure your computer network with SSH! With transparent, strong encryption, reliable public-key authentication, and a highly configurable client/server architecture, SSH (Secure Shell) is a popular, robust, TCP/IP-based solution to many network security and privacy concerns. It supports secure remote logins, secure file transfer between computers, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well.

SSH: The Secure Shell: The Definitive Guidecovers the Secure Shell in detail for both system administrators and end users. It demystifies the SSH man pages and includes thorough coverage of:

  • SSH1, SSH2, OpenSSH, and F-Secure SSH for Unix, plus Windows and Macintosh products: the basics, the internals, and complex applications.
  • Configuring SSH servers and clients, both system-wide and per user, with recommended settings to maximize security.
  • Advanced key management using agents, agent forwarding, and forced commands.
  • Forwarding (tunneling) of TCP and X11 applications in depth, even in the presence of firewalls and network address translation (NAT).
  • Undocumented behaviors of popular SSH implementations.
  • Installing and maintaining SSH systems.

Whether you're communicating on a small LAN or across the Internet, SSH can ship your data from "here" to "there" efficiently and securely. So throw away those insecure .rhosts and hosts.equiv files, move up to SSH, and make your network a safe place to live and work.

 

已選取的頁面

內容

Introduction to SSH
1
11 What Is SSH?
2
13 The SSH Protocol
4
14 Overview of SSH Features
5
15 History of SSH
10
16 Related Technologies
12
17 Summary
18
Basic Client Use
19
PerAccount Server Configuration
293
81 Limits of This Technique
294
82 Public KeyBased Configuration
295
83 TrustedHost Access Control
313
84 The User rc File
315
Port Forwarding and X Forwarding
316
91 What Is Forwarding?
317
92 Port Forwarding
318

22 Remote Terminal Sessions with ssh
20
23 Adding Complexity to the Example
22
24 Authentication by Cryptographic Key
26
25 The SSH Agent
32
26 Connecting Without a Password or Passphrase
37
27 Miscellaneous Clients
38
28 Summary
40
Inside SSH
41
31 Overview of Features
42
32 A Cryptography Primer
45
33 The Architecture of an SSH System
49
34 Inside SSH1
52
35 Inside SSH2
72
36 AsUser Access userflle
85
37 Randomness
86
38 SSH and File Transfers scp and sftp
88
39 Algorithms Used by SSH
91
310 Threats SSH Can Counter
100
311 Threats SSH Doesnt Prevent
103
312 Summary
107
Installation and CompileTime Configuration
108
42 FSecure SSH Server
129
43 OpenSSH
130
44 Software Inventory
134
45 Replacing RCommands with SSH
135
46 Summary
138
Serverwide Configuration
139
51 The Name of the Server
140
52 Running the Server
141
An Overview
143
Initial Setup
148
Authentication and Access Control
166
56 User Logins and Accounts
187
57 Subsystems
190
58 History Logging and Debugging
192
59 Compatibility Between SSH1 and SSH2 Servers
201
510 Summary
203
Key Management and Agents
204
61 What Is an Identity?
205
62 Creating an Identity
209
63 SSH Agents
216
64 Multiple Identities
235
65 Summary
238
Advanced Client Use
240
72 Precedence
250
73 Introduction to Verbose Mode
251
74 Client Configuration in Depth
252
75 Secure Copy with scp
284
76 Summary
292
93 X Forwarding
340
TCPwrappers and libwrap
353
95 Summary
359
A Recommended Setup
360
102 CompileTime Configuration
361
103 Serverwide Configuration
362
104 PerAccount Configuration
366
105 Key Management
367
107 Remote Home Directories NFS AFS
368
108 Summary
371
Case Studies
372
112 FTP Forwarding
379
113 Pine IMAP and SSH
400
114 Kerberos and SSH
408
115 Connecting Through a GatewayHost
428
Troubleshooting and FAQ
437
122 Problems and Solutions
440
125 Other SSH Resources
459
124 Reporting Bugs
460
Overview of Other Implementations
461
132 Covered Products
462
134 Other SSHRelated Products
470
SSH1 Port by Sergey Okhapkin Windows
471
142 Client Use
475
143 Obtaining and Installing the Server
476
144 Troubleshooting
478
145 Summary
479
SecureCRT Windows
480
152 Basic Client Use
481
153 Key Management
482
154 Advanced Client Use
483
155 Forwarding
484
156 Troubleshooting
486
157 Summary
487
FSecure SSH Client Windows Macintosh
488
162 Basic Client Use
489
163 Key Management
490
164 Advanced Client Use
491
165 Forwarding
493
166 Troubleshooting
495
167 Summary
497
NiftyTelnet SSH Macintosh
498
172 Basic Client Use
499
173 Troubleshooting
501
174 Summary
502
SSH2 Manpage for sshregex
503
SSH Quick Reference
506
Index
521
著作權所有

其他版本 - 查看全部

常見字詞

關於作者 (2001)

Dan Barrett has been immersed in Internet technology since 1985. Currently working as a software engineer, Dan has also been a heavy metal singer, Unix system administrator, university lecturer, web designer, and humorist. He has written several O'Reilly books, as well as monthly columns for Compute! and Keyboard Magazine. Dan and his family reside in Boston. Richard E. Silverman has a B.A. in computer science and an M.A. in pure mathematics. Richard has worked in the fields of networking, formal methods in software development, public-key infrastructure, routing security, and Unix systems administration. He is the co-author of SSH, The Secure Shell: The Definitive Guide.

書目資訊