SSH, the secure shell the definitive guide

Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available f...

Full description

Bibliographic Details
Main Author: Barrett, Daniel J. (-)
Other Authors: Byrnes, Robert G., Silverman, Richard E.
Format: eBook
Language:Inglés
Published: Sebastopol, California : O'Reilly 2005.
Edition:2nd ed
Subjects:
See on Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627089406719
Table of Contents:
  • Table of Contents; Preface; Protect Your Network with SSH; Intended Audience; End-User Audience; Prerequisites; System-Administrator Audience; Prerequisites; Reading This Book; Our Approach; Which Chapters Are for You?; Supported Platforms; Disclaimers; Conventions Used in This Book; Comments and Questions; Safari Enabled; Acknowledgments; Introduction to SSH; 1.1 What Is SSH?; 1.2 What SSH Is Not; 1.3 The SSH Protocol; 1.3.1 Protocols, Products, Clients, and Confusion; 1.4 Overview of SSH Features; 1.4.1 Secure Remote Logins; 1.4.2 Secure File Transfer; 1.4.3 Secure Remote Command Execution
  • 1.4.4 Keys and Agents1.4.5 Access Control; 1.4.6 Port Forwarding; 1.5 History of SSH; 1.6 Related Technologies; 1.6.1 rsh Suite (r-Commands); 1.6.2 Pretty Good Privacy (PGP) and GNU Privacy Guard (GnuPG); 1.6.3 Kerberos; 1.6.4 IPSEC and Virtual Private Networks; 1.6.5 Secure Remote Password (SRP); 1.6.6 Secure Socket Layer (SSL) Protocol; 1.6.7 SSL-Enhanced Telnet and FTP; 1.6.8 stunnel; 1.6.9 Firewalls; 1.7 Summary; Basic Client Use; 2.1 A Running Example; 2.2 Remote Terminal Sessions with ssh; 2.2.1 File Transfer with scp; 2.3 Adding Complexity to the Example; 2.3.1 Known Hosts
  • 2.3.2 The Escape Character2.4 Authentication by Cryptographic Key; 2.4.1 A Brief Introduction to Keys; 2.4.2 Generating Key Pairs with ssh-keygen; 2.4.3 Installing a Public Key on an SSH Server Machine; 2.4.3.1 Instructions for OpenSSH; 2.4.3.2 Instructions for Tectia; 2.4.4 If You Change Your Key; 2.5 The SSH Agent; 2.5.1 Agents and Automation; 2.5.2 A More Complex Passphrase Problem; 2.5.3 Agent Forwarding; 2.6 Connecting Without a Password or Passphrase; 2.7 Miscellaneous Clients; 2.7.1 sftp; 2.7.2 slogin; 2.8 Summary; Inside SSH; 3.1 Overview of Features; 3.1.1 Privacy (Encryption)
  • 3.1.2 Integrity3.1.3 Authentication; 3.1.4 Authorization; 3.1.5 Forwarding (Tunneling); 3.2 A Cryptography Primer; 3.2.1 How Secure Is Secure?; 3.2.2 Public- and Secret-Key Cryptography; 3.2.3 Hash Functions; 3.3 The Architecture of an SSH System; 3.4 Inside SSH-2; 3.4.1 Protocol Summary; 3.4.2 SSH Transport Layer Protocol (SSH-TRANS); 3.4.2.1 Connection; 3.4.2.2 Protocol version selection; 3.4.2.3 Parameter negotiation; 3.4.2.4 Key exchange and server authentication; 3.4.2.5 Server authentication and antispoofing: some gory details; 3.4.2.6 Wonder security powers, activate!
  • 3.4.3 SSH Authentication Protocol (SSH-AUTH)3.4.3.1 The authentication request; 3.4.3.2 The authentication response; 3.4.3.3 Getting started: the "none" request; 3.4.3.4 Public-key authentication; 3.4.3.5 Password authentication; 3.4.3.6 Hostbased authentication; 3.4.4 SSH Connection Protocol (SSH-CONN); 3.4.4.1 Channels; 3.4.4.2 Requests; 3.4.4.3 The finish line; 3.5 Inside SSH-1; 3.6 Implementation Issues; 3.6.1 Host Keys; 3.6.2 Authorization in Hostbased Authentication; 3.6.2.1 Hostbased access files; 3.6.2.2 Control file details; 3.6.2.3 Netgroups as wildcards; 3.6.2.4 Summary
  • 3.6.3 SSH-1 Backward Compatibility