SSH, the secure shell the definitive guide
Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available f...
Main Author: | |
---|---|
Other Authors: | , |
Format: | eBook |
Language: | Inglés |
Published: |
Sebastopol, California :
O'Reilly
2005.
|
Edition: | 2nd ed |
Subjects: | |
See on Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627089406719 |
Table of Contents:
- Table of Contents; Preface; Protect Your Network with SSH; Intended Audience; End-User Audience; Prerequisites; System-Administrator Audience; Prerequisites; Reading This Book; Our Approach; Which Chapters Are for You?; Supported Platforms; Disclaimers; Conventions Used in This Book; Comments and Questions; Safari Enabled; Acknowledgments; Introduction to SSH; 1.1 What Is SSH?; 1.2 What SSH Is Not; 1.3 The SSH Protocol; 1.3.1 Protocols, Products, Clients, and Confusion; 1.4 Overview of SSH Features; 1.4.1 Secure Remote Logins; 1.4.2 Secure File Transfer; 1.4.3 Secure Remote Command Execution
- 1.4.4 Keys and Agents1.4.5 Access Control; 1.4.6 Port Forwarding; 1.5 History of SSH; 1.6 Related Technologies; 1.6.1 rsh Suite (r-Commands); 1.6.2 Pretty Good Privacy (PGP) and GNU Privacy Guard (GnuPG); 1.6.3 Kerberos; 1.6.4 IPSEC and Virtual Private Networks; 1.6.5 Secure Remote Password (SRP); 1.6.6 Secure Socket Layer (SSL) Protocol; 1.6.7 SSL-Enhanced Telnet and FTP; 1.6.8 stunnel; 1.6.9 Firewalls; 1.7 Summary; Basic Client Use; 2.1 A Running Example; 2.2 Remote Terminal Sessions with ssh; 2.2.1 File Transfer with scp; 2.3 Adding Complexity to the Example; 2.3.1 Known Hosts
- 2.3.2 The Escape Character2.4 Authentication by Cryptographic Key; 2.4.1 A Brief Introduction to Keys; 2.4.2 Generating Key Pairs with ssh-keygen; 2.4.3 Installing a Public Key on an SSH Server Machine; 2.4.3.1 Instructions for OpenSSH; 2.4.3.2 Instructions for Tectia; 2.4.4 If You Change Your Key; 2.5 The SSH Agent; 2.5.1 Agents and Automation; 2.5.2 A More Complex Passphrase Problem; 2.5.3 Agent Forwarding; 2.6 Connecting Without a Password or Passphrase; 2.7 Miscellaneous Clients; 2.7.1 sftp; 2.7.2 slogin; 2.8 Summary; Inside SSH; 3.1 Overview of Features; 3.1.1 Privacy (Encryption)
- 3.1.2 Integrity3.1.3 Authentication; 3.1.4 Authorization; 3.1.5 Forwarding (Tunneling); 3.2 A Cryptography Primer; 3.2.1 How Secure Is Secure?; 3.2.2 Public- and Secret-Key Cryptography; 3.2.3 Hash Functions; 3.3 The Architecture of an SSH System; 3.4 Inside SSH-2; 3.4.1 Protocol Summary; 3.4.2 SSH Transport Layer Protocol (SSH-TRANS); 3.4.2.1 Connection; 3.4.2.2 Protocol version selection; 3.4.2.3 Parameter negotiation; 3.4.2.4 Key exchange and server authentication; 3.4.2.5 Server authentication and antispoofing: some gory details; 3.4.2.6 Wonder security powers, activate!
- 3.4.3 SSH Authentication Protocol (SSH-AUTH)3.4.3.1 The authentication request; 3.4.3.2 The authentication response; 3.4.3.3 Getting started: the "none" request; 3.4.3.4 Public-key authentication; 3.4.3.5 Password authentication; 3.4.3.6 Hostbased authentication; 3.4.4 SSH Connection Protocol (SSH-CONN); 3.4.4.1 Channels; 3.4.4.2 Requests; 3.4.4.3 The finish line; 3.5 Inside SSH-1; 3.6 Implementation Issues; 3.6.1 Host Keys; 3.6.2 Authorization in Hostbased Authentication; 3.6.2.1 Hostbased access files; 3.6.2.2 Control file details; 3.6.2.3 Netgroups as wildcards; 3.6.2.4 Summary
- 3.6.3 SSH-1 Backward Compatibility