Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively. Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide. This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution. How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration. Written for a wide, technical audience, SSH, The Secure Shell: The Definitive Guide covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks. No matter where or how you're shipping information, SSH, The Secure Shell: The Definitive Guide will show you how to do it securely.
Chapter 1 Introduction to SSH
What Is SSH?
What SSH Is Not
The SSH Protocol
Overview of SSH Features
History of SSH
Related Technologies
Summary
Chapter 2 Basic Client Use
A Running Example
Remote Terminal Sessions with ssh
Adding Complexity to the Example
Authentication by Cryptographic Key
The SSH Agent
Connecting Without a Password or Passphrase
Miscellaneous Clients
Summary
Chapter 3 Inside SSH
Overview of Features
A Cryptography Primer
The Architecture of an SSH System
Inside SSH-2
Inside SSH-1
Implementation Issues
SSH and File Transfers (scp and sftp)
Algorithms Used by SSH
Threats SSH Can Counter
Threats SSH Doesn't Prevent
Threats Caused by SSH
Summary
Chapter 4 Installation and Compile-Time Configuration
Overview
Installing OpenSSH
Installing Tectia
Software Inventory
Replacing r-Commands with SSH
Summary
Chapter 5 Serverwide Configuration
Running the Server
Server Configuration: An Overview
Getting Ready: Initial Setup
Authentication: Verifying Identities
Access Control: Letting People In
User Logins and Accounts
Forwarding
Subsystems
Logging and Debugging
Compatibility Between SSH-1 and SSH-2 Servers
Summary
Chapter 6 Key Management and Agents
What Is an Identity?
Creating an Identity
SSH Agents
Multiple Identities
PGP Authentication in Tectia
Tectia External Keys
Summary
Chapter 7 Advanced Client Use
How to Configure Clients
Precedence
Introduction to Verbose Mode
Client Configuration in Depth
Secure Copy with scp
Secure, Interactive Copy with sftp
Summary
Chapter 8 Per-Account Server Configuration
Limits of This Technique
Public-Key-Based Configuration
Hostbased Access Control
The User rc File
Summary
Chapter 9 Port Forwarding and X Forwarding
What Is Forwarding?
Port Forwarding
Dynamic Port Forwarding
X Forwarding
Forwarding Security: TCP-Wrappers and libwrap
Summary
Chapter 10 A Recommended Setup
The Basics
Compile-Time Configuration
Serverwide Configuration
Per-Account Configuration
Key Management
Client Configuration
Remote Home Directories (NFS, AFS)
Summary
Chapter 11 Case Studies
Unattended SSH: Batch or cron Jobs
FTP and SSH
Pine, IMAP, and SSH
Connecting Through a Gateway Host
Scalable Authentication for SSH
Tectia Extensions to Server Configuration Files
Tectia Plugins
Chapter 12 Troubleshooting and FAQ
Debug Messages: Your First Line of Defense
Problems and Solutions
Other SSH Resources
Chapter 13 Overview of Other Implementations
Common Features
Covered Products
Other SSH Products
Chapter 14 OpenSSH for Windows
Installation
Using the SSH Clients
Setting Up the SSH Server
Public-Key Authentication
Troubleshooting
Summary
Chapter 15 OpenSSH for Macintosh
Using the SSH Clients
Using the OpenSSH Server
Chapter 16 Tectia for Windows
Obtaining and Installing
Basic Client Use
Key Management
Accession Lite
Advanced Client Use
Port Forwarding
Connector
File Transfers
Command-Line Programs
Troubleshooting
Server
Chapter 17 SecureCRT and SecureFX for Windows
Obtaining and Installing
Basic Client Use
Key Management
Advanced Client Use
Forwarding
Command-Line Client Programs
File Transfer
Troubleshooting
VShell
Summary
Chapter 18 PuTTY for Windows
Obtaining and Installing
Basic Client Use
File Transfer
Key Management
Advanced Client Use
Forwarding
Summary
Appendix
Colophon
《雷锋日记》内容简介:长久以来,《中小学生必读丛书:雷锋日记》已经成为传播“雷锋精神”最鲜活的载体,“雷锋精神”也已经成为
《当书法穿越唐朝》内容简介:打开书法世界的钥匙,体验真实的唐朝。罗振宇、张泉灵、邓宝剑推荐阅读。玩转创意的书坛影帝唐太宗﹑
AutoCAD 2012中文版建筑设计标准实例教程 本书特色 《AutoCAD2012中文版建筑设计标准实例教程(第3版)》共14章,分为基础知识和建筑实例两篇...
王元,1930年4月15日生,江苏镇江人,著名数学家,中国科学院院士,1952年毕业于浙江大学数学系,经陈建功与苏步青推荐到中国科学
程序员增值合订本2002 本书特色 全套合订本适合开发者、项目经理 CTO&CIO、编程爱好者阅读收藏内含:精装大16开上、下两册,52个印张,832页,另附配...
非常网管——网络基础 内容简介 本书使用通俗易懂的语言,并通过大量的示例,全面系统地介绍了计算机网络的相关知识。本书的主要内容包括:计算机网络基础知识、OSI和...
《中国信息产业"十五"发展规划(通信卷)》收集了有关信息产业“十五”规划的各项研究成果,全面反映了“十五”期间政府行业发展的
《万物大历史·科学和技术是怎么发展而来的》内容简介:"大历史”概念由美国知名历史学家大卫·克里斯蒂安提出,后经比尔·盖茨大力
First,businessesdiscoveredqualityasakeycompetitiveedge;nextcamescience.Now,Donal...
苏萌北京大学光华管理学院市场营销系副教授、博士生导师、副系主任。毕业于美国康奈尔大学,获营销学博士学位。致力于营销模型、
《崧泽之光》内容简介:以古文化和水文化为特色的青浦,有着丰厚的历史文化底蕴。早在六千多年前,上海最早的外来移民来到了境内的
基于社交问答平台的用户知识贡献行为与服务优化 内容简介 《基于社交问答平台的用户知识贡献行为与服务优化》围绕用户的社交问答需求,从社交问答平台发展与平台架构出发...
PowerPoint 2007演示文稿制作经典教程 内容简介 本书由国内一线office办公软件教育与培训专家编著,主要遵循powerpoint 2007教学大...
《剪发技术专业图解教程》内容简介:本书以发型层次为线索,通过4种层次分别在颈部、后脑区、侧发区、顶发区、脸周围的不同表现,详
过阅读本书,你将能够:了解OSX和iOS应用的生命周期使用故事板设计自适应界面探索图形系统,包括内置的2D和3D游戏框架用AVFounda
《插画师之路——100堂水彩插画手绘实战课》内容简介:这是一本水彩插画手绘技法书。本书共6章,第1章介绍了插画绘图工具及绘画技法
《中国神话密码》内容简介:本书通过五个方面梳理中国神话体系:《山海经》探秘、上古时代的神界领袖、日常生活中的诸神、动植物与
《中国文学叙事传统视阈中的唐代辞赋研究(精)》内容简介:本书以唐赋为对象,详尽地阐述了赋的叙事特征,作者把唐赋放在中国文学
《淘宝与微店 :开店·运营·推广一册通》内容简介:超级畅销书《淘宝网开店、装修、管理、推广一册通》作者聚焦电商创业领域的又一
《Python编程:从入门到实践》内容简介:本书是一本针对所有层次的Python读者而作的Python入门书。全书分两部分:第一部分介绍用Py