Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively. Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide. This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution. How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration. Written for a wide, technical audience, SSH, The Secure Shell: The Definitive Guide covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks. No matter where or how you're shipping information, SSH, The Secure Shell: The Definitive Guide will show you how to do it securely.
Chapter 1 Introduction to SSH
What Is SSH?
What SSH Is Not
The SSH Protocol
Overview of SSH Features
History of SSH
Related Technologies
Summary
Chapter 2 Basic Client Use
A Running Example
Remote Terminal Sessions with ssh
Adding Complexity to the Example
Authentication by Cryptographic Key
The SSH Agent
Connecting Without a Password or Passphrase
Miscellaneous Clients
Summary
Chapter 3 Inside SSH
Overview of Features
A Cryptography Primer
The Architecture of an SSH System
Inside SSH-2
Inside SSH-1
Implementation Issues
SSH and File Transfers (scp and sftp)
Algorithms Used by SSH
Threats SSH Can Counter
Threats SSH Doesn't Prevent
Threats Caused by SSH
Summary
Chapter 4 Installation and Compile-Time Configuration
Overview
Installing OpenSSH
Installing Tectia
Software Inventory
Replacing r-Commands with SSH
Summary
Chapter 5 Serverwide Configuration
Running the Server
Server Configuration: An Overview
Getting Ready: Initial Setup
Authentication: Verifying Identities
Access Control: Letting People In
User Logins and Accounts
Forwarding
Subsystems
Logging and Debugging
Compatibility Between SSH-1 and SSH-2 Servers
Summary
Chapter 6 Key Management and Agents
What Is an Identity?
Creating an Identity
SSH Agents
Multiple Identities
PGP Authentication in Tectia
Tectia External Keys
Summary
Chapter 7 Advanced Client Use
How to Configure Clients
Precedence
Introduction to Verbose Mode
Client Configuration in Depth
Secure Copy with scp
Secure, Interactive Copy with sftp
Summary
Chapter 8 Per-Account Server Configuration
Limits of This Technique
Public-Key-Based Configuration
Hostbased Access Control
The User rc File
Summary
Chapter 9 Port Forwarding and X Forwarding
What Is Forwarding?
Port Forwarding
Dynamic Port Forwarding
X Forwarding
Forwarding Security: TCP-Wrappers and libwrap
Summary
Chapter 10 A Recommended Setup
The Basics
Compile-Time Configuration
Serverwide Configuration
Per-Account Configuration
Key Management
Client Configuration
Remote Home Directories (NFS, AFS)
Summary
Chapter 11 Case Studies
Unattended SSH: Batch or cron Jobs
FTP and SSH
Pine, IMAP, and SSH
Connecting Through a Gateway Host
Scalable Authentication for SSH
Tectia Extensions to Server Configuration Files
Tectia Plugins
Chapter 12 Troubleshooting and FAQ
Debug Messages: Your First Line of Defense
Problems and Solutions
Other SSH Resources
Chapter 13 Overview of Other Implementations
Common Features
Covered Products
Other SSH Products
Chapter 14 OpenSSH for Windows
Installation
Using the SSH Clients
Setting Up the SSH Server
Public-Key Authentication
Troubleshooting
Summary
Chapter 15 OpenSSH for Macintosh
Using the SSH Clients
Using the OpenSSH Server
Chapter 16 Tectia for Windows
Obtaining and Installing
Basic Client Use
Key Management
Accession Lite
Advanced Client Use
Port Forwarding
Connector
File Transfers
Command-Line Programs
Troubleshooting
Server
Chapter 17 SecureCRT and SecureFX for Windows
Obtaining and Installing
Basic Client Use
Key Management
Advanced Client Use
Forwarding
Command-Line Client Programs
File Transfer
Troubleshooting
VShell
Summary
Chapter 18 PuTTY for Windows
Obtaining and Installing
Basic Client Use
File Transfer
Key Management
Advanced Client Use
Forwarding
Summary
Appendix
Colophon
《科特迪瓦(第2版)》内容简介:科特迪瓦位于非洲大陆西部,南邻大西洋几内亚港湾。这里有西非第一大港口,也是内陆国家马里和布基
●商业与技术领域最重要的五部作品之一、超级畅销书《释放杀手级应用》作者拉里•唐斯力作。摩尔定律、梅特卡夫定律和颠覆定律是当
《TD-SCDMA无线网络设计与规划》从移动通信的基本知识入手,对TD-SCDMA系统的关键技术和网络特性做了介绍,重点阐述了如何对TD-S
《当下的修行:要懂得一点放下》内容简介:其实,生活本该是一个轻松的课题,只是我们一直无法放下心中的累赘,将不该看重的东西看
《UbuntuServer最佳方案》是第一本全面介绍UbuntuLinuxServer的中文书籍,是作者10多年实战经验的结晶;从构思到出版,花费作者近
本书是理论计算机科学方面的优秀教材,主要介绍形式语言、自动机、可计算性和相关内容。本书特别注意定义、定理的准确性和严格性
《用户体验草图设计工具手册(全彩)》是《用户体验草图设计》的配套阅读图书,将指导你如何一步一步地用草图来表达你的设计理念
《界岸人家2:一个中国村庄的个体生命史》内容简介:全书共三十四篇,汇集了19个家庭38位村民的生命故事,均采自村民口述。通过三十
《逍遥游(绘本版)》内容简介:《逍遥游》是战国时期哲学家、文学家庄子的代表作,无论在艺术上还是思想上均可视为《庄子》一书的
《手绘设计草图表现技法》内容简介:本书阐述了手绘图透视表现的基本原理、制图方法和物体的质感表现等,介绍了多种手绘图表现的画
WebRTC是一个支持网络浏览器进行实时语音对话或视频对话的软件架构。《LearningWebRTC中文版》使用形象的案例介绍,逐步深入地阐
該年鑒屬日本字體設計協會(JapanTypograhyAssociation)官方出版物,本期版式及裝幀由南部俊安(ToshiyasuNanbu)設計,Grap...
在线阅读本书Agreatintroductionforretailstudents,thisbookoffersauser-friendlyreferenceg...
Railsislarge,powerful,andnew.Howdoyouuseiteffectively?Howdoyouharnessthepower?An...
在你体验Minecraft冒险的同时,学习宝贵的编程技能!如果你很喜欢玩Minecraft,却被游戏中的建造耗费大量时间而困扰,并且你想要
《理解中国产业政策》内容简介:随着改革开放的不断深入与国民经济的快速发展,中国以选择性政策为主体的产业政策体系,政策效果越
《Visio2010图形设计从新手到高手》由浅入深地介绍使用MicrosoftVisio2010制作商业图形、图表和流程图的方法,详细介绍使用Visio设
.这几年,我们一直在喊“转型”,也有很多人给出了很多“经营新方向”,应该说见仁见智,但有一点需要说明,不应把转型想得、说得
HowtoBreakSoftwareisadeparturefromconventionaltestinginwhichtestersprepareawritt...
一本設計師寫給設計師的學習書。你是否有設計工作上的困惑是無人可諮詢、解決的:我是否適合從事設計工作?個人作品集該如何製作