Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively. Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide. This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution. How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration. Written for a wide, technical audience, SSH, The Secure Shell: The Definitive Guide covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks. No matter where or how you're shipping information, SSH, The Secure Shell: The Definitive Guide will show you how to do it securely.
Chapter 1 Introduction to SSH
What Is SSH?
What SSH Is Not
The SSH Protocol
Overview of SSH Features
History of SSH
Related Technologies
Summary
Chapter 2 Basic Client Use
A Running Example
Remote Terminal Sessions with ssh
Adding Complexity to the Example
Authentication by Cryptographic Key
The SSH Agent
Connecting Without a Password or Passphrase
Miscellaneous Clients
Summary
Chapter 3 Inside SSH
Overview of Features
A Cryptography Primer
The Architecture of an SSH System
Inside SSH-2
Inside SSH-1
Implementation Issues
SSH and File Transfers (scp and sftp)
Algorithms Used by SSH
Threats SSH Can Counter
Threats SSH Doesn't Prevent
Threats Caused by SSH
Summary
Chapter 4 Installation and Compile-Time Configuration
Overview
Installing OpenSSH
Installing Tectia
Software Inventory
Replacing r-Commands with SSH
Summary
Chapter 5 Serverwide Configuration
Running the Server
Server Configuration: An Overview
Getting Ready: Initial Setup
Authentication: Verifying Identities
Access Control: Letting People In
User Logins and Accounts
Forwarding
Subsystems
Logging and Debugging
Compatibility Between SSH-1 and SSH-2 Servers
Summary
Chapter 6 Key Management and Agents
What Is an Identity?
Creating an Identity
SSH Agents
Multiple Identities
PGP Authentication in Tectia
Tectia External Keys
Summary
Chapter 7 Advanced Client Use
How to Configure Clients
Precedence
Introduction to Verbose Mode
Client Configuration in Depth
Secure Copy with scp
Secure, Interactive Copy with sftp
Summary
Chapter 8 Per-Account Server Configuration
Limits of This Technique
Public-Key-Based Configuration
Hostbased Access Control
The User rc File
Summary
Chapter 9 Port Forwarding and X Forwarding
What Is Forwarding?
Port Forwarding
Dynamic Port Forwarding
X Forwarding
Forwarding Security: TCP-Wrappers and libwrap
Summary
Chapter 10 A Recommended Setup
The Basics
Compile-Time Configuration
Serverwide Configuration
Per-Account Configuration
Key Management
Client Configuration
Remote Home Directories (NFS, AFS)
Summary
Chapter 11 Case Studies
Unattended SSH: Batch or cron Jobs
FTP and SSH
Pine, IMAP, and SSH
Connecting Through a Gateway Host
Scalable Authentication for SSH
Tectia Extensions to Server Configuration Files
Tectia Plugins
Chapter 12 Troubleshooting and FAQ
Debug Messages: Your First Line of Defense
Problems and Solutions
Other SSH Resources
Chapter 13 Overview of Other Implementations
Common Features
Covered Products
Other SSH Products
Chapter 14 OpenSSH for Windows
Installation
Using the SSH Clients
Setting Up the SSH Server
Public-Key Authentication
Troubleshooting
Summary
Chapter 15 OpenSSH for Macintosh
Using the SSH Clients
Using the OpenSSH Server
Chapter 16 Tectia for Windows
Obtaining and Installing
Basic Client Use
Key Management
Accession Lite
Advanced Client Use
Port Forwarding
Connector
File Transfers
Command-Line Programs
Troubleshooting
Server
Chapter 17 SecureCRT and SecureFX for Windows
Obtaining and Installing
Basic Client Use
Key Management
Advanced Client Use
Forwarding
Command-Line Client Programs
File Transfer
Troubleshooting
VShell
Summary
Chapter 18 PuTTY for Windows
Obtaining and Installing
Basic Client Use
File Transfer
Key Management
Advanced Client Use
Forwarding
Summary
Appendix
Colophon
Go并发编程实战-第2版 本书特色 本书首先介绍了Go语言的优势特性、安装设置方法、工程结构、标准命令和工具、语法基础、数据类型以及流程控制方法,接着阐述了与多...
《增长密码:大型网站百万流量运营之道》内容简介:本书是作者在SEO行业12年成功经验的总结。对于大型网站的流量运营方法,作者以S
书围绕着动态内存自动回收的话题,介绍了垃圾收集机制,详细分析了各种算法和相关技术。本书共12章。第1章首先介绍计算机存储器管
多媒体技术与创作 内容简介 《多媒体技术与创作》是数字媒体技术与创作系列教材中的一部。全书以多媒体软件项目管理的思想和软件工程学的方法为指导,以一个综合的...
《分布式系统与一致性》内容简介:一致性是非常重要的分布式技术。众所周知,分布式系统有很多特性,如可用性、可靠性等,这些特性
《犹太商人大智慧》内容简介:财富之道;翻开这本书,你将真正踏上百万富翁的成功之旅;如果看完这本书,你还不会挣钱,那你将一生
Python入门经典 本书特色 python是一种解释型、面向对象、动态数据类型的高级程序设计语言。python可以用于很多的领域,从科学计算到游戏开发。《py...
《Flutter开发实战详解》内容简介:《Flutter开发实战详解》以实战为导向,由浅入深地介绍了Flutter开发过程中的基础体系、实战技巧
機器人端咖啡,電腦當醫生,數據分析愈來愈便利精準,我們以為科技將創造新一波繁榮,卻低估了它推動世界變遷的速度!機器開始全
《我的心又一度的跳荡》内容简介:《我的心又一度的跳荡:徐志摩诗文精选/民国大师精美诗文系列》是一本徐志摩的作品诗文集。他的诗
《尤比克》内容简介:“科幻鬼才”菲利普·迪克成长于西方科技文明创造出的崭新辉煌的时代。彼时,人类进入了太空,登上了月球,成
《红色范思哲灰色阿玛尼:跟大师学色彩搭配》从“色”的角度对绚丽的时装世界进行了探索。它不是一大堆色彩理论的堆砌,而以巴黎、
《现代数字信号处理》介绍了现代数字信号处理的主要内容。首先概述了离散时间信号处理和离散随机信号分析的基础内容,主要是一些
《新旧之间》内容简介:本书以《樊山政书》所反映的清末法制变革中樊增祥任藩、臬两司的司法公文为研究对象,围绕转型时期的“变”
TheIntel®64andIA-32ArchitecturesSoftwareDeveloper’sManual,Volume1:BasicArchitect...
《唐前孟学史》内容简介:本书对唐前孟学史展开系统研究,分为“战国孟学史”、“秦汉孟学史”、“魏晋南北朝孟学史”三编,共十五
Android编程权威指南-(第2版) 本书特色 big nerd ranch是美国一家专业的移动开发技术培训机构。本书主要以其android训练营教学课程为基...
《汽车底盘电控系统诊断与维修》内容简介:本书紧密结合现代汽车底盘电控系统诊断与维修生产实际,契合融“教-学-做”为一体的教学
《去湿地观鸟》内容简介:米娅非常开心地去湿地秋游,她看到了各种不同的鸟类,还意外发现了被捕鸟网困住的震旦鸦雀。她将可怜的震
《首饰设计》系统地介绍了珠宝首饰设计,其侧重点在于开拓我们的创意性思维。作者以一个西方首饰专家独特的视角和对专业领域孜孜