Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively. Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide. This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution. How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration. Written for a wide, technical audience, SSH, The Secure Shell: The Definitive Guide covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks. No matter where or how you're shipping information, SSH, The Secure Shell: The Definitive Guide will show you how to do it securely.
Chapter 1 Introduction to SSH
What Is SSH?
What SSH Is Not
The SSH Protocol
Overview of SSH Features
History of SSH
Related Technologies
Summary
Chapter 2 Basic Client Use
A Running Example
Remote Terminal Sessions with ssh
Adding Complexity to the Example
Authentication by Cryptographic Key
The SSH Agent
Connecting Without a Password or Passphrase
Miscellaneous Clients
Summary
Chapter 3 Inside SSH
Overview of Features
A Cryptography Primer
The Architecture of an SSH System
Inside SSH-2
Inside SSH-1
Implementation Issues
SSH and File Transfers (scp and sftp)
Algorithms Used by SSH
Threats SSH Can Counter
Threats SSH Doesn't Prevent
Threats Caused by SSH
Summary
Chapter 4 Installation and Compile-Time Configuration
Overview
Installing OpenSSH
Installing Tectia
Software Inventory
Replacing r-Commands with SSH
Summary
Chapter 5 Serverwide Configuration
Running the Server
Server Configuration: An Overview
Getting Ready: Initial Setup
Authentication: Verifying Identities
Access Control: Letting People In
User Logins and Accounts
Forwarding
Subsystems
Logging and Debugging
Compatibility Between SSH-1 and SSH-2 Servers
Summary
Chapter 6 Key Management and Agents
What Is an Identity?
Creating an Identity
SSH Agents
Multiple Identities
PGP Authentication in Tectia
Tectia External Keys
Summary
Chapter 7 Advanced Client Use
How to Configure Clients
Precedence
Introduction to Verbose Mode
Client Configuration in Depth
Secure Copy with scp
Secure, Interactive Copy with sftp
Summary
Chapter 8 Per-Account Server Configuration
Limits of This Technique
Public-Key-Based Configuration
Hostbased Access Control
The User rc File
Summary
Chapter 9 Port Forwarding and X Forwarding
What Is Forwarding?
Port Forwarding
Dynamic Port Forwarding
X Forwarding
Forwarding Security: TCP-Wrappers and libwrap
Summary
Chapter 10 A Recommended Setup
The Basics
Compile-Time Configuration
Serverwide Configuration
Per-Account Configuration
Key Management
Client Configuration
Remote Home Directories (NFS, AFS)
Summary
Chapter 11 Case Studies
Unattended SSH: Batch or cron Jobs
FTP and SSH
Pine, IMAP, and SSH
Connecting Through a Gateway Host
Scalable Authentication for SSH
Tectia Extensions to Server Configuration Files
Tectia Plugins
Chapter 12 Troubleshooting and FAQ
Debug Messages: Your First Line of Defense
Problems and Solutions
Other SSH Resources
Chapter 13 Overview of Other Implementations
Common Features
Covered Products
Other SSH Products
Chapter 14 OpenSSH for Windows
Installation
Using the SSH Clients
Setting Up the SSH Server
Public-Key Authentication
Troubleshooting
Summary
Chapter 15 OpenSSH for Macintosh
Using the SSH Clients
Using the OpenSSH Server
Chapter 16 Tectia for Windows
Obtaining and Installing
Basic Client Use
Key Management
Accession Lite
Advanced Client Use
Port Forwarding
Connector
File Transfers
Command-Line Programs
Troubleshooting
Server
Chapter 17 SecureCRT and SecureFX for Windows
Obtaining and Installing
Basic Client Use
Key Management
Advanced Client Use
Forwarding
Command-Line Client Programs
File Transfer
Troubleshooting
VShell
Summary
Chapter 18 PuTTY for Windows
Obtaining and Installing
Basic Client Use
File Transfer
Key Management
Advanced Client Use
Forwarding
Summary
Appendix
Colophon
《深入浅出SSD:固态存储核心技术、原理与实战》内容简介:本书的内容几乎覆盖了SSD各个模块,既可以作为一本入门书籍进行通读,也
与传统的用户应用程序开发不同,内核环境更加复杂多变,任何问题都会严重影响系统的稳定性、安全性和性能,所以一定要确保内核代
《MATLAB神经网络编程》结合神经网络的概念、理论和应用,以MATLAB为平台,系统地介绍了神经网络工具箱中的前向型神经网络、局部
《情绪流》内容简介:本书旨在以一个全新的视角来建构对人生的理解。本书从人类普遍面临的幸福难题或苦乐难题出发,经由对心智系统
《最新日本设计模板:版面设计》着重对海报、DH、POP、书籍等印刷品的设计和运用进行解说,因为“版面设计”存在于人们生活的方方
《思维风暴:22种黄金思维+700道世界思维名题(超值白金版)》内容简介:爱因斯坦说过:人们解决世界的问题,靠的是大脑思维和智慧。
《RocketMQ技术内幕:RocketMQ架构设计与实现原理》内容简介:本书由RocketMQ社区早期的布道者和技术专家撰写,Apache RocketMQ创...
《金融科技:变迁与演进》内容简介:互联网金融在中国的发展依靠市场、技术和制度三方面的因素。在市场方面,随着中国改革开放的不
本书以超宽带冲激无线电(UltraWidebandImpulseRdio)为重点,系统阐述超宽带无线通信的基本原理和技术,内容包括超宽带无线通信
《爸爸爱喜禾:你一直在和自己玩》内容简介:口碑爆棚!写给自闭症患者家庭的希望及欢笑之书! 《见字如面》深情朗读,于丹、崔永元
《刘安评传(增订本)》内容简介:《刘安平传(增订本)》是一部以思想为着重点对西汉淮南王刘安进行全面评论的专著。书中对刘安其
《全能网页设计师精炼手册》内容简介:本书通过对网页设计的核心基础进行讲解,使读者全面了解和掌握作为一个网页设计师应掌握的排
《中学摄影》内容简介:本教材为“中小学美术拓展教材”之一,本教材针对中学生学习特点,从摄影图像与思维、观看、呈现和传播等几
《精益创新:企业高效创新八步法》内容简介:本书是一部从创新战略到创新实践的工具书,作者借助对众多创新成功和失败企业的深入研
《日志管理与分析(第2版)》内容简介:本书基于主流日志管理与分析系统的设计理念,完善、透彻地对日志分析各流程模块的原理与实现
WEB+DBPRESS是日本主流的计算机技术杂志,旨在帮助程序员更实时、深入地了解前沿技术,扩大视野,提升技能。内容侧重于Web开发的
《大清侃史官》内容简介:这是一本有灵魂、有内容、有猛料的清朝历史,那些陷落在历史深处的人物在作者笔下的这一刻,不再是一个个
《IP授权商业化:从入门到精通》内容简介:本书是针对授权行业的入门指导及案例分析著作,也是对新形势下IP授权商业化流程进行全面
《同时(2018年版)》内容简介:《同时》是桑坦格的“最后一部”随笔集,她的“最后一本书”。书名取自苏珊·桑坦最后一次演说的标
《幸福,从看见自己开始》内容简介:书中探讨了现代人普遍存在的安全感、自我价值感、亲密关系、金钱观、孤独与自由等社会话题。两