Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively. Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide. This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution. How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration. Written for a wide, technical audience, SSH, The Secure Shell: The Definitive Guide covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks. No matter where or how you're shipping information, SSH, The Secure Shell: The Definitive Guide will show you how to do it securely.
Chapter 1 Introduction to SSH
What Is SSH?
What SSH Is Not
The SSH Protocol
Overview of SSH Features
History of SSH
Related Technologies
Summary
Chapter 2 Basic Client Use
A Running Example
Remote Terminal Sessions with ssh
Adding Complexity to the Example
Authentication by Cryptographic Key
The SSH Agent
Connecting Without a Password or Passphrase
Miscellaneous Clients
Summary
Chapter 3 Inside SSH
Overview of Features
A Cryptography Primer
The Architecture of an SSH System
Inside SSH-2
Inside SSH-1
Implementation Issues
SSH and File Transfers (scp and sftp)
Algorithms Used by SSH
Threats SSH Can Counter
Threats SSH Doesn't Prevent
Threats Caused by SSH
Summary
Chapter 4 Installation and Compile-Time Configuration
Overview
Installing OpenSSH
Installing Tectia
Software Inventory
Replacing r-Commands with SSH
Summary
Chapter 5 Serverwide Configuration
Running the Server
Server Configuration: An Overview
Getting Ready: Initial Setup
Authentication: Verifying Identities
Access Control: Letting People In
User Logins and Accounts
Forwarding
Subsystems
Logging and Debugging
Compatibility Between SSH-1 and SSH-2 Servers
Summary
Chapter 6 Key Management and Agents
What Is an Identity?
Creating an Identity
SSH Agents
Multiple Identities
PGP Authentication in Tectia
Tectia External Keys
Summary
Chapter 7 Advanced Client Use
How to Configure Clients
Precedence
Introduction to Verbose Mode
Client Configuration in Depth
Secure Copy with scp
Secure, Interactive Copy with sftp
Summary
Chapter 8 Per-Account Server Configuration
Limits of This Technique
Public-Key-Based Configuration
Hostbased Access Control
The User rc File
Summary
Chapter 9 Port Forwarding and X Forwarding
What Is Forwarding?
Port Forwarding
Dynamic Port Forwarding
X Forwarding
Forwarding Security: TCP-Wrappers and libwrap
Summary
Chapter 10 A Recommended Setup
The Basics
Compile-Time Configuration
Serverwide Configuration
Per-Account Configuration
Key Management
Client Configuration
Remote Home Directories (NFS, AFS)
Summary
Chapter 11 Case Studies
Unattended SSH: Batch or cron Jobs
FTP and SSH
Pine, IMAP, and SSH
Connecting Through a Gateway Host
Scalable Authentication for SSH
Tectia Extensions to Server Configuration Files
Tectia Plugins
Chapter 12 Troubleshooting and FAQ
Debug Messages: Your First Line of Defense
Problems and Solutions
Other SSH Resources
Chapter 13 Overview of Other Implementations
Common Features
Covered Products
Other SSH Products
Chapter 14 OpenSSH for Windows
Installation
Using the SSH Clients
Setting Up the SSH Server
Public-Key Authentication
Troubleshooting
Summary
Chapter 15 OpenSSH for Macintosh
Using the SSH Clients
Using the OpenSSH Server
Chapter 16 Tectia for Windows
Obtaining and Installing
Basic Client Use
Key Management
Accession Lite
Advanced Client Use
Port Forwarding
Connector
File Transfers
Command-Line Programs
Troubleshooting
Server
Chapter 17 SecureCRT and SecureFX for Windows
Obtaining and Installing
Basic Client Use
Key Management
Advanced Client Use
Forwarding
Command-Line Client Programs
File Transfer
Troubleshooting
VShell
Summary
Chapter 18 PuTTY for Windows
Obtaining and Installing
Basic Client Use
File Transfer
Key Management
Advanced Client Use
Forwarding
Summary
Appendix
Colophon
Java是目前应用最为广泛的软件开发平台,学习针对Java程序的优化方法有重要的现实意义。《Java程序性能优化:让你的Java程序更快
一日你逛進某間生活道具店,喜歡上它挑選與擺設的品味,更因店主豐富的知識與真心推薦而更深入認識這個世界,再也不必費心尋覓,
《Android开发实战》内容简介:本书由一线资深软件开发工程师基于目前广泛使用的Android 6/7和Android Studio 2.x开发环境倾力编撰
CX5477AUTOCAD2009电气设计110例附光盘 本书特色 《AutoCAD 2009电气设计110例》特点:专业实用职场红宝书超长时间视频讲解双栏排版...
ProductDescriptionHereisthefirstobject-orienteddevelopmentbooktoprovidespecifice...
《经销商激励》内容简介:结合企业痛点介绍激励经销商常用的方法,包括:经销商激励概论、返利激励、政策激励、经销商销售竞赛、限
《好投资与坏投资》内容简介:投资背后是极其重要的生活抉择。好的投资可以让家庭生活变得轻松,让人免受辛苦劳累工作的羁绊。坏的
《PyTorch深度学习简明实战》内容简介:本书针对深度学习及开源框架——PyTorch,采用简明的语言进行知识的讲解,注重实战。全书分
观念是一切的开始,本书汇集了那些正在影响和创造着未来时尚潮流的观念。20世纪是一个充满创新的时代,其中许多创意给女性服饰带
《抽象中的形象:图形的故事》内容简介:本书故事的引人入胜与数学原理的巧妙结合,会产生一种奇特的反应,让读者在故事的流连忘返
《华尔街最受欢迎的投资课》内容简介:100多年来,华尔街诞生了数不清的投资大师,如沃伦?巴菲特、彼得?林奇、乔治?索罗斯、本杰明
《猎头之道:成长创业与事业长青》内容简介:本书从猎头行业解析、猎头顾问精进、猎头公司管理、猎头创业困境破解、猎头业务模式创
《高效管理的四个关键环节》内容简介:《高效管理的四个关键环节/盛世新管理书架》编著者王亚锋。《高效管理的四个关键环节/盛世
《科第冠海内,人文甲天下》内容简介:《科第冠海内,人文甲天下:明清江南文化研究》是南京大学历史学院范金民教授在江南文化研究
《ASP.NET4高级程序设计(第4版)》,本书是ASP.NET领域的鸿篇巨制,全面讲解了ASP.NET4的各种特性及其背后的工作原理,并给出了许
李光斗中国品牌第一人著名品牌战略专家中央电视台品牌顾问新媒体时代的品牌观察家中国电子商务协会互联网金融委员会首席顾问李光
《C++程序设计(第2版)》内容简介:本书是为已有C语言程序设计基础、想进一步学习C++面向对象程序设计的读者编写的。书中用通俗易
《SQL基础教程(第3版)》是一本SQL的入门书,介绍如何使用最常用的SQL语言维护和查询数据库信息。书中介绍了各种DBMS,关系模型理
感性工程学是什么,能干什么,如何使用,走向何方,这是《感性工程学》所要回答的4个关键问题,同时,也构成了感性工程学整个理论
《社会主义核心价值观·关键词:诚信》内容简介:在一般意义上,“诚”即诚实诚恳,主要指主体真诚的内在道德品质;“信”即信用信