Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively. Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide. This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution. How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration. Written for a wide, technical audience, SSH, The Secure Shell: The Definitive Guide covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks. No matter where or how you're shipping information, SSH, The Secure Shell: The Definitive Guide will show you how to do it securely.
Chapter 1 Introduction to SSH
What Is SSH?
What SSH Is Not
The SSH Protocol
Overview of SSH Features
History of SSH
Related Technologies
Summary
Chapter 2 Basic Client Use
A Running Example
Remote Terminal Sessions with ssh
Adding Complexity to the Example
Authentication by Cryptographic Key
The SSH Agent
Connecting Without a Password or Passphrase
Miscellaneous Clients
Summary
Chapter 3 Inside SSH
Overview of Features
A Cryptography Primer
The Architecture of an SSH System
Inside SSH-2
Inside SSH-1
Implementation Issues
SSH and File Transfers (scp and sftp)
Algorithms Used by SSH
Threats SSH Can Counter
Threats SSH Doesn't Prevent
Threats Caused by SSH
Summary
Chapter 4 Installation and Compile-Time Configuration
Overview
Installing OpenSSH
Installing Tectia
Software Inventory
Replacing r-Commands with SSH
Summary
Chapter 5 Serverwide Configuration
Running the Server
Server Configuration: An Overview
Getting Ready: Initial Setup
Authentication: Verifying Identities
Access Control: Letting People In
User Logins and Accounts
Forwarding
Subsystems
Logging and Debugging
Compatibility Between SSH-1 and SSH-2 Servers
Summary
Chapter 6 Key Management and Agents
What Is an Identity?
Creating an Identity
SSH Agents
Multiple Identities
PGP Authentication in Tectia
Tectia External Keys
Summary
Chapter 7 Advanced Client Use
How to Configure Clients
Precedence
Introduction to Verbose Mode
Client Configuration in Depth
Secure Copy with scp
Secure, Interactive Copy with sftp
Summary
Chapter 8 Per-Account Server Configuration
Limits of This Technique
Public-Key-Based Configuration
Hostbased Access Control
The User rc File
Summary
Chapter 9 Port Forwarding and X Forwarding
What Is Forwarding?
Port Forwarding
Dynamic Port Forwarding
X Forwarding
Forwarding Security: TCP-Wrappers and libwrap
Summary
Chapter 10 A Recommended Setup
The Basics
Compile-Time Configuration
Serverwide Configuration
Per-Account Configuration
Key Management
Client Configuration
Remote Home Directories (NFS, AFS)
Summary
Chapter 11 Case Studies
Unattended SSH: Batch or cron Jobs
FTP and SSH
Pine, IMAP, and SSH
Connecting Through a Gateway Host
Scalable Authentication for SSH
Tectia Extensions to Server Configuration Files
Tectia Plugins
Chapter 12 Troubleshooting and FAQ
Debug Messages: Your First Line of Defense
Problems and Solutions
Other SSH Resources
Chapter 13 Overview of Other Implementations
Common Features
Covered Products
Other SSH Products
Chapter 14 OpenSSH for Windows
Installation
Using the SSH Clients
Setting Up the SSH Server
Public-Key Authentication
Troubleshooting
Summary
Chapter 15 OpenSSH for Macintosh
Using the SSH Clients
Using the OpenSSH Server
Chapter 16 Tectia for Windows
Obtaining and Installing
Basic Client Use
Key Management
Accession Lite
Advanced Client Use
Port Forwarding
Connector
File Transfers
Command-Line Programs
Troubleshooting
Server
Chapter 17 SecureCRT and SecureFX for Windows
Obtaining and Installing
Basic Client Use
Key Management
Advanced Client Use
Forwarding
Command-Line Client Programs
File Transfer
Troubleshooting
VShell
Summary
Chapter 18 PuTTY for Windows
Obtaining and Installing
Basic Client Use
File Transfer
Key Management
Advanced Client Use
Forwarding
Summary
Appendix
Colophon
《明诗鉴赏》内容简介:《明诗鉴赏》是“新选中国名诗1000首”丛书中的一种,是由首都师范大学教育部长江学者特聘教授左东岭注评。
Pro/ENGGINEER野火版4.0基础教程与上机指导 (孙传祝) 本书特色 《Pro/ENGINEER野火版 4.0基础教程与上机指导》涵盖Pro/ENGI...
ACalltoActionthatAnswerstheQuestionsPosedbytheGrammyAward-WinningAnInconvenientT...
《平衡掌控者》内容简介:本书由真正从事游戏行业工作的一线人员所著,书中的全部案例来自真实的游戏设计案例。全书共7章,第1章介
《分布式系统概念与设计》旨在全面介绍因特网及其他常用分布式系统的原理、体系结构、算法和设计,内容涵盖分布式系统的相关概念
在本书中,作者从设计思维的视角,探索了利用信息技术将医疗保健业引入体验经济的方式。在体验经济中,患者角色将转型为医疗产业
《写给大忙人看的Java核心技术》为经典著作CoreJava作者CayS.Horstmann的全新力作,以关键的核心技术为着眼点,以全局高度提炼语
AllyourfavoritecharactersfromCharlottesWebcomealiveinthis96-pagejumbocoloringand...
《未来学徒》内容简介:本书从技术、产业和商业三个角度向读者介绍了当今人工智能的发展状况,让人工智能从历史和数学公式中走到读
《前世的秘密》内容简介:《前世的秘密》为美国灵性大师泰德·安德鲁斯绝世力作,全球范围内探讨“前世今生”话题最重要的作品。作
电脑组装一点通 本书特色 “让读者学以致用,学知识事半功倍,解决问题不求人”,用*轻松的语言、*简捷的方式,讲解*有用的东西,让您不知不觉置身于电脑的殿堂中。电...
《历史何其相似》内容简介:《历史何其相似》就是把历史上已经上演过,而今天依然在不断播放的镜头聚集起来,展现在世人的面前。你
为何典型的企业项目无法像你为web所开发的项目那样运行得如此平滑?对于建造分布式和企业级的应用来说,rest架构风格真的提供了一
《实用语义网RDFS与OWL高效建模(英文版)》是语义网的入门教程,详细讲述语义网的核心内容的语言,包括语义网的概念、语义建模等。
《佛罗伦萨乌菲齐美术馆》内容简介:“伟大的博物馆少年版”系列图书以博物馆为依托,在内容编写上融合了博物馆与相关国家、城市的
本书在全面概述电子商务模式与应用、网络平台建设、电子商务的案例与支付、物流、网络营销与CRM、管理和法律环境的理论基础上,覆
《这就是财务管理:世界500强CFO的独家分享》内容简介:本书财务工作涉及企业运营的方方面面,长期以来,无论是财务工作者还是企业
作者在充分消化历史、文化、风俗、地理、经济、军事、外交、科技等有关史实的前提下,从日本以情报立国这一国策入手,用汪洋自肆
《维护网络空间安全:中国网络安全法解读》内容简介:自2017年6月1日起;《中华人民共和国网络安全法》(本书简称《网络安全法》)正
新手学电脑从入门到精通 本书特色 《新手学电脑从入门到精通》以知识应用为讲解主旨,以动手实操为组织形式,逐一对电脑的使用方法、操作技能、实际应用等方面做了全面阐...