Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively. Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide. This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution. How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration. Written for a wide, technical audience, SSH, The Secure Shell: The Definitive Guide covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks. No matter where or how you're shipping information, SSH, The Secure Shell: The Definitive Guide will show you how to do it securely.
Chapter 1 Introduction to SSH
What Is SSH?
What SSH Is Not
The SSH Protocol
Overview of SSH Features
History of SSH
Related Technologies
Summary
Chapter 2 Basic Client Use
A Running Example
Remote Terminal Sessions with ssh
Adding Complexity to the Example
Authentication by Cryptographic Key
The SSH Agent
Connecting Without a Password or Passphrase
Miscellaneous Clients
Summary
Chapter 3 Inside SSH
Overview of Features
A Cryptography Primer
The Architecture of an SSH System
Inside SSH-2
Inside SSH-1
Implementation Issues
SSH and File Transfers (scp and sftp)
Algorithms Used by SSH
Threats SSH Can Counter
Threats SSH Doesn't Prevent
Threats Caused by SSH
Summary
Chapter 4 Installation and Compile-Time Configuration
Overview
Installing OpenSSH
Installing Tectia
Software Inventory
Replacing r-Commands with SSH
Summary
Chapter 5 Serverwide Configuration
Running the Server
Server Configuration: An Overview
Getting Ready: Initial Setup
Authentication: Verifying Identities
Access Control: Letting People In
User Logins and Accounts
Forwarding
Subsystems
Logging and Debugging
Compatibility Between SSH-1 and SSH-2 Servers
Summary
Chapter 6 Key Management and Agents
What Is an Identity?
Creating an Identity
SSH Agents
Multiple Identities
PGP Authentication in Tectia
Tectia External Keys
Summary
Chapter 7 Advanced Client Use
How to Configure Clients
Precedence
Introduction to Verbose Mode
Client Configuration in Depth
Secure Copy with scp
Secure, Interactive Copy with sftp
Summary
Chapter 8 Per-Account Server Configuration
Limits of This Technique
Public-Key-Based Configuration
Hostbased Access Control
The User rc File
Summary
Chapter 9 Port Forwarding and X Forwarding
What Is Forwarding?
Port Forwarding
Dynamic Port Forwarding
X Forwarding
Forwarding Security: TCP-Wrappers and libwrap
Summary
Chapter 10 A Recommended Setup
The Basics
Compile-Time Configuration
Serverwide Configuration
Per-Account Configuration
Key Management
Client Configuration
Remote Home Directories (NFS, AFS)
Summary
Chapter 11 Case Studies
Unattended SSH: Batch or cron Jobs
FTP and SSH
Pine, IMAP, and SSH
Connecting Through a Gateway Host
Scalable Authentication for SSH
Tectia Extensions to Server Configuration Files
Tectia Plugins
Chapter 12 Troubleshooting and FAQ
Debug Messages: Your First Line of Defense
Problems and Solutions
Other SSH Resources
Chapter 13 Overview of Other Implementations
Common Features
Covered Products
Other SSH Products
Chapter 14 OpenSSH for Windows
Installation
Using the SSH Clients
Setting Up the SSH Server
Public-Key Authentication
Troubleshooting
Summary
Chapter 15 OpenSSH for Macintosh
Using the SSH Clients
Using the OpenSSH Server
Chapter 16 Tectia for Windows
Obtaining and Installing
Basic Client Use
Key Management
Accession Lite
Advanced Client Use
Port Forwarding
Connector
File Transfers
Command-Line Programs
Troubleshooting
Server
Chapter 17 SecureCRT and SecureFX for Windows
Obtaining and Installing
Basic Client Use
Key Management
Advanced Client Use
Forwarding
Command-Line Client Programs
File Transfer
Troubleshooting
VShell
Summary
Chapter 18 PuTTY for Windows
Obtaining and Installing
Basic Client Use
File Transfer
Key Management
Advanced Client Use
Forwarding
Summary
Appendix
Colophon
《日本论》内容简介:戴季陶曾留学日本多年,与日本民众有过深入的交往,因此对日本有着通透的认识。在本书中,他纵论日本从皇权、
本书是一本深入研究和揭示CSS设计技术的书籍。本书在透彻地讲解CSS核心技术的基础上,深入到各个实际应用领域中,充分向读者演示
本书详细介绍了层叠样式表单的基本要素,包括CSS的基本概念、CSS属性、格式化模型以及CSS单位等。此外,对于CSS的延伸扩展部分也
《GraphQL学习指南》内容简介:本书为希望开始使用GraphQL的前端Web开发人员、后端工程师以及项目或产品经理提供了一条清晰的学习路
《知道点世界文化》内容简介:什么是摩西“十诫”?蒙娜丽莎的微笑背后隐藏着什么样的秘密?“投身饲虎”是一个怎样的故事……这些
《海蒂》内容简介:《海蒂》是瑞士儿童文学作家给翰娜·斯比丽的代表作,被视为世界儿童文学经典作品之一。分为《海蒂的学习和生活
在这本新书《实现模式》里面,KentBeck将自己多年形成的编程习惯以及阅读既有代码的体验凝练成了编程中的价值观、原则和77种实现
《格言联璧》内容简介:本书是清人金缨辑录的一部格言集成。金缨,字兰生,清朝道光、咸丰时人,他遍览群书,凡遇名言佳句便记录下
这本书主要分为五个部分来写,引论、策划、易用度设计、交互网站设计和图形图像的建立。而主要部分为交互网站设计和易用度设计,
C#经典名著!也是Wrox红皮书中最畅销的品种之一,从第一版开始就名满天下;其第3版被中华读书报、CSDN、《程序员》等机构评选为
《虚拟智能体理论与技术》内容简介:本书结合国内外虚拟现实技术的发展潮流,结合作者以往的研究基础,论述了建立智能体的理论、方
《历史文化名城名镇名村系列:沙沟镇》内容简介:本书是一本通俗读物、休闲读物,它不同于一般的学术著作。编者们力图运用通俗易懂
全国英语等级考试词汇必备第二级 本书特色 针对教育部*新颁布的《全国英语等级考试大纲(全新版)》,未来教育在已出版成功的词汇书的基础上,对《全国英语等级考试词汇...
Machinelearningallowscomputationalsystemstoadaptivelyimprovetheirperformancewith...
《金融风险管理(第二版)》内容简介:随着金融自由化、全球化的发展以及层出不穷的金融创新,金融机构所处的风险环境日益复杂,金
《现代数字与模拟通信系统(第4版)(英文版)》是电子工程领域中的理想的通信系统入门教材。作者首先介绍了信号与系统的基础理论和通
《插画教室》内容简介:本书是专业插画设计基础教程。插画创作离不开植物、动物、人物、静物这些元素,本书便从这些元素入手,以几
《转化率(精装版)》内容简介:本书的写作,经历了3个版本,得到了成千上万名读者的好评反馈。本次的精装版,是作者不断总结新时期
《青年管理者》内容简介:企业如何制定发展战略?如何在数字化时代推进战略创新?如何实行组织结构变革和平稳转型?如何系统化推进
《数字设计和计算机体系结构》以一种流行的方式介绍了从计算机组织和设计到更细节层次的内容,涵盖了数字逻辑设计的主要内容,展