SSH, The Secure Shell
The Definitive Guide
Daniel J. Barrett, Richard E. Silverman
Résumé
Secure your computer network with SSH! With transparent, strong encryption, reliable public-key authentication, and a highly configurable client/server architecture, SSH (Secure Shell) is a popular, robust, TCP/IP-based solution to many network security and privacy concerns. It supports secure remote logins, secure file transfer between computers, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well.
SSH: The Secure Shell: The Definitive Guide covers the Secure Shell in detail for both system administrators and end users. It demystifies the SSH man pages and includes thorough coverage of:
- SSH1, SSH2, OpenSSH, and F-Secure SSH for Unix, plus Windows and Macintosh products: the basics, the internals, and complex applications.
- Configuring SSH servers and clients, both system-wide and per user, with recommended settings to maximize security.
- Advanced key management using agents, agent forwarding, and forced commands.
- Forwarding (tunneling) of TCP and X11 applications in depth, even in the presence of firewalls and network address translation (NAT).
- Undocumented behaviors of popular SSH implementations.
- Installing and maintaining SSH systems.
- Troubleshooting a wide variety of common and not-so-common problems.
Whether you're communicating on a small LAN or across the Internet, SSH can ship your data from "here" to "there" efficiently and securely. So throw away those insecure .rhosts and hosts.equiv files, move up to SSH, and make your network a safe place to live and work.
Table of Contents
Preface
1. Introduction to SSH
What Is SSH?
What SSH Is Not
The SSH Protocol
Overview of SSH Features
History of SSH
Related Technologies
Summary
2. Basic Client Use
A Running Example
Remote Terminal Sessions with
ssh
Adding Complexity to the
Example
Authentication by Cryptographic
Key
The SSH Agent
Connecting Without a Password or
Passphrase
Miscellaneous Clients
Summary
3. Inside SSH
Overview of Features
A Cryptography Primer
The Architecture of an SSH
System
Inside SSH-1
Inside SSH-2
As-User Access (userfile)
Randomness
SSH and File Transfers (scp and
sftp)
Algorithms Used by SSH
Threats SSH Can Counter
Threats SSH Doesn't Prevent
Summary
4. Installation and Compile-Time
Configuration
SSH1 and SSH2
F-Secure SSH Server
OpenSSH
Software Inventory
Replacing R-Commands with SSH
Summary
5. Serverwide Configuration
The Name of the Server
Running the Server
Server Configuration: An
Overview
Getting Ready: Initial Setup
Letting People in: Authentication and
Access Control
User Logins and Accounts
Subsystems
History, Logging, and Debugging
Compatibility Between SSH-1 and SSH-2
Servers
Summary
6. Key Management and Agents
What Is an Identity?
Creating an Identity
SSH Agents
Multiple Identities
Summary
7. Advanced Client Use
How to Configure Clients
Precedence
Introduction to Verbose Mode
Client Configuration in Depth
Secure Copy with scp
Summary
8. Per-Account Server Configuration
Limits of This Technique
Public Key-Based Configuration
Trusted-Host Access Control
The User rc File
Summary
9. Port Forwarding and X Forwarding
What Is Forwarding?
Port Forwarding
X Forwarding
Forwarding Security: TCP-wrappers and
libwrap
Summary
10. A Recommended Setup
The Basics
Compile-Time Configuration
Serverwide Configuration
Per-Account Configuration
Key Management
Client Configuration
Remote Home Directories (NFS,
AFS)
Summary
11. Case Studies
Unattended SSH: Batch or cron
Jobs
FTP Forwarding
Pine, IMAP, and SSH
Kerberos and SSH
Connecting Through a Gateway Host
12. Troubleshooting and FAQ
Debug Messages: Your First Line of
Defense
Problems and Solutions
Other SSH Resources
Reporting Bugs
13. Overview of Other Implementations
Common Features
Covered Products
Table of Products
Other SSH-Related Products
14. SSH1 Port by Sergey Okhapkin (Windows)
Obtaining and Installing
Clients
Client Use
Obtaining and Installing the
Server
Troubleshooting
Summary
15. SecureCRT (Windows)
Obtaining and Installing
Basic Client Use
Key Management
Advanced Client Use
Forwarding
Troubleshooting
Summary
16. F-Secure SSH Client (Windows,
Macintosh)
Obtaining and Installing
Basic Client Use
Key Management
Advanced Client Use
Forwarding
Troubleshooting
Summary
17. NiftyTelnet SSH (Macintosh)
Obtaining and Installing
Basic Client Use
Troubleshooting
Summary
A. SSH2 Manpage for sshregex
B. SSH Quick Reference
Index
L'auteur - Daniel J. Barrett
Auteur et co-auteur de plusieurs ouvrages parus aux éditions O'Reilly (Linux Pocket Guide, Linux Security Cookbook, SSH, The Secure Shell : The Definitive Guide), Daniel Barrett est passionné des technologies Internet depuis près de 25 ans. Aujourd'hui ingénieur, il a aussi été administrateur système, professeur d'université, web designer, chanteur de heavy metal et humoriste.
L'auteur - Richard E. Silverman
Richard E. Silverman first touched a computer as a
college junior in 1986, when he logged into a DEC-20, typed
"MM" to send some mail,
and was promptly lost to the world. He eventually
resurfaced and discovered he had a career, which was
convenient but somewhat
disorienting, since he hadn't really been looking for one.
Since earning his B.A. in computer science and M.A. in pure
mathematics, Richard has
worked in the fields of networking, formal methods in
software development, public-key infrastructure, routing
security, and Unix systems
administration. Outside of work, he loves to read, study
languages and mathematics, sing, dance, and exercise.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | O'Reilly |
Auteur(s) | Daniel J. Barrett, Richard E. Silverman |
Parution | 15/03/2001 |
Nb. de pages | 558 |
Format | 17 x 23 |
Couverture | Broché |
Intérieur | Noir et Blanc |
EAN13 | 9780596000110 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet