Авторизация
Поиск по указателям
Barrett D.J., Silverman R., Byrnes R.G. — SSH, The Secure Shell: The Definitive Guide
Обсудите книгу на научном форуме
Нашли опечатку? Выделите ее мышкой и нажмите Ctrl+Enter
Название: SSH, The Secure Shell: The Definitive Guide
Авторы: Barrett D.J., Silverman R., Byrnes R.G.
Аннотация: Secure your computer network with SSH! With end-to-end strong encryption, reliable public-key authentication, and a highly configurable client/server architecture, SSH (Secure Shell) is a popular, robust, TCP/IP-based solution to many network security and privacy concerns. It supports secure remote logins, secure file transfer between computers, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well.
SSH, The Secure Shell: The Definitive Guide covers the Secure Shell in detail for both system administrators and end users. It demystifies the SSH man pages and includes thorough coverage of:
* Basic to advanced use of SSH client tools for Unix, Windows, and Macintosh.
* Installing, configuring, and maintaining SSH (with special tips for large data centers).
* The three levels of SSH server control: compile-time and server-wide configuration for administators, and per-account configuration for end users.
* Application tunneling, port and agent forwarding, and forced commands.
* Undocumented features of popular SSH implementations.
* Detailed case studies of creating complex applications with SSH.
* Troubleshooting a wide variety of common and not-so-common problems.
Whether you're communicating on a small LAN or across the Internet, SSH can ship your data from "here" to "there" efficiently and securely. So throw away those insecure .rhosts and hosts.equiv files, move up to SSH, and make your network a safe place to live and work.
Язык:
Рубрика: Руководства по программному обеспечению /
Статус предметного указателя: Готов указатель с номерами страниц
ed2k: ed2k stats
Издание: 2nd edition
Год издания: 2005
Количество страниц: 645
Добавлена в каталог: 14.10.2007
Операции: Положить на полку |
Скопировать ссылку для форума | Скопировать ID
Предметный указатель
"none" encryption
$HOME environment variable
-- (double dash)
3DES
AAA (authentication, authorization, and accounting)
AcceptEnv keyword
Accession Lite
Accession Lite, Enable Key Compatibility
account access control
account permissions and security
active-mode (FTP)
Address Space Layout Randomization (ASLR)
AddressFamily keyword 2nd 3rd
addressing, single name, multiple address issue
AES (Advanced Encryption Standard)
AFS (Andrew File system)
agents 2nd 3rd
agents, access control
agents, agent forwarding 2nd 3rd
agents, agent forwarding, connections in series
agents, agent forwarding, enabling
agents, agent forwarding, firewall example
agents, agent forwarding, operation
agents, agent forwarding, server configuration
agents, authentication agents
agents, automatic loading
agents, automatic loading, single-shell method
agents, automatic loading, subshell method
agents, automatic loading, X Windows
agents, automation and
agents, client identification
agents, cpu usage
agents, debugging (OpenSSH)
agents, double-remote copying with scp
agents, environment variable command format
agents, identities, listing and deleting
agents, invocation, login accounts
agents, keys
agents, keys, listing
agents, keys, loading 2nd
agents, locking and unlocking 2nd
agents, protected memory
agents, security aspects
agents, security aspects, agent cracking
agents, single-shell invocation
agents, subshell invocation
agents, switching identities
agents, troubleshooting
allow-from keyword 2nd
AllowAgentForwarding keyword (Tectia)
AllowedAuthentications keyword (Tectia)
AllowedAuthentications keyword (Tectia), gssapi
AllowedAuthentications keyword (Tectia), hostbased
AllowedAuthentications keyword (Tectia), keyboard interactive
AllowGroups keyword 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
AllowHosts keyword 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th
AllowSHosts keyword 2nd 3rd 4th 5th
AllowTcpForwarding keyword 2nd 3rd 4th 5th 6th 7th 8th
AllowTcpForwardingForGroups keyword 2nd 3rd 4th
AllowTcpForwardingForUsers keyword 2nd 3rd 4th 5th
AllowUsers keyword
AllowUsers keyword, pattern matching
AllowX11Forwarding keyword 2nd 3rd 4th
ASLR (Address Space Layout Randomization)
asymmetric cryptography
Attacks
attacks, agent cracking
attacks, brute-force attacks
attacks, connection hijacking
attacks, covert channels
attacks, dictionary attack
attacks, eavesdropping
attacks, IP attacks
attacks, IP spoofing
attacks, keystroke timing data and potential attacks
attacks, man-in-the-middle attacks 2nd
attacks, name service spoofing
attacks, password cracking
attacks, replay attacks
attacks, TCP attacks
attacks, traffic analysis
attacks, user or administrator carelessness and
Authentication 2nd
authentication, authorization in hostbased authentication (SSH)
authentication, failure messages
authentication, passwordless
authentication, per-account configuration and
authentication, scalability case study
authentication, SecurID hardware-based authentication
authentication, ssh (client) configuration
authentication, troubleshooting
AuthenticationNotify keyword 2nd 3rd
AuthenticationSuccessMsg keyword 2nd 3rd
AuthInteractiveFailureTimeout keyword (Tectia) 2nd
AuthKbdInt.NumOptional keyword (Tectia)
AuthKbdInt.Optional keyword 2nd 3rd 4th
AuthKbdInt.Plugin keyword 2nd 3rd 4th 5th 6th
AuthKbdInt.RADIUS.NASIdentifier keyword
AuthKbdInt.RADIUS.Server keyword
AuthKbdInt.Required keyword 2nd 3rd 4th
AuthKbdInt.Retries keyword (Tectia)
Authorization
authorization files, server accounts
AuthorizationFile keyword 2nd 3rd 4th
AuthorizedKeysFile keyword 2nd
authorized_keys 2nd
AuthPassword.ChangePlugin keyword 2nd 3rd 4th
AuthPublicKey.MinSize and MaxSize keywords (Tectia)
Autoconf
Axessh
BAMSE
Banner keyword (OpenSSH)
BannerMessageFile keyword (Tectia)
Bastion host
batch jobs
batch jobs, hostbased authentication
batch jobs, Kerberos authentication
batch jobs, password authentication
batch jobs, public-key authentication
batch jobs, public-key authentication, agents
batch jobs, public-key authentication, filesystem passphrase storage
batch jobs, public-key authentication, plaintext keys
batch jobs, security precautions
batch jobs, security precautions, least-privilege accounts
batch jobs, security precautions, locked-down automation accounts
batch jobs, security precautions, restricted-use keys
batch jobs, security precautions, ssh options
BatchMode keyword 2nd 3rd 4th
BeOS SSH implementations
binary distributions
binary packet protocol
BindAddress keyword 2nd
Blowfish
bogus ICMP attacks
boot versus manual invocation
brute-force attacks
bulk keys or bulk ciphers
bzip2 and bunzip2
cancel-tcpip-forward request
case studies
case studies, authentication
case studies, FTP
case studies, gateway hosts, connecting through
case studies, Pine email client
Cast
Cert.DODPKI keyword
Cert.EndpointIdentityCheck keyword
Cert.RSA.Compat.HashScheme keyword 2nd 3rd
CertdListenerPath keyword 2nd
certificate authorities
challenge/response authentication
ChallengeResponseAuthentication keyword 2nd
Channels 2nd
channels, channel numbers
channels, channel requests
CheckHostIP keyword 2nd
CheckMail keyword (Tectia)
ChRootGroups keyword 2nd 3rd
ChRootUsers keyword 2nd 3rd
Cipher keyword 2nd 3rd 4th
ciphers
Ciphers keyword 2nd 3rd 4th 5th 6th 7th 8th
ClearAllForwardings keyword 2nd 3rd
client configuration
client configuration, debugging messages
client configuration, setup recommendations
client configuration, troubleshooting
ClientAliveCountMax keyword 2nd
ClientAliveInterval keyword 2nd 3rd
Command keyword
Commodore Amiga SSH implementations
compression algorithms
Compression keyword 2nd 3rd 4th 5th 6th 7th 8th 9th
CompressionLevel keyword 2nd
Configuration
configuration, "none" encryption
configuration, compile-time configuration
configuration, configuration files
configuration, configure script
configuration, configure script, command-line flags
configuration, configure script, options
configuration, configure script, pathname embedding versus PATH variable
configuration, make command
connection hijacking
ConnectionAttempts keyword
Connector
ConnectTimeout keyword 2nd
control connections (FTP)
control connections (FTP), forwarding
control connections (FTP), forwarding, choosing the target
ControlMaster keyword 2nd 3rd
ControlPath keyword 2nd 3rd
covert channels
CRC (Cyclic Redundancy Check) hash
CRC-32 (Cyclic Redundancy Check)
Cryptanalysis
Cryptography
cryptography, hash functions
cryptography, public-key cryptography
cryptography, secret-key cryptography
cryptography, security
CVS (Concurrent Versions System)
Cyclic Redundancy Check (CRC-32)
Cygwin
data connections (FTP)
Data Encryption Standard (DES)
Debugging
debugging, messages
debugging, serverwide configuration
debugging, serverwide configuration, syslog files
DebugLogFile keyword
default identity
DefaultDomain keyword
deny-from keyword 2nd
DenyGroups
DenyGroups keyword 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
DenyHosts keyword 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
DenySHosts keyword 2nd 3rd 4th 5th
DenyTcpForwardingForGroups keyword 2nd 3rd 4th
DenyTcpForwardingForUsers keyword 2nd 3rd 4th
DenyUsers keyword
DenyUsers keyword, pattern matching
DES (Data Encryption Standard)
dictionary attack
Diffie-Hellman key agreement algorithm
Digital certificates
Digital Signature Algorithm (DSA)
Digital signatures
DisableVersionFallback keyword 2nd 3rd
Display
DNS (Domain Name Service)
DontReadStdin keyword 2nd
DropBear
DSA (Digital Signature Algorithm)
dynamic port forwarding
DynamicForward keyword 2nd
eavesdropping
Egrep, sshregex (Tectia)
Egrep, sshregex (Tectia), character sets
Egrep, sshregex (Tectia), escaped tokens
EkInitString keyword 2nd
EkProvider keyword 2nd
EnableSSHKeysign keyword 2nd 3rd
Encryption 2nd
encryption, algorithms
encryption, algorithms, ssh (client)
encryption, programs
env channel request
Environment variables
environment variables, agents and
environment variables, per-account settings
environment variables, ssh (client)
Ericom PowerTerm
escape characters and sequences
EscapeChar keyword 2nd 3rd 4th
exec channel request
Expect
ExternalAuthorizationProgram keyword 2nd 3rd
F-Secure SSH
file transfers
file transfers, sftp
filesystems, recommended settings
Firewalls 2nd
firewalls, FTP passive mode and
firewalls, port forwarding, bypassing with
forced commands 2nd
forced commands, command menu, displaying
forced commands, logging
forced commands, rejecting connections
forced commands, scp and
forced commands, security concerns
forced commands, SSH_ORIGINAL_COMMAND environment variable
ForcePTTYAllocation keyword 2nd
ForwardACL keyword 2nd 3rd 4th 5th 6th
ForwardAgent keyword
Forwarding 2nd
forwarding, limiting or disabling per-account
ForwardX11 keyword 2nd 3rd 4th 5th 6th
ForwardX11Trusted keyword 2nd
Friedl, Markus
ftp (file transfer protocol) 2nd
FTP, case study
FTP, case study, control connection forwarding
FTP, case study, static port forwarding
FTP, case study, Tectia client
FTP, case study, VanDyke's SecureFX tool
FTP, data connections, forwarding through SSH
FTP, default data port mode
FTP, default data port mode, TCP protocol and
FTP, NAT and
FTP, passive mode 2nd
FTP, passive mode, firewalls and
FTP, passive mode, PASV port theft problem
FTP, SSL-enhanced
FTP, troubleshooting
FTP, typical data transfer mode
gateway hosts
gateway hosts, case study
gateway hosts, case study, port forwarding (SSH-in-SSH)
gateway hosts, case study, scp
Реклама