Ssh, the Secure Shell: The Definitive Guide

by ;
Format: Paperback
Pub. Date: 2001-02-01
Publisher(s): Oreilly & Associates Inc
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $41.95

Rent Book

Select for Price
There was a problem. Please try again later.

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

eBook

We're Sorry
Not Available

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

SSH (Secure Shell) is a popular, robust, TCP/IP-based product for network security and privacy, supporting strong encryption and authentication. This book covers Unix, Windows, and Macintosh implementations of SSH. It shows both system administrators and end users how to install, maintain, and troubleshoot SSH; configure servers and clients in simple and complex ways; apply SSH to practical problems; and protect other TCP applications through forwarding (tunneling).

Table of Contents

Preface ix
Introduction to SSH
1(18)
What Is SSH?
2(1)
What SSH Is Not
2(2)
The SSH Protocol
4(1)
Overview of SSH Features
5(5)
History of SSH
10(2)
Related Technologies
12(6)
Summary
18(1)
Basic Client Use
19(22)
A Running Example
19(1)
Remote Terminal Sessions with ssh
20(2)
Adding Complexity to the Example
22(4)
Authentication by Cryptographic Key
26(6)
The SSH Agent
32(5)
Connecting Without a Password or Passphrase
37(1)
Miscellaneous Clients
38(2)
Summary
40(1)
Inside SSH
41(67)
Overview of Features
42(3)
A Cryptography Primer
45(4)
The Architecture of an SSH System
49(3)
Inside SSH-1
52(20)
Inside SSH-2
72(13)
As-User Access (userfile)
85(1)
Randomness
86(2)
SSH and File Transfers (scp and sftp)
88(3)
Algorithms Used by SSH
91(9)
Threats SSH Can Counter
100(3)
Threats SSH Doesn't Prevent
103(4)
Summary
107(1)
Installation and Compile-Time Configuration
108(31)
SSH1 and SSH2
108(21)
F-Secure SSH Server
129(1)
OpenSSH
130(4)
Software Inventory
134(1)
Replacing R-Commands with SSH
135(3)
Summary
138(1)
Serverwide Configuration
139(65)
The Name of the Server
140(1)
Running the Server
141(2)
Server Configuration: An Overview
143(5)
Getting Ready: Initial Setup
148(18)
Letting People in: Authentication and Access Control
166(21)
User Logins and Accounts
187(3)
Subsystems
190(2)
History, Logging, and Debugging
192(9)
Compatibility Between SSH-1 and SSH-2 Servers
201(2)
Summary
203(1)
Key Management and Agents
204(36)
What Is an Identity?
205(4)
Creating an Identity
209(7)
SSH Agents
216(19)
Multiple Identities
235(3)
Summary
238(2)
Advanced Client Use
240(53)
How to Configure Clients
240(10)
Precedence
250(1)
Introduction to Verbose Mode
251(1)
Client Configuration in Depth
252(32)
Secure Copy with scp
284(8)
Summary
292(1)
Per-Account Server Configuration
293(23)
Limits of This Technique
294(1)
Public Key-Based Configuration
295(18)
Trusted-Host Access Control
313(2)
The User rc File
315(1)
Summary
315(1)
Port Forwarding and X Forwarding
316(44)
What Is Forwarding?
317(1)
Port Forwarding
318(22)
X Forwarding
340(13)
Forwarding Security: TCP-wrappers and libwrap
353(6)
Summary
359(1)
A Recommended Setup
360(12)
The Basics
360(1)
Compile-Time Configuration
361(1)
Serverwide Configuration
362(4)
Per-Account Configuration
366(1)
Key Management
367(1)
Client Configuration
367(1)
Remote Home Directories (NFS, AFS)
368(3)
Summary
371(1)
Case Studies
372(65)
Unattended SSH: Batch or cron Jobs
372(7)
FTP Forwarding
379(21)
Pine, IMAP, and SSH
400(8)
Kerberos and SSH
408(20)
Connecting Through a GatewayHost
428(9)
Troubleshooting and FAQ
437(24)
Debug Messages: Your First Line of Defense
437(3)
Problems and Solutions
440(19)
Other SSH Resources
459(1)
Reporting Bugs
460(1)
Overview of Other Implementations
461(10)
Common Features
461(1)
Covered Products
462(1)
Table of Products
462(8)
Other SSH-Related Products
470(1)
SSH 1 Port by Sergey Okhapkin (Windows)
471(9)
Obtaining and Installing Clients
471(4)
Client Use
475(1)
Obtaining and Installing the Server
476(2)
Troubleshooting
478(1)
Summary
479(1)
SecureCRT (Windows)
480(8)
Obtaining and Installing
480(1)
Basic Client Use
481(1)
Key Management
482(1)
Advanced Client Use
483(1)
Forwarding
484(2)
Troubleshooting
486(1)
Summary
487(1)
F-Secure SSH Client (Windows, Macintosh)
488(10)
Obtaining and Installing
488(1)
Basic Client Use
489(1)
Key Management
490(1)
Advanced Client Use
491(2)
Forwarding
493(2)
Troubleshooting
495(2)
Summary
497(1)
NiftyTelnet SSH (Macintosh)
498(5)
Obtaining and Installing
498(1)
Basic Client Use
499(2)
Troubleshooting
501(1)
Summary
502(1)
A. SSH2 Manpage for sshregex 503(3)
B. SSH Quick Reference 506(15)
Index 521

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.