Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
SSH, The Secure Shell
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

SSH, The Secure Shell

SSH, The Secure Shell

The Definitive Guide

Daniel J. Barrett, Richard E. Silverman

558 pages, parution le 15/03/2001

Résumé

Secure your computer network with SSH! With transparent, strong encryption, reliable public-key authentication, and a highly configurable client/server architecture, SSH (Secure Shell) is a popular, robust, TCP/IP-based solution to many network security and privacy concerns. It supports secure remote logins, secure file transfer between computers, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well.

SSH: The Secure Shell: The Definitive Guide covers the Secure Shell in detail for both system administrators and end users. It demystifies the SSH man pages and includes thorough coverage of:

  • SSH1, SSH2, OpenSSH, and F-Secure SSH for Unix, plus Windows and Macintosh products: the basics, the internals, and complex applications.
  • Configuring SSH servers and clients, both system-wide and per user, with recommended settings to maximize security.
  • Advanced key management using agents, agent forwarding, and forced commands.
  • Forwarding (tunneling) of TCP and X11 applications in depth, even in the presence of firewalls and network address translation (NAT).
  • Undocumented behaviors of popular SSH implementations.
  • Installing and maintaining SSH systems.
  • Troubleshooting a wide variety of common and not-so-common problems.

Whether you're communicating on a small LAN or across the Internet, SSH can ship your data from "here" to "there" efficiently and securely. So throw away those insecure .rhosts and hosts.equiv files, move up to SSH, and make your network a safe place to live and work.

Table of Contents

Preface

1. Introduction to SSH
      What Is SSH?
      What SSH Is Not
      The SSH Protocol
      Overview of SSH Features
      History of SSH
      Related Technologies
      Summary

2. Basic Client Use
      A Running Example
      Remote Terminal Sessions with ssh
      Adding Complexity to the Example
      Authentication by Cryptographic Key
      The SSH Agent
      Connecting Without a Password or Passphrase
      Miscellaneous Clients
      Summary

3. Inside SSH
      Overview of Features
      A Cryptography Primer
      The Architecture of an SSH System
      Inside SSH-1
      Inside SSH-2
      As-User Access (userfile)
      Randomness
      SSH and File Transfers (scp and sftp)
      Algorithms Used by SSH
      Threats SSH Can Counter
      Threats SSH Doesn't Prevent
      Summary

4. Installation and Compile-Time Configuration
      SSH1 and SSH2
      F-Secure SSH Server
      OpenSSH
      Software Inventory
      Replacing R-Commands with SSH
      Summary

5. Serverwide Configuration
      The Name of the Server
      Running the Server
      Server Configuration: An Overview
      Getting Ready: Initial Setup
      Letting People in: Authentication and Access Control
      User Logins and Accounts
      Subsystems
      History, Logging, and Debugging
      Compatibility Between SSH-1 and SSH-2 Servers
      Summary

6. Key Management and Agents
      What Is an Identity?
      Creating an Identity
      SSH Agents
      Multiple Identities
      Summary

7. Advanced Client Use
      How to Configure Clients
      Precedence
      Introduction to Verbose Mode
      Client Configuration in Depth
      Secure Copy with scp
      Summary

8. Per-Account Server Configuration
      Limits of This Technique
      Public Key-Based Configuration
      Trusted-Host Access Control
      The User rc File
      Summary

9. Port Forwarding and X Forwarding
      What Is Forwarding?
      Port Forwarding
      X Forwarding
      Forwarding Security: TCP-wrappers and libwrap
      Summary

10. A Recommended Setup
      The Basics
      Compile-Time Configuration
      Serverwide Configuration
      Per-Account Configuration
      Key Management
      Client Configuration
      Remote Home Directories (NFS, AFS)
      Summary

11. Case Studies
      Unattended SSH: Batch or cron Jobs
      FTP Forwarding
      Pine, IMAP, and SSH
      Kerberos and SSH
      Connecting Through a Gateway Host

12. Troubleshooting and FAQ
      Debug Messages: Your First Line of Defense
      Problems and Solutions
      Other SSH Resources
      Reporting Bugs

13. Overview of Other Implementations
      Common Features
      Covered Products
      Table of Products
      Other SSH-Related Products

14. SSH1 Port by Sergey Okhapkin (Windows)
      Obtaining and Installing Clients
      Client Use
      Obtaining and Installing the Server
      Troubleshooting
      Summary

15. SecureCRT (Windows)
      Obtaining and Installing
      Basic Client Use
      Key Management
      Advanced Client Use
      Forwarding
      Troubleshooting
      Summary

16. F-Secure SSH Client (Windows, Macintosh)
      Obtaining and Installing
      Basic Client Use
      Key Management
      Advanced Client Use
      Forwarding
      Troubleshooting
      Summary

17. NiftyTelnet SSH (Macintosh)
      Obtaining and Installing
      Basic Client Use
      Troubleshooting
      Summary

A. SSH2 Manpage for sshregex

B. SSH Quick Reference

Index

L'auteur - Daniel J. Barrett

Auteur et co-auteur de plusieurs ouvrages parus aux éditions O'Reilly (Linux Pocket Guide, Linux Security Cookbook, SSH, The Secure Shell : The Definitive Guide), Daniel Barrett est passionné des technologies Internet depuis près de 25 ans. Aujourd'hui ingénieur, il a aussi été administrateur système, professeur d'université, web designer, chanteur de heavy metal et humoriste.

L'auteur - Richard E. Silverman

Richard E. Silverman first touched a computer as a college junior in 1986, when he logged into a DEC-20, typed "MM" to send some mail,
and was promptly lost to the world. He eventually resurfaced and discovered he had a career, which was convenient but somewhat
disorienting, since he hadn't really been looking for one. Since earning his B.A. in computer science and M.A. in pure mathematics, Richard has
worked in the fields of networking, formal methods in software development, public-key infrastructure, routing security, and Unix systems
administration. Outside of work, he loves to read, study languages and mathematics, sing, dance, and exercise.

Caractéristiques techniques

  PAPIER
Éditeur(s) O'Reilly
Auteur(s) Daniel J. Barrett, Richard E. Silverman
Parution 15/03/2001
Nb. de pages 558
Format 17 x 23
Couverture Broché
Intérieur Noir et Blanc
EAN13 9780596000110

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription