SSH, the Secure Shell: the definitive guide
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Beijing [u.a.]
O'Reilly
2005
|
Ausgabe: | 2. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XVIII, 645 S. Ill. |
ISBN: | 9780596008956 0596008953 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV019844499 | ||
003 | DE-604 | ||
005 | 20130614 | ||
007 | t | ||
008 | 050614s2005 a||| |||| 00||| eng d | ||
015 | |a 05,N10,0009 |2 dnb | ||
016 | 7 | |a 973872837 |2 DE-101 | |
020 | |a 9780596008956 |9 978-0-596-00895-6 | ||
020 | |a 0596008953 |c Kt. : EUR 38.00 (freier Pr.) |9 0-596-00895-3 | ||
024 | 3 | |a 9780596008956 | |
035 | |a (OCoLC)60606982 | ||
035 | |a (DE-599)BVBBV019844499 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-29T |a DE-522 |a DE-83 |a DE-11 |a DE-523 | ||
050 | 0 | |a QA76.76.O63 | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
100 | 1 | |a Barrett, Daniel J. |e Verfasser |0 (DE-588)114568847 |4 aut | |
245 | 1 | 0 | |a SSH, the Secure Shell |b the definitive guide |c Daniel J. Barrett, Richard E. Silverman, and Robert G. Byrnes |
250 | |a 2. ed. | ||
264 | 1 | |a Beijing [u.a.] |b O'Reilly |c 2005 | |
300 | |a XVIII, 645 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
630 | 0 | 4 | |a UNIX Shells |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a SSH |0 (DE-588)4628726-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a SSH |0 (DE-588)4628726-7 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Silverman, Richard E. |e Verfasser |4 aut | |
700 | 1 | |a Byrnes, Robert G. |e Verfasser |4 aut | |
856 | 4 | 2 | |m GBV Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013169335&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-013169335 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804133356917489664 |
---|---|
adam_text | SECOND EDITION SSH, THE SECURE SHELL THE DEFINITIVE GUIDE DANIEL J.
BARRETT, RICHARD E. SILVERMAN, AND ROBERT G. BYRNES O REILLY BEIJING *
CAMBRIDGE * FARNHAM * KOELN * PARIS * SEBASTOPOL * TAIPEI * TOKYO TABLE
OF CONTENTS PREFACE XI 1. INTRODUCTION TO SSH 1 1.1 WHATLSSSH? 1 1.2
WHATSSHISNOT 3 1.3 THE SSH PROTOCOL 3 1.4 OVERVIEW OF SSH FEATURES 5 1.5
HISTORYOFSSH 9 1.6 RELATED TECHNOLOGIES 10 1.7 SUMMARY 15 2. BASIC
CLIENT USE 16 2.1 A RUNNING EXAMPLE 16 2.2 REMOTE TERMINAL SESSIONS WITH
SSH 16 2.3 ADDING COMPLEXITY TO THE EXAMPLE 18 2.4 AUTHENTICATION BY
CRYPTOGRAPHIC KEY 21 2.5 THE SSH AGENT 28 2.6 CONNECTING WITHOUT A
PASSWORD OR PASSPHRASE 32 2.7 MISCELLANEOUS CLIENTS 33 2.8 SUMMARY 34 3.
INSIDESSH 36 3.1 OVERVIEW OF FEATURES 36 . 3.2 A CRYPTOGRAPHY PRIMER 39
3.3 THE ARCHITECTURE OF AN SSH SYSTEM 43 3.4 INSIDESSH-2 45 3.5
INSIDESSH-1 68 V 3.6 IMPLEMENTATION ISSUES 69 3.7 SSH AND FILE TRANSFERS
(SCP AND SFTP) 81 3.8 ALGORITHMSUSEDBYSSH 84 3.9 THREATS SSH CAN COUNTER
91 3.10 THREATS SSH DOESN T PREVENT 93 3.11 THREATS CAUSEDBY SSH 97 3.12
SUMMARY 98 4. INSTALLATION AND COMPILE-TIME CONFIGURATION 99 4.1.
OVERVIEW 99 4.2 INSTALLING OPENSSH 106 4.3 INSTALLING TECTIA 111 4.4
SOFTWARE INVENTORY 124 4.5 REPLACING R-COMMANDS WITH SSH 125 4.6 SUMMARY
127 5. SERVERWIDE CONFIGURATION 128 5.1 RUNNING THE SERVER 129 5.2
SERVER CONFIGURATION: AN OVERVIEW 132 5.3 GETTING READY: INITIAL SETUP
141 5.4 AUTHENTICATION: VERIFYING IDENTITIES 171 5.5 ACCESS CONTROL:
LETTING PEOPLE IN 184 5.6 USER LOGINS AND ACCOUNTS 198 5.7 FORWARDING
201 5.8 SUBSYSTEMS 206 5.9 LOGGING AND DEBUGGING 209 5.10 COMPATIBILITY
BETWEEN SSH-1 AND SSH-2 SERVERS 223 5.11 SUMMARY 226 6. KEY MANAGEMENT
AND AGENTS 227 6.1 WHAT IS AN IDENTITY? 227 6.2 CREATING AN IDENTITY 233
6.3 SSH AGENTS 242 6.4 MULTIPLE IDENTITIES 260 6.5 PGP AUTHENTICATION IN
TECTIA 262 6.6 TECTIA EXTERNAL KEYS 264 6.7 SUMMARY 265 VI | TABLE OF
CONTENTS 7. ADVANCED CLIENT USE 266 7.1 HOW TO CONFIGURE CLIENTS 266 7.2
PRECEDENCE 276 7.3 INTRODUCTION TO VERBOSE MODE 277 7.4 CLIENT
CONFIGURATION IN DEPTH 278 7.5 SECURE COPY WITH SCP 313 7.6 SECURE,
INTERACTIVE COPY WITH SFTP 323 7.7 SUMMARY 325 8. PER-ACCOUNT SERVER
CONFIGURATION 326 8.1 LIMITS OF THIS TECHNIQUE 326 8.2 PUBLIC-KEY-BASED
CONFIGURATION 328 8.3 HOSTBASED ACCESS CONTROL 346 8.4 THE USER RC FILE
348 8.5 SUMMARY 348 9. PORT FORWARDING AND X FORWARDING 349 9.1 WHAT IS
FORWARDING? 350 9.2 PORT FORWARDING 351 9.3 DYNAMIC PORT FORWARDING 373
9.4 X FORWARDING 377 9.5 FORWARDING SECURITY: TCP-WRAPPERS AND LIBWRAP
389 9.6 SUMMARY 395 10. A RECOMMENDED SETUP 396 10.1 THE BASICS 396 10.2
COMPILE-TIME CONFIGURATION 397 10.3 SERVERWIDE CONFIGURATION 397 10.4
PER-ACCOUNT CONFIGURATION 403 10.5 KEY MANAGEMENT 404 10.6 CLIENT
CONFIGURATION 404 10.7 REMOTE HOME DIRECTORIES (NFS, AFS) 404 10.8
SUMMARY 407 11. CASESTUDIES 408 11.1 UNATTENDED SSH: BATCH OR CRON JOBS
408 11.2 FTP AND SSH 415 11.3 PINE, IMAP, AND SSH 436 11.4 CONNECTING
THROUGH A GATEWAY HOST 444 TABLE OF CONTENTS | VII 11.5 SCALABLE
AUTHENTICATION FOR SSH 452 11.6 TECTIA EXTENSIONS TO SERVER
CONFIGURATION FILES 468 11.7 TECTIA PLUGINS 479 12. TROUBLESHOOTING AND
FAQ 495 12.1 DEBUG MESSAGES: YOUR FIRST LINE OF DEFENSE 495 12.2
PROBLEMS AND SOLUTIONS 497 12.3 OTHER SSH RESOURCES 513 13. OVERVIEW OF
OTHER IMPLEMENTATIONS 515 13.1 COMMON FEATURES 515 13.2 COVERED PRODUCTS
516 13.3 OTHER SSH PRODUCTS 516 14. OPENSSH FOR WINDOWS 521 14.1
INSTALLATION 521 14.2 USING THE SSH CLIENTS 522 14.3 SETTING UP THE SSH
SERVER 522 14.4 PUBLIC-KEY AUTHENTICATION 524 14.5 TROUBLESHOOTING 525
14.6 SUMMARY 525 15. OPENSSH FOR MACINTOSH 526 15.1 USING THE SSH
CLIENTS 526 15.2 USING THE OPENSSH SERVER 526 16. TECTIA FOR WINDOWS 531
16.1 OBTAINING AND INSTALLING 532 16.2 BASIC CLIENT USE 533 16.3 KEY
MANAGEMENT 534 16.4 ACCESSION LITE 536 16.5 ADVANCED CLIENT USE 539 16.6
PORT FORWARDING 542 16.7 CONNECTOR 543 16.8 FILE TRANSFERS 551 16.9
COMMAND-LINE PROGRAMS 552 16.10 TROUBLESHOOTING 554 16.11 SERVER 555
VIII | TABLE OF CONTENTS 17. SECURECRT AND SECUREFX FOR WINDOWS 563 17.1
OBTAINING AND INSTALLING 563 17.2 BASIC CLIENT USE 564 17.3 KEY
MANAGEMENT 564 17.4 ADVANCED CLIENT USE 568 17.5 FORWARDING 570 17.6
COMMAND-LINE CLIENT PROGRAMS 572 17.7 FILE TRANSFER 572 17.8
TROUBLESHOOTING 574 17.9 VSHELL 574 17.10 SUMMARY 575 18. PUTTY FOR
WINDOWS 576 18.1 OBTAINING AND INSTALLING 576 18.2 BASIC CLIENT USE 576
18.3 FILE TRANSFER 578 18.4 KEY MANAGEMENT 580 18.5 ADVANCED CLIENT USE
583 18.6 FORWARDING 587 18.7 SUMMARY 589 A. OPENSSH 4.0 NEW FEATURES 591
B. TECTIA MANPAGE FOR SSHREGEX 595 C. TECTIA MODULE NAMES FOR DEBUGGING
604 D. SSH-1 FEATURES OF OPENSSH ANDTECTIA 609 E. SSH QUICK REFERENCE
612 INDEX 629 TABLE OF CONTENTS | IX
|
any_adam_object | 1 |
author | Barrett, Daniel J. Silverman, Richard E. Byrnes, Robert G. |
author_GND | (DE-588)114568847 |
author_facet | Barrett, Daniel J. Silverman, Richard E. Byrnes, Robert G. |
author_role | aut aut aut |
author_sort | Barrett, Daniel J. |
author_variant | d j b dj djb r e s re res r g b rg rgb |
building | Verbundindex |
bvnumber | BV019844499 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.76.O63 |
callnumber-search | QA76.76.O63 |
callnumber-sort | QA 276.76 O63 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 200 |
ctrlnum | (OCoLC)60606982 (DE-599)BVBBV019844499 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02052nam a2200529 c 4500</leader><controlfield tag="001">BV019844499</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130614 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">050614s2005 a||| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">05,N10,0009</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">973872837</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780596008956</subfield><subfield code="9">978-0-596-00895-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0596008953</subfield><subfield code="c">Kt. : EUR 38.00 (freier Pr.)</subfield><subfield code="9">0-596-00895-3</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9780596008956</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)60606982</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV019844499</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-523</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.76.O63</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Barrett, Daniel J.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)114568847</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">SSH, the Secure Shell</subfield><subfield code="b">the definitive guide</subfield><subfield code="c">Daniel J. Barrett, Richard E. Silverman, and Robert G. Byrnes</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Beijing [u.a.]</subfield><subfield code="b">O'Reilly</subfield><subfield code="c">2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVIII, 645 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">UNIX Shells</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">SSH</subfield><subfield code="0">(DE-588)4628726-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">SSH</subfield><subfield code="0">(DE-588)4628726-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Silverman, Richard E.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Byrnes, Robert G.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013169335&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-013169335</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV019844499 |
illustrated | Illustrated |
indexdate | 2024-07-09T20:07:25Z |
institution | BVB |
isbn | 9780596008956 0596008953 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-013169335 |
oclc_num | 60606982 |
open_access_boolean | |
owner | DE-29T DE-522 DE-83 DE-11 DE-523 |
owner_facet | DE-29T DE-522 DE-83 DE-11 DE-523 |
physical | XVIII, 645 S. Ill. |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | O'Reilly |
record_format | marc |
spelling | Barrett, Daniel J. Verfasser (DE-588)114568847 aut SSH, the Secure Shell the definitive guide Daniel J. Barrett, Richard E. Silverman, and Robert G. Byrnes 2. ed. Beijing [u.a.] O'Reilly 2005 XVIII, 645 S. Ill. txt rdacontent n rdamedia nc rdacarrier UNIX Shells Computer networks Security measures Data encryption (Computer science) Datensicherung (DE-588)4011144-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf SSH (DE-588)4628726-7 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Datensicherung (DE-588)4011144-1 s SSH (DE-588)4628726-7 s 1\p DE-604 Silverman, Richard E. Verfasser aut Byrnes, Robert G. Verfasser aut GBV Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013169335&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Barrett, Daniel J. Silverman, Richard E. Byrnes, Robert G. SSH, the Secure Shell the definitive guide UNIX Shells Computer networks Security measures Data encryption (Computer science) Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd SSH (DE-588)4628726-7 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4070085-9 (DE-588)4628726-7 |
title | SSH, the Secure Shell the definitive guide |
title_auth | SSH, the Secure Shell the definitive guide |
title_exact_search | SSH, the Secure Shell the definitive guide |
title_full | SSH, the Secure Shell the definitive guide Daniel J. Barrett, Richard E. Silverman, and Robert G. Byrnes |
title_fullStr | SSH, the Secure Shell the definitive guide Daniel J. Barrett, Richard E. Silverman, and Robert G. Byrnes |
title_full_unstemmed | SSH, the Secure Shell the definitive guide Daniel J. Barrett, Richard E. Silverman, and Robert G. Byrnes |
title_short | SSH, the Secure Shell |
title_sort | ssh the secure shell the definitive guide |
title_sub | the definitive guide |
topic | UNIX Shells Computer networks Security measures Data encryption (Computer science) Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd SSH (DE-588)4628726-7 gnd |
topic_facet | UNIX Shells Computer networks Security measures Data encryption (Computer science) Datensicherung Rechnernetz SSH |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013169335&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT barrettdanielj sshthesecureshellthedefinitiveguide AT silvermanricharde sshthesecureshellthedefinitiveguide AT byrnesrobertg sshthesecureshellthedefinitiveguide |