SSH, The Secure Shell: The Definitive Guide, 2/e (Paperback)

Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes

  • 出版商: O'Reilly
  • 出版日期: 2005-06-14
  • 定價: $1,575
  • 售價: 9.5$1,496
  • 貴賓價: 9.0$1,418
  • 語言: 英文
  • 頁數: 670
  • 裝訂: Paperback
  • ISBN: 0596008953
  • ISBN-13: 9780596008956
  • 相關分類: 資訊安全
  • 立即出貨(限量) (庫存=3)

買這商品的人也買了...

相關主題

商品描述

Description:

Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively.

Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide. This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution.

How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration.

Written for a wide, technical audience, SSH, The Secure Shell: The Definitive Guide covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks.

No matter where or how you're shipping information, SSH, The Secure Shell: The Definitive Guide will show you how to do it securely.

 

Table of Contents:

Preface

1. Introduction to SSH

      1.1 What Is SSH?

      1.2 What SSH Is Not

      1.3 The SSH Protocol
      1.4 Overview of SSH Features

      1.5 History of SSH

      1.6 Related Technologies

      1.7 Summary

2. Basic Client Use

      2.1 A Running Example

      2.2 Remote Terminal Sessions with ssh

      2.3 Adding Complexity to the Example

      2.4 Authentication by Cryptographic Key

      2.5 The SSH Agent

      2.6 Connecting Without a Password or Passphrase

      2.7 Miscellaneous Clients

      2.8 Summary

3. Inside SSH

      3.1 Overview of Features

      3.2 A Cryptography Primer

      3.3 The Architecture of an SSH System

      3.4 Inside SSH-2

      3.5 Inside SSH-1

      3.6 Implementation Issues

      3.7 SSH and File Transfers (scp and sftp)

      3.8 Algorithms Used by SSH

      3.9 Threats SSH Can Counter

      3.10 Threats SSH Doesn't Prevent

      3.11 Threats Caused by SSH

      3.12 Summary

4. Installation and Compile-Time Configuration

         4.1. Overview

      4.2 Installing OpenSSH

      4.3 Installing Tectia

      4.4 Software Inventory

      4.5 Replacing r-Commands with SSH

      4.6 Summary

5. Serverwide Configuration

      5.1 Running the Server

      5.2 Server Configuration: An Overview

      5.3 Getting Ready: Initial Setup

      5.4 Authentication: Verifying Identities

      5.5 Access Control: Letting People In

      5.6 User Logins and Accounts

      5.7 Forwarding

      5.8 Subsystems

      5.9 Logging and Debugging

      5.10 Compatibility Between SSH-1 and SSH-2 Servers

      5.11 Summary

6. Key Management and Agents

      6.1 What Is an Identity?

      6.2 Creating an Identity

      6.3 SSH Agents

      6.4 Multiple Identities

      6.5 PGP Authentication in Tectia

      6.6 Tectia External Keys

      6.7 Summary

7. Advanced Client Use

      7.1 How to Configure Clients

      7.2 Precedence

      7.3 Introduction to Verbose Mode

      7.4 Client Configuration in Depth

      7.5 Secure Copy with scp

      7.6 Secure, Interactive Copy with sftp

      7.7 Summary

8. Per-Account Server Configuration

      8.1 Limits of This Technique

      8.2 Public-Key-Based Configuration

      8.3 Hostbased Access Control

      8.4 The User rc File

      8.5 Summary

9. Port Forwarding and X Forwarding

      9.1 What Is Forwarding?

      9.2 Port Forwarding

      9.3 Dynamic Port Forwarding

      9.4 X Forwarding

      9.5 Forwarding Security: TCP-wrappers and libwrap

      9.6 Summary

10. A Recommended Setup

      10.1 The Basics

      10.2 Compile-Time Configuration

      10.3 Serverwide Configuration

      10.4 Per-Account Configuration

      10.5 Key Management

      10.6 Client Configuration

      10.7 Remote Home Directories (NFS, AFS)

      10.8 Summary

11. Case Studies

      11.1 Unattended SSH: Batch or cron Jobs

      11.2 FTP and SSH

      11.3 Pine, IMAP, and SSH

      11.4 Connecting Through a Gateway Host

      11.5 Scalable Authentication for SSH

      11.6 Tectia Extensions to Server Configuration Files

      11.7 Tectia Plugins

12. Troubleshooting and FAQ

      12.1 Debug Messages: Your First Line of Defense

      12.2 Problems and Solutions

      12.3 Other SSH Resources

13. Overview of Other Implementations

      13.1 Common Features

      13.2 Covered Products

      13.3 Other SSH Products

14. OpenSSH for Windows

      14.1 Installation

      14.2 Using the SSH Clients

      14.3 Setting Up the SSH Server

      14.4 Public-Key Authentication

      14.5 Troubleshooting

      14.6 Summary

15. OpenSSH for Macintosh

      15.1 Using the SSH Clients

      15.2 Using the OpenSSH Server

16. Tectia for Windows

      16.1 Obtaining and Installing

      16.2 Basic Client Use

      16.3 Key Management

      16.4 Accession Lite

      16.5 Advanced Client Use

      16.6 Port Forwarding

      16.7 Connector

      16.8 File Transfers

      16.9 Command-Line Programs

      16.10 Troubleshooting

      16.11 Server

17. SecureCRT and SecureFX for Windows

      17.1 Obtaining and Installing

      17.2 Basic Client Use

      17.3 Key Management

      17.4 Advanced Client Use

      17.5 Forwarding

      17.6 Command-Line Client Programs

      17.7 File Transfer

      17.8 Troubleshooting

      17.9 VShell

      17.10 Summary

18. PuTTY for Windows

      18.1 Obtaining and Installing

      18.2 Basic Client Use

      18.3 File Transfer

      18.4 Key Management

      18.5 Advanced Client Use

      18.6 Forwarding

      18.7 Summary

A. OpenSSH 4.0 New Features

B. Tectia Manpage for sshregex

C. Tectia Module Names for Debugging

D. SSH-1 Features of OpenSSH and Tectia

E. SSH Quick Reference

Index

商品描述(中文翻譯)

描述:



你對網絡安全很認真嗎?那麼請看看SSH(Secure Shell),它提供基於密鑰的身份驗證和透明加密,用於網絡連接。它可靠、強大,並且相對容易使用,且大多數操作系統都有免費和商業實現。雖然它不能解決所有隱私和安全問題,但SSH能夠非常有效地消除其中幾個。

關於SSH的一切都在我們的第二版《SSH,安全外殼:權威指南》中。這本更新的書籍全面介紹了最新的SSH-2協議,適用於系統管理員和終端用戶,他們有興趣使用這種越來越受歡迎的基於TCP/IP的解決方案。

它是如何工作的?每當數據被發送到網絡時,SSH會自動對其進行加密。當數據到達目標接收者時,SSH會對其進行解密。結果是“透明”的加密-用戶可以正常工作,而不知道他們的通信已經被加密。SSH支持計算機之間的安全文件傳輸,安全的遠程登錄,以及一種獨特的“隧道”功能,可以為本來不安全的網絡應用程序添加加密。使用SSH,用戶可以自由瀏覽互聯網,系統管理員可以保護他們的網絡或進行遠程管理。

《SSH,安全外殼:權威指南》針對廣泛的技術讀者,涵蓋了不同操作系統和計算環境下的幾種SSH實現。無論你是在家中運行Linux機器的個人,還是擁有數千個用戶的企業網絡管理員,或者只是想要一種安全的telnet或文件傳輸方式的PC/Mac用戶,我們不可或缺的指南都能滿足你的需求。它從簡單的安裝和使用SSH開始,並逐步深入研究大型敏感計算機網絡的案例研究。

無論你在哪裡或如何傳輸信息,《SSH,安全外殼:權威指南》都將向你展示如何安全地進行操作。



 

目錄:


前言


1. SSH簡介

      1.1 什麼是SSH?

      1.2 SSH不是什麼

   
  1.3 SSH協議
      1.4 SSH功能概述

      1.5 SSH的歷史

   
  1.6 相關技術

      1.7 摘要


2. 基本客戶端使用

      2.1 一個運行示例

      2.2 使用ssh進行遠程終端會話

      2.3 為示例添加複雜性


      2.4 通過密鑰進行身份驗證

 
    2.5 SSH代理

      2.6
無需密碼或密語的連接

      2.7
其他客戶端

      2.8 摘要


3. SSH內部結構

      3.1 功能概述

      3.2 密碼學基礎知識

 
    3.3 SSH系統的架構

      3.4 SSH-2內部結構

      3.5 SSH-1內部結構


  ```