O'Reilly.SSH.the.Secure.Shell.The.Definitive.Guide.pdf
(
9978 KB
)
Pobierz
,TITLE.16235
,TITLE.16235 Page 1 Tuesday, March 13, 2001 3:33 PM
SSH, the Secure Shell
The Definitive Guide
,TITLE.16235 Page 2 Tuesday, March 13, 2001 3:33 PM
,TITLE.16235 Page 3 Tuesday, March 13, 2001 3:33 PM
SSH, the Secure Shell
The Definitive Guide
Daniel J. Barrett and Richard E. Silverman
Beijing
•
Cambridge
•
Farnham
•
Köln
•
Paris
•
Sebastopol
•
Taipei
•
Tokyo
,COPYRIGHT.25667 Page 1 Thursday, March 15, 2001 11:41 AM
SSH, the Secure Shell: The Definitive Guide
by Daniel J. Barrett and Richard E. Silverman
Copyright © 2001 O’Reilly & Associates, Inc. All rights reserved.
Printed in the United States of America.
Published by O’Reilly & Associates, Inc., 101 Morris Street, Sebastopol, CA 95472.
Editor:
Mike Loukides
Production Editor:
Mary Anne Weeks Mayo
Cover Designer:
Ellie Volckhausen
Printing History:
February 2001:
First Edition.
Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered
trademarks of O’Reilly & Associates, Inc. Many of the designations used by manufacturers
and sellers to distinguish their products are claimed as trademarks. Where those designations
appear in this book, and O’Reilly & Associates, Inc. was aware of a trademark claim, the
designations have been printed in caps or initial caps. The association between the image of
a land snail and the topic of SSH is a trademark of O’Reilly & Associates, Inc.
While every precaution has been taken in the preparation of this book, the publisher assumes
no responsibility for errors or omissions, or for damages resulting from the use of the
information contained herein.
ISBN: 0-596-00011-1
[3/01]
[M]
,sshTOC.fm.11051 Page v Tuesday, February 20, 2001 2:14 PM
Table of Contents
Preface
.....................................................................................................................
ix
1. Introduction to SSH
..................................................................................
1
1.1. What Is SSH? .............................................................................................
2
1.2. What SSH Is Not .......................................................................................
2
1.3. The SSH Protocol .....................................................................................
4
1.4. Overview of SSH Features .......................................................................
5
1.5. History of SSH ........................................................................................
10
1.6. Related Technologies .............................................................................
12
1.7. Summary .................................................................................................
18
2. Basic Client Use
.......................................................................................
19
2.1. A Running Example ...............................................................................
19
2.2. Remote Terminal Sessions with ssh ......................................................
20
2.3. Adding Complexity to the Example ......................................................
22
2.4. Authentication by Cryptographic Key ...................................................
26
2.5. The SSH Agent .......................................................................................
32
2.6. Connecting Without a Password or Passphrase ...................................
37
2.7. Miscellaneous Clients .............................................................................
38
2.8. Summary .................................................................................................
40
3. Inside SSH
..................................................................................................
41
3.1. Overview of Features .............................................................................
42
3.2. A Cryptography Primer ..........................................................................
45
3.3. The Architecture of an SSH System .......................................................
49
3.4. Inside SSH-1 ...........................................................................................
52
v
Oracle 8i Internal Services for Waits, Latches, Locks, and Memory, eMatter Edition
Copyright © 2001 O’Reilly & Associates, Inc. All rights reserved.
Plik z chomika:
rav022
Inne pliki z tego folderu:
Zabezpieczenia w systemach linux.pdf
(567 KB)
Zaawansowane programowanie w systemie Linux [Helion 18 rozd.pdf
(25607 KB)
unixallwhatwasonlab.doc
(49 KB)
Unix For Dummies.pdf
(18060 KB)
Ubuntu Hacks - Tips And Tools For Exploring, Using, And Tuning Linux (O'reilly, 2006).pdf
(3566 KB)
Inne foldery tego chomika:
insrukcje do laptopów
instrukcje - inne
ksiązki o żaglowcach
matematyka, fizyka
medyczne
Zgłoś jeśli
naruszono regulamin