About the Book
Secure your computer network with SSH! With transparent, strong encryption, reliable public-key authentication, and a highly configurable client/server architecture, SSH (Secure Shell) is a popular, robust, TCP/IP-based solution to many network security and privacy concerns. It supports secure remote logins, secure file transfer between computers, and a unique “tunneling” capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well.SSH, The Secure Shell: The Definitive Guide, Second Edition, covers the Secure Shell in detail for both system administrators and end users. This new edition adds over 100 new features and options from the latest versions of OpenSSH and SSH Tectia (formerly known as SSH2 from ssh.com). It focuses on the SSH-2 protocol, its internals, and its most popular implementations, including thorough coverage of:OpenSSH and SSH Tectia for Unix, Linux, Mac OS X, and Windows: the basics, the internals, and complex applications
Configuring SSH servers and clients, both systemwide and per user, with recommended settings to maximize security
Key management using agents, agent forwarding, and forced commands
Forwarding (tunneling) of TCP and X11 applications in depth, even in the presence of firewalls and network address translation (NAT)
Integrating SSH with Kerberos, OpenPGP, PAM, and other security-related software
Scalable authentication techniques for large installations, including X.509 certificates
Installing and maintaining SSH systems
Troubleshooting a variety of common and not-so-common problemsWhether you’re communicating on a small LAN or across the Internet, SSH can ship your data from 'here' to 'there' efficiently and securely. The number of computer intrusions on the Internet continues to rise. Now, more than ever, you need to practice safe computing using SSH. This book shows you how to make your network a secure place to live and work.
About the Authors
Daniel J. Barrett has been immersed in Internet technology since 1985. Currently working as a software engineer, Dan has also been a heavy metal singer, Unix system administrator, university lecturer, web designer, and humorist. He is the author of O'Reilly's Linux Pocket Guide, and he is the coauthor of Linux Security Cookbook, and SSH, The Secure Shell: The Definitive Guide.
Richard Silverman first touched a computer as a college junior in 1986, when he logged into a DEC-20, typed MM to send some mail, and was promptly lost to the world. He eventually resurfaced and discovered he had a career, which was convenient but somewhat disorienting, since he hadn't really been looking for one. Since earning his B.A. in computer science and M.A. in pure mathematics, Richard has worked in the fields of networking, formal methods in software development, public-key infrastructure, computer security, and Unix systems administration. He is a co-author on two O'Reilly titles: SSH, The Secure Shell (The Definitive Guide), and the Linux Security Cookbook.
Robert G. Byrnes, Ph.D., has been hacking on Unix systems for twenty years, and has been involved with security issues since the original Internet worm was launched from Cornell University, while he was a graduate student and system administrator. He is currently a software engineer at Curl Corporation, and has worked in the fields of networking, telecommunications, distributed computing, financial technology, and condensed matter physics.