Next Generation SSH2 Implementation

Book description

New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into a security environment. It covers the newest features and applications of SSH-2 (which received Proposed Standard status from the IETF in 2006). SSH2 is more secure than previous versions and has many expanded uses on a wider variety of computing platforms. Another particular note driving new SSH2 adoption are the requirements of recent legislation (PCI/HIPAA/SOX/FISMA). SSH 2 has become an even more valuable tool, as it provides communications security compliance with the latest standards.

This book offers the most up-to-date information on SSH2 in a practical, hands-on, tutorial-style reference that goes well beyond UNIX implementation. It concentrates on the latest version of SSH 2 with all new information.
  • Discover why SSH2 offers more robust security than SSH1 and how to incorporate it into your network administration software toolbox

Table of contents

  1. Brief Table of Contents
  2. Table of Contents
  3. Copyright
  4. Lead Author and Technical Editor
  5. Contributing Authors
  6. Acknowledgments
  7. Chapter 1. IntroductionSolutions in this chapter:
    1. Introduction
    2. Why Is There a Need To Use SSH?
    3. What SSH Does and Does Not Do
    4. Comparison Between SSH and SSHv2
    5. What Is SCP and SFTP?
    6. SSH and the C-I-A Triad
    7. Summary
    8. Solutions Fast Track
    9. Frequently Asked Questions
  8. Chapter 2. OSI Model and Then SomeSolutions in this chapter:
    1. Introduction
    2. 50,000 Foot View of the OSI Model
    3. Using the OSI Model to Troubleshoot
    4. Applying the OSI Model to Forensics
    5. Summary
    6. Solutions Fast Track
    7. Frequently Asked Questions
  9. Chapter 3. An Introduction To CryptographySolutions in this chapter:
    1. What is Cryptography?
    2. Cryptography and Information Security
    3. Cryptographic Protocols and Applications
    4. Cryptographic Systems
    5. Introducing Cryptographic Algorithms and Ciphers
    6. Cryptographic Key Management
    7. Cryptographic Functions
    8. Digital Signatures
    9. Attacks on Cryptosystems
    10. Cryptography and SSH
    11. Summary
    12. Solutions Fast Track
    13. Frequently Asked Questions
  10. Chapter 4. SSH FeaturesSolutions in this chapter:
    1. Introduction to SSH
    2. SSH Standards
    3. SSH vs. Telnet/Rlogin
    4. SSH Client/Server Overview
    5. Packet Capture Detection
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  11. Chapter 5. SSH ShortcomingsSolutions in this chapter:
    1. Introduction
    2. Attacking SSL: Hacking the User
    3. Recognizing an SE Attack
    4. Responding to an SE Event
    5. Defending Against Social Engineering Attacks
    6. Social Engineering Scenarios for Awareness Training
    7. Summary
    8. Solutions Fast Track
    9. Frequently Asked Questions
  12. Chapter 6. SSH Client BasicsSolutions in this chapter:
    1. Introduction
    2. Understanding Network Encryption
    3. Using OpenSSH to Encrypt Network Traffic Between Two Hosts
    4. Installing OpenSSH
    5. Configuring SSH
    6. Implementing SSH to Secure Data
    7. Distributing the Public Key
    8. The SSH Client
    9. Summary
    10. Solutions Fast Track
    11. Frequently Asked Questions
  13. Chapter 7. The SSH Server BasicsSolutions in this chapter:
    1. The Components That Make Up the SSH Server
    2. Protocols in Use
    3. Randomness of Cryptography
    4. Which Communication Is Protected with SSH
    5. F-Secure SSH Server
    6. Other SSH Server Types
    7. Compiling SSH
    8. Server Options
    9. Running the Server
    10. Authentication
    11. Summary
    12. Solutions Fast Track
    13. Frequently Asked Questions
  14. Chapter 8. SSH on WindowsSolutions in this chapter:
    1. Introduction
    2. Using Windows SSH Clients
    3. Selecting an SSH Server for Windows
    4. Using SUA SSH Servers
    5. Using Cygwin SSH Servers
    6. Using Native Windows SSH Servers
    7. Summary
    8. Solutions Fast Track
    9. Frequently Asked Questions
  15. Chapter 9. Linux SSHSolutions in this chapter:
    1. Introduction
    2. Installing OpenSSH Server
    3. Controlling Your SSH server
    4. Configuring SSH to Ease Your Paranoia
    5. Using SSH
    6. Additional Avenues of Approach
    7. Summary
    8. Solutions Fast Track
    9. Frequently Asked Questions
  16. Chapter 10. Mac SSHSolutions in this chapter:
    1. Introduction
    2. Using SSH on a Mac
    3. Simplifying Key Management with the SSH Agent
    4. Scripting Securely with SSH
    5. Summary
    6. Solutions Fast Track
    7. Frequently Asked Questions
  17. Chapter 11. SSH Command Line and Advanced Client UseSolutions in this chapter:
    1. Introduction
    2. Client Configuration
    3. Verbose Medium
    4. Secure Copy
    5. Summary
    6. Solutions Fast Track
    7. Frequently Asked Questions
  18. Chapter 12. SSH Server Advanced UseSolutions in this chapter:
    1. Introduction
    2. Allowing SSH Connections
    3. Maintaining System Time
    4. Configuring the Warning Banner
    5. Securing User Home Directories
    6. Controlling Session Timeouts
    7. Logging Options
    8. Additional SSH Server Options
    9. Debugging SSH
    10. Summary
    11. Solutions Fast Track
    12. Frequently Asked Questions
  19. Chapter 13. SSH Port ForwardingSolutions in this chapter:
    1. Introduction
    2. SSH Port Forwarding Commands
    3. Securing E-mail with SSH Local –L Port Forwarding
    4. Bypassing Firewalls with SSH Remote –R Port Forwarding
    5. Using SSH SOCKS Proxy –D To Tunnel Your HTTP/DNS Traffic
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  20. Index
    1. SYMBOL
    2. A
    3. B
    4. C
    5. D
    6. E
    7. F
    8. G
    9. H
    10. I
    11. K
    12. L
    13. M
    14. N
    15. O
    16. P
    17. R
    18. S
    19. T
    20. U
    21. V
    22. W
    23. X

Product information

  • Title: Next Generation SSH2 Implementation
  • Author(s): Dale Liu
  • Release date: April 2011
  • Publisher(s): Syngress
  • ISBN: 9780080570006