Book description
The best practices guide to building, scaling and deploying Open SSH for legacy Solaris (2.6, 7, and 8) and Solaris 9 OE systems.
Covers the new Solaris Secure Shell for all versions of Solaris.
Shows how to secure remote logins, integrate Secure Shell into existing scripts and avoid common problems.
Written by Jason Reid, a member of the Solaris System Test group at Sun Microsystems, Inc.
Table of contents
- Copyright
- Acknowledgements
- Figures
- Table
- Preface
- 1. Introducing the Secure Protocols
-
2. Building OpenSSH
- Components
- Component Descriptions
- Entropy Sources
- TCP Wrappers
- OpenSSL
- OpenSSH
-
3. Configuring the Secure Shell
- Configuration Details
- Mechanics of Configuration Files
-
Recommendations
-
Server Recommendations
- Protocol Support
- Network Access
- Keep-Alives
- Data Compression
- Privilege Separation
- Login Grace Time
- Password and Public Key Authentication
- Superuser (root) Logins
- Banners, Mail, and Message-of-the-Day
- Connection and X11 Forwarding
- User Access Control Lists
- User File Permissions
- UseLogin Keyword
- Legacy Support
- Client Recommendations
-
Server Recommendations
- 4. Deploying Secure Shell
- 5. Integrating Secure Shell
- 6. Managing Keys and Identities
- 7. Auditing
- 8. Measuring Performance
- 9. Examining Case Studies
-
10. Resolving Problems and Finding Solutions
-
Problems
- Server Does Not Produce Log File Output
- Public Key Authentication Is Not Working
- Trusted Host Authentication Is Not Working
- X Forwarding Is Not Working
- Wildcards and Shell Variables Fail on the scp(1) Command Line
- Superuser (root) Is Unable to Log In
- Startup Performance Is Slow
- Protocol 1 Clients Are Unable to Connect to Solaris Secure Shell Systems
- Privilege Separation Does Not Work in the Solaris Secure Shell Software
- cron(1M) Is Broken
- Message-of-the-Day Is Displayed Twice
- Problem Reports
- Patches
-
Solutions
- Debugging a Secure Shell Connection
- Understanding Differences in OpenSSH and Solaris Secure Shell Software
- Integrating Solaris Secure Shell and SEAM (Kerberos)
- Forcing Remote X11 Users to Use Secure Shell Sessions
- Determining the Server Version String
- Altering the Server Version String
- CERT Advisory CA-2002-18
-
Problems
- A. Secure Shell Usage
- B. Server Configuration Options
- C. Client Configuration Options
- D. Performance Test Methodology
- E. Scripts and Configuration Files
- F. Resources
- Bibliography
Product information
- Title: Secure Shell in the Enterprise
- Author(s):
- Release date: June 2003
- Publisher(s): Pearson
- ISBN: 0131429000
You might also like
book
How the Internet Really Works
The internet has profoundly changed interpersonal communication, but most of us don’t really understand how it …
book
English for Everyone English Phrasal Verbs
PLEASE NOTE - this is a replica of the print book and you will need a …
book
Practical Packet Analysis, 3rd Edition
It's easy to capture packets with Wireshark, the world's most popular network sniffer, whether off the …
book
Hands-on Booting: Learn the Boot Process of Linux, Windows, and Unix
Master the booting procedure of various operating systems with in-depth analysis of bootloaders and firmware. The …