Book description
The best practices guide to building, scaling and deploying Open SSH for legacy Solaris (2.6, 7, and 8) and Solaris 9 OE systems.
Covers the new Solaris Secure Shell for all versions of Solaris.
Shows how to secure remote logins, integrate Secure Shell into existing scripts and avoid common problems.
Written by Jason Reid, a member of the Solaris System Test group at Sun Microsystems, Inc.
Table of contents
- Copyright
- Acknowledgements
- Figures
- Table
- Preface
- 1. Introducing the Secure Protocols
-
2. Building OpenSSH
- Components
- Component Descriptions
- Entropy Sources
- TCP Wrappers
- OpenSSL
- OpenSSH
-
3. Configuring the Secure Shell
- Configuration Details
- Mechanics of Configuration Files
-
Recommendations
-
Server Recommendations
- Protocol Support
- Network Access
- Keep-Alives
- Data Compression
- Privilege Separation
- Login Grace Time
- Password and Public Key Authentication
- Superuser (root) Logins
- Banners, Mail, and Message-of-the-Day
- Connection and X11 Forwarding
- User Access Control Lists
- User File Permissions
- UseLogin Keyword
- Legacy Support
- Client Recommendations
-
Server Recommendations
- 4. Deploying Secure Shell
- 5. Integrating Secure Shell
- 6. Managing Keys and Identities
- 7. Auditing
- 8. Measuring Performance
- 9. Examining Case Studies
-
10. Resolving Problems and Finding Solutions
-
Problems
- Server Does Not Produce Log File Output
- Public Key Authentication Is Not Working
- Trusted Host Authentication Is Not Working
- X Forwarding Is Not Working
- Wildcards and Shell Variables Fail on the scp(1) Command Line
- Superuser (root) Is Unable to Log In
- Startup Performance Is Slow
- Protocol 1 Clients Are Unable to Connect to Solaris Secure Shell Systems
- Privilege Separation Does Not Work in the Solaris Secure Shell Software
- cron(1M) Is Broken
- Message-of-the-Day Is Displayed Twice
- Problem Reports
- Patches
-
Solutions
- Debugging a Secure Shell Connection
- Understanding Differences in OpenSSH and Solaris Secure Shell Software
- Integrating Solaris Secure Shell and SEAM (Kerberos)
- Forcing Remote X11 Users to Use Secure Shell Sessions
- Determining the Server Version String
- Altering the Server Version String
- CERT Advisory CA-2002-18
-
Problems
- A. Secure Shell Usage
- B. Server Configuration Options
- C. Client Configuration Options
- D. Performance Test Methodology
- E. Scripts and Configuration Files
- F. Resources
- Bibliography
Product information
- Title: Secure Shell in the Enterprise
- Author(s):
- Release date: June 2003
- Publisher(s): Pearson
- ISBN: 0131429000
You might also like
article
From ChatGPT to HackGPT: Meeting the Cybersecurity Threat of Generative AI
Emerging generative AI technologies such as ChatGPT are putting new tools in the hands of hackers. …
book
Network Security Hacks
To the uninitiated, the title may seem like an oxymoron: after all, aren't hacks what network …
book
Linux Server Hacks, Volume Two
Today's system administrators deal with a vast number of situations, operating systems, software packages, and problems. …
book
Enterprise Cloud Security and Governance
Build a resilient cloud architecture to tackle data disasters with ease About This Book Get a …