Book description
The best practices guide to building, scaling and deploying Open SSH for legacy Solaris (2.6, 7, and 8) and Solaris 9 OE systems.
Covers the new Solaris Secure Shell for all versions of Solaris.
Shows how to secure remote logins, integrate Secure Shell into existing scripts and avoid common problems.
Written by Jason Reid, a member of the Solaris System Test group at Sun Microsystems, Inc.
Table of contents
- Copyright
- Acknowledgements
- Figures
- Table
- Preface
- 1. Introducing the Secure Protocols
-
2. Building OpenSSH
- Components
- Component Descriptions
- Entropy Sources
- TCP Wrappers
- OpenSSL
- OpenSSH
-
3. Configuring the Secure Shell
- Configuration Details
- Mechanics of Configuration Files
-
Recommendations
-
Server Recommendations
- Protocol Support
- Network Access
- Keep-Alives
- Data Compression
- Privilege Separation
- Login Grace Time
- Password and Public Key Authentication
- Superuser (root) Logins
- Banners, Mail, and Message-of-the-Day
- Connection and X11 Forwarding
- User Access Control Lists
- User File Permissions
- UseLogin Keyword
- Legacy Support
- Client Recommendations
-
Server Recommendations
- 4. Deploying Secure Shell
- 5. Integrating Secure Shell
- 6. Managing Keys and Identities
- 7. Auditing
- 8. Measuring Performance
- 9. Examining Case Studies
-
10. Resolving Problems and Finding Solutions
-
Problems
- Server Does Not Produce Log File Output
- Public Key Authentication Is Not Working
- Trusted Host Authentication Is Not Working
- X Forwarding Is Not Working
- Wildcards and Shell Variables Fail on the scp(1) Command Line
- Superuser (root) Is Unable to Log In
- Startup Performance Is Slow
- Protocol 1 Clients Are Unable to Connect to Solaris Secure Shell Systems
- Privilege Separation Does Not Work in the Solaris Secure Shell Software
- cron(1M) Is Broken
- Message-of-the-Day Is Displayed Twice
- Problem Reports
- Patches
-
Solutions
- Debugging a Secure Shell Connection
- Understanding Differences in OpenSSH and Solaris Secure Shell Software
- Integrating Solaris Secure Shell and SEAM (Kerberos)
- Forcing Remote X11 Users to Use Secure Shell Sessions
- Determining the Server Version String
- Altering the Server Version String
- CERT Advisory CA-2002-18
-
Problems
- A. Secure Shell Usage
- B. Server Configuration Options
- C. Client Configuration Options
- D. Performance Test Methodology
- E. Scripts and Configuration Files
- F. Resources
- Bibliography
Product information
- Title: Secure Shell in the Enterprise
- Author(s):
- Release date: June 2003
- Publisher(s): Pearson
- ISBN: 0131429000
You might also like
book
Hands-On Network Programming with C
A comprehensive guide to programming with network sockets, implementing Internet protocols, designing IoT devices, and much …
book
OpenStack Administration with Ansible 2 - Second Edition
Orchestrate and automate your OpenStack cloud operator tasks with Ansible 2.0 About This Book Automate real-world …
book
The Linux Command Line, 2nd Edition
The Linux Command Line takes you from your very first terminal keystrokes to writing full programs …
book
Advanced Programming in the UNIX® Environment, Third Edition
For more than twenty years, serious C programmers have relied on one book for practical, in-depth …