Book description
The best practices guide to building, scaling and deploying Open SSH for legacy Solaris (2.6, 7, and 8) and Solaris 9 OE systems.
Covers the new Solaris Secure Shell for all versions of Solaris.
Shows how to secure remote logins, integrate Secure Shell into existing scripts and avoid common problems.
Written by Jason Reid, a member of the Solaris System Test group at Sun Microsystems, Inc.
Table of contents
- Copyright
- Acknowledgements
- Figures
- Table
- Preface
- 1. Introducing the Secure Protocols
-
2. Building OpenSSH
- Components
- Component Descriptions
- Entropy Sources
- TCP Wrappers
- OpenSSL
- OpenSSH
-
3. Configuring the Secure Shell
- Configuration Details
- Mechanics of Configuration Files
-
Recommendations
-
Server Recommendations
- Protocol Support
- Network Access
- Keep-Alives
- Data Compression
- Privilege Separation
- Login Grace Time
- Password and Public Key Authentication
- Superuser (root) Logins
- Banners, Mail, and Message-of-the-Day
- Connection and X11 Forwarding
- User Access Control Lists
- User File Permissions
- UseLogin Keyword
- Legacy Support
- Client Recommendations
-
Server Recommendations
- 4. Deploying Secure Shell
- 5. Integrating Secure Shell
- 6. Managing Keys and Identities
- 7. Auditing
- 8. Measuring Performance
- 9. Examining Case Studies
-
10. Resolving Problems and Finding Solutions
-
Problems
- Server Does Not Produce Log File Output
- Public Key Authentication Is Not Working
- Trusted Host Authentication Is Not Working
- X Forwarding Is Not Working
- Wildcards and Shell Variables Fail on the scp(1) Command Line
- Superuser (root) Is Unable to Log In
- Startup Performance Is Slow
- Protocol 1 Clients Are Unable to Connect to Solaris Secure Shell Systems
- Privilege Separation Does Not Work in the Solaris Secure Shell Software
- cron(1M) Is Broken
- Message-of-the-Day Is Displayed Twice
- Problem Reports
- Patches
-
Solutions
- Debugging a Secure Shell Connection
- Understanding Differences in OpenSSH and Solaris Secure Shell Software
- Integrating Solaris Secure Shell and SEAM (Kerberos)
- Forcing Remote X11 Users to Use Secure Shell Sessions
- Determining the Server Version String
- Altering the Server Version String
- CERT Advisory CA-2002-18
-
Problems
- A. Secure Shell Usage
- B. Server Configuration Options
- C. Client Configuration Options
- D. Performance Test Methodology
- E. Scripts and Configuration Files
- F. Resources
- Bibliography
Product information
- Title: Secure Shell in the Enterprise
- Author(s):
- Release date: June 2003
- Publisher(s): Pearson
- ISBN: 0131429000
You might also like
article
From ChatGPT to HackGPT: Meeting the Cybersecurity Threat of Generative AI
Emerging generative AI technologies such as ChatGPT are putting new tools in the hands of hackers. …
book
Next Generation SSH2 Implementation
New security risks, continuously evolving regulation and increasing security standards have created new and growing needs …
article
Use Github Copilot for Prompt Engineering
Using GitHub Copilot can feel like magic. The tool automatically fills out entire blocks of code--but …
book
Crypto Dictionary
Expand your mind and your crypto knowledge with the ultimate desktop dictionary for all things cryptography. …