Skip to Content
SSH, The Secure Shell: The Definitive Guide, 2nd Edition
book

SSH, The Secure Shell: The Definitive Guide, 2nd Edition

by Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes
May 2005
Intermediate to advanced
666 pages
21h 5m
English
O'Reilly Media, Inc.
Book available
Content preview from SSH, The Secure Shell: The Definitive Guide, 2nd Edition

OpenSSH Features

Serverwide Configuration

KeyRegenerationInterval (or sshd -k)

Set the number of seconds between generations of the SSH-1 server key. This temporary key is used only for SSH-1 connections. The default is 3600 seconds (1 hour), and a value of zero disables regeneration.

RhostsRSAAuthentication

Permit or deny authentication by the RSA key together with authentication by rhosts files.

RSAAuthentication

Permit or deny authentication by the RSA key.

ServerKeyBits (or sshd -b)

Set the number of bits in the SSH-1 server key: see KeyRegenerationInterval above. The default is 768 bits, and the fewest allowable is 512 bits.

Client Configuration

Cipher

Replaced by Ciphers for SSH-2 protocol connections

RhostsRSAAuthentication

Same as for serverwide configuration

RSAAuthentication

Same as for serverwide configuration

Files

~/.ssh/identity, ~/.ssh/identity.pub

These files contain your default private and public keys, respectively, for public-key authentication.

/etc/ssh/ssh_host_key

This system file contains the SSH-1 protocol (RSA) host key.

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Linux Basics for Hackers

Linux Basics for Hackers

OccupyTheWeb .

Publisher Resources

ISBN: 0596008953Errata Page