Skip to:Content
|
Bottom
Cover image for Implementing SSH : strategies for optimizing the Secure Shell
Title:
Implementing SSH : strategies for optimizing the Secure Shell
Personal Author:
Publication Information:
Indianapolis, IN : Wiley, 2004
ISBN:
9780471458807

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000004717934 QA76.76.O63 D844 2004 Open Access Book Book
Searching...

On Order

Summary

Summary

A tactical guide to installing, implementing, optimizing, and supporting SSH in order to secure your network

Prevent unwanted hacker attacks! This detailed guide will show you how to strengthen your company system's defenses, keep critical data secure, and add to the functionality of your network by deploying SSH. Security expert Himanshu Dwivedi shows you ways to implement SSH on virtually all operating systems, desktops, and servers, so your system is safe, secure, and stable. Learn how SSH fulfills all the core items in security, including authentication, authorization, encryption, integrity, and auditing. Also, discover methods to optimize the protocol for security and functionality on Unix, Windows, and network architecture environments. Additionally, find out about the similarities and differences of the major SSH servers and clients.

With the help of numerous architectural examples and case studies, you'll gain the necessary skills to:
* Explore many remote access solutions, including the theory, setup, and configuration of port forwarding
* Take advantage of features such as secure e-mail, proxy, and dynamic port forwarding
* Use SSH on network devices that are traditionally managed by Telnet
* Utilize SSH as a VPN solution in both a server and client aspect
* Replace insecure protocols such as Rsh, Rlogin, and FTP
* Use SSH to secure Web browsing and as a secure wireless (802.11) solution


Author Notes

Himanshu Dwivedi is Managing Security Architect for @stake


Table of Contents

Acknowledgmentsp. xv
About the Authorp. xvii
Introductionp. xix
Part 1 SSH Basicsp. 1
Chapter 1 Overview of SSHp. 3
Differences between SSH1 and SSH2p. 4
Various Uses of SSHp. 5
Securityp. 5
Remote Command Line Executionp. 7
Remote File Transferp. 8
Remote Network Accessp. 10
Secure Managementp. 10
Proxy Servicesp. 11
Client/Server Architecture for SSHp. 12
SSH's Encryption Architecturep. 13
Basic Miscues with SSHp. 14
Types of SSH Clients/Serversp. 14
Basic Setup of SSHp. 15
OpenSSHp. 16
Red Hat Linux 8.0p. 16
OpenBSD 3.1p. 18
Windows 2000 Serverp. 19
Commercial SSHp. 23
OpenBSD 3.1 and Red Hat Linux 8.0p. 23
Windows 2000p. 24
VShell SSH Serverp. 27
Optimal Uses of SSHp. 29
Summaryp. 30
Chapter 2 SSH Serversp. 31
OpenSSHp. 32
SSH Communications' SSH serverp. 39
SSH Communications' SSH Server: Unixp. 39
Generalp. 40
Networkp. 40
Cryptop. 42
Usersp. 43
User Public Key Authenticationp. 44
Tunnelingp. 46
Authenticationp. 46
Host Restrictionsp. 47
Users Restrictionsp. 48
SSH1 Compatibilityp. 49
Chrooted Environmentp. 50
Subsystem Definitionsp. 50
SSH Communications' SSH server: Windowsp. 51
General Settingsp. 52
Network Settingsp. 54
Crypto Settingsp. 56
Users Settingsp. 57
Server Public Key Configurationp. 60
Server Certificate Configurationsp. 61
Tunneling Configurationsp. 62
Authentication Methodsp. 63
Host Restrictionsp. 64
User Restrictionsp. 65
Subsystem Definitionsp. 67
VanDyke Software's VShell SSH Serverp. 69
General Settingsp. 69
General-Host Keyp. 70
General-Key Exchangesp. 71
General-Cipherp. 72
General-MACp. 73
General-Compressionp. 74
Authenticationp. 75
Access Controlp. 77
SFTP Sectionp. 78
Triggersp. 79
Connection Filtersp. 80
Port-Forward Filtersp. 81
Loggingp. 83
Comparison of OpenSSH, SSH Server, and VShellp. 84
Summaryp. 85
Chapter 3 Secure Shell Clientsp. 87
Command-Line SSH Clientsp. 88
Windows Installationp. 89
Unix Installationp. 89
SSH Client Configuration Filep. 94
Generalp. 95
Networkp. 95
Cryptop. 96
User Public Key Authenticationp. 96
Tunnelingp. 97
SSH1 Compatibilityp. 97
Authenticationp. 98
GUI SSH Clientsp. 98
Windows Installationp. 98
SSH Communicationsp. 99
Profile Settingsp. 100
Global Settingsp. 101
VanDyke Software's SecureCRTp. 104
PuTTYp. 110
WinSCPp. 112
MindTermp. 113
MacSSHp. 116
Summaryp. 116
Chapter 4 Authenticationp. 117
General Optionsp. 118
SSH Communications' SSH Server (Windows)p. 118
SSH Communications' SSH Server (Unix)p. 120
VShell SSH Serverp. 121
OpenSSH (Unix and Windows)p. 122
Passwordsp. 123
Host-Based Authenticationp. 127
Server Authenticationp. 129
Public Keysp. 131
Creating Keys with OpehSSHp. 134
How to Use an OpenSSH Key on an OpenSSH Serverp. 135
How to Use an OpenSSH Key on SSH Communications' SSH Serverp. 136
How to Use an OpenSSH Key on a VShell SSH Serverp. 137
Creating Keys with SSH Communications' SSH Client (Unix and Windows Command Line)p. 138
How to Use SSH Client Keys with SSH Communications' SSH Serverp. 139
How to Use SSH Client Keys with an OpenSSH Serverp. 140
How to Use SSH Client Keys with a VShell SSH Serverp. 140
Creating Keys with SSH Communications (Windows GUI)p. 142
How to Upload an SSH Client Key Pair to SSH Communications' SSH Serverp. 144
How to Upload an SSH Client Key Pair to an OpenSSH Serverp. 145
How to Upload an SSH Client Key Pair to a VShell SSH Serverp. 147
Creating Keys with VanDyke SecureCRTp. 148
VShell SSH Serverp. 149
OpenSSHp. 150
SSH Communications' SSH Serverp. 151
SSH Agentsp. 152
Summaryp. 153
Chapter 5 SSH Managementp. 155
Network Devicesp. 156
Cisco Routersp. 157
Cisco Switchesp. 160
Cisco VPN Concentratorp. 160
Cisco PIX Firewallsp. 162
Network Appliance Filersp. 163
Secure Managementp. 164
Management Serversp. 165
Two-Factor Authenticationp. 167
SOCKS Managementp. 169
SSH: User Restrictionsp. 172
Chrootp. 172
User Access Controlsp. 173
SSH User Restrictionsp. 175
SSH: Network Access Controlsp. 177
SSH TCP wrappersp. 177
SSH Connection Filtersp. 179
SSH Host Restrictionsp. 181
Summaryp. 183
Part 2 Remote Access Solutionsp. 185
Chapter 6 SSH Port Forwardingp. 187
Networking Basics of Port Forwarding for Clientsp. 193
Networking Basics of Port Forwarding for Serversp. 200
SSH Port Forwardingp. 201
Local Port Forwarding for SSH Clientsp. 205
Configuration for Command-Line Clientsp. 205
Configuration for SSH Communications' GUI SSH Clientp. 207
Configuration for VanDyke Software's Secure CRTp. 209
Configuration for PuTTYp. 211
Remote Port Forwarding for SSH Clientsp. 213
Configuration for OpenSSH Client (Unix and Windows)p. 213
Configuration for SSH Communications' Command-Line Client (Unix and Windows)p. 214
Configuration for SSH Communications' GUI SSH Client (Windows)p. 214
Configuration for VanDyke Software's SecureCRTp. 215
Port Forwarding for SSH Serversp. 217
Configuration for OpenSSH Server (Unix and Windows)p. 217
Configuration for SSH Communications' SSH Server (Unix)p. 217
Configuration for SSH Communications' SSH Server (Windows)p. 220
Configuration for VanDyke Software's VShell SSH Serverp. 222
Advantages to SSH Port Forwardingp. 225
Summaryp. 226
Chapter 7 Secure Remote Accessp. 229
Secure E-mail with SSHp. 230
Setting Up the SSH Serverp. 232
Setting Up the SSH Clientp. 232
Setting Up the E-mail Clientp. 234
Executing Secure E-mailp. 237
Secure File Transfer (SMB and NFS) with SSHp. 238
Setting Up the SSH Serverp. 241
Setting Up the SSH Clientp. 241
Setting Up the File Server Clientsp. 243
Executing Secure File Transferp. 243
Secure File Sharing with SMB and SSHp. 244
Secure File Sharing with NFS and SSHp. 245
Secure Management with SSHp. 246
Setting Up the SSH Serverp. 248
Setting Up the SSH Clientp. 249
Setting Up the Management Clientsp. 252
Executing Secure Managementp. 252
Secure Management with Windows Terminal Services and SSHp. 253
Secure Management with VNC and SSHp. 255
Secure Management with pcAnywhere and SSHp. 257
Secure VPN with SSH (PPP over SSH)p. 259
PPP Daemon on the Serverp. 260
VPN User and Sudop. 261
Client Scriptp. 261
Summaryp. 264
Part 3 Protocol Replacementp. 267
Chapter 8 SSH Versatilityp. 269
Terminal Accessp. 270
Compromising a System with Remote Shell (RSH)p. 271
Compromising a System with Remote Login (Rlogin)p. 272
Compromising a System with Remote Execution (Rexec)p. 273
Why Access via SSH Is Betterp. 274
File Transfer with Secure File Transfer Protocol (SFTP)p. 276
SFTP with the OpenSSH SFTP Serverp. 277
Using OpenSSH for Management Purposesp. 277
Using OpenSSH for File Sharingp. 278
Authorizing Users with OpenSSHp. 279
OpenSSH on Windows and Cygdrivep. 280
SFTP with VanDyke Software VShellp. 281
Using VShell for Management Purposesp. 281
Using VShell for File Sharingp. 282
Authorizing Users with VShellp. 287
SFTP with SSH Communications' SSH Serverp. 287
Using SSH Communications' SSH Server for Management Purposesp. 288
Using SSH Communications' SSH Server for File Sharingp. 289
Authorizing Users with SSH Communications' SSH Serverp. 292
Comparison of the Three SFTP Solutionsp. 292
Secure Chatp. 293
Secure Backupsp. 297
Summaryp. 299
Chapter 9 Proxy Technologies in a Secure Web Environmentp. 301
SSH and SOCKSp. 302
Dynamic Port Forwarding and SOCKSp. 310
Secure Web Browsing with SSHp. 314
SSH via HTTP Proxiesp. 321
Securing Wireless Networks with SSHp. 323
Securing Wireless with SSH and HTTP Proxiesp. 324
Securing Wireless with SSH and Dynamic Port Forwardingp. 325
Summaryp. 326
Chapter 10 SSH Case Studiesp. 329
Case Study #1 Secure Remote Accessp. 330
The Problem Situationp. 330
Business Requirementsp. 330
Configurationp. 334
SSH Client Configurationp. 334
SSH Server Configurationp. 339
Results Checklistp. 343
Case Study #2 Secure Wireless Connectivityp. 344
The Problemp. 344
Business Requirementsp. 344
Configurationp. 347
SSH Client Configurationp. 347
SSH Server Configurationp. 350
Results Checklistp. 351
Case Study #3 Secure File Serversp. 353
The Problemp. 353
Business Requirementsp. 353
Configurationp. 354
SSH Server Configurationp. 354
SSH Client Configurationp. 356
Results Checklistp. 357
Summaryp. 358
Epiloguep. 359
Indexp. 361
Go to:Top of Page