Book Home

Networking CD BookshelfSearch this book

Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: S

scp2: 3.8.2. scp2/sftp Details
compatibility with scp1: 7.4.14. SSH1/SSH2 Compatibility
debugging: 7.4.15. Logging and Debugging
regular expressions: A. SSH2 Manpage for sshregex
scp (Secure Copy Program): 1.4.2. Secure File Transfer
2.2.1. File Transfer with scp
2.2.1. File Transfer with scp
7.5. Secure Copy with scp
authentication through local agents: 2.5.3. Agent Forwarding
broken features, unexpected behaviors: 12.2.5.1. General client problems
command line, failure of wildcards or shell variables: 12.2.5.4. scp
command-line options: 4.1.5.11. scp behavior
compile-time configuration: 4.1.5.11. scp behavior
copy access to your account, allowing others: 12.2.5.4. scp
display of statistics: 4.1.5.11. scp behavior
double-remote copying: 2.5.2. A More Complex Passphrase Problem
environment variables: 4.1.5.11. scp behavior
7.5.7.1. scp1 statistics
error messages
"Not a regular file": 12.2.5.4. scp
"packet too long": 12.2.5.4. scp
"Write failed after flushing stdout buffer. write stdout. Broken pipe.": 12.2.5.4. scp
failure of copy to remote machine: 12.2.5.4. scp
file ownership, preserving in copied files: 12.2.5.4. scp
gateway hosts and: 11.5.2. Using SCP Through a Gateway
keywords: B.4. ssh and scp Keywords
options: B.6. scp Options
protocols: 3.8. SSH and File Transfers (scp and sftp)
statistics display: 7.5.7. Statistics Display
syntax: 2.2.1. File Transfer with scp
7.5.1. Full Syntax
troubleshooting wildcards and shell variables: 12.1.2. Server Debugging
SecPanel: 13.4. Other SSH-Related Products
secrecy, keys and passphrases: 2.4.2. Generating Key Pairs with ssh-keygen
secret-key ciphers: 3.2.2. Public- and Secret-Key Cryptography
SECSH (Secure Shell) working group: 1.5. History of SSH
secure channel: 2.2. Remote Terminal Sessions with ssh
Secure Copy Program (see SCP)
Secure Socket Layers (SSL): 1.6.6. Secure Socket Layer (SSL) Protocol
SecureCRT: 13.3. Table of Products
15. SecureCRT (Windows)
authentication methods: 15.4.1. Mandatory Fields
client configuration: 15.2. Basic Client Use
data compression: 15.4.2. Data Compression
encryption algorithms, specification: 15.4.1. Mandatory Fields
forwarding: 15.5. Forwarding
identities: 15.3.2. Using Multiple Identities
installing: 15.1. Obtaining and Installing
key management: 15.3. Key Management
keys, generating: 15.3.1. RSA Key Generation Wizard
keys, installing: 15.3.1. RSA Key Generation Wizard
port forwarding: 15.5.1. Port Forwarding
ports: 15.4.1. Mandatory Fields
protocols: 15.4.1. Mandatory Fields
secure file copy with ZModem: 15. SecureCRT (Windows)
session and global options: 15.4. Advanced Client Use
Session Options window, mandatory fields: 15.4.1. Mandatory Fields
sessions: 15.2. Basic Client Use
SOCKS: 15.4.4. Firewall Use
TIS authentication: 15.4.3. TIS Authentication
troubleshooting: 15.6. Troubleshooting
X forwarding: 15.5.2. X Forwarding
SecureFX: 11.2. FTP Forwarding
13.3. Table of Products
SecureKoalaTerm: 13.3. Table of Products
SecurID
authentication using: 3.4.2.5. One-time passwords
5.5.1.9. SecurID authentication
compile-time configuration: 4.1.5.7. Authentication
security
account permissions: 2.4.3. Installing a Public Key on an SSH ServerMachine
methods for remote account access: 1. Introduction to SSH
per-account configuration: 8.1. Limits of This Technique
remote logins: 1.4.1. Secure Remote Logins
violations: 2.3.1. Known Hosts
3.1.2. Integrity
security threats
countered by SSH: 3.10. Threats SSH Can Counter
dictionary attack: 2.4.3. Installing a Public Key on an SSH ServerMachine
not countered by SSH: 3.11. Threats SSH Doesn't Prevent
seeds: 3.7. Randomness
sendport command: 11.2.5.3. FTP with the default data ports
sequence numbers, for one-time password systems: 5.5.1.10. S/Key authentication
Sergey Okhapkin (see Okhapkin's SSH1)
server authentication: 3.1.3. Authentication
3.4.1. Establishing the Secure Connection
server configuration
per-account: 8. Per-Account Server Configuration
three levels of: 0.4. Our Approach
server keys: 3.3. The Architecture of an SSH System
generating: 5.4.4. Server Key Generation
recommended settings for: 10.3.2. /etc/sshd_config
server names: 5.1. The Name of the Server
ServerKeyBits: 5.4.4. Server Key Generation
servers: 3.3. The Architecture of an SSH System
4.3.5. Compilation Flags
configuration files: 5.3.1. Server Configuration Files
debugging: 12.1.2. Server Debugging
logging: 5.8. History, Logging, and Debugging
serverwide configuration: 0.4. Our Approach
4.1.5. Compile-Time Configuration
5. Serverwide Configuration
10.3. Serverwide Configuration
command-line options: 5.3.2. Command-Line Options
files, commenting: 5.3.1. Server Configuration Files
modifying: 5.3.3. Changing the Configuration
port forwarding: 9.2.10.2. Serverwide configuration
precedence rules: 5.3.2. Command-Line Options
5.3.4. A Tricky Reconfiguration Example
session identifiers: 3.4.1. Establishing the Secure Connection
session keys: 3.3. The Architecture of an SSH System
3.5.1.2. Session key exchange and the server key
double-encryption: 3.4.1. Establishing the Secure Connection
generation by client: 3.4.1. Establishing the Secure Connection
sessions: 3.3. The Architecture of an SSH System
client-server key exchange, SSH-2: 3.5.1.2. Session key exchange and the server key
rekeying for improved security: 3.5.1.7. Session rekeying
setuid client, security risks under SSH1: 3.5.2.3. Setuid client
setuid programs: 4.1.5.2. Installation, files, and directories
sftp2 error messages: 12.2.5.5. sftp2
sftp protocol: 3.8. SSH and File Transfers (scp and sftp)
sftp2, regular expressions: A. SSH2 Manpage for sshregex
sftp-server: 3.8. SSH and File Transfers (scp and sftp)
sftp (SSH2): 2.7.1. sftp
3.8.2. scp2/sftp Details
ASCII vs. binary transfer: 2.7.1. sftp
command-line options: 2.7.1. sftp
vs. ftp: 2.7.1. sftp
SHA-1 (Secure Hash Algorithm): 3.9.3.3. SHA-1
shadow files: 4.3.5. Compilation Flags
SHELL environment variable: 2.5. The SSH Agent
shell escapes, from within forced commands: 8.2.4.1. Security issues
.shosts: 3.4.2.3.1. Trusted-host access files
5.5.2.4. shosts access control
ownership: 10.1. The Basics
permissions: 5.4.2.1. Acceptable permissions for user files
syntax: 3.4.2.3.2. Control file details
shosts access control: 5.5.2.4. shosts access control
shosts.equiv file: 3.4.2.3.1. Trusted-host access files
5.5.2.4. shosts access control
syntax: 3.4.2.3.2. Control file details
SIGHUP signal: 5.3.3. Changing the Configuration
signer: 3.3. The Architecture of an SSH System
SilentDeny: 5.5.2.3. Hostname access control
recommended settings: 10.3.2. /etc/sshd_config
S/Key
authentication using: 5.5.1.10. S/Key authentication
enabling in OpenSSH: 4.3.5. Compilation Flags
S/Key software OTP system: 3.4.2.5. One-time passwords
SKeyAuthentication: 5.5.1.10. S/Key authentication
slogin (SSH1): 2.7.2. slogin
sockets: 9.2.1. Local Forwarding
ssh-agent: 6.3.4.1. Access control
SOCKS: 7.4.6. Proxies and SOCKS
compile-time configuration: 4.1.5.8. SOCKS proxy support
configuration flags: 4.1.5.8. SOCKS proxy support
OpenSSH: 7.4.6.3. SOCKS in OpenSSH
SSH1: 7.4.6.1. SOCKS in SSH1
trusted-host authentication issues: 7.4.6.4. Other SOCKS issues
SOCKS5_NONETMASKCHECK: 7.4.6.1. SOCKS in SSH1
SOCKS5_PASSWD: 7.4.6.1. SOCKS in SSH1
SocksServer: 4.1.5.8. SOCKS proxy support
7.4.6.2. SOCKS in SSH2
7.4.6.2. SOCKS in SSH2
SOCKS5_USER: 7.4.6.1. SOCKS in SSH1
Solaris operating system
OpenSSH-incompatible Kerberos-4: 11.4.5.2. Kerberos on Solaris
SO_LINGER: 4.1.5.3. TCP/IP support
SO_LINGER socket flag: 4.1.5.3. TCP/IP support
spoofing attacks: 3.10.2. Name Service and IP Spoofing
SRP (Secure Remote Password): 1.6.5. Secure Remote Password (SRP)
srvtab file: 11.4.5. Kerberos-4 in OpenSSH
11.4.5. Kerberos-4 in OpenSSH
ssh1
error messages
"Cannot fork into background without a command to execute": 12.2.5.3. ssh
"channel_request_remote_forwarding\: too many forwards": 12.2.5.3. ssh
"Hostname or username is longer than 255 characters": 12.2.5.3. ssh
"No host key is known for and you have requested strict checking...": 12.2.5.3. ssh
"Selected cipher type... not supported by server": 12.2.5.3. ssh
"Too many identity files specified": 12.2.5.3. ssh
setuid root: 4.1.5.2. Installation, files, and directories
SSH-1
authentication methods: 3.4.2. Client Authentication
client authentication: 3.4.2.3. Trusted-host authentication (Rhosts and RhostsRSA)
protocols: 3.4. Inside SSH-1
trusted-host authentication: 3.4.2.3. Trusted-host authentication (Rhosts and RhostsRSA)
SSH-1 protocol: 1.5. History of SSH
SSH-2 protocols: 1.5. History of SSH
3.5. Inside SSH-2
vs. SSH-1: 3.5. Inside SSH-2
ssh-add: 2.5. The SSH Agent
6. Key Management and Agents
6.3. SSH Agents
6.3.3. Loading Keys with ssh-add
error message
"Could not open a connection to your authentication agent": 12.2.3.3. ssh-agent and ssh-add
12.2.3.3. ssh-agent and ssh-add
listing keys: 2.5. The SSH Agent
options: B.9. ssh-add Options
reading input: 2.5. The SSH Agent
ssh-agent: 2.5. The SSH Agent
6. Key Management and Agents
6.3. SSH Agents
environment variables: 6.3.2.3. Format of environment variable commands
failure to terminate after logout: 12.2.3.3. ssh-agent and ssh-add
options: B.8. ssh-agent Options
precedence of keys: 6.4.2. Switching Identities with an Agent
proper invocation with eval command: 6.3.2.1. Single-shell method
terminating: 6.3.2.1. Single-shell method
SSH1 and SSH2 (products): 4.1. SSH1 and SSH2
ftp sources: 4.1.2. Obtaining the Distribution
SSH-ARCH: 3.5.1. Protocol Differences (SSH-1 Versus SSH-2)
ssh-askpass: 2.5. The SSH Agent
6.3.3. Loading Keys with ssh-add
SSH-AUTH: 3.5.1. Protocol Differences (SSH-1 Versus SSH-2)
SSH Communications Security, Ltd.: 1.5. History of SSH
4.2. F-Secure SSH Server
SSH-CONN: 3.5.1. Protocol Differences (SSH-1 Versus SSH-2)
.ssh directory
permissions: 5.4.2.1. Acceptable permissions for user files
ssh-keygen: 2.4.2. Generating Key Pairs with ssh-keygen
3.3. The Architecture of an SSH System
6. Key Management and Agents
6.2. Creating an Identity
default identity overwrite problem: 12.2.3.2. ssh-keygen
detection of RSA support, OpenSSH: 6.2.3. Generating RSA/DSA Keys for OpenSSH
host key generation by an ordinary user: 5.2.2. Running as an Ordinary User
Windows ports: 14.1.7. Create a Key Pair
ssh-keyscan: 13.4. Other SSH-Related Products
ssh-probe2: 5.4.3.9. Discovering other servers
~/ssh/rc files: 5.6.4. Arbitrary Actions with /etc/sshrc
SSH2 product: 1.5. History of SSH
SSH (product for BeOS): 13.3. Table of Products
SSH Protocol Architecture: 3.5.1. Protocol Differences (SSH-1 Versus SSH-2)
SSH-related files, securing: 10.3.3. /etc/ssh2/sshd2_config
SSH (Secure Shell): 1. Introduction to SSH
agents: 6.3. SSH Agents
architecture: 1.1. What Is SSH?
3.3. The Architecture of an SSH System
authentication systems, supported: 3.1.3. Authentication
clients
initiating remote terminal sessions: 2.2. Remote Terminal Sessions with ssh
troubleshooting: 12.2.5.1. General client problems
connecting through gateway hosts: 11.5. Connecting Through a GatewayHost
connections, terminating: 9.2.9. Termination
difference between products, commands, and protocols: 1.3.1. Protocols, Products, Clients, and Confusion
features: 0.1. Protect Your Network with SSH
history: 1.5. History of SSH
identity filenames, different versions: 2.4.2. Generating Key Pairs with ssh-keygen
implementations, common features: 13.1. Common Features
inclusion in TCP/IP services map: 5.4.3.2. Invocation by inetd
Kerberos: 11.4.1. Comparing SSH and Kerberos
mailing lists: 12.3.3. Mailing Lists
non-Unix implementations: 13. Overview of Other Implementations
products
denotation: 1.3.1. Protocols, Products, Clients, and Confusion
extraction of zipped files: 4.1.2.1. Extracting the files
features: 4.1.1. Features
verification with PGP: 4.1.2.2. Verifying with PGP
protocols: 1.3. The SSH Protocol
documentation: 3. Inside SSH
features: 3.1. Overview of Features
supported encryption algorithms: 3.1.1. Privacy (Encryption)
version strings: 3.4.1. Establishing the Secure Connection
recommended configuration: 10. A Recommended Setup
reporting bugs: 12.4. Reporting Bugs
running as ordinary user: 5.2.2. Running as an Ordinary User
running as superuser: 5.2.1. Running as the Superuser
servers
invocation: 5.2. Running the Server
server names: 5.1. The Name of the Server
table of product features: 13.3. Table of Products
top ten questions: 12.1.2. Server Debugging
troubleshooting: 12. Troubleshooting and FAQ
Usenet newsgroups: 12.3.2. Usenet Newsgroups
versions: 0.6. Supported Platforms
web sites: 12.3.1. Web Sites
13. Overview of Other Implementations
SSH Secure Shell (product): 13.3. Table of Products
ssh-signer2: 3.5.2.3. Setuid client
4.1.5.2. Installation, files, and directories
7.4.12. Program Locations
SSH-TRANS: 3.5.1. Protocol Differences (SSH-1 Versus SSH-2)
Ssh1AgentCompatibility (keyword, SSH2): 7.4.14. SSH1/SSH2 Compatibility
SSH_ALL_SCP_STATS: 4.1.5.11. scp behavior
7.5.7.1. scp1 statistics
SSH_AUTH_SOCK: 11.1.2.3. Using an agent
sshCE: 13.3. Table of Products
SSH_CLIENT: 7.4.4.2. Forcing a nonprivileged local port
SSH2_CLIENT environment variable
simulating SSH1 from feature in SSH2: 8.2.5.1. Simulating "from" with SSH2
Ssh1Compatibility: 5.9. Compatibility Between SSH-1 and SSH-2 Servers
7.4.14. SSH1/SSH2 Compatibility
recommended setting: 10.3.3. /etc/ssh2/sshd2_config
ssh2_config file: 7.1.3.2. Global and local files
sshd
configuration: 5. Serverwide Configuration
configuration file
alternate: 5.3.1. Server Configuration Files
5.4.1.4. Server configuration file
configuration files: 5.3.1. Server Configuration Files
forcing recognition, new config files: 12.2.4.1. sshd_config, sshd2_config
keywords: B.3. sshd Keywords
options: B.2. sshd Options
Windows ports: 14.1. Obtaining and Installing Clients
14.3. Obtaining and Installing the Server
sshd1 default path: 4.1.5.9. User logins and shells
sshd2_config: 5.3.1. Server Configuration Files
5.3.1. Server Configuration Files
5.7. Subsystems
recommended settings: 10.3.3. /etc/ssh2/sshd2_config
sshdfwd: 9.4.1. TCP-wrappers Configuration
sshdfwd-x11: 9.4.1. TCP-wrappers Configuration
SSHDOS: 13.3. Table of Products
Sshd1Path: 5.9. Compatibility Between SSH-1 and SSH-2 Servers
sshd.pid: 5.3.3. Changing the Configuration
ssh.el: 13.4. Other SSH-Related Products
sshexec.com: 13.3. Table of Products
ssh_known_hosts file: 3.5.2.1. Host keys
4.1.6. Creating the Serverwide Known-Hosts File
7.4.3. Host Keys and Known-Hosts Databases
SSH_NO_ALL_SCP_STATS: 4.1.5.11. scp behavior
7.5.7.1. scp1 statistics
SSH_NO_SCP_STATS: 4.1.5.11. scp behavior
7.5.7.1. scp1 statistics
SSH_ORIGINAL_COMMAND: 8.2.4.4. Examining the client's original command
11.5.2.1. Passing along the remote command
SSHOS2: 13.3. Table of Products
Ssh1Path: 7.4.14. SSH1/SSH2 Compatibility
ssh.pid file, path specification: 4.3.5. Compilation Flags
ssh_prng_cmds: 3.7. Randomness
4.3.4. Randomness
sshregex: A. SSH2 Manpage for sshregex
SSH_SCP_STATS: 4.1.5.11. scp behavior
7.5.7.1. scp1 statistics
SshSignerPath: 7.4.12. Program Locations
SSH_SOCKS_SERVER: 4.1.5.8. SOCKS proxy support
7.4.6.2. SOCKS in SSH2
SSH_TTY environment variables: 7.4.5.5. Pseudo-terminal allocation (TTY/PTY/PTTY)
8.2.9. Disabling TTY Allocation
SSL (Secure Socket Layers): 1.6.6. Secure Socket Layer (SSL) Protocol
TCP-based applications, enhanced with: 1.6.7. SSL-Enhanced Telnet and FTP
starting agents: 6.3.2. Starting an Agent
StrictHostKeyChecking: 7.4.3.1. Strict host key checking
StrictModes: 5.4.2.1. Acceptable permissions for user files
recommended setting: 10.3.2. /etc/sshd_config
stunnel: 1.6.8. stunnel
subsystems: 5.3.1. Server Configuration Files
5.7. Subsystems
subsystems (SSH2): 7.4.13. Subsystems
swapping, security risks of: 10.7.1. NFS Security Risks
symbolic links, created by SSH installations: 4.1.4.1. SSH1 and SSH2 on the same machine
symmetric ciphers (see cryptography)
SYN flood attacks: 3.11.2. IP and TCP Attacks
syslog: 5.8.1. Logging and SSH1
5.8.1. Logging and SSH1
SyslogFacility: 5.8.3. Logging and OpenSSH
5.8.3. Logging and OpenSSH


Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z


Library Navigation Links

Copyright © 2002 O'Reilly & Associates, Inc. All Rights Reserved.