Index: A
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: A
- AAA (authentication, authorization, and accounting): 4.3.3. PAM
 
- access control: 5.5.2. Access Control
 
  
  - custom login programs: 5.5.3. Selecting a Login Program
 
  
  - groups: 5.5.2.2. Group access control
 
  
  - per-account configuration, domain and host restriction: 8.2.5. Restricting Access by Host or Domain 
 
  
  - restriction to root: 5.6.4.1. /etc/nologin
 
  
  - summary of controls, table: 5.5.2.7. Summary of authentication and access control
 
  
  - superuser: 5.5.2.5. Root access control
 
  
  - trusted-host authentication, requirements: 8.3. Trusted-Host Access Control 
 
 
- account access control: 5.5.2.1. Account access control
 
- account expiration warnings: 5.6.2. Expired Account or Password
 
- AccountExpireWarningDays: 5.6.2. Expired Account or Password
 
- AFS (Andrew File System): 3.4.2.4. Kerberos authentication
 
  
  - authentication using: 5.5.1.12. AFS token passing
 
  
  - OpenSSH, enabling in: 4.3.5. Compilation Flags
 
  
  - security: 10.7.3. AFS Access Problems
 
  
  - SSH issues: 10.7. Remote Home Directories (NFS, AFS)
 
 
- AFSTokenPassing: 5.5.1.12. AFS token passing
 
- agents: 2.5. The SSH Agent
 
  - 3.3. The Architecture of an SSH System
 
  - 6.3. SSH Agents
 
  
  - authentication, batch and cron jobs: 11.1.2.3. Using an agent
 
  
  - automatic loading of: 6.3.3.1. Automatic agent loading (single-shell method)
 
  
  - compatibility
 
    
    - SSH-1 and SSH-2: 4.1.5.13. SSH-1/SSH-2 agent compatibility
 
      - 6.3.2.4. SSH-1 and SSH-2 agent compatibility
 
    
 
    
    - SSH1 and SSH2: 7.4.14. SSH1/SSH2 Compatibility
 
  
 
  
  - keys
 
    
    - deleting: 2.5. The SSH Agent
 
      - 6.3.3. Loading Keys with ssh-add
 
    
 
    
    - listing: 2.5. The SSH Agent
 
      - 6.3.3. Loading Keys with ssh-add
 
    
 
    
    - loading: 2.5. The SSH Agent
 
    
    - security: 6.3.1. Agents Don't Expose Keys
 
    
    - timouts: 6.3.3. Loading Keys with ssh-add
 
  
 
  
  - locking: 2.5. The SSH Agent
 
  
  - locking, unlocking in OpenSSH: 6.3.3. Loading Keys with ssh-add
 
  
  - SSH: 6.3. SSH Agents
 
  
  - starting: 6.3.2. Starting an Agent
 
  
  - terminating: 6.3.2.1. Single-shell method
 
  
  - uids for batch jobs: 11.1.2.3. Using an agent
 
 
- agent forwarding: 2.5.3. Agent Forwarding 
 
  - 3.1.5. Forwarding ( Tunneling)
 
  - 5.4.3.10. Agent forwarding
 
  
  - connections in series: 2.5.3. Agent Forwarding 
 
  
  - disabling: 8.2.8. Disabling Forwarding 
 
  
  - limiting: 6.3.3. Loading Keys with ssh-add
 
 
- agent invocation
 
  
  - common mistakes: 6.3.2. Starting an Agent
 
  
  - single shell method: 6.3.2.1. Single-shell method
 
  
  - subshell method: 6.3.2.2. Subshell method
 
  
  - timing: 6.3.2.2. Subshell method
 
 
- algorithm negotiation: 3.5.1.1. Algorithm choice and negotiation
 
- algorithms: 3.9. Algorithms Used by SSH
 
  
  - ciphers used by SSH: 3.9. Algorithms Used by SSH
 
  
  - encryption, configuration of server: 5.4.5. Encryption Algorithms
 
  
  - extensible namespace for, in SSH-2: 3.5.1.1. Algorithm choice and negotiation
 
  
  - MAC (Message Authentication Code): 5.4.5.1. MAC algorithms
 
  
  - performance comparisons: 3.9.2.8. Speed comparisons
 
  
  - public-key: 3.9.1.1. Rivest-Shamir-Adleman (RSA)
 
  
  - secret-key: 3.9.2.1. International Data Encryption Algorithm (IDEA)
 
  
  - in SSH-1 and SSH-2 ciphers: 3.9. Algorithms Used by SSH
 
  
  - in SSH protocols: 3.9. Algorithms Used by SSH
 
  
  - support under different implementations: 3.9. Algorithms Used by SSH
 
 
- AllowAgentForwarding: 5.4.3.10. Agent forwarding
 
- AllowCshrcSourcingWithSubsystems: 5.7.1. Disabling the Shell Startup File
 
- AllowedAuthentications: 5.5.1. Authentication
 
  - 5.5.1.1. Password authentication
 
  - 5.5.1.2. Public-key authentication
 
  - 7.4.10.2. The server is the boss
 
  
  - recommended setting: 5.5.1.4. Stronger trusted-host authentication
 
 
- AllowForwardingPort: 9.2.10.2. Serverwide configuration
 
- AllowForwardingTo: 9.2.10.2. Serverwide configuration
 
- AllowGroups: 5.5.2.2. Group access control
 
- AllowHosts: 5.5.2.1. Account access control
 
  - 5.5.2.3. Hostname access control
 
  - 5.9.1. Security Issues with SSH-1 Compatibility Mode in SSH2
 
  
  - recommended setting: 10.3.2. /etc/sshd_config
 
  
  - syntax of values: 5.5.2.4. shosts access control
 
 
- AllowSHosts: 5.5.2.4. shosts access control
 
- AllowTcpForwarding: 5.4.3.11. Forwarding
 
  - 9.2.10.2. Serverwide configuration
 
  
  - recommended setting: 10.3.2. /etc/sshd_config
 
 
- AllowTcpForwardingForGroups: 5.4.3.11. Forwarding
 
  - 9.2.10.2. Serverwide configuration
 
 
- AllowTcpForwardingForUsers: 5.4.3.11. Forwarding
 
  - 9.2.10.2. Serverwide configuration
 
 
- AllowUsers: 5.5.2.1. Account access control
 
- AllowX11Forwarding: 5.4.3.11. Forwarding
 
  - 9.3.4.2. Serverwide configuration
 
 
- AmigaSSH: 13.3. Table of Products
 
- Andrew File System (see AFS)
 
- AppGate: 13.3. Table of Products
 
- ARCFOUR (see RC4)
 
- architecture
 
  
  - SSH: 1.1. What Is SSH?
 
  
  - SSH-2: 3.5.1. Protocol Differences (SSH-1 Versus SSH-2)
 
  
  - SSH systems: 3.3. The Architecture of an SSH System
 
 
- as-user access: 3.6. As-User Access (userfile)
 
- asymmetric ciphers (see cryptography)
 
- authentication: 0.10. Acknowledgments
 
  - 1.3. The SSH Protocol
 
  - 2.4. Authentication by Cryptographic Key
 
  - 3.1.3. Authentication 
 
  - 5.5. Letting People in: Authentication and Access Control
 
  
  - AFS: 5.5.1.12. AFS token passing
 
  
  - batch and cron jobs: 11.1. Unattended SSH: Batch or cron Jobs
 
    
    - using agents: 11.1.2.3. Using an agent
 
  
 
  
  - client authentication methods: 3.4.2. Client Authentication
 
  
  - client configuration: 7.4.10. Authentication
 
  
  - of client to server: 3.4.2. Client Authentication
 
  
  - compile-time configuration: 4.1.5.7. Authentication
 
  
  - cross-realm: 11.4.4.3. Cross-realm authentication
 
  
  - cryptographic keys: 2.4. Authentication by Cryptographic Key
 
  
  - digital signatures: 3.2.2. Public- and Secret-Key Cryptography
 
  
  - empty passwords: 5.6.3. Empty Passwords
 
  
  - hostbased, under SSH-2: 3.5.1.6. Hostbased authentication
 
  
  - Kerberos: 3.4.2.4. Kerberos authentication
 
    - 5.5.1.7. Kerberos authentication
 
    - 11.4. Kerberos and SSH
 
  
 
  
  - Kerberos-5: 11.4.3.1. Principals and tickets
 
  
  - known-hosts mechanism: 2.3.1. Known Hosts
 
  
  - limitations of SSH2 implementation: 3.5.1.6. Hostbased authentication
 
  
  - NiftyTelnet SSH: 17.2.1. Authentication
 
  
  - PAM: 5.5.1.11. PAM authentication
 
  
  - by password: 5.5.1.1. Password authentication
 
  
  - of passwords in OpenSSH: 4.3.3. PAM
 
  
  - PGP: 5.5.1.6. PGP authentication
 
  
  - public-key: 5.5.1.2. Public-key authentication
 
    
    - compared to password: 2.4. Authentication by Cryptographic Key
 
      - 2.4.3. Installing a Public Key on an SSH ServerMachine
 
    
 
  
 
  
  - recommended setup: 10.3.2. /etc/sshd_config
 
  
  - Rhosts: 3.4.2.3. Trusted-host authentication (Rhosts and RhostsRSA)
 
    - 5.5.1.3. Rhosts authentication
 
    
    - security weaknesses of: 8.3. Trusted-Host Access Control 
 
  
 
  
  - Rhosts and RhostsRSA, disabling: 7.4.4.2. Forcing a nonprivileged local port
 
  
  - RhostsRSA: 3.4.2.3. Trusted-host authentication (Rhosts and RhostsRSA)
 
    - 5.5.1.4. Stronger trusted-host authentication
 
    
    - compared to public-key, SSH1: 3.4.2.2. Public-key authentication
 
  
 
  
  - SecurID: 5.5.1.9. SecurID authentication
 
  
  - of server to client: 3.4.1. Establishing the Secure Connection
 
  
  - servers: 3.1.3. Authentication 
 
  
  - S/Key: 5.5.1.10. S/Key authentication
 
  
  - SSH-2: 3.5.1.4. Authentication
 
  
  - SSH1, client to server, order of methods: 3.4.2. Client Authentication
 
  
  - SSH2, PGP keys: 6.1.2. SSH2 Identities
 
  
  - summary of controls, table: 5.5.2.7. Summary of authentication and access control
 
    - 5.5.2.7. Summary of authentication and access control
 
  
 
  
  - systems supported under SSH: 3.1.3. Authentication 
 
  
  - troubleshooting: 12.2.2.1. General authentication problems
 
  
  - trusted-host authorization: 8.3. Trusted-Host Access Control 
 
  
  - user: 3.1.3. Authentication 
 
  
  - using a custom login program: 5.5.3. Selecting a Login Program
 
  
  - without passwords or passphrases: 2.6. Connecting Without a Password or Passphrase
 
  
  - X forwarding: 9.3.5. X Authentication
 
 
- authentication agents: 1.4.4. Keys and Agents
 
- Authentication Protocol: 3.5.1. Protocol Differences (SSH-1 Versus SSH-2)
 
- authentication-related keywords, table: 5.5.1. Authentication
 
- authentication spoofing
 
  
  - improving: 9.3.5.5. Improving authentication spoofing
 
  
  - security: 9.3.5.4. SSH and authentication spoofing
 
  
  - X forwarding: 9.3.5.4. SSH and authentication spoofing
 
 
- AuthenticationNotify: 7.4.10.3. Detecting successful authentication
 
- AuthenticationSuccessMsg: 7.4.10.3. Detecting successful authentication
 
  
  - vs. AuthenticationNotify: 7.4.10.3. Detecting successful authentication
 
 
- authenticator: 2.4.1. A Brief Introduction to Keys
 
- authorization: 3.1.4. Authorization
 
  - 5.5.2. Access Control
 
  
  - authorized keys files: 6.1.1. SSH1 Identities
 
  
  - Kerberos-5: 11.4.3.5. Authorization
 
  
  - per-account: 5.4.1.6. Per-account authorization files
 
 
- authorization files: 8.2. Public Key-Based Configuration 
 
  - B.10. Identity and Authorization Files
 
  
  - OpenSSH: 8.2.3. OpenSSH Authorization Files 
 
  
  - simulating SSH1 from feature in SSH2: 8.2.5.1. Simulating "from" with SSH2 
 
  
  - SSH2 syntax: 8.2.2. SSH2 Authorization Files 
 
 
- AuthorizationFile: 5.4.1.6. Per-account authorization files
 
- authorized_keys: 2.4.3. Installing a Public Key on an SSH ServerMachine
 
  
  - environment option (SSH1, OpenSSH): 8.2.6. Setting Environment Variables 
 
  
  - idle-timeout option: 8.2.7. Setting Idle Timeout 
 
  
  - idle-timeouts, setting: 10.4. Per-Account Configuration
 
  
  - no-agent-forwarding option: 8.2.8. Disabling Forwarding 
 
  
  - no-port-forwarding option: 8.2.8. Disabling Forwarding 
 
    - 9.2.10.3. Per-account configuration
 
  
 
  
  - no-pty option (SSH1, OpenSSH): 8.2.9. Disabling TTY Allocation
 
  
  - permissions: 5.4.2.1. Acceptable permissions for user files
 
  
  - recommended restrictions: 10.4. Per-Account Configuration
 
 
- authsrv (see TIS)
 
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2002
O'Reilly & Associates, Inc.
All Rights Reserved.