Index: C
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: C
- case-insensitivity, keywords: 5.3.1. Server Configuration Files
 
- CAST algorithm: 3.9.2.7. CAST
 
- certificate authorities: 1.6.6. Secure Socket Layer (SSL) Protocol
 
- Chaffee Port: 13.3. Table of Products
 
- challenge: 2.4.1. A Brief Introduction to Keys
 
- channels: 9.2.3.1. Common elements
 
- check bytes: 3.4.1. Establishing the Secure Connection
 
- CheckHostIP: 7.4.3.1. Strict host key checking
 
- CheckMail: 5.6.1. Welcome Messages for the User
 
- chosen-plaintext attacks: 3.4.2.2. Public-key authentication
 
- ChRootGroups: 5.5.2.6. Restricting directory access with chroot
 
- ChRootUsers: 5.5.2.6. Restricting directory access with chroot
 
- Cipher: 7.4.8. Encryption Algorithms
 
- cipher block chaining: 5.4.5. Encryption Algorithms
 
- ciphers: 3.2. A Cryptography Primer
 
  
  - used by SSH: 3.9. Algorithms Used by SSH
 
 
- ClearAllForwardings: 3.8.1. scp1 Details
 
  - 9.2.2. Trouble with Multiple Connections
 
  - 11.5.3. Another Approach: SSH-in-SSH(Port Forwarding)
 
 
- client: 3.3. The Architecture of an SSH System
 
- client authentication: 3.4.2. Client Authentication
 
- client configuration: 7. Advanced Client Use
 
  
  - authentication: 7.4.10. Authentication
 
    
    - method, specifying: 7.4.10.2. The server is the boss
 
  
 
  
  - command-line options: 7.1.2. Command-Line Options
 
  
  - configuration files: 7.1.3. Client Configuration Files
 
  
  - connection attempts, setting number of: 7.4.5.1. Number of connection attempts
 
  
  - data compression, enabling: 7.4.11. Data Compression
 
  
  - encryption algorithms: 7.4.8. Encryption Algorithms
 
  
  - environment variables: 7.1.1. Environment Variables
 
  
  - file sections: 7.1.3.3. Configuration file sections
 
  
  - global and local files: 7.1.3.2. Global and local files
 
  
  - host specification: 7.1.3.3. Configuration file sections
 
  
  - IPv4 or IPv6 (Internet Protocol Versions), forcing use: 7.4.4.5. Requiring IPv4 and IPv6
 
  
  - keywords: 7.1.3. Client Configuration Files
 
  
  - logging on to non-SSH servers: 7.4.5.8. RSH issues
 
  
  - recommended settings: 10.6. Client Configuration
 
 
- client configuration files, unexpected behaviors: 12.2.5.2. Client configuration file
 
- client-server interactions: 2.4.1. A Brief Introduction to Keys
 
  
  - check bytes: 3.4.1. Establishing the Secure Connection
 
  
  - SSH-1, connection: 3.4.1. Establishing the Secure Connection
 
 
- clients, debugging: 12.1.1. Client Debugging
 
- collision-resistance of hash functions: 3.2.3. Hash Functions
 
- Command: 8.2.2. SSH2 Authorization Files 
 
- command execution (see remote commands, secure execution)
 
- command-line options
 
  
  - make-ssh-known-hosts: 4.1.6.1. make-ssh-known-hosts command-line flags
 
  
  - for serverwide configuration: 5.3.2. Command-Line Options
 
  
  - sftp: 2.7.1. sftp
 
  
  - ssh-keygen1: 6.2.1. Generating RSA Keys for SSH1
 
  
  - verbose: 2.3. Adding Complexity to the Example
 
 
- comments, in server configuration files: 5.3.1. Server Configuration Files
 
- comparison of SSH1 and SSH2 (products): 3.5.2. Implementation Differences
 
- compatibility
 
  
  - agents, SSH-1 and SSH-2: 6.3.2.4. SSH-1 and SSH-2 agent compatibility
 
    - 6.3.3. Loading Keys with ssh-add
 
  
 
  
  - agents, SSH1 and SSH2: 4.1.5.13. SSH-1/SSH-2 agent compatibility
 
  
  - SSH-1 and SSH-2: 5.9. Compatibility Between SSH-1 and SSH-2 Servers
 
  
  - SSH1 and SSH2: 3.5.2.4. SSH-1 backward compatibility
 
    - 7.4.14. SSH1/SSH2 Compatibility
 
  
 
 
- compensation attacks (see insertion attacks)
 
- compilation and installation
 
  
  - OpenSSH: 4.3.5. Compilation Flags
 
  
  - SSH1: 4.1.3. Building and Installing SSH1
 
    - 4.1.3. Building and Installing SSH1
 
  
 
  
  - SSH1 and SSH2 on one machine: 4.1.4.1. SSH1 and SSH2 on the same machine
 
 
- compile-time configuration: 4.1.5. Compile-Time Configuration
 
  - 5.3. Server Configuration: An Overview
 
  
  - authentication support: 4.1.5.7. Authentication
 
  
  - debugging: 4.1.5.14. Debug output
 
  
  - port forwarding: 9.2.10.1. Compile-time configuration
 
  
  - recommended setup: 10.2. Compile-Time Configuration
 
  
  - rsh: 4.1.5.12. R-commands (rsh) compatibility
 
  
  - scp: 4.1.5.11. scp behavior
 
  
  - server: 0.4. Our Approach
 
  
  - user logins: 4.1.5.9. User logins and shells
 
  
  - X forwarding: 9.3.4.1. Compile-time configuration
 
 
- Compression: 7.4.11. Data Compression
 
- compression, under SSH-1: 3.4.4. Compression
 
- CompressionLevel: 7.4.11. Data Compression
 
- comp.security.ssh newsgroup: 0.10. Acknowledgments
 
  - 7.3. Introduction to Verbose Mode
 
 
- configuration
 
  
  - of clients: 7. Advanced Client Use
 
  
  - Kerberos-5: 11.4.4.6. Kerberos-5 setup notes
 
    
    - support in SSH1: 11.4.4. Kerberos-5 in SSH1
 
  
 
  
  - serverwide: 5. Serverwide Configuration
 
 
- configuration files: 3.3. The Architecture of an SSH System
 
  - 7.1.3.2. Global and local files
 
  
  - filenames: 5.4.1.4. Server configuration file
 
  
  - Kerberos: 11.4.1.1. Infrastructure
 
  
  - servers: 5.3.1. Server Configuration Files
 
 
- configuration flags: 4.1.5.1. Configuration standards
 
- configuration variables, .pinerc file: 11.3.1.2. Making Pine use SSH instead of rsh
 
- configure flags, viewing: 4.1.5. Compile-Time Configuration
 
- configure script
 
  
  - command-line flags: 4.1.5.1. Configuration standards
 
  
  - functions: 4.1.5. Compile-Time Configuration
 
 
- connecting side, SSH sessions: 9.2.3.2. Local versus remote forwarding: the distinction
 
- connection hijacking: 3.10.3. Connection Hijacking
 
- Connection Protocol: 3.5.1. Protocol Differences (SSH-1 Versus SSH-2)
 
- ConnectionAttempts: 7.4.5.1. Number of connection attempts
 
- connections
 
  
  - "listening": 9.2.1. Local Forwarding
 
  
  - shell scripts for: 5.6.4. Arbitrary Actions with /etc/sshrc
 
 
- control files, client, security: 10.7. Remote Home Directories (NFS, AFS)
 
- copyright terms, commercial versions of SSH: 4.1. SSH1 and SSH2
 
- covert channels: 3.11.4. Covert Channels
 
- CRC (Cyclic Redundancy Check): 3.2.3. Hash Functions
 
  - 3.9.3.1. CRC-32
 
 
- cron jobs
 
  
  - authentication: 11.1. Unattended SSH: Batch or cron Jobs
 
    
    - with agents: 11.1.2.3. Using an agent
 
    
    - with Kerberos: 11.1.4. Kerberos
 
    
    - passphrase: 11.1.2.1. Storing the passphrase in the filesystem
 
    
    - by password: 11.1.1. Password Authentication
 
    
    - plaintext keys: 11.1.2.2. Using a plaintext key
 
  
 
  
  - key restrictions: 11.1.5.3. Restricted-use keys
 
  
  - recommended configuration: 11.1.6. Recommendations
 
  
  - security precautions: 11.1.5. General Precautions for Batch Jobs
 
  
  - trusted-host authentication: 11.1.3. Trusted-Host Authentication
 
 
- cross-realm authentication: 11.4.4.3. Cross-realm authentication
 
- cryptanalysis: 3.2. A Cryptography Primer
 
- cryptographic keys (see keys)
 
- cryptography: 3.2. A Cryptography Primer
 
  
  - asymmetric ciphers: 3.2.2. Public- and Secret-Key Cryptography
 
  
  - bulk key: 3.2.2. Public- and Secret-Key Cryptography
 
  
  - digital signatures: 3.2.2. Public- and Secret-Key Cryptography
 
  
  - key-distribution problem: 3.2.2. Public- and Secret-Key Cryptography
 
  
  - public-key cryptography: 3.2.2. Public- and Secret-Key Cryptography
 
 
- CVS (Concurrent Versions System): 4.5.2. Concurrent Version System (CVS)
 
  
  - LOGNAME example: 4.5.2. Concurrent Version System (CVS)
 
    - 8.2.6.1. Example: CVS and $LOGNAME 
 
  
 
 
- Cygwin, installation: 14.1.4. Install Cygwin
 
  
  - autoexec.bat, modifying for: 14.1.2. Prepare autoexec.bat
 
 
- cygwin1.dll: 14.1.4. Install Cygwin
 
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2002
O'Reilly & Associates, Inc.
All Rights Reserved.