Index: K
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: K
- kadmin.local: 11.4.4.6. Kerberos-5 setup notes
 
- KeepAlive: 5.4.3.4. KeepAlive
 
  - 7.4.4.3. Keepalive messages
 
 
- kerberized applications: 1.6.3. Kerberos
 
  
  - running: 11.4.3.4. Running a kerberized application
 
 
- Kerberos: 1.6.3. Kerberos
 
  - 11.4. Kerberos and SSH
 
  
  - authentication: 5.5.1.7. Kerberos authentication
 
    
    - batch and cron jobs: 11.1.4. Kerberos
 
  
 
  
  - compile-time configuration: 4.1.5.7. Authentication
 
  
  - configuration file: 11.4.1.1. Infrastructure
 
  
  - conflicts with NAT (Network Address Translation): 11.4.4.2. Kerberos and NAT 
 
  
  - cross-realm authentication: 11.4.4.3. Cross-realm authentication
 
  
  - firewall issues: 11.4.4.2. Kerberos and NAT 
 
  
  - hierarchical realms: 11.4.4.3. Cross-realm authentication
 
  
  - installation and administration: 11.4.1.1. Infrastructure
 
  
  - KDC (Key Distribution Center): 11.4.1.1. Infrastructure
 
    - 11.4.3.1. Principals and tickets
 
  
 
  
  - Kerberos-4 vs. Kerberos-5: 11.4.5. Kerberos-4 in OpenSSH
 
  
  - .klogin: 11.4.5. Kerberos-4 in OpenSSH
 
  
  - in OpenSSH: 4.3.5. Compilation Flags
 
  
  - password authentication in SSH: 11.4.4.1. Kerberos password authentication
 
  
  - performance: 11.4.1.5. Performance
 
  
  - principals: 11.4.5. Kerberos-4 in OpenSSH
 
  
  - security: 11.4.1.3. Security of authenticators
 
  
  - and SSH: 11.4.1. Comparing SSH and Kerberos
 
  
  - support, lack of, in non-Unix SSH: 11.4.2. Using Kerberos with SSH
 
  
  - TGT (Ticket Granting Tickets): 11.4.4.4. TGT forwarding
 
  
  - tickets: 1.6.3. Kerberos
 
    - 11.4.1.3. Security of authenticators
 
    - 11.4.3.1. Principals and tickets
 
  
 
  
  - transparency, lack of: 11.4.1.2. Integrating with other applications
 
  
  - user accounts database: 11.4.1.4. Account administration
 
 
- Kerberos-5: 11.4.3. A Brief Introduction to Kerberos-5
 
  
  - authentication: 11.4.3.1. Principals and tickets
 
  
  - authorization: 11.4.3.5. Authorization
 
  
  - compatibility mode, Kerberos-4: 11.4.5.1. Kerberos-4 compatibility mode in Kerberos-5
 
  
  - configuration: 11.4.4.6. Kerberos-5 setup notes
 
  
  - instances: 11.4.3.1. Principals and tickets
 
  
  - key files: 11.4.3.1. Principals and tickets
 
  
  - kinit command: 11.4.3.2. Obtaining credentials with kinit
 
  
  - klist command: 11.4.3.3. Listing credentials with klist
 
  
  - krb5.conf file: 11.4.4.6. Kerberos-5 setup notes
 
  
  - names: 11.4.3.1. Principals and tickets
 
  
  - principals: 11.4.3.1. Principals and tickets
 
  
  - realms: 11.4.3.1. Principals and tickets
 
  
  - support for, configuring in SSH1: 11.4.4. Kerberos-5 in SSH1
 
 
- Kerberos-4 protocol, incorporation within AFS: 5.5.1.12. AFS token passing
 
- Kerberos-based authentication: 3.4.2.4. Kerberos authentication
 
- KerberosAuthentication: 5.5.1.7. Kerberos authentication
 
  - 11.4.4. Kerberos-5 in SSH1
 
  - 11.4.5. Kerberos-4 in OpenSSH
 
 
- KerberosOrLocalPasswd: 5.5.1.7. Kerberos authentication
 
- KerberosTgtPassing: 5.5.1.7. Kerberos authentication
 
- KerberosTicketCleanup: 5.5.1.7. Kerberos authentication
 
- keys: 1.4.4. Keys and Agents
 
  - 2.4. Authentication by Cryptographic Key
 
  - 3.2. A Cryptography Primer
 
  - 3.3. The Architecture of an SSH System
 
  
  - agents, deleting from: 2.5. The SSH Agent
 
  
  - agents, loading into: 2.5. The SSH Agent
 
  
  - changing: 2.4.4. If You Change Your Key
 
  
  - changing passphrase without key regeneration: 12.2.3.2. ssh-keygen
 
  
  - data format, authorized key files: 2.4.3. Installing a Public Key on an SSH ServerMachine
 
  
  - deleting from agents
 
    
    - OpenSSH: 6.3.3. Loading Keys with ssh-add
 
  
 
  
  - DSA: 2.4.2. Generating Key Pairs with ssh-keygen
 
  
  - incompatibility, SSH1 and SSH2: 12.2.3.1. General key/agent problems
 
  
  - invalid format message from client: 12.2.3.1. General key/agent problems
 
  
  - key files, editing: 2.4.3. Installing a Public Key on an SSH ServerMachine
 
  
  - key generator: 3.3. The Architecture of an SSH System
 
  
  - loading into agents: 6.3.3. Loading Keys with ssh-add
 
  
  - login key, protecting: 8.2.4.1. Security issues 
 
  
  - management: 1.4.2. Secure File Transfer
 
    - 6. Key Management and Agents
 
  
 
  
  - manual specification failure: 12.2.3.1. General key/agent problems
 
  
  - one-time password systems: 5.5.1.10. S/Key authentication
 
  
  - public and private: 2.4.1. A Brief Introduction to Keys
 
  
  - public-key authentication: 2.4. Authentication by Cryptographic Key
 
  
  - recommended length: 10.5. Key Management
 
    - 12.2.3.2. ssh-keygen
 
  
 
  
  - replacing, importance of: 3.5.1.7. Session rekeying
 
  
  - restrictions, batch and cron jobs: 11.1.5.3. Restricted-use keys
 
  
  - RSA: 2.4.2. Generating Key Pairs with ssh-keygen
 
  
  - secrecy: 2.4.2. Generating Key Pairs with ssh-keygen
 
  
  - SSH versions, conversion between: 6.2.1. Generating RSA Keys for SSH1
 
    - 6.2.2. Generating RSA/DSA Keys for SSH2
 
    - 6.2.3. Generating RSA/DSA Keys for OpenSSH
 
  
 
 
- key-based authentication, X Windows: 9.3.5.1. How X authentication works
 
- key-distribution: 3.2.2. Public- and Secret-Key Cryptography
 
- key files, recommended restriction settings: 10.4. Per-Account Configuration
 
- key generation
 
  
  - command-line options (SSH2): 6.2.2. Generating RSA/DSA Keys for SSH2
 
  
  - encryption algorithms (SSH2): 6.2.2. Generating RSA/DSA Keys for SSH2
 
  
  - escape sequence for: 2.3.2. The Escape Character
 
  
  - OpenSSH: 6.2.3. Generating RSA/DSA Keys for OpenSSH
 
  
  - processing time: 2.4.2. Generating Key Pairs with ssh-keygen
 
  
  - progress indicator: 12.2.3.2. ssh-keygen
 
  
  - RSA for SSH1: 6.2.1. Generating RSA Keys for SSH1
 
  
  - SSH2: 6.2.2. Generating RSA/DSA Keys for SSH2
 
 
- Key (keyword): 6.1.2. SSH2 Identities
 
  - 8.2.2. SSH2 Authorization Files 
 
 
- key-ownership problem: 3.5.1.3. Key/identity binding
 
- key pairs: 2.4.1. A Brief Introduction to Keys
 
  - 6.1. What Is an Identity?
 
  - 7.4.2. User Identity
 
  
  - filenames: 6.1. What Is an Identity?
 
 
- KeyRegenerationInterval: 5.4.4. Server Key Generation
 
- keywords: 5.3.1. Server Configuration Files
 
  - B.3. sshd Keywords
 
  
  - command-line: 7.1.3.1. Keywords versus command-line options
 
 
- kinit: 5.5.1.12. AFS token passing
 
  - 11.1.4. Kerberos
 
  - 11.4.1.3. Security of authenticators
 
 
- klog: 5.5.1.12. AFS token passing
 
- known-host mechanism: 2.3.1. Known Hosts
 
- known hosts: 2.3.1. Known Hosts
 
  
  - database: 3.3. The Architecture of an SSH System
 
  
  - directories: 5.5.1.5. Fetching public keys of known hosts
 
  
  - files: 4.1.6. Creating the Serverwide Known-Hosts File
 
    
    - security, serverwide hosts files: 4.1.6. Creating the Serverwide Known-Hosts File
 
  
 
 
- known_hosts: 3.5.2.1. Host keys
 
  - 7.4.3. Host Keys and Known-Hosts Databases
 
 
- knownhosts map, SSH2: 3.5.2.1. Host keys
 
- krb5.conf: 11.4.1.1. Infrastructure
 
  - 11.4.5. Kerberos-4 in OpenSSH
 
 
- krb5.keytab: 11.4.3.1. Principals and tickets
 
  - 11.4.5. Kerberos-4 in OpenSSH
 
 
- krb.realms: 11.4.5. Kerberos-4 in OpenSSH
 
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2002
O'Reilly & Associates, Inc.
All Rights Reserved.