Index: P
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: P
- packets, TCP format: 3.4.1. Establishing the Secure Connection
 
- PAM (Pluggable Authentication Modules): 4.3.3. PAM
 
  - 5.5.1.11. PAM authentication
 
  
  - authentication using: 5.5.1.11. PAM authentication
 
  
  - configuration: 12.2.2.2. Password authentication
 
 
- passphrases: 2.4.2. Generating Key Pairs with ssh-keygen
 
  
  - batch or cron jobs: 11.1.2.1. Storing the passphrase in the filesystem
 
  
  - changing: 2.4.4. If You Change Your Key
 
    
    - SSH1: 6.2.1. Generating RSA Keys for SSH1
 
  
 
  
  - choosing a secure passphrase: 10.5. Key Management
 
  
  - limitations: 2.5. The SSH Agent
 
  
  - protecting: 7.4.5.7. Backgrounding a remote command, take two
 
  
  - selection: 6.2.4. Selecting a Passphrase
 
  
  - specifying
 
    
    - SSH1: 6.2.1. Generating RSA Keys for SSH1
 
  
 
  
  - troubleshooting, prompting for passphrase of wrong key: 12.2.2.4. Public-key authentication
 
 
- password authentication
 
  
  - SSH1: 3.4.2.1. Password authentication 
 
  
  - troubleshooting: 12.1.2. Server Debugging
 
 
- password expiration warnings: 5.6.2. Expired Account or Password
 
- password prompting
 
  
  - SSH1: 7.4.5.2. Password prompting in SSH1
 
 
- password prompts, suppression with batch mode: 7.4.5.4. Batch mode: suppressing prompts
 
- PasswordAuthentication: 5.5.1.1. Password authentication
 
- PasswordExpireWarningDays: 5.6.2. Expired Account or Password
 
- PasswordGuesses: 5.4.3.5. Failed logins
 
  - 5.4.3.5. Failed logins
 
 
- PasswordPrompt: 7.4.5.3. Password prompting in SSH2
 
- PasswordPromptHost: 7.4.5.2. Password prompting in SSH1
 
- PasswordPromptLogin: 7.4.5.2. Password prompting in SSH1
 
- passwords
 
  
  - authentication: 5.5.1.1. Password authentication
 
  
  - cracking: 3.11.1. Password Cracking
 
  
  - one-time passwords: 4.3.5. Compilation Flags
 
  
  - "one-time" use for authentication, SSH1: 3.4.2.5. One-time passwords
 
  
  - security risks: 2.4. Authentication by Cryptographic Key
 
    - 3.1.3. Authentication 
 
  
 
 
- PASV command: 11.2.1. The FTP Protocol
 
- PenguiNet: 13.3. Table of Products
 
- per-account authorization files: 5.4.1.6. Per-account authorization files
 
  
  - configuration failure: 12.2.3.4. Per-account authorization files
 
 
- per-account configuration: 4.1.5. Compile-Time Configuration
 
  - 5.3. Server Configuration: An Overview
 
  - 8. Per-Account Server Configuration
 
  
  - authentication issues: 8.1.2. Authentication Issues 
 
  
  - authentication using PGP (SSH2): 8.2.2.1. SSH2 PGP key authentication 
 
  
  - CVS: 8.2.6.1. Example: CVS and $LOGNAME 
 
  
  - disabling agent forwarding: 8.2.8. Disabling Forwarding 
 
  
  - disabling port forwarding: 8.2.8. Disabling Forwarding 
 
  
  - "from" option (SSH1, OpenSSH): 8.2.5. Restricting Access by Host or Domain 
 
  
  - limitations: 8.1. Limits of This Technique 
 
  
  - precedence: 8.1.1. Overriding Serverwide Settings 
 
  
  - public key based: 8.2. Public Key-Based Configuration 
 
  
  - rc file: 8.4. The User rc File 
 
  
  - recommended settings: 10.4. Per-Account Configuration
 
  
  - restriction of access by host or domain: 8.2.5. Restricting Access by Host or Domain 
 
  
  - server: 0.4. Our Approach
 
  
  - setting idle timeouts: 8.2.7. Setting Idle Timeout 
 
  
  - trusted-host authentication: 8.3. Trusted-Host Access Control 
 
 
- perfect forward secrecy: 3.4.1. Establishing the Secure Connection
 
- permissions
 
  
  - for batch and cron jobs: 11.1.5.1. Least-privilege accounts
 
  
  - for newly created files: 5.4.2.2. Permissions for newly created files
 
 
- PermitEmptyPasswords: 5.6.3. Empty Passwords
 
- PermitRootLogin: 5.5.2.5. Root access control
 
- PGP (Pretty Good Privacy): 1.4.2. Secure File Transfer
 
  
  - authentication: 5.5.1.6. PGP authentication
 
    
    - SSH2: 8.2.2.1. SSH2 PGP key authentication 
 
  
 
  
  - compile-time configuration: 4.1.5.7. Authentication
 
  
  - key authentication
 
    
    - SSH2: 6.1.2. SSH2 Identities
 
    
    - troubleshooting: 12.2.2.5. PGP key authentication
 
  
 
  
  - OpenPGP compliance: 4.1.5.7. Authentication
 
  
  - vs. SSH: 1.6.2. Pretty Good Privacy (PGP)
 
 
- PGP signature of SSH distributions, verification: 4.1.2.2. Verifying with PGP
 
- PgpKeyFingerprint: 5.5.1.6. PGP authentication
 
- PgpKeyId: 5.5.1.6. PGP authentication
 
- PgpKeyName: 5.5.1.6. PGP authentication
 
- PgpPublicKeyFile: 5.5.1.6. PGP authentication
 
- PgpSecretKeyFile: 5.5.1.6. PGP authentication
 
  - 5.5.1.6. PGP authentication
 
 
- pid file: 5.3.3. Changing the Configuration
 
  
  - OpenSSH: 4.3.5. Compilation Flags
 
 
- PidFile: 5.4.1.3. Process ID file
 
  - 5.4.2.2. Permissions for newly created files
 
 
- Pine: 11.3. Pine, IMAP, and SSH
 
  
  - concurrent invocations: 11.3.3. Using a Connection Script
 
  
  - configuring use of SSH instead of rsh: 11.3.1.2. Making Pine use SSH instead of rsh
 
  
  - .k5login file: 11.4.5. Kerberos-4 in OpenSSH
 
  
  - mail relaying with SSH: 11.3.2. Mail Relaying and News Access
 
  
  - remote usernames: 11.3.1.2. Making Pine use SSH instead of rsh
 
  
  - securing IMAP authentication with SSH: 11.3.1. Securing IMAP Authentication 
 
 
- Pine mail reader, replacing rsh with ssh: 4.5.4. Pine
 
- .pinerc file, configuration: 11.3.1.2. Making Pine use SSH instead of rsh
 
- plaintext: 3.2. A Cryptography Primer
 
- platforms, SSH implementations for: 0.6. Supported Platforms
 
- Pluggable Authentication Modules (see PAM)
 
- Port: 5.2.2. Running as an Ordinary User
 
  - 5.4.3.1. Port number and network interface
 
  - 7.4.4.1. Selecting a remote port
 
  
  - recommended setting: 10.3.2. /etc/sshd_config
 
 
- port conflicts, avoiding: 12.1.2. Server Debugging
 
- port forwarding: 1.4.6. Port Forwarding
 
  - 3.1.5. Forwarding ( Tunneling)
 
  - 9. Port Forwarding and X Forwarding
 
  - 9.2. Port Forwarding
 
  
  - between Pine and IMAP host, security risks: 11.3.1. Securing IMAP Authentication 
 
  
  - compile-time configuration: 4.1.5.5. TCP port forwarding
 
    - 9.2.10.1. Compile-time configuration
 
  
 
  
  - disabling: 8.2.8. Disabling Forwarding 
 
  
  - firewalls, bypassing: 9.2.5. Bypassing a Firewall
 
  
  - gateway hosts: 11.5.1. Making Transparent SSH Connections
 
  
  - listening port numbers: 9.2.7. The Listening Port Number
 
  
  - listing connections, escape sequence for: 2.3.2. The Escape Character
 
  
  - local compared to remote: 9.2.3. Comparing Local and Remote PortForwarding
 
  
  - local forwarding: 9.2.1. Local Forwarding
 
    - 9.2.3.2. Local versus remote forwarding: the distinction
 
    
    - and GatewayPorts: 9.2.1.1. Local forwarding and GatewayPorts
 
  
 
  
  - localhost issues: 9.2.4. Forwarding Off-Host
 
  
  - multiple connections: 9.2.2. Trouble with Multiple Connections
 
  
  - non TCP-based protocols: 9.2. Port Forwarding
 
  
  - off-host: 9.2.4. Forwarding Off-Host
 
  
  - per-account configuration: 9.2.10.3. Per-account configuration
 
  
  - "bind\: Address already in use" message: 12.2.5.6. Port forwarding
 
  
  - recommended setting: 10.3.2. /etc/sshd_config
 
  
  - remote forwarding: 9.2.3.2. Local versus remote forwarding: the distinction
 
  
  - server configuration: 9.2.10. Configuring Port Forwarding in the Server
 
  
  - SMTP and NNTP connections: 11.3.2. Mail Relaying and News Access
 
  
  - SSH-in-SSH: 11.5.3. Another Approach: SSH-in-SSH(Port Forwarding)
 
  
  - suspending, escape sequence for: 2.3.2. The Escape Character
 
  
  - target address: 9.2.8. Choosing the Target Forwarding Address
 
  
  - termination: 9.2.9. Termination
 
  
  - TIME_WAIT: 9.2.9.1. The TIME_WAIT problem
 
  
  - without remote logins: 9.2.6. Port Forwarding Without a Remote Login
 
 
- port numbers: 7.4.4.1. Selecting a remote port
 
  - 9.2.1. Local Forwarding
 
  
  - encoding: 9.2.7. The Listening Port Number
 
  
  - listening: 9.2.7. The Listening Port Number
 
 
- ports
 
  
  - nonprivileged, forcing: 7.4.4.2. Forcing a nonprivileged local port
 
  
  - remote, selecting: 7.4.4.1. Selecting a remote port
 
 
- pre-image-resistance of hash functions: 3.2.3. Hash Functions
 
- precedence, serverwide configuration: 5.3.2. Command-Line Options
 
- --prefix: 4.1.5.2. Installation, files, and directories
 
  - 7.5.8. Locating the ssh Executable
 
  
  - recommended setting: 10.2. Compile-Time Configuration
 
 
- PrintMotd: 5.6.1. Welcome Messages for the User
 
- privacy: 3.1.1. Privacy (Encryption)
 
- private keys: 2.4.1. A Brief Introduction to Keys
 
  - 6.1. What Is an Identity?
 
  
  - importance of secrecy: 2.4.2. Generating Key Pairs with ssh-keygen
 
  
  - plaintext authentication, batch or cron jobs: 11.1.2.2. Using a plaintext key
 
 
- privileged ports: 1.6.1. rsh Suite (R-Commands)
 
  - 3.4.2.3. Trusted-host authentication (Rhosts and RhostsRSA)
 
 
- PRNG (pseudo-random number generators): 3.7. Randomness
 
- progress indicator: 6.2.2. Generating RSA/DSA Keys for SSH2
 
- protocols
 
  
  - IPSEC: 1.6.4. IPSEC
 
  
  - SSH: 1.3. The SSH Protocol
 
    
    - version strings: 3.4.1. Establishing the Secure Connection
 
  
 
  
  - SSH-1: 3.4. Inside SSH-1
 
    
    - authentication methods: 3.4.2. Client Authentication
 
    
    - compared to SSH-2: 3.5.1. Protocol Differences (SSH-1 Versus SSH-2)
 
  
 
  
  - SSH-2, modules: 3.5.1. Protocol Differences (SSH-1 Versus SSH-2)
 
 
- proxies (see SOCKS)
 
- proxy: 4.1.5.8. SOCKS proxy support
 
- proxy keys: 9.3.5.4. SSH and authentication spoofing
 
- ProxyCommand: 7.4.6.3. SOCKS in OpenSSH
 
- pseudo-random number generators (PRNG): 3.7. Randomness
 
- pty (pseudo-terminal) allocation: 7.4.5.5. Pseudo-terminal allocation (TTY/PTY/PTTY)
 
- PubKeyAuthentication: 5.5.1.2. Public-key authentication
 
- public exponent, RSA key parameter: 2.4.3. Installing a Public Key on an SSH ServerMachine
 
- public-key authentication: 5.5.1.2. Public-key authentication
 
  
  - disadvantages, under SSH1: 3.4.2.2. Public-key authentication
 
  
  - per-account configuration: 8.2. Public Key-Based Configuration 
 
  
  - SSH1: 3.4.2.2. Public-key authentication
 
  
  - troubleshooting: 12.1.2. Server Debugging
 
    - 12.2.2.4. Public-key authentication
 
    
    - checking file permissions: 12.2.2.4. Public-key authentication
 
  
 
  
  - typos in key files: 12.2.2.4. Public-key authentication
 
 
- public-key certificates: 3.5.1.3. Key/identity binding
 
- public-key cryptography: 3.2.2. Public- and Secret-Key Cryptography
 
- public-key encryption algorithms: 3.9.1.1. Rivest-Shamir-Adleman (RSA)
 
- public-key files
 
  
  - installing on remote host: 12.2.2.4. Public-key authentication
 
  
  - naming in SSH2: 6.2.2. Generating RSA/DSA Keys for SSH2
 
 
- public keys: 2.4.1. A Brief Introduction to Keys
 
  - 6.1. What Is an Identity?
 
  
  - comment fields
 
    
    - changing: 6.2.1. Generating RSA Keys for SSH1
 
      - 6.2.2. Generating RSA/DSA Keys for SSH2
 
    
 
    
    - SSH1: 6.2.1. Generating RSA Keys for SSH1
 
  
 
  
  - deriving from private keys: 6.2.2. Generating RSA/DSA Keys for SSH2
 
  
  - hosts: 5.5.1.5. Fetching public keys of known hosts
 
  
  - installing in remote account: 2.4.3. Installing a Public Key on an SSH ServerMachine
 
    - 12.1.2. Server Debugging
 
  
 
  
  - line break problem: 12.2.2.4. Public-key authentication
 
  
  - RSA keylength (SSH1): 6.2.1. Generating RSA Keys for SSH1
 
  
  - syntax, authorization files (SSH1): 8.2.1. SSH1 Authorization Files 
 
  
  - verification of ownership: 3.5.1.3. Key/identity binding
 
 
- PublicHostKeyFile: 5.4.1.1. Host key files
 
- PuTTY: 13.3. Table of Products
 
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2002
O'Reilly & Associates, Inc.
All Rights Reserved.