Index: K
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: K
- kadmin.local: 11.4.4.6. Kerberos-5 setup notes
- KeepAlive: 5.4.3.4. KeepAlive
- 7.4.4.3. Keepalive messages
- kerberized applications: 1.6.3. Kerberos
- running: 11.4.3.4. Running a kerberized application
- Kerberos: 1.6.3. Kerberos
- 11.4. Kerberos and SSH
- authentication: 5.5.1.7. Kerberos authentication
- batch and cron jobs: 11.1.4. Kerberos
- compile-time configuration: 4.1.5.7. Authentication
- configuration file: 11.4.1.1. Infrastructure
- conflicts with NAT (Network Address Translation): 11.4.4.2. Kerberos and NAT
- cross-realm authentication: 11.4.4.3. Cross-realm authentication
- firewall issues: 11.4.4.2. Kerberos and NAT
- hierarchical realms: 11.4.4.3. Cross-realm authentication
- installation and administration: 11.4.1.1. Infrastructure
- KDC (Key Distribution Center): 11.4.1.1. Infrastructure
- 11.4.3.1. Principals and tickets
- Kerberos-4 vs. Kerberos-5: 11.4.5. Kerberos-4 in OpenSSH
- .klogin: 11.4.5. Kerberos-4 in OpenSSH
- in OpenSSH: 4.3.5. Compilation Flags
- password authentication in SSH: 11.4.4.1. Kerberos password authentication
- performance: 11.4.1.5. Performance
- principals: 11.4.5. Kerberos-4 in OpenSSH
- security: 11.4.1.3. Security of authenticators
- and SSH: 11.4.1. Comparing SSH and Kerberos
- support, lack of, in non-Unix SSH: 11.4.2. Using Kerberos with SSH
- TGT (Ticket Granting Tickets): 11.4.4.4. TGT forwarding
- tickets: 1.6.3. Kerberos
- 11.4.1.3. Security of authenticators
- 11.4.3.1. Principals and tickets
- transparency, lack of: 11.4.1.2. Integrating with other applications
- user accounts database: 11.4.1.4. Account administration
- Kerberos-5: 11.4.3. A Brief Introduction to Kerberos-5
- authentication: 11.4.3.1. Principals and tickets
- authorization: 11.4.3.5. Authorization
- compatibility mode, Kerberos-4: 11.4.5.1. Kerberos-4 compatibility mode in Kerberos-5
- configuration: 11.4.4.6. Kerberos-5 setup notes
- instances: 11.4.3.1. Principals and tickets
- key files: 11.4.3.1. Principals and tickets
- kinit command: 11.4.3.2. Obtaining credentials with kinit
- klist command: 11.4.3.3. Listing credentials with klist
- krb5.conf file: 11.4.4.6. Kerberos-5 setup notes
- names: 11.4.3.1. Principals and tickets
- principals: 11.4.3.1. Principals and tickets
- realms: 11.4.3.1. Principals and tickets
- support for, configuring in SSH1: 11.4.4. Kerberos-5 in SSH1
- Kerberos-4 protocol, incorporation within AFS: 5.5.1.12. AFS token passing
- Kerberos-based authentication: 3.4.2.4. Kerberos authentication
- KerberosAuthentication: 5.5.1.7. Kerberos authentication
- 11.4.4. Kerberos-5 in SSH1
- 11.4.5. Kerberos-4 in OpenSSH
- KerberosOrLocalPasswd: 5.5.1.7. Kerberos authentication
- KerberosTgtPassing: 5.5.1.7. Kerberos authentication
- KerberosTicketCleanup: 5.5.1.7. Kerberos authentication
- keys: 1.4.4. Keys and Agents
- 2.4. Authentication by Cryptographic Key
- 3.2. A Cryptography Primer
- 3.3. The Architecture of an SSH System
- agents, deleting from: 2.5. The SSH Agent
- agents, loading into: 2.5. The SSH Agent
- changing: 2.4.4. If You Change Your Key
- changing passphrase without key regeneration: 12.2.3.2. ssh-keygen
- data format, authorized key files: 2.4.3. Installing a Public Key on an SSH ServerMachine
- deleting from agents
- OpenSSH: 6.3.3. Loading Keys with ssh-add
- DSA: 2.4.2. Generating Key Pairs with ssh-keygen
- incompatibility, SSH1 and SSH2: 12.2.3.1. General key/agent problems
- invalid format message from client: 12.2.3.1. General key/agent problems
- key files, editing: 2.4.3. Installing a Public Key on an SSH ServerMachine
- key generator: 3.3. The Architecture of an SSH System
- loading into agents: 6.3.3. Loading Keys with ssh-add
- login key, protecting: 8.2.4.1. Security issues
- management: 1.4.2. Secure File Transfer
- 6. Key Management and Agents
- manual specification failure: 12.2.3.1. General key/agent problems
- one-time password systems: 5.5.1.10. S/Key authentication
- public and private: 2.4.1. A Brief Introduction to Keys
- public-key authentication: 2.4. Authentication by Cryptographic Key
- recommended length: 10.5. Key Management
- 12.2.3.2. ssh-keygen
- replacing, importance of: 3.5.1.7. Session rekeying
- restrictions, batch and cron jobs: 11.1.5.3. Restricted-use keys
- RSA: 2.4.2. Generating Key Pairs with ssh-keygen
- secrecy: 2.4.2. Generating Key Pairs with ssh-keygen
- SSH versions, conversion between: 6.2.1. Generating RSA Keys for SSH1
- 6.2.2. Generating RSA/DSA Keys for SSH2
- 6.2.3. Generating RSA/DSA Keys for OpenSSH
- key-based authentication, X Windows: 9.3.5.1. How X authentication works
- key-distribution: 3.2.2. Public- and Secret-Key Cryptography
- key files, recommended restriction settings: 10.4. Per-Account Configuration
- key generation
- command-line options (SSH2): 6.2.2. Generating RSA/DSA Keys for SSH2
- encryption algorithms (SSH2): 6.2.2. Generating RSA/DSA Keys for SSH2
- escape sequence for: 2.3.2. The Escape Character
- OpenSSH: 6.2.3. Generating RSA/DSA Keys for OpenSSH
- processing time: 2.4.2. Generating Key Pairs with ssh-keygen
- progress indicator: 12.2.3.2. ssh-keygen
- RSA for SSH1: 6.2.1. Generating RSA Keys for SSH1
- SSH2: 6.2.2. Generating RSA/DSA Keys for SSH2
- Key (keyword): 6.1.2. SSH2 Identities
- 8.2.2. SSH2 Authorization Files
- key-ownership problem: 3.5.1.3. Key/identity binding
- key pairs: 2.4.1. A Brief Introduction to Keys
- 6.1. What Is an Identity?
- 7.4.2. User Identity
- filenames: 6.1. What Is an Identity?
- KeyRegenerationInterval: 5.4.4. Server Key Generation
- keywords: 5.3.1. Server Configuration Files
- B.3. sshd Keywords
- command-line: 7.1.3.1. Keywords versus command-line options
- kinit: 5.5.1.12. AFS token passing
- 11.1.4. Kerberos
- 11.4.1.3. Security of authenticators
- klog: 5.5.1.12. AFS token passing
- known-host mechanism: 2.3.1. Known Hosts
- known hosts: 2.3.1. Known Hosts
- database: 3.3. The Architecture of an SSH System
- directories: 5.5.1.5. Fetching public keys of known hosts
- files: 4.1.6. Creating the Serverwide Known-Hosts File
- security, serverwide hosts files: 4.1.6. Creating the Serverwide Known-Hosts File
- known_hosts: 3.5.2.1. Host keys
- 7.4.3. Host Keys and Known-Hosts Databases
- knownhosts map, SSH2: 3.5.2.1. Host keys
- krb5.conf: 11.4.1.1. Infrastructure
- 11.4.5. Kerberos-4 in OpenSSH
- krb5.keytab: 11.4.3.1. Principals and tickets
- 11.4.5. Kerberos-4 in OpenSSH
- krb.realms: 11.4.5. Kerberos-4 in OpenSSH
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2002
O'Reilly & Associates, Inc.
All Rights Reserved.