Book Home

Networking CD BookshelfSearch this book

Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: P

packets, TCP format: 3.4.1. Establishing the Secure Connection
PAM (Pluggable Authentication Modules): 4.3.3. PAM
5.5.1.11. PAM authentication
authentication using: 5.5.1.11. PAM authentication
configuration: 12.2.2.2. Password authentication
passphrases: 2.4.2. Generating Key Pairs with ssh-keygen
batch or cron jobs: 11.1.2.1. Storing the passphrase in the filesystem
changing: 2.4.4. If You Change Your Key
SSH1: 6.2.1. Generating RSA Keys for SSH1
choosing a secure passphrase: 10.5. Key Management
limitations: 2.5. The SSH Agent
protecting: 7.4.5.7. Backgrounding a remote command, take two
selection: 6.2.4. Selecting a Passphrase
specifying
SSH1: 6.2.1. Generating RSA Keys for SSH1
troubleshooting, prompting for passphrase of wrong key: 12.2.2.4. Public-key authentication
password authentication
SSH1: 3.4.2.1. Password authentication
troubleshooting: 12.1.2. Server Debugging
password expiration warnings: 5.6.2. Expired Account or Password
password prompting
SSH1: 7.4.5.2. Password prompting in SSH1
password prompts, suppression with batch mode: 7.4.5.4. Batch mode: suppressing prompts
PasswordAuthentication: 5.5.1.1. Password authentication
PasswordExpireWarningDays: 5.6.2. Expired Account or Password
PasswordGuesses: 5.4.3.5. Failed logins
5.4.3.5. Failed logins
PasswordPrompt: 7.4.5.3. Password prompting in SSH2
PasswordPromptHost: 7.4.5.2. Password prompting in SSH1
PasswordPromptLogin: 7.4.5.2. Password prompting in SSH1
passwords
authentication: 5.5.1.1. Password authentication
cracking: 3.11.1. Password Cracking
one-time passwords: 4.3.5. Compilation Flags
"one-time" use for authentication, SSH1: 3.4.2.5. One-time passwords
security risks: 2.4. Authentication by Cryptographic Key
3.1.3. Authentication
PASV command: 11.2.1. The FTP Protocol
PenguiNet: 13.3. Table of Products
per-account authorization files: 5.4.1.6. Per-account authorization files
configuration failure: 12.2.3.4. Per-account authorization files
per-account configuration: 4.1.5. Compile-Time Configuration
5.3. Server Configuration: An Overview
8. Per-Account Server Configuration
authentication issues: 8.1.2. Authentication Issues
authentication using PGP (SSH2): 8.2.2.1. SSH2 PGP key authentication
CVS: 8.2.6.1. Example: CVS and $LOGNAME
disabling agent forwarding: 8.2.8. Disabling Forwarding
disabling port forwarding: 8.2.8. Disabling Forwarding
"from" option (SSH1, OpenSSH): 8.2.5. Restricting Access by Host or Domain
limitations: 8.1. Limits of This Technique
precedence: 8.1.1. Overriding Serverwide Settings
public key based: 8.2. Public Key-Based Configuration
rc file: 8.4. The User rc File
recommended settings: 10.4. Per-Account Configuration
restriction of access by host or domain: 8.2.5. Restricting Access by Host or Domain
server: 0.4. Our Approach
setting idle timeouts: 8.2.7. Setting Idle Timeout
trusted-host authentication: 8.3. Trusted-Host Access Control
perfect forward secrecy: 3.4.1. Establishing the Secure Connection
permissions
for batch and cron jobs: 11.1.5.1. Least-privilege accounts
for newly created files: 5.4.2.2. Permissions for newly created files
PermitEmptyPasswords: 5.6.3. Empty Passwords
PermitRootLogin: 5.5.2.5. Root access control
PGP (Pretty Good Privacy): 1.4.2. Secure File Transfer
authentication: 5.5.1.6. PGP authentication
SSH2: 8.2.2.1. SSH2 PGP key authentication
compile-time configuration: 4.1.5.7. Authentication
key authentication
SSH2: 6.1.2. SSH2 Identities
troubleshooting: 12.2.2.5. PGP key authentication
OpenPGP compliance: 4.1.5.7. Authentication
vs. SSH: 1.6.2. Pretty Good Privacy (PGP)
PGP signature of SSH distributions, verification: 4.1.2.2. Verifying with PGP
PgpKeyFingerprint: 5.5.1.6. PGP authentication
PgpKeyId: 5.5.1.6. PGP authentication
PgpKeyName: 5.5.1.6. PGP authentication
PgpPublicKeyFile: 5.5.1.6. PGP authentication
PgpSecretKeyFile: 5.5.1.6. PGP authentication
5.5.1.6. PGP authentication
pid file: 5.3.3. Changing the Configuration
OpenSSH: 4.3.5. Compilation Flags
PidFile: 5.4.1.3. Process ID file
5.4.2.2. Permissions for newly created files
Pine: 11.3. Pine, IMAP, and SSH
concurrent invocations: 11.3.3. Using a Connection Script
configuring use of SSH instead of rsh: 11.3.1.2. Making Pine use SSH instead of rsh
.k5login file: 11.4.5. Kerberos-4 in OpenSSH
mail relaying with SSH: 11.3.2. Mail Relaying and News Access
remote usernames: 11.3.1.2. Making Pine use SSH instead of rsh
securing IMAP authentication with SSH: 11.3.1. Securing IMAP Authentication
Pine mail reader, replacing rsh with ssh: 4.5.4. Pine
.pinerc file, configuration: 11.3.1.2. Making Pine use SSH instead of rsh
plaintext: 3.2. A Cryptography Primer
platforms, SSH implementations for: 0.6. Supported Platforms
Pluggable Authentication Modules (see PAM)
Port: 5.2.2. Running as an Ordinary User
5.4.3.1. Port number and network interface
7.4.4.1. Selecting a remote port
recommended setting: 10.3.2. /etc/sshd_config
port conflicts, avoiding: 12.1.2. Server Debugging
port forwarding: 1.4.6. Port Forwarding
3.1.5. Forwarding ( Tunneling)
9. Port Forwarding and X Forwarding
9.2. Port Forwarding
between Pine and IMAP host, security risks: 11.3.1. Securing IMAP Authentication
compile-time configuration: 4.1.5.5. TCP port forwarding
9.2.10.1. Compile-time configuration
disabling: 8.2.8. Disabling Forwarding
firewalls, bypassing: 9.2.5. Bypassing a Firewall
gateway hosts: 11.5.1. Making Transparent SSH Connections
listening port numbers: 9.2.7. The Listening Port Number
listing connections, escape sequence for: 2.3.2. The Escape Character
local compared to remote: 9.2.3. Comparing Local and Remote PortForwarding
local forwarding: 9.2.1. Local Forwarding
9.2.3.2. Local versus remote forwarding: the distinction
and GatewayPorts: 9.2.1.1. Local forwarding and GatewayPorts
localhost issues: 9.2.4. Forwarding Off-Host
multiple connections: 9.2.2. Trouble with Multiple Connections
non TCP-based protocols: 9.2. Port Forwarding
off-host: 9.2.4. Forwarding Off-Host
per-account configuration: 9.2.10.3. Per-account configuration
"bind\: Address already in use" message: 12.2.5.6. Port forwarding
recommended setting: 10.3.2. /etc/sshd_config
remote forwarding: 9.2.3.2. Local versus remote forwarding: the distinction
server configuration: 9.2.10. Configuring Port Forwarding in the Server
SMTP and NNTP connections: 11.3.2. Mail Relaying and News Access
SSH-in-SSH: 11.5.3. Another Approach: SSH-in-SSH(Port Forwarding)
suspending, escape sequence for: 2.3.2. The Escape Character
target address: 9.2.8. Choosing the Target Forwarding Address
termination: 9.2.9. Termination
TIME_WAIT: 9.2.9.1. The TIME_WAIT problem
without remote logins: 9.2.6. Port Forwarding Without a Remote Login
port numbers: 7.4.4.1. Selecting a remote port
9.2.1. Local Forwarding
encoding: 9.2.7. The Listening Port Number
listening: 9.2.7. The Listening Port Number
ports
nonprivileged, forcing: 7.4.4.2. Forcing a nonprivileged local port
remote, selecting: 7.4.4.1. Selecting a remote port
pre-image-resistance of hash functions: 3.2.3. Hash Functions
precedence, serverwide configuration: 5.3.2. Command-Line Options
--prefix: 4.1.5.2. Installation, files, and directories
7.5.8. Locating the ssh Executable
recommended setting: 10.2. Compile-Time Configuration
PrintMotd: 5.6.1. Welcome Messages for the User
privacy: 3.1.1. Privacy (Encryption)
private keys: 2.4.1. A Brief Introduction to Keys
6.1. What Is an Identity?
importance of secrecy: 2.4.2. Generating Key Pairs with ssh-keygen
plaintext authentication, batch or cron jobs: 11.1.2.2. Using a plaintext key
privileged ports: 1.6.1. rsh Suite (R-Commands)
3.4.2.3. Trusted-host authentication (Rhosts and RhostsRSA)
PRNG (pseudo-random number generators): 3.7. Randomness
progress indicator: 6.2.2. Generating RSA/DSA Keys for SSH2
protocols
IPSEC: 1.6.4. IPSEC
SSH: 1.3. The SSH Protocol
version strings: 3.4.1. Establishing the Secure Connection
SSH-1: 3.4. Inside SSH-1
authentication methods: 3.4.2. Client Authentication
compared to SSH-2: 3.5.1. Protocol Differences (SSH-1 Versus SSH-2)
SSH-2, modules: 3.5.1. Protocol Differences (SSH-1 Versus SSH-2)
proxies (see SOCKS)
proxy: 4.1.5.8. SOCKS proxy support
proxy keys: 9.3.5.4. SSH and authentication spoofing
ProxyCommand: 7.4.6.3. SOCKS in OpenSSH
pseudo-random number generators (PRNG): 3.7. Randomness
pty (pseudo-terminal) allocation: 7.4.5.5. Pseudo-terminal allocation (TTY/PTY/PTTY)
PubKeyAuthentication: 5.5.1.2. Public-key authentication
public exponent, RSA key parameter: 2.4.3. Installing a Public Key on an SSH ServerMachine
public-key authentication: 5.5.1.2. Public-key authentication
disadvantages, under SSH1: 3.4.2.2. Public-key authentication
per-account configuration: 8.2. Public Key-Based Configuration
SSH1: 3.4.2.2. Public-key authentication
troubleshooting: 12.1.2. Server Debugging
12.2.2.4. Public-key authentication
checking file permissions: 12.2.2.4. Public-key authentication
typos in key files: 12.2.2.4. Public-key authentication
public-key certificates: 3.5.1.3. Key/identity binding
public-key cryptography: 3.2.2. Public- and Secret-Key Cryptography
public-key encryption algorithms: 3.9.1.1. Rivest-Shamir-Adleman (RSA)
public-key files
installing on remote host: 12.2.2.4. Public-key authentication
naming in SSH2: 6.2.2. Generating RSA/DSA Keys for SSH2
public keys: 2.4.1. A Brief Introduction to Keys
6.1. What Is an Identity?
comment fields
changing: 6.2.1. Generating RSA Keys for SSH1
6.2.2. Generating RSA/DSA Keys for SSH2
SSH1: 6.2.1. Generating RSA Keys for SSH1
deriving from private keys: 6.2.2. Generating RSA/DSA Keys for SSH2
hosts: 5.5.1.5. Fetching public keys of known hosts
installing in remote account: 2.4.3. Installing a Public Key on an SSH ServerMachine
12.1.2. Server Debugging
line break problem: 12.2.2.4. Public-key authentication
RSA keylength (SSH1): 6.2.1. Generating RSA Keys for SSH1
syntax, authorization files (SSH1): 8.2.1. SSH1 Authorization Files
verification of ownership: 3.5.1.3. Key/identity binding
PublicHostKeyFile: 5.4.1.1. Host key files
PuTTY: 13.3. Table of Products


Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z


Library Navigation Links

Copyright © 2002 O'Reilly & Associates, Inc. All Rights Reserved.