\BOOKMARK [0][-]{chapter.1}{SSH --- The Secure Shell}{} \BOOKMARK [1][-]{section.1.1}{What is the Secure Shell?}{chapter.1} \BOOKMARK [1][-]{section.1.2}{But what's wrong with telnet?}{chapter.1} \BOOKMARK [1][-]{section.1.3}{Cryptography}{chapter.1} \BOOKMARK [1][-]{section.1.4}{OpenSSH and its history}{chapter.1} \BOOKMARK [1][-]{section.1.5}{Okay, I like the blowfish---what else does OpenSSH provide?}{chapter.1} \BOOKMARK [1][-]{section.1.6}{So okay, how do I use this Secure Shell?}{chapter.1} \BOOKMARK [1][-]{section.1.7}{Using scp to copy files over the network}{chapter.1} \BOOKMARK [1][-]{section.1.8}{Useful options with scp}{chapter.1} \BOOKMARK [1][-]{section.1.9}{SSH uses public and private keys}{chapter.1} \BOOKMARK [1][-]{section.1.10}{SSH Architecture}{chapter.1} \BOOKMARK [1][-]{section.1.11}{Overview of SSH}{chapter.1} \BOOKMARK [1][-]{section.1.12}{Steps of establishing a connection}{chapter.1} \BOOKMARK [1][-]{section.1.13}{Using ssh-keygen to create a personal pair of private and public keys}{chapter.1} \BOOKMARK [1][-]{section.1.14}{The host keys in /etc/ssh/ssh\137known\137hosts and /.ssh/known\137hosts}{chapter.1} \BOOKMARK [1][-]{section.1.15}{The file /.ssh/authorized\137keys}{chapter.1} \BOOKMARK [1][-]{section.1.16}{The User's Public and Private Keys}{chapter.1} \BOOKMARK [1][-]{section.1.17}{SSH1 and SSH2}{chapter.1} \BOOKMARK [1][-]{section.1.18}{The public and private key pairs: a summary}{chapter.1} \BOOKMARK [1][-]{section.1.19}{Files and Permissions I Recommend}{chapter.1} \BOOKMARK [1][-]{section.1.20}{Using ssh-agent to log in without typing passwords}{chapter.1} \BOOKMARK [1][-]{section.1.21}{Setting up ssh-agent: logging in without typing passwords}{chapter.1} \BOOKMARK [1][-]{section.1.22}{Using ssh-add: logging in without typing passwords}{chapter.1} \BOOKMARK [1][-]{section.1.23}{An easier way: using keychain}{chapter.1} \BOOKMARK [1][-]{section.1.24}{Configuring your own account to use keychain }{chapter.1} \BOOKMARK [1][-]{section.1.25}{Running X applications remotely}{chapter.1} \BOOKMARK [1][-]{section.1.26}{Configuring SSH for X}{chapter.1} \BOOKMARK [1][-]{section.1.27}{Security options for the client in /etc/ssh/ssh\137config}{chapter.1} \BOOKMARK [1][-]{section.1.28}{rsync: using it with SSH to mirror data}{chapter.1} \BOOKMARK [1][-]{section.1.29}{Using ssh from Windows, with XWin32: setting up}{chapter.1} \BOOKMARK [1][-]{section.1.30}{Using ssh from Windows, with XWin32}{chapter.1} \BOOKMARK [1][-]{section.1.31}{What else can this do?}{chapter.1} \BOOKMARK [1][-]{section.1.32}{Summary}{chapter.1} \BOOKMARK [1][-]{section.1.33}{SSH References}{chapter.1} \BOOKMARK [1][-]{section.1.34}{Secure Shell Exercises}{chapter.1} \BOOKMARK [1][-]{section.1.35}{Secure Shell Solutions}{chapter.1}