\contentsline {chapter}{\numberline {1}SSH --- The Secure Shell}{1}{chapter.1} \contentsline {subsection}{Objectives}{1}{section*.2} \contentsline {section}{\numberline {1.1}What is the Secure Shell?}{2}{section.1.1} \contentsline {section}{\numberline {1.2}But what's wrong with {\ttfamily telnet}?}{3}{section.1.2} \contentsline {section}{\numberline {1.3}Cryptography}{4}{section.1.3} \contentsline {section}{\numberline {1.4}OpenSSH and its history}{5}{section.1.4} \contentsline {section}{\numberline {1.5}Okay, I like the blowfish---what else does OpenSSH provide?}{6}{section.1.5} \contentsline {section}{\numberline {1.6}So okay, how do I use this Secure Shell?}{7}{section.1.6} \contentsline {section}{\numberline {1.7}Using {\ttfamily scp} to copy files over the network}{8}{section.1.7} \contentsline {section}{\numberline {1.8}Useful options with {\ttfamily scp}}{9}{section.1.8} \contentsline {section}{\numberline {1.9}SSH uses public and private keys}{10}{section.1.9} \contentsline {section}{\numberline {1.10}SSH Architecture}{11}{section.1.10} \contentsline {section}{\numberline {1.11}Overview of SSH}{12}{section.1.11} \contentsline {section}{\numberline {1.12}Steps of establishing a connection}{13}{section.1.12} \contentsline {section}{\numberline {1.13}Using {\ttfamily ssh-keygen} to create a personal pair of private and public keys}{14}{section.1.13} \contentsline {section}{\numberline {1.14}The host keys in {\normalfont \ttfamily /etc/ssh/ssh\_known\_hosts} and {\normalfont \ttfamily $\sim $/.ssh/known\_hosts}}{15}{section.1.14} \contentsline {section}{\numberline {1.15}The file {\normalfont \ttfamily $\sim $/.ssh/authorized\_keys}}{16}{section.1.15} \contentsline {section}{\numberline {1.16}The User's Public and Private Keys}{17}{section.1.16} \contentsline {section}{\numberline {1.17}SSH1 and SSH2}{18}{section.1.17} \contentsline {section}{\numberline {1.18}The public and private key pairs: a summary}{19}{section.1.18} \contentsline {section}{\numberline {1.19}Files and Permissions I Recommend}{20}{section.1.19} \contentsline {section}{\numberline {1.20}Using {\ttfamily ssh-agent} to log in without typing passwords}{21}{section.1.20} \contentsline {section}{\numberline {1.21}Setting up {\ttfamily ssh-agent}: logging in without typing passwords}{22}{section.1.21} \contentsline {section}{\numberline {1.22}Using {\ttfamily ssh-add}: logging in without typing passwords}{23}{section.1.22} \contentsline {section}{\numberline {1.23}An easier way: using {\normalfont \ttfamily keychain}}{24}{section.1.23} \contentsline {section}{\numberline {1.24}Configuring your own account to use {\normalfont \ttfamily keychain} }{25}{section.1.24} \contentsline {subsection}{Automating network transfers using {\normalfont \ttfamily keychain} and SSH}{25}{section*.3} \contentsline {section}{\numberline {1.25}Running X applications remotely}{26}{section.1.25} \contentsline {section}{\numberline {1.26}Configuring SSH for {\ttfamily X}}{27}{section.1.26} \contentsline {section}{\numberline {1.27}Security options for the client in {\normalfont \ttfamily /etc/ssh/ssh\_config}}{28}{section.1.27} \contentsline {section}{\numberline {1.28}{\normalfont \ttfamily rsync}: using it with SSH to mirror data}{29}{section.1.28} \contentsline {section}{\numberline {1.29}Using {\ttfamily ssh} from Windows, with {\ttfamily XWin32}: setting up}{30}{section.1.29} \contentsline {section}{\numberline {1.30}Using {\normalfont \ttfamily ssh} from Windows, with {\normalfont \ttfamily XWin32}}{31}{section.1.30} \contentsline {section}{\numberline {1.31}What else can this do?}{32}{section.1.31} \contentsline {section}{\numberline {1.32}Summary}{33}{section.1.32} \contentsline {section}{\numberline {1.33}SSH References}{34}{section.1.33} \contentsline {section}{\numberline {1.34}Secure Shell Exercises}{35}{section.1.34} \contentsline {section}{\numberline {1.35}Secure Shell Solutions}{37}{section.1.35}