home | O'Reilly's CD bookshelfs | FreeBSD | Linux | Cisco | Cisco Exam    

Book Home

Networking CD BookshelfSearch this book

Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: K

kadmin.local: 11.4.4.6. Kerberos-5 setup notes
KeepAlive: 5.4.3.4. KeepAlive
7.4.4.3. Keepalive messages
kerberized applications: 1.6.3. Kerberos
running: 11.4.3.4. Running a kerberized application
Kerberos: 1.6.3. Kerberos
11.4. Kerberos and SSH
authentication: 5.5.1.7. Kerberos authentication
batch and cron jobs: 11.1.4. Kerberos
compile-time configuration: 4.1.5.7. Authentication
configuration file: 11.4.1.1. Infrastructure
conflicts with NAT (Network Address Translation): 11.4.4.2. Kerberos and NAT
cross-realm authentication: 11.4.4.3. Cross-realm authentication
firewall issues: 11.4.4.2. Kerberos and NAT
hierarchical realms: 11.4.4.3. Cross-realm authentication
installation and administration: 11.4.1.1. Infrastructure
KDC (Key Distribution Center): 11.4.1.1. Infrastructure
11.4.3.1. Principals and tickets
Kerberos-4 vs. Kerberos-5: 11.4.5. Kerberos-4 in OpenSSH
.klogin: 11.4.5. Kerberos-4 in OpenSSH
in OpenSSH: 4.3.5. Compilation Flags
password authentication in SSH: 11.4.4.1. Kerberos password authentication
performance: 11.4.1.5. Performance
principals: 11.4.5. Kerberos-4 in OpenSSH
security: 11.4.1.3. Security of authenticators
and SSH: 11.4.1. Comparing SSH and Kerberos
support, lack of, in non-Unix SSH: 11.4.2. Using Kerberos with SSH
TGT (Ticket Granting Tickets): 11.4.4.4. TGT forwarding
tickets: 1.6.3. Kerberos
11.4.1.3. Security of authenticators
11.4.3.1. Principals and tickets
transparency, lack of: 11.4.1.2. Integrating with other applications
user accounts database: 11.4.1.4. Account administration
Kerberos-5: 11.4.3. A Brief Introduction to Kerberos-5
authentication: 11.4.3.1. Principals and tickets
authorization: 11.4.3.5. Authorization
compatibility mode, Kerberos-4: 11.4.5.1. Kerberos-4 compatibility mode in Kerberos-5
configuration: 11.4.4.6. Kerberos-5 setup notes
instances: 11.4.3.1. Principals and tickets
key files: 11.4.3.1. Principals and tickets
kinit command: 11.4.3.2. Obtaining credentials with kinit
klist command: 11.4.3.3. Listing credentials with klist
krb5.conf file: 11.4.4.6. Kerberos-5 setup notes
names: 11.4.3.1. Principals and tickets
principals: 11.4.3.1. Principals and tickets
realms: 11.4.3.1. Principals and tickets
support for, configuring in SSH1: 11.4.4. Kerberos-5 in SSH1
Kerberos-4 protocol, incorporation within AFS: 5.5.1.12. AFS token passing
Kerberos-based authentication: 3.4.2.4. Kerberos authentication
KerberosAuthentication: 5.5.1.7. Kerberos authentication
11.4.4. Kerberos-5 in SSH1
11.4.5. Kerberos-4 in OpenSSH
KerberosOrLocalPasswd: 5.5.1.7. Kerberos authentication
KerberosTgtPassing: 5.5.1.7. Kerberos authentication
KerberosTicketCleanup: 5.5.1.7. Kerberos authentication
keys: 1.4.4. Keys and Agents
2.4. Authentication by Cryptographic Key
3.2. A Cryptography Primer
3.3. The Architecture of an SSH System
agents, deleting from: 2.5. The SSH Agent
agents, loading into: 2.5. The SSH Agent
changing: 2.4.4. If You Change Your Key
changing passphrase without key regeneration: 12.2.3.2. ssh-keygen
data format, authorized key files: 2.4.3. Installing a Public Key on an SSH ServerMachine
deleting from agents
OpenSSH: 6.3.3. Loading Keys with ssh-add
DSA: 2.4.2. Generating Key Pairs with ssh-keygen
incompatibility, SSH1 and SSH2: 12.2.3.1. General key/agent problems
invalid format message from client: 12.2.3.1. General key/agent problems
key files, editing: 2.4.3. Installing a Public Key on an SSH ServerMachine
key generator: 3.3. The Architecture of an SSH System
loading into agents: 6.3.3. Loading Keys with ssh-add
login key, protecting: 8.2.4.1. Security issues
management: 1.4.2. Secure File Transfer
6. Key Management and Agents
manual specification failure: 12.2.3.1. General key/agent problems
one-time password systems: 5.5.1.10. S/Key authentication
public and private: 2.4.1. A Brief Introduction to Keys
public-key authentication: 2.4. Authentication by Cryptographic Key
recommended length: 10.5. Key Management
12.2.3.2. ssh-keygen
replacing, importance of: 3.5.1.7. Session rekeying
restrictions, batch and cron jobs: 11.1.5.3. Restricted-use keys
RSA: 2.4.2. Generating Key Pairs with ssh-keygen
secrecy: 2.4.2. Generating Key Pairs with ssh-keygen
SSH versions, conversion between: 6.2.1. Generating RSA Keys for SSH1
6.2.2. Generating RSA/DSA Keys for SSH2
6.2.3. Generating RSA/DSA Keys for OpenSSH
key-based authentication, X Windows: 9.3.5.1. How X authentication works
key-distribution: 3.2.2. Public- and Secret-Key Cryptography
key files, recommended restriction settings: 10.4. Per-Account Configuration
key generation
command-line options (SSH2): 6.2.2. Generating RSA/DSA Keys for SSH2
encryption algorithms (SSH2): 6.2.2. Generating RSA/DSA Keys for SSH2
escape sequence for: 2.3.2. The Escape Character
OpenSSH: 6.2.3. Generating RSA/DSA Keys for OpenSSH
processing time: 2.4.2. Generating Key Pairs with ssh-keygen
progress indicator: 12.2.3.2. ssh-keygen
RSA for SSH1: 6.2.1. Generating RSA Keys for SSH1
SSH2: 6.2.2. Generating RSA/DSA Keys for SSH2
Key (keyword): 6.1.2. SSH2 Identities
8.2.2. SSH2 Authorization Files
key-ownership problem: 3.5.1.3. Key/identity binding
key pairs: 2.4.1. A Brief Introduction to Keys
6.1. What Is an Identity?
7.4.2. User Identity
filenames: 6.1. What Is an Identity?
KeyRegenerationInterval: 5.4.4. Server Key Generation
keywords: 5.3.1. Server Configuration Files
B.3. sshd Keywords
command-line: 7.1.3.1. Keywords versus command-line options
kinit: 5.5.1.12. AFS token passing
11.1.4. Kerberos
11.4.1.3. Security of authenticators
klog: 5.5.1.12. AFS token passing
known-host mechanism: 2.3.1. Known Hosts
known hosts: 2.3.1. Known Hosts
database: 3.3. The Architecture of an SSH System
directories: 5.5.1.5. Fetching public keys of known hosts
files: 4.1.6. Creating the Serverwide Known-Hosts File
security, serverwide hosts files: 4.1.6. Creating the Serverwide Known-Hosts File
known_hosts: 3.5.2.1. Host keys
7.4.3. Host Keys and Known-Hosts Databases
knownhosts map, SSH2: 3.5.2.1. Host keys
krb5.conf: 11.4.1.1. Infrastructure
11.4.5. Kerberos-4 in OpenSSH
krb5.keytab: 11.4.3.1. Principals and tickets
11.4.5. Kerberos-4 in OpenSSH
krb.realms: 11.4.5. Kerberos-4 in OpenSSH


Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z


Library Navigation Links

Copyright © 2002 O'Reilly & Associates, Inc. All Rights Reserved.







??????????????@Mail.ru