[index] [text page] [<<start] [<prev] [next>] [last>>]
Page 18: What wasn't covered

Page 18

  
  What wasn't covered
  SSH
  Host key verification.
  Passwordless ssh authentication methods.
  Identity / pubkey authentication sans passwords.
  Using ssh-agent to hold identity/pubkeys.
  Restricting ssh port forwards using permit_open/etc.
  Restricting ssh commands via authorized_keys.
  Choosing/Restricting ciphers.
  Stunnel
  Creating certificates.
  Certificate verification.
  Socket options.
  Choosing/Restricting ciphers.

Copyright 2003, Bri Hatch of Onsight, Inc.

Presented at GSLUG - Greater Seattle User Group, Aug 2003

Presentation created using vim and MagicPoint.