What wasn't covered SSH Host key verification. Passwordless ssh authentication methods. Identity / pubkey authentication sans passwords. Using ssh-agent to hold identity/pubkeys. Restricting ssh port forwards using permit_open/etc. Restricting ssh commands via authorized_keys. Choosing/Restricting ciphers. Stunnel Creating certificates. Certificate verification. Socket options. Choosing/Restricting ciphers.
Copyright 2003, Bri Hatch of Onsight, Inc.
Presented at GSLUG - Greater Seattle User Group, Aug 2003
Presentation created using vim and MagicPoint.