P
- PAM (Pluggable Authentication Modules), 4.2.4.3 Networking, 4.2.4.3 Networking
- OpenSSH authentication, 4.2.4.3 Networking
- passive mode (FTP), 11.2.4.2 Using passive mode, 11.2.4.3 The “PASV port theft” problem
- PASV port theft problem, 11.2.4.3 The “PASV port theft” problem
- passphrases, 2.4.4 If You Change Your Key, The SSH Agent
- changing, 2.4.4 If You Change Your Key
- limitations, The SSH Agent
- PasswdPath keyword (Tectia), 5.4.3 Public-Key Authentication
- password authentication, 5.4.2 Password Authentication, 5.4.2.2 Empty passwords, 5.4.2.3 Expired passwords, Unattended SSH: Batch or cron Jobs, 12.2.2.2 Password authentication
- batch jobs, issues with, Unattended SSH: Batch or cron Jobs
- empty passwords, 5.4.2.2 Empty passwords
- expired passwords, 5.4.2.3 Expired passwords
- troubleshooting, 12.2.2.2 Password authentication
- password cracking attacks, Threats SSH Doesn’t Prevent
- PasswordAuthentication keyword, Authentication: Verifying Identities, 7.1.2.4 Multiple matches, 10.3.2.7 Access control, 10.3.3.5 Login time, 12.2.2.2 Password authentication
- PasswordGuesses keyword (Tectia), 5.3.3.6 Failed logins
- PasswordPrompt keyword, 7.4.6.3 Password prompting in Tectia
- passwords, 4.2.4.5 Access control
- one-time passwords, 4.2.4.5 Access control
- PenguiNet, 13.3.7 Microsoft Windows
- per-account configuration, 4.1.5 Perform Compile-Time Configuration, Per-Account Server Configuration, Limits of This Technique, Limits of This Technique, 8.1.2 Authentication Issues, 8.2.2 Tectia Authorization Files, 8.2.3.7 Forced commands and secure copy (scp), 8.2.4.2 Tectia host access control, Hostbased Access Control, Summary, 10.3.3.9 Encryption, 12.2.3.3 Per-account authorization files
- advantages, Limits of This Technique
- authentication, 8.1.2 Authentication Issues, 8.2.2 Tectia Authorization Files, 8.2.3.7 Forced commands and secure copy (scp)
- access restriction by host or domain, 8.2.3.7 Forced commands and secure copy (scp)
- forced commands, 8.2.2 Tectia Authorization Files
- environment variables, setting, 8.2.4.2 Tectia host access control
- hostbased access control, Hostbased Access Control
- limitations, Limits of This Technique
- setup recommendations, 10.3.3.9 Encryption
- troubleshooting, 12.2.3.3 Per-account authorization files
- user’s rc file, Summary
- PGP (Pretty Good Privacy), PGP Authentication in Tectia
- authentication in Tectia, PGP Authentication in Tectia
- PgpKeyFingerprint keyword, PGP Authentication in Tectia, 8.2.2.1 Tectia PGP key authentication, Identity and Authorization Files, OpenSSH
- PgpKeyId keyword, PGP Authentication in Tectia, 8.2.2.1 Tectia PGP key authentication, Identity and Authorization Files, OpenSSH
- PgpKeyName keyword, PGP Authentication in Tectia, 8.2.2.1 Tectia PGP key authentication, Identity and Authorization Files, OpenSSH
- PgpPublicKeyFile keyword, PGP Authentication in Tectia, 8.2.2.1 Tectia PGP key authentication, Identity and Authorization Files, OpenSSH
- PgpSecretKeyFile keyword, Tectia External Keys
- PidFile keyword, 5.3.1.2 Random seed file
- Pine email client, 4.5.2 GNU Emacs, Pine, IMAP, and SSH, 11.3.2 Mail Relaying and News Access
- mail relaying, 11.3.2 Mail Relaying and News Access
- PKI (Public Key Infrastructure), 3.4.2.4 Key exchange and server authentication, 11.5.1.1 What’s a PKI?
- plaintext, A Cryptography Primer
- PocketPuTTY, 13.3.8 Microsoft Windows CE (PocketPC)
- PocketTTY, 13.3.8 Microsoft Windows CE (PocketPC)
- port forwarding, 1.4.6 Port Forwarding, Forwarding, Port Forwarding and X Forwarding, What Is Forwarding?, 9.2.1 Local Forwarding, 9.2.1.1 Local forwarding and GatewayPorts, 9.2.1.2 Remote forwarding, 9.2.4 Forwarding Off-Host, 9.2.6.1 One-shot forwarding, 9.2.8 Choosing the Target Forwarding Address, 9.2.9 Termination, 9.2.9.1 The TIME_WAIT problem, 9.2.9.1 The TIME_WAIT problem, 9.2.10.3 Per-account configuration, Dynamic Port Forwarding, 12.2.5.6 Port forwarding
- dynamic port forwarding, Dynamic Port Forwarding
- forwarding off-host, 9.2.4 Forwarding Off-Host
- ftp protocol forwarding, 9.2.10.3 Per-account configuration
- local forwarding, 9.2.1 Local Forwarding, 9.2.1.1 Local forwarding and GatewayPorts
- gateway ports, 9.2.1.1 Local forwarding and GatewayPorts
- remote forwarding, 9.2.1.2 Remote forwarding
- remote logins, without, 9.2.6.1 One-shot forwarding
- server configuration, Forwarding, 9.2.9.1 The TIME_WAIT problem
- target forwarding address, choosing, 9.2.8 Choosing the Target Forwarding Address
- termination, 9.2.9 Termination, 9.2.9.1 The TIME_WAIT problem
- TIME_WAIT problem, 9.2.9.1 The TIME_WAIT problem
- troubleshooting, 12.2.5.6 Port forwarding
- Port keyword, 5.3.3.1 Port number and network interface
- port number, 5.3.3.1 Port number and network interface
- server settings, 5.3.3.1 Port number and network interface
- Pragma Fortress, 13.3.7 Microsoft Windows
- PreferredAuthentications keyword, 7.4.13.2 The server is the boss
- PrintMotd keyword, User Logins and Accounts
- privacy, 3.1.1 Privacy (Encryption)
- private keys, What Is an Identity?
- privilege separation, issues with, 3.6.5 Privilege Separation in OpenSSH
- privileged ports, Related Technologies
- protocols, The SSH Protocol
- ProxyCommand keyword, 11.4.5.2 Security
- pSSH, 13.3.10 Palm OS
- pty-req channel request, 3.4.4.2 Requests
- public key files, 6.1.1 OpenSSH Identities
- Public Key Infrastructure (PKI), 3.4.2.4 Key exchange and server authentication
- public-key authentication, 2.4.1 A Brief Introduction to Keys, 2.4.2 Generating Key Pairs with ssh-keygen, 2.4.4 If You Change Your Key, 2.4.4 If You Change Your Key, 3.7.3 scp2/sftp Details, 11.1.2.2 Using a plaintext key, 11.1.2.3 Using an agent
- algorithms, 3.7.3 scp2/sftp Details
- authenticator, 2.4.1 A Brief Introduction to Keys
- batch jobs, 11.1.2.2 Using a plaintext key, 11.1.2.3 Using an agent
- agents, 11.1.2.3 Using an agent
- plaintext keys, 11.1.2.2 Using a plaintext key
- key pair generation, 2.4.2 Generating Key Pairs with ssh-keygen
- keys, changing, 2.4.4 If You Change Your Key, 2.4.4 If You Change Your Key
- OpenSSH, 2.4.4 If You Change Your Key
- public-key authentication
(continued), 2.4.1 A Brief Introduction to Keys, 2.4.3.2 Instructions for Tectia, 2.4.3.2 Instructions for Tectia, What Is an Identity?, 12.2.2.4 Public-key authentication
- password authentication, compared to, 2.4.3.2 Instructions for Tectia
- public keys, 2.4.1 A Brief Introduction to Keys, 2.4.3.2 Instructions for Tectia, What Is an Identity?
- Tectia systems, installation, 2.4.3.2 Instructions for Tectia
- troubleshooting, 12.2.2.4 Public-key authentication
- PublicHostKeyFile keyword, 5.3.1.1 Host key files
- PuTTY, 13.3.7 Microsoft Windows, 13.3.12 Unix Variants (Linux, OpenBSD, etc.), PuTTY for Windows, PuTTY for Windows, Obtaining and Installing, 18.2.1 Plink, a Console Client, 18.2.1 Plink, a Console Client, 18.2.2 Running Remote Commands, 18.3.1 File Transfer with PSCP, 18.3.2 File Transfer with PSFTP, Key Management, 18.4.1 Choosing a Key, Advanced Client Use, 18.5.2 Host Keys, 18.5.2 Host Keys, 18.5.4.2 Keepalive messages, 18.5.4.2 Keepalive messages, 18.5.4.2 Keepalive messages, 18.5.5 Pseudo-Terminal Allocation, 18.5.6 Proxies and SOCKS, 18.5.7 Encryption Algorithms, 18.5.8 Authentication, 18.5.8 Authentication, 18.5.9 Compression, 18.5.11 Batch Jobs, 18.5.11 Batch Jobs
- batch jobs, 18.5.11 Batch Jobs
- configuration and settings, 18.5.5 Pseudo-Terminal Allocation, 18.5.6 Proxies and SOCKS, 18.5.7 Encryption Algorithms, 18.5.8 Authentication, 18.5.8 Authentication, 18.5.9 Compression
- authentication, 18.5.8 Authentication
- compression, 18.5.9 Compression
- encryption algorithms, 18.5.7 Encryption Algorithms
- logging and debugging, 18.5.8 Authentication
- Proxies and SOCKS, 18.5.6 Proxies and SOCKS
- pseudo-terminal allocation, 18.5.5 Pseudo-Terminal Allocation
- configuration and use, Obtaining and Installing, Advanced Client Use, 18.5.2 Host Keys, 18.5.2 Host Keys
- host keys, 18.5.2 Host Keys
- saved sessions, Advanced Client Use
- SSH protocol selection, 18.5.2 Host Keys
- file transfers, 18.2.2 Running Remote Commands, 18.3.1 File Transfer with PSCP, 18.3.2 File Transfer with PSFTP
- PSCP, 18.3.1 File Transfer with PSCP
- PSFTP, 18.3.2 File Transfer with PSFTP
- forwarding, 18.5.11 Batch Jobs
- installation, PuTTY for Windows
- key management, Key Management, 18.4.1 Choosing a Key
- agents, 18.4.1 Choosing a Key
- Plink console client, 18.2.1 Plink, a Console Client
- remote commands, 18.2.1 Plink, a Console Client
- TCP/IP settings, 18.5.4.2 Keepalive messages, 18.5.4.2 Keepalive messages, 18.5.4.2 Keepalive messages
- keepalive messages, 18.5.4.2 Keepalive messages
- Nagle algorithm, 18.5.4.2 Keepalive messages
- remote port selection, 18.5.4.2 Keepalive messages