5. RFC
RFC 4250 The Secure Shell (SSH) Protocol Assigned Numbers
RFC 4251 The Secure Shell (SSH) Protocol Architecture
RFC 4252 The Secure Shell (SSH) Authentication Protocol
RFC 4253 The Secure Shell (SSH) Transport Layer Protocol
RFC 4254 The Secure Shell (SSH) Connection Protocol
RFC 4255 Using DNS to Securely Publish Secure Shell (SSH) Key
Fingerprints
RFC 4256 Generic Message Exchange Authentication for the Secure
Shell Protocol (SSH)
RFC1928 : SOCKS Protocol Version 5
5 / 62
6. RFC(続き)
RFC 4335 The Secure Shell (SSH) Session Channel Break Extension
RFC 4344 The Secure Shell (SSH) Transport Layer Encryption Modes
RFC 4345 Improved Arcfour Modes for the Secure Shell (SSH)
Transport Layer Protocol
RFC 4419 Diffie-Hellman Group Exchange for the Secure Shell (SSH)
Transport Layer Protocol
RFC 4432 RSA Key Exchange for the Secure Shell (SSH) Transport
Layer Protocol
RFC 4462 Generic Security Service Application Program Interface
(GSS-API) Authentication and Key Exchange for the Secure
Shell (SSH) Protocol
RFC 4716 The Secure Shell (SSH) Public Key File Format
RFC 5656 Elliptic Curve Algorithm Integration in the Secure Shell
Transport Layer
6 / 62
45. うまく繋がらない
► 保存してるホストの公開鍵が一致しない
意図的に再生成した(再インストール)/IPアドレスが
変わった/乗っ取られた
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now (man-in-the-middle attack)!
It is also possible that a host key has just been changed.
The fingerprint for the RSA key sent by the remote host is
XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX.
Please contact your system administrator.
Add correct host key in /home/username/.ssh/known_hosts to get rid of this message.
Offending RSA key in /home/username/.ssh/known_hosts:20
remove with: ssh-keygen -f "/home/username/.ssh/known_hosts" -R XXXXXXXX
45 / 62
58. 自前でコンパイルするなら
► コンパイルオプションに注意
○○をサポートする/しないが大量に選べる
OpenSSH has been configured with the following options:
PAM support: no
OSF SIA support: no
KerberosV support: no
SELinux support: no
Smartcard support:
S/KEY support: no
TCP Wrappers support: no
MD5 password support: no
libedit support: no
Solaris process contract support: no
Solaris project support: no
BSD Auth support: no
58 / 62