Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: O

O configuration command
sendmail, 5.3.7. Options
sendmail, 13.1. Options: An Overview
-o database switch : sendmail, 33.3.4.8. -o the database file is optional (V8.1 and above)
-O database switch : sendmail, 33.3.4.7. -O adaptive versus never add a null (V8.2 and above)
o flag : sendmail, 30.8. Alphabetized F= Flags
O lines in sendmail.cf : sendmail, 3.1. Role in the Filesystem
$o macro : (see OperatorChars (o) option)
o option : (see OldStyleHeaders (o) option)
O option : (see DaemonPortOptions (O) option)
-o switch (F command) : sendmail, 12.2. The File Form of Class
-o switch (makemap) : sendmail, 33.2.1.4. -o append to, don't overwrite the file
-o switch (sendmail) : sendmail, 36.7. Alphabetized Reference
-O switch (sendmail) : sendmail, 36.7. Alphabetized Reference
OBJADD= directive : sendmail, 18.4.10. OBJADD=
object identifier : TCP/IP Network Administration, 11.9. Simple Network Management Protocol
obscurity
Building Internet Firewalls, 1.3.2. Security Through Obscurity
Practical UNIX & Internet Security, 2.5. The Problem with Security Through Obscurity
Practical UNIX & Internet Security, 2.5.3. Final Words: Risk Management Means Common Sense
Practical UNIX & Internet Security, 8.8.9. Account Names Revisited: Using Aliases for Increased
Practical UNIX & Internet Security, 18.2.4. Keep Your Scripts Secret!
obtaining
BIND via FTP : sendmail, 21.1.1. Which DNS? 4.8.3 or 4.9?
db library package : sendmail, C.2. Get the Source
sendmail source code
sendmail, 2.1. Get the Source
sendmail, 18.3. Obtain the Source
octal file permissions
Practical UNIX & Internet Security, 5.2.3. Calculating Octal File Permissions
Practical UNIX & Internet Security, 5.2.4. Using Octal File Permissions
octal-type arguments : sendmail, 34.5. Option Argument Types
octet data
Practical UNIX & Internet Security, 16.2.1. Internet Addresses
TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
octet-stream application subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
Odlyzko, Andrew : Practical UNIX & Internet Security, 19.3.4. Limitations of Secure RPC
-odq switch : sendmail, 23.6.1. Periodically with -q
Oerrs (output errors) : TCP/IP Network Administration, 11.4.3. Checking the Interface with netstat
OFB (output feedback) : Practical UNIX & Internet Security, 6.4.4.2. DES modes
offsite primary name servers : sendmail, 21.5.2. Offsite Servers
"ok" message : sendmail, 4.2. Verbose (-v)
old-style address lists : sendmail, 13.2.7. Accept Old-Style Lists of Addresses
OLD_NEWDB macro : sendmail, 18.8. Alphabetized Reference
OldStyleHeaders (o) option
sendmail, 13.2.7. Accept Old-Style Lists of Addresses
sendmail, 34.8. Alphabetized Reference
on program : Building Internet Firewalls, 2.3. Remote Terminal Access and Command
on-the-job security
Practical UNIX & Internet Security, 13.2. On the Job
Practical UNIX & Internet Security, 13.2.6. Departure
one : Practical UNIX & Internet Security, 9.2.1. Comparison Copies
one-command accounts : Practical UNIX & Internet Security, 8.1.3. Accounts That Run a Single Command
one-time pad encryption
Practical UNIX & Internet Security, 6.4.7. An Unbreakable Encryption Algorithm
Practical UNIX & Internet Security, 8.7.3. Code Books
one-time passwords
Building Internet Firewalls, 10.3.1. One-Time Passwords
Practical UNIX & Internet Security, 8.7. One-Time Passwords
Practical UNIX & Internet Security, 8.7.3. Code Books
Practical UNIX & Internet Security, 17.4. Security Implications of Network Services
Practical UNIX & Internet Security, 23.3. Tips on Writing Network Programs
TCP/IP Network Administration, Preface
TCP/IP Network Administration, 12.2.3. One-Time Passwords
One-time Passwords In Everything (OPIE) : TCP/IP Network Administration, 12.2.4. OPIE
one-way phone lines : Practical UNIX & Internet Security, 14.4.1. One-Way Phone Lines
ONEX command, in ESMTP : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
open access, tradition of : Practical UNIX & Internet Security, 1.4.1. Expectations
open accounts
Practical UNIX & Internet Security, 8.1.4. Open Accounts
Practical UNIX & Internet Security, 8.1.4.6. Potential problems with rsh
Practical UNIX & Internet Security, 8.8.7. Algorithm and Library Changes
open command
Practical UNIX & Internet Security, 5.1.7. File Permissions in Detail
Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
O_CREAT and O_EXCL flags : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
open file descriptors : sendmail, 26.3.3.1. -- open file descriptors: --
open protocol suite : TCP/IP Network Administration, 3.7.1. File Sharing
Open Shortest Path First : (see OSPF protocol)
Open Software Foundation (OSF) : Practical UNIX & Internet Security, 1.3. History of UNIX
Open System Interconnection (OSI)
Building Internet Firewalls, C.2.1. OSI Reference Model
Practical UNIX & Internet Security, 16.4.4. OSI
TCP/IP Network Administration, 1.2. A Data Communications Model
TCP/IP Network Administration, 6.1.1. Determining the Interface Name
opendir library call : Practical UNIX & Internet Security, 5.4. Using Directory Permissions
openlog command : sendmail, 26.1.1. syslog(3)
operating systems
Building Internet Firewalls, Platforms
Practical UNIX & Internet Security, 1.2. What Is an Operating System?
Practical UNIX & Internet Security, 12.3.3. Other Media
administration : (see system administration)
choosing : Building Internet Firewalls, 5.3.1. What Operating System?
errors
sendmail, 36.5.3. EX_IOERR A System I/O Error Occurred
sendmail, 36.5.5. EX_OSERR A System Resource Error
file failure : sendmail, 36.5.6. EX_OSFILE A Critical System File Failure
fixing bugs in : Building Internet Firewalls, 5.8.1.2. Fix all known system bugs
installation of : Building Internet Firewalls, 5.8.1.1. Start with a minimal clean operating system
keeping secret : Practical UNIX & Internet Security, 2.5. The Problem with Security Through Obscurity
load : (see performance)
multiple, and proxying : Building Internet Firewalls, 7.1. Why Proxying?
OSTYPE declaration
sendmail, 16.2.2. OSTYPE
sendmail, 19.3.1. OSTYPE()
TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros
defines, listed : TCP/IP Network Administration, E.3.3. OSTYPE
in sendmail
TCP/IP Network Administration, E.3. m4 sendmail Macros
TCP/IP Network Administration, E.3.3. OSTYPE
testing reload of : Building Internet Firewalls, 13.5.6. Testing the Reload of the Operating
UNIX : (see UNIX)
OperatorChars (o) option
sendmail, 8.3. Rule Sets
sendmail, 31.10. Alphabetized Reference
sendmail, 34.8. Alphabetized Reference
operators, token separation : (see OperatorChars (o) option)
opiekey software : TCP/IP Network Administration, 12.2.4. OPIE
opiepassword : TCP/IP Network Administration, 12.2.4. OPIE
${opmode} macro : sendmail, 31.10. Alphabetized Reference
optic cables : (see cables, network)
optical vampire taps : Practical UNIX & Internet Security, 12.3.1.5. Fiber optic cable
option set, invoking dialup IP (dip) : TCP/IP Network Administration, A.1. Dial-Up IP
optional database files : sendmail, 33.3.4.8. -o the database file is optional (V8.1 and above)
Options command : Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
options entry, in resolv.conf : TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
option field, in DHCP : TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
options file
TCP/IP Network Administration, 6.3.1. The PPP Daemon
TCP/IP Network Administration, 6.3.2. Dial-Up PPP
options statement : TCP/IP Network Administration, 5.3.1.1. Options
in gated : TCP/IP Network Administration, B.5. Options Statements
INET
TCP/IP Network Administration, 5.3.1.1. Options
TCP/IP Network Administration, A.2. The PPP Daemon
options, sendmail
sendmail, 3.1. Role in the Filesystem
sendmail, 4. How to Run sendmail
sendmail, 5.3.7. Options
sendmail, 13. Setting Options
sendmail, 19.4.1. Options
sendmail, 34. Options
(see also switches, command-line)
m4 and : sendmail, 34.3. Configuring with V8 m4 Options
multicharacter
sendmail, 34.1.2. V8.7 Multicharacter Options in the Command Line
sendmail, 36.7. Alphabetized Reference
required : sendmail, 13.2. Required Options
safe : sendmail, 34.1.4. Options that Are Safe
security : sendmail, 22.8.3. Security Options
single-character : sendmail, 36.7. Alphabetized Reference
testing : sendmail, 13.3. Testing the Options
options.device file : TCP/IP Network Administration, A.2. The PPP Daemon
Orange Book : Practical UNIX & Internet Security, 2.3.3. Adding Up the Numbers
ORCPT address : sendmail, 23.9. The qf File Internals
org domain : TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
origin date, message : (see $a macro)
originate mode : Practical UNIX & Internet Security, 14.3.1. Originate and Answer
originate testing : Practical UNIX & Internet Security, 14.5.3.1. Originate testing
orphaned locks : sendmail, 23.2.3.3. Locks can get stuck
OSF (Open Software Foundation) : Practical UNIX & Internet Security, 1.3. History of UNIX
OSF/1 operating system : Practical UNIX & Internet Security, 1.3. History of UNIX
OSI (Open System Interconnection)
Building Internet Firewalls, C.2.1. OSI Reference Model
Practical UNIX & Internet Security, 16.4.4. OSI
TCP/IP Network Administration, 1.2. A Data Communications Model
TCP/IP Network Administration, 6.1.1. Determining the Interface Name
OSPF protocol
TCP/IP Network Administration, Preface
TCP/IP Network Administration, 1.7. Application Layer
TCP/IP Network Administration, 7.4.3. Open Shortest Path First
authenticating packets : TCP/IP Network Administration, B.8.1. The ospf Statement
enabling (in gated)
TCP/IP Network Administration, 7.7.1.2. Interior gateway configurations
TCP/IP Network Administration, 7.7.1.3. Exterior gateway configuration
TCP/IP Network Administration, B.8.1. The ospf Statement
ospf statement (in gated) : TCP/IP Network Administration, B.8.1. The ospf Statement
ospfase protocol : TCP/IP Network Administration, 7.7.1.3. Exterior gateway configuration
OSTYPE command (m4)
sendmail, 16.2.2. OSTYPE
sendmail, 19.3.1. OSTYPE()
TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros
defines, listed : TCP/IP Network Administration, E.3.3. OSTYPE
in sendmail
TCP/IP Network Administration, E.3. m4 sendmail Macros
TCP/IP Network Administration, E.3.3. OSTYPE
out-of-date files, defined : TCP/IP Network Administration, 9.6.1. rdist
outgoing (outbound)
calls : Practical UNIX & Internet Security, 14.5. Modems and UNIX
finger requests : Building Internet Firewalls, 8.8.1. finger
mail, logging : Practical UNIX & Internet Security, 10.4.2. Mail
packets : Building Internet Firewalls, 6.2.2. Be Careful of `Inbound'
filtering rules for : Building Internet Firewalls, 6.8.6. It Should Apply Rules Separately to
Telnet : Building Internet Firewalls, 6.7.1. Outbound Telnet Service
Outcome table (NIS+) : Practical UNIX & Internet Security, 19.5.3. NIS+ Tables
outdated software : (see software)
output
debugging : sendmail, 37.3. Interpreting the Output
errors (Oerrs) : TCP/IP Network Administration, 11.4.3. Checking the Interface with netstat
feedback (OFB) : Practical UNIX & Internet Security, 6.4.4.2. DES modes
rule testing : sendmail, 38.6.4. The Output
syslog : sendmail, 26.1.3. syslog's Output
outsiders : Practical UNIX & Internet Security, 13.3. Outsiders
overload attacks
Practical UNIX & Internet Security, 25.2. Overload Attacks
Practical UNIX & Internet Security, 25.2.5. Soft Process Limits: Preventing Accidental Denial
overruns : (see buffers, overruns)
overtime : Practical UNIX & Internet Security, 13.2.3. Performance Reviews and Monitoring
overwhelming the server : TCP/IP Network Administration, 9.4. A BOOTP Server
overwriting
files : sendmail, 33.2.1.4. -o append to, don't overwrite the file
media : Practical UNIX & Internet Security, 12.3.2.3. Sanitize your media before disposal
rule sets : sendmail, 8.4. Rules
OW- (sendmail.cf) : Practical UNIX & Internet Security, 17.3.4.2. Using sendmail to receive email
owner, mailing list : sendmail, 25.3. Defining a Mailing List Owner
owner-admin alias : TCP/IP Network Administration, 10.3. sendmail Aliases
owners of information : Practical UNIX & Internet Security, 2.4.4.1. Assign an owner
owners, changing : Practical UNIX & Internet Security, 5.7. chown: Changing a File's Owner
ownership : (see permissions)
ownership notices : Practical UNIX & Internet Security, 26.2.6. Other Tips


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.