Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: R
- r commands
: Building Internet Firewalls, 5.8.2.4. Which services should you disable?
- configuring
: Building Internet Firewalls, 8.4.1. BSD
- packet filtering and
: Building Internet Firewalls, 6.1.2.2. Some protocols are not well suited to packet
- R configuration command
- sendmail, 5.3.3. Rules
- sendmail, 8.4. Rules
- sendmail, 27.2. Comments
- sendmail, 28.1. Overview
- sendmail, 29.1.5. Rule Sets and Lists of Rules
- r flag
- sendmail, 30.7. Pitfalls
- sendmail, 30.8. Alphabetized F= Flags
- R flag
: sendmail, 30.8. Alphabetized F= Flags
- R in configuration file
: sendmail, 1.3.1. The Configuration File
- R line (host status file)
: sendmail, B.1. Status file lines
- R line (qf file)
- sendmail, 23.4.1. Printing the Queue in Verbose Mode
- sendmail, 23.9. The qf File Internals
- $r macro
- sendmail, 23.9. The qf File Internals
- sendmail, 26.1.3.8. proto= the protocol used in transmission
- sendmail, 31.10. Alphabetized Reference
- sendmail, 36.7. Alphabetized Reference
- $R macro
: sendmail, 31.10. Alphabetized Reference
- R option
- sendmail, D.5. The > Option
- (see DontPruneRoutes command)
- r option
: (see Timeout (r) option)
- -r switch (makemap)
: sendmail, 33.2.1.5. -r replace (silently) duplicate keys
- -r switch (sendmail)
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 36.7. Alphabetized Reference
- -R switch (sendmail)
: sendmail, 36.7. Alphabetized Reference
- R= equate
- sendmail, 6.3. The local Delivery Agent
- sendmail, 6.3.1. Skipping Rule Sets
- sendmail, 29.6.2. Selecting S= and R=
- sendmail, 30.4. The Equates
- rabbit programs
- Practical UNIX & Internet Security, 11.1. Programmed Threats: Definitions
- Practical UNIX & Internet Security, 11.1.7. Bacteria and Rabbits
- race conditions
: Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- RADB (Routing Arbiter Database)
: TCP/IP Network Administration, 2.4. Internet Routing Architecture
- radio
- Practical UNIX & Internet Security, 12.2.1.8. Electrical noise
- Practical UNIX & Internet Security, 12.3.1.3. Eavesdropping by radio and using TEMPEST
- Practical UNIX & Internet Security, 14.4.4.1. Kinds of eavesdropping
- rain
: (see water)
- RAM theft
: Practical UNIX & Internet Security, 12.2.6. Preventing Theft
- rand function
: Practical UNIX & Internet Security, 23.7.1. rand ( )
- random device
: Practical UNIX & Internet Security, 23.7.4. Other random number generators
- random function
: Practical UNIX & Internet Security, 23.7.2. random ( )
- random numbers
: Practical UNIX & Internet Security, 23.6. Tips on Generating Random Numbers
- range parameter
- TCP/IP Network Administration, 9.5.1. dhcpd.conf
- TCP/IP Network Administration, D.3.2. Configuration Parameters
- RARP (Reverse Address Resolution Protocol)
- TCP/IP Network Administration, 3.5.1. Reverse Address Resolution Protocol
- TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- adding to Linux kernel
: TCP/IP Network Administration, 6.1.5.5. Point-to-point
- /etc/ethers file in
: TCP/IP Network Administration, 9.3. Network Information Service
- raw devices
: Practical UNIX & Internet Security, 5.6. Device Files
- raw sockets
: TCP/IP Network Administration, 5.4. The Internet Daemon
- rc directory
- Practical UNIX & Internet Security, 11.5.3.5. System initialization files
- Practical UNIX & Internet Security, 17.1.2. Starting the Servers
- Practical UNIX & Internet Security, C.5.1. Process #1: /etc/init
- sendmail, 15.5. Prevent the Daemon from Running
- commenting out services
: Practical UNIX & Internet Security, 17.3. Primary UNIX Network Services
- services started by
: Building Internet Firewalls, 5.8.2.1. How are services managed?
- rc.inet1 script
: TCP/IP Network Administration, 7.3.1.1. Installing static routes at startup
- rc.M startup script
: TCP/IP Network Administration, 10.2. Running sendmail as a Daemon
- RC2, RC4, and RC5 algorithms
- Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
- Practical UNIX & Internet Security, 6.4.8. Proprietary Encryption Systems
- RC4 and RC5 algorithms
: Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
- rcp command
- Building Internet Firewalls, 2.2. File Transfer
- Practical UNIX & Internet Security, 1.4.3. Add-On Functionality Breeds Problems
- Practical UNIX & Internet Security, 7.4.5. Backups Across the Net
- RCPT command (SMTP)
- sendmail, 23.9. The qf File Internals
- sendmail, 29.10.2. The check_rcpt Rule Set
- sendmail, 36.7. Alphabetized Reference
- RCS (Revision Control System)
- Practical UNIX & Internet Security, 7.3.2. Building an Automatic Backup System
- Practical UNIX & Internet Security, 17.3. Primary UNIX Network Services
- TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros
- rdist command
- Practical UNIX & Internet Security, 7.4.5. Backups Across the Net
- Practical UNIX & Internet Security, 9.2.1.3. rdist
- TCP/IP Network Administration, 9.6.1. rdist
- rdump/rrestore program
: Practical UNIX & Internet Security, 7.4.5. Backups Across the Net
- reachability information
- TCP/IP Network Administration, 2.4. Internet Routing Architecture
- TCP/IP Network Administration, 7.5. Exterior Routing Protocols
- TCP/IP Network Administration, 7.6. Gateway Routing Daemon
- READ command, in POP
: TCP/IP Network Administration, 3.4.2. Post Office Protocol
- read permission
- Practical UNIX & Internet Security, 5.1.7. File Permissions in Detail
- Practical UNIX & Internet Security, 5.4. Using Directory Permissions
- (see permissions)
- read system call
: Practical UNIX & Internet Security, 5.1.7. File Permissions in Detail
- time-outs on
: Practical UNIX & Internet Security, 23.3. Tips on Writing Network Programs
- READ= command
: Practical UNIX & Internet Security, 15.5.2. Permissions Commands
- READ_ME file
: sendmail, 2.2. Read the Documents
- read-only filesystems
- Practical UNIX & Internet Security, 11.6.1.2. Writable system files and directories
- Building Internet Firewalls, 5.8.4.3. Mount filesystems as read-only
- Practical UNIX & Internet Security, 9.1.2. Read-only Filesystems
- readdir library call
: Practical UNIX & Internet Security, 5.4. Using Directory Permissions
- real UIDs/GIDs
- Practical UNIX & Internet Security, 4.3.1. Real and Effective UIDs
- Practical UNIX & Internet Security, C.1.3.2. Process real and effective UID
- real-time conferencing
: (see conferencing services, real-time)
- RealHostAddr variable
: sendmail, 20.1.2. Global Variables
- RealHostName variable
: sendmail, 20.1.2. Global Variables
- realpath function
: Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- reauthentication
- Kerberos
: Practical UNIX & Internet Security, 19.6.4. Using Kerberos
- Secure RPC
: Practical UNIX & Internet Security, 19.3.1.3. Setting the window
- rebooting
: Building Internet Firewalls, 5.10.1. Watch Reboots Carefully
- rebuild aliases mode
: sendmail, 4.1.3. Rebuild Aliases Mode (-bi)
- rebuilding
: (see building)
- Receive Data (RD)
: Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- "Received:" header line
- sendmail, 1.5. The Header
- sendmail, 13.4. Sending Mail
- sendmail, 14.1.2. The Received: Header
- sendmail, 20.2.5. Prune Received: Headers at Firewall
- sendmail, 35.10. Alphabetized Reference
- forged mail and
: sendmail, 22.7.2. Forging with SMTP
- recipient list buffer size
: sendmail, 18.8. Alphabetized Reference
- RecipientFactor (y) option
: sendmail, 34.8. Alphabetized Reference
- recipients
- sendmail, 6.3. The local Delivery Agent
- (see also R= equate; $u macro)
- adding domain to address
: sendmail, 30.8. Alphabetized F= Flags
- addresses of
- sendmail, 6.3. The local Delivery Agent
- sendmail, 23.9. The qf File Internals
- sendmail, 29.10.4. The check_compat Rule Set
- sendmail, 31.10. Alphabetized Reference
- TCP/IP Network Administration, 10.6.3. The Set Ruleset Command
- (see also addresses)
- check_rcpt rule set
: sendmail, 29.10.2. The check_rcpt Rule Set
- delivery agent as
: sendmail, 30.8. Alphabetized F= Flags
- filtering with shell script
: sendmail, 24.6.2. Filtering Recipients with a Shell Script
- getting from header
: sendmail, 36.7. Alphabetized Reference
- headers for
: sendmail, 35.6.3. Recipient Headers
- home directory of
: sendmail, 31.10. Alphabetized Reference
- large lists of
: sendmail, 34.8. Alphabetized Reference
- logging
- sendmail, 26.1.3.6. nrcpts= the number of recipients
- sendmail, 26.1.3.12. to= show final recipient
- missing
- sendmail, 34.8. Alphabetized Reference
- sendmail, 35.10. Alphabetized Reference
- multiple
: sendmail, 30.8. Alphabetized F= Flags
- processing list of
- sendmail, 36.3. List of Recipient Addresses
- sendmail, 36.4.5. Fifth: Collect Recipients
- selecting MTA for
: (see rule set 0)
- username of
: (see $u macro)
- whitespace in lists of
: sendmail, 34.8. Alphabetized Reference
- recnews program
: sendmail, 25.5.2. Gateway Lists to News
- recommended headers
: sendmail, 35.6.1. Recommended Headers
- recording activity
: (see logs/logging)
- recovering after incident
: Building Internet Firewalls, 13.1.6. Restore and Recover
- plan for
: Building Internet Firewalls, 13.4.6. Planning for Restoration and Recovery
- recursion
: sendmail, 21.3.3. MX Records Are Nonrecursive
- recursive macro expansion
: sendmail, 31.5.1. Macro Expansion Is Recursive
- recursive searches
: TCP/IP Network Administration, 3.3.2. Creating Domains and Subdomains
- redirect feature
: sendmail, 19.6. Alphabetized m4 Macros
- Redirect Message
- TCP/IP Network Administration, 1.5.2. Internet Control Message Protocol
- TCP/IP Network Administration, 2.5. The Routing Table
- TCP/IP Network Administration, 7.3.1. Adding Static Routes
- redirect statement (in gated)
: TCP/IP Network Administration, B.8.8. The redirect Statement
- redirecting messages
: (see aliases/aliasing)
- redirecting routes
: TCP/IP Network Administration, 1.5.2. Internet Control Message Protocol
- Redman, Brian E.
: Practical UNIX & Internet Security, 15.2. Versions of UUCP
- refer_log file
: Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
- "Reference:" header line
: sendmail, 35.10. Alphabetized Reference
- reflectors (in Enigma system)
: Practical UNIX & Internet Security, 6.3. The Enigma Encryption System
- reformatting attack
: Practical UNIX & Internet Security, 25.1. Destructive Attacks
- refresh values
: TCP/IP Network Administration, C.3.1.1. Start of Authority record
- RefuseLA (X) option
: sendmail, 34.8. Alphabetized Reference
- registered hosts
: TCP/IP Network Administration, 3.2. The Host Table
- registration fee
: TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
- reject route
- TCP/IP Network Administration, B.9. static Statements
- TCP/IP Network Administration, B.10.1. The import Statement
- rejecting mail messages
- sendmail, 18.8. Alphabetized Reference
- sendmail, 20.2.6. Reject Mail from Spamming or Mail-bombing Sites
- relative humidity
: Practical UNIX & Internet Security, 12.2.1.11. Humidity
- relative pathnames
: Practical UNIX & Internet Security, 5.1.3. Current Directory and Paths
- relay= equate (syslog output)
: sendmail, 26.1.3.9. relay= the host that sent or accepted the message
- relays
: sendmail, 19.4.5. Relays
- smart hosts
: sendmail, 19.6. Alphabetized m4 Macros
- RELEASE_NOTES file
: sendmail, 2.2. Read the Documents
- reliability
: TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
- remembering passwords
: TCP/IP Network Administration, 12.2.2. Choosing a Password
- remote
- command execution
- Building Internet Firewalls, 8.4. Remote Command Execution
- Practical UNIX & Internet Security, 15.1.2. uux Command
- Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution
- Practical UNIX & Internet Security, 17.3.17. rexec (TCP Port 512)
- comparison copies
: Practical UNIX & Internet Security, 9.2.1.2. Remote copies
- computers
- hijacking
: Building Internet Firewalls, 10.1.1. Hijacking
- transferring files to
: Practical UNIX & Internet Security, 15.1.1. uucp Command
- file access (UUCP)
- Practical UNIX & Internet Security, 15.4.1. USERFILE: Providing Remote File Access
- Practical UNIX & Internet Security, 15.4.2.1. Some bad examples
- hosts
- sendmail, 21.2.2. Look Up a Remote Host's Name
- TCP/IP Network Administration, 1.5.2. Internet Control Message Protocol
- network filesystems
: Practical UNIX & Internet Security, 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
- procedure calls
: (see RPCs)
- servers
: TCP/IP Network Administration, 6.3.2. Dial-Up PPP
- accessing files on
: TCP/IP Network Administration, 9.1. The Network File System
- contacting administrators of
- TCP/IP Network Administration, 11.1.1. Troubleshooting Hints
- TCP/IP Network Administration, 11.3. Testing Basic Connectivity
- never extending trust to
: TCP/IP Network Administration, 12.2.3. One-Time Passwords
- problem for firewalls
: TCP/IP Network Administration, 12.7.1. Functions of the firewall
- terminal access
- Building Internet Firewalls, 2.3. Remote Terminal Access and Command
- (see also Telnet service)
- remote copy (rcp) command
: TCP/IP Network Administration, 9.6. Managing Distributed Servers
- remote file
- Practical UNIX & Internet Security, 10.3.1. aculog File
- Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer
- Remote File System (RFS)
: TCP/IP Network Administration, 3.7.1. File Sharing
- Remote Procedure Calls
: (see RPCs)
- remote.unknown file
: Practical UNIX & Internet Security, 15.5. Security in BNU UUCP
- remounting filesystems after system reboot
: TCP/IP Network Administration, 9.1.3.2. The vfstab and fstab files
- renice command
- Practical UNIX & Internet Security, 25.2.1.2. System overload attacks
- Practical UNIX & Internet Security, C.1.3.3. Process priority and niceness
- replacement character for space
: sendmail, 13.2.8. The Unquoted Space Replacement Character
- replay attacks
- Practical UNIX & Internet Security, 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
- Practical UNIX & Internet Security, 19.6.1.2. Using the ticket granting ticket
- reply feature
: sendmail, 10.1. Why Preprocess?
- "Reply-To:" header line
- sendmail, 25.5.1. Reply Versus Bounce
- sendmail, 35.10. Alphabetized Reference
- REPORT keyword
: TCP/IP Network Administration, A.3. chat
- reportfile
: TCP/IP Network Administration, A.3. chat
- reporting security holes
: Practical UNIX & Internet Security, 2.5.1. Going Public
- reputation
: Building Internet Firewalls, 1.1.3. Your Reputation
- Request to Send (RTS)
: Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- REQUEST= command
- Practical UNIX & Internet Security, 15.5.1.3. A Sample Permissions file
- Practical UNIX & Internet Security, 15.5.2. Permissions Commands
- Requests for Comments
: (see RFCs)
- RES_DNSRCH
: sendmail, 21.2.4. The $[ and $] Operators
- res_search()
- sendmail, 18.8. Alphabetized Reference
- sendmail, 21.2.3. Look Up Addresses for Delivery
- "Recent-" header lines
: sendmail, 35.7. Forwarding with Resent-Headers
- reserved memory space
: Practical UNIX & Internet Security, 25.2.2.6. Reserved space
- reserved TCP port
: sendmail, 30.8. Alphabetized F= Flags
- reset command
: TCP/IP Network Administration, 6.3.2. Dial-Up PPP
- resolution, time
: Practical UNIX & Internet Security, 23.8. Picking a Random Seed
- resolv.conf file
- TCP/IP Network Administration, 8.1.1. BIND Configurations
- TCP/IP Network Administration, 8.2. Configuring the Resolver
- TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
- TCP/IP Network Administration, 11.6.4. dig: An Alternative to nslookup
- resolver
- code
: TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
- configuring
: TCP/IP Network Administration, 8.2. Configuring the Resolver
- defined
: TCP/IP Network Administration, 8.1. BIND: UNIX Name Service
- DNS
: Practical UNIX & Internet Security, 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
- options
: TCP/IP Network Administration, E.4.2. sendmail Options
- resolver library
- Practical UNIX & Internet Security, 16.2.6.1. DNS under UNIX
- sendmail, 18.5.1. Use libresolv.a
- resolver-only configurations
- TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
- TCP/IP Network Administration, 8.1.1. BIND Configurations
- TCP/IP Network Administration, 8.2.1.1. A resolver-only configuration
- ResolverOptions (I) option
- sendmail, 21.2.4. The $[ and $] Operators
- sendmail, 34.8. Alphabetized Reference
- resource unavailable error
: sendmail, 36.5.9. EX_UNAVAILABLE A Resource
- resources (memory)
: Building Internet Firewalls, 1.1.2. Your Resources
- resources on sendmail
- sendmail, Additional Sources of Information
- sendmail, 2.2. Read the Documents
- response teams
- Practical UNIX & Internet Security, 27.3.5. Response Personnel?
- Practical UNIX & Internet Security, F.3. Emergency Response Organizations
- Practical UNIX & Internet Security, F.3.4.46. Westinghouse Electric
- (see incident response teams)
- mailing lists for
: Practical UNIX & Internet Security, E.1.1. Response Teams and Vendors
- responsibilities of administrators
- TCP/IP Network Administration, 1.7. Application Layer
- TCP/IP Network Administration, 4. Getting Started
- TCP/IP Network Administration, 4.3. Planning Routing
- TCP/IP Network Administration, 4.6. Informing the Users
- TCP/IP Network Administration, 5.1. Kernel Configuration
- restart signal
: sendmail, 26.3.2. SIGHUP Restart
- restarting sendmail daemon
: sendmail, 4.1.1.1. Kill and restart, beginning with V8.7
- restore program
: (see dump/restore program)
- restricted
- filesystems
- Practical UNIX & Internet Security, 8.1.5. Restricted Filesystem
- Practical UNIX & Internet Security, 8.1.5.2. Checking new software
- FTP
: Practical UNIX & Internet Security, 17.3.2.5. Restricting FTP with the standard UNIX FTP server
- logins
: Practical UNIX & Internet Security, 8.3. Restricting Logins
- shells
- Practical UNIX & Internet Security, 8.1.4.1. Restricted shells under System V UNIX
- Practical UNIX & Internet Security, 8.1.4.6. Potential problems with rsh
- su use
: Practical UNIX & Internet Security, 4.3.6. Restricting su
- restrictmailq (sendmail)
: Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
- retention of backups
- Practical UNIX & Internet Security, 7.1.5. How Long Should You Keep a Backup?
- Practical UNIX & Internet Security, 7.2.2.2. Retention schedule
- (see also networks and networking, backing up)
- retina authentication
: Building Internet Firewalls, 10.2.1. Something You Are
- retired accounts
: sendmail, 19.6. Alphabetized m4 Macros
- RETR command, in POP
: TCP/IP Network Administration, 3.4.2. Post Office Protocol
- retry time
: sendmail, 34.8. Alphabetized Reference
- RetryFactor (Z) option
- sendmail, 23.9. The qf File Internals
- sendmail, 34.8. Alphabetized Reference
- return calls
: Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- return interval
: sendmail, 13.2.2. Limit the Life of Queued Messages
- "Return-Path:" header line
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 35.10. Alphabetized Reference
- "Return-Receipt-To:" header line
- sendmail, 18.8. Alphabetized Reference
- sendmail, 35.10. Alphabetized Reference
- Reverse Address Resolution Protocol
: (see RARP)
- reverse domain
: TCP/IP Network Administration, 4.4.1.1. Obtaining an IN-ADDR.ARPA domain
- files
- TCP/IP Network Administration, 8.3.5. The Reverse Domain File
- TCP/IP Network Administration, C.3.1.6. Domain Name Pointer record
- reverse lookups
- Building Internet Firewalls, 8.10.4.2. Mismatched data between the hostname
- Building Internet Firewalls, 8.10.5.1. Set up a `fake'
- Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
- Practical UNIX & Internet Security, 23.3. Tips on Writing Network Programs
- reviewing security policies
: Building Internet Firewalls, 11.1.1.5. Provision for reviews
- Revision Control System (RCS)
- Practical UNIX & Internet Security, 7.3.2. Building an Automatic Backup System
- Practical UNIX & Internet Security, 17.3. Primary UNIX Network Services
- revocation certificate
: Practical UNIX & Internet Security, 6.6.3.2. Creating your PGP public key
- "rewrite" prompt
: (see address-testing mode)
- rewrite rules
- processing sequentially
: TCP/IP Network Administration, 10.6.2. Transforming the Address
- recursion built-in
: TCP/IP Network Administration, 10.6.2. Transforming the Address
- syntax of
: TCP/IP Network Administration, 10.6.2. Transforming the Address
- using external databases in
: TCP/IP Network Administration, 10.6.2.1. Transforming with a database
- rewriting
- addresses
- sendmail, 8.3. Rule Sets
- sendmail, 11.4.1. Rewrite the Lone Username
- rule sets
- (see R= equate)
- (see S= equate)
- User Database
: sendmail, 30.8. Alphabetized F= Flags
- rex service
: Building Internet Firewalls, 8.4.3. rex
- rexd service
: Practical UNIX & Internet Security, 19.2.2.4. AUTH_KERB
- rexec service
- Building Internet Firewalls, 8.4.2. rexec
- Practical UNIX & Internet Security, 17.3.17. rexec (TCP Port 512)
- RFCs (Requests for Comments)
- sendmail, The RFCs
- TCP/IP Network Administration, 1.1.2. Protocol Standards
- TCP/IP Network Administration, 1.4. Network Access Layer
- TCP/IP Network Administration, 2.3. Subnets
- authorative source
: TCP/IP Network Administration, 11.8. Protocol Case Study
- keeping up with latest
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- retrieving
: TCP/IP Network Administration, 13.4. Retrieving RFCs
- rfc-index.txt
: TCP/IP Network Administration, 13.4. Retrieving RFCs
- RFC819
: sendmail, The RFCs
- RFC821
- sendmail, The RFCs
- sendmail, 30.8. Alphabetized F= Flags
- RFC822
- sendmail, The RFCs
- sendmail, 14.1. Headers
- sendmail, 28.1.2. Rules Are Treated Like Addresses
- sendmail, 32.5. Alphabetized Reference
- sendmail, 35.2. Header Names
- sendmail, 35.6.6. Other RFC822 Headers
- TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- RFC974
: sendmail, 21.3.7. Ambiguous MX Records
- RFC976
: sendmail, The RFCs
- RFC1123
- sendmail, The RFCs
- sendmail, 14.1. Headers
- RFC1413
: sendmail, 31.10. Alphabetized Reference
- RFC1521 and RFC1522
: sendmail, The RFCs
- RFC1597 and RFC1627
: Building Internet Firewalls, 4.5. What the Future Holds
- RFC1651 to RFC1653
: sendmail, The RFCs
- RFC1750
: Practical UNIX & Internet Security, 23.8. Picking a Random Seed
- RFC1891 to RFC1894
: sendmail, The RFCs
- RFS (Remote File System)
: TCP/IP Network Administration, 3.7.1. File Sharing
- .rhosts file
- Building Internet Firewalls, 8.4.1. BSD
- Practical UNIX & Internet Security, 10.4.3. Network Setup
- Practical UNIX & Internet Security, 17.3.18.4. The ~/.rhosts file
- Practical UNIX & Internet Security, 17.3.18.5. Searching for .rhosts files
- TCP/IP Network Administration, 12.2.5. Secure the r Commands
- back door in
: Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
- intruder's changes to
: Practical UNIX & Internet Security, 24.4.1.4. Changes in .rhosts files
- searching for
: Practical UNIX & Internet Security, 17.3.18.5. Searching for .rhosts files
- in security checks
: TCP/IP Network Administration, 12.4.2. Looking for Trouble
- RHS, rule
- sendmail, 8.4. Rules
- sendmail, 28.6. The RHS
- (see also rule sets)
- class macros in
: sendmail, 12.1.4. Class Macros in the RHS
- RHS triple
: sendmail, 9.2. The RHS Triple
- richtext text subtype
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- Ring Indicator (RI)
: Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- RIP (Routing Information Protocol)
- Practical UNIX & Internet Security, 17.3.19. Routing Internet Protocol (RIP routed) (UDP Port
- TCP/IP Network Administration, 2.2.2. Classless IP Addresses
- TCP/IP Network Administration, 6.1.5.3. Metric
- TCP/IP Network Administration, 7.4.1. Routing Information Protocol
- checking updates
: TCP/IP Network Administration, 11.5.1. Checking RIP Updates
- configuring
: Building Internet Firewalls, 8.12.2. Routing Information Protocol
- enabling (in gated)
: TCP/IP Network Administration, 7.7.1.1. A host configuration
- running
: TCP/IP Network Administration, 7.4.1.1. Running RIP with routed
- starting
: TCP/IP Network Administration, 5.4. The Internet Daemon
- statement (in gated)
: TCP/IP Network Administration, B.8.2. The rip Statement
- Version 2 (RIP-2)
- TCP/IP Network Administration, 7.4.2. RIP Version 2
- TCP/IP Network Administration, 7.7.1.1. A host configuration
- RIP REQUEST command
: TCP/IP Network Administration, 11.5.1. Checking RIP Updates
- RIPE Network Control Center
: TCP/IP Network Administration, 2.4. Internet Routing Architecture
- RIPE-181 standard
: TCP/IP Network Administration, 2.4. Internet Routing Architecture
- ripquery
- TCP/IP Network Administration, 11.2. Diagnostic Tools
- TCP/IP Network Administration, 11.5.1. Checking RIP Updates
- Riseaux IP Europeens (RIPE) Network Control Center (NCC)
: TCP/IP Network Administration, 2.4. Internet Routing Architecture
- risk assessment
- Practical UNIX & Internet Security, 2.2. Risk Assessment
- Practical UNIX & Internet Security, 2.2.2. Review Your Risks
- Practical UNIX & Internet Security, 2.5.3. Final Words: Risk Management Means Common Sense
- risks forum
: TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
- RISKS mailing list
: Building Internet Firewalls, A.3.6. RISKS
- Ritchie, Dennis
: Practical UNIX & Internet Security, 1.3. History of UNIX
- Rivest, Ronald L.
- Practical UNIX & Internet Security, 6.1.3. Modern Controversy
- Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
- Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
- Practical UNIX & Internet Security, 6.4.6. RSA and Public Key Cryptography
- Practical UNIX & Internet Security, 6.5.4.1. MD2, MD4, and MD5
- RJE (Remote Job Entry)
: Practical UNIX & Internet Security, 3.2.1. The /etc/passwd File
- rlogin command/service
- Building Internet Firewalls, 2.3. Remote Terminal Access and Command
- Practical UNIX & Internet Security, 1.4.3. Add-On Functionality Breeds Problems
- Practical UNIX & Internet Security, 3.5. Verifying Your New Password
- Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
- Practical UNIX & Internet Security, 17.3.18. rlogin and rsh (TCP Ports 513 and 514)
- Practical UNIX & Internet Security, 17.3.18.6. /etc/hosts.lpd file
- TCP/IP Network Administration, 4.1. Connected and Non-Connected Networks
- TCP/IP Network Administration, 5.3.1.2. Pseudo-device
- TCP/IP Network Administration, 12.2.3. One-Time Passwords
- TCP/IP Network Administration, 2.7.2. Port Numbers
- proxying with TIS FWTK
: Building Internet Firewalls, 7.7.2. Telnet and rlogin Proxying with
- versus Telnet
: Practical UNIX & Internet Security, 17.3.18. rlogin and rsh (TCP Ports 513 and 514)
- rm command
- Practical UNIX & Internet Security, 5.4. Using Directory Permissions
- Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution
- deep tree structures and
: Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
- rmail program
: Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution
- ro option (read-only access)
- for Linux systems
: TCP/IP Network Administration, 9.1.2.2. The /etc/exports file
- for Solaris systems
: TCP/IP Network Administration, 9.1.2.1. The share command
- root account/user
- Practical UNIX & Internet Security, 4. Users, Groups, and the Superuser
- Practical UNIX & Internet Security, 4.1. Users and Groups
- Practical UNIX & Internet Security, 4.2.1. The Superuser
- Practical UNIX & Internet Security, 4.2.1.5. The problem with the superuser
- Practical UNIX & Internet Security, 5.5.2. Problems with SUID
- Practical UNIX & Internet Security, 17.4. Security Implications of Network Services
- sendmail, Other Books, Other Problems
- sendmail, 14.6. Trusted User
- sendmail, 22.1. Why root?
- TCP/IP Network Administration, 5.4. The Internet Daemon
- (see also superusers)
- abilities of
: Practical UNIX & Internet Security, 27.1.3. What the Superuser Can and Cannot Do
- chroot command
- Building Internet Firewalls, 8.2.1.3. Providing anonymous
- Practical UNIX & Internet Security, 8.1.5. Restricted Filesystem
- Practical UNIX & Internet Security, 8.1.5.2. Checking new software
- Practical UNIX & Internet Security, 11.1.4. Trojan Horses
- Practical UNIX & Internet Security, 23.4.1. Using chroot()
- with anonymous FTP
: Practical UNIX & Internet Security, 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP
- immutable files and
: Practical UNIX & Internet Security, 9.1.1. Immutable and Append-Only Files
- network services with
: Practical UNIX & Internet Security, 17.4. Security Implications of Network Services
- options that don't run on
: sendmail, 34.1.4. Options that Are Safe
- protecting
- Practical UNIX & Internet Security, 8.5. Protecting the root Account
- Practical UNIX & Internet Security, 8.5.3.2. Trusted computing base
- on remote machine, fingering
: Practical UNIX & Internet Security, 24.2.4.2. How to contact the system administrator of a computer
- single-command accounts and
: Practical UNIX & Internet Security, 8.1.3. Accounts That Run a Single Command
- SUID_ROOT_FILES_OK macro
: sendmail, 18.8. Alphabetized Reference
- web server as
: Practical UNIX & Internet Security, 18.2.1. The Server's UID
- root directory
: Practical UNIX & Internet Security, 5.1.1. Directories
- backups of
: Practical UNIX & Internet Security, 7.1.3. Types of Backups
- UUCP access from
: Practical UNIX & Internet Security, 15.4.2.1. Some bad examples
- root domain
: TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
- root server
: TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
- configuring
: TCP/IP Network Administration, 8.3.1. The named.boot File
- entries, corrupted
: TCP/IP Network Administration, 11.6.3. Cache corruption
- root option for /etc/exports
: Practical UNIX & Internet Security, 20.2.1.1. /etc/exports
- root=host option (root access for specified host)
: TCP/IP Network Administration, 9.1.2.1. The share command
- ROT13 algorithm
- Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
- Practical UNIX & Internet Security, 6.4.3. ROT13: Great for Encoding Offensive Jokes
- rotating backup media
- Practical UNIX & Internet Security, 7.1.3. Types of Backups
- Practical UNIX & Internet Security, 7.2.1.2. Media rotation
- route command
- TCP/IP Network Administration, 6.1.5.3. Metric
- TCP/IP Network Administration, 6.4.1. slattach
- TCP/IP Network Administration, 7.3. Building a Static Routing Table
- TCP/IP Network Administration, 7.3.1.1. Installing static routes at startup
- route add command
: TCP/IP Network Administration, 11.5. Checking Routing
- routes
- addressing
- sendmail, 17.1.5. The % Hack
- sendmail, 21.5.1. Offsite MX Hosts
- sendmail, 29.4.3. Handling Routing Addresses
- d flag and
: sendmail, 30.8. Alphabetized F= Flags
- pruning
: sendmail, 34.8. Alphabetized Reference
- dampening
: TCP/IP Network Administration, B.8.5. The bgp Statement
- duplicate, silently ignored
: TCP/IP Network Administration, B.8.5. The bgp Statement
- filters
: TCP/IP Network Administration, 7.7.1.3. Exterior gateway configuration
- server entry, bogus
: TCP/IP Network Administration, 8.3.3. The Cache Initialization File
- routed daemon
- Building Internet Firewalls, 5.8.2.4. Which services should you disable?
- Practical UNIX & Internet Security, 17.3.19. Routing Internet Protocol (RIP routed) (UDP Port
- TCP/IP Network Administration, 5.4. The Internet Daemon
- TCP/IP Network Administration, 7.4.1. Routing Information Protocol
- routerdiscovery statement (in gated)
: TCP/IP Network Administration, B.8.10. The routerdiscovery Statement
- routerid
- TCP/IP Network Administration, 7.7.1.2. Interior gateway configurations
- TCP/IP Network Administration, B.7. Definition Statements
- routers and routing
- Building Internet Firewalls, 6. Packet Filtering
- Practical UNIX & Internet Security, 16.2.2. Routing
- TCP/IP Network Administration, 1.7. Application Layer
- TCP/IP Network Administration, 2.1. Addressing, Routing, and Multiplexing
- (see also dynamic, routing; static, routing)
- areas, hierarchy of
: TCP/IP Network Administration, 7.4.3. Open Shortest Path First
- as choke point
: Building Internet Firewalls, 6.1. Why Packet Filtering?
- choosing
: Building Internet Firewalls, 6.8. Choosing a Packet Filtering
- commonest configurations
: TCP/IP Network Administration, 7.1. Common Routing Configurations
- consolidated
: TCP/IP Network Administration, 2.2.2. Classless IP Addresses
- datagrams
: (see datagrams)
- defined
: TCP/IP Network Administration, 7. Configuring Routing
- disabling
: Building Internet Firewalls, 5.8.2.5. Turning off routing
- domains
- Building Internet Firewalls, C.10. Internet Routing Architecture
- TCP/IP Network Administration, 2.4. Internet Routing Architecture
- end-to-end
: (see end-to-end)
- exterior (or access)
: (see exterior routers)
- handling packets
: Building Internet Firewalls, 6.4. What Does the Router Do with
- intelligent
: Practical UNIX & Internet Security, 21.2.3. Setting Up the Choke
- information, exchanging
: TCP/IP Network Administration, 1.7. Application Layer
- interior
- Building Internet Firewalls, 4.2.3.3. Interior router
- TCP/IP Network Administration, 12.7. Firewalls
- configuring
: Building Internet Firewalls, 9.1.2.1. Interior Router
- merging with bastion host
: Building Internet Firewalls, 4.3.4. It's Dangerous to Merge the Bastion
- merging with exterior router
: Building Internet Firewalls, 4.3.2. It's OK to Merge the Interior Router and the Exterior Router
- multiple
: Building Internet Firewalls, 4.3.5. It's Dangerous to Use Multiple
- interoperability with routers
: TCP/IP Network Administration, B.8.5. The bgp Statement
- logging actions of
: Building Internet Firewalls, 6.4.1. Logging Actions
- merging interior and exterior
: Building Internet Firewalls, 4.3.2. It's OK to Merge the Interior Router and the Exterior Router
- metric
- TCP/IP Network Administration, 6.1.5.3. Metric
- TCP/IP Network Administration, 7.3. Building a Static Routing Table
- multicast
- Building Internet Firewalls, 6.3.3.5. IP over IP
- Building Internet Firewalls, 8.9.3. The Multicast Backbone (MBONE)
- multi-path
: TCP/IP Network Administration, 7.4.3. Open Shortest Path First
- planning
: TCP/IP Network Administration, 4.3. Planning Routing
- policy
- TCP/IP Network Administration, 7.6. Gateway Routing Daemon
- TCP/IP Network Administration, B.10. Control Statements
- protocols
- TCP/IP Network Administration, 4. Getting Started
- TCP/IP Network Administration, 4.2.2. Defining the Subnet Mask
- (see also RIP)
- choosing
: TCP/IP Network Administration, 7.5.3. Choosing a Routing Protocol
- defined
: TCP/IP Network Administration, 7.1. Common Routing Configurations
- interior
: TCP/IP Network Administration, 7.4. Interior Routing Protocols
- using gated for
: TCP/IP Network Administration, 7.7.1.3. Exterior gateway configuration
- responsibilities of
: TCP/IP Network Administration, 7.1. Common Routing Configurations
- returning ICMP error codes
: Building Internet Firewalls, 6.4.2. Returning ICMP
- screening
: (see screening routers)
- single-purpose versus general-purpose
: Building Internet Firewalls, 6.8.2. It Can Be a Single-Purpose Router or
- source
: Building Internet Firewalls, 5.8.2.5. Turning off routing
- tables
- Building Internet Firewalls, C.11. The Routing Table
- TCP/IP Network Administration, 2.5. The Routing Table
- TCP/IP Network Administration, 7.1. Common Routing Configurations
- building manually
: TCP/IP Network Administration, 7.1. Common Routing Configurations
- checking
: TCP/IP Network Administration, 11.5. Checking Routing
- minimal
: TCP/IP Network Administration, 7.2. The Minimal Routing Table
- unstable
: TCP/IP Network Administration, B.8.5. The bgp Statement
- viewing contents of
: TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
- testing
: Building Internet Firewalls, 4.4.1. Laboratory Networks
- troubleshooting
: TCP/IP Network Administration, 11.5. Checking Routing
- where to filter
: Building Internet Firewalls, 6.8.8. It Should Have Good Testing and
- Routing Arbiters
- TCP/IP Network Administration, 2.4. Internet Routing Architecture
- TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
- Routing Information Protocol
: (see RIP)
- RPC table (NIS+)
: Practical UNIX & Internet Security, 19.5.3. NIS+ Tables
- rpc.rexdserver
: Practical UNIX & Internet Security, 17.3.22. RPC rpc.rexd (TCP Port 512)
- rpcbind
: (see portmapper)
- RPCs (remote procedure calls)
- Building Internet Firewalls, 5.8.2.4. Which services should you disable?
- Building Internet Firewalls, 6.3.3.4. RPC
- Practical UNIX & Internet Security, 17.3.22. RPC rpc.rexd (TCP Port 512)
- Practical UNIX & Internet Security, 19. RPC, NIS, NIS+, and Kerberos
- Practical UNIX & Internet Security, 19.7.2. SESAME
- TCP/IP Network Administration, 2.7.2. Port Numbers
- (see also NFS; NIS)
- authentication of
- Practical UNIX & Internet Security, 19.2.2. RPC Authentication
- Practical UNIX & Internet Security, 19.2.2.4. AUTH_KERB
- portmapper program
: Practical UNIX & Internet Security, 17.3.11. Sun RPC's portmapper (UDP and TCP Ports 111)
- Secure
: (see Secure RPC)
- spoofing
: Practical UNIX & Internet Security, 19.4.4.4. Spoofing RPC
- RRs (standard resource records)
: TCP/IP Network Administration, 8.3.2. Standard Resource Records
- in named
: TCP/IP Network Administration, C.3.1. Standard Resource Records
- RS-232 serial protocol
: Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- rs.internic.net
: TCP/IP Network Administration, 13.6. The White Pages
- RS232C
: TCP/IP Network Administration, 1.2. A Data Communications Model
- RSA algorithm
- Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
- Practical UNIX & Internet Security, 6.4.6. RSA and Public Key Cryptography
- Practical UNIX & Internet Security, 6.4.6.3. Strength of RSA
- Practical UNIX & Internet Security, 6.5.3. Digital Signatures
- rsh (restricted shell)
- Building Internet Firewalls, 2.3. Remote Terminal Access and Command
- Practical UNIX & Internet Security, 8.1.4.1. Restricted shells under System V UNIX
- Practical UNIX & Internet Security, 8.1.4.6. Potential problems with rsh
- Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
- Practical UNIX & Internet Security, 17.3.18. rlogin and rsh (TCP Ports 513 and 514)
- Practical UNIX & Internet Security, 17.3.18.6. /etc/hosts.lpd file
- rshd program
: Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
- RUIDs
: (see real UIDs/GIDs)
- rule sets
- sendmail, 5.3.4. Rule Sets
- sendmail, 6.3.1. Skipping Rule Sets
- sendmail, 8.3. Rule Sets
- sendmail, 29. Rule Sets
- TCP/IP Network Administration, 10.6.3. The Set Ruleset Command
- (see also rules)
- check_
: sendmail, 29.10. The check_... Rule Sets
- check_mail rule set
: sendmail, 20.2.6. Reject Mail from Spamming or Mail-bombing Sites
- debug_dumpstate
: sendmail, 26.3.3.3. -- ruleset debug_dumpstate returns stat ..., pv: --
- Hubset
- sendmail, 11.2. Rule Set S=
- sendmail, 11.4. Rule Set Hubset
- m4 keywords for
: sendmail, 19.4.3. Rules and rule sets
- m4 preprocessor and
: sendmail, 29.2. Rule Sets and m4
- recipient-rewriting
: (see R= equate)
- rule set 0
- sendmail, 9. Rule Set 0
- sendmail, 17.3. Rule Set 0
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 29.6. Rule Set 0
- mailertables
: sendmail, 19.6. Alphabetized m4 Macros
- rule set 1
- sendmail, 11.7. Rule Set 1
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 29.9. Rule Set 1
- rule set 2
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 29.8. Rule Set 2
- rule set 3
- sendmail, 10. Rule Set 3
- sendmail, 17.1. Rule Set 3
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 29.4. Rule Set 3
- sendmail, 38.6.3. Rule 3 Always Called First with -bt
- rule set 4
- sendmail, 17.4. Rule Set 4
- sendmail, 29.5. Rule Set 4
- rule set 5
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 29.7. Rule Set 5
- sendmail, 30.8. Alphabetized F= Flags
- rule set 96
: sendmail, 17.2. Rule Set 96
- S= and
: (see S= equate)
- sender-rewriting
: (see S= equate)
- rule-testing mode
- sendmail, 36.7. Alphabetized Reference
- sendmail, 38. Rule-Set Testing with -bt
- debugging and
: sendmail, 38.7. Add Debugging for Detail
- rules
- sendmail, 8.2. Why Rules?
- sendmail, 28. Rules
- (see also rule sets)
- (see protocols, standards)
- for address transformation
: sendmail, 5.3.3. Rules
- LHS and RHS syntax
- sendmail, 8.4. Rules
- sendmail, 28.4. The Behavior of a Rule
- m4 keywords for
: sendmail, 19.4.3. Rules and rule sets
- mail hub
: sendmail, 17. The Hub's Complex Rules
- processing flow of
- sendmail, 10.5. Details of Rule Flow
- sendmail, 29.3. The Sequence of Rule Sets
- relays
: sendmail, 19.4.5. Relays
- rewriting using other rule sets
: sendmail, 28.6.4. Rewrite Through Another Rule Set: $>set
- showing by rule set
: sendmail, 38.4.1. Show Rules in a Rule Set with =S
- wildcards operators in
: sendmail, 8.7. Wildcard Operators
- runacct command
: Practical UNIX & Internet Security, 10.2. The acct/pacct Process Accounting File
- RunAsUser option
: sendmail, 34.8. Alphabetized Reference
- ruusend command
: Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution
- rw option (read and write access)
- /etc/exports
: Practical UNIX & Internet Security, 20.2.1.1. /etc/exports
- for Linux systems
: TCP/IP Network Administration, 9.1.2.2. The /etc/exports file
- for Solaris systems
: TCP/IP Network Administration, 9.1.2.1. The share command
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
O'Reilly & Associates, Inc.
All Rights Reserved.