start page | rating of books | rating of authors | reviews | copyrights
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: R
- r commands : Building Internet Firewalls, 5.8.2.4. Which services should you disable?
- configuring : Building Internet Firewalls, 8.4.1. BSD
- packet filtering and : Building Internet Firewalls, 6.1.2.2. Some protocols are not well suited to packet
- R configuration command
- sendmail, 5.3.3. Rules
- sendmail, 8.4. Rules
- sendmail, 27.2. Comments
- sendmail, 28.1. Overview
- sendmail, 29.1.5. Rule Sets and Lists of Rules
- r flag
- sendmail, 30.7. Pitfalls
- sendmail, 30.8. Alphabetized F= Flags
- R flag : sendmail, 30.8. Alphabetized F= Flags
- R in configuration file : sendmail, 1.3.1. The Configuration File
- R line (host status file) : sendmail, B.1. Status file lines
- R line (qf file)
- sendmail, 23.4.1. Printing the Queue in Verbose Mode
- sendmail, 23.9. The qf File Internals
- $r macro
- sendmail, 23.9. The qf File Internals
- sendmail, 26.1.3.8. proto= the protocol used in transmission
- sendmail, 31.10. Alphabetized Reference
- sendmail, 36.7. Alphabetized Reference
- $R macro : sendmail, 31.10. Alphabetized Reference
- R option
- sendmail, D.5. The > Option
- (see DontPruneRoutes command)
- r option : (see Timeout (r) option)
- -r switch (makemap) : sendmail, 33.2.1.5. -r replace (silently) duplicate keys
- -r switch (sendmail)
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 36.7. Alphabetized Reference
- -R switch (sendmail) : sendmail, 36.7. Alphabetized Reference
- R= equate
- sendmail, 6.3. The local Delivery Agent
- sendmail, 6.3.1. Skipping Rule Sets
- sendmail, 29.6.2. Selecting S= and R=
- sendmail, 30.4. The Equates
- rabbit programs
- Practical UNIX & Internet Security, 11.1. Programmed Threats: Definitions
- Practical UNIX & Internet Security, 11.1.7. Bacteria and Rabbits
- race conditions : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- RADB (Routing Arbiter Database) : TCP/IP Network Administration, 2.4. Internet Routing Architecture
- radio
- Practical UNIX & Internet Security, 12.2.1.8. Electrical noise
- Practical UNIX & Internet Security, 12.3.1.3. Eavesdropping by radio and using TEMPEST
- Practical UNIX & Internet Security, 14.4.4.1. Kinds of eavesdropping
- rain : (see water)
- RAM theft : Practical UNIX & Internet Security, 12.2.6. Preventing Theft
- rand function : Practical UNIX & Internet Security, 23.7.1. rand ( )
- random device : Practical UNIX & Internet Security, 23.7.4. Other random number generators
- random function : Practical UNIX & Internet Security, 23.7.2. random ( )
- random numbers : Practical UNIX & Internet Security, 23.6. Tips on Generating Random Numbers
- range parameter
- TCP/IP Network Administration, 9.5.1. dhcpd.conf
- TCP/IP Network Administration, D.3.2. Configuration Parameters
- RARP (Reverse Address Resolution Protocol)
- TCP/IP Network Administration, 3.5.1. Reverse Address Resolution Protocol
- TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- adding to Linux kernel : TCP/IP Network Administration, 6.1.5.5. Point-to-point
- /etc/ethers file in : TCP/IP Network Administration, 9.3. Network Information Service
- raw devices : Practical UNIX & Internet Security, 5.6. Device Files
- raw sockets : TCP/IP Network Administration, 5.4. The Internet Daemon
- rc directory
- Practical UNIX & Internet Security, 11.5.3.5. System initialization files
- Practical UNIX & Internet Security, 17.1.2. Starting the Servers
- Practical UNIX & Internet Security, C.5.1. Process #1: /etc/init
- sendmail, 15.5. Prevent the Daemon from Running
- commenting out services : Practical UNIX & Internet Security, 17.3. Primary UNIX Network Services
- services started by : Building Internet Firewalls, 5.8.2.1. How are services managed?
- rc.inet1 script : TCP/IP Network Administration, 7.3.1.1. Installing static routes at startup
- rc.M startup script : TCP/IP Network Administration, 10.2. Running sendmail as a Daemon
- RC2, RC4, and RC5 algorithms
- Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
- Practical UNIX & Internet Security, 6.4.8. Proprietary Encryption Systems
- RC4 and RC5 algorithms : Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
- rcp command
- Building Internet Firewalls, 2.2. File Transfer
- Practical UNIX & Internet Security, 1.4.3. Add-On Functionality Breeds Problems
- Practical UNIX & Internet Security, 7.4.5. Backups Across the Net
- RCPT command (SMTP)
- sendmail, 23.9. The qf File Internals
- sendmail, 29.10.2. The check_rcpt Rule Set
- sendmail, 36.7. Alphabetized Reference
- RCS (Revision Control System)
- Practical UNIX & Internet Security, 7.3.2. Building an Automatic Backup System
- Practical UNIX & Internet Security, 17.3. Primary UNIX Network Services
- TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros
- rdist command
- Practical UNIX & Internet Security, 7.4.5. Backups Across the Net
- Practical UNIX & Internet Security, 9.2.1.3. rdist
- TCP/IP Network Administration, 9.6.1. rdist
- rdump/rrestore program : Practical UNIX & Internet Security, 7.4.5. Backups Across the Net
- reachability information
- TCP/IP Network Administration, 2.4. Internet Routing Architecture
- TCP/IP Network Administration, 7.5. Exterior Routing Protocols
- TCP/IP Network Administration, 7.6. Gateway Routing Daemon
- READ command, in POP : TCP/IP Network Administration, 3.4.2. Post Office Protocol
- read permission
- Practical UNIX & Internet Security, 5.1.7. File Permissions in Detail
- Practical UNIX & Internet Security, 5.4. Using Directory Permissions
- (see permissions)
- read system call : Practical UNIX & Internet Security, 5.1.7. File Permissions in Detail
- time-outs on : Practical UNIX & Internet Security, 23.3. Tips on Writing Network Programs
- READ= command : Practical UNIX & Internet Security, 15.5.2. Permissions Commands
- READ_ME file : sendmail, 2.2. Read the Documents
- read-only filesystems
- Practical UNIX & Internet Security, 11.6.1.2. Writable system files and directories
- Building Internet Firewalls, 5.8.4.3. Mount filesystems as read-only
- Practical UNIX & Internet Security, 9.1.2. Read-only Filesystems
- readdir library call : Practical UNIX & Internet Security, 5.4. Using Directory Permissions
- real UIDs/GIDs
- Practical UNIX & Internet Security, 4.3.1. Real and Effective UIDs
- Practical UNIX & Internet Security, C.1.3.2. Process real and effective UID
- real-time conferencing : (see conferencing services, real-time)
- RealHostAddr variable : sendmail, 20.1.2. Global Variables
- RealHostName variable : sendmail, 20.1.2. Global Variables
- realpath function : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- reauthentication
- Kerberos : Practical UNIX & Internet Security, 19.6.4. Using Kerberos
- Secure RPC : Practical UNIX & Internet Security, 19.3.1.3. Setting the window
- rebooting : Building Internet Firewalls, 5.10.1. Watch Reboots Carefully
- rebuild aliases mode : sendmail, 4.1.3. Rebuild Aliases Mode (-bi)
- rebuilding : (see building)
- Receive Data (RD) : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- "Received:" header line
- sendmail, 1.5. The Header
- sendmail, 13.4. Sending Mail
- sendmail, 14.1.2. The Received: Header
- sendmail, 20.2.5. Prune Received: Headers at Firewall
- sendmail, 35.10. Alphabetized Reference
- forged mail and : sendmail, 22.7.2. Forging with SMTP
- recipient list buffer size : sendmail, 18.8. Alphabetized Reference
- RecipientFactor (y) option : sendmail, 34.8. Alphabetized Reference
- recipients
- sendmail, 6.3. The local Delivery Agent
- (see also R= equate; $u macro)
- adding domain to address : sendmail, 30.8. Alphabetized F= Flags
- addresses of
- sendmail, 6.3. The local Delivery Agent
- sendmail, 23.9. The qf File Internals
- sendmail, 29.10.4. The check_compat Rule Set
- sendmail, 31.10. Alphabetized Reference
- TCP/IP Network Administration, 10.6.3. The Set Ruleset Command
- (see also addresses)
- check_rcpt rule set : sendmail, 29.10.2. The check_rcpt Rule Set
- delivery agent as : sendmail, 30.8. Alphabetized F= Flags
- filtering with shell script : sendmail, 24.6.2. Filtering Recipients with a Shell Script
- getting from header : sendmail, 36.7. Alphabetized Reference
- headers for : sendmail, 35.6.3. Recipient Headers
- home directory of : sendmail, 31.10. Alphabetized Reference
- large lists of : sendmail, 34.8. Alphabetized Reference
- logging
- sendmail, 26.1.3.6. nrcpts= the number of recipients
- sendmail, 26.1.3.12. to= show final recipient
- missing
- sendmail, 34.8. Alphabetized Reference
- sendmail, 35.10. Alphabetized Reference
- multiple : sendmail, 30.8. Alphabetized F= Flags
- processing list of
- sendmail, 36.3. List of Recipient Addresses
- sendmail, 36.4.5. Fifth: Collect Recipients
- selecting MTA for : (see rule set 0)
- username of : (see $u macro)
- whitespace in lists of : sendmail, 34.8. Alphabetized Reference
- recnews program : sendmail, 25.5.2. Gateway Lists to News
- recommended headers : sendmail, 35.6.1. Recommended Headers
- recording activity : (see logs/logging)
- recovering after incident : Building Internet Firewalls, 13.1.6. Restore and Recover
- plan for : Building Internet Firewalls, 13.4.6. Planning for Restoration and Recovery
- recursion : sendmail, 21.3.3. MX Records Are Nonrecursive
- recursive macro expansion : sendmail, 31.5.1. Macro Expansion Is Recursive
- recursive searches : TCP/IP Network Administration, 3.3.2. Creating Domains and Subdomains
- redirect feature : sendmail, 19.6. Alphabetized m4 Macros
- Redirect Message
- TCP/IP Network Administration, 1.5.2. Internet Control Message Protocol
- TCP/IP Network Administration, 2.5. The Routing Table
- TCP/IP Network Administration, 7.3.1. Adding Static Routes
- redirect statement (in gated) : TCP/IP Network Administration, B.8.8. The redirect Statement
- redirecting messages : (see aliases/aliasing)
- redirecting routes : TCP/IP Network Administration, 1.5.2. Internet Control Message Protocol
- Redman, Brian E. : Practical UNIX & Internet Security, 15.2. Versions of UUCP
- refer_log file : Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
- "Reference:" header line : sendmail, 35.10. Alphabetized Reference
- reflectors (in Enigma system) : Practical UNIX & Internet Security, 6.3. The Enigma Encryption System
- reformatting attack : Practical UNIX & Internet Security, 25.1. Destructive Attacks
- refresh values : TCP/IP Network Administration, C.3.1.1. Start of Authority record
- RefuseLA (X) option : sendmail, 34.8. Alphabetized Reference
- registered hosts : TCP/IP Network Administration, 3.2. The Host Table
- registration fee : TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
- reject route
- TCP/IP Network Administration, B.9. static Statements
- TCP/IP Network Administration, B.10.1. The import Statement
- rejecting mail messages
- sendmail, 18.8. Alphabetized Reference
- sendmail, 20.2.6. Reject Mail from Spamming or Mail-bombing Sites
- relative humidity : Practical UNIX & Internet Security, 12.2.1.11. Humidity
- relative pathnames : Practical UNIX & Internet Security, 5.1.3. Current Directory and Paths
- relay= equate (syslog output) : sendmail, 26.1.3.9. relay= the host that sent or accepted the message
- relays : sendmail, 19.4.5. Relays
- smart hosts : sendmail, 19.6. Alphabetized m4 Macros
- RELEASE_NOTES file : sendmail, 2.2. Read the Documents
- reliability : TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
- remembering passwords : TCP/IP Network Administration, 12.2.2. Choosing a Password
- remote
- command execution
- Building Internet Firewalls, 8.4. Remote Command Execution
- Practical UNIX & Internet Security, 15.1.2. uux Command
- Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution
- Practical UNIX & Internet Security, 17.3.17. rexec (TCP Port 512)
- comparison copies : Practical UNIX & Internet Security, 9.2.1.2. Remote copies
- computers
- hijacking : Building Internet Firewalls, 10.1.1. Hijacking
- transferring files to : Practical UNIX & Internet Security, 15.1.1. uucp Command
- file access (UUCP)
- Practical UNIX & Internet Security, 15.4.1. USERFILE: Providing Remote File Access
- Practical UNIX & Internet Security, 15.4.2.1. Some bad examples
- hosts
- sendmail, 21.2.2. Look Up a Remote Host's Name
- TCP/IP Network Administration, 1.5.2. Internet Control Message Protocol
- network filesystems : Practical UNIX & Internet Security, 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
- procedure calls : (see RPCs)
- servers : TCP/IP Network Administration, 6.3.2. Dial-Up PPP
- accessing files on : TCP/IP Network Administration, 9.1. The Network File System
- contacting administrators of
- TCP/IP Network Administration, 11.1.1. Troubleshooting Hints
- TCP/IP Network Administration, 11.3. Testing Basic Connectivity
- never extending trust to : TCP/IP Network Administration, 12.2.3. One-Time Passwords
- problem for firewalls : TCP/IP Network Administration, 12.7.1. Functions of the firewall
- terminal access
- Building Internet Firewalls, 2.3. Remote Terminal Access and Command
- (see also Telnet service)
- remote copy (rcp) command : TCP/IP Network Administration, 9.6. Managing Distributed Servers
- remote file
- Practical UNIX & Internet Security, 10.3.1. aculog File
- Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer
- Remote File System (RFS) : TCP/IP Network Administration, 3.7.1. File Sharing
- Remote Procedure Calls : (see RPCs)
- remote.unknown file : Practical UNIX & Internet Security, 15.5. Security in BNU UUCP
- remounting filesystems after system reboot : TCP/IP Network Administration, 9.1.3.2. The vfstab and fstab files
- renice command
- Practical UNIX & Internet Security, 25.2.1.2. System overload attacks
- Practical UNIX & Internet Security, C.1.3.3. Process priority and niceness
- replacement character for space : sendmail, 13.2.8. The Unquoted Space Replacement Character
- replay attacks
- Practical UNIX & Internet Security, 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
- Practical UNIX & Internet Security, 19.6.1.2. Using the ticket granting ticket
- reply feature : sendmail, 10.1. Why Preprocess?
- "Reply-To:" header line
- sendmail, 25.5.1. Reply Versus Bounce
- sendmail, 35.10. Alphabetized Reference
- REPORT keyword : TCP/IP Network Administration, A.3. chat
- reportfile : TCP/IP Network Administration, A.3. chat
- reporting security holes : Practical UNIX & Internet Security, 2.5.1. Going Public
- reputation : Building Internet Firewalls, 1.1.3. Your Reputation
- Request to Send (RTS) : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- REQUEST= command
- Practical UNIX & Internet Security, 15.5.1.3. A Sample Permissions file
- Practical UNIX & Internet Security, 15.5.2. Permissions Commands
- Requests for Comments : (see RFCs)
- RES_DNSRCH : sendmail, 21.2.4. The $[ and $] Operators
- res_search()
- sendmail, 18.8. Alphabetized Reference
- sendmail, 21.2.3. Look Up Addresses for Delivery
- "Recent-" header lines : sendmail, 35.7. Forwarding with Resent-Headers
- reserved memory space : Practical UNIX & Internet Security, 25.2.2.6. Reserved space
- reserved TCP port : sendmail, 30.8. Alphabetized F= Flags
- reset command : TCP/IP Network Administration, 6.3.2. Dial-Up PPP
- resolution, time : Practical UNIX & Internet Security, 23.8. Picking a Random Seed
- resolv.conf file
- TCP/IP Network Administration, 8.1.1. BIND Configurations
- TCP/IP Network Administration, 8.2. Configuring the Resolver
- TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
- TCP/IP Network Administration, 11.6.4. dig: An Alternative to nslookup
- resolver
- code : TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
- configuring : TCP/IP Network Administration, 8.2. Configuring the Resolver
- defined : TCP/IP Network Administration, 8.1. BIND: UNIX Name Service
- DNS : Practical UNIX & Internet Security, 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
- options : TCP/IP Network Administration, E.4.2. sendmail Options
- resolver library
- Practical UNIX & Internet Security, 16.2.6.1. DNS under UNIX
- sendmail, 18.5.1. Use libresolv.a
- resolver-only configurations
- TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
- TCP/IP Network Administration, 8.1.1. BIND Configurations
- TCP/IP Network Administration, 8.2.1.1. A resolver-only configuration
- ResolverOptions (I) option
- sendmail, 21.2.4. The $[ and $] Operators
- sendmail, 34.8. Alphabetized Reference
- resource unavailable error : sendmail, 36.5.9. EX_UNAVAILABLE A Resource
- resources (memory) : Building Internet Firewalls, 1.1.2. Your Resources
- resources on sendmail
- sendmail, Additional Sources of Information
- sendmail, 2.2. Read the Documents
- response teams
- Practical UNIX & Internet Security, 27.3.5. Response Personnel?
- Practical UNIX & Internet Security, F.3. Emergency Response Organizations
- Practical UNIX & Internet Security, F.3.4.46. Westinghouse Electric
- (see incident response teams)
- mailing lists for : Practical UNIX & Internet Security, E.1.1. Response Teams and Vendors
- responsibilities of administrators
- TCP/IP Network Administration, 1.7. Application Layer
- TCP/IP Network Administration, 4. Getting Started
- TCP/IP Network Administration, 4.3. Planning Routing
- TCP/IP Network Administration, 4.6. Informing the Users
- TCP/IP Network Administration, 5.1. Kernel Configuration
- restart signal : sendmail, 26.3.2. SIGHUP Restart
- restarting sendmail daemon : sendmail, 4.1.1.1. Kill and restart, beginning with V8.7
- restore program : (see dump/restore program)
- restricted
- filesystems
- Practical UNIX & Internet Security, 8.1.5. Restricted Filesystem
- Practical UNIX & Internet Security, 8.1.5.2. Checking new software
- FTP : Practical UNIX & Internet Security, 17.3.2.5. Restricting FTP with the standard UNIX FTP server
- logins : Practical UNIX & Internet Security, 8.3. Restricting Logins
- shells
- Practical UNIX & Internet Security, 8.1.4.1. Restricted shells under System V UNIX
- Practical UNIX & Internet Security, 8.1.4.6. Potential problems with rsh
- su use : Practical UNIX & Internet Security, 4.3.6. Restricting su
- restrictmailq (sendmail) : Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
- retention of backups
- Practical UNIX & Internet Security, 7.1.5. How Long Should You Keep a Backup?
- Practical UNIX & Internet Security, 7.2.2.2. Retention schedule
- (see also networks and networking, backing up)
- retina authentication : Building Internet Firewalls, 10.2.1. Something You Are
- retired accounts : sendmail, 19.6. Alphabetized m4 Macros
- RETR command, in POP : TCP/IP Network Administration, 3.4.2. Post Office Protocol
- retry time : sendmail, 34.8. Alphabetized Reference
- RetryFactor (Z) option
- sendmail, 23.9. The qf File Internals
- sendmail, 34.8. Alphabetized Reference
- return calls : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- return interval : sendmail, 13.2.2. Limit the Life of Queued Messages
- "Return-Path:" header line
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 35.10. Alphabetized Reference
- "Return-Receipt-To:" header line
- sendmail, 18.8. Alphabetized Reference
- sendmail, 35.10. Alphabetized Reference
- Reverse Address Resolution Protocol : (see RARP)
- reverse domain : TCP/IP Network Administration, 4.4.1.1. Obtaining an IN-ADDR.ARPA domain
- files
- TCP/IP Network Administration, 8.3.5. The Reverse Domain File
- TCP/IP Network Administration, C.3.1.6. Domain Name Pointer record
- reverse lookups
- Building Internet Firewalls, 8.10.4.2. Mismatched data between the hostname
- Building Internet Firewalls, 8.10.5.1. Set up a `fake'
- Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
- Practical UNIX & Internet Security, 23.3. Tips on Writing Network Programs
- reviewing security policies : Building Internet Firewalls, 11.1.1.5. Provision for reviews
- Revision Control System (RCS)
- Practical UNIX & Internet Security, 7.3.2. Building an Automatic Backup System
- Practical UNIX & Internet Security, 17.3. Primary UNIX Network Services
- revocation certificate : Practical UNIX & Internet Security, 6.6.3.2. Creating your PGP public key
- "rewrite" prompt : (see address-testing mode)
- rewrite rules
- processing sequentially : TCP/IP Network Administration, 10.6.2. Transforming the Address
- recursion built-in : TCP/IP Network Administration, 10.6.2. Transforming the Address
- syntax of : TCP/IP Network Administration, 10.6.2. Transforming the Address
- using external databases in : TCP/IP Network Administration, 10.6.2.1. Transforming with a database
- rewriting
- addresses
- sendmail, 8.3. Rule Sets
- sendmail, 11.4.1. Rewrite the Lone Username
- rule sets
- (see R= equate)
- (see S= equate)
- User Database : sendmail, 30.8. Alphabetized F= Flags
- rex service : Building Internet Firewalls, 8.4.3. rex
- rexd service : Practical UNIX & Internet Security, 19.2.2.4. AUTH_KERB
- rexec service
- Building Internet Firewalls, 8.4.2. rexec
- Practical UNIX & Internet Security, 17.3.17. rexec (TCP Port 512)
- RFCs (Requests for Comments)
- sendmail, The RFCs
- TCP/IP Network Administration, 1.1.2. Protocol Standards
- TCP/IP Network Administration, 1.4. Network Access Layer
- TCP/IP Network Administration, 2.3. Subnets
- authorative source : TCP/IP Network Administration, 11.8. Protocol Case Study
- keeping up with latest : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- retrieving : TCP/IP Network Administration, 13.4. Retrieving RFCs
- rfc-index.txt : TCP/IP Network Administration, 13.4. Retrieving RFCs
- RFC819 : sendmail, The RFCs
- RFC821
- sendmail, The RFCs
- sendmail, 30.8. Alphabetized F= Flags
- RFC822
- sendmail, The RFCs
- sendmail, 14.1. Headers
- sendmail, 28.1.2. Rules Are Treated Like Addresses
- sendmail, 32.5. Alphabetized Reference
- sendmail, 35.2. Header Names
- sendmail, 35.6.6. Other RFC822 Headers
- TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- RFC974 : sendmail, 21.3.7. Ambiguous MX Records
- RFC976 : sendmail, The RFCs
- RFC1123
- sendmail, The RFCs
- sendmail, 14.1. Headers
- RFC1413 : sendmail, 31.10. Alphabetized Reference
- RFC1521 and RFC1522 : sendmail, The RFCs
- RFC1597 and RFC1627 : Building Internet Firewalls, 4.5. What the Future Holds
- RFC1651 to RFC1653 : sendmail, The RFCs
- RFC1750 : Practical UNIX & Internet Security, 23.8. Picking a Random Seed
- RFC1891 to RFC1894 : sendmail, The RFCs
- RFS (Remote File System) : TCP/IP Network Administration, 3.7.1. File Sharing
- .rhosts file
- Building Internet Firewalls, 8.4.1. BSD
- Practical UNIX & Internet Security, 10.4.3. Network Setup
- Practical UNIX & Internet Security, 17.3.18.4. The ~/.rhosts file
- Practical UNIX & Internet Security, 17.3.18.5. Searching for .rhosts files
- TCP/IP Network Administration, 12.2.5. Secure the r Commands
- back door in : Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
- intruder's changes to : Practical UNIX & Internet Security, 24.4.1.4. Changes in .rhosts files
- searching for : Practical UNIX & Internet Security, 17.3.18.5. Searching for .rhosts files
- in security checks : TCP/IP Network Administration, 12.4.2. Looking for Trouble
- RHS, rule
- sendmail, 8.4. Rules
- sendmail, 28.6. The RHS
- (see also rule sets)
- class macros in : sendmail, 12.1.4. Class Macros in the RHS
- RHS triple : sendmail, 9.2. The RHS Triple
- richtext text subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- Ring Indicator (RI) : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- RIP (Routing Information Protocol)
- Practical UNIX & Internet Security, 17.3.19. Routing Internet Protocol (RIP routed) (UDP Port
- TCP/IP Network Administration, 2.2.2. Classless IP Addresses
- TCP/IP Network Administration, 6.1.5.3. Metric
- TCP/IP Network Administration, 7.4.1. Routing Information Protocol
- checking updates : TCP/IP Network Administration, 11.5.1. Checking RIP Updates
- configuring : Building Internet Firewalls, 8.12.2. Routing Information Protocol
- enabling (in gated) : TCP/IP Network Administration, 7.7.1.1. A host configuration
- running : TCP/IP Network Administration, 7.4.1.1. Running RIP with routed
- starting : TCP/IP Network Administration, 5.4. The Internet Daemon
- statement (in gated) : TCP/IP Network Administration, B.8.2. The rip Statement
- Version 2 (RIP-2)
- TCP/IP Network Administration, 7.4.2. RIP Version 2
- TCP/IP Network Administration, 7.7.1.1. A host configuration
- RIP REQUEST command : TCP/IP Network Administration, 11.5.1. Checking RIP Updates
- RIPE Network Control Center : TCP/IP Network Administration, 2.4. Internet Routing Architecture
- RIPE-181 standard : TCP/IP Network Administration, 2.4. Internet Routing Architecture
- ripquery
- TCP/IP Network Administration, 11.2. Diagnostic Tools
- TCP/IP Network Administration, 11.5.1. Checking RIP Updates
- Riseaux IP Europeens (RIPE) Network Control Center (NCC) : TCP/IP Network Administration, 2.4. Internet Routing Architecture
- risk assessment
- Practical UNIX & Internet Security, 2.2. Risk Assessment
- Practical UNIX & Internet Security, 2.2.2. Review Your Risks
- Practical UNIX & Internet Security, 2.5.3. Final Words: Risk Management Means Common Sense
- risks forum : TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
- RISKS mailing list : Building Internet Firewalls, A.3.6. RISKS
- Ritchie, Dennis : Practical UNIX & Internet Security, 1.3. History of UNIX
- Rivest, Ronald L.
- Practical UNIX & Internet Security, 6.1.3. Modern Controversy
- Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
- Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
- Practical UNIX & Internet Security, 6.4.6. RSA and Public Key Cryptography
- Practical UNIX & Internet Security, 6.5.4.1. MD2, MD4, and MD5
- RJE (Remote Job Entry) : Practical UNIX & Internet Security, 3.2.1. The /etc/passwd File
- rlogin command/service
- Building Internet Firewalls, 2.3. Remote Terminal Access and Command
- Practical UNIX & Internet Security, 1.4.3. Add-On Functionality Breeds Problems
- Practical UNIX & Internet Security, 3.5. Verifying Your New Password
- Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
- Practical UNIX & Internet Security, 17.3.18. rlogin and rsh (TCP Ports 513 and 514)
- Practical UNIX & Internet Security, 17.3.18.6. /etc/hosts.lpd file
- TCP/IP Network Administration, 4.1. Connected and Non-Connected Networks
- TCP/IP Network Administration, 5.3.1.2. Pseudo-device
- TCP/IP Network Administration, 12.2.3. One-Time Passwords
- TCP/IP Network Administration, 2.7.2. Port Numbers
- proxying with TIS FWTK : Building Internet Firewalls, 7.7.2. Telnet and rlogin Proxying with
- versus Telnet : Practical UNIX & Internet Security, 17.3.18. rlogin and rsh (TCP Ports 513 and 514)
- rm command
- Practical UNIX & Internet Security, 5.4. Using Directory Permissions
- Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution
- deep tree structures and : Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
- rmail program : Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution
- ro option (read-only access)
- for Linux systems : TCP/IP Network Administration, 9.1.2.2. The /etc/exports file
- for Solaris systems : TCP/IP Network Administration, 9.1.2.1. The share command
- root account/user
- Practical UNIX & Internet Security, 4. Users, Groups, and the Superuser
- Practical UNIX & Internet Security, 4.1. Users and Groups
- Practical UNIX & Internet Security, 4.2.1. The Superuser
- Practical UNIX & Internet Security, 4.2.1.5. The problem with the superuser
- Practical UNIX & Internet Security, 5.5.2. Problems with SUID
- Practical UNIX & Internet Security, 17.4. Security Implications of Network Services
- sendmail, Other Books, Other Problems
- sendmail, 14.6. Trusted User
- sendmail, 22.1. Why root?
- TCP/IP Network Administration, 5.4. The Internet Daemon
- (see also superusers)
- abilities of : Practical UNIX & Internet Security, 27.1.3. What the Superuser Can and Cannot Do
- chroot command
- Building Internet Firewalls, 8.2.1.3. Providing anonymous
- Practical UNIX & Internet Security, 8.1.5. Restricted Filesystem
- Practical UNIX & Internet Security, 8.1.5.2. Checking new software
- Practical UNIX & Internet Security, 11.1.4. Trojan Horses
- Practical UNIX & Internet Security, 23.4.1. Using chroot()
- with anonymous FTP : Practical UNIX & Internet Security, 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP
- immutable files and : Practical UNIX & Internet Security, 9.1.1. Immutable and Append-Only Files
- network services with : Practical UNIX & Internet Security, 17.4. Security Implications of Network Services
- options that don't run on : sendmail, 34.1.4. Options that Are Safe
- protecting
- Practical UNIX & Internet Security, 8.5. Protecting the root Account
- Practical UNIX & Internet Security, 8.5.3.2. Trusted computing base
- on remote machine, fingering : Practical UNIX & Internet Security, 24.2.4.2. How to contact the system administrator of a computer
- single-command accounts and : Practical UNIX & Internet Security, 8.1.3. Accounts That Run a Single Command
- SUID_ROOT_FILES_OK macro : sendmail, 18.8. Alphabetized Reference
- web server as : Practical UNIX & Internet Security, 18.2.1. The Server's UID
- root directory : Practical UNIX & Internet Security, 5.1.1. Directories
- backups of : Practical UNIX & Internet Security, 7.1.3. Types of Backups
- UUCP access from : Practical UNIX & Internet Security, 15.4.2.1. Some bad examples
- root domain : TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
- root server : TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
- configuring : TCP/IP Network Administration, 8.3.1. The named.boot File
- entries, corrupted : TCP/IP Network Administration, 11.6.3. Cache corruption
- root option for /etc/exports : Practical UNIX & Internet Security, 20.2.1.1. /etc/exports
- root=host option (root access for specified host) : TCP/IP Network Administration, 9.1.2.1. The share command
- ROT13 algorithm
- Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
- Practical UNIX & Internet Security, 6.4.3. ROT13: Great for Encoding Offensive Jokes
- rotating backup media
- Practical UNIX & Internet Security, 7.1.3. Types of Backups
- Practical UNIX & Internet Security, 7.2.1.2. Media rotation
- route command
- TCP/IP Network Administration, 6.1.5.3. Metric
- TCP/IP Network Administration, 6.4.1. slattach
- TCP/IP Network Administration, 7.3. Building a Static Routing Table
- TCP/IP Network Administration, 7.3.1.1. Installing static routes at startup
- route add command : TCP/IP Network Administration, 11.5. Checking Routing
- routes
- addressing
- sendmail, 17.1.5. The % Hack
- sendmail, 21.5.1. Offsite MX Hosts
- sendmail, 29.4.3. Handling Routing Addresses
- d flag and : sendmail, 30.8. Alphabetized F= Flags
- pruning : sendmail, 34.8. Alphabetized Reference
- dampening : TCP/IP Network Administration, B.8.5. The bgp Statement
- duplicate, silently ignored : TCP/IP Network Administration, B.8.5. The bgp Statement
- filters : TCP/IP Network Administration, 7.7.1.3. Exterior gateway configuration
- server entry, bogus : TCP/IP Network Administration, 8.3.3. The Cache Initialization File
- routed daemon
- Building Internet Firewalls, 5.8.2.4. Which services should you disable?
- Practical UNIX & Internet Security, 17.3.19. Routing Internet Protocol (RIP routed) (UDP Port
- TCP/IP Network Administration, 5.4. The Internet Daemon
- TCP/IP Network Administration, 7.4.1. Routing Information Protocol
- routerdiscovery statement (in gated) : TCP/IP Network Administration, B.8.10. The routerdiscovery Statement
- routerid
- TCP/IP Network Administration, 7.7.1.2. Interior gateway configurations
- TCP/IP Network Administration, B.7. Definition Statements
- routers and routing
- Building Internet Firewalls, 6. Packet Filtering
- Practical UNIX & Internet Security, 16.2.2. Routing
- TCP/IP Network Administration, 1.7. Application Layer
- TCP/IP Network Administration, 2.1. Addressing, Routing, and Multiplexing
- (see also dynamic, routing; static, routing)
- areas, hierarchy of : TCP/IP Network Administration, 7.4.3. Open Shortest Path First
- as choke point : Building Internet Firewalls, 6.1. Why Packet Filtering?
- choosing : Building Internet Firewalls, 6.8. Choosing a Packet Filtering
- commonest configurations : TCP/IP Network Administration, 7.1. Common Routing Configurations
- consolidated : TCP/IP Network Administration, 2.2.2. Classless IP Addresses
- datagrams : (see datagrams)
- defined : TCP/IP Network Administration, 7. Configuring Routing
- disabling : Building Internet Firewalls, 5.8.2.5. Turning off routing
- domains
- Building Internet Firewalls, C.10. Internet Routing Architecture
- TCP/IP Network Administration, 2.4. Internet Routing Architecture
- end-to-end : (see end-to-end)
- exterior (or access) : (see exterior routers)
- handling packets : Building Internet Firewalls, 6.4. What Does the Router Do with
- intelligent : Practical UNIX & Internet Security, 21.2.3. Setting Up the Choke
- information, exchanging : TCP/IP Network Administration, 1.7. Application Layer
- interior
- Building Internet Firewalls, 4.2.3.3. Interior router
- TCP/IP Network Administration, 12.7. Firewalls
- configuring : Building Internet Firewalls, 9.1.2.1. Interior Router
- merging with bastion host : Building Internet Firewalls, 4.3.4. It's Dangerous to Merge the Bastion
- merging with exterior router : Building Internet Firewalls, 4.3.2. It's OK to Merge the Interior Router and the Exterior Router
- multiple : Building Internet Firewalls, 4.3.5. It's Dangerous to Use Multiple
- interoperability with routers : TCP/IP Network Administration, B.8.5. The bgp Statement
- logging actions of : Building Internet Firewalls, 6.4.1. Logging Actions
- merging interior and exterior : Building Internet Firewalls, 4.3.2. It's OK to Merge the Interior Router and the Exterior Router
- metric
- TCP/IP Network Administration, 6.1.5.3. Metric
- TCP/IP Network Administration, 7.3. Building a Static Routing Table
- multicast
- Building Internet Firewalls, 6.3.3.5. IP over IP
- Building Internet Firewalls, 8.9.3. The Multicast Backbone (MBONE)
- multi-path : TCP/IP Network Administration, 7.4.3. Open Shortest Path First
- planning : TCP/IP Network Administration, 4.3. Planning Routing
- policy
- TCP/IP Network Administration, 7.6. Gateway Routing Daemon
- TCP/IP Network Administration, B.10. Control Statements
- protocols
- TCP/IP Network Administration, 4. Getting Started
- TCP/IP Network Administration, 4.2.2. Defining the Subnet Mask
- (see also RIP)
- choosing : TCP/IP Network Administration, 7.5.3. Choosing a Routing Protocol
- defined : TCP/IP Network Administration, 7.1. Common Routing Configurations
- interior : TCP/IP Network Administration, 7.4. Interior Routing Protocols
- using gated for : TCP/IP Network Administration, 7.7.1.3. Exterior gateway configuration
- responsibilities of : TCP/IP Network Administration, 7.1. Common Routing Configurations
- returning ICMP error codes : Building Internet Firewalls, 6.4.2. Returning ICMP
- screening : (see screening routers)
- single-purpose versus general-purpose : Building Internet Firewalls, 6.8.2. It Can Be a Single-Purpose Router or
- source : Building Internet Firewalls, 5.8.2.5. Turning off routing
- tables
- Building Internet Firewalls, C.11. The Routing Table
- TCP/IP Network Administration, 2.5. The Routing Table
- TCP/IP Network Administration, 7.1. Common Routing Configurations
- building manually : TCP/IP Network Administration, 7.1. Common Routing Configurations
- checking : TCP/IP Network Administration, 11.5. Checking Routing
- minimal : TCP/IP Network Administration, 7.2. The Minimal Routing Table
- unstable : TCP/IP Network Administration, B.8.5. The bgp Statement
- viewing contents of : TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
- testing : Building Internet Firewalls, 4.4.1. Laboratory Networks
- troubleshooting : TCP/IP Network Administration, 11.5. Checking Routing
- where to filter : Building Internet Firewalls, 6.8.8. It Should Have Good Testing and
- Routing Arbiters
- TCP/IP Network Administration, 2.4. Internet Routing Architecture
- TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
- Routing Information Protocol : (see RIP)
- RPC table (NIS+) : Practical UNIX & Internet Security, 19.5.3. NIS+ Tables
- rpc.rexdserver : Practical UNIX & Internet Security, 17.3.22. RPC rpc.rexd (TCP Port 512)
- rpcbind : (see portmapper)
- RPCs (remote procedure calls)
- Building Internet Firewalls, 5.8.2.4. Which services should you disable?
- Building Internet Firewalls, 6.3.3.4. RPC
- Practical UNIX & Internet Security, 17.3.22. RPC rpc.rexd (TCP Port 512)
- Practical UNIX & Internet Security, 19. RPC, NIS, NIS+, and Kerberos
- Practical UNIX & Internet Security, 19.7.2. SESAME
- TCP/IP Network Administration, 2.7.2. Port Numbers
- (see also NFS; NIS)
- authentication of
- Practical UNIX & Internet Security, 19.2.2. RPC Authentication
- Practical UNIX & Internet Security, 19.2.2.4. AUTH_KERB
- portmapper program : Practical UNIX & Internet Security, 17.3.11. Sun RPC's portmapper (UDP and TCP Ports 111)
- Secure : (see Secure RPC)
- spoofing : Practical UNIX & Internet Security, 19.4.4.4. Spoofing RPC
- RRs (standard resource records) : TCP/IP Network Administration, 8.3.2. Standard Resource Records
- in named : TCP/IP Network Administration, C.3.1. Standard Resource Records
- RS-232 serial protocol : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- rs.internic.net : TCP/IP Network Administration, 13.6. The White Pages
- RS232C : TCP/IP Network Administration, 1.2. A Data Communications Model
- RSA algorithm
- Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
- Practical UNIX & Internet Security, 6.4.6. RSA and Public Key Cryptography
- Practical UNIX & Internet Security, 6.4.6.3. Strength of RSA
- Practical UNIX & Internet Security, 6.5.3. Digital Signatures
- rsh (restricted shell)
- Building Internet Firewalls, 2.3. Remote Terminal Access and Command
- Practical UNIX & Internet Security, 8.1.4.1. Restricted shells under System V UNIX
- Practical UNIX & Internet Security, 8.1.4.6. Potential problems with rsh
- Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
- Practical UNIX & Internet Security, 17.3.18. rlogin and rsh (TCP Ports 513 and 514)
- Practical UNIX & Internet Security, 17.3.18.6. /etc/hosts.lpd file
- rshd program : Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
- RUIDs : (see real UIDs/GIDs)
- rule sets
- sendmail, 5.3.4. Rule Sets
- sendmail, 6.3.1. Skipping Rule Sets
- sendmail, 8.3. Rule Sets
- sendmail, 29. Rule Sets
- TCP/IP Network Administration, 10.6.3. The Set Ruleset Command
- (see also rules)
- check_ : sendmail, 29.10. The check_... Rule Sets
- check_mail rule set : sendmail, 20.2.6. Reject Mail from Spamming or Mail-bombing Sites
- debug_dumpstate : sendmail, 26.3.3.3. -- ruleset debug_dumpstate returns stat ..., pv: --
- Hubset
- sendmail, 11.2. Rule Set S=
- sendmail, 11.4. Rule Set Hubset
- m4 keywords for : sendmail, 19.4.3. Rules and rule sets
- m4 preprocessor and : sendmail, 29.2. Rule Sets and m4
- recipient-rewriting : (see R= equate)
- rule set 0
- sendmail, 9. Rule Set 0
- sendmail, 17.3. Rule Set 0
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 29.6. Rule Set 0
- mailertables : sendmail, 19.6. Alphabetized m4 Macros
- rule set 1
- sendmail, 11.7. Rule Set 1
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 29.9. Rule Set 1
- rule set 2
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 29.8. Rule Set 2
- rule set 3
- sendmail, 10. Rule Set 3
- sendmail, 17.1. Rule Set 3
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 29.4. Rule Set 3
- sendmail, 38.6.3. Rule 3 Always Called First with -bt
- rule set 4
- sendmail, 17.4. Rule Set 4
- sendmail, 29.5. Rule Set 4
- rule set 5
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 29.7. Rule Set 5
- sendmail, 30.8. Alphabetized F= Flags
- rule set 96 : sendmail, 17.2. Rule Set 96
- S= and : (see S= equate)
- sender-rewriting : (see S= equate)
- rule-testing mode
- sendmail, 36.7. Alphabetized Reference
- sendmail, 38. Rule-Set Testing with -bt
- debugging and : sendmail, 38.7. Add Debugging for Detail
- rules
- sendmail, 8.2. Why Rules?
- sendmail, 28. Rules
- (see also rule sets)
- (see protocols, standards)
- for address transformation : sendmail, 5.3.3. Rules
- LHS and RHS syntax
- sendmail, 8.4. Rules
- sendmail, 28.4. The Behavior of a Rule
- m4 keywords for : sendmail, 19.4.3. Rules and rule sets
- mail hub : sendmail, 17. The Hub's Complex Rules
- processing flow of
- sendmail, 10.5. Details of Rule Flow
- sendmail, 29.3. The Sequence of Rule Sets
- relays : sendmail, 19.4.5. Relays
- rewriting using other rule sets : sendmail, 28.6.4. Rewrite Through Another Rule Set: $>set
- showing by rule set : sendmail, 38.4.1. Show Rules in a Rule Set with =S
- wildcards operators in : sendmail, 8.7. Wildcard Operators
- runacct command : Practical UNIX & Internet Security, 10.2. The acct/pacct Process Accounting File
- RunAsUser option : sendmail, 34.8. Alphabetized Reference
- ruusend command : Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution
- rw option (read and write access)
- /etc/exports : Practical UNIX & Internet Security, 20.2.1.1. /etc/exports
- for Linux systems : TCP/IP Network Administration, 9.1.2.2. The /etc/exports file
- for Solaris systems : TCP/IP Network Administration, 9.1.2.1. The share command
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.