Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: D
- D configuration command
- sendmail, 5.3.2. Macros
- sendmail, 7.1. Overview
- sendmail, 31.3. Configuration File Definitions
- d flag
: sendmail, 30.8. Alphabetized F= Flags
- D flag
- sendmail, 14.2.2. The Date: Header
- sendmail, 30.8. Alphabetized F= Flags
- D line (host status file)
: sendmail, B.1. Status file lines
- D line (qf file)
: sendmail, 23.9. The qf File Internals
- $d macro
: sendmail, 31.10. Alphabetized Reference
- d option
: (see DeliveryMode (d) option)
- D option
: (see AutoRebuildAliases (D) option)
- .D rule-testing command
: sendmail, 38.2.1. Define a Macro with .D
- -d switch (makemap)
: sendmail, 33.2.1.1. -d allow duplicate keys
- -d switch (sendmail)
- sendmail, 4.3. Debugging (-d)
- sendmail, 36.7. Alphabetized Reference
- sendmail, 37.1. The Syntax of -d
- complete list of switches
: sendmail, 37.5. Reference in Numerical Order
- -d0.1 switch
- sendmail, 7.3.1. The hostname
- sendmail, 11.6. Handling user@thishost
- sendmail, 37.5. Reference in Numerical Order
- -d0.15 switch
- sendmail, 6.3.3. Testing the New Delivery Agent Definitions
- sendmail, 37.5. Reference in Numerical Order
- -d0.4 switch
- sendmail, 31.7.1. Macros and the System Identity
- sendmail, 37.5. Reference in Numerical Order
- -d21.12 switch
- sendmail, 10.5. Details of Rule Flow
- sendmail, 37.5. Reference in Numerical Order
- -d35.9 switch
- sendmail, 7.3. Predefined Macros
- sendmail, 37.5. Reference in Numerical Order
- -d37.1 switch
- sendmail, 13.3. Testing the Options
- sendmail, 37.5. Reference in Numerical Order
- with rule testing
: sendmail, 38.7. Add Debugging for Detail
- D= equate
: sendmail, 30.4. The Equates
- DAC (Discretionary Access Controls)
: Practical UNIX & Internet Security, 4.1.3. Groups and Group Identifiers (GIDs)
- daemon
- TCP/IP Network Administration, 3.2. The Host Table
- TCP/IP Network Administration, 5.4. The Internet Daemon
- options for
: sendmail, 34.8. Alphabetized Reference
- preventing from running
: sendmail, 15.5. Prevent the Daemon from Running
- privacy of
: sendmail, 34.8. Alphabetized Reference
- signals
: sendmail, 26.3. Signaling the Daemon
- tools for
: Building Internet Firewalls, B.5. Daemons
- user
- Practical UNIX & Internet Security, 4.1. Users and Groups
- sendmail, 14.6. Trusted User
- TCP/IP Network Administration, 5.4. The Internet Daemon
- daemon mode
- sendmail, 3.4. Role as a Daemon
- sendmail, 4.1.1. Daemon Mode (-bd)
- sendmail, 36.7. Alphabetized Reference
- DaemonPortOptions (O) option
: sendmail, 34.8. Alphabetized Reference
- damage, liability for
: Practical UNIX & Internet Security, 26.4.6. Liability for Damage
- "dangerous write permissions" warning
: sendmail, 22.5.1. Dangerous Write Permissions
- dash (hyphen)
- in machine conversation
: sendmail, 4.2. Verbose (-v)
- non-equivalent host
: TCP/IP Network Administration, 12.2.5. Secure the r Commands
- DAT (Digital Audio Tape)
: Practical UNIX & Internet Security, 7.1.4. Guarding Against Media Failure
- data
: Building Internet Firewalls, 1.1.1. Your Data
- assigning owners to
: Practical UNIX & Internet Security, 2.4.4.1. Assign an owner
- availability of
: Practical UNIX & Internet Security, 2.1. Planning Your Security Needs
- communication equipment (DCE)
: Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- communications model
: TCP/IP Network Administration, 1.2. A Data Communications Model
- communications protocols
: (see TCP/IP services)
- compression, not provided in SLIP
: TCP/IP Network Administration, 6.2.1. The Serial Protocols
- confidential
- Practical UNIX & Internet Security, 2.1. Planning Your Security Needs
- Practical UNIX & Internet Security, 2.5.2. Confidential Information
- disclosure of
: Practical UNIX & Internet Security, 11.2. Damage
- DNS
- Building Internet Firewalls, 8.10.3. DNS Data
- Building Internet Firewalls, 8.10.4.2. Mismatched data between the hostname
- espionage
- Building Internet Firewalls, 1.2.2.4. Spies (Industrial and
- Practical UNIX & Internet Security, 11.3. Authors
- giving away with NIS
: Practical UNIX & Internet Security, 19.4.5. Unintended Disclosure of Site Information with NIS
- identifying assets
: Practical UNIX & Internet Security, 2.2.1.1. Identifying assets
- protecting from sniffers
: Building Internet Firewalls, 10.1.2. Packet Sniffing
- spoofing
: Practical UNIX & Internet Security, 16.3. IP Security
- terminal equipment (DTE)
: Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- theft of
: (see information, theft and espionage)
- transferring
- Building Internet Firewalls, 6. Packet Filtering
- (see email; files, transferring)
- allowing/disallowing
: Building Internet Firewalls, 6.1. Why Packet Filtering?
- via TCP
: Building Internet Firewalls, 6.3.3.1. TCP
- user-specified, and proxying
: Building Internet Firewalls, 7.4.4. User-Specified Data
- Data Carrier Detect (DCD)
: Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- DATA command, in SMTP
: TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
- Data Defense Network (DDN)
: Practical UNIX & Internet Security, F.3.4.20. MILNET
- Data Encryption Standard
: (see DES)
- DATA keyword
: sendmail, 4.2. Verbose (-v)
- Data Link Layer
- TCP/IP Network Administration, 1.2. A Data Communications Model
- TCP/IP Network Administration, 5.3.1.2. Pseudo-device
- TCP/IP Network Administration, 6.1.1. Determining the Interface Name
- in PPP
: TCP/IP Network Administration, 6.2.1. The Serial Protocols
- Data Set Ready (DSR)
: Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- Data Terminal Ready (DTR)
- Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- TCP/IP Network Administration, A.2. The PPP Daemon
- data terminology
: TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
- data-driven attacks
: Building Internet Firewalls, 8.1. Electronic Mail
- database files
: Practical UNIX & Internet Security, 1.2. What Is an Operating System?
- database macros
: sendmail, 33. Database Macros
- databases
: (see networks and networking, databases, network)
- classes for
: sendmail, 33.8. Alphabetized Reference
- external (keyed)
- sendmail, 5.3.11. Keyed Databases
- sendmail, 20.3. Alphabetized V8.8 Subroutines
- K command types
: sendmail, 33.3.2. The class
- library support
: sendmail, 18.4.1. DBMDEF=
- m4 and
: sendmail, 33.6. Database Maps and m4
- /map rule-testing command
: sendmail, 38.5.3. Look up a Database Item with /map
- sendmail
: TCP/IP Network Administration, 10.6.2.1. Transforming with a database
- User Database
- sendmail, 33.5. The User Database
- sendmail, 33.8. Alphabetized Reference
- sendmail, 34.8. Alphabetized Reference
- datagrams
- Building Internet Firewalls, C.5.1.1. The datagram
- TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
- TCP/IP Network Administration, 1.5.1.1. The datagram
- TCP/IP Network Administration, 1.7. Application Layer
- (see also IP datagrams)
- (see also User Datagram Protocol)
- connectionless delivery of
: TCP/IP Network Administration, 1.6. Transport Layer
- converting source address of
: TCP/IP Network Administration, 4.2.1. Obtaining an IP Address
- forwarding
: TCP/IP Network Administration, 5.3.1.1. Options
- fragmented
- Building Internet Firewalls, C.5.1.3. Fragmenting datagrams
- TCP/IP Network Administration, 1.5.1.3. Fragmenting datagrams
- TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- headers
- TCP/IP Network Administration, 2.7.1. Protocol Numbers
- TCP/IP Network Administration, 2.7.2. Port Numbers
- marking end of
: TCP/IP Network Administration, 6.2.1. The Serial Protocols
- routing
: TCP/IP Network Administration, 1.5.1.2. Routing datagrams
- silently discarding
: TCP/IP Network Administration, 11.8. Protocol Case Study
- date
: (see time and date)
- date command
- Practical UNIX & Internet Security, 8.1.3. Accounts That Run a Single Command
- Practical UNIX & Internet Security, 24.5.1. Never Trust Anything Except Hardcopy
- "Date:" header line
- sendmail, 1.5. The Header
- sendmail, 14.2.2. The Date: Header
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 35.10. Alphabetized Reference
- day-zero backups
: Practical UNIX & Internet Security, 7.1.3. Types of Backups
- db library package
- sendmail, 2.4.1. Eliminate or Keep db Support?
- sendmail, 18.8. Alphabetized Reference
- sendmail, C.1. Overview
- compiling and installing
: sendmail, C.3. Compile and Install
- dbm database
: sendmail, 33.8. Alphabetized Reference
- alias file and
- sendmail, 22.6.1. The Alias Database Files
- sendmail, 24.5. The Aliases Database
- dbx debugger
: Practical UNIX & Internet Security, C.4. The kill Command
- DCC (Direct Client Connections)
: Building Internet Firewalls, 8.9.2. Internet Relay Chat
- DCD (Data Carrier Detect) modem control line
: TCP/IP Network Administration, A.2. The PPP Daemon
- DCE (data communication equipment)
: Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- DCE (Distributed Computing Environment)
- Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
- Practical UNIX & Internet Security, 8.7.3. Code Books
- Practical UNIX & Internet Security, 16.2.6.2. Other naming services
- Practical UNIX & Internet Security, 19.2. Sun's Remote Procedure Call (RPC)
- Practical UNIX & Internet Security, 19.7.1. DCE
- dd command
- Practical UNIX & Internet Security, 6.6.1.2. Ways of improving the security of crypt
- Practical UNIX & Internet Security, 7.4.1. Simple Local Copies
- DDN (Data Defense Network)
- Building Internet Firewalls, C.10. Internet Routing Architecture
- Practical UNIX & Internet Security, F.3.4.20. MILNET
- TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
- Protocol Handbook
: TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
- deadlock
: Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- debug command
- Practical UNIX & Internet Security, 17.3.4.2. Using sendmail to receive email
- sendmail, 22.3.1. SMTP debug
- debug_dumpstate rule set
: sendmail, 26.3.3.3. -- ruleset debug_dumpstate returns stat ..., pv: --
- debugfs command
: Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
- debugging
- Building Internet Firewalls, 6.1.2.1. Current filtering tools are not perfect
- sendmail, 4.3. Debugging (-d)
- sendmail, 6.3.3. Testing the New Delivery Agent Definitions
- sendmail, 37.2. Debugging Behavior
- TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
- TCP/IP Network Administration, C.1.1. Signal Processing
- (see also bugs)
- (see also -d switch (sendmail))
- (see also testing)
- (see also troubleshooting)
- operating system
: Building Internet Firewalls, 5.8.1.2. Fix all known system bugs
- with rule testing
: sendmail, 38.7. Add Debugging for Detail
- SMTPDEBUG macro
- sendmail, 18.8. Alphabetized Reference
- sendmail, 22.3.1. SMTP debug
- debugging mode
: sendmail, 36.7. Alphabetized Reference
- DEC (Digital Equipment Corporation)
: Practical UNIX & Internet Security, F.3.4.9. DEC (Digital Equipment Corporation)
- decentralizing management
: TCP/IP Network Administration, 2.3. Subnets
- declaring
- classes
- sendmail, 12.1.1. Declaring a Class
- sendmail, 32.1. Class Configuration Commands
- delivery agents
: sendmail, 19.3.2. MAILER()
- macros
- sendmail, 7.2. Defining Macros
- sendmail, 31.2. Command-Line Definitions
- sites for SITECONFIG
: sendmail, 19.6. Alphabetized m4 Macros
- trusted users
: (see T configuration command)
- DECnet network
- Practical UNIX & Internet Security, 16.4.3. DECnet
- sendmail, 3.3.3. Other Protocols
- $C macro
: sendmail, 31.10. Alphabetized Reference
- DECNET-RELAY macro (m4)
: sendmail, 19.6. Alphabetized m4 Macros
- decode alias
- Practical UNIX & Internet Security, 17.3.4.2. Using sendmail to receive email
- sendmail, 22.6. The Aliases File
- decryption
- TCP/IP Network Administration, 12.6. Encryption
- (see encryption)
- dedicated connections
- TCP/IP Network Administration, 6.3.1. The PPP Daemon
- TCP/IP Network Administration, 6.4. Installing SLIP
- dedicated proxy servers
: Building Internet Firewalls, 7.3.2. Generic Versus Dedicated Proxies
- defamation
: Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication, and Defamation
- default
- accounts
: Practical UNIX & Internet Security, 8.1.2. Default Accounts
- canonicalization
: sendmail, 28.6.6.2. Default in canonicalization: $:
- character set
: sendmail, 30.4. The Equates
- content-type character set
: sendmail, 34.8. Alphabetized Reference
- database key
: sendmail, 33.4.1. Specify a Default with $:
- delivery agent
: sendmail, 34.8. Alphabetized Reference
- delivery mode
: sendmail, 13.2.3. The Default Delivery Mode
- deny
: Practical UNIX & Internet Security, 21.1.1. Default Permit vs. Default Deny
- domain
- Practical UNIX & Internet Security, 16.2.3. Hostnames
- TCP/IP Network Administration, 3.3.3. Domain Names
- TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
- how used
: TCP/IP Network Administration, 3.3.3. Domain Names
- file permissions
: sendmail, 13.2.4. The Default File Permissions
- gateway
- TCP/IP Network Administration, 2.5. The Routing Table
- TCP/IP Network Administration, 4.3. Planning Routing
- address
: TCP/IP Network Administration, 4. Getting Started
- hostname
: sendmail, 33.5.3. A :default Outgoing Hostname
- logging level
: sendmail, 13.2.6. The Default Logging Level
- macro definitions
: sendmail, 7.3. Predefined Macros
- mask
: TCP/IP Network Administration, 2.2.2. Classless IP Addresses
- passwords
: TCP/IP Network Administration, 12.2. User Authentication
- permit
: Practical UNIX & Internet Security, 21.1.1. Default Permit vs. Default Deny
- route
- TCP/IP Network Administration, 2.2.2.1. Final notes on IP addresses
- TCP/IP Network Administration, 2.5. The Routing Table
- TCP/IP Network Administration, 7.3. Building a Static Routing Table
- defining
: TCP/IP Network Administration, 7.4.1.1. Running RIP with routed
- sender's address format
: sendmail, 31.10. Alphabetized Reference
- User Database location
: sendmail, 18.8. Alphabetized Reference
- user identity
- sendmail, 13.2.5. The Default User Identities
- sendmail, 22.8.3.1. The DefaultUser option
- sendmail, 34.8. Alphabetized Reference
- values
: TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
- default deny stance
- Building Internet Firewalls, 3.5.1. Default Deny Stance: That Which Is Not
- Building Internet Firewalls, 6.2.3. Default Permit Versus Default Deny
- default permit stance
- Building Internet Firewalls, 3.5.2. Default Permit Stance: That Which Is
- Building Internet Firewalls, 6.2.3. Default Permit Versus Default Deny
- DefaultCharSet option
: sendmail, 34.8. Alphabetized Reference
- defaultdomain file
: TCP/IP Network Administration, 9.3. Network Information Service
- defaultroute option
: TCP/IP Network Administration, 6.3.1. The PPP Daemon
- DefaultUser (u,g) option
- sendmail, 13.2.5. The Default User Identities
- sendmail, 22.8.3.1. The DefaultUser option
- sendmail, 34.8. Alphabetized Reference
- Defense Communications Agency (DCA)
: TCP/IP Network Administration, 1.1. TCP/IP and the Internet
- Defense Data Network (DDN)
: Building Internet Firewalls, C.10. Internet Routing Architecture
- defense in depth
- Building Internet Firewalls, 3.2. Defense in Depth
- Building Internet Firewalls, 9.2.3.2. Defense in depth
- define()
: sendmail, 20.3. Alphabetized V8.8 Subroutines
- define macro (in sendmail)
- TCP/IP Network Administration, E.3. m4 sendmail Macros
- TCP/IP Network Administration, E.3.1. define
- define statements (m4)
- sendmail, 19.1. The m4 Preprocessor
- sendmail, 19.4.1. Options
- defining
- headers
: (see H configuration command)
- macros
- sendmail, 20.3. Alphabetized V8.8 Subroutines
- sendmail, 34.8. Alphabetized Reference
- sendmail, 36.7. Alphabetized Reference
- sendmail, 38.2.1. Define a Macro with .D
- definition statements (in gated)
: TCP/IP Network Administration, B.7. Definition Statements
- delay= equate (syslog output)
: sendmail, 26.1.3.2. delay= total time to deliver
- delay, transaction
: sendmail, 26.1.3.13. xdelay= transaction
- delays, inserting
- TCP/IP Network Administration, 6.3.2. Dial-Up PPP
- TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
- DELETE key
: Practical UNIX & Internet Security, 3.4. Changing Your Password
- deleting
- destructive attack via
: Practical UNIX & Internet Security, 25.1. Destructive Attacks
- files
: Practical UNIX & Internet Security, 5.4. Using Directory Permissions
- header lines
: sendmail, 20.3. Alphabetized V8.8 Subroutines
- delimiters
- database key column
: sendmail, 33.3.4.12. -z specify the column delimiter (V8.7 and above)
- tokens
- sendmail, 31.10. Alphabetized Reference
- sendmail, 34.8. Alphabetized Reference
- "Delivered-To:" header line
: sendmail, 35.10. Alphabetized Reference
- delivermail program
: sendmail, History
- delivery
- sendmail, 19.6. Alphabetized m4 Macros
- (see also users)
- alias, forms of
: sendmail, 24.2. Forms of Alias Delivery
- failure count
: sendmail, 23.9. The qf File Internals
- via FAX machine
: sendmail, 3.3.3. Other Protocols
- to files
: (see appending to files)
- local
- sendmail, 3.2. Role in Local Delivery
- sendmail, 29.6.3. Delivering to Local Recipient
- sendmail, 30.8. Alphabetized F= Flags
- (see local)
- looking up addresses with DNS
: sendmail, 21.2.3. Look Up Addresses for Delivery
- to mailbox
: sendmail, 3.2.1. Delivery to a Mailbox
- to multiple recipients
: sendmail, 30.8. Alphabetized F= Flags
- path of
: (see "Received:" header line)
- precedence
: (see priority, message)
- to programs
- sendmail, 3.2.2. Delivery Through a Program
- sendmail, 24.2.3. Delivery via Programs
- sendmail, 25.7.4. Piping Through Programs
- sendmail, 30.8. Alphabetized F= Flags
- relays
: (see relays)
- single threaded
: sendmail, 34.8. Alphabetized Reference
- total time for
: sendmail, 26.1.3.2. delay= total time to deliver
- delivery agents (MTAs)
- Building Internet Firewalls, 8.1. Electronic Mail
- sendmail, 1.1. MUA Versus MTA
- sendmail, 5.3.1. Mail Delivery Agents
- sendmail, 6.2. Define a Mail Delivery Agent
- sendmail, 30. Delivery Agents
- (see also M configuration command)
- $# operator and
- sendmail, 9.2.1. The Delivery Agent ($#)
- sendmail, 28.6.5. Specify a Delivery Agent: $#
- advantages to sendmail
: sendmail, 18.1. To Use or Not to Use
- choosing
- sendmail, 9. Rule Set 0
- sendmail, 9.5. Things to Try
- declaring
: sendmail, 19.3.2. MAILER()
- default
: sendmail, 34.8. Alphabetized Reference
- equates for
: sendmail, 30.4. The Equates
- for errors
: sendmail, 9.4. The error Delivery Agent
- expensive
- sendmail, 23.6.1. Periodically with -q
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 34.8. Alphabetized Reference
- flags
- sendmail, 6.3. The local Delivery Agent
- sendmail, 6.4. Add the Missing Parts to Mhub
- sendmail, 14.2. Headers Versus Delivery Agent Flags
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 35.4. ?flags? in Header Definitions
- ignoring MX records
: sendmail, 21.3.5. What? They Ignore MX Records?
- local
- sendmail, 6.3. The local Delivery Agent
- sendmail, 19.6. Alphabetized m4 Macros
- logging
: sendmail, 26.1.3.4. mailer= the delivery agent used
- printing list of
: sendmail, 38.4.2. Show Delivery Agents with =M
- as recipients
: sendmail, 30.8. Alphabetized F= Flags
- scripts via
: sendmail, 24.3. Write a Delivery Agent Script
- statistics
: (see statistics)
- symbolic name
: sendmail, 30.2. The Symbolic Name
- testing
: sendmail, 38.5.6. Try a Delivery Agent with /try
- UUCP
: sendmail, 19.4.6. UUCP
- delivery mode
: sendmail, 13.2.3. The Default Delivery Mode
- delivery program
: sendmail, 25.7.5.1. The deliver program
- Delivery Status Notification
: (see DSN)
- DeliveryMode (d) option
- sendmail, 13.2.3. The Default Delivery Mode
- sendmail, 23.6.1. Periodically with -q
- sendmail, 34.8. Alphabetized Reference
- Demilitarized Zone (DMZ)
: Building Internet Firewalls, 4.1. Some Firewall Definitions
- demo accounts
: Practical UNIX & Internet Security, 8.1.2. Default Accounts
- demultiplexing
: TCP/IP Network Administration, 2.7. Protocols, Ports, and Sockets
- denial of service
- Building Internet Firewalls, 1.2.1.2. Denial of Service
- Practical UNIX & Internet Security, 1.5. Role of This Book
- Practical UNIX & Internet Security, 17.1.3. The /etc/inetd Program
- Practical UNIX & Internet Security, 17.3.21.5. Denial of service attacks under X
- Practical UNIX & Internet Security, 25. Denial of Service Attacks and Solutions
- Practical UNIX & Internet Security, 25.3. Network Denial of Service Attacks
- Practical UNIX & Internet Security, 25.3.4. Clogging
- TCP/IP Network Administration, 12.1.1. Assessing the Threat
- accidental
- Building Internet Firewalls, 1.2.3. Stupidity and Accidents
- Practical UNIX & Internet Security, 25.2.5. Soft Process Limits: Preventing Accidental Denial
- automatic lockout
: Practical UNIX & Internet Security, 3.3. Entering Your Password
- checklist for
: Practical UNIX & Internet Security, A.1.1.24. Chapter 25: Denial of Service Attacks and Solutions
- destructive attacks
: Practical UNIX & Internet Security, 25.1. Destructive Attacks
- disk attacks
- Practical UNIX & Internet Security, 25.2.2. Disk Attacks
- Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
- inodes
: Practical UNIX & Internet Security, 25.2.2.3. Inode problems
- internal inetd services
: Practical UNIX & Internet Security, 17.1.3. The /etc/inetd Program
- on networks
- Practical UNIX & Internet Security, 25.3. Network Denial of Service Attacks
- Practical UNIX & Internet Security, 25.3.4. Clogging
- overload attacks
- Practical UNIX & Internet Security, 25.2. Overload Attacks
- Practical UNIX & Internet Security, 25.2.5. Soft Process Limits: Preventing Accidental Denial
- via syslog
: Practical UNIX & Internet Security, 10.5.1. The syslog.conf Configuration File
- system overload attacks
: Practical UNIX & Internet Security, 25.2.1.2. System overload attacks
- X Window System
: Practical UNIX & Internet Security, 17.3.21.5. Denial of service attacks under X
- departure of employees
: Practical UNIX & Internet Security, 13.2.6. Departure
- depository directories, FTP
: Practical UNIX & Internet Security, 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP
- dequote database
- sendmail, 33.8. Alphabetized Reference
- TCP/IP Network Administration, 10.7.1. Modifying Local Information
- DES (Data Encryption Standard)
- Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
- Practical UNIX & Internet Security, 6.4.4. DES
- Practical UNIX & Internet Security, 6.4.5.2. Triple DES
- Practical UNIX & Internet Security, 6.6.2. des: The Data Encryption Standard
- Practical UNIX & Internet Security, 7.4.4. Encrypting Your Backups
- Practical UNIX & Internet Security, 8.6.1. The crypt()
- (see also authentication)
- authentication (NIS+)
: Practical UNIX & Internet Security, 19.5.4. Using NIS+
- improving security of
- Practical UNIX & Internet Security, 6.4.5. Improving the Security of DES
- Practical UNIX & Internet Security, 6.4.5.2. Triple DES
- designated router
: TCP/IP Network Administration, 7.4.3. Open Shortest Path First
- designing firewalls
: Building Internet Firewalls, 1.4.3. Buying Versus Building
- destination
- TCP/IP Network Administration, 1.7. Application Layer
- (see also unreachable destinations, detecting)
- fields
: TCP/IP Network Administration, 2.5. The Routing Table
- host
: TCP/IP Network Administration, 2.5. The Routing Table
- Destination Address
- TCP/IP Network Administration, 1.5.1.1. The datagram
- TCP/IP Network Administration, 2.2. The IP Address
- Destination Port number
- TCP/IP Network Administration, 1.6.1. User Datagram Protocol
- TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
- destination unreachable codes
: (see ICMP)
- Destination Unreachable Message
: TCP/IP Network Administration, 1.5.2. Internet Control Message Protocol
- destroying media
: Practical UNIX & Internet Security, 12.3.2.3. Sanitize your media before disposal
- destructive attacks
: Practical UNIX & Internet Security, 25.1. Destructive Attacks
- detached signatures
: Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
- detail data, DSN delivery
: sendmail, 30.5.2.1. The $@ dsn part
- detectors
- cable tampering
: Practical UNIX & Internet Security, 12.3.1.1. Wiretapping
- carbon-monoxide
: Practical UNIX & Internet Security, 12.2.1.2. Smoke
- humidity
: Practical UNIX & Internet Security, 12.2.1.11. Humidity
- logging alarm systems
: Practical UNIX & Internet Security, 10.7.1.1. Exception and activity reports
- smoke
: Practical UNIX & Internet Security, 12.2.1.2. Smoke
- temperature alarms
: Practical UNIX & Internet Security, 12.2.1.6. Temperature extremes
- water sensors
: Practical UNIX & Internet Security, 12.2.1.12. Water
- Deutsches Forschungsnetz
: Practical UNIX & Internet Security, F.3.4.14. Germany: DFN-WiNet Internet sites
- /dev directory
- Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer
- TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
- /dev/audio device
: Practical UNIX & Internet Security, 23.8. Picking a Random Seed
- /dev/console device
: Practical UNIX & Internet Security, 5.6. Device Files
- /dev/kmem device
- Practical UNIX & Internet Security, 5.6. Device Files
- Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
- sendmail, 18.8. Alphabetized Reference
- /dev/null device
- Practical UNIX & Internet Security, 5.6. Device Files
- sendmail, 5.2. The Minimal File
- /dev/random device
: Practical UNIX & Internet Security, 23.7.4. Other random number generators
- /dev/swap device
: Practical UNIX & Internet Security, 5.5.1. SUID, SGID, and Sticky Bits
- /dev/urandom device
: Practical UNIX & Internet Security, 23.7.4. Other random number generators
- device statement
: TCP/IP Network Administration, 5.3.1.3. Devices
- devices
: Practical UNIX & Internet Security, 5.6. Device Files
- managing with SNMP
: Practical UNIX & Internet Security, 17.3.15. Simple Network Management Protocol (SNMP) (UDP Ports
- modem control
: Practical UNIX & Internet Security, 14.5.2. Setting Up the UNIX Device
- numbers for
: sendmail, 23.9. The qf File Internals
- Devices file
: Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer
- df -i command
: Practical UNIX & Internet Security, 25.2.2.3. Inode problems
- df files
- sendmail, 3.1.2. The Queue Directory
- sendmail, 23.2.2. The Data (Message Body) File: df
- sendmail, 23.9. The qf File Internals
- inode and device information
: sendmail, 23.9. The qf File Internals
- dfstab file
- TCP/IP Network Administration, 9.1.2.1. The share command
- TCP/IP Network Administration, 9.1.5.1. NFS print services
- dgram sockets
: TCP/IP Network Administration, 5.4. The Internet Daemon
- DHCP (Dynamic Host Configuration Protocol)
- TCP/IP Network Administration, Preface
- TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
- interoperability and
: TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
- backwards-compatible
: TCP/IP Network Administration, 9.5. DHCP
- based on Bootstrap Protocol (BOOTP)
: TCP/IP Network Administration, 9.4.2. BOOTP extensions
- benefits of
: TCP/IP Network Administration, 9.5. DHCP
- daemon (dhcpd)
: TCP/IP Network Administration, 9.5.1. dhcpd.conf
- command
: TCP/IP Network Administration, D.2. The dhcpd Command
- compiling
: TCP/IP Network Administration, D.1. Compiling dhcpd
- configuring
: TCP/IP Network Administration, D.3. The dhcpd.conf Configuration File
- tools reference
: TCP/IP Network Administration, D. A dhcpd Reference
- using latest versions of
: TCP/IP Network Administration, D. A dhcpd Reference
- dhcpd.conf file
: TCP/IP Network Administration, 9.5.1. dhcpd.conf
- dhcpd.pid file
: TCP/IP Network Administration, D.2. The dhcpd Command
- options available with
: TCP/IP Network Administration, D.3.3. DHCP Options
- commonly used
: TCP/IP Network Administration, D.3.3.1. Commonly used options
- others
: TCP/IP Network Administration, D.3.3.2. Other options
- diagnostic tools
: TCP/IP Network Administration, 11.2. Diagnostic Tools
- diagramming the system
: Building Internet Firewalls, 13.5.2. Labeling and Diagraming Your System
- dial-up connections
: TCP/IP Network Administration, 6.3.1. The PPP Daemon
- dial-up IP (dip)
- TCP/IP Network Administration, 6.3.2. Dial-Up PPP
- TCP/IP Network Administration, 6.4.2. Dial-Up IP
- script file
: TCP/IP Network Administration, A.1.1. The dip Script File
- for SLIP
: TCP/IP Network Administration, 6.4.2. Dial-Up IP
- sample
: TCP/IP Network Administration, A.1.1.1. A sample dip script
- special variables, listed
: TCP/IP Network Administration, A.1.1. The dip Script File
- tools reference
: TCP/IP Network Administration, A.1. Dial-Up IP
- dial-up PPP
: TCP/IP Network Administration, 6.3.2. Dial-Up PPP
- DialDelay option
: sendmail, 34.8. Alphabetized Reference
- dictionary attacks
- Building Internet Firewalls, 10.3.1. One-Time Passwords
- Practical UNIX & Internet Security, 8.6.1. The crypt()
- TCP/IP Network Administration, 12.2. User Authentication
- Diffie-Hellman key exchange system
- Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
- Practical UNIX & Internet Security, 18.6. Dependence on Third Parties
- Practical UNIX & Internet Security, 19.3. Secure RPC (AUTH_DES)
- breaking key
: Practical UNIX & Internet Security, 19.3.4. Limitations of Secure RPC
- exponential key exchange
: Practical UNIX & Internet Security, 19.3.1. Secure RPC Authentication
- dig
- TCP/IP Network Administration, 11.2. Diagnostic Tools
- TCP/IP Network Administration, 11.3. Testing Basic Connectivity
- TCP/IP Network Administration, 11.6.4. dig: An Alternative to nslookup
- digest multipart subtype
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- Digital Audio Tape (DAT)
: Practical UNIX & Internet Security, 7.1.4. Guarding Against Media Failure
- digital computers
: Practical UNIX & Internet Security, 6.1.2. Cryptography and Digital Computers
- Digital Equipment Corporation (DEC)
: Practical UNIX & Internet Security, F.3.4.9. DEC (Digital Equipment Corporation)
- Digital Signature Algorithm
: (see DSA)
- digital signatures
- Practical UNIX & Internet Security, 6.4. Common Cryptographic Algorithms
- Practical UNIX & Internet Security, 6.5. Message Digests and Digital Signatures
- Practical UNIX & Internet Security, 6.5.5.2. Message authentication codes
- Practical UNIX & Internet Security, 9.2.3. Checksums and Signatures
- TCP/IP Network Administration, 12.6. Encryption
- checksums
- Building Internet Firewalls, 5.8.5.3. About checksums for auditing
- Practical UNIX & Internet Security, 6.5.5.1. Checksums
- Practical UNIX & Internet Security, 9.2.3. Checksums and Signatures
- TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
- TCP/IP Network Administration, 11.8. Protocol Case Study
- keeping secure
: Building Internet Firewalls, 13.5.3. Keeping Secured Checksums
- recalculating
- TCP/IP Network Administration, 4.2.1. Obtaining an IP Address
- TCP/IP Network Administration, 5.3.1.1. Options
- using Tripwire for
: Building Internet Firewalls, 5.8.5.1. Auditing packages
- detached signatures
: Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
- with PGP
: Practical UNIX & Internet Security, 6.6.3.4. Adding a digital signature to an announcement
- Digital UNIX
- Practical UNIX & Internet Security, 1.3. History of UNIX
- (see also Ultrix)
- Dijkstra Shortest Path First (SPF) algorithm
: TCP/IP Network Administration, 7.4.3. Open Shortest Path First
- dip (dial-up IP)
- TCP/IP Network Administration, 6.3.2. Dial-Up PPP
- TCP/IP Network Administration, 6.4.2. Dial-Up IP
- script file
: TCP/IP Network Administration, A.1.1. The dip Script File
- for SLIP
: TCP/IP Network Administration, 6.4.2. Dial-Up IP
- sample
: TCP/IP Network Administration, A.1.1.1. A sample dip script
- tools reference
: TCP/IP Network Administration, A.1. Dial-Up IP
- diphosts file
: TCP/IP Network Administration, 6.4.3. SLIP Server Configuration
- diplogin command
: TCP/IP Network Administration, 6.4.3. SLIP Server Configuration
- Direct Client Connections (DCC)
: Building Internet Firewalls, 8.9.2. Internet Relay Chat
- direct delivery
: TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
- directive statements (in gated)
: TCP/IP Network Administration, B.3. Directive Statements
- directives, Makefile
: sendmail, 18.4. Tuning Makefile
- directories
- Practical UNIX & Internet Security, 5.1.1. Directories
- Practical UNIX & Internet Security, 5.1.3. Current Directory and Paths
- ancestor
: Practical UNIX & Internet Security, 9.2.2.2. Ancestor directories
- backing up by
: Practical UNIX & Internet Security, 7.1.3. Types of Backups
- CDFs (context-dependent files)
: Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories
- cf
: sendmail, 16.1. The cf/cf Directory
- checklist for
: Practical UNIX & Internet Security, A.1.1.4. Chapter 5: The UNIX Filesystem
- dot, dot-dot, and /
: Practical UNIX & Internet Security, 5.1.1. Directories
- FTP depositories
: Practical UNIX & Internet Security, 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP
- immutable
: Practical UNIX & Internet Security, 9.1.1. Immutable and Append-Only Files
- listing automatically (Web)
: Practical UNIX & Internet Security, 18.2.2.2. Additional configuration issues
- mounted
- Practical UNIX & Internet Security, 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
- Practical UNIX & Internet Security, 19.3.2.5. Mounting a secure filesystem
- nested
: Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
- NFS
: (see NFS)
- permissions
: Practical UNIX & Internet Security, 5.4. Using Directory Permissions
- queue
: (see queue directory)
- read-only
: Practical UNIX & Internet Security, 9.1.2. Read-only Filesystems
- recipient's home
: sendmail, 31.10. Alphabetized Reference
- requirement for mounting
: TCP/IP Network Administration, 9.1.3. Mounting Remote Filesystems
- restricted
- Practical UNIX & Internet Security, 8.1.5. Restricted Filesystem
- Practical UNIX & Internet Security, 8.1.5.2. Checking new software
- root
: (see root directory)
- for safe file writes
: sendmail, 34.8. Alphabetized Reference
- SGI and sticky bits on
: Practical UNIX & Internet Security, 5.5.6. SGID and Sticky Bits on Directories
- Web server structure of
- Practical UNIX & Internet Security, 18.2.2. Understand Your Server's Directory Structure
- Practical UNIX & Internet Security, 18.2.2.2. Additional configuration issues
- world-writable
: Practical UNIX & Internet Security, 11.6.1.1. World-writable user files and directories
- directory statement
: TCP/IP Network Administration, 8.3.1.2. Primary and secondary server configurations
- <Directory> blocks
- Practical UNIX & Internet Security, 18.3.1. The access.conf and .htaccess Files
- Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
- Practical UNIX & Internet Security, 18.3.2.1. Examples
- disabling Internet services
: Building Internet Firewalls, 5.8.2. Disabling Nonrequired Services
- disabling routing
: (see routers and routing, disabling)
- disasters and disaster recovery
- Practical UNIX & Internet Security, 12.2.6.4. Minimizing downtime
- sendmail, 21.5. Prepare for Disaster
- TCP/IP Network Administration, 11.10. Summary
- TCP/IP Network Administration, 12.1.1. Assessing the Threat
- TCP/IP Network Administration, 12.1.3. Writing a Security Policy
- TCP/IP Network Administration, 12.8. Words to the Wise
- disclosure of information, threat of
: TCP/IP Network Administration, 12.1.1. Assessing the Threat
- disconnecting after incident
: Building Internet Firewalls, 13.1.2. Disconnect or Shut Down, as
- disconnecting machine
: Building Internet Firewalls, 13.4.3. Planning for Disconnecting or
- disk attacks
- Practical UNIX & Internet Security, 25.2.2. Disk Attacks
- Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
- disk quotas
: Practical UNIX & Internet Security, 25.2.2.5. Using quotas
- disk space
: (see memory; resources)
- diskettes
: (see backups; media)
- disks, needs for
: Building Internet Firewalls, 5.3.3. What Hardware Configuration?
- dismissed employees
: Practical UNIX & Internet Security, 13.2.6. Departure
- dismounting directories, by booting
: TCP/IP Network Administration, 9.1.3.1. The mount command
- disposing of materials
: Practical UNIX & Internet Security, 12.3.3. Other Media
- Distfile
: TCP/IP Network Administration, 9.6.1. rdist
- distributed
- architecture
: TCP/IP Network Administration, 7.5.1. Exterior Gateway Protocol
- control
: TCP/IP Network Administration, 12.1.2. Distributed Control
- servers, managing
: TCP/IP Network Administration, 9.6. Managing Distributed Servers
- Distributed Computing Environment
: (see DCE)
- Distributed File System (DFS)
: TCP/IP Network Administration, 3.7.1. File Sharing
- distributing public keys
: TCP/IP Network Administration, 12.6. Encryption
- diversity of defense systems
: Building Internet Firewalls, 3.7. Diversity of Defense
- divert command (m4)
- sendmail, 19.1.4. m4 diversions
- sendmail, 19.6. Alphabetized m4 Macros
- dividing problem into manageable pieces
: TCP/IP Network Administration, 11.1.1. Troubleshooting Hints
- DMBDEF variable
: TCP/IP Network Administration, E.4.4. The sendmail K Command
- DMBDEF= directive
: sendmail, 18.4.1. DBMDEF=
- dmesg command
: TCP/IP Network Administration, 6.1.1. Determining the Interface Name
- DMZ (Demilitarized Zone)
: Building Internet Firewalls, 4.1. Some Firewall Definitions
- dnl command (m4)
: sendmail, 19.1.2. m4 and dnl
- DNS (Domain Name Service)
- Building Internet Firewalls, 2.9. Name Service
- Building Internet Firewalls, 5.6. Selecting Services Provided by the
- Practical UNIX & Internet Security, 16.2.6. Name Service
- Practical UNIX & Internet Security, 16.2.6.2. Other naming services
- Practical UNIX & Internet Security, 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
- Practical UNIX & Internet Security, 17.3.6.2. DNS nameserver attacks
- sendmail, 17.2.1. Is the Host Local?
- sendmail, 21.1. Overview
- TCP/IP Network Administration, 1.7. Application Layer
- TCP/IP Network Administration, 3.1. Names and Addresses
- TCP/IP Network Administration, 3.3. Domain Name Service
- (see also name service)
- benefits of
- TCP/IP Network Administration, 3.3. Domain Name Service
- TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
- bestmx_is_local feature
: sendmail, 19.6. Alphabetized m4 Macros
- configuring
: Building Internet Firewalls, 8.10. Domain Name System
- in screened host architecture
: Building Internet Firewalls, 9.2.1.6. DNS
- in screened subnet architecture
: Building Internet Firewalls, 9.1.1.6. DNS
- without hiding information
: Building Internet Firewalls, 8.10.6. Setting up DNS Without Hiding
- data
: Building Internet Firewalls, 8.10.3. DNS Data
- disasters
: sendmail, 21.5. Prepare for Disaster
- eliminating support for
: sendmail, 2.4.2. Eliminate DNS Support
- error numbers
: sendmail, B.1. Status file lines
- fake server
: Building Internet Firewalls, 8.10.5.1. Set up a `fake'
- hiding information with
: Building Internet Firewalls, 8.10.5. Setting Up DNS to Hide
- MX records
- Building Internet Firewalls, 8.10.5.1. Set up a `fake'
- Practical UNIX & Internet Security, 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
- sendmail, 15.3. MX Records
- sendmail, 18.8. Alphabetized Reference
- sendmail, 21.3. Set Up MX Records
- sendmail, 34.8. Alphabetized Reference
- sendmail, 38.5.2. Look Up MX Records with /mx
- TCP/IP Network Administration, 8.3.2. Standard Resource Records
- TCP/IP Network Administration, 8.3.6. The named.hosts File
- TCP/IP Network Administration, 8.4. Using nslookup
- TCP/IP Network Administration, 10.7.1. Modifying Local Information
- TCP/IP Network Administration, C.3.1.4. Mail exchanger record
- 0 flag
: sendmail, 30.8. Alphabetized F= Flags
- bestmx database class
: sendmail, 33.8. Alphabetized Reference
- bestmx_is_local feature
: sendmail, 19.6. Alphabetized m4 Macros
- fallback MX host
: sendmail, 34.8. Alphabetized Reference
- ignored by delivery agents
: sendmail, 21.3.5. What? They Ignore MX Records?
- looking up for addresses
: sendmail, 21.2.3. Look Up Addresses for Delivery
- offsite hosts
: sendmail, 21.5.1. Offsite MX Hosts
- with wildcards
: sendmail, 21.3.4. Wildcard MX Records
- nameserver attacks
: Practical UNIX & Internet Security, 17.3.6.2. DNS nameserver attacks
- omitting support
: sendmail, 19.6. Alphabetized m4 Macros
- querying
: TCP/IP Network Administration, 10.7.1. Modifying Local Information
- resource on
: sendmail, Other Books, Other Problems
- revealing information to attackers
: Building Internet Firewalls, 8.10.4.3. Revealing too much information to
- rogue servers
: Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
- security and
: Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
- server for internal hosts
: Building Internet Firewalls, 8.10.5.2. Set up a real DNS
- starting
: TCP/IP Network Administration, 5.4. The Internet Daemon
- tuning lookups
: sendmail, 34.8. Alphabetized Reference
- zone transfers
- Practical UNIX & Internet Security, 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
- Practical UNIX & Internet Security, 17.3.6.1. DNS zone transfers
- docs/warnings file
: TCP/IP Network Administration, 12.4.3.1. COPS
- documentation
- Practical UNIX & Internet Security, 2.5. The Problem with Security Through Obscurity
- Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- historical, of problems
: TCP/IP Network Administration, 11.1.1. Troubleshooting Hints
- incidents
: Building Internet Firewalls, 13.1.7. Document the Incident
- plan for
: Building Internet Firewalls, 13.4.7. Planning for Documentation
- sendmail
- sendmail, Additional Sources of Information
- sendmail, 2.2. Read the Documents
- system after incident
- Building Internet Firewalls, 13.1.5. Snapshot the System
- Building Internet Firewalls, 13.4.5. Planning for Snapshots
- using
: TCP/IP Network Administration, 4.6. Informing the Users
- dollar sign ($)
- $ line (qf file)
: sendmail, 23.9. The qf File Internals
- $ rule-testing command
: sendmail, 38.3.1. Dump a Defined Macro with $
- in macro names
: sendmail, 31.5. Macro Expansion: $ and $&
- wildcard operators
- sendmail, 8.7. Wildcard Operators
- (see also wildcard operators)
- $1, $2, ...
: (see positional operators)
- $&
- sendmail, 28.6.4. Rewrite Through Another Rule Set: $>set
- sendmail, 31.5.3. Use Value as Is with $&
- $>
: sendmail, 28.6.4. Rewrite Through Another Rule Set: $>set
- $*
: sendmail, 10.2.1. The LHS
- $@
- sendmail, 9.2.2. The Host ($@)
- sendmail, 9.3. Testing Rule Set 0
- sendmail, 11.4.1. Rewrite the Lone Username
- sendmail, 17.1.1.3. Handle null address
- sendmail, 28.6.3. Rewrite-and-Return Prefix: $@
- sendmail, 30.5.2.1. The $@ dsn part
- sendmail, 33.4.2. Specify Numbered Substitution with $@
- $[ and $]
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 21.2.4. The $[ and $] Operators
- sendmail, 28.6.6. Canonicalize Hostname: $[ and $]
- sendmail, 33.4.3. $[ and $]: A Special Case
- $:
- sendmail, 9.2.3. The User ($:)
- sendmail, 9.3. Testing Rule Set 0
- sendmail, 28.6.2. Rewrite Once Prefix: $:
- sendmail, 29.6.1. Further Processing: $:user
- sendmail, 30.5.3. The $: Part
- sendmail, 33.4.1. Specify a Default with $:
- sendmail, 33.4. Use Maps with $( and $) in Rules
- $.
- sendmail, 14.1.3. Testing So Far
- sendmail, 31.6. Macro Conditionals: $?, $|, and $.
- $=
- sendmail, 12.1. The Class Command
- sendmail, 32.2.1. Matching Any in a Class: $=
- sendmail, 38.3.2. Dump a Class Macro with $=
- $#
- sendmail, 9.2.1. The Delivery Agent ($#)
- sendmail, 28.6.5. Specify a Delivery Agent: $#
- $-
: sendmail, 11.4.1. Rewrite the Lone Username
- $( and $)
: sendmail, 33.4. Use Maps with $( and $) in Rules
- $+
: sendmail, 8.7. Wildcard Operators
- $?
- sendmail, 14.1.3. Testing So Far
- sendmail, 31.6. Macro Conditionals: $?, $|, and $.
- $~
: sendmail, 32.2.2. Matching Any Not in a Class: $~
- $|
: sendmail, 31.6. Macro Conditionals: $?, $|, and $.
- $_ macro
- sendmail, 20.2.4. Verify identd Information
- sendmail, 23.9. The qf File Internals
- sendmail, 26.1.3.9. relay= the host that sent or accepted the message
- sendmail, 31.10. Alphabetized Reference
- DOL macro (m4)
: sendmail, 19.6. Alphabetized m4 Macros
- DOMAIN()
: sendmail, 19.3.3. DOMAIN()
- DOMAIN macro (in sendmail)
: TCP/IP Network Administration, E.3. m4 sendmail Macros
- Domain Name Pointer records
: (see PTR resource records)
- Domain Name Service
: (see DNS)
- domain names
- Practical UNIX & Internet Security, 16.2.3. Hostnames
- sendmail, 8.1. A Fictional Network
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 31.10. Alphabetized Reference
- TCP/IP Network Administration, 3.3.3. Domain Names
- TCP/IP Network Administration, 4. Getting Started
- application form
: TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
- fully qualified
: TCP/IP Network Administration, 3.3.3. Domain Names
- in NIS
: TCP/IP Network Administration, 9.3. Network Information Service
- obtaining
: TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
- parameter
: TCP/IP Network Administration, 9.4. A BOOTP Server
- DOMAIN source file (in sendmail)
- TCP/IP Network Administration, E.3.2. FEATURE
- TCP/IP Network Administration, E.3.4. DOMAIN
- mail relay defines, listed
: TCP/IP Network Administration, E.3.4. DOMAIN
- domain-type addresses
: sendmail, 17.1.3. Internet Addresses
- domain/named.root
: TCP/IP Network Administration, 11.6.3. Cache corruption
- domainname command
- Practical UNIX & Internet Security, 19.4.3. NIS Domains
- TCP/IP Network Administration, 9.3. Network Information Service
- domains
- Practical UNIX & Internet Security, 19.4.3. NIS Domains
- TCP/IP Network Administration, 1.7. Application Layer
- accepting only internal mail
: sendmail, 20.2.1. Accept Mail Only From Our Domain
- adding to recipient address
: sendmail, 30.8. Alphabetized F= Flags
- administration
- TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
- TCP/IP Network Administration, 8.1. BIND: UNIX Name Service
- contacting
: TCP/IP Network Administration, 13.6. The White Pages
- allocating
: (see Network Information Center)
- always_add_domain feature
: sendmail, 19.6. Alphabetized m4 Macros
- creating
: TCP/IP Network Administration, 3.3.2. Creating Domains and Subdomains
- downloading an entire
: TCP/IP Network Administration, 8.4. Using nslookup
- entry, in resolv.conf
: TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
- FQDN
: (see FQDNs)
- hierarchy
- TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
- TCP/IP Network Administration, 8.1. BIND: UNIX Name Service
- list of local
: sendmail, 32.5. Alphabetized Reference
- masquerading
: sendmail, 19.6. Alphabetized m4 Macros
- name servers
: TCP/IP Network Administration, 4.2.1.1. Assigning host addresses
- parameter
: TCP/IP Network Administration, 9.4. A BOOTP Server
- organizational
: TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
- part of hostname
: (see $m macro)
- virtual, mapping to addresses
: sendmail, 19.6. Alphabetized m4 Macros
- domaintable database
- TCP/IP Network Administration, 10.7.1. Modifying Local Information
- sendmail, 19.6. Alphabetized m4 Macros
- DontExpandCNames option
: sendmail, 34.8. Alphabetized Reference
- DontInitGroups option
: sendmail, 34.8. Alphabetized Reference
- DontPruneRoutes command
: sendmail, 34.8. Alphabetized Reference
- dormant accounts
- Practical UNIX & Internet Security, 8.4. Managing Dormant Accounts
- Practical UNIX & Internet Security, 8.4.3. Finding Dormant Accounts
- dot (.)
- . line (qf file)
: sendmail, 23.9. The qf File Internals
- checking for in ${pd}
: sendmail, D.1. Sun Enhancements
- for current directory
: Practical UNIX & Internet Security, 5.1.1. Directories
- to end messages
- sendmail, 4.2. Verbose (-v)
- sendmail, 30.8. Alphabetized F= Flags
- filenames starting with, disabling creation of
: Building Internet Firewalls, 8.2.1.6. Be careful of writable
- host status file line
: sendmail, B.1. Status file lines
- leading in messages
: sendmail, 34.8. Alphabetized Reference
- trailing in FQDNs
- sendmail, 15.3. MX Records
- sendmail, 17.4. Rule Set 4
- sendmail, 29.5.1. Stripping Trailing Dots
- .. directory
: Practical UNIX & Internet Security, 5.1.1. Directories
- .. for domain name
: TCP/IP Network Administration, C.3.1. Standard Resource Records
- dotted decimal notation
: TCP/IP Network Administration, 2.3. Subnets
- Double DES
: Practical UNIX & Internet Security, 6.4.5. Improving the Security of DES
- double quotation marks (")
- sendmail, 13.2.8. The Unquoted Space Replacement Character
- sendmail, 31.3.2. Syntax of the Configuration File Macro's Text
- double-reverse lookups
- Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
- Building Internet Firewalls, 8.10.4.2. Mismatched data between the hostname
- Building Internet Firewalls, 8.10.5.1. Set up a `fake'
- DoubleBounceAddress option
: sendmail, 34.8. Alphabetized Reference
- DOW USA
: Practical UNIX & Internet Security, F.3.4.10. DOW USADOW USA
- down sites
: sendmail, 23.7.1. Handling a Down Site
- downloading files
: Practical UNIX & Internet Security, 12.3.4. Protecting Local Storage
- logging
- Practical UNIX & Internet Security, 10.3.3. xferlog Log File
- Practical UNIX & Internet Security, 10.3.5. access_log Log File
- downtime
: Practical UNIX & Internet Security, 12.2.6.4. Minimizing downtime
- due to criminal investigations
: Practical UNIX & Internet Security, 26.2.4. Hazards of Criminal Prosecution
- logging
: Practical UNIX & Internet Security, 10.7.2.1. Exception and activity reports
- drand48 function
: Practical UNIX & Internet Security, 23.7.3. drand48 ( ), lrand48 ( ), and mrand48 ( )
- Drawbridge package
: Building Internet Firewalls, B.3.2. Drawbridge
- drills, security
: Practical UNIX & Internet Security, 24.1.3. Rule #3: PLAN AHEAD
- drink
: Practical UNIX & Internet Security, 12.2.2.1. Food and drink
- ds.internic.net
: TCP/IP Network Administration, 13.4. Retrieving RFCs
- DSA (Digital Signature Algorithm)
- Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
- Practical UNIX & Internet Security, 6.5.3. Digital Signatures
- DSN (Delivery Status Notification)
- sendmail, 6.3. The local Delivery Agent
- sendmail, B.1. Status file lines
- DSN macro
: sendmail, 18.8. Alphabetized Reference
- ENVID identifier
- sendmail, 23.9. The qf File Internals
- sendmail, 36.7. Alphabetized Reference
- ORCPT address
: sendmail, 23.9. The qf File Internals
- original envelope ID
: sendmail, 31.10. Alphabetized Reference
- types for
: (see T= equate)
- DTE (data terminal equipment)
: Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- du command
: Practical UNIX & Internet Security, 25.2.2.1. Disk-full attacks
- dual-homed hosts
- Building Internet Firewalls, 7. Proxy Systems
- (see also proxy servers/services)
- architecture of
: Building Internet Firewalls, 4.2.1. Dual-Homed Host Architecture
- with screen subnet architecture
: Building Internet Firewalls, 4.3.8. It's OK to Use
- as firewall
: Building Internet Firewalls, 5.8.2.5. Turning off routing
- nonrouting
: Building Internet Firewalls, 5.2.1. Nonrouting Dual-homed Hosts
- proxy services and
: (see proxy servers/services)
- dual universes
: Practical UNIX & Internet Security, 5.9.1. Dual Universes
- ducts, air
: Practical UNIX & Internet Security, 12.2.3.2. Entrance through air ducts
- dummy interface
: TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- dump
: TCP/IP Network Administration, 7.7.2. Testing the Configuration
- dump/restore program
- Practical UNIX & Internet Security, 7.1.3. Types of Backups
- Practical UNIX & Internet Security, 7.4.3. Specialized Backup Programs
- Practical UNIX & Internet Security, 7.4.4. Encrypting Your Backups
- dumping macros
: sendmail, 38.3. Dump a Macro
- dumping state
: sendmail, 26.3.3. SIGUSR1 Dump States
- dumpster diving
: Practical UNIX & Internet Security, 12.3.3. Other Media
- duplicate database keys
: sendmail, 33.2.1.1. -d allow duplicate keys
- duplicate entries in alias file
: sendmail, 24.4.4. Duplicate Entries and Automation
- duress code
: Practical UNIX & Internet Security, 8.7.2. Token Cards
- dust
: Practical UNIX & Internet Security, 12.2.1.3. Dust
- dynamic
- assignment of addresses
- TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
- TCP/IP Network Administration, 4.2.1.1. Assigning host addresses
- automatic under DHCP
: TCP/IP Network Administration, 9.5. DHCP
- circumstances favoring
: TCP/IP Network Administration, 4.3. Planning Routing
- packet filtering
- Building Internet Firewalls, 6.3.3.2. UDP
- Building Internet Firewalls, 8.2.1.1. Packet filtering characteristics of
- port allocation
: TCP/IP Network Administration, 2.7.3. Sockets
- routing
- TCP/IP Network Administration, 4.3. Planning Routing
- TCP/IP Network Administration, 7.1. Common Routing Configurations
- Dynamic DNS
: TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
- Dynamic Host Configuration Protocol
: (see DHCP)
- dynamic-bootp flag
: TCP/IP Network Administration, D.3.2. Configuration Parameters
- dynamic-bootp-lease-cutoff parameter
: TCP/IP Network Administration, 9.5.1. dhcpd.conf
- dynamic-bootp-lease-length parameter
: TCP/IP Network Administration, 9.5.1. dhcpd.conf
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
O'Reilly & Associates, Inc.
All Rights Reserved.
|