Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: D
- configuration command
- flag : sendmail, 30.8. Alphabetized F= Flags
- flag
- line (host status file) : sendmail, B.1. Status file lines
- line (qf file) : sendmail, 23.9. The qf File Internals
- $d macro : sendmail, 31.10. Alphabetized Reference
- option : (see DeliveryMode (d) option)
- option : (see AutoRebuildAliases (D) option)
- rule-testing command : sendmail, 38.2.1. Define a Macro with .D
- -d switch (makemap) : sendmail, 33.2.1.1. -d allow duplicate keys
- -d switch (sendmail)
-
- sendmail, 4.3. Debugging (-d)
- sendmail, 36.7. Alphabetized Reference
- sendmail, 37.1. The Syntax of -d
- complete list of switches : sendmail, 37.5. Reference in Numerical Order
- -d0.1 switch
- -d0.15 switch
- -d0.4 switch
- -d21.12 switch
- -d35.9 switch
- -d37.1 switch
- with rule testing : sendmail, 38.7. Add Debugging for Detail
- D= equate : sendmail, 30.4. The Equates
- DAC (Discretionary Access Controls) : Practical UNIX & Internet Security, 4.1.3. Groups and Group Identifiers (GIDs)
- daemon
-
- TCP/IP Network Administration, 3.2. The Host Table
- TCP/IP Network Administration, 5.4. The Internet Daemon
- options for : sendmail, 34.8. Alphabetized Reference
- preventing from running : sendmail, 15.5. Prevent the Daemon from Running
- privacy of : sendmail, 34.8. Alphabetized Reference
- signals : sendmail, 26.3. Signaling the Daemon
- tools for : Building Internet Firewalls, B.5. Daemons
- user
- daemon mode
- DaemonPortOptions (O) option : sendmail, 34.8. Alphabetized Reference
- damage, liability for : Practical UNIX & Internet Security, 26.4.6. Liability for Damage
- "dangerous write permissions" warning : sendmail, 22.5.1. Dangerous Write Permissions
- dash (hyphen)
-
- in machine conversation : sendmail, 4.2. Verbose (-v)
- non-equivalent host : TCP/IP Network Administration, 12.2.5. Secure the r Commands
- DAT (Digital Audio Tape) : Practical UNIX & Internet Security, 7.1.4. Guarding Against Media Failure
- data : Building Internet Firewalls, 1.1.1. Your Data
-
- assigning owners to : Practical UNIX & Internet Security, 2.4.4.1. Assign an owner
- availability of : Practical UNIX & Internet Security, 2.1. Planning Your Security Needs
- communication equipment (DCE) : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- communications model : TCP/IP Network Administration, 1.2. A Data Communications Model
- communications protocols : (see TCP/IP services)
- compression, not provided in SLIP : TCP/IP Network Administration, 6.2.1. The Serial Protocols
- confidential
- disclosure of : Practical UNIX & Internet Security, 11.2. Damage
- DNS
- espionage
- giving away with NIS : Practical UNIX & Internet Security, 19.4.5. Unintended Disclosure of Site Information with NIS
- identifying assets : Practical UNIX & Internet Security, 2.2.1.1. Identifying assets
- protecting from sniffers : Building Internet Firewalls, 10.1.2. Packet Sniffing
- spoofing : Practical UNIX & Internet Security, 16.3. IP Security
- terminal equipment (DTE) : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- theft of : (see information, theft and espionage)
- transferring
-
- Building Internet Firewalls, 6. Packet Filtering
- (see email; files, transferring)
- allowing/disallowing : Building Internet Firewalls, 6.1. Why Packet Filtering?
- via TCP : Building Internet Firewalls, 6.3.3.1. TCP
- user-specified, and proxying : Building Internet Firewalls, 7.4.4. User-Specified Data
- Data Carrier Detect (DCD) : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- DATA command, in SMTP : TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
- Data Defense Network (DDN) : Practical UNIX & Internet Security, F.3.4.20. MILNET
- Data Encryption Standard : (see DES)
- DATA keyword : sendmail, 4.2. Verbose (-v)
- Data Link Layer
- Data Set Ready (DSR) : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- Data Terminal Ready (DTR)
- data terminology : TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
- data-driven attacks : Building Internet Firewalls, 8.1. Electronic Mail
- database files : Practical UNIX & Internet Security, 1.2. What Is an Operating System?
- database macros : sendmail, 33. Database Macros
- databases : (see networks and networking, databases, network)
-
- classes for : sendmail, 33.8. Alphabetized Reference
- external (keyed)
- K command types : sendmail, 33.3.2. The class
- library support : sendmail, 18.4.1. DBMDEF=
- m4 and : sendmail, 33.6. Database Maps and m4
- /map rule-testing command : sendmail, 38.5.3. Look up a Database Item with /map
- sendmail : TCP/IP Network Administration, 10.6.2.1. Transforming with a database
- User Database
- datagrams
-
- Building Internet Firewalls, C.5.1.1. The datagram
- TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
- TCP/IP Network Administration, 1.5.1.1. The datagram
- TCP/IP Network Administration, 1.7. Application Layer
- (see also IP datagrams)
- (see also User Datagram Protocol)
- connectionless delivery of : TCP/IP Network Administration, 1.6. Transport Layer
- converting source address of : TCP/IP Network Administration, 4.2.1. Obtaining an IP Address
- forwarding : TCP/IP Network Administration, 5.3.1.1. Options
- fragmented
- headers
- marking end of : TCP/IP Network Administration, 6.2.1. The Serial Protocols
- routing : TCP/IP Network Administration, 1.5.1.2. Routing datagrams
- silently discarding : TCP/IP Network Administration, 11.8. Protocol Case Study
- date : (see time and date)
- date command
- "Date:" header line
- day-zero backups : Practical UNIX & Internet Security, 7.1.3. Types of Backups
- db library package
- dbm database : sendmail, 33.8. Alphabetized Reference
- dbx debugger : Practical UNIX & Internet Security, C.4. The kill Command
- DCC (Direct Client Connections) : Building Internet Firewalls, 8.9.2. Internet Relay Chat
- DCD (Data Carrier Detect) modem control line : TCP/IP Network Administration, A.2. The PPP Daemon
- DCE (data communication equipment) : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- DCE (Distributed Computing Environment)
-
- Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
- Practical UNIX & Internet Security, 8.7.3. Code Books
- Practical UNIX & Internet Security, 16.2.6.2. Other naming services
- Practical UNIX & Internet Security, 19.2. Sun's Remote Procedure Call (RPC)
- Practical UNIX & Internet Security, 19.7.1. DCE
- dd command
- DDN (Data Defense Network)
- deadlock : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- debug command
- debug_dumpstate rule set : sendmail, 26.3.3.3. -- ruleset debug_dumpstate returns stat ..., pv: --
- debugfs command : Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
- debugging
-
- Building Internet Firewalls, 6.1.2.1. Current filtering tools are not perfect
- sendmail, 4.3. Debugging (-d)
- sendmail, 6.3.3. Testing the New Delivery Agent Definitions
- sendmail, 37.2. Debugging Behavior
- TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
- TCP/IP Network Administration, C.1.1. Signal Processing
- (see also bugs)
- (see also -d switch (sendmail))
- (see also testing)
- (see also troubleshooting)
- operating system : Building Internet Firewalls, 5.8.1.2. Fix all known system bugs
- with rule testing : sendmail, 38.7. Add Debugging for Detail
- SMTPDEBUG macro
- debugging mode : sendmail, 36.7. Alphabetized Reference
- DEC (Digital Equipment Corporation) : Practical UNIX & Internet Security, F.3.4.9. DEC (Digital Equipment Corporation)
- decentralizing management : TCP/IP Network Administration, 2.3. Subnets
- declaring
-
- classes
- delivery agents : sendmail, 19.3.2. MAILER()
- macros
- sites for SITECONFIG : sendmail, 19.6. Alphabetized m4 Macros
- trusted users : (see configuration command)
- DECnet network
- DECNET-RELAY macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
- decode alias
- decryption
- dedicated connections
- dedicated proxy servers : Building Internet Firewalls, 7.3.2. Generic Versus Dedicated Proxies
- defamation : Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication, and Defamation
- default
-
- accounts : Practical UNIX & Internet Security, 8.1.2. Default Accounts
- canonicalization : sendmail, 28.6.6.2. Default in canonicalization: $:
- character set : sendmail, 30.4. The Equates
- content-type character set : sendmail, 34.8. Alphabetized Reference
- database key : sendmail, 33.4.1. Specify a Default with $:
- delivery agent : sendmail, 34.8. Alphabetized Reference
- delivery mode : sendmail, 13.2.3. The Default Delivery Mode
- deny : Practical UNIX & Internet Security, 21.1.1. Default Permit vs. Default Deny
- domain
- file permissions : sendmail, 13.2.4. The Default File Permissions
- gateway
- hostname : sendmail, 33.5.3. A :default Outgoing Hostname
- logging level : sendmail, 13.2.6. The Default Logging Level
- macro definitions : sendmail, 7.3. Predefined Macros
- mask : TCP/IP Network Administration, 2.2.2. Classless IP Addresses
- passwords : TCP/IP Network Administration, 12.2. User Authentication
- permit : Practical UNIX & Internet Security, 21.1.1. Default Permit vs. Default Deny
- route
- sender's address format : sendmail, 31.10. Alphabetized Reference
- User Database location : sendmail, 18.8. Alphabetized Reference
- user identity
- values : TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
- default deny stance
- default permit stance
- DefaultCharSet option : sendmail, 34.8. Alphabetized Reference
- defaultdomain file : TCP/IP Network Administration, 9.3. Network Information Service
- defaultroute option : TCP/IP Network Administration, 6.3.1. The PPP Daemon
- DefaultUser (u,g) option
- Defense Communications Agency (DCA) : TCP/IP Network Administration, 1.1. TCP/IP and the Internet
- Defense Data Network (DDN) : Building Internet Firewalls, C.10. Internet Routing Architecture
- defense in depth
- define() : sendmail, 20.3. Alphabetized V8.8 Subroutines
- define macro (in sendmail)
- define statements (m4)
- defining
- definition statements (in gated) : TCP/IP Network Administration, B.7. Definition Statements
- delay= equate (syslog output) : sendmail, 26.1.3.2. delay= total time to deliver
- delay, transaction : sendmail, 26.1.3.13. xdelay= transaction
- delays, inserting
- DELETE key : Practical UNIX & Internet Security, 3.4. Changing Your Password
- deleting
-
- destructive attack via : Practical UNIX & Internet Security, 25.1. Destructive Attacks
- files : Practical UNIX & Internet Security, 5.4. Using Directory Permissions
- header lines : sendmail, 20.3. Alphabetized V8.8 Subroutines
- delimiters
- "Delivered-To:" header line : sendmail, 35.10. Alphabetized Reference
- delivermail program : sendmail, History
- delivery
-
- sendmail, 19.6. Alphabetized m4 Macros
- (see also users)
- alias, forms of : sendmail, 24.2. Forms of Alias Delivery
- failure count : sendmail, 23.9. The qf File Internals
- via FAX machine : sendmail, 3.3.3. Other Protocols
- to files : (see appending to files)
- local
- looking up addresses with DNS : sendmail, 21.2.3. Look Up Addresses for Delivery
- to mailbox : sendmail, 3.2.1. Delivery to a Mailbox
- to multiple recipients : sendmail, 30.8. Alphabetized F= Flags
- path of : (see "Received:" header line)
- precedence : (see priority, message)
- to programs
- relays : (see relays)
- single threaded : sendmail, 34.8. Alphabetized Reference
- total time for : sendmail, 26.1.3.2. delay= total time to deliver
- delivery agents (MTAs)
-
- Building Internet Firewalls, 8.1. Electronic Mail
- sendmail, 1.1. MUA Versus MTA
- sendmail, 5.3.1. Mail Delivery Agents
- sendmail, 6.2. Define a Mail Delivery Agent
- sendmail, 30. Delivery Agents
- (see also configuration command)
- $# operator and
- advantages to sendmail : sendmail, 18.1. To Use or Not to Use
- choosing
- declaring : sendmail, 19.3.2. MAILER()
- default : sendmail, 34.8. Alphabetized Reference
- equates for : sendmail, 30.4. The Equates
- for errors : sendmail, 9.4. The error Delivery Agent
- expensive
- flags
- ignoring MX records : sendmail, 21.3.5. What? They Ignore MX Records?
- local
- logging : sendmail, 26.1.3.4. mailer= the delivery agent used
- printing list of : sendmail, 38.4.2. Show Delivery Agents with =M
- as recipients : sendmail, 30.8. Alphabetized F= Flags
- scripts via : sendmail, 24.3. Write a Delivery Agent Script
- statistics : (see statistics)
- symbolic name : sendmail, 30.2. The Symbolic Name
- testing : sendmail, 38.5.6. Try a Delivery Agent with /try
- UUCP : sendmail, 19.4.6. UUCP
- delivery mode : sendmail, 13.2.3. The Default Delivery Mode
- delivery program : sendmail, 25.7.5.1. The deliver program
- Delivery Status Notification : (see DSN)
- DeliveryMode (d) option
- Demilitarized Zone (DMZ) : Building Internet Firewalls, 4.1. Some Firewall Definitions
- demo accounts : Practical UNIX & Internet Security, 8.1.2. Default Accounts
- demultiplexing : TCP/IP Network Administration, 2.7. Protocols, Ports, and Sockets
- denial of service
-
- Building Internet Firewalls, 1.2.1.2. Denial of Service
- Practical UNIX & Internet Security, 1.5. Role of this tutorial
- Practical UNIX & Internet Security, 17.1.3. The /etc/inetd Program
- Practical UNIX & Internet Security, 17.3.21.5. Denial of service attacks under X
- Practical UNIX & Internet Security, 25. Denial of Service Attacks and Solutions
- Practical UNIX & Internet Security, 25.3. Network Denial of Service Attacks
- Practical UNIX & Internet Security, 25.3.4. Clogging
- TCP/IP Network Administration, 12.1.1. Assessing the Threat
- accidental
- automatic lockout : Practical UNIX & Internet Security, 3.3. Entering Your Password
- checklist for : Practical UNIX & Internet Security, A.1.1.24. Chapter 25: Denial of Service Attacks and Solutions
- destructive attacks : Practical UNIX & Internet Security, 25.1. Destructive Attacks
- disk attacks
- inodes : Practical UNIX & Internet Security, 25.2.2.3. Inode problems
- internal inetd services : Practical UNIX & Internet Security, 17.1.3. The /etc/inetd Program
- on networks
- overload attacks
- via syslog : Practical UNIX & Internet Security, 10.5.1. The syslog.conf Configuration File
- system overload attacks : Practical UNIX & Internet Security, 25.2.1.2. System overload attacks
- X Window System : Practical UNIX & Internet Security, 17.3.21.5. Denial of service attacks under X
- departure of employees : Practical UNIX & Internet Security, 13.2.6. Departure
- depository directories, FTP : Practical UNIX & Internet Security, 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP
- dequote database
- DES (Data Encryption Standard)
-
- Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
- Practical UNIX & Internet Security, 6.4.4. DES
- Practical UNIX & Internet Security, 6.4.5.2. Triple DES
- Practical UNIX & Internet Security, 6.6.2. des: The Data Encryption Standard
- Practical UNIX & Internet Security, 7.4.4. Encrypting Your Backups
- Practical UNIX & Internet Security, 8.6.1. The crypt()
- (see also authentication)
- authentication (NIS+) : Practical UNIX & Internet Security, 19.5.4. Using NIS+
- improving security of
- designated router : TCP/IP Network Administration, 7.4.3. Open Shortest Path First
- designing firewalls : Building Internet Firewalls, 1.4.3. Buying Versus Building
- destination
- Destination Address
- Destination Port number
- destination unreachable codes : (see ICMP)
- Destination Unreachable Message : TCP/IP Network Administration, 1.5.2. Internet Control Message Protocol
- destroying media : Practical UNIX & Internet Security, 12.3.2.3. Sanitize your media before disposal
- destructive attacks : Practical UNIX & Internet Security, 25.1. Destructive Attacks
- detached signatures : Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
- detail data, DSN delivery : sendmail, 30.5.2.1. The $@ dsn part
- detectors
-
- cable tampering : Practical UNIX & Internet Security, 12.3.1.1. Wiretapping
- carbon-monoxide : Practical UNIX & Internet Security, 12.2.1.2. Smoke
- humidity : Practical UNIX & Internet Security, 12.2.1.11. Humidity
- logging alarm systems : Practical UNIX & Internet Security, 10.7.1.1. Exception and activity reports
- smoke : Practical UNIX & Internet Security, 12.2.1.2. Smoke
- temperature alarms : Practical UNIX & Internet Security, 12.2.1.6. Temperature extremes
- water sensors : Practical UNIX & Internet Security, 12.2.1.12. Water
- Deutsches Forschungsnetz : Practical UNIX & Internet Security, F.3.4.14. Germany: DFN-WiNet Internet sites
- /dev directory
-
- Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer
- TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
- /dev/audio device : Practical UNIX & Internet Security, 23.8. Picking a Random Seed
- /dev/console device : Practical UNIX & Internet Security, 5.6. Device Files
- /dev/kmem device
- /dev/null device
- /dev/random device : Practical UNIX & Internet Security, 23.7.4. Other random number generators
- /dev/swap device : Practical UNIX & Internet Security, 5.5.1. SUID, SGID, and Sticky Bits
- /dev/urandom device : Practical UNIX & Internet Security, 23.7.4. Other random number generators
- device statement : TCP/IP Network Administration, 5.3.1.3. Devices
- devices : Practical UNIX & Internet Security, 5.6. Device Files
-
- managing with SNMP : Practical UNIX & Internet Security, 17.3.15. Simple Network Management Protocol (SNMP) (UDP Ports
- modem control : Practical UNIX & Internet Security, 14.5.2. Setting Up the UNIX Device
- numbers for : sendmail, 23.9. The qf File Internals
- Devices file : Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer
- df -i command : Practical UNIX & Internet Security, 25.2.2.3. Inode problems
- df files
- dfstab file
- dgram sockets : TCP/IP Network Administration, 5.4. The Internet Daemon
- DHCP (Dynamic Host Configuration Protocol)
-
- TCP/IP Network Administration, Preface
- TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
- interoperability and : TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
- backwards-compatible : TCP/IP Network Administration, 9.5. DHCP
- based on Bootstrap Protocol (BOOTP) : TCP/IP Network Administration, 9.4.2. BOOTP extensions
- benefits of : TCP/IP Network Administration, 9.5. DHCP
- daemon (dhcpd) : TCP/IP Network Administration, 9.5.1. dhcpd.conf
-
- command : TCP/IP Network Administration, D.2. The dhcpd Command
- compiling : TCP/IP Network Administration, D.1. Compiling dhcpd
- configuring : TCP/IP Network Administration, D.3. The dhcpd.conf Configuration File
- tools reference : TCP/IP Network Administration, D. A dhcpd Reference
- using latest versions of : TCP/IP Network Administration, D. A dhcpd Reference
- dhcpd.conf file : TCP/IP Network Administration, 9.5.1. dhcpd.conf
- dhcpd.pid file : TCP/IP Network Administration, D.2. The dhcpd Command
- options available with : TCP/IP Network Administration, D.3.3. DHCP Options
- diagnostic tools : TCP/IP Network Administration, 11.2. Diagnostic Tools
- diagramming the system : Building Internet Firewalls, 13.5.2. Labeling and Diagraming Your System
- dial-up connections : TCP/IP Network Administration, 6.3.1. The PPP Daemon
- dial-up IP (dip)
-
- TCP/IP Network Administration, 6.3.2. Dial-Up PPP
- TCP/IP Network Administration, 6.4.2. Dial-Up IP
- script file : TCP/IP Network Administration, A.1.1. The dip Script File
-
- for SLIP : TCP/IP Network Administration, 6.4.2. Dial-Up IP
- sample : TCP/IP Network Administration, A.1.1.1. A sample dip script
- special variables, listed : TCP/IP Network Administration, A.1.1. The dip Script File
- tools reference : TCP/IP Network Administration, A.1. Dial-Up IP
- dial-up PPP : TCP/IP Network Administration, 6.3.2. Dial-Up PPP
- DialDelay option : sendmail, 34.8. Alphabetized Reference
- dictionary attacks
- Diffie-Hellman key exchange system
-
- Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
- Practical UNIX & Internet Security, 18.6. Dependence on Third Parties
- Practical UNIX & Internet Security, 19.3. Secure RPC (AUTH_DES)
- breaking key : Practical UNIX & Internet Security, 19.3.4. Limitations of Secure RPC
- exponential key exchange : Practical UNIX & Internet Security, 19.3.1. Secure RPC Authentication
- dig
- digest multipart subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- Digital Audio Tape (DAT) : Practical UNIX & Internet Security, 7.1.4. Guarding Against Media Failure
- digital computers : Practical UNIX & Internet Security, 6.1.2. Cryptography and Digital Computers
- Digital Equipment Corporation (DEC) : Practical UNIX & Internet Security, F.3.4.9. DEC (Digital Equipment Corporation)
- Digital Signature Algorithm : (see DSA)
- digital signatures
-
- Practical UNIX & Internet Security, 6.4. Common Cryptographic Algorithms
- Practical UNIX & Internet Security, 6.5. Message Digests and Digital Signatures
- Practical UNIX & Internet Security, 6.5.5.2. Message authentication codes
- Practical UNIX & Internet Security, 9.2.3. Checksums and Signatures
- TCP/IP Network Administration, 12.6. Encryption
- checksums
-
- Building Internet Firewalls, 5.8.5.3. About checksums for auditing
- Practical UNIX & Internet Security, 6.5.5.1. Checksums
- Practical UNIX & Internet Security, 9.2.3. Checksums and Signatures
- TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
- TCP/IP Network Administration, 11.8. Protocol Case Study
- keeping secure : Building Internet Firewalls, 13.5.3. Keeping Secured Checksums
- recalculating
- using Tripwire for : Building Internet Firewalls, 5.8.5.1. Auditing packages
- detached signatures : Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
- with PGP : Practical UNIX & Internet Security, 6.6.3.4. Adding a digital signature to an announcement
- Digital UNIX
- Dijkstra Shortest Path First (SPF) algorithm : TCP/IP Network Administration, 7.4.3. Open Shortest Path First
- dip (dial-up IP)
- diphosts file : TCP/IP Network Administration, 6.4.3. SLIP Server Configuration
- diplogin command : TCP/IP Network Administration, 6.4.3. SLIP Server Configuration
- Direct Client Connections (DCC) : Building Internet Firewalls, 8.9.2. Internet Relay Chat
- direct delivery : TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
- directive statements (in gated) : TCP/IP Network Administration, B.3. Directive Statements
- directives, Makefile : sendmail, 18.4. Tuning Makefile
- directories
-
- Practical UNIX & Internet Security, 5.1.1. Directories
- Practical UNIX & Internet Security, 5.1.3. Current Directory and Paths
- ancestor : Practical UNIX & Internet Security, 9.2.2.2. Ancestor directories
- backing up by : Practical UNIX & Internet Security, 7.1.3. Types of Backups
- CDFs (context-dependent files) : Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories
- cf : sendmail, 16.1. The cf/cf Directory
- checklist for : Practical UNIX & Internet Security, A.1.1.4. Chapter 5: The UNIX Filesystem
- dot, dot-dot, and / : Practical UNIX & Internet Security, 5.1.1. Directories
- FTP depositories : Practical UNIX & Internet Security, 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP
- immutable : Practical UNIX & Internet Security, 9.1.1. Immutable and Append-Only Files
- listing automatically (Web) : Practical UNIX & Internet Security, 18.2.2.2. Additional configuration issues
- mounted
- nested : Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
- NFS : (see NFS)
- permissions : Practical UNIX & Internet Security, 5.4. Using Directory Permissions
- queue : (see queue directory)
- read-only : Practical UNIX & Internet Security, 9.1.2. Read-only Filesystems
- recipient's home : sendmail, 31.10. Alphabetized Reference
- requirement for mounting : TCP/IP Network Administration, 9.1.3. Mounting Remote Filesystems
- restricted
- root : (see root directory)
- for safe file writes : sendmail, 34.8. Alphabetized Reference
- SGI and sticky bits on : Practical UNIX & Internet Security, 5.5.6. SGID and Sticky Bits on Directories
- Web server structure of
- world-writable : Practical UNIX & Internet Security, 11.6.1.1. World-writable user files and directories
- directory statement : TCP/IP Network Administration, 8.3.1.2. Primary and secondary server configurations
- <Directory> blocks
- disabling Internet services : Building Internet Firewalls, 5.8.2. Disabling Nonrequired Services
- disabling routing : (see routers and routing, disabling)
- disasters and disaster recovery
-
- Practical UNIX & Internet Security, 12.2.6.4. Minimizing downtime
- sendmail, 21.5. Prepare for Disaster
- TCP/IP Network Administration, 11.10. Summary
- TCP/IP Network Administration, 12.1.1. Assessing the Threat
- TCP/IP Network Administration, 12.1.3. Writing a Security Policy
- TCP/IP Network Administration, 12.8. Words to the Wise
- disclosure of information, threat of : TCP/IP Network Administration, 12.1.1. Assessing the Threat
- disconnecting after incident : Building Internet Firewalls, 13.1.2. Disconnect or Shut Down, as
- disconnecting machine : Building Internet Firewalls, 13.4.3. Planning for Disconnecting or
- disk attacks
- disk quotas : Practical UNIX & Internet Security, 25.2.2.5. Using quotas
- disk space : (see memory; resources)
- diskettes : (see backups; media)
- disks, needs for : Building Internet Firewalls, 5.3.3. What Hardware Configuration?
- dismissed employees : Practical UNIX & Internet Security, 13.2.6. Departure
- dismounting directories, by booting : TCP/IP Network Administration, 9.1.3.1. The mount command
- disposing of materials : Practical UNIX & Internet Security, 12.3.3. Other Media
- Distfile : TCP/IP Network Administration, 9.6.1. rdist
- distributed
-
- architecture : TCP/IP Network Administration, 7.5.1. Exterior Gateway Protocol
- control : TCP/IP Network Administration, 12.1.2. Distributed Control
- servers, managing : TCP/IP Network Administration, 9.6. Managing Distributed Servers
- Distributed Computing Environment : (see DCE)
- Distributed File System (DFS) : TCP/IP Network Administration, 3.7.1. File Sharing
- distributing public keys : TCP/IP Network Administration, 12.6. Encryption
- diversity of defense systems : Building Internet Firewalls, 3.7. Diversity of Defense
- divert command (m4)
- dividing problem into manageable pieces : TCP/IP Network Administration, 11.1.1. Troubleshooting Hints
- DMBDEF variable : TCP/IP Network Administration, E.4.4. The sendmail K Command
- DMBDEF= directive : sendmail, 18.4.1. DBMDEF=
- dmesg command : TCP/IP Network Administration, 6.1.1. Determining the Interface Name
- DMZ (Demilitarized Zone) : Building Internet Firewalls, 4.1. Some Firewall Definitions
- dnl command (m4) : sendmail, 19.1.2. m4 and dnl
- DNS (Domain Name Service)
-
- Building Internet Firewalls, 2.9. Name Service
- Building Internet Firewalls, 5.6. Selecting Services Provided by the
- Practical UNIX & Internet Security, 16.2.6. Name Service
- Practical UNIX & Internet Security, 16.2.6.2. Other naming services
- Practical UNIX & Internet Security, 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
- Practical UNIX & Internet Security, 17.3.6.2. DNS nameserver attacks
- sendmail, 17.2.1. Is the Host Local?
- sendmail, 21.1. Overview
- TCP/IP Network Administration, 1.7. Application Layer
- TCP/IP Network Administration, 3.1. Names and Addresses
- TCP/IP Network Administration, 3.3. Domain Name Service
- (see also name service)
- benefits of
- bestmx_is_local feature : sendmail, 19.6. Alphabetized m4 Macros
- configuring : Building Internet Firewalls, 8.10. Domain Name System
-
- in screened host architecture : Building Internet Firewalls, 9.2.1.6. DNS
- in screened subnet architecture : Building Internet Firewalls, 9.1.1.6. DNS
- without hiding information : Building Internet Firewalls, 8.10.6. Setting up DNS Without Hiding
- data : Building Internet Firewalls, 8.10.3. DNS Data
- disasters : sendmail, 21.5. Prepare for Disaster
- eliminating support for : sendmail, 2.4.2. Eliminate DNS Support
- error numbers : sendmail, B.1. Status file lines
- fake server : Building Internet Firewalls, 8.10.5.1. Set up a `fake'
- hiding information with : Building Internet Firewalls, 8.10.5. Setting Up DNS to Hide
- MX records
-
- Building Internet Firewalls, 8.10.5.1. Set up a `fake'
- Practical UNIX & Internet Security, 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
- sendmail, 15.3. MX Records
- sendmail, 18.8. Alphabetized Reference
- sendmail, 21.3. Set Up MX Records
- sendmail, 34.8. Alphabetized Reference
- sendmail, 38.5.2. Look Up MX Records with /mx
- TCP/IP Network Administration, 8.3.2. Standard Resource Records
- TCP/IP Network Administration, 8.3.6. The named.hosts File
- TCP/IP Network Administration, 8.4. Using nslookup
- TCP/IP Network Administration, 10.7.1. Modifying Local Information
- TCP/IP Network Administration, C.3.1.4. Mail exchanger record
- 0 flag : sendmail, 30.8. Alphabetized F= Flags
- bestmx database class : sendmail, 33.8. Alphabetized Reference
- bestmx_is_local feature : sendmail, 19.6. Alphabetized m4 Macros
- fallback MX host : sendmail, 34.8. Alphabetized Reference
- ignored by delivery agents : sendmail, 21.3.5. What? They Ignore MX Records?
- looking up for addresses : sendmail, 21.2.3. Look Up Addresses for Delivery
- offsite hosts : sendmail, 21.5.1. Offsite MX Hosts
- with wildcards : sendmail, 21.3.4. Wildcard MX Records
- nameserver attacks : Practical UNIX & Internet Security, 17.3.6.2. DNS nameserver attacks
- omitting support : sendmail, 19.6. Alphabetized m4 Macros
- querying : TCP/IP Network Administration, 10.7.1. Modifying Local Information
- resource on : sendmail, Other Books, Other Problems
- revealing information to attackers : Building Internet Firewalls, 8.10.4.3. Revealing too much information to
- rogue servers : Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
- security and : Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
- server for internal hosts : Building Internet Firewalls, 8.10.5.2. Set up a real DNS
- starting : TCP/IP Network Administration, 5.4. The Internet Daemon
- tuning lookups : sendmail, 34.8. Alphabetized Reference
- zone transfers
- docs/warnings file : TCP/IP Network Administration, 12.4.3.1. COPS
- documentation
-
- Practical UNIX & Internet Security, 2.5. The Problem with Security Through Obscurity
- Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- historical, of problems : TCP/IP Network Administration, 11.1.1. Troubleshooting Hints
- incidents : Building Internet Firewalls, 13.1.7. Document the Incident
- plan for : Building Internet Firewalls, 13.4.7. Planning for Documentation
- sendmail
- system after incident
- using : TCP/IP Network Administration, 4.6. Informing the Users
- dollar sign ($)
-
- $ line (qf file) : sendmail, 23.9. The qf File Internals
- $ rule-testing command : sendmail, 38.3.1. Dump a Defined Macro with $
- in macro names : sendmail, 31.5. Macro Expansion: $ and $&
- wildcard operators
- $1, $2, ... : (see positional operators)
- $&
- $> : sendmail, 28.6.4. Rewrite Through Another Rule Set: $>set
- $* : sendmail, 10.2.1. The LHS
- $@
- $[ and $]
- $:
- $.
- $=
- $#
- $- : sendmail, 11.4.1. Rewrite the Lone Username
- $( and $) : sendmail, 33.4. Use Maps with $( and $) in Rules
- $+ : sendmail, 8.7. Wildcard Operators
- $?
- $~ : sendmail, 32.2.2. Matching Any Not in a Class: $~
- $| : sendmail, 31.6. Macro Conditionals: $?, $|, and $.
- $_ macro
- DOL macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
- DOMAIN() : sendmail, 19.3.3. DOMAIN()
- DOMAIN macro (in sendmail) : TCP/IP Network Administration, E.3. m4 sendmail Macros
- Domain Name Pointer records : (see PTR resource records)
- Domain Name Service : (see DNS)
- domain names
-
- Practical UNIX & Internet Security, 16.2.3. Hostnames
- sendmail, 8.1. A Fictional Network
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 31.10. Alphabetized Reference
- TCP/IP Network Administration, 3.3.3. Domain Names
- TCP/IP Network Administration, 4. Getting Started
- application form : TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
- fully qualified : TCP/IP Network Administration, 3.3.3. Domain Names
- in NIS : TCP/IP Network Administration, 9.3. Network Information Service
- obtaining : TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
- parameter : TCP/IP Network Administration, 9.4. A BOOTP Server
- DOMAIN source file (in sendmail)
- domain-type addresses : sendmail, 17.1.3. Internet Addresses
- domain/named.root : TCP/IP Network Administration, 11.6.3. Cache corruption
- domainname command
- domains
-
- Practical UNIX & Internet Security, 19.4.3. NIS Domains
- TCP/IP Network Administration, 1.7. Application Layer
- accepting only internal mail : sendmail, 20.2.1. Accept Mail Only From Our Domain
- adding to recipient address : sendmail, 30.8. Alphabetized F= Flags
- administration
- allocating : (see Network Information Center)
- always_add_domain feature : sendmail, 19.6. Alphabetized m4 Macros
- creating : TCP/IP Network Administration, 3.3.2. Creating Domains and Subdomains
- downloading an entire : TCP/IP Network Administration, 8.4. Using nslookup
- entry, in resolv.conf : TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
- FQDN : (see FQDNs)
- hierarchy
- list of local : sendmail, 32.5. Alphabetized Reference
- masquerading : sendmail, 19.6. Alphabetized m4 Macros
- name servers : TCP/IP Network Administration, 4.2.1.1. Assigning host addresses
- organizational : TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
- part of hostname : (see $m macro)
- virtual, mapping to addresses : sendmail, 19.6. Alphabetized m4 Macros
- domaintable database
- DontExpandCNames option : sendmail, 34.8. Alphabetized Reference
- DontInitGroups option : sendmail, 34.8. Alphabetized Reference
- DontPruneRoutes command : sendmail, 34.8. Alphabetized Reference
- dormant accounts
- dot (.)
-
- . line (qf file) : sendmail, 23.9. The qf File Internals
- checking for in ${pd} : sendmail, D.1. Sun Enhancements
- for current directory : Practical UNIX & Internet Security, 5.1.1. Directories
- to end messages
- filenames starting with, disabling creation of : Building Internet Firewalls, 8.2.1.6. Be careful of writable
- host status file line : sendmail, B.1. Status file lines
- leading in messages : sendmail, 34.8. Alphabetized Reference
- trailing in FQDNs
- .. directory : Practical UNIX & Internet Security, 5.1.1. Directories
- .. for domain name : TCP/IP Network Administration, C.3.1. Standard Resource Records
- dotted decimal notation : TCP/IP Network Administration, 2.3. Subnets
- Double DES : Practical UNIX & Internet Security, 6.4.5. Improving the Security of DES
- double quotation marks (")
- double-reverse lookups
- DoubleBounceAddress option : sendmail, 34.8. Alphabetized Reference
- DOW USA : Practical UNIX & Internet Security, F.3.4.10. DOW USADOW USA
- down sites : sendmail, 23.7.1. Handling a Down Site
- downloading files : Practical UNIX & Internet Security, 12.3.4. Protecting Local Storage
- downtime : Practical UNIX & Internet Security, 12.2.6.4. Minimizing downtime
-
- due to criminal investigations : Practical UNIX & Internet Security, 26.2.4. Hazards of Criminal Prosecution
- logging : Practical UNIX & Internet Security, 10.7.2.1. Exception and activity reports
- drand48 function : Practical UNIX & Internet Security, 23.7.3. drand48 ( ), lrand48 ( ), and mrand48 ( )
- Drawbridge package : Building Internet Firewalls, B.3.2. Drawbridge
- drills, security : Practical UNIX & Internet Security, 24.1.3. Rule #3: PLAN AHEAD
- drink : Practical UNIX & Internet Security, 12.2.2.1. Food and drink
- ds.internic.net : TCP/IP Network Administration, 13.4. Retrieving RFCs
- DSA (Digital Signature Algorithm)
- DSN (Delivery Status Notification)
-
- sendmail, 6.3. The local Delivery Agent
- sendmail, B.1. Status file lines
- DSN macro : sendmail, 18.8. Alphabetized Reference
- ENVID identifier
- ORCPT address : sendmail, 23.9. The qf File Internals
- original envelope ID : sendmail, 31.10. Alphabetized Reference
- types for : (see T= equate)
- DTE (data terminal equipment) : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- du command : Practical UNIX & Internet Security, 25.2.2.1. Disk-full attacks
- dual-homed hosts
-
- Building Internet Firewalls, 7. Proxy Systems
- (see also proxy servers/services)
- architecture of : Building Internet Firewalls, 4.2.1. Dual-Homed Host Architecture
-
- with screen subnet architecture : Building Internet Firewalls, 4.3.8. It's OK to Use
- as firewall : Building Internet Firewalls, 5.8.2.5. Turning off routing
- nonrouting : Building Internet Firewalls, 5.2.1. Nonrouting Dual-homed Hosts
- proxy services and : (see proxy servers/services)
- dual universes : Practical UNIX & Internet Security, 5.9.1. Dual Universes
- ducts, air : Practical UNIX & Internet Security, 12.2.3.2. Entrance through air ducts
- dummy interface : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- dump : TCP/IP Network Administration, 7.7.2. Testing the Configuration
- dump/restore program
- dumping macros : sendmail, 38.3. Dump a Macro
- dumping state : sendmail, 26.3.3. SIGUSR1 Dump States
- dumpster diving : Practical UNIX & Internet Security, 12.3.3. Other Media
- duplicate database keys : sendmail, 33.2.1.1. -d allow duplicate keys
- duplicate entries in alias file : sendmail, 24.4.4. Duplicate Entries and Automation
- duress code : Practical UNIX & Internet Security, 8.7.2. Token Cards
- dust : Practical UNIX & Internet Security, 12.2.1.3. Dust
- dynamic
-
- assignment of addresses
- packet filtering
- port allocation : TCP/IP Network Administration, 2.7.3. Sockets
- routing
- Dynamic DNS : TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
- Dynamic Host Configuration Protocol : (see DHCP)
- dynamic-bootp flag : TCP/IP Network Administration, D.3.2. Configuration Parameters
- dynamic-bootp-lease-cutoff parameter : TCP/IP Network Administration, 9.5.1. dhcpd.conf
- dynamic-bootp-lease-length parameter : TCP/IP Network Administration, 9.5.1. dhcpd.conf
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
[ Library Home | DNS & BIND | TCP/IP | sendmail | sendmail Reference | Firewalls | Practical Security ]