start page | rating of books | rating of authors | reviews | copyrights

Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: D

D configuration command
sendmail, 5.3.2. Macros
sendmail, 7.1. Overview
sendmail, 31.3. Configuration File Definitions
d flag : sendmail, 30.8. Alphabetized F= Flags
D flag
sendmail, 14.2.2. The Date: Header
sendmail, 30.8. Alphabetized F= Flags
D line (host status file) : sendmail, B.1. Status file lines
D line (qf file) : sendmail, 23.9. The qf File Internals
$d macro : sendmail, 31.10. Alphabetized Reference
d option : (see DeliveryMode (d) option)
D option : (see AutoRebuildAliases (D) option)
.D rule-testing command : sendmail, 38.2.1. Define a Macro with .D
-d switch (makemap) : sendmail, 33.2.1.1. -d allow duplicate keys
-d switch (sendmail)
sendmail, 4.3. Debugging (-d)
sendmail, 36.7. Alphabetized Reference
sendmail, 37.1. The Syntax of -d
complete list of switches : sendmail, 37.5. Reference in Numerical Order
-d0.1 switch
sendmail, 7.3.1. The hostname
sendmail, 11.6. Handling user@thishost
sendmail, 37.5. Reference in Numerical Order
-d0.15 switch
sendmail, 6.3.3. Testing the New Delivery Agent Definitions
sendmail, 37.5. Reference in Numerical Order
-d0.4 switch
sendmail, 31.7.1. Macros and the System Identity
sendmail, 37.5. Reference in Numerical Order
-d21.12 switch
sendmail, 10.5. Details of Rule Flow
sendmail, 37.5. Reference in Numerical Order
-d35.9 switch
sendmail, 7.3. Predefined Macros
sendmail, 37.5. Reference in Numerical Order
-d37.1 switch
sendmail, 13.3. Testing the Options
sendmail, 37.5. Reference in Numerical Order
with rule testing : sendmail, 38.7. Add Debugging for Detail
D= equate : sendmail, 30.4. The Equates
DAC (Discretionary Access Controls) : Practical UNIX & Internet Security, 4.1.3. Groups and Group Identifiers (GIDs)
daemon
TCP/IP Network Administration, 3.2. The Host Table
TCP/IP Network Administration, 5.4. The Internet Daemon
options for : sendmail, 34.8. Alphabetized Reference
preventing from running : sendmail, 15.5. Prevent the Daemon from Running
privacy of : sendmail, 34.8. Alphabetized Reference
signals : sendmail, 26.3. Signaling the Daemon
tools for : Building Internet Firewalls, B.5. Daemons
user
Practical UNIX & Internet Security, 4.1. Users and Groups
sendmail, 14.6. Trusted User
TCP/IP Network Administration, 5.4. The Internet Daemon
daemon mode
sendmail, 3.4. Role as a Daemon
sendmail, 4.1.1. Daemon Mode (-bd)
sendmail, 36.7. Alphabetized Reference
DaemonPortOptions (O) option : sendmail, 34.8. Alphabetized Reference
damage, liability for : Practical UNIX & Internet Security, 26.4.6. Liability for Damage
"dangerous write permissions" warning : sendmail, 22.5.1. Dangerous Write Permissions
dash (hyphen)
in machine conversation : sendmail, 4.2. Verbose (-v)
non-equivalent host : TCP/IP Network Administration, 12.2.5. Secure the r Commands
DAT (Digital Audio Tape) : Practical UNIX & Internet Security, 7.1.4. Guarding Against Media Failure
data : Building Internet Firewalls, 1.1.1. Your Data
assigning owners to : Practical UNIX & Internet Security, 2.4.4.1. Assign an owner
availability of : Practical UNIX & Internet Security, 2.1. Planning Your Security Needs
communication equipment (DCE) : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
communications model : TCP/IP Network Administration, 1.2. A Data Communications Model
communications protocols : (see TCP/IP services)
compression, not provided in SLIP : TCP/IP Network Administration, 6.2.1. The Serial Protocols
confidential
Practical UNIX & Internet Security, 2.1. Planning Your Security Needs
Practical UNIX & Internet Security, 2.5.2. Confidential Information
disclosure of : Practical UNIX & Internet Security, 11.2. Damage
DNS
Building Internet Firewalls, 8.10.3. DNS Data
Building Internet Firewalls, 8.10.4.2. Mismatched data between the hostname
espionage
Building Internet Firewalls, 1.2.2.4. Spies (Industrial and
Practical UNIX & Internet Security, 11.3. Authors
giving away with NIS : Practical UNIX & Internet Security, 19.4.5. Unintended Disclosure of Site Information with NIS
identifying assets : Practical UNIX & Internet Security, 2.2.1.1. Identifying assets
protecting from sniffers : Building Internet Firewalls, 10.1.2. Packet Sniffing
spoofing : Practical UNIX & Internet Security, 16.3. IP Security
terminal equipment (DTE) : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
theft of : (see information, theft and espionage)
transferring
Building Internet Firewalls, 6. Packet Filtering
(see email; files, transferring)
allowing/disallowing : Building Internet Firewalls, 6.1. Why Packet Filtering?
via TCP : Building Internet Firewalls, 6.3.3.1. TCP
user-specified, and proxying : Building Internet Firewalls, 7.4.4. User-Specified Data
Data Carrier Detect (DCD) : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
DATA command, in SMTP : TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
Data Defense Network (DDN) : Practical UNIX & Internet Security, F.3.4.20. MILNET
Data Encryption Standard : (see DES)
DATA keyword : sendmail, 4.2. Verbose (-v)
Data Link Layer
TCP/IP Network Administration, 1.2. A Data Communications Model
TCP/IP Network Administration, 5.3.1.2. Pseudo-device
TCP/IP Network Administration, 6.1.1. Determining the Interface Name
in PPP : TCP/IP Network Administration, 6.2.1. The Serial Protocols
Data Set Ready (DSR) : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
Data Terminal Ready (DTR)
Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
TCP/IP Network Administration, A.2. The PPP Daemon
data terminology : TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
data-driven attacks : Building Internet Firewalls, 8.1. Electronic Mail
database files : Practical UNIX & Internet Security, 1.2. What Is an Operating System?
database macros : sendmail, 33. Database Macros
databases : (see networks and networking, databases, network)
classes for : sendmail, 33.8. Alphabetized Reference
external (keyed)
sendmail, 5.3.11. Keyed Databases
sendmail, 20.3. Alphabetized V8.8 Subroutines
K command types : sendmail, 33.3.2. The class
library support : sendmail, 18.4.1. DBMDEF=
m4 and : sendmail, 33.6. Database Maps and m4
/map rule-testing command : sendmail, 38.5.3. Look up a Database Item with /map
sendmail : TCP/IP Network Administration, 10.6.2.1. Transforming with a database
User Database
sendmail, 33.5. The User Database
sendmail, 33.8. Alphabetized Reference
sendmail, 34.8. Alphabetized Reference
datagrams
Building Internet Firewalls, C.5.1.1. The datagram
TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
TCP/IP Network Administration, 1.5.1.1. The datagram
TCP/IP Network Administration, 1.7. Application Layer
(see also IP datagrams)
(see also User Datagram Protocol)
connectionless delivery of : TCP/IP Network Administration, 1.6. Transport Layer
converting source address of : TCP/IP Network Administration, 4.2.1. Obtaining an IP Address
forwarding : TCP/IP Network Administration, 5.3.1.1. Options
fragmented
Building Internet Firewalls, C.5.1.3. Fragmenting datagrams
TCP/IP Network Administration, 1.5.1.3. Fragmenting datagrams
TCP/IP Network Administration, 5.2. Linux Kernel Configuration
headers
TCP/IP Network Administration, 2.7.1. Protocol Numbers
TCP/IP Network Administration, 2.7.2. Port Numbers
marking end of : TCP/IP Network Administration, 6.2.1. The Serial Protocols
routing : TCP/IP Network Administration, 1.5.1.2. Routing datagrams
silently discarding : TCP/IP Network Administration, 11.8. Protocol Case Study
date : (see time and date)
date command
Practical UNIX & Internet Security, 8.1.3. Accounts That Run a Single Command
Practical UNIX & Internet Security, 24.5.1. Never Trust Anything Except Hardcopy
"Date:" header line
sendmail, 1.5. The Header
sendmail, 14.2.2. The Date: Header
sendmail, 30.8. Alphabetized F= Flags
sendmail, 35.10. Alphabetized Reference
day-zero backups : Practical UNIX & Internet Security, 7.1.3. Types of Backups
db library package
sendmail, 2.4.1. Eliminate or Keep db Support?
sendmail, 18.8. Alphabetized Reference
sendmail, C.1. Overview
compiling and installing : sendmail, C.3. Compile and Install
dbm database : sendmail, 33.8. Alphabetized Reference
alias file and
sendmail, 22.6.1. The Alias Database Files
sendmail, 24.5. The Aliases Database
dbx debugger : Practical UNIX & Internet Security, C.4. The kill Command
DCC (Direct Client Connections) : Building Internet Firewalls, 8.9.2. Internet Relay Chat
DCD (Data Carrier Detect) modem control line : TCP/IP Network Administration, A.2. The PPP Daemon
DCE (data communication equipment) : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
DCE (Distributed Computing Environment)
Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
Practical UNIX & Internet Security, 8.7.3. Code Books
Practical UNIX & Internet Security, 16.2.6.2. Other naming services
Practical UNIX & Internet Security, 19.2. Sun's Remote Procedure Call (RPC)
Practical UNIX & Internet Security, 19.7.1. DCE
dd command
Practical UNIX & Internet Security, 6.6.1.2. Ways of improving the security of crypt
Practical UNIX & Internet Security, 7.4.1. Simple Local Copies
DDN (Data Defense Network)
Building Internet Firewalls, C.10. Internet Routing Architecture
Practical UNIX & Internet Security, F.3.4.20. MILNET
TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
Protocol Handbook : TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
deadlock : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
debug command
Practical UNIX & Internet Security, 17.3.4.2. Using sendmail to receive email
sendmail, 22.3.1. SMTP debug
debug_dumpstate rule set : sendmail, 26.3.3.3. -- ruleset debug_dumpstate returns stat ..., pv: --
debugfs command : Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
debugging
Building Internet Firewalls, 6.1.2.1. Current filtering tools are not perfect
sendmail, 4.3. Debugging (-d)
sendmail, 6.3.3. Testing the New Delivery Agent Definitions
sendmail, 37.2. Debugging Behavior
TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
TCP/IP Network Administration, C.1.1. Signal Processing
(see also bugs)
(see also -d switch (sendmail))
(see also testing)
(see also troubleshooting)
operating system : Building Internet Firewalls, 5.8.1.2. Fix all known system bugs
with rule testing : sendmail, 38.7. Add Debugging for Detail
SMTPDEBUG macro
sendmail, 18.8. Alphabetized Reference
sendmail, 22.3.1. SMTP debug
debugging mode : sendmail, 36.7. Alphabetized Reference
DEC (Digital Equipment Corporation) : Practical UNIX & Internet Security, F.3.4.9. DEC (Digital Equipment Corporation)
decentralizing management : TCP/IP Network Administration, 2.3. Subnets
declaring
classes
sendmail, 12.1.1. Declaring a Class
sendmail, 32.1. Class Configuration Commands
delivery agents : sendmail, 19.3.2. MAILER()
macros
sendmail, 7.2. Defining Macros
sendmail, 31.2. Command-Line Definitions
sites for SITECONFIG : sendmail, 19.6. Alphabetized m4 Macros
trusted users : (see T configuration command)
DECnet network
Practical UNIX & Internet Security, 16.4.3. DECnet
sendmail, 3.3.3. Other Protocols
$C macro : sendmail, 31.10. Alphabetized Reference
DECNET-RELAY macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
decode alias
Practical UNIX & Internet Security, 17.3.4.2. Using sendmail to receive email
sendmail, 22.6. The Aliases File
decryption
TCP/IP Network Administration, 12.6. Encryption
(see encryption)
dedicated connections
TCP/IP Network Administration, 6.3.1. The PPP Daemon
TCP/IP Network Administration, 6.4. Installing SLIP
dedicated proxy servers : Building Internet Firewalls, 7.3.2. Generic Versus Dedicated Proxies
defamation : Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication, and Defamation
default
accounts : Practical UNIX & Internet Security, 8.1.2. Default Accounts
canonicalization : sendmail, 28.6.6.2. Default in canonicalization: $:
character set : sendmail, 30.4. The Equates
content-type character set : sendmail, 34.8. Alphabetized Reference
database key : sendmail, 33.4.1. Specify a Default with $:
delivery agent : sendmail, 34.8. Alphabetized Reference
delivery mode : sendmail, 13.2.3. The Default Delivery Mode
deny : Practical UNIX & Internet Security, 21.1.1. Default Permit vs. Default Deny
domain
Practical UNIX & Internet Security, 16.2.3. Hostnames
TCP/IP Network Administration, 3.3.3. Domain Names
TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
how used : TCP/IP Network Administration, 3.3.3. Domain Names
file permissions : sendmail, 13.2.4. The Default File Permissions
gateway
TCP/IP Network Administration, 2.5. The Routing Table
TCP/IP Network Administration, 4.3. Planning Routing
address : TCP/IP Network Administration, 4. Getting Started
hostname : sendmail, 33.5.3. A :default Outgoing Hostname
logging level : sendmail, 13.2.6. The Default Logging Level
macro definitions : sendmail, 7.3. Predefined Macros
mask : TCP/IP Network Administration, 2.2.2. Classless IP Addresses
passwords : TCP/IP Network Administration, 12.2. User Authentication
permit : Practical UNIX & Internet Security, 21.1.1. Default Permit vs. Default Deny
route
TCP/IP Network Administration, 2.2.2.1. Final notes on IP addresses
TCP/IP Network Administration, 2.5. The Routing Table
TCP/IP Network Administration, 7.3. Building a Static Routing Table
defining : TCP/IP Network Administration, 7.4.1.1. Running RIP with routed
sender's address format : sendmail, 31.10. Alphabetized Reference
User Database location : sendmail, 18.8. Alphabetized Reference
user identity
sendmail, 13.2.5. The Default User Identities
sendmail, 22.8.3.1. The DefaultUser option
sendmail, 34.8. Alphabetized Reference
values : TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
default deny stance
Building Internet Firewalls, 3.5.1. Default Deny Stance: That Which Is Not
Building Internet Firewalls, 6.2.3. Default Permit Versus Default Deny
default permit stance
Building Internet Firewalls, 3.5.2. Default Permit Stance: That Which Is
Building Internet Firewalls, 6.2.3. Default Permit Versus Default Deny
DefaultCharSet option : sendmail, 34.8. Alphabetized Reference
defaultdomain file : TCP/IP Network Administration, 9.3. Network Information Service
defaultroute option : TCP/IP Network Administration, 6.3.1. The PPP Daemon
DefaultUser (u,g) option
sendmail, 13.2.5. The Default User Identities
sendmail, 22.8.3.1. The DefaultUser option
sendmail, 34.8. Alphabetized Reference
Defense Communications Agency (DCA) : TCP/IP Network Administration, 1.1. TCP/IP and the Internet
Defense Data Network (DDN) : Building Internet Firewalls, C.10. Internet Routing Architecture
defense in depth
Building Internet Firewalls, 3.2. Defense in Depth
Building Internet Firewalls, 9.2.3.2. Defense in depth
define() : sendmail, 20.3. Alphabetized V8.8 Subroutines
define macro (in sendmail)
TCP/IP Network Administration, E.3. m4 sendmail Macros
TCP/IP Network Administration, E.3.1. define
define statements (m4)
sendmail, 19.1. The m4 Preprocessor
sendmail, 19.4.1. Options
defining
headers : (see H configuration command)
macros
sendmail, 20.3. Alphabetized V8.8 Subroutines
sendmail, 34.8. Alphabetized Reference
sendmail, 36.7. Alphabetized Reference
sendmail, 38.2.1. Define a Macro with .D
definition statements (in gated) : TCP/IP Network Administration, B.7. Definition Statements
delay= equate (syslog output) : sendmail, 26.1.3.2. delay= total time to deliver
delay, transaction : sendmail, 26.1.3.13. xdelay= transaction
delays, inserting
TCP/IP Network Administration, 6.3.2. Dial-Up PPP
TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
DELETE key : Practical UNIX & Internet Security, 3.4. Changing Your Password
deleting
destructive attack via : Practical UNIX & Internet Security, 25.1. Destructive Attacks
files : Practical UNIX & Internet Security, 5.4. Using Directory Permissions
header lines : sendmail, 20.3. Alphabetized V8.8 Subroutines
delimiters
database key column : sendmail, 33.3.4.12. -z specify the column delimiter (V8.7 and above)
tokens
sendmail, 31.10. Alphabetized Reference
sendmail, 34.8. Alphabetized Reference
"Delivered-To:" header line : sendmail, 35.10. Alphabetized Reference
delivermail program : sendmail, History
delivery
sendmail, 19.6. Alphabetized m4 Macros
(see also users)
alias, forms of : sendmail, 24.2. Forms of Alias Delivery
failure count : sendmail, 23.9. The qf File Internals
via FAX machine : sendmail, 3.3.3. Other Protocols
to files : (see appending to files)
local
sendmail, 3.2. Role in Local Delivery
sendmail, 29.6.3. Delivering to Local Recipient
sendmail, 30.8. Alphabetized F= Flags
(see local)
looking up addresses with DNS : sendmail, 21.2.3. Look Up Addresses for Delivery
to mailbox : sendmail, 3.2.1. Delivery to a Mailbox
to multiple recipients : sendmail, 30.8. Alphabetized F= Flags
path of : (see "Received:" header line)
precedence : (see priority, message)
to programs
sendmail, 3.2.2. Delivery Through a Program
sendmail, 24.2.3. Delivery via Programs
sendmail, 25.7.4. Piping Through Programs
sendmail, 30.8. Alphabetized F= Flags
relays : (see relays)
single threaded : sendmail, 34.8. Alphabetized Reference
total time for : sendmail, 26.1.3.2. delay= total time to deliver
delivery agents (MTAs)
Building Internet Firewalls, 8.1. Electronic Mail
sendmail, 1.1. MUA Versus MTA
sendmail, 5.3.1. Mail Delivery Agents
sendmail, 6.2. Define a Mail Delivery Agent
sendmail, 30. Delivery Agents
(see also M configuration command)
$# operator and
sendmail, 9.2.1. The Delivery Agent ($#)
sendmail, 28.6.5. Specify a Delivery Agent: $#
advantages to sendmail : sendmail, 18.1. To Use or Not to Use
choosing
sendmail, 9. Rule Set 0
sendmail, 9.5. Things to Try
declaring : sendmail, 19.3.2. MAILER()
default : sendmail, 34.8. Alphabetized Reference
equates for : sendmail, 30.4. The Equates
for errors : sendmail, 9.4. The error Delivery Agent
expensive
sendmail, 23.6.1. Periodically with -q
sendmail, 30.8. Alphabetized F= Flags
sendmail, 34.8. Alphabetized Reference
flags
sendmail, 6.3. The local Delivery Agent
sendmail, 6.4. Add the Missing Parts to Mhub
sendmail, 14.2. Headers Versus Delivery Agent Flags
sendmail, 30.8. Alphabetized F= Flags
sendmail, 35.4. ?flags? in Header Definitions
ignoring MX records : sendmail, 21.3.5. What? They Ignore MX Records?
local
sendmail, 6.3. The local Delivery Agent
sendmail, 19.6. Alphabetized m4 Macros
logging : sendmail, 26.1.3.4. mailer= the delivery agent used
printing list of : sendmail, 38.4.2. Show Delivery Agents with =M
as recipients : sendmail, 30.8. Alphabetized F= Flags
scripts via : sendmail, 24.3. Write a Delivery Agent Script
statistics : (see statistics)
symbolic name : sendmail, 30.2. The Symbolic Name
testing : sendmail, 38.5.6. Try a Delivery Agent with /try
UUCP : sendmail, 19.4.6. UUCP
delivery mode : sendmail, 13.2.3. The Default Delivery Mode
delivery program : sendmail, 25.7.5.1. The deliver program
Delivery Status Notification : (see DSN)
DeliveryMode (d) option
sendmail, 13.2.3. The Default Delivery Mode
sendmail, 23.6.1. Periodically with -q
sendmail, 34.8. Alphabetized Reference
Demilitarized Zone (DMZ) : Building Internet Firewalls, 4.1. Some Firewall Definitions
demo accounts : Practical UNIX & Internet Security, 8.1.2. Default Accounts
demultiplexing : TCP/IP Network Administration, 2.7. Protocols, Ports, and Sockets
denial of service
Building Internet Firewalls, 1.2.1.2. Denial of Service
Practical UNIX & Internet Security, 1.5. Role of This Book
Practical UNIX & Internet Security, 17.1.3. The /etc/inetd Program
Practical UNIX & Internet Security, 17.3.21.5. Denial of service attacks under X
Practical UNIX & Internet Security, 25. Denial of Service Attacks and Solutions
Practical UNIX & Internet Security, 25.3. Network Denial of Service Attacks
Practical UNIX & Internet Security, 25.3.4. Clogging
TCP/IP Network Administration, 12.1.1. Assessing the Threat
accidental
Building Internet Firewalls, 1.2.3. Stupidity and Accidents
Practical UNIX & Internet Security, 25.2.5. Soft Process Limits: Preventing Accidental Denial
automatic lockout : Practical UNIX & Internet Security, 3.3. Entering Your Password
checklist for : Practical UNIX & Internet Security, A.1.1.24. Chapter 25: Denial of Service Attacks and Solutions
destructive attacks : Practical UNIX & Internet Security, 25.1. Destructive Attacks
disk attacks
Practical UNIX & Internet Security, 25.2.2. Disk Attacks
Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
inodes : Practical UNIX & Internet Security, 25.2.2.3. Inode problems
internal inetd services : Practical UNIX & Internet Security, 17.1.3. The /etc/inetd Program
on networks
Practical UNIX & Internet Security, 25.3. Network Denial of Service Attacks
Practical UNIX & Internet Security, 25.3.4. Clogging
overload attacks
Practical UNIX & Internet Security, 25.2. Overload Attacks
Practical UNIX & Internet Security, 25.2.5. Soft Process Limits: Preventing Accidental Denial
via syslog : Practical UNIX & Internet Security, 10.5.1. The syslog.conf Configuration File
system overload attacks : Practical UNIX & Internet Security, 25.2.1.2. System overload attacks
X Window System : Practical UNIX & Internet Security, 17.3.21.5. Denial of service attacks under X
departure of employees : Practical UNIX & Internet Security, 13.2.6. Departure
depository directories, FTP : Practical UNIX & Internet Security, 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP
dequote database
sendmail, 33.8. Alphabetized Reference
TCP/IP Network Administration, 10.7.1. Modifying Local Information
DES (Data Encryption Standard)
Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
Practical UNIX & Internet Security, 6.4.4. DES
Practical UNIX & Internet Security, 6.4.5.2. Triple DES
Practical UNIX & Internet Security, 6.6.2. des: The Data Encryption Standard
Practical UNIX & Internet Security, 7.4.4. Encrypting Your Backups
Practical UNIX & Internet Security, 8.6.1. The crypt()
(see also authentication)
authentication (NIS+) : Practical UNIX & Internet Security, 19.5.4. Using NIS+
improving security of
Practical UNIX & Internet Security, 6.4.5. Improving the Security of DES
Practical UNIX & Internet Security, 6.4.5.2. Triple DES
designated router : TCP/IP Network Administration, 7.4.3. Open Shortest Path First
designing firewalls : Building Internet Firewalls, 1.4.3. Buying Versus Building
destination
TCP/IP Network Administration, 1.7. Application Layer
(see also unreachable destinations, detecting)
fields : TCP/IP Network Administration, 2.5. The Routing Table
host : TCP/IP Network Administration, 2.5. The Routing Table
Destination Address
TCP/IP Network Administration, 1.5.1.1. The datagram
TCP/IP Network Administration, 2.2. The IP Address
Destination Port number
TCP/IP Network Administration, 1.6.1. User Datagram Protocol
TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
destination unreachable codes : (see ICMP)
Destination Unreachable Message : TCP/IP Network Administration, 1.5.2. Internet Control Message Protocol
destroying media : Practical UNIX & Internet Security, 12.3.2.3. Sanitize your media before disposal
destructive attacks : Practical UNIX & Internet Security, 25.1. Destructive Attacks
detached signatures : Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
detail data, DSN delivery : sendmail, 30.5.2.1. The $@ dsn part
detectors
cable tampering : Practical UNIX & Internet Security, 12.3.1.1. Wiretapping
carbon-monoxide : Practical UNIX & Internet Security, 12.2.1.2. Smoke
humidity : Practical UNIX & Internet Security, 12.2.1.11. Humidity
logging alarm systems : Practical UNIX & Internet Security, 10.7.1.1. Exception and activity reports
smoke : Practical UNIX & Internet Security, 12.2.1.2. Smoke
temperature alarms : Practical UNIX & Internet Security, 12.2.1.6. Temperature extremes
water sensors : Practical UNIX & Internet Security, 12.2.1.12. Water
Deutsches Forschungsnetz : Practical UNIX & Internet Security, F.3.4.14. Germany: DFN-WiNet Internet sites
/dev directory
Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer
TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
/dev/audio device : Practical UNIX & Internet Security, 23.8. Picking a Random Seed
/dev/console device : Practical UNIX & Internet Security, 5.6. Device Files
/dev/kmem device
Practical UNIX & Internet Security, 5.6. Device Files
Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
sendmail, 18.8. Alphabetized Reference
/dev/null device
Practical UNIX & Internet Security, 5.6. Device Files
sendmail, 5.2. The Minimal File
/dev/random device : Practical UNIX & Internet Security, 23.7.4. Other random number generators
/dev/swap device : Practical UNIX & Internet Security, 5.5.1. SUID, SGID, and Sticky Bits
/dev/urandom device : Practical UNIX & Internet Security, 23.7.4. Other random number generators
device statement : TCP/IP Network Administration, 5.3.1.3. Devices
devices : Practical UNIX & Internet Security, 5.6. Device Files
managing with SNMP : Practical UNIX & Internet Security, 17.3.15. Simple Network Management Protocol (SNMP) (UDP Ports
modem control : Practical UNIX & Internet Security, 14.5.2. Setting Up the UNIX Device
numbers for : sendmail, 23.9. The qf File Internals
Devices file : Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer
df -i command : Practical UNIX & Internet Security, 25.2.2.3. Inode problems
df files
sendmail, 3.1.2. The Queue Directory
sendmail, 23.2.2. The Data (Message Body) File: df
sendmail, 23.9. The qf File Internals
inode and device information : sendmail, 23.9. The qf File Internals
dfstab file
TCP/IP Network Administration, 9.1.2.1. The share command
TCP/IP Network Administration, 9.1.5.1. NFS print services
dgram sockets : TCP/IP Network Administration, 5.4. The Internet Daemon
DHCP (Dynamic Host Configuration Protocol)
TCP/IP Network Administration, Preface
TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
interoperability and : TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
backwards-compatible : TCP/IP Network Administration, 9.5. DHCP
based on Bootstrap Protocol (BOOTP) : TCP/IP Network Administration, 9.4.2. BOOTP extensions
benefits of : TCP/IP Network Administration, 9.5. DHCP
daemon (dhcpd) : TCP/IP Network Administration, 9.5.1. dhcpd.conf
command : TCP/IP Network Administration, D.2. The dhcpd Command
compiling : TCP/IP Network Administration, D.1. Compiling dhcpd
configuring : TCP/IP Network Administration, D.3. The dhcpd.conf Configuration File
tools reference : TCP/IP Network Administration, D. A dhcpd Reference
using latest versions of : TCP/IP Network Administration, D. A dhcpd Reference
dhcpd.conf file : TCP/IP Network Administration, 9.5.1. dhcpd.conf
dhcpd.pid file : TCP/IP Network Administration, D.2. The dhcpd Command
options available with : TCP/IP Network Administration, D.3.3. DHCP Options
commonly used : TCP/IP Network Administration, D.3.3.1. Commonly used options
others : TCP/IP Network Administration, D.3.3.2. Other options
diagnostic tools : TCP/IP Network Administration, 11.2. Diagnostic Tools
diagramming the system : Building Internet Firewalls, 13.5.2. Labeling and Diagraming Your System
dial-up connections : TCP/IP Network Administration, 6.3.1. The PPP Daemon
dial-up IP (dip)
TCP/IP Network Administration, 6.3.2. Dial-Up PPP
TCP/IP Network Administration, 6.4.2. Dial-Up IP
script file : TCP/IP Network Administration, A.1.1. The dip Script File
for SLIP : TCP/IP Network Administration, 6.4.2. Dial-Up IP
sample : TCP/IP Network Administration, A.1.1.1. A sample dip script
special variables, listed : TCP/IP Network Administration, A.1.1. The dip Script File
tools reference : TCP/IP Network Administration, A.1. Dial-Up IP
dial-up PPP : TCP/IP Network Administration, 6.3.2. Dial-Up PPP
DialDelay option : sendmail, 34.8. Alphabetized Reference
dictionary attacks
Building Internet Firewalls, 10.3.1. One-Time Passwords
Practical UNIX & Internet Security, 8.6.1. The crypt()
TCP/IP Network Administration, 12.2. User Authentication
Diffie-Hellman key exchange system
Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
Practical UNIX & Internet Security, 18.6. Dependence on Third Parties
Practical UNIX & Internet Security, 19.3. Secure RPC (AUTH_DES)
breaking key : Practical UNIX & Internet Security, 19.3.4. Limitations of Secure RPC
exponential key exchange : Practical UNIX & Internet Security, 19.3.1. Secure RPC Authentication
dig
TCP/IP Network Administration, 11.2. Diagnostic Tools
TCP/IP Network Administration, 11.3. Testing Basic Connectivity
TCP/IP Network Administration, 11.6.4. dig: An Alternative to nslookup
digest multipart subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
Digital Audio Tape (DAT) : Practical UNIX & Internet Security, 7.1.4. Guarding Against Media Failure
digital computers : Practical UNIX & Internet Security, 6.1.2. Cryptography and Digital Computers
Digital Equipment Corporation (DEC) : Practical UNIX & Internet Security, F.3.4.9. DEC (Digital Equipment Corporation)
Digital Signature Algorithm : (see DSA)
digital signatures
Practical UNIX & Internet Security, 6.4. Common Cryptographic Algorithms
Practical UNIX & Internet Security, 6.5. Message Digests and Digital Signatures
Practical UNIX & Internet Security, 6.5.5.2. Message authentication codes
Practical UNIX & Internet Security, 9.2.3. Checksums and Signatures
TCP/IP Network Administration, 12.6. Encryption
checksums
Building Internet Firewalls, 5.8.5.3. About checksums for auditing
Practical UNIX & Internet Security, 6.5.5.1. Checksums
Practical UNIX & Internet Security, 9.2.3. Checksums and Signatures
TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
TCP/IP Network Administration, 11.8. Protocol Case Study
keeping secure : Building Internet Firewalls, 13.5.3. Keeping Secured Checksums
recalculating
TCP/IP Network Administration, 4.2.1. Obtaining an IP Address
TCP/IP Network Administration, 5.3.1.1. Options
using Tripwire for : Building Internet Firewalls, 5.8.5.1. Auditing packages
detached signatures : Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
with PGP : Practical UNIX & Internet Security, 6.6.3.4. Adding a digital signature to an announcement
Digital UNIX
Practical UNIX & Internet Security, 1.3. History of UNIX
(see also Ultrix)
Dijkstra Shortest Path First (SPF) algorithm : TCP/IP Network Administration, 7.4.3. Open Shortest Path First
dip (dial-up IP)
TCP/IP Network Administration, 6.3.2. Dial-Up PPP
TCP/IP Network Administration, 6.4.2. Dial-Up IP
script file : TCP/IP Network Administration, A.1.1. The dip Script File
for SLIP : TCP/IP Network Administration, 6.4.2. Dial-Up IP
sample : TCP/IP Network Administration, A.1.1.1. A sample dip script
tools reference : TCP/IP Network Administration, A.1. Dial-Up IP
diphosts file : TCP/IP Network Administration, 6.4.3. SLIP Server Configuration
diplogin command : TCP/IP Network Administration, 6.4.3. SLIP Server Configuration
Direct Client Connections (DCC) : Building Internet Firewalls, 8.9.2. Internet Relay Chat
direct delivery : TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
directive statements (in gated) : TCP/IP Network Administration, B.3. Directive Statements
directives, Makefile : sendmail, 18.4. Tuning Makefile
directories
Practical UNIX & Internet Security, 5.1.1. Directories
Practical UNIX & Internet Security, 5.1.3. Current Directory and Paths
ancestor : Practical UNIX & Internet Security, 9.2.2.2. Ancestor directories
backing up by : Practical UNIX & Internet Security, 7.1.3. Types of Backups
CDFs (context-dependent files) : Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories
cf : sendmail, 16.1. The cf/cf Directory
checklist for : Practical UNIX & Internet Security, A.1.1.4. Chapter 5: The UNIX Filesystem
dot, dot-dot, and / : Practical UNIX & Internet Security, 5.1.1. Directories
FTP depositories : Practical UNIX & Internet Security, 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP
immutable : Practical UNIX & Internet Security, 9.1.1. Immutable and Append-Only Files
listing automatically (Web) : Practical UNIX & Internet Security, 18.2.2.2. Additional configuration issues
mounted
Practical UNIX & Internet Security, 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
Practical UNIX & Internet Security, 19.3.2.5. Mounting a secure filesystem
nested : Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
NFS : (see NFS)
permissions : Practical UNIX & Internet Security, 5.4. Using Directory Permissions
queue : (see queue directory)
read-only : Practical UNIX & Internet Security, 9.1.2. Read-only Filesystems
recipient's home : sendmail, 31.10. Alphabetized Reference
requirement for mounting : TCP/IP Network Administration, 9.1.3. Mounting Remote Filesystems
restricted
Practical UNIX & Internet Security, 8.1.5. Restricted Filesystem
Practical UNIX & Internet Security, 8.1.5.2. Checking new software
root : (see root directory)
for safe file writes : sendmail, 34.8. Alphabetized Reference
SGI and sticky bits on : Practical UNIX & Internet Security, 5.5.6. SGID and Sticky Bits on Directories
Web server structure of
Practical UNIX & Internet Security, 18.2.2. Understand Your Server's Directory Structure
Practical UNIX & Internet Security, 18.2.2.2. Additional configuration issues
world-writable : Practical UNIX & Internet Security, 11.6.1.1. World-writable user files and directories
directory statement : TCP/IP Network Administration, 8.3.1.2. Primary and secondary server configurations
<Directory> blocks
Practical UNIX & Internet Security, 18.3.1. The access.conf and .htaccess Files
Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
Practical UNIX & Internet Security, 18.3.2.1. Examples
disabling Internet services : Building Internet Firewalls, 5.8.2. Disabling Nonrequired Services
disabling routing : (see routers and routing, disabling)
disasters and disaster recovery
Practical UNIX & Internet Security, 12.2.6.4. Minimizing downtime
sendmail, 21.5. Prepare for Disaster
TCP/IP Network Administration, 11.10. Summary
TCP/IP Network Administration, 12.1.1. Assessing the Threat
TCP/IP Network Administration, 12.1.3. Writing a Security Policy
TCP/IP Network Administration, 12.8. Words to the Wise
disclosure of information, threat of : TCP/IP Network Administration, 12.1.1. Assessing the Threat
disconnecting after incident : Building Internet Firewalls, 13.1.2. Disconnect or Shut Down, as
disconnecting machine : Building Internet Firewalls, 13.4.3. Planning for Disconnecting or
disk attacks
Practical UNIX & Internet Security, 25.2.2. Disk Attacks
Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
disk quotas : Practical UNIX & Internet Security, 25.2.2.5. Using quotas
disk space : (see memory; resources)
diskettes : (see backups; media)
disks, needs for : Building Internet Firewalls, 5.3.3. What Hardware Configuration?
dismissed employees : Practical UNIX & Internet Security, 13.2.6. Departure
dismounting directories, by booting : TCP/IP Network Administration, 9.1.3.1. The mount command
disposing of materials : Practical UNIX & Internet Security, 12.3.3. Other Media
Distfile : TCP/IP Network Administration, 9.6.1. rdist
distributed
architecture : TCP/IP Network Administration, 7.5.1. Exterior Gateway Protocol
control : TCP/IP Network Administration, 12.1.2. Distributed Control
servers, managing : TCP/IP Network Administration, 9.6. Managing Distributed Servers
Distributed Computing Environment : (see DCE)
Distributed File System (DFS) : TCP/IP Network Administration, 3.7.1. File Sharing
distributing public keys : TCP/IP Network Administration, 12.6. Encryption
diversity of defense systems : Building Internet Firewalls, 3.7. Diversity of Defense
divert command (m4)
sendmail, 19.1.4. m4 diversions
sendmail, 19.6. Alphabetized m4 Macros
dividing problem into manageable pieces : TCP/IP Network Administration, 11.1.1. Troubleshooting Hints
DMBDEF variable : TCP/IP Network Administration, E.4.4. The sendmail K Command
DMBDEF= directive : sendmail, 18.4.1. DBMDEF=
dmesg command : TCP/IP Network Administration, 6.1.1. Determining the Interface Name
DMZ (Demilitarized Zone) : Building Internet Firewalls, 4.1. Some Firewall Definitions
dnl command (m4) : sendmail, 19.1.2. m4 and dnl
DNS (Domain Name Service)
Building Internet Firewalls, 2.9. Name Service
Building Internet Firewalls, 5.6. Selecting Services Provided by the
Practical UNIX & Internet Security, 16.2.6. Name Service
Practical UNIX & Internet Security, 16.2.6.2. Other naming services
Practical UNIX & Internet Security, 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
Practical UNIX & Internet Security, 17.3.6.2. DNS nameserver attacks
sendmail, 17.2.1. Is the Host Local?
sendmail, 21.1. Overview
TCP/IP Network Administration, 1.7. Application Layer
TCP/IP Network Administration, 3.1. Names and Addresses
TCP/IP Network Administration, 3.3. Domain Name Service
(see also name service)
benefits of
TCP/IP Network Administration, 3.3. Domain Name Service
TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
bestmx_is_local feature : sendmail, 19.6. Alphabetized m4 Macros
configuring : Building Internet Firewalls, 8.10. Domain Name System
in screened host architecture : Building Internet Firewalls, 9.2.1.6. DNS
in screened subnet architecture : Building Internet Firewalls, 9.1.1.6. DNS
without hiding information : Building Internet Firewalls, 8.10.6. Setting up DNS Without Hiding
data : Building Internet Firewalls, 8.10.3. DNS Data
disasters : sendmail, 21.5. Prepare for Disaster
eliminating support for : sendmail, 2.4.2. Eliminate DNS Support
error numbers : sendmail, B.1. Status file lines
fake server : Building Internet Firewalls, 8.10.5.1. Set up a `fake'
hiding information with : Building Internet Firewalls, 8.10.5. Setting Up DNS to Hide
MX records
Building Internet Firewalls, 8.10.5.1. Set up a `fake'
Practical UNIX & Internet Security, 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
sendmail, 15.3. MX Records
sendmail, 18.8. Alphabetized Reference
sendmail, 21.3. Set Up MX Records
sendmail, 34.8. Alphabetized Reference
sendmail, 38.5.2. Look Up MX Records with /mx
TCP/IP Network Administration, 8.3.2. Standard Resource Records
TCP/IP Network Administration, 8.3.6. The named.hosts File
TCP/IP Network Administration, 8.4. Using nslookup
TCP/IP Network Administration, 10.7.1. Modifying Local Information
TCP/IP Network Administration, C.3.1.4. Mail exchanger record
0 flag : sendmail, 30.8. Alphabetized F= Flags
bestmx database class : sendmail, 33.8. Alphabetized Reference
bestmx_is_local feature : sendmail, 19.6. Alphabetized m4 Macros
fallback MX host : sendmail, 34.8. Alphabetized Reference
ignored by delivery agents : sendmail, 21.3.5. What? They Ignore MX Records?
looking up for addresses : sendmail, 21.2.3. Look Up Addresses for Delivery
offsite hosts : sendmail, 21.5.1. Offsite MX Hosts
with wildcards : sendmail, 21.3.4. Wildcard MX Records
nameserver attacks : Practical UNIX & Internet Security, 17.3.6.2. DNS nameserver attacks
omitting support : sendmail, 19.6. Alphabetized m4 Macros
querying : TCP/IP Network Administration, 10.7.1. Modifying Local Information
resource on : sendmail, Other Books, Other Problems
revealing information to attackers : Building Internet Firewalls, 8.10.4.3. Revealing too much information to
rogue servers : Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
security and : Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
server for internal hosts : Building Internet Firewalls, 8.10.5.2. Set up a real DNS
starting : TCP/IP Network Administration, 5.4. The Internet Daemon
tuning lookups : sendmail, 34.8. Alphabetized Reference
zone transfers
Practical UNIX & Internet Security, 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
Practical UNIX & Internet Security, 17.3.6.1. DNS zone transfers
docs/warnings file : TCP/IP Network Administration, 12.4.3.1. COPS
documentation
Practical UNIX & Internet Security, 2.5. The Problem with Security Through Obscurity
Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
historical, of problems : TCP/IP Network Administration, 11.1.1. Troubleshooting Hints
incidents : Building Internet Firewalls, 13.1.7. Document the Incident
plan for : Building Internet Firewalls, 13.4.7. Planning for Documentation
sendmail
sendmail, Additional Sources of Information
sendmail, 2.2. Read the Documents
system after incident
Building Internet Firewalls, 13.1.5. Snapshot the System
Building Internet Firewalls, 13.4.5. Planning for Snapshots
using : TCP/IP Network Administration, 4.6. Informing the Users
dollar sign ($)
$ line (qf file) : sendmail, 23.9. The qf File Internals
$ rule-testing command : sendmail, 38.3.1. Dump a Defined Macro with $
in macro names : sendmail, 31.5. Macro Expansion: $ and $&
wildcard operators
sendmail, 8.7. Wildcard Operators
(see also wildcard operators)
$1, $2, ... : (see positional operators)
$&
sendmail, 28.6.4. Rewrite Through Another Rule Set: $>set
sendmail, 31.5.3. Use Value as Is with $&
$> : sendmail, 28.6.4. Rewrite Through Another Rule Set: $>set
$* : sendmail, 10.2.1. The LHS
$@
sendmail, 9.2.2. The Host ($@)
sendmail, 9.3. Testing Rule Set 0
sendmail, 11.4.1. Rewrite the Lone Username
sendmail, 17.1.1.3. Handle null address
sendmail, 28.6.3. Rewrite-and-Return Prefix: $@
sendmail, 30.5.2.1. The $@ dsn part
sendmail, 33.4.2. Specify Numbered Substitution with $@
$[ and $]
sendmail, 19.6. Alphabetized m4 Macros
sendmail, 21.2.4. The $[ and $] Operators
sendmail, 28.6.6. Canonicalize Hostname: $[ and $]
sendmail, 33.4.3. $[ and $]: A Special Case
$:
sendmail, 9.2.3. The User ($:)
sendmail, 9.3. Testing Rule Set 0
sendmail, 28.6.2. Rewrite Once Prefix: $:
sendmail, 29.6.1. Further Processing: $:user
sendmail, 30.5.3. The $: Part
sendmail, 33.4.1. Specify a Default with $:
sendmail, 33.4. Use Maps with $( and $) in Rules
$.
sendmail, 14.1.3. Testing So Far
sendmail, 31.6. Macro Conditionals: $?, $|, and $.
$=
sendmail, 12.1. The Class Command
sendmail, 32.2.1. Matching Any in a Class: $=
sendmail, 38.3.2. Dump a Class Macro with $=
$#
sendmail, 9.2.1. The Delivery Agent ($#)
sendmail, 28.6.5. Specify a Delivery Agent: $#
$- : sendmail, 11.4.1. Rewrite the Lone Username
$( and $) : sendmail, 33.4. Use Maps with $( and $) in Rules
$+ : sendmail, 8.7. Wildcard Operators
$?
sendmail, 14.1.3. Testing So Far
sendmail, 31.6. Macro Conditionals: $?, $|, and $.
$~ : sendmail, 32.2.2. Matching Any Not in a Class: $~
$| : sendmail, 31.6. Macro Conditionals: $?, $|, and $.
$_ macro
sendmail, 20.2.4. Verify identd Information
sendmail, 23.9. The qf File Internals
sendmail, 26.1.3.9. relay= the host that sent or accepted the message
sendmail, 31.10. Alphabetized Reference
DOL macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
DOMAIN() : sendmail, 19.3.3. DOMAIN()
DOMAIN macro (in sendmail) : TCP/IP Network Administration, E.3. m4 sendmail Macros
Domain Name Pointer records : (see PTR resource records)
Domain Name Service : (see DNS)
domain names
Practical UNIX & Internet Security, 16.2.3. Hostnames
sendmail, 8.1. A Fictional Network
sendmail, 19.6. Alphabetized m4 Macros
sendmail, 31.10. Alphabetized Reference
TCP/IP Network Administration, 3.3.3. Domain Names
TCP/IP Network Administration, 4. Getting Started
application form : TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
fully qualified : TCP/IP Network Administration, 3.3.3. Domain Names
in NIS : TCP/IP Network Administration, 9.3. Network Information Service
obtaining : TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
parameter : TCP/IP Network Administration, 9.4. A BOOTP Server
DOMAIN source file (in sendmail)
TCP/IP Network Administration, E.3.2. FEATURE
TCP/IP Network Administration, E.3.4. DOMAIN
mail relay defines, listed : TCP/IP Network Administration, E.3.4. DOMAIN
domain-type addresses : sendmail, 17.1.3. Internet Addresses
domain/named.root : TCP/IP Network Administration, 11.6.3. Cache corruption
domainname command
Practical UNIX & Internet Security, 19.4.3. NIS Domains
TCP/IP Network Administration, 9.3. Network Information Service
domains
Practical UNIX & Internet Security, 19.4.3. NIS Domains
TCP/IP Network Administration, 1.7. Application Layer
accepting only internal mail : sendmail, 20.2.1. Accept Mail Only From Our Domain
adding to recipient address : sendmail, 30.8. Alphabetized F= Flags
administration
TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
TCP/IP Network Administration, 8.1. BIND: UNIX Name Service
contacting : TCP/IP Network Administration, 13.6. The White Pages
allocating : (see Network Information Center)
always_add_domain feature : sendmail, 19.6. Alphabetized m4 Macros
creating : TCP/IP Network Administration, 3.3.2. Creating Domains and Subdomains
downloading an entire : TCP/IP Network Administration, 8.4. Using nslookup
entry, in resolv.conf : TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
FQDN : (see FQDNs)
hierarchy
TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
TCP/IP Network Administration, 8.1. BIND: UNIX Name Service
list of local : sendmail, 32.5. Alphabetized Reference
masquerading : sendmail, 19.6. Alphabetized m4 Macros
name servers : TCP/IP Network Administration, 4.2.1.1. Assigning host addresses
parameter : TCP/IP Network Administration, 9.4. A BOOTP Server
organizational : TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
part of hostname : (see $m macro)
virtual, mapping to addresses : sendmail, 19.6. Alphabetized m4 Macros
domaintable database
TCP/IP Network Administration, 10.7.1. Modifying Local Information
sendmail, 19.6. Alphabetized m4 Macros
DontExpandCNames option : sendmail, 34.8. Alphabetized Reference
DontInitGroups option : sendmail, 34.8. Alphabetized Reference
DontPruneRoutes command : sendmail, 34.8. Alphabetized Reference
dormant accounts
Practical UNIX & Internet Security, 8.4. Managing Dormant Accounts
Practical UNIX & Internet Security, 8.4.3. Finding Dormant Accounts
dot (.)
. line (qf file) : sendmail, 23.9. The qf File Internals
checking for in ${pd} : sendmail, D.1. Sun Enhancements
for current directory : Practical UNIX & Internet Security, 5.1.1. Directories
to end messages
sendmail, 4.2. Verbose (-v)
sendmail, 30.8. Alphabetized F= Flags
filenames starting with, disabling creation of : Building Internet Firewalls, 8.2.1.6. Be careful of writable
host status file line : sendmail, B.1. Status file lines
leading in messages : sendmail, 34.8. Alphabetized Reference
trailing in FQDNs
sendmail, 15.3. MX Records
sendmail, 17.4. Rule Set 4
sendmail, 29.5.1. Stripping Trailing Dots
.. directory : Practical UNIX & Internet Security, 5.1.1. Directories
.. for domain name : TCP/IP Network Administration, C.3.1. Standard Resource Records
dotted decimal notation : TCP/IP Network Administration, 2.3. Subnets
Double DES : Practical UNIX & Internet Security, 6.4.5. Improving the Security of DES
double quotation marks (")
sendmail, 13.2.8. The Unquoted Space Replacement Character
sendmail, 31.3.2. Syntax of the Configuration File Macro's Text
double-reverse lookups
Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
Building Internet Firewalls, 8.10.4.2. Mismatched data between the hostname
Building Internet Firewalls, 8.10.5.1. Set up a `fake'
DoubleBounceAddress option : sendmail, 34.8. Alphabetized Reference
DOW USA : Practical UNIX & Internet Security, F.3.4.10. DOW USADOW USA
down sites : sendmail, 23.7.1. Handling a Down Site
downloading files : Practical UNIX & Internet Security, 12.3.4. Protecting Local Storage
logging
Practical UNIX & Internet Security, 10.3.3. xferlog Log File
Practical UNIX & Internet Security, 10.3.5. access_log Log File
downtime : Practical UNIX & Internet Security, 12.2.6.4. Minimizing downtime
due to criminal investigations : Practical UNIX & Internet Security, 26.2.4. Hazards of Criminal Prosecution
logging : Practical UNIX & Internet Security, 10.7.2.1. Exception and activity reports
drand48 function : Practical UNIX & Internet Security, 23.7.3. drand48 ( ), lrand48 ( ), and mrand48 ( )
Drawbridge package : Building Internet Firewalls, B.3.2. Drawbridge
drills, security : Practical UNIX & Internet Security, 24.1.3. Rule #3: PLAN AHEAD
drink : Practical UNIX & Internet Security, 12.2.2.1. Food and drink
ds.internic.net : TCP/IP Network Administration, 13.4. Retrieving RFCs
DSA (Digital Signature Algorithm)
Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
Practical UNIX & Internet Security, 6.5.3. Digital Signatures
DSN (Delivery Status Notification)
sendmail, 6.3. The local Delivery Agent
sendmail, B.1. Status file lines
DSN macro : sendmail, 18.8. Alphabetized Reference
ENVID identifier
sendmail, 23.9. The qf File Internals
sendmail, 36.7. Alphabetized Reference
ORCPT address : sendmail, 23.9. The qf File Internals
original envelope ID : sendmail, 31.10. Alphabetized Reference
types for : (see T= equate)
DTE (data terminal equipment) : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
du command : Practical UNIX & Internet Security, 25.2.2.1. Disk-full attacks
dual-homed hosts
Building Internet Firewalls, 7. Proxy Systems
(see also proxy servers/services)
architecture of : Building Internet Firewalls, 4.2.1. Dual-Homed Host Architecture
with screen subnet architecture : Building Internet Firewalls, 4.3.8. It's OK to Use
as firewall : Building Internet Firewalls, 5.8.2.5. Turning off routing
nonrouting : Building Internet Firewalls, 5.2.1. Nonrouting Dual-homed Hosts
proxy services and : (see proxy servers/services)
dual universes : Practical UNIX & Internet Security, 5.9.1. Dual Universes
ducts, air : Practical UNIX & Internet Security, 12.2.3.2. Entrance through air ducts
dummy interface : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
dump : TCP/IP Network Administration, 7.7.2. Testing the Configuration
dump/restore program
Practical UNIX & Internet Security, 7.1.3. Types of Backups
Practical UNIX & Internet Security, 7.4.3. Specialized Backup Programs
Practical UNIX & Internet Security, 7.4.4. Encrypting Your Backups
dumping macros : sendmail, 38.3. Dump a Macro
dumping state : sendmail, 26.3.3. SIGUSR1 Dump States
dumpster diving : Practical UNIX & Internet Security, 12.3.3. Other Media
duplicate database keys : sendmail, 33.2.1.1. -d allow duplicate keys
duplicate entries in alias file : sendmail, 24.4.4. Duplicate Entries and Automation
duress code : Practical UNIX & Internet Security, 8.7.2. Token Cards
dust : Practical UNIX & Internet Security, 12.2.1.3. Dust
dynamic
assignment of addresses
TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
TCP/IP Network Administration, 4.2.1.1. Assigning host addresses
automatic under DHCP : TCP/IP Network Administration, 9.5. DHCP
circumstances favoring : TCP/IP Network Administration, 4.3. Planning Routing
packet filtering
Building Internet Firewalls, 6.3.3.2. UDP
Building Internet Firewalls, 8.2.1.1. Packet filtering characteristics of
port allocation : TCP/IP Network Administration, 2.7.3. Sockets
routing
TCP/IP Network Administration, 4.3. Planning Routing
TCP/IP Network Administration, 7.1. Common Routing Configurations
Dynamic DNS : TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
Dynamic Host Configuration Protocol : (see DHCP)
dynamic-bootp flag : TCP/IP Network Administration, D.3.2. Configuration Parameters
dynamic-bootp-lease-cutoff parameter : TCP/IP Network Administration, 9.5.1. dhcpd.conf
dynamic-bootp-lease-length parameter : TCP/IP Network Administration, 9.5.1. dhcpd.conf


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.