start page | rating of books | rating of authors | reviews | copyrights

Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: R

r commands : Building Internet Firewalls, 5.8.2.4. Which services should you disable?
configuring : Building Internet Firewalls, 8.4.1. BSD
packet filtering and : Building Internet Firewalls, 6.1.2.2. Some protocols are not well suited to packet
R configuration command
sendmail, 5.3.3. Rules
sendmail, 8.4. Rules
sendmail, 27.2. Comments
sendmail, 28.1. Overview
sendmail, 29.1.5. Rule Sets and Lists of Rules
r flag
sendmail, 30.7. Pitfalls
sendmail, 30.8. Alphabetized F= Flags
R flag : sendmail, 30.8. Alphabetized F= Flags
R in configuration file : sendmail, 1.3.1. The Configuration File
R line (host status file) : sendmail, B.1. Status file lines
R line (qf file)
sendmail, 23.4.1. Printing the Queue in Verbose Mode
sendmail, 23.9. The qf File Internals
$r macro
sendmail, 23.9. The qf File Internals
sendmail, 26.1.3.8. proto= the protocol used in transmission
sendmail, 31.10. Alphabetized Reference
sendmail, 36.7. Alphabetized Reference
$R macro : sendmail, 31.10. Alphabetized Reference
R option
sendmail, D.5. The > Option
(see DontPruneRoutes command)
r option : (see Timeout (r) option)
-r switch (makemap) : sendmail, 33.2.1.5. -r replace (silently) duplicate keys
-r switch (sendmail)
sendmail, 30.8. Alphabetized F= Flags
sendmail, 36.7. Alphabetized Reference
-R switch (sendmail) : sendmail, 36.7. Alphabetized Reference
R= equate
sendmail, 6.3. The local Delivery Agent
sendmail, 6.3.1. Skipping Rule Sets
sendmail, 29.6.2. Selecting S= and R=
sendmail, 30.4. The Equates
rabbit programs
Practical UNIX & Internet Security, 11.1. Programmed Threats: Definitions
Practical UNIX & Internet Security, 11.1.7. Bacteria and Rabbits
race conditions : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
RADB (Routing Arbiter Database) : TCP/IP Network Administration, 2.4. Internet Routing Architecture
radio
Practical UNIX & Internet Security, 12.2.1.8. Electrical noise
Practical UNIX & Internet Security, 12.3.1.3. Eavesdropping by radio and using TEMPEST
Practical UNIX & Internet Security, 14.4.4.1. Kinds of eavesdropping
rain : (see water)
RAM theft : Practical UNIX & Internet Security, 12.2.6. Preventing Theft
rand function : Practical UNIX & Internet Security, 23.7.1. rand ( )
random device : Practical UNIX & Internet Security, 23.7.4. Other random number generators
random function : Practical UNIX & Internet Security, 23.7.2. random ( )
random numbers : Practical UNIX & Internet Security, 23.6. Tips on Generating Random Numbers
range parameter
TCP/IP Network Administration, 9.5.1. dhcpd.conf
TCP/IP Network Administration, D.3.2. Configuration Parameters
RARP (Reverse Address Resolution Protocol)
TCP/IP Network Administration, 3.5.1. Reverse Address Resolution Protocol
TCP/IP Network Administration, 5.2. Linux Kernel Configuration
adding to Linux kernel : TCP/IP Network Administration, 6.1.5.5. Point-to-point
/etc/ethers file in : TCP/IP Network Administration, 9.3. Network Information Service
raw devices : Practical UNIX & Internet Security, 5.6. Device Files
raw sockets : TCP/IP Network Administration, 5.4. The Internet Daemon
rc directory
Practical UNIX & Internet Security, 11.5.3.5. System initialization files
Practical UNIX & Internet Security, 17.1.2. Starting the Servers
Practical UNIX & Internet Security, C.5.1. Process #1: /etc/init
sendmail, 15.5. Prevent the Daemon from Running
commenting out services : Practical UNIX & Internet Security, 17.3. Primary UNIX Network Services
services started by : Building Internet Firewalls, 5.8.2.1. How are services managed?
rc.inet1 script : TCP/IP Network Administration, 7.3.1.1. Installing static routes at startup
rc.M startup script : TCP/IP Network Administration, 10.2. Running sendmail as a Daemon
RC2, RC4, and RC5 algorithms
Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
Practical UNIX & Internet Security, 6.4.8. Proprietary Encryption Systems
RC4 and RC5 algorithms : Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
rcp command
Building Internet Firewalls, 2.2. File Transfer
Practical UNIX & Internet Security, 1.4.3. Add-On Functionality Breeds Problems
Practical UNIX & Internet Security, 7.4.5. Backups Across the Net
RCPT command (SMTP)
sendmail, 23.9. The qf File Internals
sendmail, 29.10.2. The check_rcpt Rule Set
sendmail, 36.7. Alphabetized Reference
RCS (Revision Control System)
Practical UNIX & Internet Security, 7.3.2. Building an Automatic Backup System
Practical UNIX & Internet Security, 17.3. Primary UNIX Network Services
TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros
rdist command
Practical UNIX & Internet Security, 7.4.5. Backups Across the Net
Practical UNIX & Internet Security, 9.2.1.3. rdist
TCP/IP Network Administration, 9.6.1. rdist
rdump/rrestore program : Practical UNIX & Internet Security, 7.4.5. Backups Across the Net
reachability information
TCP/IP Network Administration, 2.4. Internet Routing Architecture
TCP/IP Network Administration, 7.5. Exterior Routing Protocols
TCP/IP Network Administration, 7.6. Gateway Routing Daemon
READ command, in POP : TCP/IP Network Administration, 3.4.2. Post Office Protocol
read permission
Practical UNIX & Internet Security, 5.1.7. File Permissions in Detail
Practical UNIX & Internet Security, 5.4. Using Directory Permissions
(see permissions)
read system call : Practical UNIX & Internet Security, 5.1.7. File Permissions in Detail
time-outs on : Practical UNIX & Internet Security, 23.3. Tips on Writing Network Programs
READ= command : Practical UNIX & Internet Security, 15.5.2. Permissions Commands
READ_ME file : sendmail, 2.2. Read the Documents
read-only filesystems
Practical UNIX & Internet Security, 11.6.1.2. Writable system files and directories
Building Internet Firewalls, 5.8.4.3. Mount filesystems as read-only
Practical UNIX & Internet Security, 9.1.2. Read-only Filesystems
readdir library call : Practical UNIX & Internet Security, 5.4. Using Directory Permissions
real UIDs/GIDs
Practical UNIX & Internet Security, 4.3.1. Real and Effective UIDs
Practical UNIX & Internet Security, C.1.3.2. Process real and effective UID
real-time conferencing : (see conferencing services, real-time)
RealHostAddr variable : sendmail, 20.1.2. Global Variables
RealHostName variable : sendmail, 20.1.2. Global Variables
realpath function : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
reauthentication
Kerberos : Practical UNIX & Internet Security, 19.6.4. Using Kerberos
Secure RPC : Practical UNIX & Internet Security, 19.3.1.3. Setting the window
rebooting : Building Internet Firewalls, 5.10.1. Watch Reboots Carefully
rebuild aliases mode : sendmail, 4.1.3. Rebuild Aliases Mode (-bi)
rebuilding : (see building)
Receive Data (RD) : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
"Received:" header line
sendmail, 1.5. The Header
sendmail, 13.4. Sending Mail
sendmail, 14.1.2. The Received: Header
sendmail, 20.2.5. Prune Received: Headers at Firewall
sendmail, 35.10. Alphabetized Reference
forged mail and : sendmail, 22.7.2. Forging with SMTP
recipient list buffer size : sendmail, 18.8. Alphabetized Reference
RecipientFactor (y) option : sendmail, 34.8. Alphabetized Reference
recipients
sendmail, 6.3. The local Delivery Agent
(see also R= equate; $u macro)
adding domain to address : sendmail, 30.8. Alphabetized F= Flags
addresses of
sendmail, 6.3. The local Delivery Agent
sendmail, 23.9. The qf File Internals
sendmail, 29.10.4. The check_compat Rule Set
sendmail, 31.10. Alphabetized Reference
TCP/IP Network Administration, 10.6.3. The Set Ruleset Command
(see also addresses)
check_rcpt rule set : sendmail, 29.10.2. The check_rcpt Rule Set
delivery agent as : sendmail, 30.8. Alphabetized F= Flags
filtering with shell script : sendmail, 24.6.2. Filtering Recipients with a Shell Script
getting from header : sendmail, 36.7. Alphabetized Reference
headers for : sendmail, 35.6.3. Recipient Headers
home directory of : sendmail, 31.10. Alphabetized Reference
large lists of : sendmail, 34.8. Alphabetized Reference
logging
sendmail, 26.1.3.6. nrcpts= the number of recipients
sendmail, 26.1.3.12. to= show final recipient
missing
sendmail, 34.8. Alphabetized Reference
sendmail, 35.10. Alphabetized Reference
multiple : sendmail, 30.8. Alphabetized F= Flags
processing list of
sendmail, 36.3. List of Recipient Addresses
sendmail, 36.4.5. Fifth: Collect Recipients
selecting MTA for : (see rule set 0)
username of : (see $u macro)
whitespace in lists of : sendmail, 34.8. Alphabetized Reference
recnews program : sendmail, 25.5.2. Gateway Lists to News
recommended headers : sendmail, 35.6.1. Recommended Headers
recording activity : (see logs/logging)
recovering after incident : Building Internet Firewalls, 13.1.6. Restore and Recover
plan for : Building Internet Firewalls, 13.4.6. Planning for Restoration and Recovery
recursion : sendmail, 21.3.3. MX Records Are Nonrecursive
recursive macro expansion : sendmail, 31.5.1. Macro Expansion Is Recursive
recursive searches : TCP/IP Network Administration, 3.3.2. Creating Domains and Subdomains
redirect feature : sendmail, 19.6. Alphabetized m4 Macros
Redirect Message
TCP/IP Network Administration, 1.5.2. Internet Control Message Protocol
TCP/IP Network Administration, 2.5. The Routing Table
TCP/IP Network Administration, 7.3.1. Adding Static Routes
redirect statement (in gated) : TCP/IP Network Administration, B.8.8. The redirect Statement
redirecting messages : (see aliases/aliasing)
redirecting routes : TCP/IP Network Administration, 1.5.2. Internet Control Message Protocol
Redman, Brian E. : Practical UNIX & Internet Security, 15.2. Versions of UUCP
refer_log file : Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
"Reference:" header line : sendmail, 35.10. Alphabetized Reference
reflectors (in Enigma system) : Practical UNIX & Internet Security, 6.3. The Enigma Encryption System
reformatting attack : Practical UNIX & Internet Security, 25.1. Destructive Attacks
refresh values : TCP/IP Network Administration, C.3.1.1. Start of Authority record
RefuseLA (X) option : sendmail, 34.8. Alphabetized Reference
registered hosts : TCP/IP Network Administration, 3.2. The Host Table
registration fee : TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
reject route
TCP/IP Network Administration, B.9. static Statements
TCP/IP Network Administration, B.10.1. The import Statement
rejecting mail messages
sendmail, 18.8. Alphabetized Reference
sendmail, 20.2.6. Reject Mail from Spamming or Mail-bombing Sites
relative humidity : Practical UNIX & Internet Security, 12.2.1.11. Humidity
relative pathnames : Practical UNIX & Internet Security, 5.1.3. Current Directory and Paths
relay= equate (syslog output) : sendmail, 26.1.3.9. relay= the host that sent or accepted the message
relays : sendmail, 19.4.5. Relays
smart hosts : sendmail, 19.6. Alphabetized m4 Macros
RELEASE_NOTES file : sendmail, 2.2. Read the Documents
reliability : TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
remembering passwords : TCP/IP Network Administration, 12.2.2. Choosing a Password
remote
command execution
Building Internet Firewalls, 8.4. Remote Command Execution
Practical UNIX & Internet Security, 15.1.2. uux Command
Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution
Practical UNIX & Internet Security, 17.3.17. rexec (TCP Port 512)
comparison copies : Practical UNIX & Internet Security, 9.2.1.2. Remote copies
computers
hijacking : Building Internet Firewalls, 10.1.1. Hijacking
transferring files to : Practical UNIX & Internet Security, 15.1.1. uucp Command
file access (UUCP)
Practical UNIX & Internet Security, 15.4.1. USERFILE: Providing Remote File Access
Practical UNIX & Internet Security, 15.4.2.1. Some bad examples
hosts
sendmail, 21.2.2. Look Up a Remote Host's Name
TCP/IP Network Administration, 1.5.2. Internet Control Message Protocol
network filesystems : Practical UNIX & Internet Security, 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
procedure calls : (see RPCs)
servers : TCP/IP Network Administration, 6.3.2. Dial-Up PPP
accessing files on : TCP/IP Network Administration, 9.1. The Network File System
contacting administrators of
TCP/IP Network Administration, 11.1.1. Troubleshooting Hints
TCP/IP Network Administration, 11.3. Testing Basic Connectivity
never extending trust to : TCP/IP Network Administration, 12.2.3. One-Time Passwords
problem for firewalls : TCP/IP Network Administration, 12.7.1. Functions of the firewall
terminal access
Building Internet Firewalls, 2.3. Remote Terminal Access and Command
(see also Telnet service)
remote copy (rcp) command : TCP/IP Network Administration, 9.6. Managing Distributed Servers
remote file
Practical UNIX & Internet Security, 10.3.1. aculog File
Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer
Remote File System (RFS) : TCP/IP Network Administration, 3.7.1. File Sharing
Remote Procedure Calls : (see RPCs)
remote.unknown file : Practical UNIX & Internet Security, 15.5. Security in BNU UUCP
remounting filesystems after system reboot : TCP/IP Network Administration, 9.1.3.2. The vfstab and fstab files
renice command
Practical UNIX & Internet Security, 25.2.1.2. System overload attacks
Practical UNIX & Internet Security, C.1.3.3. Process priority and niceness
replacement character for space : sendmail, 13.2.8. The Unquoted Space Replacement Character
replay attacks
Practical UNIX & Internet Security, 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
Practical UNIX & Internet Security, 19.6.1.2. Using the ticket granting ticket
reply feature : sendmail, 10.1. Why Preprocess?
"Reply-To:" header line
sendmail, 25.5.1. Reply Versus Bounce
sendmail, 35.10. Alphabetized Reference
REPORT keyword : TCP/IP Network Administration, A.3. chat
reportfile : TCP/IP Network Administration, A.3. chat
reporting security holes : Practical UNIX & Internet Security, 2.5.1. Going Public
reputation : Building Internet Firewalls, 1.1.3. Your Reputation
Request to Send (RTS) : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
REQUEST= command
Practical UNIX & Internet Security, 15.5.1.3. A Sample Permissions file
Practical UNIX & Internet Security, 15.5.2. Permissions Commands
Requests for Comments : (see RFCs)
RES_DNSRCH : sendmail, 21.2.4. The $[ and $] Operators
res_search()
sendmail, 18.8. Alphabetized Reference
sendmail, 21.2.3. Look Up Addresses for Delivery
"Recent-" header lines : sendmail, 35.7. Forwarding with Resent-Headers
reserved memory space : Practical UNIX & Internet Security, 25.2.2.6. Reserved space
reserved TCP port : sendmail, 30.8. Alphabetized F= Flags
reset command : TCP/IP Network Administration, 6.3.2. Dial-Up PPP
resolution, time : Practical UNIX & Internet Security, 23.8. Picking a Random Seed
resolv.conf file
TCP/IP Network Administration, 8.1.1. BIND Configurations
TCP/IP Network Administration, 8.2. Configuring the Resolver
TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
TCP/IP Network Administration, 11.6.4. dig: An Alternative to nslookup
resolver
code : TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
configuring : TCP/IP Network Administration, 8.2. Configuring the Resolver
defined : TCP/IP Network Administration, 8.1. BIND: UNIX Name Service
DNS : Practical UNIX & Internet Security, 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
options : TCP/IP Network Administration, E.4.2. sendmail Options
resolver library
Practical UNIX & Internet Security, 16.2.6.1. DNS under UNIX
sendmail, 18.5.1. Use libresolv.a
resolver-only configurations
TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
TCP/IP Network Administration, 8.1.1. BIND Configurations
TCP/IP Network Administration, 8.2.1.1. A resolver-only configuration
ResolverOptions (I) option
sendmail, 21.2.4. The $[ and $] Operators
sendmail, 34.8. Alphabetized Reference
resource unavailable error : sendmail, 36.5.9. EX_UNAVAILABLE A Resource
resources (memory) : Building Internet Firewalls, 1.1.2. Your Resources
resources on sendmail
sendmail, Additional Sources of Information
sendmail, 2.2. Read the Documents
response teams
Practical UNIX & Internet Security, 27.3.5. Response Personnel?
Practical UNIX & Internet Security, F.3. Emergency Response Organizations
Practical UNIX & Internet Security, F.3.4.46. Westinghouse Electric
(see incident response teams)
mailing lists for : Practical UNIX & Internet Security, E.1.1. Response Teams and Vendors
responsibilities of administrators
TCP/IP Network Administration, 1.7. Application Layer
TCP/IP Network Administration, 4. Getting Started
TCP/IP Network Administration, 4.3. Planning Routing
TCP/IP Network Administration, 4.6. Informing the Users
TCP/IP Network Administration, 5.1. Kernel Configuration
restart signal : sendmail, 26.3.2. SIGHUP Restart
restarting sendmail daemon : sendmail, 4.1.1.1. Kill and restart, beginning with V8.7
restore program : (see dump/restore program)
restricted
filesystems
Practical UNIX & Internet Security, 8.1.5. Restricted Filesystem
Practical UNIX & Internet Security, 8.1.5.2. Checking new software
FTP : Practical UNIX & Internet Security, 17.3.2.5. Restricting FTP with the standard UNIX FTP server
logins : Practical UNIX & Internet Security, 8.3. Restricting Logins
shells
Practical UNIX & Internet Security, 8.1.4.1. Restricted shells under System V UNIX
Practical UNIX & Internet Security, 8.1.4.6. Potential problems with rsh
su use : Practical UNIX & Internet Security, 4.3.6. Restricting su
restrictmailq (sendmail) : Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
retention of backups
Practical UNIX & Internet Security, 7.1.5. How Long Should You Keep a Backup?
Practical UNIX & Internet Security, 7.2.2.2. Retention schedule
(see also networks and networking, backing up)
retina authentication : Building Internet Firewalls, 10.2.1. Something You Are
retired accounts : sendmail, 19.6. Alphabetized m4 Macros
RETR command, in POP : TCP/IP Network Administration, 3.4.2. Post Office Protocol
retry time : sendmail, 34.8. Alphabetized Reference
RetryFactor (Z) option
sendmail, 23.9. The qf File Internals
sendmail, 34.8. Alphabetized Reference
return calls : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
return interval : sendmail, 13.2.2. Limit the Life of Queued Messages
"Return-Path:" header line
sendmail, 30.8. Alphabetized F= Flags
sendmail, 35.10. Alphabetized Reference
"Return-Receipt-To:" header line
sendmail, 18.8. Alphabetized Reference
sendmail, 35.10. Alphabetized Reference
Reverse Address Resolution Protocol : (see RARP)
reverse domain : TCP/IP Network Administration, 4.4.1.1. Obtaining an IN-ADDR.ARPA domain
files
TCP/IP Network Administration, 8.3.5. The Reverse Domain File
TCP/IP Network Administration, C.3.1.6. Domain Name Pointer record
reverse lookups
Building Internet Firewalls, 8.10.4.2. Mismatched data between the hostname
Building Internet Firewalls, 8.10.5.1. Set up a `fake'
Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
Practical UNIX & Internet Security, 23.3. Tips on Writing Network Programs
reviewing security policies : Building Internet Firewalls, 11.1.1.5. Provision for reviews
Revision Control System (RCS)
Practical UNIX & Internet Security, 7.3.2. Building an Automatic Backup System
Practical UNIX & Internet Security, 17.3. Primary UNIX Network Services
revocation certificate : Practical UNIX & Internet Security, 6.6.3.2. Creating your PGP public key
"rewrite" prompt : (see address-testing mode)
rewrite rules
processing sequentially : TCP/IP Network Administration, 10.6.2. Transforming the Address
recursion built-in : TCP/IP Network Administration, 10.6.2. Transforming the Address
syntax of : TCP/IP Network Administration, 10.6.2. Transforming the Address
using external databases in : TCP/IP Network Administration, 10.6.2.1. Transforming with a database
rewriting
addresses
sendmail, 8.3. Rule Sets
sendmail, 11.4.1. Rewrite the Lone Username
rule sets
(see R= equate)
(see S= equate)
User Database : sendmail, 30.8. Alphabetized F= Flags
rex service : Building Internet Firewalls, 8.4.3. rex
rexd service : Practical UNIX & Internet Security, 19.2.2.4. AUTH_KERB
rexec service
Building Internet Firewalls, 8.4.2. rexec
Practical UNIX & Internet Security, 17.3.17. rexec (TCP Port 512)
RFCs (Requests for Comments)
sendmail, The RFCs
TCP/IP Network Administration, 1.1.2. Protocol Standards
TCP/IP Network Administration, 1.4. Network Access Layer
TCP/IP Network Administration, 2.3. Subnets
authorative source : TCP/IP Network Administration, 11.8. Protocol Case Study
keeping up with latest : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
retrieving : TCP/IP Network Administration, 13.4. Retrieving RFCs
rfc-index.txt : TCP/IP Network Administration, 13.4. Retrieving RFCs
RFC819 : sendmail, The RFCs
RFC821
sendmail, The RFCs
sendmail, 30.8. Alphabetized F= Flags
RFC822
sendmail, The RFCs
sendmail, 14.1. Headers
sendmail, 28.1.2. Rules Are Treated Like Addresses
sendmail, 32.5. Alphabetized Reference
sendmail, 35.2. Header Names
sendmail, 35.6.6. Other RFC822 Headers
TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
RFC974 : sendmail, 21.3.7. Ambiguous MX Records
RFC976 : sendmail, The RFCs
RFC1123
sendmail, The RFCs
sendmail, 14.1. Headers
RFC1413 : sendmail, 31.10. Alphabetized Reference
RFC1521 and RFC1522 : sendmail, The RFCs
RFC1597 and RFC1627 : Building Internet Firewalls, 4.5. What the Future Holds
RFC1651 to RFC1653 : sendmail, The RFCs
RFC1750 : Practical UNIX & Internet Security, 23.8. Picking a Random Seed
RFC1891 to RFC1894 : sendmail, The RFCs
RFS (Remote File System) : TCP/IP Network Administration, 3.7.1. File Sharing
.rhosts file
Building Internet Firewalls, 8.4.1. BSD
Practical UNIX & Internet Security, 10.4.3. Network Setup
Practical UNIX & Internet Security, 17.3.18.4. The ~/.rhosts file
Practical UNIX & Internet Security, 17.3.18.5. Searching for .rhosts files
TCP/IP Network Administration, 12.2.5. Secure the r Commands
back door in : Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
intruder's changes to : Practical UNIX & Internet Security, 24.4.1.4. Changes in .rhosts files
searching for : Practical UNIX & Internet Security, 17.3.18.5. Searching for .rhosts files
in security checks : TCP/IP Network Administration, 12.4.2. Looking for Trouble
RHS, rule
sendmail, 8.4. Rules
sendmail, 28.6. The RHS
(see also rule sets)
class macros in : sendmail, 12.1.4. Class Macros in the RHS
RHS triple : sendmail, 9.2. The RHS Triple
richtext text subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
Ring Indicator (RI) : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
RIP (Routing Information Protocol)
Practical UNIX & Internet Security, 17.3.19. Routing Internet Protocol (RIP routed) (UDP Port
TCP/IP Network Administration, 2.2.2. Classless IP Addresses
TCP/IP Network Administration, 6.1.5.3. Metric
TCP/IP Network Administration, 7.4.1. Routing Information Protocol
checking updates : TCP/IP Network Administration, 11.5.1. Checking RIP Updates
configuring : Building Internet Firewalls, 8.12.2. Routing Information Protocol
enabling (in gated) : TCP/IP Network Administration, 7.7.1.1. A host configuration
running : TCP/IP Network Administration, 7.4.1.1. Running RIP with routed
starting : TCP/IP Network Administration, 5.4. The Internet Daemon
statement (in gated) : TCP/IP Network Administration, B.8.2. The rip Statement
Version 2 (RIP-2)
TCP/IP Network Administration, 7.4.2. RIP Version 2
TCP/IP Network Administration, 7.7.1.1. A host configuration
RIP REQUEST command : TCP/IP Network Administration, 11.5.1. Checking RIP Updates
RIPE Network Control Center : TCP/IP Network Administration, 2.4. Internet Routing Architecture
RIPE-181 standard : TCP/IP Network Administration, 2.4. Internet Routing Architecture
ripquery
TCP/IP Network Administration, 11.2. Diagnostic Tools
TCP/IP Network Administration, 11.5.1. Checking RIP Updates
Riseaux IP Europeens (RIPE) Network Control Center (NCC) : TCP/IP Network Administration, 2.4. Internet Routing Architecture
risk assessment
Practical UNIX & Internet Security, 2.2. Risk Assessment
Practical UNIX & Internet Security, 2.2.2. Review Your Risks
Practical UNIX & Internet Security, 2.5.3. Final Words: Risk Management Means Common Sense
risks forum : TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
RISKS mailing list : Building Internet Firewalls, A.3.6. RISKS
Ritchie, Dennis : Practical UNIX & Internet Security, 1.3. History of UNIX
Rivest, Ronald L.
Practical UNIX & Internet Security, 6.1.3. Modern Controversy
Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
Practical UNIX & Internet Security, 6.4.6. RSA and Public Key Cryptography
Practical UNIX & Internet Security, 6.5.4.1. MD2, MD4, and MD5
RJE (Remote Job Entry) : Practical UNIX & Internet Security, 3.2.1. The /etc/passwd File
rlogin command/service
Building Internet Firewalls, 2.3. Remote Terminal Access and Command
Practical UNIX & Internet Security, 1.4.3. Add-On Functionality Breeds Problems
Practical UNIX & Internet Security, 3.5. Verifying Your New Password
Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
Practical UNIX & Internet Security, 17.3.18. rlogin and rsh (TCP Ports 513 and 514)
Practical UNIX & Internet Security, 17.3.18.6. /etc/hosts.lpd file
TCP/IP Network Administration, 4.1. Connected and Non-Connected Networks
TCP/IP Network Administration, 5.3.1.2. Pseudo-device
TCP/IP Network Administration, 12.2.3. One-Time Passwords
TCP/IP Network Administration, 2.7.2. Port Numbers
proxying with TIS FWTK : Building Internet Firewalls, 7.7.2. Telnet and rlogin Proxying with
versus Telnet : Practical UNIX & Internet Security, 17.3.18. rlogin and rsh (TCP Ports 513 and 514)
rm command
Practical UNIX & Internet Security, 5.4. Using Directory Permissions
Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution
deep tree structures and : Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
rmail program : Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution
ro option (read-only access)
for Linux systems : TCP/IP Network Administration, 9.1.2.2. The /etc/exports file
for Solaris systems : TCP/IP Network Administration, 9.1.2.1. The share command
root account/user
Practical UNIX & Internet Security, 4. Users, Groups, and the Superuser
Practical UNIX & Internet Security, 4.1. Users and Groups
Practical UNIX & Internet Security, 4.2.1. The Superuser
Practical UNIX & Internet Security, 4.2.1.5. The problem with the superuser
Practical UNIX & Internet Security, 5.5.2. Problems with SUID
Practical UNIX & Internet Security, 17.4. Security Implications of Network Services
sendmail, Other Books, Other Problems
sendmail, 14.6. Trusted User
sendmail, 22.1. Why root?
TCP/IP Network Administration, 5.4. The Internet Daemon
(see also superusers)
abilities of : Practical UNIX & Internet Security, 27.1.3. What the Superuser Can and Cannot Do
chroot command
Building Internet Firewalls, 8.2.1.3. Providing anonymous
Practical UNIX & Internet Security, 8.1.5. Restricted Filesystem
Practical UNIX & Internet Security, 8.1.5.2. Checking new software
Practical UNIX & Internet Security, 11.1.4. Trojan Horses
Practical UNIX & Internet Security, 23.4.1. Using chroot()
with anonymous FTP : Practical UNIX & Internet Security, 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP
immutable files and : Practical UNIX & Internet Security, 9.1.1. Immutable and Append-Only Files
network services with : Practical UNIX & Internet Security, 17.4. Security Implications of Network Services
options that don't run on : sendmail, 34.1.4. Options that Are Safe
protecting
Practical UNIX & Internet Security, 8.5. Protecting the root Account
Practical UNIX & Internet Security, 8.5.3.2. Trusted computing base
on remote machine, fingering : Practical UNIX & Internet Security, 24.2.4.2. How to contact the system administrator of a computer
single-command accounts and : Practical UNIX & Internet Security, 8.1.3. Accounts That Run a Single Command
SUID_ROOT_FILES_OK macro : sendmail, 18.8. Alphabetized Reference
web server as : Practical UNIX & Internet Security, 18.2.1. The Server's UID
root directory : Practical UNIX & Internet Security, 5.1.1. Directories
backups of : Practical UNIX & Internet Security, 7.1.3. Types of Backups
UUCP access from : Practical UNIX & Internet Security, 15.4.2.1. Some bad examples
root domain : TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
root server : TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
configuring : TCP/IP Network Administration, 8.3.1. The named.boot File
entries, corrupted : TCP/IP Network Administration, 11.6.3. Cache corruption
root option for /etc/exports : Practical UNIX & Internet Security, 20.2.1.1. /etc/exports
root=host option (root access for specified host) : TCP/IP Network Administration, 9.1.2.1. The share command
ROT13 algorithm
Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
Practical UNIX & Internet Security, 6.4.3. ROT13: Great for Encoding Offensive Jokes
rotating backup media
Practical UNIX & Internet Security, 7.1.3. Types of Backups
Practical UNIX & Internet Security, 7.2.1.2. Media rotation
route command
TCP/IP Network Administration, 6.1.5.3. Metric
TCP/IP Network Administration, 6.4.1. slattach
TCP/IP Network Administration, 7.3. Building a Static Routing Table
TCP/IP Network Administration, 7.3.1.1. Installing static routes at startup
route add command : TCP/IP Network Administration, 11.5. Checking Routing
routes
addressing
sendmail, 17.1.5. The % Hack
sendmail, 21.5.1. Offsite MX Hosts
sendmail, 29.4.3. Handling Routing Addresses
d flag and : sendmail, 30.8. Alphabetized F= Flags
pruning : sendmail, 34.8. Alphabetized Reference
dampening : TCP/IP Network Administration, B.8.5. The bgp Statement
duplicate, silently ignored : TCP/IP Network Administration, B.8.5. The bgp Statement
filters : TCP/IP Network Administration, 7.7.1.3. Exterior gateway configuration
server entry, bogus : TCP/IP Network Administration, 8.3.3. The Cache Initialization File
routed daemon
Building Internet Firewalls, 5.8.2.4. Which services should you disable?
Practical UNIX & Internet Security, 17.3.19. Routing Internet Protocol (RIP routed) (UDP Port
TCP/IP Network Administration, 5.4. The Internet Daemon
TCP/IP Network Administration, 7.4.1. Routing Information Protocol
routerdiscovery statement (in gated) : TCP/IP Network Administration, B.8.10. The routerdiscovery Statement
routerid
TCP/IP Network Administration, 7.7.1.2. Interior gateway configurations
TCP/IP Network Administration, B.7. Definition Statements
routers and routing
Building Internet Firewalls, 6. Packet Filtering
Practical UNIX & Internet Security, 16.2.2. Routing
TCP/IP Network Administration, 1.7. Application Layer
TCP/IP Network Administration, 2.1. Addressing, Routing, and Multiplexing
(see also dynamic, routing; static, routing)
areas, hierarchy of : TCP/IP Network Administration, 7.4.3. Open Shortest Path First
as choke point : Building Internet Firewalls, 6.1. Why Packet Filtering?
choosing : Building Internet Firewalls, 6.8. Choosing a Packet Filtering
commonest configurations : TCP/IP Network Administration, 7.1. Common Routing Configurations
consolidated : TCP/IP Network Administration, 2.2.2. Classless IP Addresses
datagrams : (see datagrams)
defined : TCP/IP Network Administration, 7. Configuring Routing
disabling : Building Internet Firewalls, 5.8.2.5. Turning off routing
domains
Building Internet Firewalls, C.10. Internet Routing Architecture
TCP/IP Network Administration, 2.4. Internet Routing Architecture
end-to-end : (see end-to-end)
exterior (or access) : (see exterior routers)
handling packets : Building Internet Firewalls, 6.4. What Does the Router Do with
intelligent : Practical UNIX & Internet Security, 21.2.3. Setting Up the Choke
information, exchanging : TCP/IP Network Administration, 1.7. Application Layer
interior
Building Internet Firewalls, 4.2.3.3. Interior router
TCP/IP Network Administration, 12.7. Firewalls
configuring : Building Internet Firewalls, 9.1.2.1. Interior Router
merging with bastion host : Building Internet Firewalls, 4.3.4. It's Dangerous to Merge the Bastion
merging with exterior router : Building Internet Firewalls, 4.3.2. It's OK to Merge the Interior Router and the Exterior Router
multiple : Building Internet Firewalls, 4.3.5. It's Dangerous to Use Multiple
interoperability with routers : TCP/IP Network Administration, B.8.5. The bgp Statement
logging actions of : Building Internet Firewalls, 6.4.1. Logging Actions
merging interior and exterior : Building Internet Firewalls, 4.3.2. It's OK to Merge the Interior Router and the Exterior Router
metric
TCP/IP Network Administration, 6.1.5.3. Metric
TCP/IP Network Administration, 7.3. Building a Static Routing Table
multicast
Building Internet Firewalls, 6.3.3.5. IP over IP
Building Internet Firewalls, 8.9.3. The Multicast Backbone (MBONE)
multi-path : TCP/IP Network Administration, 7.4.3. Open Shortest Path First
planning : TCP/IP Network Administration, 4.3. Planning Routing
policy
TCP/IP Network Administration, 7.6. Gateway Routing Daemon
TCP/IP Network Administration, B.10. Control Statements
protocols
TCP/IP Network Administration, 4. Getting Started
TCP/IP Network Administration, 4.2.2. Defining the Subnet Mask
(see also RIP)
choosing : TCP/IP Network Administration, 7.5.3. Choosing a Routing Protocol
defined : TCP/IP Network Administration, 7.1. Common Routing Configurations
interior : TCP/IP Network Administration, 7.4. Interior Routing Protocols
using gated for : TCP/IP Network Administration, 7.7.1.3. Exterior gateway configuration
responsibilities of : TCP/IP Network Administration, 7.1. Common Routing Configurations
returning ICMP error codes : Building Internet Firewalls, 6.4.2. Returning ICMP
screening : (see screening routers)
single-purpose versus general-purpose : Building Internet Firewalls, 6.8.2. It Can Be a Single-Purpose Router or
source : Building Internet Firewalls, 5.8.2.5. Turning off routing
tables
Building Internet Firewalls, C.11. The Routing Table
TCP/IP Network Administration, 2.5. The Routing Table
TCP/IP Network Administration, 7.1. Common Routing Configurations
building manually : TCP/IP Network Administration, 7.1. Common Routing Configurations
checking : TCP/IP Network Administration, 11.5. Checking Routing
minimal : TCP/IP Network Administration, 7.2. The Minimal Routing Table
unstable : TCP/IP Network Administration, B.8.5. The bgp Statement
viewing contents of : TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
testing : Building Internet Firewalls, 4.4.1. Laboratory Networks
troubleshooting : TCP/IP Network Administration, 11.5. Checking Routing
where to filter : Building Internet Firewalls, 6.8.8. It Should Have Good Testing and
Routing Arbiters
TCP/IP Network Administration, 2.4. Internet Routing Architecture
TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
Routing Information Protocol : (see RIP)
RPC table (NIS+) : Practical UNIX & Internet Security, 19.5.3. NIS+ Tables
rpc.rexdserver : Practical UNIX & Internet Security, 17.3.22. RPC rpc.rexd (TCP Port 512)
rpcbind : (see portmapper)
RPCs (remote procedure calls)
Building Internet Firewalls, 5.8.2.4. Which services should you disable?
Building Internet Firewalls, 6.3.3.4. RPC
Practical UNIX & Internet Security, 17.3.22. RPC rpc.rexd (TCP Port 512)
Practical UNIX & Internet Security, 19. RPC, NIS, NIS+, and Kerberos
Practical UNIX & Internet Security, 19.7.2. SESAME
TCP/IP Network Administration, 2.7.2. Port Numbers
(see also NFS; NIS)
authentication of
Practical UNIX & Internet Security, 19.2.2. RPC Authentication
Practical UNIX & Internet Security, 19.2.2.4. AUTH_KERB
portmapper program : Practical UNIX & Internet Security, 17.3.11. Sun RPC's portmapper (UDP and TCP Ports 111)
Secure : (see Secure RPC)
spoofing : Practical UNIX & Internet Security, 19.4.4.4. Spoofing RPC
RRs (standard resource records) : TCP/IP Network Administration, 8.3.2. Standard Resource Records
in named : TCP/IP Network Administration, C.3.1. Standard Resource Records
RS-232 serial protocol : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
rs.internic.net : TCP/IP Network Administration, 13.6. The White Pages
RS232C : TCP/IP Network Administration, 1.2. A Data Communications Model
RSA algorithm
Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
Practical UNIX & Internet Security, 6.4.6. RSA and Public Key Cryptography
Practical UNIX & Internet Security, 6.4.6.3. Strength of RSA
Practical UNIX & Internet Security, 6.5.3. Digital Signatures
rsh (restricted shell)
Building Internet Firewalls, 2.3. Remote Terminal Access and Command
Practical UNIX & Internet Security, 8.1.4.1. Restricted shells under System V UNIX
Practical UNIX & Internet Security, 8.1.4.6. Potential problems with rsh
Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
Practical UNIX & Internet Security, 17.3.18. rlogin and rsh (TCP Ports 513 and 514)
Practical UNIX & Internet Security, 17.3.18.6. /etc/hosts.lpd file
rshd program : Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
RUIDs : (see real UIDs/GIDs)
rule sets
sendmail, 5.3.4. Rule Sets
sendmail, 6.3.1. Skipping Rule Sets
sendmail, 8.3. Rule Sets
sendmail, 29. Rule Sets
TCP/IP Network Administration, 10.6.3. The Set Ruleset Command
(see also rules)
check_ : sendmail, 29.10. The check_... Rule Sets
check_mail rule set : sendmail, 20.2.6. Reject Mail from Spamming or Mail-bombing Sites
debug_dumpstate : sendmail, 26.3.3.3. -- ruleset debug_dumpstate returns stat ..., pv: --
Hubset
sendmail, 11.2. Rule Set S=
sendmail, 11.4. Rule Set Hubset
m4 keywords for : sendmail, 19.4.3. Rules and rule sets
m4 preprocessor and : sendmail, 29.2. Rule Sets and m4
recipient-rewriting : (see R= equate)
rule set 0
sendmail, 9. Rule Set 0
sendmail, 17.3. Rule Set 0
sendmail, 19.6. Alphabetized m4 Macros
sendmail, 29.6. Rule Set 0
mailertables : sendmail, 19.6. Alphabetized m4 Macros
rule set 1
sendmail, 11.7. Rule Set 1
sendmail, 19.6. Alphabetized m4 Macros
sendmail, 29.9. Rule Set 1
rule set 2
sendmail, 19.6. Alphabetized m4 Macros
sendmail, 29.8. Rule Set 2
rule set 3
sendmail, 10. Rule Set 3
sendmail, 17.1. Rule Set 3
sendmail, 19.6. Alphabetized m4 Macros
sendmail, 29.4. Rule Set 3
sendmail, 38.6.3. Rule 3 Always Called First with -bt
rule set 4
sendmail, 17.4. Rule Set 4
sendmail, 29.5. Rule Set 4
rule set 5
sendmail, 19.6. Alphabetized m4 Macros
sendmail, 29.7. Rule Set 5
sendmail, 30.8. Alphabetized F= Flags
rule set 96 : sendmail, 17.2. Rule Set 96
S= and : (see S= equate)
sender-rewriting : (see S= equate)
rule-testing mode
sendmail, 36.7. Alphabetized Reference
sendmail, 38. Rule-Set Testing with -bt
debugging and : sendmail, 38.7. Add Debugging for Detail
rules
sendmail, 8.2. Why Rules?
sendmail, 28. Rules
(see also rule sets)
(see protocols, standards)
for address transformation : sendmail, 5.3.3. Rules
LHS and RHS syntax
sendmail, 8.4. Rules
sendmail, 28.4. The Behavior of a Rule
m4 keywords for : sendmail, 19.4.3. Rules and rule sets
mail hub : sendmail, 17. The Hub's Complex Rules
processing flow of
sendmail, 10.5. Details of Rule Flow
sendmail, 29.3. The Sequence of Rule Sets
relays : sendmail, 19.4.5. Relays
rewriting using other rule sets : sendmail, 28.6.4. Rewrite Through Another Rule Set: $>set
showing by rule set : sendmail, 38.4.1. Show Rules in a Rule Set with =S
wildcards operators in : sendmail, 8.7. Wildcard Operators
runacct command : Practical UNIX & Internet Security, 10.2. The acct/pacct Process Accounting File
RunAsUser option : sendmail, 34.8. Alphabetized Reference
ruusend command : Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution
rw option (read and write access)
/etc/exports : Practical UNIX & Internet Security, 20.2.1.1. /etc/exports
for Linux systems : TCP/IP Network Administration, 9.1.2.2. The /etc/exports file
for Solaris systems : TCP/IP Network Administration, 9.1.2.1. The share command


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.