Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: P

P configuration command
sendmail, 5.3.9. Priority
sendmail, 14.4. Precedence
sendmail, 35.8.1. The P Configuration Command
p flag : sendmail, 30.8. Alphabetized F= Flags
P flag : sendmail, 30.8. Alphabetized F= Flags
P line (qf file) : sendmail, 23.9. The qf File Internals
$p macro : sendmail, 31.10. Alphabetized Reference
p option : (see PrivacyOptions (p) option)
P option : (see PostmasterCopy (P) option)
-p switch (sendmail) : sendmail, 36.7. Alphabetized Reference
P= equate
sendmail, 6.2. Define a Mail Delivery Agent
sendmail, 6.3. The local Delivery Agent
sendmail, 22.4.4. The P= of Delivery Agents
sendmail, 30.4. The Equates
pacct file : Practical UNIX & Internet Security, 10.2. The acct/pacct Process Accounting File
pack program : Practical UNIX & Internet Security, 6.6.1.2. Ways of improving the security of crypt
packages, auditing : Building Internet Firewalls, 5.8.5.1. Auditing packages
packet filtering
Building Internet Firewalls, 4.1. Some Firewall Definitions
Building Internet Firewalls, 4.1.1. Packet Filtering
Building Internet Firewalls, 6. Packet Filtering
TCP/IP Network Administration, 1.7. Application Layer
TCP/IP Network Administration, 11.7.1. Packet Filters
TCP/IP Network Administration, 11.9. Simple Network Management Protocol
by address : Building Internet Firewalls, 6.6. Filtering by Address
advice for : Building Internet Firewalls, 6.5. Conventions for Packet Filtering
Archie : Building Internet Firewalls, 8.7.3.1. Packet filtering characteristics of
bugs in packages : Building Internet Firewalls, 6.1.2.1. Current filtering tools are not perfect
choosing a router : Building Internet Firewalls, 6.8. Choosing a Packet Filtering
configuring router : Building Internet Firewalls, 6.2. Configuring a Packet Filtering
constructing filters : TCP/IP Network Administration, 11.7.1. Packet Filters
conventions for : Building Internet Firewalls, 6.8.3. It Should Allow Simple Specification
DNS
Building Internet Firewalls, 8.10.1. Packet Filtering Characteristics of
Building Internet Firewalls, 8.10.5.5. What your packet filtering system
dynamic : Building Internet Firewalls, 6.3.3.2. UDP
example of : Building Internet Firewalls, 6.10. Putting It All Together
with exterior router : Building Internet Firewalls, 4.2.3.4. Exterior router
finger : Building Internet Firewalls, 8.8.1.1. Packet filtering characteristics of
in firewalls : TCP/IP Network Administration, 12.7. Firewalls
FSP : Building Internet Firewalls, 8.2.3.1. Packet filtering characteristics of
FTP : Building Internet Firewalls, 8.2.1.1. Packet filtering characteristics of
Gopher : Building Internet Firewalls, 8.7.1.1. Packet filtering characteristics of
HTTP : Building Internet Firewalls, 8.6.1. Packet Filtering Characteristics of
ICMP : Building Internet Firewalls, 8.12.5.1. Packet filtering characteristics of
inbound versus outbound : Building Internet Firewalls, 6.8.6. It Should Apply Rules Separately to
with interior router : Building Internet Firewalls, 4.2.3.3. Interior router
IP : (see IP)
IRC : Building Internet Firewalls, 8.9.2.1. Packet filtering characteristics of
lp : Building Internet Firewalls, 8.17.3. Packet Filtering and Proxying
lpr : Building Internet Firewalls, 8.17.1. Packet Filtering Characteristics of
NFS : Building Internet Firewalls, 8.14.1. Packet Filtering Characteristics of
NIS : Building Internet Firewalls, 8.15.1. Packet Filtering Characteristics of
NNTP
Building Internet Firewalls, 8.5.1. Packet Filtering Characteristics of
Building Internet Firewalls, 8.5.4. Good Ways to Set up
NTP : Building Internet Firewalls, 8.13.1. Packet Filtering Characteristics of
performance level of : Building Internet Firewalls, 6.8.1. It Should Have Good Enough
perimeter, and encryption : Building Internet Firewalls, 10.5.3. Where Do You Encrypt?
ping : Building Internet Firewalls, 8.12.3.1. Packet filtering characteristics of
POP : Building Internet Firewalls, 8.1.2.1. Packet filtering characteristics of
primitives used, listed : TCP/IP Network Administration, 11.7.1. Packet Filters
r commands : Building Internet Firewalls, 8.4.1.1. Packet filtering characteristics of
rex : Building Internet Firewalls, 8.4.3.1. Packet filtering characteristics of
rexec : Building Internet Firewalls, 8.4.2.1. Packet filtering characteristics of
RIP : Building Internet Firewalls, 8.12.2.1. Packet filtering characteristics of
rules for : Building Internet Firewalls, 6.5. Conventions for Packet Filtering
in screened host architecture : Building Internet Firewalls, 9.2.2. Packet Filtering Rules
in screened subnet architecture : Building Internet Firewalls, 9.1.2. Packet Filtering Rules
sequence of : Building Internet Firewalls, 6.8.5. It Should Apply Rules in the Order
screened host architecture : Building Internet Firewalls, 4.2.2. Screened Host Architecture
by service : Building Internet Firewalls, 6.7. Filtering by Service
SMTP : Building Internet Firewalls, 8.1.1.4. Packet filtering characteristics of
SNMP : Building Internet Firewalls, 8.12.1.1. Packet filtering characteristics of
by source port : Building Internet Firewalls, 6.7.4. Risks of Filtering by Source
syslog : Building Internet Firewalls, 8.11.1. Packet Filtering Characteristics of
talk : Building Internet Firewalls, 8.9.1.1. Packet filtering characteristics of
Telnet : Building Internet Firewalls, 8.3.1. Packet Filtering Characteristics of
testing : Building Internet Firewalls, 6.8.7. It Should Be Able to Log Accepted and
TFTP : Building Internet Firewalls, 8.2.2.1. Packet filtering characteristics of
tools for : Building Internet Firewalls, B.3. Packet Filtering Tools
traceroute : Building Internet Firewalls, 8.12.4.1. Packet filtering characteristics of
transparency of : Building Internet Firewalls, 6.1.1.2. Packet filtering doesn't require user knowledge or
UUCP : Building Internet Firewalls, 8.2.4.1. Packet filtering characteristics of
WAIS : Building Internet Firewalls, 8.7.2.1. Packet filtering characteristics of
where to do : Building Internet Firewalls, 6.8.8. It Should Have Good Testing and
whois : Building Internet Firewalls, 8.8.2.1. Packet filtering characteristics of
X11 : Building Internet Firewalls, 8.16.1. Packet Filtering Characteristics of
packet sniffing
Building Internet Firewalls, 10.1.2. Packet Sniffing
Practical UNIX & Internet Security, 16.3.1. Link-level Security
Practical UNIX & Internet Security, 17.3.3. TELNET (TCP Port 23)
(see also sniffing)
packet switching
Practical UNIX & Internet Security, 16.2. IPv4: The Internet Protocol Version 4
Practical UNIX & Internet Security, 16.3. IP Security
TCP/IP Network Administration, 1.5.1.1. The datagram
TCP/IP Network Administration, 1.7. Application Layer
packets
Building Internet Firewalls, 4.1. Some Firewall Definitions
Building Internet Firewalls, 6. Packet Filtering
Building Internet Firewalls, 6.3.1.2. IP layer
Building Internet Firewalls, 8.12.4. traceroute
Practical UNIX & Internet Security, 16.2. IPv4: The Internet Protocol Version 4
Practical UNIX & Internet Security, 16.2.4. Packets and Protocols
Practical UNIX & Internet Security, 16.2.4.3. UDP
TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
(see also traceroute utility)
authentication : (see authentication)
bogus, interjecting : TCP/IP Network Administration, 5.3.1.1. Options
capturing : TCP/IP Network Administration, 5.3.1.2. Pseudo-device
damaged : TCP/IP Network Administration, 6.1.1. Determining the Interface Name
eavesdropping : (see packet sniffing)
encrypting : (see encryption)
forged : Building Internet Firewalls, 6.3.7. Non-IP Protocols
fragmenting
Building Internet Firewalls, 6.3.1.2. IP layer
Building Internet Firewalls, 6.3.2.2. IP fragmentation
handling (by router) : Building Internet Firewalls, 6.4. What Does the Router Do with
headers of : Building Internet Firewalls, 6.3. What Does a Packet Look Like?
ICMP : Building Internet Firewalls, 8.12.5. Other ICMP Packets
inbound versus outbound : Building Internet Firewalls, 6.2.2. Be Careful of `Inbound'
monitoring : Practical UNIX & Internet Security, 12.3.1.2. Eavesdropping by Ethernet and 10Base-T
options in DHCP : TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
queued : TCP/IP Network Administration, 6.1.1. Determining the Interface Name
rates of : Building Internet Firewalls, 6.8.1. It Should Have Good Enough
routing : TCP/IP Network Administration, 1.5.1.1. The datagram
source-routed : Building Internet Firewalls, 5.8.2.5. Turning off routing
structure : Building Internet Firewalls, 6.3. What Does a Packet Look Like?
TCP : Building Internet Firewalls, 6.3.3.1. TCP
UDP : Building Internet Firewalls, 6.3.3.2. UDP
update : TCP/IP Network Administration, 7.4.1. Routing Information Protocol
packetsize : TCP/IP Network Administration, 11.3.1. The ping Command
PAP (Password Authentication Protocol)
TCP/IP Network Administration, 6.3.4. PPP Daemon Security
TCP/IP Network Administration, A.2. The PPP Daemon
pap-secrets file : TCP/IP Network Administration, 6.3.4. PPP Daemon Security
paper
backups on : Practical UNIX & Internet Security, 24.5.1. Never Trust Anything Except Hardcopy
copies : Practical UNIX & Internet Security, 7.3.2. Building an Automatic Backup System
logging on : Practical UNIX & Internet Security, 10.7. Handwritten Logs
throwing out : Practical UNIX & Internet Security, 12.3.3. Other Media
PAR (Positive Acknowledgment with Retransmission) : Building Internet Firewalls, C.6.2. Transmission Control Protocol
Parallel Line IP (PLIP) : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
parallel multipart subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
parent processes : Practical UNIX & Internet Security, C.2. Creating Processes
parentheses (), for continuation characters : TCP/IP Network Administration, C.3.1. Standard Resource Records
/parse rule-testing command
sendmail, 15.1. Test the Configuration File
sendmail, 38.5.5. Parse an Address with /parse
parsing addresses
sendmail, 15.1. Test the Configuration File
sendmail, 38.5.5. Parse an Address with /parse
(see also rule set 3)
partial message subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
partitions : Practical UNIX & Internet Security, 25.2.2.4. Using partitions to protect your users
backup by : Practical UNIX & Internet Security, 7.1.3. Types of Backups
root : (see root directory)
pass phrases for PGP
Practical UNIX & Internet Security, 6.6.3.1. Encrypting files with IDEA
(see also passwords)
passing data : (see data, communications model)
passive FTP
Building Internet Firewalls, 8.2.1.1. Packet filtering characteristics of
Practical UNIX & Internet Security, 17.3.2.2. Passive vs. active FTP
Practical UNIX & Internet Security, 17.3.2.3. FTP passive mode
passive option
in pppd : TCP/IP Network Administration, 6.3.5. PPP Server Configuration
in RIP
TCP/IP Network Administration, 7.4.1.1. Running RIP with routed
TCP/IP Network Administration, 7.7.1.2. Interior gateway configurations
passwd command
Practical UNIX & Internet Security, 3.4. Changing Your Password
Practical UNIX & Internet Security, 8.6.2. What Is Salt?
as SUID program : Practical UNIX & Internet Security, 5.5. SUID
-l option
Practical UNIX & Internet Security, 8.4.1. Changing an Account's Password
Practical UNIX & Internet Security, 8.8.8. Disabling an Account by Changing Its Password
-n option : Practical UNIX & Internet Security, 8.8.6. Password Aging and Expiration
-x option : Practical UNIX & Internet Security, 8.8.6. Password Aging and Expiration
-f nomemory option : Practical UNIX & Internet Security, 3.5. Verifying Your New Password
using as superuser : Practical UNIX & Internet Security, 3.5. Verifying Your New Password
passwd command line : TCP/IP Network Administration, 12.2.1. The Shadow Password File
passwd file
Practical UNIX & Internet Security, 1.2. What Is an Operating System?
Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
Practical UNIX & Internet Security, 4.2.3. Impact of the /etc/passwd and /etc/group
Practical UNIX & Internet Security, 7.1.2. What Should You Back Up?
Practical UNIX & Internet Security, 8.1.1. Accounts Without Passwords
Practical UNIX & Internet Security, 8.6. The UNIX Encrypted Password System
Practical UNIX & Internet Security, 15.1.4. How the UUCP Commands Work
Practical UNIX & Internet Security, 24.4.1. New Accounts
Practical UNIX & Internet Security, C.5.1. Process #1: /etc/init
sendmail, 30.8. Alphabetized F= Flags
TCP/IP Network Administration, 6.3.2. Dial-Up PPP
TCP/IP Network Administration, 6.3.5. PPP Server Configuration
TCP/IP Network Administration, 6.4.3. SLIP Server Configuration
TCP/IP Network Administration, 9.1.5. NFS Authentication Server
TCP/IP Network Administration, 9.3. Network Information Service
TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros
TCP/IP Network Administration, 12.2.1. The Shadow Password File
TCP/IP Network Administration, 13.2.1. Creating an FTP Server
+ in : (see NIS)
accounts without passwords : Practical UNIX & Internet Security, 8.1.1. Accounts Without Passwords
backing up : Practical UNIX & Internet Security, 7.1.2. What Should You Back Up?
gecos field : sendmail, 14.2.1. The Full-Name: Header
mail hubs and : sendmail, 6. The Mail Hub and Delivery Agents
new accounts : Practical UNIX & Internet Security, 24.4.1. New Accounts
NFS : Practical UNIX & Internet Security, 20.2.1.1. /etc/exports
protecting : TCP/IP Network Administration, 12.2. User Authentication
in security checks : TCP/IP Network Administration, 12.4.2. Looking for Trouble
trusted users and : sendmail, 14.6. Trusted User
user database class for : sendmail, 33.8. Alphabetized Reference
uucp user and : Practical UNIX & Internet Security, 15.1.4. How the UUCP Commands Work
Passwd table (NIS+) : Practical UNIX & Internet Security, 19.5.3. NIS+ Tables
passwd+ package
Practical UNIX & Internet Security, 8.8.2. Constraining Passwords
Practical UNIX & Internet Security, 8.8.4. Password Generators
Password Authentication Protocol (PAP)
TCP/IP Network Administration, 6.3.4. PPP Daemon Security
TCP/IP Network Administration, A.2. The PPP Daemon
password file
Practical UNIX & Internet Security, 19.4.4.6. NIS is confused about "+"
(see also passwd file)
password modems : Practical UNIX & Internet Security, 14.6. Additional Security for Modems
password.adjunct file : Practical UNIX & Internet Security, 8.8.5. Shadow Password Files
passwords
Building Internet Firewalls, 10.2. What Is Authentication?
Building Internet Firewalls, 10.2.2. Something You Know
Practical UNIX & Internet Security, 3.2. Passwords
Practical UNIX & Internet Security, 3.6.1. Bad Passwords: Open Doors
Practical UNIX & Internet Security, 3.8. Summary
Practical UNIX & Internet Security, 17.4. Security Implications of Network Services
Practical UNIX & Internet Security, 23.5. Tips on Using Passwords
TCP/IP Network Administration, 1.7. Application Layer
(see also authentication)
(see also shadow file)
accounts without : Practical UNIX & Internet Security, 8.1.1. Accounts Without Passwords
aging
Building Internet Firewalls, 12.1.2. Managing Your Accounts
TCP/IP Network Administration, 12.2.1. The Shadow Password File
assigning to users : Practical UNIX & Internet Security, 8.8.1. Assigning Passwords to Users
authentication based on
TCP/IP Network Administration, 7.4.3. Open Shortest Path First
TCP/IP Network Administration, 7.7.1.2. Interior gateway configurations
TCP/IP Network Administration, 9.1.5. NFS Authentication Server
avoiding conventional
Practical UNIX & Internet Security, 8.8. Administrative Techniques for Conventional Passwords
Practical UNIX & Internet Security, 8.8.9. Account Names Revisited: Using Aliases for Increased
bad choices for
Practical UNIX & Internet Security, 3.6.1. Bad Passwords: Open Doors
Practical UNIX & Internet Security, 3.6.4. Passwords on Multiple Machines
checklist for : Practical UNIX & Internet Security, A.1.1.2. Chapter 3: Users and Passwords
choosing, generating
Practical UNIX & Internet Security, 8.8.4. Password Generators
TCP/IP Network Administration, 12.2.2. Choosing a Password
changing
Practical UNIX & Internet Security, 3.4. Changing Your Password
Practical UNIX & Internet Security, 3.5. Verifying Your New Password
Practical UNIX & Internet Security, 8.4.1. Changing an Account's Password
Practical UNIX & Internet Security, 8.8.8. Disabling an Account by Changing Its Password
TCP/IP Network Administration, 12.2. User Authentication
time-based : Building Internet Firewalls, 10.3.2. Time-based Passwords
tricks used to avoid changing : TCP/IP Network Administration, 12.2.1. The Shadow Password File
constraining : Practical UNIX & Internet Security, 8.8.2. Constraining Passwords
conventional : Practical UNIX & Internet Security, 3.2.6. Conventional UNIX Passwords
cracking, guessing, stealing
Practical UNIX & Internet Security, 3.6.1. Bad Passwords: Open Doors
Practical UNIX & Internet Security, 3.6.3. Good Passwords: Locked Doors
Practical UNIX & Internet Security, 3.6.4. Passwords on Multiple Machines
Practical UNIX & Internet Security, 8.6.1. The crypt()
Practical UNIX & Internet Security, 8.8.3. Cracking Your Own Passwords
Practical UNIX & Internet Security, 8.8.3.2. The dilemma of password crackers
Practical UNIX & Internet Security, 17.3.3. TELNET (TCP Port 23)
TCP/IP Network Administration, 12.2. User Authentication
logging failed attempts : Practical UNIX & Internet Security, 10.5.3. syslog Messages
sniffing
Building Internet Firewalls, 1.2.1.3. Information Theft
Building Internet Firewalls, 10.1.2. Packet Sniffing
Building Internet Firewalls, 10.3.1. One-Time Passwords
Practical UNIX & Internet Security, 1.4.3. Add-On Functionality Breeds Problems
Practical UNIX & Internet Security, 3. Users and Passwords
Practical UNIX & Internet Security, 8.7. One-Time Passwords
Practical UNIX & Internet Security, 16.3. IP Security
Practical UNIX & Internet Security, 17.3.3. TELNET (TCP Port 23)
(see also eavesdropping)
(see also packet sniffing)
stealing with network taps : Building Internet Firewalls, 1.2.1.3. Information Theft
encrypting
Practical UNIX & Internet Security, 8.6. The UNIX Encrypted Password System
Practical UNIX & Internet Security, 8.6.4. Crypt16() and Other Algorithms
expiring : Practical UNIX & Internet Security, 8.8.6. Password Aging and Expiration
false authentication and : Building Internet Firewalls, 10.1.3. False Authentication
federal jurisdiction over : Practical UNIX & Internet Security, 26.2.2. Federal Jurisdiction
FTP and : Practical UNIX & Internet Security, 17.3.2. (FTP) File Transfer Protocol (TCP Ports 20 and 21)
hit lists of : Practical UNIX & Internet Security, 3.6.1. Bad Passwords: Open Doors
Kerberos : Practical UNIX & Internet Security, 19.6.5. Kerberos Limitations
logging changes to : Practical UNIX & Internet Security, 10.7.2.1. Exception and activity reports
for MUDs : Practical UNIX & Internet Security, 17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC)
on multiple machines
Practical UNIX & Internet Security, 3.6.4. Passwords on Multiple Machines
Practical UNIX & Internet Security, 3.6.5. Writing Down Passwords
over network connections : Practical UNIX & Internet Security, 23.3. Tips on Writing Network Programs
with network services : Practical UNIX & Internet Security, 17.4. Security Implications of Network Services
NIS, with Secure RPC : Practical UNIX & Internet Security, 19.3.2.1. Creating passwords for users
NIS+, changing : Practical UNIX & Internet Security, 19.5.4.1. Changing your password
one-time
Building Internet Firewalls, 10.3.1. One-Time Passwords
Practical UNIX & Internet Security, 8.7. One-Time Passwords
Practical UNIX & Internet Security, 8.7.3. Code Books
Practical UNIX & Internet Security, 17.4. Security Implications of Network Services
Practical UNIX & Internet Security, 23.3. Tips on Writing Network Programs
TCP/IP Network Administration, Preface
TCP/IP Network Administration, 12.2.3. One-Time Passwords
password coach : Practical UNIX & Internet Security, 8.8.4. Password Generators
with POP : Practical UNIX & Internet Security, 17.3.10. Post Office Protocol (POP) (TCP Ports
required for Web use
Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
Practical UNIX & Internet Security, 18.3.3. Setting Up Web Users and Passwords
shadow
Practical UNIX & Internet Security, 8.4.1. Changing an Account's Password
Practical UNIX & Internet Security, 8.8.5. Shadow Password Files
system clock and : Practical UNIX & Internet Security, 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
token cards with : Practical UNIX & Internet Security, 8.7.2. Token Cards
usernames as : Practical UNIX & Internet Security, 8.8.3.1. Joetest: a simple password cracker
UUCP accounts : Practical UNIX & Internet Security, 15.3.2. Establishing UUCP Passwords
verifying new : Practical UNIX & Internet Security, 3.5. Verifying Your New Password
wizard's (sendmail) : Practical UNIX & Internet Security, 17.3.4.1. sendmail and security
writing down
Practical UNIX & Internet Security, 3.6.5. Writing Down Passwords
TCP/IP Network Administration, 12.2.4. OPIE
patches
Building Internet Firewalls, 12.3.2. Keeping Your Systems Up To Date
Practical UNIX & Internet Security, 10.7.2.2. Informational material
patents
Practical UNIX & Internet Security, 6.7.1. Cryptography and the U.S. Patent System
Practical UNIX & Internet Security, 26.4.4. Patent Concerns
paths : Practical UNIX & Internet Security, 5.1.3. Current Directory and Paths
delivery agent : sendmail, 30.4. The Equates
to execution directories : sendmail, 30.4. The Equates
for .forward file : sendmail, 22.8.3.2. The ForwardPath option
return, per RFC821 : sendmail, 30.8. Alphabetized F= Flags
trusted : Practical UNIX & Internet Security, 8.5.3.1. Trusted path
path MTU discovery code : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
PATH variable
Practical UNIX & Internet Security, 8.1.4.1. Restricted shells under System V UNIX
Practical UNIX & Internet Security, 8.1.4.6. Potential problems with rsh
Practical UNIX & Internet Security, 23.4. Tips on Writing SUID/SGID Programs
attacks via : Practical UNIX & Internet Security, 11.5.1.1. PATH attacks
path vector protocols : TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
PATH... macros : sendmail, 18.8. Alphabetized Reference
pathname
Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
sendmail, 12.2. The File Form of Class
mail delivery program
sendmail, 6.2. Define a Mail Delivery Agent
sendmail, 6.3. The local Delivery Agent
sendmail, 22.4.4. The P= of Delivery Agents
UUCP and : sendmail, 8.1.4. UUCP and Host Paths
pattern matching
TCP/IP Network Administration, 10.6.1. Pattern Matching
(see $ operators; wildcard operators)
symbols for : TCP/IP Network Administration, 10.5.3. The Define Class Command
pax program : Practical UNIX & Internet Security, 7.4.2. Simple Archives
PC NFS Authentication and Print Server (pcnfsd) : TCP/IP Network Administration, 9.1.5. NFS Authentication Server
pcbind service : Building Internet Firewalls, 5.8.2.4. Which services should you disable?
PCERT (Purdue University) : Practical UNIX & Internet Security, F.3.4.30. Purdue University
PCI bus : TCP/IP Network Administration, 5.3.1.3. Devices
PCM audio subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
pcnfsd.conf file : TCP/IP Network Administration, 9.1.5.1. NFS print services
PCs
viruses on : Practical UNIX & Internet Security, 11.1.5. Viruses
web server on : Practical UNIX & Internet Security, 18.2. Running a Secure Server
${pd} macro : sendmail, D.1. Sun Enhancements
PDP-11 processors
Practical UNIX & Internet Security, 1.3. History of UNIX
Practical UNIX & Internet Security, 8.6.1. The crypt()
PDUs (Protocol Data Units) : TCP/IP Network Administration, 11.9. Simple Network Management Protocol
peer
TCP/IP Network Administration, 3. Network Services
TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
TCP/IP Network Administration, B.5. Options Statements
clauses : TCP/IP Network Administration, 7.7.1.3. Exterior gateway configuration
level communications : TCP/IP Network Administration, 1.2. A Data Communications Model
subclauses : TCP/IP Network Administration, B.8.5. The bgp Statement
Penn State response team : Practical UNIX & Internet Security, F.3.4.29. Pennsylvania State University
per-machine logs : Practical UNIX & Internet Security, 10.7.2. Per-Machine Logs
per-site logs : Practical UNIX & Internet Security, 10.7.1. Per-Site Logs
percent (%) in addresses
sendmail, 17.1.5. The % Hack
sendmail, 21.5.1. Offsite MX Hosts
performance
analyzing : Practical UNIX & Internet Security, 18.4. Avoiding the Risks of Eavesdropping
compromised
Practical UNIX & Internet Security, 25.2.1. Process-Overload Problems
Practical UNIX & Internet Security, 25.2.1.2. System overload attacks
high-load queuing and : sendmail, 34.8. Alphabetized Reference
:include: lists and : sendmail, 25.2.2. Tradeoffs
incoming SMTP connection rate : sendmail, 34.8. Alphabetized Reference
load average
sendmail, 18.8. Alphabetized Reference
sendmail, 23.4. Printing the Queue
load balancing
TCP/IP Network Administration, 5.2. Linux Kernel Configuration
TCP/IP Network Administration, 7.4.3. Open Shortest Path First
TCP/IP Network Administration, 11.4.3. Checking the Interface with netstat
TCP/IP Network Administration, 11.4.4. Subdividing an Ethernet
load shedding : Practical UNIX & Internet Security, 23.3. Tips on Writing Network Programs
mail hubs and : sendmail, 6. The Mail Hub and Delivery Agents
with multiple interior routers : Building Internet Firewalls, 4.3.5. It's Dangerous to Use Multiple
MX records pointing to CNAMEs : sendmail, 21.3.2. MX to CNAME Causes Extra Lookups
of packet filter : Building Internet Firewalls, 6.8.1. It Should Have Good Enough
refusing connections on high load : sendmail, 34.8. Alphabetized Reference
reviews : Practical UNIX & Internet Security, 13.2.3. Performance Reviews and Monitoring
with Secure RPC : Practical UNIX & Internet Security, 19.3.4. Limitations of Secure RPC
sendmail options for : sendmail, 34.6.4. Controlling Machine Load
using FFS : Practical UNIX & Internet Security, 25.2.2.6. Reserved space
perimeter networks
Building Internet Firewalls, 4.1. Some Firewall Definitions
Building Internet Firewalls, 4.2.3.1. Perimeter network
Practical UNIX & Internet Security, 12.1.1. The Physical Security Plan
TCP/IP Network Administration, 12.7. Firewalls
multiple : Building Internet Firewalls, 4.3.7. It's OK to Have Multiple Perimeter
shared : Building Internet Firewalls, 4.4.5. A Shared Perimeter Network Allows
period (.)
. line (qf file) : sendmail, 23.9. The qf File Internals
checking for in ${pd} : sendmail, D.1. Sun Enhancements
for current directory : Practical UNIX & Internet Security, 5.1.1. Directories
to end messages
sendmail, 4.2. Verbose (-v)
sendmail, 30.8. Alphabetized F= Flags
filenames starting with, disabling creation of : Building Internet Firewalls, 8.2.1.6. Be careful of writable
host status file line : sendmail, B.1. Status file lines
leading in messages : sendmail, 34.8. Alphabetized Reference
trailing in FQDNs
sendmail, 15.3. MX Records
sendmail, 17.4. Rule Set 4
sendmail, 29.5.1. Stripping Trailing Dots
.. directory : Practical UNIX & Internet Security, 5.1.1. Directories
.. for domain name : TCP/IP Network Administration, C.3.1. Standard Resource Records
Perl programming language
Practical UNIX & Internet Security, 5.5.3. SUID Shell Scripts
Practical UNIX & Internet Security, 11.1.4. Trojan Horses
Practical UNIX & Internet Security, 11.5.1.2. IFS attacks
perl -T command
Practical UNIX & Internet Security, 18.2.3.4. Tainting with Perl
Practical UNIX & Internet Security, 23.4. Tips on Writing SUID/SGID Programs
random seed generator : Practical UNIX & Internet Security, 23.9. A Good Random Seed
script for reading lastlog file : Practical UNIX & Internet Security, 10.1.1. lastlog File
Swatch program
Practical UNIX & Internet Security, 10.6. Swatch: A Log File Tool
Practical UNIX & Internet Security, 10.6.2. The Swatch Configuration File
Practical UNIX & Internet Security, E.4.9. Swatch
tainting facility : Practical UNIX & Internet Security, 18.2.3.4. Tainting with Perl
permissions
Practical UNIX & Internet Security, 1.1. What Is Computer Security?
Practical UNIX & Internet Security, 5.1.6. Understanding File Permissions
Practical UNIX & Internet Security, 5.2.4. Using Octal File Permissions
Practical UNIX & Internet Security, 11.1.5. Viruses
Practical UNIX & Internet Security, 11.6.1. File Protections
Practical UNIX & Internet Security, 11.6.1.3. World-readable backup devices
sendmail, 13.2.4. The Default File Permissions
sendmail, 22.5. Permissions
access control lists (ACLs)
Practical UNIX & Internet Security, 5.2.5. Access Control Lists
Practical UNIX & Internet Security, 5.2.5.2. HP-UX access control lists
changing
Practical UNIX & Internet Security, 5.2.1. chmod: Changing a File's Permissions
Practical UNIX & Internet Security, 5.2.4. Using Octal File Permissions
directory : Practical UNIX & Internet Security, 5.4. Using Directory Permissions
directory for safe writes : sendmail, 34.8. Alphabetized Reference
/etc/utmp file : Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files
.forward file and : sendmail, 22.5.3. Permissions for ~/.forward Files
group : sendmail, 34.8. Alphabetized Reference
intruder's modifications to : Practical UNIX & Internet Security, 24.4.1.2. Changes in file and directory protections
modem devices : Practical UNIX & Internet Security, 14.5.2. Setting Up the UNIX Device
modem files : Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer
of NIS+ objects : Practical UNIX & Internet Security, 19.5.5. NIS+ Limitations
NO_GROUP_SET macro : sendmail, 18.8. Alphabetized Reference
octal
Practical UNIX & Internet Security, 5.2.3. Calculating Octal File Permissions
Practical UNIX & Internet Security, 5.2.4. Using Octal File Permissions
qf file : sendmail, 23.3.2. Bad qf Owner or Permissions
queue directory : sendmail, 23.1. Overview of the Queue
of .rhosts file : Practical UNIX & Internet Security, 17.3.18.4. The ~/.rhosts file
root user
sendmail, Other Books, Other Problems
sendmail, 14.6. Trusted User
sendmail, 22.1. Why root?
safe options : sendmail, 34.1.4. Options that Are Safe
SUID programs
Practical UNIX & Internet Security, 5.5. SUID
Practical UNIX & Internet Security, 5.5.7. SGID Bit on Files (System V UNIX Only)
symbolic links and : Practical UNIX & Internet Security, 5.1.7. File Permissions in Detail
temporary files
sendmail, 22.8.3.7. The TempFileMode option
sendmail, 34.8. Alphabetized Reference
umasks
Practical UNIX & Internet Security, 5.3. The umask
Practical UNIX & Internet Security, 5.3.2. Common umask Values
UUCP : Practical UNIX & Internet Security, 15.4.1.4. Special permissions
Permissions file
Practical UNIX & Internet Security, 15.5. Security in BNU UUCP
Practical UNIX & Internet Security, 15.5.1. Permissions File
Practical UNIX & Internet Security, 15.5.3. uucheck: Checking Your Permissions File
persistent host-status : sendmail, 36.7. Alphabetized Reference
personal mail forwarding : TCP/IP Network Administration, 10.3.1. Personal mail forwarding
personnel : (see employees)
PGP (Pretty Good Privacy)
Practical UNIX & Internet Security, 6.6.3. PGP: Pretty Good Privacy
Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
TCP/IP Network Administration, 12.6.1. When is symmetric encryption useful?
-eat and -seat options : Practical UNIX & Internet Security, 6.6.3.3. Encrypting a message
encrypting message with : Practical UNIX & Internet Security, 6.6.3.3. Encrypting a message
encrypting Web documents : Practical UNIX & Internet Security, 18.4.1. Eavesdropping Over the Wire
-ka option : Practical UNIX & Internet Security, 6.6.3.2. Creating your PGP public key
-kg option : Practical UNIX & Internet Security, 6.6.3.2. Creating your PGP public key
-kvc option : Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
-kxaf option : Practical UNIX & Internet Security, 6.6.3.2. Creating your PGP public key
-o option : Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
-sat option : Practical UNIX & Internet Security, 6.6.3.4. Adding a digital signature to an announcement
-sb option : Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
software signature : Practical UNIX & Internet Security, E.4. Software Resources
ph (phonebook) server : Practical UNIX & Internet Security, 17.3.8.3. Replacing finger
phantom mail : Practical UNIX & Internet Security, 17.3.4.2. Using sendmail to receive email
Physical Layer
TCP/IP Network Administration, 1.2. A Data Communications Model
TCP/IP Network Administration, 6.1.1. Determining the Interface Name
physical network
TCP/IP Network Administration, 1.5.1.2. Routing datagrams
TCP/IP Network Administration, 2.3. Subnets
TCP/IP Network Administration, 2.6. Address Resolution
TCP/IP Network Administration, 3.5.1. Reverse Address Resolution Protocol
address, embedded in response : TCP/IP Network Administration, 3.6. Bootstrap Protocol
independence from
TCP/IP Network Administration, 1.1.1. TCP/IP Features
TCP/IP Network Administration, 6. Configuring the Interface
physical security
Practical UNIX & Internet Security, 12. Physical Security
Practical UNIX & Internet Security, 12.4.2. "Nothing to Lose?"
TCP/IP Network Administration, 12.1.1. Assessing the Threat
access control : Practical UNIX & Internet Security, 12.2.3. Physical Access
of backups
Practical UNIX & Internet Security, 7.1.6. Security for Backups
Practical UNIX & Internet Security, 7.1.6.3. Data security for backups
checklist for : Practical UNIX & Internet Security, A.1.1.11. Chapter 12: Physical Security
modems
Practical UNIX & Internet Security, 14.5.4. Physical Protection of Modems
Practical UNIX & Internet Security, 14.6. Additional Security for Modems
read-only filesystems : Practical UNIX & Internet Security, 9.1.2. Read-only Filesystems
signal grounding : Practical UNIX & Internet Security, 25.3.3. Signal Grounding
physical serial ports : TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
PICKY... macros : sendmail, 18.8. Alphabetized Reference
PICKY_QF_NAME_CHECK variable
sendmail, 18.8. Alphabetized Reference
sendmail, 23.3.1. Badly Formed qf Filename
PIDs (process identifiers)
Practical UNIX & Internet Security, C.1.3.1. PIDs (process IDs)Process identification
Practical UNIX & Internet Security, C.1.3.4. Process groups and sessions
sendmail, 23.2.1. The Queue Identifier
including with logs : sendmail, 26.1.1. syslog(3)
for sendmail : (see $p macro)
Pieprzyk, Josef : Practical UNIX & Internet Security, 6.5.4.3. HAVAL
ping command
Building Internet Firewalls, 2.10. Network Management Services
Building Internet Firewalls, 5.6. Selecting Services Provided by the
Building Internet Firewalls, 8.12.3. ping
TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
TCP/IP Network Administration, 7.2. The Minimal Routing Table
statistics displayed by
TCP/IP Network Administration, 11.3.1. The ping Command
TCP/IP Network Administration, 11.4.3. Checking the Interface with netstat
in troubleshooting : TCP/IP Network Administration, 11.3. Testing Basic Connectivity
PingWare program : Practical UNIX & Internet Security, 17.6.3. PingWare
pipe (in Swatch program) : Practical UNIX & Internet Security, 10.6.2. The Swatch Configuration File
pipe character (|) separating multiple printer names : TCP/IP Network Administration, 9.2.1. The printcap File
pipes
Practical UNIX & Internet Security, 18.2.3.2. Testing is not enough!
Practical UNIX & Internet Security, 18.2.3.3. Sending mail
(see also programs, delivering to)
pipes (for smoking) : Practical UNIX & Internet Security, 12.2.1.2. Smoke
piracy of software
Practical UNIX & Internet Security, 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP
Practical UNIX & Internet Security, 26.4.2.1. Software piracy and the SPA
(see also software)
plain text subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
plaintext attacks : Practical UNIX & Internet Security, 6.2.3. Cryptographic Strength
.plan file : Practical UNIX & Internet Security, 17.3.8.1. The .plan and .project files
planning sheets : TCP/IP Network Administration, 4.6.1. Sample Planning Sheets
platforms : (see operating systems)
play accounts : (see open accounts)
playback attacks : Practical UNIX & Internet Security, 19.6.1.2. Using the ticket granting ticket
PLIP (Parallel Line IP) : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
plug-gw proxy : Building Internet Firewalls, 7.7.3. Generic Proxying with TIS
plumb/unplumb parameters : TCP/IP Network Administration, 6.1.5.5. Point-to-point
plus sign (+)
in configuration file : sendmail, 1.3.1. The Configuration File
indicating a trusted host : TCP/IP Network Administration, 12.2.5. Secure the r Commands
in hosts.equiv file : Practical UNIX & Internet Security, 17.3.18.5. Searching for .rhosts files
marking users with : sendmail, 24.4.3. Plussed Users
in NIS
Practical UNIX & Internet Security, 19.4. Sun's Network Information Service (NIS)
Practical UNIX & Internet Security, 19.4.4.6. NIS is confused about "+"
plussed users : sendmail, 24.4.3. Plussed Users
point-to-point interfaces
TCP/IP Network Administration, 6.1.5.5. Point-to-point
TCP/IP Network Administration, B.6. Interface Statements
defined : TCP/IP Network Administration, 6.1.1. Determining the Interface Name
Point-to-Point Protocol : (see PPP)
pointers : TCP/IP Network Administration, 3.3.2. Creating Domains and Subdomains
poison reverse feature : TCP/IP Network Administration, 7.4.1.1. Running RIP with routed
policy, security
Practical UNIX & Internet Security, 1.2. What Is an Operating System?
Practical UNIX & Internet Security, 2. Policies and Guidelines
Practical UNIX & Internet Security, 2.5.3. Final Words: Risk Management Means Common Sense
Practical UNIX & Internet Security, A.1.1.1. Chapter 2: Policies and Guidelines
(see security, policies of)
cost-benefit analysis
Practical UNIX & Internet Security, 2.3. Cost-Benefit Analysis
Practical UNIX & Internet Security, 2.3.4. Convincing Management
risk assessment
Practical UNIX & Internet Security, 2.2. Risk Assessment
Practical UNIX & Internet Security, 2.2.2. Review Your Risks
Practical UNIX & Internet Security, 2.5.3. Final Words: Risk Management Means Common Sense
role of
Practical UNIX & Internet Security, 2.4.1. The Role of Policy
Practical UNIX & Internet Security, 2.4.4. Some Key Ideas in Developing a Workable Policy
Practical UNIX & Internet Security, 2.4.4.7. Defend in depth
policy-based routing : TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
database : TCP/IP Network Administration, 2.4. Internet Routing Architecture
politics : Practical UNIX & Internet Security, 11.3. Authors
polling
TCP/IP Network Administration, 7.5.1. Exterior Gateway Protocol
TCP/IP Network Administration, 11.9. Simple Network Management Protocol
trap-directed : TCP/IP Network Administration, 11.9. Simple Network Management Protocol
polyalphabetic ciphers : Practical UNIX & Internet Security, 6.3. The Enigma Encryption System
polygraph tests : Practical UNIX & Internet Security, 13.1. Background Checks
POP (Post Office Protocol)
Building Internet Firewalls, 8.1.2. Post Office Protocol
Practical UNIX & Internet Security, 17.3.10. Post Office Protocol (POP) (TCP Ports
TCP/IP Network Administration, 3.4.2. Post Office Protocol
TCP/IP Network Administration, 4.5.3. Planning Your Mail System
commands, listed : TCP/IP Network Administration, 3.4.2. Post Office Protocol
mail server : TCP/IP Network Administration, 9.7.1. POP Server
multiple services : Building Internet Firewalls, 8.1.2.2. Proxying characteristics of
pop3d.tar : TCP/IP Network Administration, 9.7.1. POP Server
popen command
Practical UNIX & Internet Security, 18.2.3.2. Testing is not enough!
Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
sendmail, 18.8. Alphabetized Reference
popper17.tar : TCP/IP Network Administration, 9.7.1. POP Server
pornography : Practical UNIX & Internet Security, 26.4.5. Pornography and Indecent Material
ports
Practical UNIX & Internet Security, 16.2.4.2. TCP
Practical UNIX & Internet Security, 17.1.1. The /etc/services File
Practical UNIX & Internet Security, G. Table of IP Services
TCP/IP Network Administration, 1.2. A Data Communications Model
TCP/IP Network Administration, 2.7.3. Sockets
numbers
Building Internet Firewalls, C.12.2. Port Numbers
Practical UNIX & Internet Security, 23.3. Tips on Writing Network Programs
Practical UNIX & Internet Security, G. Table of IP Services
TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
TCP/IP Network Administration, 2.7. Protocols, Ports, and Sockets
TCP/IP Network Administration, 2.7.2. Port Numbers
passing : TCP/IP Network Administration, 2.7.3. Sockets
randomly generated : TCP/IP Network Administration, 3.6. Bootstrap Protocol
reserved TCP : sendmail, 30.8. Alphabetized F= Flags
source, filtering by : Building Internet Firewalls, 6.7.4. Risks of Filtering by Source
trusted : (see trusted ports)
well-known : Building Internet Firewalls, C.12.3. Sockets
PORT directory (db distribution) : sendmail, C.2. Get the Source
portable computers : Practical UNIX & Internet Security, 12.2.6.3. Portables
portable I/O library : Practical UNIX & Internet Security, 1.3. History of UNIX
portmap service
Building Internet Firewalls, 5.8.2.4. Which services should you disable?
Building Internet Firewalls, B.5.3. portmap
Practical UNIX & Internet Security, 19.2.1. Sun's portmap/rpcbind
Practical UNIX & Internet Security, 19.4.4.4. Spoofing RPC
Practical UNIX & Internet Security, E.4.6. portmap
portmapper
Building Internet Firewalls, 6.3.3.4. RPC
Practical UNIX & Internet Security, 17.3.11. Sun RPC's portmapper (UDP and TCP Ports 111)
Practical UNIX & Internet Security, 19.2.1. Sun's portmap/rpcbind
Practical UNIX & Internet Security, 19.4.5. Unintended Disclosure of Site Information with NIS
TCP/IP Network Administration, 2.7.2. Port Numbers
positional operators
sendmail, 9.2.3. The User ($:)
sendmail, 10.2.2. The RHS
sendmail, 12.1.4. Class Macros in the RHS
sendmail, 28.6.1. Copy by Position: $digit
m4 arguments and : sendmail, 19.1.3. m4 and arguments
positive acknowledgment
Building Internet Firewalls, C.6.2. Transmission Control Protocol
TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
positivity : Practical UNIX & Internet Security, 2.4.4.2. Be positive
POSIX
Practical UNIX & Internet Security, 1.3. History of UNIX
Practical UNIX & Internet Security, 1.4.2. Software Quality
Practical UNIX & Internet Security, C.1.3.4. Process groups and sessions
chown command and : Practical UNIX & Internet Security, 5.7. chown: Changing a File's Owner
post office : sendmail, 18.1. To Use or Not to Use
Post Office Protocol : (see POP)
post office servers : (see mailbox servers)
"Posted-Date:" header line : sendmail, 35.10. Alphabetized Reference
postmaster alias
sendmail, 3.1.1. The Aliases File
sendmail, 24.4.1. The Postmaster Alias
sendmail, 34.8. Alphabetized Reference
postmaster, contacting : Practical UNIX & Internet Security, 24.2.4.2. How to contact the system administrator of a computer
PostmasterCopy (P) option
sendmail, 22.8.3.4. The PostmasterCopy option
sendmail, 24.4.1. The Postmaster Alias
sendmail, 34.8. Alphabetized Reference
PostScript application subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
PostScript files : Practical UNIX & Internet Security, 11.1.5. Viruses
pound sign (#) for comments
TCP/IP Network Administration, 3.2. The Host Table
TCP/IP Network Administration, 5.4. The Internet Daemon
TCP/IP Network Administration, 7.7.1.1. A host configuration
TCP/IP Network Administration, 9.1.4. NFS Automounter
TCP/IP Network Administration, 9.2.1. The printcap File
TCP/IP Network Administration, 9.4. A BOOTP Server
TCP/IP Network Administration, A.1.1. The dip Script File
TCP/IP Network Administration, D.3. The dhcpd.conf Configuration File
power outage
logging : Practical UNIX & Internet Security, 10.7.1.1. Exception and activity reports
possible effects of
TCP/IP Network Administration, 9.4. A BOOTP Server
TCP/IP Network Administration, 9.5.1. dhcpd.conf
power surges
Practical UNIX & Internet Security, 12.2. Protecting Computer Hardware
Practical UNIX & Internet Security, 12.2.1.8. Electrical noise
(see also lightning)
PPP (Point-to-Point Protocol)
Practical UNIX & Internet Security, 14.5. Modems and UNIX
Practical UNIX & Internet Security, 16.2. IPv4: The Internet Protocol Version 4
TCP/IP Network Administration, 5.2. Linux Kernel Configuration
TCP/IP Network Administration, 5.3.1.2. Pseudo-device
TCP/IP Network Administration, 6.2.1. The Serial Protocols
as default : TCP/IP Network Administration, A.1.1. The dip Script File
installing
TCP/IP Network Administration, 6.1.5.5. Point-to-point
TCP/IP Network Administration, 6.3. Installing PPP
interoperability and : TCP/IP Network Administration, 6.2.2. Choosing a Serial Protocol
server configuration : TCP/IP Network Administration, 6.3.5. PPP Server Configuration
in Solaris : TCP/IP Network Administration, 6.3.6. Solaris PPP
tools reference : TCP/IP Network Administration, A. PPP Tools
ppp directory, protecting : TCP/IP Network Administration, A.2. The PPP Daemon
pppd (PPP daemon)
TCP/IP Network Administration, 6.3.1. The PPP Daemon
TCP/IP Network Administration, 6.3.4. PPP Daemon Security
TCP/IP Network Administration, A.2. The PPP Daemon
ppplogin : TCP/IP Network Administration, 6.3.5. PPP Server Configuration
.ppprc file : TCP/IP Network Administration, A.2. The PPP Daemon
prearranging file transfer : Building Internet Firewalls, 8.2.1.6. Be careful of writable
precedence
sendmail, 34.8. Alphabetized Reference
TCP/IP Network Administration, 10.5.6. Defining Mail Precedence
(see also priority, message)
"Precedence:" header line
sendmail, 14.4. Precedence
sendmail, 25.5.5. Precedence: bulk
sendmail, 26.1.3.1. class= the queue class
sendmail, 35.8. Precedence
sendmail, 35.10. Alphabetized Reference
predefined macros (sendmail)
sendmail, 7.3. Predefined Macros
sendmail, 31.1. Preassigned Macros
Predictor-1 compression : TCP/IP Network Administration, A.2. The PPP Daemon
preference
host
sendmail, 15.3. MX Records
sendmail, 21.3. Set Up MX Records
message delivery : (see priority, message)
values for
TCP/IP Network Administration, 7.6.1. gated's Preference Value
TCP/IP Network Administration, B.6. Interface Statements
TCP/IP Network Administration, B.8.5. The bgp Statement
TCP/IP Network Administration, B.9. static Statements
TCP/IP Network Administration, B.10. Control Statements
high-cost : TCP/IP Network Administration, 7.7.1.2. Interior gateway configurations
negative : TCP/IP Network Administration, B.10.1. The import Statement
prefix-length : TCP/IP Network Administration, 2.2.2. Classless IP Addresses
preprocessing rule set : (see rule set 3)
Presentation Layer : TCP/IP Network Administration, 1.2. A Data Communications Model
preserve program : Practical UNIX & Internet Security, 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve
Pretty Good Privacy : (see PGP)
prevention, cost of
Practical UNIX & Internet Security, 2.3. Cost-Benefit Analysis
Practical UNIX & Internet Security, 2.3.4. Convincing Management
pri= equate (syslog output) : sendmail, 26.1.3.7. pri= the initial priority
primary group : Practical UNIX & Internet Security, 4.1.3. Groups and Group Identifiers (GIDs)
primary servers
TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
TCP/IP Network Administration, 8.1.1. BIND Configurations
TCP/IP Network Administration, C.2. named.boot Configuration Commands
configuring : TCP/IP Network Administration, 8.3.1.2. Primary and secondary server configurations
offsite : sendmail, 21.5.2. Offsite Servers
principals, NIS+ : Practical UNIX & Internet Security, 19.5.1. What NIS+ Does
print servers : TCP/IP Network Administration, 3.7.2. Print Services
configuring
TCP/IP Network Administration, 4.5.2. Print servers
TCP/IP Network Administration, 9.2.1. The printcap File
print spool directory, making
TCP/IP Network Administration, 9.1.5.1. NFS print services
TCP/IP Network Administration, 9.2.1. The printcap File
print through process : Practical UNIX & Internet Security, 12.3.2.1. Verify your backups
printcap file : TCP/IP Network Administration, 9.2.1. The printcap File
printers and printing : Building Internet Firewalls, 3.1. Least Privilege
buffers : Practical UNIX & Internet Security, 12.3.4.1. Printer buffers
configuring protocols : Building Internet Firewalls, 8.17. Printing Protocols (lpr and lp)
delivery agent definitions : sendmail, 6.3.3. Testing the New Delivery Agent Definitions
/etc/hosts.lpd file : Practical UNIX & Internet Security, 17.3.18.6. /etc/hosts.lpd file
list of delivery agents : sendmail, 38.4.2. Show Delivery Agents with =M
logging to : Practical UNIX & Internet Security, 10.5.2.1. Logging to a printer
macro definitions : sendmail, 7.3. Predefined Macros
multiple printers : TCP/IP Network Administration, 9.2.1. The printcap File
output from printers : Practical UNIX & Internet Security, 12.3.4.2. Printer output
persistent-host status : sendmail, 36.7. Alphabetized Reference
ports for : Practical UNIX & Internet Security, 12.3.1.4. Auxiliary ports on terminals
queue
sendmail, 4.1.2. Show Queue Mode (-bp)
sendmail, 23.2.3.2. Locks shown when printing the queue
sendmail, 23.4. Printing the Queue
sendmail, 36.7. Alphabetized Reference
TCP/IP Network Administration, 9.2.1.2. Using LPD
security : TCP/IP Network Administration, 9.2.1.1. LPD security
sendmail.st file : sendmail, 26.2.2. Viewing Statistics: mailstats
systems : Building Internet Firewalls, 2.14. Printing Systems
priority
logging : sendmail, 26.1.1. syslog(3)
mailing lists : sendmail, 25.5.5. Precedence: bulk
messages
sendmail, 5.3.9. Priority
sendmail, 14.4. Precedence
sendmail, 23.4.1. Printing the Queue in Verbose Mode
sendmail, 23.9. The qf File Internals
sendmail, 26.1.3.7. pri= the initial priority
sendmail, 35.8. Precedence
TCP/IP Network Administration, 10.5.6. Defining Mail Precedence
TCP/IP Network Administration, B.8.4. The isis Statement
precedence weight : sendmail, 34.8. Alphabetized Reference
raising for retry : sendmail, 34.8. Alphabetized Reference
processes : Practical UNIX & Internet Security, C.1.3.3. Process priority and niceness
"Priority:" header line : sendmail, 35.10. Alphabetized Reference
privacy
Practical UNIX & Internet Security, 2.1. Planning Your Security Needs
Practical UNIX & Internet Security, 2.5.2. Confidential Information
Practical UNIX & Internet Security, 9. Integrity Management
Practical UNIX & Internet Security, 12.3. Protecting Data
Practical UNIX & Internet Security, 12.3.6. Key Switches
(see also encryption; integrity)
Electronic Communications Privacy Act (ECPA) : Practical UNIX & Internet Security, 26.2.3. Federal Computer Crime Laws
IP addresses : Building Internet Firewalls, 4.5. What the Future Holds
key cryptography : Building Internet Firewalls, 10. Authentication and Inbound
newsgroups : Building Internet Firewalls, 2.4. Usenet News
Secure RPC : Practical UNIX & Internet Security, 19.3.4. Limitations of Secure RPC
PrivacyOptions (p) option
sendmail, 22.8.3.5. The PrivacyOptions option
sendmail, 34.8. Alphabetized Reference
private argument : TCP/IP Network Administration, 6.1.5.3. Metric
private-key cryptography
Practical UNIX & Internet Security, 6.4. Common Cryptographic Algorithms
Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
TCP/IP Network Administration, 12.6. Encryption
privilege testing (modem) : Practical UNIX & Internet Security, 14.5.3.3. Privilege testing
privileges, file : (see permissions)
privileges, SUID : (see SUID/SGID programs)
probes, responding to : Building Internet Firewalls, 12.2.4. Responding to Probes
procedures for proxying, custom : Building Internet Firewalls, 7.2.2. Using Custom User Procedures for
processes
Practical UNIX & Internet Security, C.1. About Processes
Practical UNIX & Internet Security, C.5.3. Running the User's Shell
(see PIDs (process identifiers))
accounting
Practical UNIX & Internet Security, 10.2. The acct/pacct Process Accounting File
Practical UNIX & Internet Security, 10.2.3. messages Log File
group IDs
Practical UNIX & Internet Security, 4.3.3. Other IDs
Practical UNIX & Internet Security, C.1.3.4. Process groups and sessions
overload attacks
Practical UNIX & Internet Security, 25.2.1. Process-Overload Problems
Practical UNIX & Internet Security, 25.2.1.2. System overload attacks
priority of : Practical UNIX & Internet Security, C.1.3.3. Process priority and niceness
scheduler : Practical UNIX & Internet Security, C.1.3.3. Process priority and niceness
processing
command-line processing : sendmail, 36.4. Processing the Command Line
flow of rules : sendmail, 29.3. The Sequence of Rule Sets
queue
sendmail, 23.5. How the Queue Is Processed
sendmail, 36.7. Alphabetized Reference
speed : Building Internet Firewalls, 5.3.2. How Fast a Machine?
procmail
TCP/IP Network Administration, E.3.5. MAILER
sendmail, 19.6. Alphabetized m4 Macros
sendmail, 25.7.5.2. The procmail program
Practical UNIX & Internet Security, 11.5.2.5. .forward, .procmailrc
.procmailrc file : Practical UNIX & Internet Security, 11.5.2.5. .forward, .procmailrc
.profile file
Practical UNIX & Internet Security, 8.1.4.1. Restricted shells under System V UNIX
Practical UNIX & Internet Security, 8.1.4.6. Potential problems with rsh
Practical UNIX & Internet Security, 11.5.2.1. .login, .profile, /etc/profile
Practical UNIX & Internet Security, 24.4.1.6. Changes to startup files
prog delivery agent : sendmail, 30.2.1. Required Symbolic Names
prog pattern : TCP/IP Network Administration, 13.3.1. archie
program database class : sendmail, 33.8. Alphabetized Reference
program form, F command : sendmail, 22.4.3. The F Command - Program Form
programmed threats
Practical UNIX & Internet Security, 11. Protecting Against Programmed Threats
Practical UNIX & Internet Security, 11.6.2. Shared Libraries
authors of : Practical UNIX & Internet Security, 11.3. Authors
checklist for : Practical UNIX & Internet Security, A.1.1.10. Chapter 11: Protecting Against Programmed Threats
protection from : Practical UNIX & Internet Security, 11.5. Protecting Yourself
references on : Practical UNIX & Internet Security, D.1.4. Computer Viruses and Programmed Threats
programs : Practical UNIX & Internet Security, 23. Writing Secure SUID and Network Programs
CGI : (see CGI, scripts)
delivering to
sendmail, 3.2.2. Delivery Through a Program
sendmail, 24.2.3. Delivery via Programs
sendmail, 25.7.4. Piping Through Programs
sendmail, 30.8. Alphabetized F= Flags
filter
sendmail, 24.4.1. The Postmaster Alias
sendmail, 24.6.2. Filtering Recipients with a Shell Script
for network services : Practical UNIX & Internet Security, 23.3. Tips on Writing Network Programs
nonessential, removing : Building Internet Firewalls, 5.8.4.2. Remove nonessential programs
rabbit
Practical UNIX & Internet Security, 11.1. Programmed Threats: Definitions
Practical UNIX & Internet Security, 11.1.7. Bacteria and Rabbits
references for : Practical UNIX & Internet Security, D.1.11. UNIX Programming and System Administration
running simultaneously : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
secure : Practical UNIX & Internet Security, 23. Writing Secure SUID and Network Programs
worms : Practical UNIX & Internet Security, 11.1.6. Worms
Project Athena : (see Kerberos authentication system)
.project file : Practical UNIX & Internet Security, 17.3.8.1. The .plan and .project files
promiscuous mode
Building Internet Firewalls, 5.5. Locating the Bastion Host on the Network
TCP/IP Network Administration, 6.1.5.5. Point-to-point
TCP/IP Network Administration, 11.7.1. Packet Filters
interface : TCP/IP Network Administration, 5.3.1.2. Pseudo-device
proprietary ownership notices : Practical UNIX & Internet Security, 26.2.6. Other Tips
prosecution, criminal
Practical UNIX & Internet Security, 26.2. Criminal Prosecution
Practical UNIX & Internet Security, 26.2.7. A Final Note on Criminal Actions
proto clauses
TCP/IP Network Administration, 7.7.1.3. Exterior gateway configuration
TCP/IP Network Administration, A.1. Dial-Up IP
TCP/IP Network Administration, B.10.2. The export Statement
proto= equate (syslog output) : sendmail, 26.1.3.8. proto= the protocol used in transmission
protocols : Practical UNIX & Internet Security, 16.2.4. Packets and Protocols
analyzers
Building Internet Firewalls, 8.18. Analyzing Other Protocols
TCP/IP Network Administration, 5.3.1.2. Pseudo-device
TCP/IP Network Administration, 11.7. Analyzing Protocol Problems
TCP/IP Network Administration, 12.2.3. One-Time Passwords
bidirectionality of : Building Internet Firewalls, 6.2.1. Protocols Are Usually
client server : TCP/IP Network Administration, 11.9. Simple Network Management Protocol
data : (see TCP/IP services)
dedicated Archie : Building Internet Firewalls, 8.7.3.3. Providing Archie service to your
IP : (see IP protocols)
above IP : Building Internet Firewalls, 6.3.3. Protocols Above
manager/agent : TCP/IP Network Administration, 11.9. Simple Network Management Protocol
minor : TCP/IP Network Administration, 2.7.1. Protocol Numbers
name, alias for : TCP/IP Network Administration, 2.7.1. Protocol Numbers
non-IP : Building Internet Firewalls, 6.3.7. Non-IP Protocols
numbers for
Building Internet Firewalls, C.12.1. Protocol Numbers
TCP/IP Network Administration, 1.5.1.4. Passing datagrams to the transport layer
TCP/IP Network Administration, 2.7.1. Protocol Numbers
packet filtering and : Building Internet Firewalls, 6.1.2.2. Some protocols are not well suited to packet
problems, troubleshooting : TCP/IP Network Administration, 11.7. Analyzing Protocol Problems
routing : (see RIP)
security of, and proxying : Building Internet Firewalls, 7.4.3. Protocol Security
stack
TCP/IP Network Administration, 1.2. A Data Communications Model
TCP/IP Network Administration, 11.1. Approaching a Problem
standards
TCP/IP Network Administration, 1.1.2. Protocol Standards
TCP/IP Network Administration, 1.7. Application Layer
statements (in gated) : TCP/IP Network Administration, B.8. Protocol Statements
suite : TCP/IP Network Administration, 1.2. A Data Communications Model
time-dependence of : Building Internet Firewalls, 8.13. Network Time Protocol (NTP)
tracing : TCP/IP Network Administration, B.1. The gated Command
transmission
sendmail, 26.1.3.8. proto= the protocol used in transmission
sendmail, 31.10. Alphabetized Reference
$r macro : sendmail, 31.10. Alphabetized Reference
setting : sendmail, 36.7. Alphabetized Reference
weaknesses of, and proxy services : Building Internet Firewalls, 7.1.2.5. Proxy services don't protect you from all protocol
Protocol Data Units (PDUs) : TCP/IP Network Administration, 11.9. Simple Network Management Protocol
protocols file
TCP/IP Network Administration, 2.7.1. Protocol Numbers
TCP/IP Network Administration, 5.4. The Internet Daemon
TCP/IP Network Administration, 9.3. Network Information Service
Protocols table (NIS+) : Practical UNIX & Internet Security, 19.5.3. NIS+ Tables
proxy servers/services
Building Internet Firewalls, 4.1. Some Firewall Definitions
Building Internet Firewalls, 4.1.2. Proxy Services
Building Internet Firewalls, 7. Proxy Systems
Building Internet Firewalls, 7.4. Using Proxying with Internet
TCP/IP Network Administration, 4.2.1. Obtaining an IP Address
TCP/IP Network Administration, 5.3.1.1. Options
TCP/IP Network Administration, 12.7. Firewalls
application- versus circuit-level : Building Internet Firewalls, 7.3.1. Application-Level Versus Circuit-Level
characteristics of
Archie : Building Internet Firewalls, 8.7.3.2. Proxying characteristics of
Berkeley r commands : Building Internet Firewalls, 8.4.1.2. Proxying characteristics of the
DNS : Building Internet Firewalls, 8.10.2. Proxying Characteristics of
finger : Building Internet Firewalls, 8.8.1.2. Proxying characteristics of finger
FSP : Building Internet Firewalls, 8.2.3.2. Proxying characteristics of
FTP : Building Internet Firewalls, 8.2.1.2. Proxying characteristics of
Gopher : Building Internet Firewalls, 8.7.1.2. Proxying characteristics of Gopher
HTTP : Building Internet Firewalls, 8.6.2. Proxying Characteristics of
IRC : Building Internet Firewalls, 8.9.2.2. Proxying characteristics of
lp : Building Internet Firewalls, 8.17.3. Packet Filtering and Proxying
lpr : Building Internet Firewalls, 8.17.2. Proxying Characteristics of lpr
NFS : Building Internet Firewalls, 8.14.2. Proxying Characteristics of
NIS : Building Internet Firewalls, 8.15.2. Proxying Characteristics of
NNTP
Building Internet Firewalls, 8.5.2. Proxying Characteristics of
Building Internet Firewalls, 8.5.4. Good Ways to Set up
NTP : Building Internet Firewalls, 8.13.2. Proxying Characteristics of
ping : Building Internet Firewalls, 8.12.3.2. Proxying characteristics of ping
POP : Building Internet Firewalls, 8.1.2.2. Proxying characteristics of
rex : Building Internet Firewalls, 8.4.3.2. Proxying characteristics of rex
rexec : Building Internet Firewalls, 8.4.2.2. Proxying characteristics of
RIP : Building Internet Firewalls, 8.12.2.2. Proxying characteristics of
SMTP : Building Internet Firewalls, 8.1.1.5. Proxying characteristics of SMTP
SNMP : Building Internet Firewalls, 8.12.1.2. Proxying characteristics of SNMP
syslog : Building Internet Firewalls, 8.11.2. Proxying Characteristics of syslog
talk : Building Internet Firewalls, 8.9.1.2. Proxying characteristics of talk
Telnet : Building Internet Firewalls, 8.3.2. Proxying Characteristics of Telnet
TFTP : Building Internet Firewalls, 8.2.2.2. Proxying characteristics of
traceroute : Building Internet Firewalls, 8.12.4.2. Proxying characteristics of
UUCP : Building Internet Firewalls, 8.2.4.2. Proxying characteristics of UUCP
WAIS : Building Internet Firewalls, 8.7.2.2. Proxying characteristics of
whois : Building Internet Firewalls, 8.8.2.2. Proxying characteristics of whois
checklist for : Practical UNIX & Internet Security, A.1.1.21. Chapter 22: Wrappers and Proxies
generic versus dedicated : Building Internet Firewalls, 7.3.2. Generic Versus Dedicated Proxies
intelligent servers : Building Internet Firewalls, 7.3.3. Intelligent Proxy Servers
internal versus external clients : Building Internet Firewalls, 7.4.5. Internal Versus External Clients
Internet services and : Building Internet Firewalls, 7.4. Using Proxying with Internet
multiple operating systems and : Building Internet Firewalls, 7.1. Why Proxying?
protocol security : Building Internet Firewalls, 7.4.3. Protocol Security
providing on a firewall : TCP/IP Network Administration, 12.7.1. Functions of the firewall
SOCKS package for : Building Internet Firewalls, 7.6. Using SOCKS for
software for : Building Internet Firewalls, 7.2. How Proxying Works
TIS Internet Firewalls Toolkit for : Building Internet Firewalls, 7.7. Using the TIS
tools for : Building Internet Firewalls, B.4. Proxy Systems Tools
versus packet filtering : Building Internet Firewalls, 6.1.1.2. Packet filtering doesn't require user knowledge or
when unable to provide : Building Internet Firewalls, 7.8. What If You Can't Proxy?
without proxy server : Building Internet Firewalls, 7.5. Proxying Without a Proxy Server
proxyarp option : TCP/IP Network Administration, A.2. The PPP Daemon
pruning route addresses : sendmail, 34.8. Alphabetized Reference
pruning the wtmp file : Practical UNIX & Internet Security, 10.1.3.1. Pruning the wtmp file
ps command
Practical UNIX & Internet Security, 6.6.2. des: The Data Encryption Standard
Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files
Practical UNIX & Internet Security, 19.3.2.3. Making sure Secure RPC programs are running on every
Practical UNIX & Internet Security, 24.2.1. Catching One in the Act
Practical UNIX & Internet Security, C.1.2. The ps Command
Practical UNIX & Internet Security, C.1.2.2. Listing processes with Berkeley-derived versions of
sendmail, 4.1.1.3. Kill and restart, old versions
TCP/IP Network Administration, 12.4.1. Know Your System
with kill command : Practical UNIX & Internet Security, 24.2.5. Getting Rid of the Intruder
to stop process overload
Practical UNIX & Internet Security, 25.2.1.1. Too many processes
Practical UNIX & Internet Security, 25.2.1.2. System overload attacks
PSBUFSIZ macro : sendmail, 18.8. Alphabetized Reference
pseudo-device statement : TCP/IP Network Administration, 5.3.1.2. Pseudo-device
pseudo-devices : Practical UNIX & Internet Security, 5.6. Device Files
pseudo-domains : TCP/IP Network Administration, 10.7.1. Modifying Local Information
pseudorandom functions : Practical UNIX & Internet Security, 23.6. Tips on Generating Random Numbers
pseudo-terminals : TCP/IP Network Administration, 5.3.1.2. Pseudo-device
PTR resource records
TCP/IP Network Administration, 8.3.5. The Reverse Domain File
TCP/IP Network Administration, C.3.1.6. Domain Name Pointer record
ptys : TCP/IP Network Administration, 5.3.1.2. Pseudo-device
PUBDIR= command : Practical UNIX & Internet Security, 15.5.2. Permissions Commands
public key cryptography
Building Internet Firewalls, 10. Authentication and Inbound
Practical UNIX & Internet Security, 6.4. Common Cryptographic Algorithms
Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
Practical UNIX & Internet Security, 6.4.6. RSA and Public Key Cryptography
Practical UNIX & Internet Security, 6.4.6.3. Strength of RSA
Practical UNIX & Internet Security, 6.5.3. Digital Signatures
Practical UNIX & Internet Security, 18.3. Controlling Access to Files on Your Server
Practical UNIX & Internet Security, 18.6. Dependence on Third Parties
TCP/IP Network Administration, 12.6. Encryption
breaking : Practical UNIX & Internet Security, 19.3.4. Limitations of Secure RPC
PGP : Practical UNIX & Internet Security, 6.6.3.2. Creating your PGP public key
proving identity with : Practical UNIX & Internet Security, 19.3.1.1. Proving your identity
publicity hounds : Practical UNIX & Internet Security, 11.3. Authors
publicizing security holes : Practical UNIX & Internet Security, 2.5.1. Going Public
publickey file : Practical UNIX & Internet Security, 19.3.2.1. Creating passwords for users
pulse code modulation (PCM) audio subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
Purdue University (PCERT) : Practical UNIX & Internet Security, F.3.4.30. Purdue University
purgestat command : sendmail, 36.1.4. purgestat (V8.8 and Above)
purging persistent-host status : sendmail, 36.7. Alphabetized Reference
Purify : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
pursuing intruders : Building Internet Firewalls, 13.3. Pursuing and Capturing the
pwck command : Practical UNIX & Internet Security, 8.2. Monitoring File Format


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.