Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: D

D configuration command
sendmail, 5.3.2. Macros
sendmail, 7.1. Overview
sendmail, 31.3. Configuration File Definitions
d flag : sendmail, 30.8. Alphabetized F= Flags
D flag
sendmail, 14.2.2. The Date: Header
sendmail, 30.8. Alphabetized F= Flags
D line (host status file) : sendmail, B.1. Status file lines
D line (qf file) : sendmail, 23.9. The qf File Internals
$d macro : sendmail, 31.10. Alphabetized Reference
d option : (see DeliveryMode (d) option)
D option : (see AutoRebuildAliases (D) option)
.D rule-testing command : sendmail, 38.2.1. Define a Macro with .D
-d switch (sendmail)
sendmail, 4.3. Debugging (-d)
sendmail, 36.7. Alphabetized Reference
sendmail, 37.1. The Syntax of -d
complete list of switches : sendmail, 37.5. Reference in Numerical Order
-d0.1 switch
sendmail, 7.3.1. The hostname
sendmail, 11.6. Handling user@thishost
sendmail, 37.5. Reference in Numerical Order
-d0.15 switch
sendmail, 6.3.3. Testing the New Delivery Agent Definitions
sendmail, 37.5. Reference in Numerical Order
-d0.4 switch
sendmail, 31.7.1. Macros and the System Identity
sendmail, 37.5. Reference in Numerical Order
-d21.12 switch
sendmail, 10.5. Details of Rule Flow
sendmail, 37.5. Reference in Numerical Order
-d35.9 switch
sendmail, 7.3. Predefined Macros
sendmail, 37.5. Reference in Numerical Order
-d37.1 switch
sendmail, 13.3. Testing the Options
sendmail, 37.5. Reference in Numerical Order
with rule testing : sendmail, 38.7. Add Debugging for Detail
-d switch (makemap) : sendmail, 33.2.1.1. -d allow duplicate keys
d2 option (nslookup)
DNS & BIND, 11.3. Option Settings
DNS & BIND, 11.6.1. Seeing the Query and Response Packets
D= equate : sendmail, 30.4. The Equates
DAC (Discretionary Access Controls) : Practical UNIX & Internet Security, 4.1.3. Groups and Group Identifiers (GIDs)
daemon
TCP/IP Network Administration, 3.2. The Host Table
TCP/IP Network Administration, 5.4. The Internet Daemon
options for : sendmail, 34.8. Alphabetized Reference
preventing from running : sendmail, 15.5. Prevent the Daemon from Running
privacy of : sendmail, 34.8. Alphabetized Reference
signals : sendmail, 26.3. Signaling the Daemon
tools for : Building Internet Firewalls, B.5. Daemons
user
Practical UNIX & Internet Security, 4.1. Users and Groups
sendmail, 14.6. Trusted User
TCP/IP Network Administration, 5.4. The Internet Daemon
daemon file : DNS & BIND, 4.7.2. Check for Syslog Errors
daemon mode
sendmail, 3.4. Role as a Daemon
sendmail, 4.1.1. Daemon Mode (-bd)
sendmail, 36.7. Alphabetized Reference
DaemonPortOptions (O) option : sendmail, 34.8. Alphabetized Reference
damage, liability for : Practical UNIX & Internet Security, 26.4.6. Liability for Damage
"dangerous write permissions" warning : sendmail, 22.5.1. Dangerous Write Permissions
DARPA : DNS & BIND, 1.1. A (Very) Brief History of the Internet
dash (hyphen)
in machine conversation : sendmail, 4.2. Verbose (-v)
non-equivalent host : TCP/IP Network Administration, 12.2.5. Secure the r Commands
DAT (Digital Audio Tape) : Practical UNIX & Internet Security, 7.1.4. Guarding Against Media Failure
data : Building Internet Firewalls, 1.1.1. Your Data
assigning owners to : Practical UNIX & Internet Security, 2.4.4.1. Assign an owner
availability of : Practical UNIX & Internet Security, 2.1. Planning Your Security Needs
communication equipment (DCE) : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
communications model : TCP/IP Network Administration, 1.2. A Data Communications Model
communications protocols : (see TCP/IP protocol and services)
compression, not provided in SLIP : TCP/IP Network Administration, 6.2.1. The Serial Protocols
confidential
Practical UNIX & Internet Security, 2.1. Planning Your Security Needs
Practical UNIX & Internet Security, 2.5.2. Confidential Information
disclosure of : Practical UNIX & Internet Security, 11.2. Damage
DNS
Building Internet Firewalls, 8.10.3. DNS Data
Building Internet Firewalls, 8.10.4.2. Mismatched data between the hostname
espionage
Building Internet Firewalls, 1.2.2.4. Spies (Industrial and
Practical UNIX & Internet Security, 11.3. Authors
giving away with NIS : Practical UNIX & Internet Security, 19.4.5. Unintended Disclosure of Site Information with NIS
identifying assets : Practical UNIX & Internet Security, 2.2.1.1. Identifying assets
protecting from sniffers : Building Internet Firewalls, 10.1.2. Packet Sniffing
spoofing : Practical UNIX & Internet Security, 16.3. IP Security
terminal equipment (DTE) : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
theft of : (see information, theft and espionage)
transferring
Building Internet Firewalls, 6. Packet Filtering
(see email; files, transferring)
allowing/disallowing : Building Internet Firewalls, 6.1. Why Packet Filtering?
via TCP : Building Internet Firewalls, 6.3.3.1. TCP
user-specified, and proxying : Building Internet Firewalls, 7.4.4. User-Specified Data
Data Carrier Detect (DCD) : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
DATA command, in SMTP : TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
Data Defense Network (DDN) : Practical UNIX & Internet Security, F.3.4.20. MILNET
data-driven attacks : Building Internet Firewalls, 8.1. Electronic Mail
data dump : DNS & BIND, 13.2.2. How to Read a Database Dump
Data Encryption Standard : (see DES)
DATA keyword : sendmail, 4.2. Verbose (-v)
Data Link Layer
TCP/IP Network Administration, 1.2. A Data Communications Model
TCP/IP Network Administration, 5.3.1.2. Pseudo-device
TCP/IP Network Administration, 6.1.1. Determining the Interface Name
in PPP : TCP/IP Network Administration, 6.2.1. The Serial Protocols
data segment size : DNS & BIND, 10.4.2.1. Changing the data segment size limit
Data Set Ready (DSR) : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
Data Terminal Ready (DTR)
Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
TCP/IP Network Administration, A.2. The PPP Daemon
data terminology : TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
data types, looking up with nslookup : DNS & BIND, 11.5.1. Looking Up Different Data Types
database files
Practical UNIX & Internet Security, 1.2. What Is an Operating System?
(see db files)
database macros : sendmail, 33. Database Macros
databases : (see networks and networking, databases, network)
classes for : sendmail, 33.8. Alphabetized Reference
external (keyed)
sendmail, 5.3.11. Keyed Databases
sendmail, 20.3. Alphabetized V8.8 Subroutines
K command types : sendmail, 33.3.2. The class
library support : sendmail, 18.4.1. DBMDEF=
m4 and : sendmail, 33.6. Database Maps and m4
/map rule-testing command : sendmail, 38.5.3. Look up a Database Item with /map
sendmail : TCP/IP Network Administration, 10.6.2.1. Transforming with a database
User Database
sendmail, 33.5. The User Database
sendmail, 33.8. Alphabetized Reference
sendmail, 34.8. Alphabetized Reference
datagrams
Building Internet Firewalls, C.5.1.1. The datagram
TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
TCP/IP Network Administration, 1.5.1.1. The datagram
TCP/IP Network Administration, 1.7. Application Layer
(see also IP datagrams)
(see also User Datagram Protocol)
connectionless delivery of : TCP/IP Network Administration, 1.6. Transport Layer
converting source address of : TCP/IP Network Administration, 4.2.1. Obtaining an IP Address
forwarding : TCP/IP Network Administration, 5.3.1.1. Options
fragmented
Building Internet Firewalls, C.5.1.3. Fragmenting datagrams
TCP/IP Network Administration, 1.5.1.3. Fragmenting datagrams
TCP/IP Network Administration, 5.2. Linux Kernel Configuration
headers
TCP/IP Network Administration, 2.7.1. Protocol Numbers
TCP/IP Network Administration, 2.7.2. Port Numbers
marking end of : TCP/IP Network Administration, 6.2.1. The Serial Protocols
routing : TCP/IP Network Administration, 1.5.1.2. Routing datagrams
silently discarding : TCP/IP Network Administration, 11.8. Protocol Case Study
datasize substatement
DNS & BIND, 10.4.2.1. Changing the data segment size limit
DNS & BIND, F.1.11.3. limit datasize
date : (see time and date)
date command
Practical UNIX & Internet Security, 8.1.3. Accounts That Run a Single Command
Practical UNIX & Internet Security, 24.5.1. Never Trust Anything Except Hardcopy
"Date:" header line
sendmail, 1.5. The Header
sendmail, 14.2.2. The Date: Header
sendmail, 30.8. Alphabetized F= Flags
sendmail, 35.10. Alphabetized Reference
day-zero backups : Practical UNIX & Internet Security, 7.1.3. Types of Backups
db data category (logging) : DNS & BIND, 7.5.3. Category Details
db files
DNS & BIND, 2.4.3. Data Files
DNS & BIND, 4.2. Setting Up DNS Data
additional data in : DNS & BIND, 7.2.4. Additional db File Entries
comments in : DNS & BIND, 4.2.2. Comments
contents of (example)
DNS & BIND, 4.2.7. The Completed Data Files
DNS & BIND, 4.4.4. The Shortened db Files
errors in : DNS & BIND, 4.7.2. Check for Syslog Errors
for root domain : DNS & BIND, 15.4.4.4. The db.root file
format of : DNS & BIND, A.1. Master File Format
generating from host tables : (see h2n utility)
organizing : DNS & BIND, 7.3. Organizing Your Files
shortcuts (abbreviations) : DNS & BIND, 4.4. Abbreviations
syntax errors in : DNS & BIND, 13.3.5. 5. Syntax Error in the Conf File or DNS Database File
updating : DNS & BIND, 7.2. Updating db Files
db library package
sendmail, 2.4.1. Eliminate or Keep db Support?
sendmail, 18.8. Alphabetized Reference
sendmail, C.1. Overview
compiling and installing : sendmail, C.3. Compile and Install
db.cache file, updating : DNS & BIND, 7.2.6. Keeping db.cache Current
db.root file : DNS & BIND, 15.4.4.4. The db.root file
dbm database : sendmail, 33.8. Alphabetized Reference
alias file and
sendmail, 22.6.1. The Alias Database Files
sendmail, 24.5. The Aliases Database
dbx debugger : Practical UNIX & Internet Security, C.4. The kill Command
DCC (Direct Client Connections) : Building Internet Firewalls, 8.9.2. Internet Relay Chat
DCD (Data Carrier Detect) modem control line : TCP/IP Network Administration, A.2. The PPP Daemon
DCE (data communication equipment) : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
DCE (Distributed Computing Environment)
Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
Practical UNIX & Internet Security, 8.7.3. Code Books
Practical UNIX & Internet Security, 16.2.6.2. Other naming services
Practical UNIX & Internet Security, 19.2. Sun's Remote Procedure Call (RPC)
Practical UNIX & Internet Security, 19.7.1. DCE
dd command
Practical UNIX & Internet Security, 6.6.1.2. Ways of improving the security of crypt
Practical UNIX & Internet Security, 7.4.1. Simple Local Copies
DDN (Data Defense Network)
Building Internet Firewalls, C.10. Internet Routing Architecture
Practical UNIX & Internet Security, F.3.4.20. MILNET
TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
Protocol Handbook : TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
deadlock : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
debug command
Practical UNIX & Internet Security, 17.3.4.2. Using sendmail to receive email
sendmail, 22.3.1. SMTP debug
debug option (nslookup)
DNS & BIND, 11.3. Option Settings
DNS & BIND, 11.6.1. Seeing the Query and Response Packets
debug severity level (logging) : DNS & BIND, 7.5. BIND 8 Logging
debug substatement
DNS & BIND, 6.1.6. The options Directive
DNS & BIND, F.2.7. options debug (4.9.3 and later versions)
debug_dumpstate rule set : sendmail, 26.3.3.3. -- ruleset debug_dumpstate returns stat ..., pv: --
debugfs command : Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
debugging
DNS & BIND, 8.1.2. Capacity Planning
DNS & BIND, 12. Reading BIND Debugging Output
Building Internet Firewalls, 6.1.2.1. Current filtering tools are not perfect
sendmail, 4.3. Debugging (-d)
sendmail, 6.3.3. Testing the New Delivery Agent Definitions
sendmail, 37.2. Debugging Behavior
TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
TCP/IP Network Administration, C.1.1. Signal Processing
(see also bugs)
(see also -d switch (sendmail))
(see also testing)
(see also troubleshooting)
interpreting output : DNS & BIND, 12.3. Reading Debugging Output
levels of : DNS & BIND, 12.1. Debugging Levels
named-xfer program : DNS & BIND, 13.2.1. How to Use named-xfer
nslookup and : DNS & BIND, 11.3. Option Settings
operating system : Building Internet Firewalls, 5.8.1.2. Fix all known system bugs
resolver
DNS & BIND, 6.1.6. The options Directive
DNS & BIND, 14.2.5. The _res Structure
with rule testing : sendmail, 38.7. Add Debugging for Detail
SMTPDEBUG macro
sendmail, 18.8. Alphabetized Reference
sendmail, 22.3.1. SMTP debug
turning on : DNS & BIND, 12.2. Turning On Debugging
debugging mode : sendmail, 36.7. Alphabetized Reference
DEC (Digital Equipment Corporation) : Practical UNIX & Internet Security, F.3.4.9. DEC (Digital Equipment Corporation)
decentralizing management : TCP/IP Network Administration, 2.3. Subnets
decimal serial numbers : DNS & BIND, 7.2.2. SOA Serial Numbers
declaring
classes
sendmail, 12.1.1. Declaring a Class
sendmail, 32.1. Class Configuration Commands
delivery agents : sendmail, 19.3.2. MAILER()
macros
sendmail, 7.2. Defining Macros
sendmail, 31.2. Command-Line Definitions
sites for SITECONFIG : sendmail, 19.6. Alphabetized m4 Macros
trusted users : (see T configuration command)
DECnet network
Practical UNIX & Internet Security, 16.4.3. DECnet
sendmail, 3.3.3. Other Protocols
$C macro : sendmail, 31.10. Alphabetized Reference
DECNET-RELAY macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
decode alias
Practical UNIX & Internet Security, 17.3.4.2. Using sendmail to receive email
sendmail, 22.6. The Aliases File
decryption
TCP/IP Network Administration, 12.6. Encryption
(see encryption)
dedicated connections
TCP/IP Network Administration, 6.3.1. The PPP Daemon
TCP/IP Network Administration, 6.4. Installing SLIP
dedicated proxy servers : Building Internet Firewalls, 7.3.2. Generic Versus Dedicated Proxies
defamation : Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication, and Defamation
default
accounts : Practical UNIX & Internet Security, 8.1.2. Default Accounts
canonicalization : sendmail, 28.6.6.2. Default in canonicalization: $:
character set : sendmail, 30.4. The Equates
content-type character set : sendmail, 34.8. Alphabetized Reference
database key : sendmail, 33.4.1. Specify a Default with $:
delivery agent : sendmail, 34.8. Alphabetized Reference
delivery mode : sendmail, 13.2.3. The Default Delivery Mode
deny : Practical UNIX & Internet Security, 21.1.1. Default Permit vs. Default Deny
domain
Practical UNIX & Internet Security, 16.2.3. Hostnames
TCP/IP Network Administration, 3.3.3. Domain Names
TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
how used : TCP/IP Network Administration, 3.3.3. Domain Names
file permissions : sendmail, 13.2.4. The Default File Permissions
gateway
TCP/IP Network Administration, 2.5. The Routing Table
TCP/IP Network Administration, 4.3. Planning Routing
address : TCP/IP Network Administration, 4. Getting Started
hostname : sendmail, 33.5.3. A :default Outgoing Hostname
logging level : sendmail, 13.2.6. The Default Logging Level
macro definitions : sendmail, 7.3. Predefined Macros
mask : TCP/IP Network Administration, 2.2.2. Classless IP Addresses
passwords : TCP/IP Network Administration, 12.2. User Authentication
permit : Practical UNIX & Internet Security, 21.1.1. Default Permit vs. Default Deny
route
TCP/IP Network Administration, 2.2.2.1. Final notes on IP addresses
TCP/IP Network Administration, 2.5. The Routing Table
TCP/IP Network Administration, 7.3. Building a Static Routing Table
defining : TCP/IP Network Administration, 7.4.1.1. Running RIP with routed
sender's address format : sendmail, 31.10. Alphabetized Reference
User Database location : sendmail, 18.8. Alphabetized Reference
user identity
sendmail, 13.2.5. The Default User Identities
sendmail, 22.8.3.1. The DefaultUser option
sendmail, 34.8. Alphabetized Reference
values : TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
default data category (logging)
DNS & BIND, 7.5. BIND 8 Logging
DNS & BIND, 7.5.3. Category Details
default deny stance
Building Internet Firewalls, 3.5.1. Default Deny Stance: That Which Is Not
Building Internet Firewalls, 6.2.3. Default Permit Versus Default Deny
default domain
DNS & BIND, 4.7.3.1. Initialize the default domain name
DNS & BIND, 6.1.1. The Default Domain
unset : DNS & BIND, 13.3.12. 12. Default Domain Not Set
with nslookup : DNS & BIND, 11.3. Option Settings
default permit stance
Building Internet Firewalls, 3.5.2. Default Permit Stance: That Which Is
Building Internet Firewalls, 6.2.3. Default Permit Versus Default Deny
default search list : DNS & BIND, 6.1.2. The Search List
default_stderr channel (logging) : DNS & BIND, 7.5.2.4. Stderr channel
DefaultCharSet option : sendmail, 34.8. Alphabetized Reference
defaultdomain file : TCP/IP Network Administration, 9.3. Network Information Service
defaultroute option : TCP/IP Network Administration, 6.3.1. The PPP Daemon
defaultrouter file : DNS & BIND, 8.5.2. Recommendations
DefaultUser (u,g) option
sendmail, 13.2.5. The Default User Identities
sendmail, 22.8.3.1. The DefaultUser option
sendmail, 34.8. Alphabetized Reference
Defense Communications Agency (DCA) : TCP/IP Network Administration, 1.1. TCP/IP and the Internet
Defense Data Network (DDN) : Building Internet Firewalls, C.10. Internet Routing Architecture
defense in depth
Building Internet Firewalls, 3.2. Defense in Depth
Building Internet Firewalls, 9.2.3.2. Defense in depth
define() : sendmail, 20.3. Alphabetized V8.8 Subroutines
define macro (in sendmail)
TCP/IP Network Administration, E.3. m4 sendmail Macros
TCP/IP Network Administration, E.3.1. define
define statements (m4)
sendmail, 19.1. The m4 Preprocessor
sendmail, 19.4.1. Options
defining
headers : (see H configuration command)
macros
sendmail, 20.3. Alphabetized V8.8 Subroutines
sendmail, 34.8. Alphabetized Reference
sendmail, 36.7. Alphabetized Reference
sendmail, 38.2.1. Define a Macro with .D
definition statements (in gated) : TCP/IP Network Administration, B.7. Definition Statements
defname option (nslookup) : DNS & BIND, 11.3. Option Settings
delay= equate (syslog output) : sendmail, 26.1.3.2. delay= total time to deliver
delay, transaction : sendmail, 26.1.3.13. xdelay= transaction
delays, inserting
TCP/IP Network Administration, 6.3.2. Dial-Up PPP
TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
delegation
DNS & BIND, 2.3. Delegation
DNS & BIND, 2.4.1. Delegating Domains
DNS & BIND, 10.11.5. Delegated Name Server Configuration
checking
DNS & BIND, 9.6. Good Parenting
DNS & BIND, 9.6.2. Managing Delegation
in-addr.arpa domain
DNS & BIND, 3.2.4. Registering with Your Parent
DNS & BIND, 15.4.4.3. in-addr.arpa delegation
internal roots : DNS & BIND, 15.4.4.2. Forward mapping delegation
lame
DNS & BIND, 7.6.1. Common Syslog Messages
DNS & BIND, 7.6.2. Understanding the BIND Statistics
DNS & BIND, 8.3. Registering Name Servers
number of subdomains : DNS & BIND, 9.2. How Many Children?
octet boundaries and : DNS & BIND, 9.5.1. Subnetting on an Octet Boundary
old information : DNS & BIND, 13.6.8.1. Old delegation information
subdomains
DNS & BIND, 9.4.2. Creating and Delegating a Subdomain
DNS & BIND, 13.3.9. 9. Missing Subdomain Delegation
DELETE key : Practical UNIX & Internet Security, 3.4. Changing Your Password
deleting
aliases : DNS & BIND, 9.7.1. Removing Parent Aliases
destructive attack via : Practical UNIX & Internet Security, 25.1. Destructive Attacks
files : Practical UNIX & Internet Security, 5.4. Using Directory Permissions
header lines : sendmail, 20.3. Alphabetized V8.8 Subroutines
hosts : DNS & BIND, 7.2.1. Adding and Deleting Hosts
delimiters
database key column : sendmail, 33.3.4.12. -z specify the column delimiter (V8.7 and above)
tokens
sendmail, 31.10. Alphabetized Reference
sendmail, 34.8. Alphabetized Reference
"Delivered-To:" header line : sendmail, 35.10. Alphabetized Reference
delivermail program : sendmail, History
delivery
sendmail, 19.6. Alphabetized m4 Macros
(see also users)
alias, forms of : sendmail, 24.2. Forms of Alias Delivery
failure count : sendmail, 23.9. The qf File Internals
via FAX machine : sendmail, 3.3.3. Other Protocols
to files : (see appending to files)
local
sendmail, 3.2. Role in Local Delivery
sendmail, 29.6.3. Delivering to Local Recipient
sendmail, 30.8. Alphabetized F= Flags
(see local)
looking up addresses with DNS : sendmail, 21.2.3. Look Up Addresses for Delivery
to mailbox : sendmail, 3.2.1. Delivery to a Mailbox
to multiple recipients : sendmail, 30.8. Alphabetized F= Flags
path of : (see "Received:" header line)
precedence : (see priority, message)
to programs
sendmail, 3.2.2. Delivery Through a Program
sendmail, 24.2.3. Delivery via Programs
sendmail, 25.7.4. Piping Through Programs
sendmail, 30.8. Alphabetized F= Flags
relays : (see relays)
single threaded : sendmail, 34.8. Alphabetized Reference
total time for : sendmail, 26.1.3.2. delay= total time to deliver
delivery agents (MTAs)
Building Internet Firewalls, 8.1. Electronic Mail
sendmail, 1.1. MUA Versus MTA
sendmail, 5.3.1. Mail Delivery Agents
sendmail, 6.2. Define a Mail Delivery Agent
sendmail, 30. Delivery Agents
(see also M configuration command)
$# operator and
sendmail, 9.2.1. The Delivery Agent ($#)
sendmail, 28.6.5. Specify a Delivery Agent: $#
advantages to sendmail : sendmail, 18.1. To Use or Not to Use
choosing
sendmail, 9. Rule Set 0
sendmail, 9.5. Things to Try
declaring : sendmail, 19.3.2. MAILER()
default : sendmail, 34.8. Alphabetized Reference
equates for : sendmail, 30.4. The Equates
for errors : sendmail, 9.4. The error Delivery Agent
expensive
sendmail, 23.6.1. Periodically with -q
sendmail, 30.8. Alphabetized F= Flags
sendmail, 34.8. Alphabetized Reference
flags
sendmail, 6.3. The local Delivery Agent
sendmail, 6.4. Add the Missing Parts to Mhub
sendmail, 14.2. Headers Versus Delivery Agent Flags
sendmail, 30.8. Alphabetized F= Flags
sendmail, 35.4. ?flags? in Header Definitions
ignoring MX records : sendmail, 21.3.5. What? They Ignore MX Records?
local
sendmail, 6.3. The local Delivery Agent
sendmail, 19.6. Alphabetized m4 Macros
logging : sendmail, 26.1.3.4. mailer= the delivery agent used
printing list of : sendmail, 38.4.2. Show Delivery Agents with =M
as recipients : sendmail, 30.8. Alphabetized F= Flags
scripts via : sendmail, 24.3. Write a Delivery Agent Script
statistics : (see statistics)
symbolic name : sendmail, 30.2. The Symbolic Name
testing : sendmail, 38.5.6. Try a Delivery Agent with /try
UUCP : sendmail, 19.4.6. UUCP
delivery mode : sendmail, 13.2.3. The Default Delivery Mode
delivery program : sendmail, 25.7.5.1. The deliver program
Delivery Status Notification : (see DSN)
DeliveryMode (d) option
sendmail, 13.2.3. The Default Delivery Mode
sendmail, 23.6.1. Periodically with -q
sendmail, 34.8. Alphabetized Reference
Demilitarized Zone (DMZ) : Building Internet Firewalls, 4.1. Some Firewall Definitions
demo accounts : Practical UNIX & Internet Security, 8.1.2. Default Accounts
demultiplexing : TCP/IP Network Administration, 2.7. Protocols, Ports, and Sockets
denial of service
Building Internet Firewalls, 1.2.1.2. Denial of Service
Practical UNIX & Internet Security, 1.5. Role of This Book
Practical UNIX & Internet Security, 17.1.3. The /etc/inetd Program
Practical UNIX & Internet Security, 17.3.21.5. Denial of service attacks under X
Practical UNIX & Internet Security, 25. Denial of Service Attacks and Solutions
Practical UNIX & Internet Security, 25.3. Network Denial of Service Attacks
Practical UNIX & Internet Security, 25.3.4. Clogging
TCP/IP Network Administration, 12.1.1. Assessing the Threat
accidental
Building Internet Firewalls, 1.2.3. Stupidity and Accidents
Practical UNIX & Internet Security, 25.2.5. Soft Process Limits: Preventing Accidental Denial
automatic lockout : Practical UNIX & Internet Security, 3.3. Entering Your Password
checklist for : Practical UNIX & Internet Security, A.1.1.24. Chapter 25: Denial of Service Attacks and Solutions
destructive attacks : Practical UNIX & Internet Security, 25.1. Destructive Attacks
disk attacks
Practical UNIX & Internet Security, 25.2.2. Disk Attacks
Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
inodes : Practical UNIX & Internet Security, 25.2.2.3. Inode problems
internal inetd services : Practical UNIX & Internet Security, 17.1.3. The /etc/inetd Program
on networks
Practical UNIX & Internet Security, 25.3. Network Denial of Service Attacks
Practical UNIX & Internet Security, 25.3.4. Clogging
overload attacks
Practical UNIX & Internet Security, 25.2. Overload Attacks
Practical UNIX & Internet Security, 25.2.5. Soft Process Limits: Preventing Accidental Denial
via syslog : Practical UNIX & Internet Security, 10.5.1. The syslog.conf Configuration File
system overload attacks : Practical UNIX & Internet Security, 25.2.1.2. System overload attacks
X Window System : Practical UNIX & Internet Security, 17.3.21.5. Denial of service attacks under X
departure of employees : Practical UNIX & Internet Security, 13.2.6. Departure
depository directories, FTP : Practical UNIX & Internet Security, 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP
dequote database
sendmail, 33.8. Alphabetized Reference
TCP/IP Network Administration, 10.7.1. Modifying Local Information
DES (Data Encryption Standard)
Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
Practical UNIX & Internet Security, 6.4.4. DES
Practical UNIX & Internet Security, 6.4.5.2. Triple DES
Practical UNIX & Internet Security, 6.6.2. des: The Data Encryption Standard
Practical UNIX & Internet Security, 7.4.4. Encrypting Your Backups
Practical UNIX & Internet Security, 8.6.1. The crypt()
(see also authentication)
authentication (NIS+) : Practical UNIX & Internet Security, 19.5.4. Using NIS+
improving security of
Practical UNIX & Internet Security, 6.4.5. Improving the Security of DES
Practical UNIX & Internet Security, 6.4.5.2. Triple DES
designated router : TCP/IP Network Administration, 7.4.3. Open Shortest Path First
designing firewalls : Building Internet Firewalls, 1.4.3. Buying Versus Building
destination
TCP/IP Network Administration, 1.7. Application Layer
(see also unreachable destinations, detecting)
fields : TCP/IP Network Administration, 2.5. The Routing Table
host : TCP/IP Network Administration, 2.5. The Routing Table
Destination Address
TCP/IP Network Administration, 1.5.1.1. The datagram
TCP/IP Network Administration, 2.2. The IP Address
Destination Port number
TCP/IP Network Administration, 1.6.1. User Datagram Protocol
TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
destination unreachable codes : (see ICMP)
Destination Unreachable Message : TCP/IP Network Administration, 1.5.2. Internet Control Message Protocol
destroying media : Practical UNIX & Internet Security, 12.3.2.3. Sanitize your media before disposal
destructive attacks : Practical UNIX & Internet Security, 25.1. Destructive Attacks
detached signatures : Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
detail data, DSN delivery : sendmail, 30.5.2.1. The $@ dsn part
detectors
cable tampering : Practical UNIX & Internet Security, 12.3.1.1. Wiretapping
carbon-monoxide : Practical UNIX & Internet Security, 12.2.1.2. Smoke
humidity : Practical UNIX & Internet Security, 12.2.1.11. Humidity
logging alarm systems : Practical UNIX & Internet Security, 10.7.1.1. Exception and activity reports
smoke : Practical UNIX & Internet Security, 12.2.1.2. Smoke
temperature alarms : Practical UNIX & Internet Security, 12.2.1.6. Temperature extremes
water sensors : Practical UNIX & Internet Security, 12.2.1.12. Water
Deutsches Forschungsnetz : Practical UNIX & Internet Security, F.3.4.14. Germany: DFN-WiNet Internet sites
/dev directory
Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer
TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
/dev/audio device : Practical UNIX & Internet Security, 23.8. Picking a Random Seed
/dev/console device : Practical UNIX & Internet Security, 5.6. Device Files
/dev/kmem device
Practical UNIX & Internet Security, 5.6. Device Files
Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
sendmail, 18.8. Alphabetized Reference
/dev/null device
DNS & BIND, 10.11.4. Running BIND as a Non-Root User
Practical UNIX & Internet Security, 5.6. Device Files
sendmail, 5.2. The Minimal File
/dev/random device : Practical UNIX & Internet Security, 23.7.4. Other random number generators
/dev/swap device : Practical UNIX & Internet Security, 5.5.1. SUID, SGID, and Sticky Bits
/dev/urandom device : Practical UNIX & Internet Security, 23.7.4. Other random number generators
device statement : TCP/IP Network Administration, 5.3.1.3. Devices
devices : Practical UNIX & Internet Security, 5.6. Device Files
managing with SNMP : Practical UNIX & Internet Security, 17.3.15. Simple Network Management Protocol (SNMP) (UDP Ports
modem control : Practical UNIX & Internet Security, 14.5.2. Setting Up the UNIX Device
numbers for : sendmail, 23.9. The qf File Internals
Devices file : Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer
df -i command : Practical UNIX & Internet Security, 25.2.2.3. Inode problems
df files
sendmail, 3.1.2. The Queue Directory
sendmail, 23.2.2. The Data (Message Body) File: df
sendmail, 23.9. The qf File Internals
inode and device information : sendmail, 23.9. The qf File Internals
dfstab file
TCP/IP Network Administration, 9.1.2.1. The share command
TCP/IP Network Administration, 9.1.5.1. NFS print services
dgram sockets : TCP/IP Network Administration, 5.4. The Internet Daemon
DHCP (Dynamic Host Configuration Protocol)
TCP/IP Network Administration, Preface
TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
backwards-compatible : TCP/IP Network Administration, 9.5. DHCP
based on Bootstrap Protocol (BOOTP) : TCP/IP Network Administration, 9.4.2. BOOTP extensions
benefits of : TCP/IP Network Administration, 9.5. DHCP
daemon (dhcpd) : TCP/IP Network Administration, 9.5.1. dhcpd.conf
command : TCP/IP Network Administration, D.2. The dhcpd Command
compiling : TCP/IP Network Administration, D.1. Compiling dhcpd
configuring : TCP/IP Network Administration, D.3. The dhcpd.conf Configuration File
tools reference : TCP/IP Network Administration, D. A dhcpd Reference
using latest versions of : TCP/IP Network Administration, D. A dhcpd Reference
dhcpd.conf file : TCP/IP Network Administration, 9.5.1. dhcpd.conf
dhcpd.pid file : TCP/IP Network Administration, D.2. The dhcpd Command
interoperability and : TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
options available with : TCP/IP Network Administration, D.3.3. DHCP Options
commonly used : TCP/IP Network Administration, D.3.3.1. Commonly used options
others : TCP/IP Network Administration, D.3.3.2. Other options
diagnostic tools : TCP/IP Network Administration, 11.2. Diagnostic Tools
diagramming the system : Building Internet Firewalls, 13.5.2. Labeling and Diagraming Your System
dial-on-demand connections : DNS & BIND, 15.5.2. Dial-on-Demand
dial-up connections
DNS & BIND, 6.4.9. Windows 95
DNS & BIND, 15.5. Dialup Connections
TCP/IP Network Administration, 6.3.1. The PPP Daemon
dial-up IP (dip)
TCP/IP Network Administration, 6.3.2. Dial-Up PPP
TCP/IP Network Administration, 6.4.2. Dial-Up IP
script file : TCP/IP Network Administration, A.1.1. The dip Script File
for SLIP : TCP/IP Network Administration, 6.4.2. Dial-Up IP
sample : TCP/IP Network Administration, A.1.1.1. A sample dip script
special variables, listed : TCP/IP Network Administration, A.1.1. The dip Script File
tools reference : TCP/IP Network Administration, A.1. Dial-Up IP
dial-up PPP : TCP/IP Network Administration, 6.3.2. Dial-Up PPP
DialDelay option : sendmail, 34.8. Alphabetized Reference
dictionary attacks
Building Internet Firewalls, 10.3.1. One-Time Passwords
Practical UNIX & Internet Security, 8.6.1. The crypt()
TCP/IP Network Administration, 12.2. User Authentication
Diffie-Hellman key exchange system
Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
Practical UNIX & Internet Security, 18.6. Dependence on Third Parties
Practical UNIX & Internet Security, 19.3. Secure RPC (AUTH_DES)
breaking key : Practical UNIX & Internet Security, 19.3.4. Limitations of Secure RPC
exponential key exchange : Practical UNIX & Internet Security, 19.3.1. Secure RPC Authentication
dig
TCP/IP Network Administration, 11.2. Diagnostic Tools
TCP/IP Network Administration, 11.3. Testing Basic Connectivity
TCP/IP Network Administration, 11.6.4. dig: An Alternative to nslookup
dig utility : DNS & BIND, 7.2.6. Keeping db.cache Current
digest multipart subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
Digital Audio Tape (DAT) : Practical UNIX & Internet Security, 7.1.4. Guarding Against Media Failure
digital computers : Practical UNIX & Internet Security, 6.1.2. Cryptography and Digital Computers
Digital Equipment Corporation (DEC) : Practical UNIX & Internet Security, F.3.4.9. DEC (Digital Equipment Corporation)
Digital Signature Algorithm : (see DSA)
digital signatures
Practical UNIX & Internet Security, 6.4. Common Cryptographic Algorithms
Practical UNIX & Internet Security, 6.5. Message Digests and Digital Signatures
Practical UNIX & Internet Security, 6.5.5.2. Message authentication codes
Practical UNIX & Internet Security, 9.2.3. Checksums and Signatures
TCP/IP Network Administration, 12.6. Encryption
checksums
Building Internet Firewalls, 5.8.5.3. About checksums for auditing
Practical UNIX & Internet Security, 6.5.5.1. Checksums
Practical UNIX & Internet Security, 9.2.3. Checksums and Signatures
TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
TCP/IP Network Administration, 11.8. Protocol Case Study
keeping secure : Building Internet Firewalls, 13.5.3. Keeping Secured Checksums
recalculating
TCP/IP Network Administration, 4.2.1. Obtaining an IP Address
TCP/IP Network Administration, 5.3.1.1. Options
using Tripwire for : Building Internet Firewalls, 5.8.5.1. Auditing packages
detached signatures : Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
with PGP : Practical UNIX & Internet Security, 6.6.3.4. Adding a digital signature to an announcement
Digital UNIX
DNS & BIND, 6.4.5. Digital's Digital UNIX
Practical UNIX & Internet Security, 1.3. History of UNIX
(see also Ultrix)
Dijkstra Shortest Path First (SPF) algorithm : TCP/IP Network Administration, 7.4.3. Open Shortest Path First
dip (dial-up IP)
TCP/IP Network Administration, 6.3.2. Dial-Up PPP
TCP/IP Network Administration, 6.4.2. Dial-Up IP
script file : TCP/IP Network Administration, A.1.1. The dip Script File
for SLIP : TCP/IP Network Administration, 6.4.2. Dial-Up IP
sample : TCP/IP Network Administration, A.1.1.1. A sample dip script
tools reference : TCP/IP Network Administration, A.1. Dial-Up IP
diphosts file : TCP/IP Network Administration, 6.4.3. SLIP Server Configuration
diplogin command : TCP/IP Network Administration, 6.4.3. SLIP Server Configuration
Direct Client Connections (DCC) : Building Internet Firewalls, 8.9.2. Internet Relay Chat
direct delivery : TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
directives
DNS & BIND, 6.1.8. A Note on the 4.9 Resolver Directives
(see also under specific directive)
gated : TCP/IP Network Administration, B.3. Directive Statements
list of (BIND) : DNS & BIND, F.1. BIND Name Server Boot File Statements
Makefile : sendmail, 18.4. Tuning Makefile
resolver
DNS & BIND, 6.1. The Resolver
DNS & BIND, 6.1.8. A Note on the 4.9 Resolver Directives
directories
Practical UNIX & Internet Security, 5.1.1. Directories
Practical UNIX & Internet Security, 5.1.3. Current Directory and Paths
ancestor : Practical UNIX & Internet Security, 9.2.2.2. Ancestor directories
backing up by : Practical UNIX & Internet Security, 7.1.3. Types of Backups
CDFs (context-dependent files) : Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories
cf : sendmail, 16.1. The cf/cf Directory
checklist for : Practical UNIX & Internet Security, A.1.1.4. Chapter 5: The UNIX Filesystem
dot, dot-dot, and / : Practical UNIX & Internet Security, 5.1.1. Directories
FTP depositories : Practical UNIX & Internet Security, 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP
immutable : Practical UNIX & Internet Security, 9.1.1. Immutable and Append-Only Files
listing automatically (Web) : Practical UNIX & Internet Security, 18.2.2.2. Additional configuration issues
mounted
Practical UNIX & Internet Security, 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
Practical UNIX & Internet Security, 19.3.2.5. Mounting a secure filesystem
nested : Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
NFS : (see NFS)
organizing db files in : DNS & BIND, 7.3.1. Using Several Directories
permissions : Practical UNIX & Internet Security, 5.4. Using Directory Permissions
queue : (see queue directory)
read-only : Practical UNIX & Internet Security, 9.1.2. Read-only Filesystems
recipient's home : sendmail, 31.10. Alphabetized Reference
requirement for mounting : TCP/IP Network Administration, 9.1.3. Mounting Remote Filesystems
restricted
Practical UNIX & Internet Security, 8.1.5. Restricted Filesystem
Practical UNIX & Internet Security, 8.1.5.2. Checking new software
root : (see root directory)
for safe file writes : sendmail, 34.8. Alphabetized Reference
SGI and sticky bits on : Practical UNIX & Internet Security, 5.5.6. SGID and Sticky Bits on Directories
Web server structure of
Practical UNIX & Internet Security, 18.2.2. Understand Your Server's Directory Structure
Practical UNIX & Internet Security, 18.2.2.2. Additional configuration issues
world-writable : Practical UNIX & Internet Security, 11.6.1.1. World-writable user files and directories
<Directory> blocks
Practical UNIX & Internet Security, 18.3.1. The access.conf and .htaccess Files
Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
Practical UNIX & Internet Security, 18.3.2.1. Examples
directory directive
DNS & BIND, F.1. BIND Name Server Boot File Statements
TCP/IP Network Administration, 8.3.1.2. Primary and secondary server configurations
disabled UDP checksums : DNS & BIND, 13.5.5. Name Server Startup Fails Because UDP Checksums Disabled
disabling Internet services : Building Internet Firewalls, 5.8.2. Disabling Nonrequired Services
disabling routing : (see routers and routing, disabling)
disasters and disaster recovery
Practical UNIX & Internet Security, 12.2.6.4. Minimizing downtime
sendmail, 21.5. Prepare for Disaster
TCP/IP Network Administration, 11.10. Summary
TCP/IP Network Administration, 12.1.1. Assessing the Threat
TCP/IP Network Administration, 12.1.3. Writing a Security Policy
TCP/IP Network Administration, 12.8. Words to the Wise
disasters, preventing and handling : DNS & BIND, 8.5. Planning for Disasters
disclosure of information, threat of : TCP/IP Network Administration, 12.1.1. Assessing the Threat
disconnecting after incident : Building Internet Firewalls, 13.1.2. Disconnect or Shut Down, as
disconnecting machine : Building Internet Firewalls, 13.4.3. Planning for Disconnecting or
disk attacks
Practical UNIX & Internet Security, 25.2.2. Disk Attacks
Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
disk quotas : Practical UNIX & Internet Security, 25.2.2.5. Using quotas
disk space : (see memory; resources)
diskettes : (see backups; media)
disks, needs for : Building Internet Firewalls, 5.3.3. What Hardware Configuration?
dismissed employees : Practical UNIX & Internet Security, 13.2.6. Departure
dismounting directories, by booting : TCP/IP Network Administration, 9.1.3.1. The mount command
disposing of materials : Practical UNIX & Internet Security, 12.3.3. Other Media
distfile file
DNS & BIND, 8.2.1. Primary Master and Slave Servers
TCP/IP Network Administration, 9.6.1. rdist
distributed
architecture : TCP/IP Network Administration, 7.5.1. Exterior Gateway Protocol
control : TCP/IP Network Administration, 12.1.2. Distributed Control
servers, managing : TCP/IP Network Administration, 9.6. Managing Distributed Servers
Distributed Computing Environment : (see DCE)
Distributed File System (DFS) : TCP/IP Network Administration, 3.7.1. File Sharing
distributing public keys : TCP/IP Network Administration, 12.6. Encryption
diversity of defense systems : Building Internet Firewalls, 3.7. Diversity of Defense
divert command (m4)
sendmail, 19.1.4. m4 diversions
sendmail, 19.6. Alphabetized m4 Macros
dividing problem into manageable pieces : TCP/IP Network Administration, 11.1.1. Troubleshooting Hints
DMBDEF variable : TCP/IP Network Administration, E.4.4. The sendmail K Command
DMBDEF= directive : sendmail, 18.4.1. DBMDEF=
dmesg command : TCP/IP Network Administration, 6.1.1. Determining the Interface Name
DMZ (Demilitarized Zone) : Building Internet Firewalls, 4.1. Some Firewall Definitions
dname parameter (res_search) : DNS & BIND, 14.2.4. The Resolver Library Routines
dnl command (m4) : sendmail, 19.1.2. m4 and dnl
DNS (Domain Name Service)
Building Internet Firewalls, 2.9. Name Service
Building Internet Firewalls, 5.6. Selecting Services Provided by the
Practical UNIX & Internet Security, 16.2.6. Name Service
Practical UNIX & Internet Security, 16.2.6.2. Other naming services
Practical UNIX & Internet Security, 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
Practical UNIX & Internet Security, 17.3.6.2. DNS nameserver attacks
sendmail, 17.2.1. Is the Host Local?
sendmail, 21.1. Overview
TCP/IP Network Administration, 1.7. Application Layer
TCP/IP Network Administration, 3.1. Names and Addresses
TCP/IP Network Administration, 3.3. Domain Name Service
(see also name service)
benefits of
TCP/IP Network Administration, 3.3. Domain Name Service
TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
bestmx_is_local feature : sendmail, 19.6. Alphabetized m4 Macros
configuring : Building Internet Firewalls, 8.10. Domain Name System
in screened host architecture : Building Internet Firewalls, 9.2.1.6. DNS
in screened subnet architecture : Building Internet Firewalls, 9.1.1.6. DNS
without hiding information : Building Internet Firewalls, 8.10.6. Setting up DNS Without Hiding
data : Building Internet Firewalls, 8.10.3. DNS Data
disasters : sendmail, 21.5. Prepare for Disaster
eliminating support for : sendmail, 2.4.2. Eliminate DNS Support
error numbers : sendmail, B.1. Status file lines
fake server : Building Internet Firewalls, 8.10.5.1. Set up a `fake'
hiding information with : Building Internet Firewalls, 8.10.5. Setting Up DNS to Hide
MX records
Building Internet Firewalls, 8.10.5.1. Set up a `fake'
Practical UNIX & Internet Security, 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
sendmail, 15.3. MX Records
sendmail, 18.8. Alphabetized Reference
sendmail, 21.3. Set Up MX Records
sendmail, 34.8. Alphabetized Reference
sendmail, 38.5.2. Look Up MX Records with /mx
TCP/IP Network Administration, 8.3.2. Standard Resource Records
TCP/IP Network Administration, 8.3.6. The named.hosts File
TCP/IP Network Administration, 8.4. Using nslookup
TCP/IP Network Administration, 10.7.1. Modifying Local Information
TCP/IP Network Administration, C.3.1.4. Mail exchanger record
0 flag : sendmail, 30.8. Alphabetized F= Flags
bestmx database class : sendmail, 33.8. Alphabetized Reference
bestmx_is_local feature : sendmail, 19.6. Alphabetized m4 Macros
fallback MX host : sendmail, 34.8. Alphabetized Reference
ignored by delivery agents : sendmail, 21.3.5. What? They Ignore MX Records?
looking up for addresses : sendmail, 21.2.3. Look Up Addresses for Delivery
offsite hosts : sendmail, 21.5.1. Offsite MX Hosts
with wildcards : sendmail, 21.3.4. Wildcard MX Records
nameserver attacks : Practical UNIX & Internet Security, 17.3.6.2. DNS nameserver attacks
omitting support : sendmail, 19.6. Alphabetized m4 Macros
querying : TCP/IP Network Administration, 10.7.1. Modifying Local Information
resource on : sendmail, Other Books, Other Problems
revealing information to attackers : Building Internet Firewalls, 8.10.4.3. Revealing too much information to
rogue servers : Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
security and : Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
server for internal hosts : Building Internet Firewalls, 8.10.5.2. Set up a real DNS
starting : TCP/IP Network Administration, 5.4. The Internet Daemon
tuning lookups : sendmail, 34.8. Alphabetized Reference
zone transfers
Practical UNIX & Internet Security, 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
Practical UNIX & Internet Security, 17.3.6.1. DNS zone transfers
DNS (Domain Name System)
configuring hosts for
DNS & BIND, 6. Configuring Hosts
DNS & BIND, 6.3. Minimizing Pain and Suffering
database files : (see db files)
disasters : DNS & BIND, 8.5. Planning for Disasters
documentation on : DNS & BIND, Preface
firewalls and : DNS & BIND, 15.4. DNS and Internet Firewalls
fundamentals of : DNS & BIND, 1.3. The Domain Name System, in a Nutshell
history of : DNS & BIND, 1.2.1. The History of the Domain Name System
NIS with : DNS & BIND, 6.4.1.2. Using DNS with NIS
packet format
DNS & BIND, 11.6.1. Seeing the Query and Response Packets
DNS & BIND, 14.2.1. DNS Packet Format
resource records : (see resource records)
when to use : DNS & BIND, 1.5. Must I Use DNS?
WINS and : DNS & BIND, 15.9. DNS and WINS
X.500 directory system vs. : DNS & BIND, 15.8. DNS Versus X.500
DNS client : DNS & BIND, 6.1.4. The nameserver Directive
DNS NOTIFY
DNS & BIND, 3.1. Getting BIND
DNS & BIND, 10.2. DNS NOTIFY (Zone Change Notification)
DNS UPDATE : DNS & BIND, 3.1. Getting BIND
docs/warnings file : TCP/IP Network Administration, 12.4.3.1. COPS
documentation
Practical UNIX & Internet Security, 2.5. The Problem with Security Through Obscurity
Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
BIND : DNS & BIND, 3.1.1. Handy Mailing Lists and Usenet Newsgroups
DNS : DNS & BIND, Preface
firewalls : DNS & BIND, 15.4.1. Types of Firewall Software
historical, of problems : TCP/IP Network Administration, 11.1.1. Troubleshooting Hints
incidents : Building Internet Firewalls, 13.1.7. Document the Incident
network numbers : DNS & BIND, 3.2.3. Checking That Your Network Is Registered
plan for : Building Internet Firewalls, 13.4.7. Planning for Documentation
sendmail
sendmail, Additional Sources of Information
sendmail, 2.2. Read the Documents
system after incident
Building Internet Firewalls, 13.1.5. Snapshot the System
Building Internet Firewalls, 13.4.5. Planning for Snapshots
using : TCP/IP Network Administration, 4.6. Informing the Users
DOL macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
dollar sign ($)
$ line (qf file) : sendmail, 23.9. The qf File Internals
wildcard operators
sendmail, 8.7. Wildcard Operators
(see also wildcard operators)
$ rule-testing command : sendmail, 38.3.1. Dump a Defined Macro with $
$_ macro
sendmail, 20.2.4. Verify identd Information
sendmail, 23.9. The qf File Internals
sendmail, 26.1.3.9. relay= the host that sent or accepted the message
sendmail, 31.10. Alphabetized Reference
$1, $2, ... : (see positional operators)
$&
sendmail, 28.6.4. Rewrite Through Another Rule Set: $>set
sendmail, 31.5.3. Use Value as Is with $&
$> : sendmail, 28.6.4. Rewrite Through Another Rule Set: $>set
$* : sendmail, 10.2.1. The LHS
$@
sendmail, 9.2.2. The Host ($@)
sendmail, 9.3. Testing Rule Set 0
sendmail, 11.4.1. Rewrite the Lone Username
sendmail, 17.1.1.3. Handle null address
sendmail, 28.6.3. Rewrite-and-Return Prefix: $@
sendmail, 30.5.2.1. The $@ dsn part
sendmail, 33.4.2. Specify Numbered Substitution with $@
$[ and $]
sendmail, 19.6. Alphabetized m4 Macros
sendmail, 21.2.4. The $[ and $] Operators
sendmail, 28.6.6. Canonicalize Hostname: $[ and $]
sendmail, 33.4.3. $[ and $]: A Special Case
$:
sendmail, 9.2.3. The User ($:)
sendmail, 9.3. Testing Rule Set 0
sendmail, 28.6.2. Rewrite Once Prefix: $:
sendmail, 29.6.1. Further Processing: $:user
sendmail, 30.5.3. The $: Part
sendmail, 33.4. Use Maps with $( and $) in Rules
sendmail, 33.4.1. Specify a Default with $:
$.
sendmail, 14.1.3. Testing So Far
sendmail, 31.6. Macro Conditionals: $?, $|, and $.
$=
sendmail, 12.1. The Class Command
sendmail, 32.2.1. Matching Any in a Class: $=
sendmail, 38.3.2. Dump a Class Macro with $=
$#
sendmail, 9.2.1. The Delivery Agent ($#)
sendmail, 28.6.5. Specify a Delivery Agent: $#
$- : sendmail, 11.4.1. Rewrite the Lone Username
in macro names : sendmail, 31.5. Macro Expansion: $ and $&
$( and $) : sendmail, 33.4. Use Maps with $( and $) in Rules
$+ : sendmail, 8.7. Wildcard Operators
$?
sendmail, 14.1.3. Testing So Far
sendmail, 31.6. Macro Conditionals: $?, $|, and $.
$~ : sendmail, 32.2.2. Matching Any Not in a Class: $~
$| : sendmail, 31.6. Macro Conditionals: $?, $|, and $.
DOMAIN() : sendmail, 19.3.3. DOMAIN()
domain directive
DNS & BIND, 6.1.1. The Default Domain
DNS & BIND, 6.1.3. The search Directive
DNS & BIND, F.2.1. domain
NIS and : DNS & BIND, 6.4.1.2. Using DNS with NIS
DOMAIN macro (in sendmail) : TCP/IP Network Administration, E.3. m4 sendmail Macros
Domain Name Pointer records : (see PTR records)
domain name space
DNS & BIND, 2.1. The Domain Name Space
DNS & BIND, 15.4.6. A Shadow Namespace
CIDR and : DNS & BIND, 3.2.3. Checking That Your Network Is Registered
Internet
DNS & BIND, 2.2. The Internet Domain Name Space
DNS & BIND, 2.2.1. Top-Level Domains
Domain Name System : (see DNS)
domain names
DNS & BIND, 1.3. The Domain Name System, in a Nutshell
DNS & BIND, 2.1.1. Domain Names
DNS & BIND, A.4.1.1. Domain name
Practical UNIX & Internet Security, 16.2.3. Hostnames
sendmail, 8.1. A Fictional Network
sendmail, 19.6. Alphabetized m4 Macros
sendmail, 31.10. Alphabetized Reference
TCP/IP Network Administration, 3.3.3. Domain Names
TCP/IP Network Administration, 4. Getting Started
abbreviations : DNS & BIND, 4.4. Abbreviations
aliases : (see aliases)
application form : TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
checking host names : DNS & BIND, 4.5. Host Name Checking (BIND 4.9.4 and Later Versions)
choosing
DNS & BIND, 3.2. Choosing a Domain Name
DNS & BIND, 9.3. What to Name Your Children
collisions : DNS & BIND, 1.2.1. The History of the Domain Name System
compressing/expanding
DNS & BIND, 14.2.3. Domain Name Compression
DNS & BIND, 14.2.6. The Name Server Library Routines
consistency of
DNS & BIND, 1.2.1. The History of the Domain Name System
DNS & BIND, 2.4. Name Servers and Zones
fully qualified (FQDNs)
DNS & BIND, 2.1.1. Domain Names
DNS & BIND, 6.1.2. The Search List
TCP/IP Network Administration, 3.3.3. Domain Names
geographic : (see geographic domain names)
how to read : DNS & BIND, 2.2.3. Reading Domain Names
in NIS : TCP/IP Network Administration, 9.3. Network Information Service
local, can't be looked up : DNS & BIND, 13.6.1. Local Name Can't Be Looked Up
mail exchangers
DNS & BIND, 5.1. MX Records
DNS & BIND, 5.2. What's a Mail Exchanger, Again?
mapping [to]
DNS & BIND, 2.6.4. Mapping Addresses to Names
DNS & BIND, 4.2.5. Address and Alias Records
DNS & BIND, 4.2.6. PTR Records
(see also PTR records)
MX records : (see MX records)
obtaining : TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
parameter : TCP/IP Network Administration, 9.4. A BOOTP Server
remote, looking up : DNS & BIND, 4.7.3.4. Look up a remote name
resolving : (see resolution)
servers for : (see name servers)
storage : DNS & BIND, 14.2.2. Domain Name Storage
subdomains : DNS & BIND, 2.1.2. Domains
trailing dot (.)
DNS & BIND, 2.1.1. Domain Names
DNS & BIND, 4.2.3. SOA Records
DNS & BIND, 4.4.1. Appending Domains
DNS & BIND, 13.3.6. 6. Missing Dot at the End of a Name in a DNS Database File
DNS & BIND, A.1. Master File Format
DOMAIN source file (in sendmail)
TCP/IP Network Administration, E.3.2. FEATURE
TCP/IP Network Administration, E.3.4. DOMAIN
mail relay defines, listed : TCP/IP Network Administration, E.3.4. DOMAIN
domain-type addresses : sendmail, 17.1.3. Internet Addresses
domain/named.root : TCP/IP Network Administration, 11.6.3. Cache corruption
domainname command
Practical UNIX & Internet Security, 19.4.3. NIS Domains
TCP/IP Network Administration, 9.3. Network Information Service
domains
DNS & BIND, 1.3. The Domain Name System, in a Nutshell
DNS & BIND, 2.1.2. Domains
DNS & BIND, 3.2.2. Elsewhere in the World
Practical UNIX & Internet Security, 19.4.3. NIS Domains
TCP/IP Network Administration, 1.7. Application Layer
(see also under specific domain name)
accepting only internal mail : sendmail, 20.2.1. Accept Mail Only From Our Domain
adding : DNS & BIND, 4.9. Adding More Domains
adding to recipient address : sendmail, 30.8. Alphabetized F= Flags
administration
TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
TCP/IP Network Administration, 8.1. BIND: UNIX Name Service
contacting : TCP/IP Network Administration, 13.6. The White Pages
allocating : (see Network Information Center)
always_add_domain feature : sendmail, 19.6. Alphabetized m4 Macros
creating : TCP/IP Network Administration, 3.3.2. Creating Domains and Subdomains
default
DNS & BIND, 4.7.3.1. Initialize the default domain name
DNS & BIND, 6.1.1. The Default Domain
DNS & BIND, 11.3. Option Settings
DNS & BIND, 13.3.12. 12. Default Domain Not Set
delegating
DNS & BIND, 2.3. Delegation
DNS & BIND, 2.4.1. Delegating Domains
DNS & BIND, 13.3.9. 9. Missing Subdomain Delegation
DNS & BIND, 15.4.4.3. in-addr.arpa delegation
old information : DNS & BIND, 13.6.8.1. Old delegation information
downloading an entire : TCP/IP Network Administration, 8.4. Using nslookup
email to specific : DNS & BIND, 15.4.4.8. Mail to specific Internet domains
entry, in resolv.conf : TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
FQDN : (see FQDNs)
getting information on
DNS & BIND, 3.2.1. Where in the World Do I Fit?
DNS & BIND, 3.2.2.1. The us domain
hierarchy
TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
TCP/IP Network Administration, 8.1. BIND: UNIX Name Service
in-addr.arpa
DNS & BIND, 3.2.4. Registering with Your Parent
DNS & BIND, 15.4.4.3. in-addr.arpa delegation
DNS & BIND, E. in-addr.arpa Registration Form
delegating : DNS & BIND, 9.4.5. Delegating an in-addr.arpa Zone
incorrect delegation : DNS & BIND, 13.6.5. rlogin and rsh to Host Fails Access Check
subdomains of : DNS & BIND, 9.5. Subdomains of in-addr.arpa Domains
international : (see geographic domain names)
levels of : DNS & BIND, 2.1.2. Domains
list of local : sendmail, 32.5. Alphabetized Reference
masquerading : sendmail, 19.6. Alphabetized m4 Macros
name servers : TCP/IP Network Administration, 4.2.1.1. Assigning host addresses
parameter : TCP/IP Network Administration, 9.4. A BOOTP Server
non-U.S. : DNS & BIND, 2.2.2. Further Down
"nonexistent domain" message : DNS & BIND, 11.7.3. No PTR Data for Name Server's Address
organizational : TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
parenting : DNS & BIND, 9. Parenting
checking delegation : DNS & BIND, 9.6. Good Parenting
creating subdomains : DNS & BIND, 9.4. How to Become a Parent: Creating Subdomains
managing transition to subdomains : DNS & BIND, 9.7. Managing the Transition to Subdomains
naming subdomains : DNS & BIND, 9.3. What to Name Your Children
part of hostname : (see $m macro)
registering
DNS & BIND, 3.2.3. Checking That Your Network Is Registered
DNS & BIND, D. Domain Registration Form
root domain
DNS & BIND, 1.3. The Domain Name System, in a Nutshell
DNS & BIND, 2.1. The Domain Name Space
cache data for : DNS & BIND, 4.2.9. The Root Cache Data
updating record of : DNS & BIND, 7.2.6. Keeping db.cache Current
searching : DNS & BIND, 11.1.3. Domain Searches
state- and city-level
DNS & BIND, 2.2.2. Further Down
DNS & BIND, 3.2.2.1. The us domain
testing setup : DNS & BIND, 4.7.3. Testing Your Setup with nslookup
top-level
(see top-level domains)
(see
virtual, mapping to addresses : sendmail, 19.6. Alphabetized m4 Macros
zones vs. : DNS & BIND, 2.4. Name Servers and Zones
domaintable database
sendmail, 19.6. Alphabetized m4 Macros
TCP/IP Network Administration, 10.7.1. Modifying Local Information
DontExpandCNames option : sendmail, 34.8. Alphabetized Reference
DontInitGroups option : sendmail, 34.8. Alphabetized Reference
DontPruneRoutes command : sendmail, 34.8. Alphabetized Reference
dormant accounts
Practical UNIX & Internet Security, 8.4. Managing Dormant Accounts
Practical UNIX & Internet Security, 8.4.3. Finding Dormant Accounts
dot (.)
for current directory : Practical UNIX & Internet Security, 5.1.1. Directories
. line (qf file) : sendmail, 23.9. The qf File Internals
.. directory : Practical UNIX & Internet Security, 5.1.1. Directories
.. for domain name : TCP/IP Network Administration, C.3.1. Standard Resource Records
checking for in ${pd} : sendmail, D.1. Sun Enhancements
default domain and : DNS & BIND, 6.1.1. The Default Domain
to end messages
sendmail, 4.2. Verbose (-v)
sendmail, 30.8. Alphabetized F= Flags
filenames starting with, disabling creation of : Building Internet Firewalls, 8.2.1.6. Be careful of writable
host status file line : sendmail, B.1. Status file lines
leading in messages : sendmail, 34.8. Alphabetized Reference
ndots substatement
DNS & BIND, 6.1.6. The options Directive
DNS & BIND, F.2.6. options ndots (4.9.3 and later versions)
root domain
DNS & BIND, 1.3. The Domain Name System, in a Nutshell
DNS & BIND, 2.1. The Domain Name Space
DNS & BIND, 4.2.9. The Root Cache Data
trailing in domain names
DNS & BIND, 2.1.1. Domain Names
DNS & BIND, 4.2.3. SOA Records
DNS & BIND, 4.4.1. Appending Domains
DNS & BIND, 13.3.6. 6. Missing Dot at the End of a Name in a DNS Database File
DNS & BIND, A.1. Master File Format
trailing in FQDNs
sendmail, 15.3. MX Records
sendmail, 17.4. Rule Set 4
sendmail, 29.5.1. Stripping Trailing Dots
dotted decimal notation : TCP/IP Network Administration, 2.3. Subnets
dotted-octet representation : DNS & BIND, 2.6.4. Mapping Addresses to Names
Double DES : Practical UNIX & Internet Security, 6.4.5. Improving the Security of DES
double quotation marks (")
sendmail, 13.2.8. The Unquoted Space Replacement Character
sendmail, 31.3.2. Syntax of the Configuration File Macro's Text
double-reverse lookups
Building Internet Firewalls, 8.10.4.2. Mismatched data between the hostname
Building Internet Firewalls, 8.10.5.1. Set up a `fake'
Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
DoubleBounceAddress option : sendmail, 34.8. Alphabetized Reference
DOW USA : Practical UNIX & Internet Security, F.3.4.10. DOW USADOW USA
down sites : sendmail, 23.7.1. Handling a Down Site
downloading files : Practical UNIX & Internet Security, 12.3.4. Protecting Local Storage
logging
Practical UNIX & Internet Security, 10.3.3. xferlog Log File
Practical UNIX & Internet Security, 10.3.5. access_log Log File
downtime : Practical UNIX & Internet Security, 12.2.6.4. Minimizing downtime
due to criminal investigations : Practical UNIX & Internet Security, 26.2.4. Hazards of Criminal Prosecution
logging : Practical UNIX & Internet Security, 10.7.2.1. Exception and activity reports
drand48 function : Practical UNIX & Internet Security, 23.7.3. drand48 ( ), lrand48 ( ), and mrand48 ( )
Drawbridge package : Building Internet Firewalls, B.3.2. Drawbridge
drills, security : Practical UNIX & Internet Security, 24.1.3. Rule #3: PLAN AHEAD
drink : Practical UNIX & Internet Security, 12.2.2.1. Food and drink
ds.internic.net : TCP/IP Network Administration, 13.4. Retrieving RFCs
DSA (Digital Signature Algorithm)
Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
Practical UNIX & Internet Security, 6.5.3. Digital Signatures
DSN (Delivery Status Notification)
sendmail, 6.3. The local Delivery Agent
sendmail, B.1. Status file lines
DSN macro : sendmail, 18.8. Alphabetized Reference
ENVID identifier
sendmail, 23.9. The qf File Internals
sendmail, 36.7. Alphabetized Reference
ORCPT address : sendmail, 23.9. The qf File Internals
original envelope ID : sendmail, 31.10. Alphabetized Reference
types for : (see T= equate)
DTE (data terminal equipment) : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
du command : Practical UNIX & Internet Security, 25.2.2.1. Disk-full attacks
dual universes : Practical UNIX & Internet Security, 5.9.1. Dual Universes
dual-homed hosts
Building Internet Firewalls, 7. Proxy Systems
(see also proxy servers/services)
architecture of : Building Internet Firewalls, 4.2.1. Dual-Homed Host Architecture
with screen subnet architecture : Building Internet Firewalls, 4.3.8. It's OK to Use
as firewall : Building Internet Firewalls, 5.8.2.5. Turning off routing
nonrouting : Building Internet Firewalls, 5.2.1. Nonrouting Dual-homed Hosts
proxy services and : (see proxy servers/services)
ducts, air : Practical UNIX & Internet Security, 12.2.3.2. Entrance through air ducts
dummy interface : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
dump : TCP/IP Network Administration, 7.7.2. Testing the Configuration
dump, database : DNS & BIND, 13.2.2. How to Read a Database Dump
dump/restore program
Practical UNIX & Internet Security, 7.1.3. Types of Backups
Practical UNIX & Internet Security, 7.4.3. Specialized Backup Programs
Practical UNIX & Internet Security, 7.4.4. Encrypting Your Backups
dumping macros : sendmail, 38.3. Dump a Macro
dumping state : sendmail, 26.3.3. SIGUSR1 Dump States
dumpster diving : Practical UNIX & Internet Security, 12.3.3. Other Media
DUN (Dial-Up Networking)
DNS & BIND, 6.4.9. Windows 95
DNS & BIND, 15.5. Dialup Connections
Dunlap, Kevin : DNS & BIND, 1.4. The History of BIND
duplicate database keys : sendmail, 33.2.1.1. -d allow duplicate keys
duplicate entries in alias file : sendmail, 24.4.4. Duplicate Entries and Automation
duplicate queries : DNS & BIND, 7.6.2. Understanding the BIND Statistics
duress code : Practical UNIX & Internet Security, 8.7.2. Token Cards
dust : Practical UNIX & Internet Security, 12.2.1.3. Dust
dynamic
assignment of addresses
TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
TCP/IP Network Administration, 4.2.1.1. Assigning host addresses
automatic under DHCP : TCP/IP Network Administration, 9.5. DHCP
circumstances favoring : TCP/IP Network Administration, 4.3. Planning Routing
packet filtering
Building Internet Firewalls, 6.3.3.2. UDP
Building Internet Firewalls, 8.2.1.1. Packet filtering characteristics of
port allocation : TCP/IP Network Administration, 2.7.3. Sockets
routing
TCP/IP Network Administration, 4.3. Planning Routing
TCP/IP Network Administration, 7.1. Common Routing Configurations
dynamic-bootp flag : TCP/IP Network Administration, D.3.2. Configuration Parameters
dynamic-bootp-lease-cutoff parameter : TCP/IP Network Administration, 9.5.1. dhcpd.conf
dynamic-bootp-lease-length parameter : TCP/IP Network Administration, 9.5.1. dhcpd.conf
Dynamic DNS : TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
Dynamic Host Configuration Protocol : (see DHCP)
dynamic update facility : DNS & BIND, 10.3. DNS Dynamic Update
Dynamic Update standard : DNS & BIND, 3.1. Getting BIND


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.