Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: L

L command (sendmail.cf)
sendmail, D.1. Sun Enhancements
sendmail, D.4. L and G Configuration Commands
l flag : sendmail, 30.8. Alphabetized F= Flags
L flag : sendmail, 30.8. Alphabetized F= Flags
$l macro : (see UnixFromLine option)
$L macro : sendmail, 31.10. Alphabetized Reference
l option : (see UseErrorsTo (l) option)
L option : (see LogLevel (L) option)
L-devices file : Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer
L.cmds file : Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution
L.sys file : Practical UNIX & Internet Security, 15.3.3. Security of L.sys and Systems Files
L= equate
sendmail, 18.8. Alphabetized Reference
sendmail, 30.4. The Equates
LA_TYPE macro : sendmail, 18.8. Alphabetized Reference
labeling the system : Building Internet Firewalls, 13.5.2. Labeling and Diagraming Your System
labels, domain name : DNS & BIND, A.4.1.1. Domain name
laboratory networks : Building Internet Firewalls, 4.4.1. Laboratory Networks
Lai, Xuejia : Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
laid-off employees : Practical UNIX & Internet Security, 13.2.6. Departure
LaMacchia, Brian : Practical UNIX & Internet Security, 19.3.4. Limitations of Secure RPC
lame delegation
DNS & BIND, 7.6.1. Common Syslog Messages
DNS & BIND, 7.6.2. Understanding the BIND Statistics
DNS & BIND, 8.3. Registering Name Servers
DNS & BIND, 13.3.10. 10. Incorrect Subdomain Delegation
lame-servers data category (logging) : DNS & BIND, 7.5.3. Category Details
LAN-oriented service : Building Internet Firewalls, 5.6. Selecting Services Provided by the
Lance Ethernet Interface : TCP/IP Network Administration, 6.1.1. Determining the Interface Name
LANs (local area networks)
DNS & BIND, 8.1.2. Capacity Planning
Practical UNIX & Internet Security, 16.1. Networking
Practical UNIX & Internet Security, 16.2. IPv4: The Internet Protocol Version 4
TCP/IP Network Administration, 1.7. Application Layer
(see also Ethernet)
applications : TCP/IP Network Administration, 3.7.1. File Sharing
need for DNS : DNS & BIND, 1.5.4. If you have your own local area network or site network...
proprietary : TCP/IP Network Administration, 3.7.1. File Sharing
servers : TCP/IP Network Administration, 3. Network Services
traffic : DNS & BIND, 8.1.2. Capacity Planning
laptop computers
Practical UNIX & Internet Security, 12.2.6.3. Portables
TCP/IP Network Administration, 11.2. Diagnostic Tools
large transmission window size : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
last connection time : sendmail, B.1. Status file lines
last program
Practical UNIX & Internet Security, 8.4.3. Finding Dormant Accounts
Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files
Practical UNIX & Internet Security, 10.1.3. last Program
Practical UNIX & Internet Security, 10.1.3.1. Pruning the wtmp file
Practical UNIX & Internet Security, 15.3.1. Assigning Additional UUCP Logins
TCP/IP Network Administration, 12.4.2.2. Checking login activity
-f option : Practical UNIX & Internet Security, 10.1.3.1. Pruning the wtmp file
lastcomm program
Practical UNIX & Internet Security, 10.2. The acct/pacct Process Accounting File
Practical UNIX & Internet Security, 10.2.2. Accounting with BSD
lastlog file : Practical UNIX & Internet Security, 10.1.1. lastlog File
laws
Practical UNIX & Internet Security, 26. Computer Security and U.S. Law
Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication, and Defamation
backups and : Practical UNIX & Internet Security, 7.1.7. Legal Issues
checklist for : Practical UNIX & Internet Security, A.1.1.25. Chapter 26: Computer Security and U.S. Law
copyright
Practical UNIX & Internet Security, 9.2.1. Comparison Copies
Practical UNIX & Internet Security, 26.4.2. Copyright Infringement
Practical UNIX & Internet Security, 26.4.2.1. Software piracy and the SPA
criminal prosecution
Practical UNIX & Internet Security, 26.2. Criminal Prosecution
Practical UNIX & Internet Security, 26.2.7. A Final Note on Criminal Actions
documentation of incidents : Building Internet Firewalls, 13.1.7. Document the Incident
Electronic Communications Privacy Act (ECPA) : Practical UNIX & Internet Security, 26.2.3. Federal Computer Crime Laws
encryption
Practical UNIX & Internet Security, 6.7. Encryption and U.S. Law
Practical UNIX & Internet Security, 6.7.2. Cryptography and Export Controls
Practical UNIX & Internet Security, 12.2.6.3. Portables
enforcement agencies : Practical UNIX & Internet Security, 14.4.4.1. Kinds of eavesdropping
export
Practical UNIX & Internet Security, 6.4.4.1. Use and export of DES
Practical UNIX & Internet Security, 6.7.2. Cryptography and Export Controls
Practical UNIX & Internet Security, 26.4.1. Munitions Export
federal enforcement
Practical UNIX & Internet Security, 26.2.2. Federal Jurisdiction
Practical UNIX & Internet Security, 26.2.3. Federal Computer Crime Laws
indecent material : Practical UNIX & Internet Security, 26.4.5. Pornography and Indecent Material
liability
Practical UNIX & Internet Security, 26.4. Other Liability
Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication, and Defamation
monitoring keystrokes : Practical UNIX & Internet Security, 24.2.3. Monitoring the Intruder
non-citizen access : Practical UNIX & Internet Security, 26.4.1. Munitions Export
patents : Practical UNIX & Internet Security, 26.4.4. Patent Concerns
for portable computers : Practical UNIX & Internet Security, 12.2.6.3. Portables
pursuing intruders : Building Internet Firewalls, 13.3. Pursuing and Capturing the
resources on : Practical UNIX & Internet Security, D.1.1. Other Computer References
search warrants
Practical UNIX & Internet Security, 26.2.4. Hazards of Criminal Prosecution
Practical UNIX & Internet Security, 26.2.5. If You or One of Your Employees Is a Target
security responsibilities : Building Internet Firewalls, 11.2.3. External Factors That Influence
smoking : Practical UNIX & Internet Security, 12.2.1.2. Smoke
state and local enforcement : Practical UNIX & Internet Security, 26.2.1. The Local Option
trademarks : Practical UNIX & Internet Security, 26.4.3. Trademark Violations
vendor liability : Practical UNIX & Internet Security, 18.5.2. Trusting Your Software Vendor
lawsuits (civil) : Practical UNIX & Internet Security, 26.3. Civil Actions
layering firewalls : Building Internet Firewalls, 3.2. Defense in Depth
layers
TCP/IP Network Administration, 1.2. A Data Communications Model
TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
LCP (Link Control Protocol)
TCP/IP Network Administration, 6.2.1. The Serial Protocols
TCP/IP Network Administration, A.2. The PPP Daemon
LD_LIBRARY_PATH variable : sendmail, 22.2. The Environment
LDAPMAP macro : sendmail, 18.8. Alphabetized Reference
ldapx database class : sendmail, 33.8. Alphabetized Reference
LDOPTS= directive : sendmail, 18.4.4. LDOPTS=
leased telephone lines : Practical UNIX & Internet Security, 14.5.4. Physical Protection of Modems
leases on addresses : TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
default-lease-time : TCP/IP Network Administration, 9.5.1. dhcpd.conf
renewing : TCP/IP Network Administration, 9.4.2. BOOTP extensions
least privilege
Building Internet Firewalls, 3.1. Least Privilege
Building Internet Firewalls, 9.1.4.1. Least privilege
Building Internet Firewalls, 9.2.3.1. Least privilege
Practical UNIX & Internet Security, 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve
Practical UNIX & Internet Security, 13.2.5. Least Privilege and Separation of Duties
Lee, Ying-Da : Practical UNIX & Internet Security, 22.4. SOCKS
legal : (see laws)
Lesk, Mike
Practical UNIX & Internet Security, 1.3. History of UNIX
Practical UNIX & Internet Security, 15.2. Versions of UUCP
level, debugging
DNS & BIND, 12.1. Debugging Levels
sendmail, 4.3. Debugging (-d)
level, domain : DNS & BIND, 2.1.2. Domains
level, logging : (see logs/logging)
level, version : (see versions)
level, warning
sendmail, 26.1.1. syslog(3)
sendmail, 26.1.2. Tuning syslog.conf
LHS, rule
sendmail, 8.4. Rules
sendmail, 8.7.1. Other Text in the LHS
sendmail, 28.5. The LHS
(see also rule sets)
class macros in : sendmail, 12.1.3. Class Macros in the LHS
wildcards for : (see wildcard operators)
liability, legal
Practical UNIX & Internet Security, 26.4. Other Liability
Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication, and Defamation
/lib directory : Practical UNIX & Internet Security, 11.5.3.6. Other files
LIBDIRS= directive : sendmail, 18.4.5. LIBDIRS=
libresolv.a : sendmail, 18.5.1. Use libresolv.a
LIBS= directive : sendmail, 18.4.6. LIBS=
libwrap.a package
sendmail, 18.8. Alphabetized Reference
sendmail, 22.4.1. Accept/Reject Connections via libwrap.a
license agreements : Practical UNIX & Internet Security, 18.5.2. Trusting Your Software Vendor
comparison copies and : Practical UNIX & Internet Security, 9.2.1. Comparison Copies
lie-detector tests : Practical UNIX & Internet Security, 13.1. Background Checks
life, queue messages : sendmail, 13.2.2. Limit the Life of Queued Messages
lightning
Practical UNIX & Internet Security, 12.2. Protecting Computer Hardware
Practical UNIX & Internet Security, 12.2.1.9. Lightning
Lightweight Directory Access Protocol (LDAP)
sendmail, 18.8. Alphabetized Reference
sendmail, 33.8. Alphabetized Reference
limit command : Practical UNIX & Internet Security, 25.2.5. Soft Process Limits: Preventing Accidental Denial
Limit command (<Directory>) : Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
limit directive : DNS & BIND, F.1.11.1. limit transfers-in
limit datasize
DNS & BIND, 10.4.2.1. Changing the data segment size limit
DNS & BIND, F.1.11.3. limit datasize
limit stacksize : DNS & BIND, 10.4.2.2. Changing the stack size limit
limit transfers-in
DNS & BIND, 10.4.1.2. Limiting the total number of zone transfers initiated
DNS & BIND, F.1.11.1. limit transfers-in
limit transfers-per-ns
DNS & BIND, 10.4.1.1. Limiting transfers initiated per name server
DNS & BIND, F.1.11.1. limit transfers-in
DNS & BIND, F.1.11.2. limit transfers-per-ns
limited user access : Practical UNIX & Internet Security, 8.1.5.1. Limited users
limited_masquerade feature : sendmail, 19.6. Alphabetized m4 Macros
limiting
DHCP servers : TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
number of processable messages : sendmail, 23.5. How the Queue Is Processed
queue message lifetime
sendmail, 13.2.2. Limit the Life of Queued Messages
sendmail, 34.8. Alphabetized Reference
line length
sendmail, 30.4. The Equates
sendmail, 30.8. Alphabetized F= Flags
line length restriction : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
Line Printer (LP) print service, in Solaris : TCP/IP Network Administration, 9.2.2. Solaris Line Printer Service
Link Control Protocol (LCP)
TCP/IP Network Administration, 6.2.1. The Serial Protocols
TCP/IP Network Administration, A.2. The PPP Daemon
link-level encryption : Building Internet Firewalls, 10.5.1. At What Level Do You Encrypt?
link-level security : Practical UNIX & Internet Security, 16.3.1. Link-level Security
link-state
database : TCP/IP Network Administration, 7.4.3. Open Shortest Path First
routing protocols
TCP/IP Network Administration, 7.4. Interior Routing Protocols
TCP/IP Network Administration, 7.4.2. RIP Version 2
Link-State Advertisements (LSAs)
TCP/IP Network Administration, 7.4.3. Open Shortest Path First
TCP/IP Network Administration, B.8.1. The ospf Statement
links
encryption of : Practical UNIX & Internet Security, 18.4.1. Eavesdropping Over the Wire
link-level security : Practical UNIX & Internet Security, 16.3.1. Link-level Security
static : Practical UNIX & Internet Security, 23.4. Tips on Writing SUID/SGID Programs
symbolic, following (Web)
Practical UNIX & Internet Security, 18.2.2.2. Additional configuration issues
Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
lint program : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
Linux operating system
DNS & BIND, 6.4.8. Linux
Practical UNIX & Internet Security, 1.3. History of UNIX
Practical UNIX & Internet Security, 3.3. Entering Your Password
Practical UNIX & Internet Security, 23.1.2.1. What they found
TCP/IP Network Administration, UNIX Versions
TCP/IP Network Administration, 4.7. netconfig
TCP/IP Network Administration, 10.2. Running sendmail as a Daemon
ext2 filesystem : Practical UNIX & Internet Security, 25.2.2.6. Reserved space
ifconfig command on
TCP/IP Network Administration, 6.1.2. Checking the Interface with ifconfig
TCP/IP Network Administration, 6.1.5.3. Metric
kernel configuration : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
of PPP : TCP/IP Network Administration, 6.3. Installing PPP
random number generators : Practical UNIX & Internet Security, 23.7.4. Other random number generators
remounting filesystems on : TCP/IP Network Administration, 9.1.3.2. The vfstab and fstab files
sharing directories on : TCP/IP Network Administration, 9.1.2.2. The /etc/exports file
source directory : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
linux.mc macro control file : TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros
linux.smtp.cf file
TCP/IP Network Administration, 10.4.2. General sendmail.cf Structure
TCP/IP Network Administration, 10.7. Modifying a sendmail.cf File
list precedence : sendmail, 14.4. Precedence
list syntax : (see mailing lists)
list-bounce alias : sendmail, 25.5.3. A list-bounced Alias
list-of-lists : TCP/IP Network Administration, 13.5. Mailing Lists
List:; form addresses
sendmail, 17.1.2.1. A rule to handle List:;
sendmail, 17.3. Rule Set 0
listen-on substatement : DNS & BIND, 10.11.7. Two Name Servers in One
ListProcessor package : sendmail, 25.6.3. ListProcessor
lists, old-style address : sendmail, 13.2.7. Accept Old-Style Lists of Addresses
LISTSERV : TCP/IP Network Administration, 13.5. Mailing Lists
literals : TCP/IP Network Administration, 10.6.2. Transforming the Address
Live Script : Practical UNIX & Internet Security, 18.5.2. Trusting Your Software Vendor
Livingston routers : Building Internet Firewalls, 6.5. Conventions for Packet Filtering
*LK* keyword : TCP/IP Network Administration, 12.2.1. The Shadow Password File
load
(see performance)
(see traffic)
load data category (logging) : DNS & BIND, 7.5.3. Category Details
load sharing : DNS & BIND, 10.12. Load Sharing Between Mirrored Servers
"loaded" message : DNS & BIND, 7.6.1. Common Syslog Messages
LOC records : DNS & BIND, 15.7.4. Location
local
aliases : sendmail, 24.1.2. Local Must Be Local
area networks (LANs) : (see LANs)
authentication (NIS+) : Practical UNIX & Internet Security, 19.5.4. Using NIS+
canonical name
sendmail, 21.2.1. Determine the Local Canonical Name
sendmail, 31.10. Alphabetized Reference
checking if host is : sendmail, 17.2.1. Is the Host Local?
default domain : DNS & BIND, 6.1.1. The Default Domain
delivery : sendmail, 30.8. Alphabetized F= Flags
delivery agent
sendmail, 6.3. The local Delivery Agent
sendmail, 30.2.1. Required Symbolic Names
sendmail, 30.8. Alphabetized F= Flags
domain, in MX records : DNS & BIND, 5.3. The MX Algorithm
domains, list of : sendmail, 32.5. Alphabetized Reference
gateways : (see gateways)
law enforcement : Practical UNIX & Internet Security, 26.2.1. The Local Option
multihomed hosts : DNS & BIND, 10.5.1. Local Multihomed Hosts
name server
DNS & BIND, 6.2.2. Local Name Server
DNS & BIND, 11.5.3. Switching Servers
names and addresses
DNS & BIND, 4.7.3.2. Look up a local name
DNS & BIND, 13.6.1. Local Name Can't Be Looked Up
networks : (see LANs)
newsgroups : Building Internet Firewalls, 2.4. Usenet News
recipients
sendmail, 3.2. Role in Local Delivery
sendmail, 19.6. Alphabetized m4 Macros
sendmail, 29.6.3. Delivering to Local Recipient
server, local delivery on : sendmail, 19.6. Alphabetized m4 Macros
storage
Practical UNIX & Internet Security, 12.3.4. Protecting Local Storage
Practical UNIX & Internet Security, 12.3.4.5. Function keys
users
Practical UNIX & Internet Security, 15.4.1.2. USERFILE entries for local users
sendmail, 20.2.1. Accept Mail Only From Our Domain
sendmail, 31.10. Alphabetized Reference
UUCP handling : sendmail, 29.6.5. Handling UUCP Locally
LOCAL_CONFIG macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
LOCAL_NET_CONFIG macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
local_procmail feature : sendmail, 19.6. Alphabetized m4 Macros
LOCAL_RELAY macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
LOCAL_REPLAY macro (m4) : sendmail, 31.10. Alphabetized Reference
LOCAL_RULE macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
LOCAL_RULE_# macros (m4) : sendmail, 19.6. Alphabetized m4 Macros
LOCAL_RULESETS macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
LOCAL_USER macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
LOCALDOMAIN variable
DNS & BIND, 6.1.1. The Default Domain
DNS & BIND, 6.4.7. SCO's Open Server 5.0
TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
localhost
TCP/IP Network Administration, 3.2. The Host Table
TCP/IP Network Administration, 7.2. The Minimal Routing Table
TCP/IP Network Administration, 8.3.4. The named.local File
LOCALRES environmental variable : TCP/IP Network Administration, 11.6.4. dig: An Alternative to nslookup
lock daemon (lockd) : TCP/IP Network Administration, 9.1.1. NFS Daemons
lock file : sendmail, 23.2.3. The Lock File (obsolete as of V5.62): lf
lock program : Practical UNIX & Internet Security, 12.3.5.2. X screen savers
lock requests : (see files, lock requests, handling)
locked accounts : Practical UNIX & Internet Security, 3.3. Entering Your Password
locking files : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
log files and logging
Building Internet Firewalls, 5.8.1.4. Safeguard the system logs
Building Internet Firewalls, 8.11. syslog
Building Internet Firewalls, 13.5.4. Keeping Activity Logs
Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures
Practical UNIX & Internet Security, 10. Auditing and Logging
Practical UNIX & Internet Security, 10.8. Managing Log Files
Practical UNIX & Internet Security, 11.5.3.5. System initialization files
Practical UNIX & Internet Security, 21.5. Special Considerations
Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
sendmail, 13.2.6. The Default Logging Level
sendmail, 18.8. Alphabetized Reference
sendmail, 26.1. Logging with syslog
sendmail, 36.7. Alphabetized Reference
(see also syslog)
access_log
Practical UNIX & Internet Security, 10.3.5. access_log Log File
Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
across networks : Practical UNIX & Internet Security, 10.5.2.2. Logging across the network
aculog : Practical UNIX & Internet Security, 10.3.1. aculog File
agent_log file : Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
archiving information : Practical UNIX & Internet Security, 7.4.2. Simple Archives
backups and
Building Internet Firewalls, 5.10.2. Do Secure Backups
Practical UNIX & Internet Security, 10.2.2. Accounting with BSD
breakins : Practical UNIX & Internet Security, 24.1.2. Rule #2: DOCUMENT
C2 audit : Practical UNIX & Internet Security, 10.1. The Basic Log Files
checklist for : Practical UNIX & Internet Security, A.1.1.9. Chapter 10: Auditing and Logging
creating with SOCKS : Building Internet Firewalls, 7.6. Using SOCKS for
critical messages
Practical UNIX & Internet Security, 10.5.3. syslog Messages
Practical UNIX & Internet Security, 10.5.3.1. Beware false log entries
documenting incidents : Building Internet Firewalls, 13.1.7. Document the Incident
downloaded files
Practical UNIX & Internet Security, 10.3.3. xferlog Log File
Practical UNIX & Internet Security, 10.3.5. access_log Log File
of dropped packets : Building Internet Firewalls, 6.9. Where to Do Packet Filtering
failed su attempts : Practical UNIX & Internet Security, 4.3.7. The Bad su Log
file format : Practical UNIX & Internet Security, 8.2. Monitoring File Format
files transferred by FTP : Practical UNIX & Internet Security, 10.3.3. xferlog Log File
to hardcopy device : Practical UNIX & Internet Security, 10.5.2.1. Logging to a printer
individual users
Practical UNIX & Internet Security, 10.4. Per-User Trails in the Filesystem
Practical UNIX & Internet Security, 10.4.3. Network Setup
lastlog : Practical UNIX & Internet Security, 10.1.1. lastlog File
managing : Practical UNIX & Internet Security, 10.8. Managing Log Files
manually logging
Practical UNIX & Internet Security, 10.7. Handwritten Logs
Practical UNIX & Internet Security, 10.7.2.2. Informational material
memory required for
Building Internet Firewalls, 12.1.3. Managing Your Disk Space
Building Internet Firewalls, 12.2.2. What Should You Watch For?
mistyped passwords : Practical UNIX & Internet Security, 10.5.3. syslog Messages
network services : Practical UNIX & Internet Security, 10.3.6. Logging Network Services
outgoing mail : Practical UNIX & Internet Security, 10.4.2. Mail
per-machine : Practical UNIX & Internet Security, 10.7.2. Per-Machine Logs
per-site : Practical UNIX & Internet Security, 10.7.1. Per-Site Logs
potentially criminal activity : Practical UNIX & Internet Security, 26.2.6. Other Tips
proxy services and : Building Internet Firewalls, 7.1.1.2. Proxy services are good at logging
refer_log file : Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
of router actions : Building Internet Firewalls, 6.4.1. Logging Actions
sulog : (see sulog file)
Swatch program
Practical UNIX & Internet Security, 10.6. Swatch: A Log File Tool
Practical UNIX & Internet Security, 10.6.2. The Swatch Configuration File
Practical UNIX & Internet Security, E.4.9. Swatch
syslog facility
Practical UNIX & Internet Security, 10.5. The UNIX System Log (syslog) Facility
Practical UNIX & Internet Security, 10.5.3.1. Beware false log entries
sendmail, 26.1.1. syslog(3)
system clock and : Practical UNIX & Internet Security, 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
tracking intruders with : Practical UNIX & Internet Security, 24.3. The Log Files: Discovering an Intruder's
trimlog program for : Building Internet Firewalls, B.6.5. trimlog
unexpectedly deleted or modified : Building Internet Firewalls, 12.2.3. The Good, the Bad, and the Ugly
/usr/adm/messages : Practical UNIX & Internet Security, 10.2.3. messages Log File
utmp and wtmp
Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files
Practical UNIX & Internet Security, 10.1.3.1. Pruning the wtmp file
UUCP : Practical UNIX & Internet Security, 10.3.4. uucp Log Files
/var/adm/acct : Practical UNIX & Internet Security, 10.2. The acct/pacct Process Accounting File
/var/adm/loginlog : Practical UNIX & Internet Security, 10.1.4. loginlog File
of web servers : Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
what not to log : Practical UNIX & Internet Security, 10.5.3. syslog Messages
what to watch for : Building Internet Firewalls, 12.2.2. What Should You Watch For?
-X switch for : sendmail, 26.4. Log Transactions with -X
xferlog : Practical UNIX & Internet Security, 10.3.3. xferlog Log File
LOG macro : sendmail, 18.8. Alphabetized Reference
LOG_MAIL : (see facility, mail-handling program)
LOG_PID : sendmail, 26.1.1. syslog(3)
logdaemon package : Practical UNIX & Internet Security, 17.3.18.5. Searching for .rhosts files
logger command : Practical UNIX & Internet Security, 10.5.3. syslog Messages
logging (BIND 8)
DNS & BIND, 7.5. BIND 8 Logging
DNS & BIND, 13.2.3. Logging Queries
logging statement : DNS & BIND, 7.5.1. The Logging Statement
options query-log directive : DNS & BIND, 7.6.1. Common Syslog Messages
logging directive : DNS & BIND, F.1.18. logging (8.X.X)
logging in
Practical UNIX & Internet Security, C.5. Starting Up UNIX and Logging In
Practical UNIX & Internet Security, C.5.3. Running the User's Shell
FTP access without : Practical UNIX & Internet Security, 17.3.2.7. Allowing only FTP access
Kerberos system : Practical UNIX & Internet Security, 19.6.1.1. Initial login
last program
Practical UNIX & Internet Security, 10.1.3. last Program
Practical UNIX & Internet Security, 10.1.3.1. Pruning the wtmp file
lastlog file : Practical UNIX & Internet Security, 10.1.1. lastlog File
passwords : Practical UNIX & Internet Security, 3.3. Entering Your Password
preventing
Practical UNIX & Internet Security, 8.4. Managing Dormant Accounts
Practical UNIX & Internet Security, 8.4.3. Finding Dormant Accounts
remotely : TCP/IP Network Administration, 1.7. Application Layer
restricting : Practical UNIX & Internet Security, 8.3. Restricting Logins
with Secure RPC : Practical UNIX & Internet Security, 19.3.3. Using Secure RPC
startup file attacks
Practical UNIX & Internet Security, 11.5.2. Start-up File Attacks
Practical UNIX & Internet Security, 11.5.2.7. Other initializations
logging out with Secure RPC[logging out:Secure RPC] : Practical UNIX & Internet Security, 19.3.3. Using Secure RPC
loghost : TCP/IP Network Administration, 3.2. The Host Table
logic bombs
Practical UNIX & Internet Security, 11.1. Programmed Threats: Definitions
Practical UNIX & Internet Security, 11.1.3. Logic Bombs
Practical UNIX & Internet Security, 27.2.2. Viruses on the Distribution Disk
login activity, checking : TCP/IP Network Administration, 12.4.2.2. Checking login activity
.login file
Practical UNIX & Internet Security, 8.5.1. Secure Terminals
Practical UNIX & Internet Security, 11.5.2.1. .login, .profile, /etc/profile
Practical UNIX & Internet Security, 24.4.1.6. Changes to startup files
login program
Practical UNIX & Internet Security, 8.6. The UNIX Encrypted Password System
Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
Practical UNIX & Internet Security, 19.5.4. Using NIS+
Practical UNIX & Internet Security, 26.2.6. Other Tips
Practical UNIX & Internet Security, 27.1.2. Trusting Trust
logindevperm file : Practical UNIX & Internet Security, 17.3.21.1. /etc/fbtab and /etc/logindevperm
loginlog file : Practical UNIX & Internet Security, 10.1.4. loginlog File
logins
authentication : Practical UNIX & Internet Security, 17.3.5. TACACS (UDP Port 49)
FTP : Practical UNIX & Internet Security, 17.3.2. (FTP) File Transfer Protocol (TCP Ports 20 and 21)
remote : Building Internet Firewalls, 2.3. Remote Terminal Access and Command
successful, from unexpected site : Building Internet Firewalls, 12.2.3. The Good, the Bad, and the Ugly
UUCP, additional : Practical UNIX & Internet Security, 15.3.1. Assigning Additional UUCP Logins
logins command
Practical UNIX & Internet Security, 8.1.1. Accounts Without Passwords
Practical UNIX & Internet Security, 8.2. Monitoring File Format
LogLevel (L) option
sendmail, 13.2.6. The Default Logging Level
sendmail, 22.8.3.3. The LogLevel option
sendmail, 26.1.1. syslog(3)
sendmail, 34.8. Alphabetized Reference
LogLevel variable for : sendmail, 20.1.2. Global Variables
LOGNAME= command
Practical UNIX & Internet Security, 15.5.1.3. A Sample Permissions file
Practical UNIX & Internet Security, 15.5.2. Permissions Commands
.logout file : Practical UNIX & Internet Security, 19.3.3. Using Secure RPC
logs/logging
Building Internet Firewalls, 5.8.1.4. Safeguard the system logs
Building Internet Firewalls, 8.11. syslog
Building Internet Firewalls, 13.5.4. Keeping Activity Logs
Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures
Practical UNIX & Internet Security, 10. Auditing and Logging
Practical UNIX & Internet Security, 10.8. Managing Log Files
Practical UNIX & Internet Security, 11.5.3.5. System initialization files
Practical UNIX & Internet Security, 21.5. Special Considerations
Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
sendmail, 13.2.6. The Default Logging Level
sendmail, 18.8. Alphabetized Reference
sendmail, 26.1. Logging with syslog
sendmail, 36.7. Alphabetized Reference
(see also syslog)
access_log
Practical UNIX & Internet Security, 10.3.5. access_log Log File
Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
across networks : Practical UNIX & Internet Security, 10.5.2.2. Logging across the network
aculog : Practical UNIX & Internet Security, 10.3.1. aculog File
agent_log file : Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
archiving information : Practical UNIX & Internet Security, 7.4.2. Simple Archives
backups and
Building Internet Firewalls, 5.10.2. Do Secure Backups
Practical UNIX & Internet Security, 10.2.2. Accounting with BSD
breakins : Practical UNIX & Internet Security, 24.1.2. Rule #2: DOCUMENT
C2 audit : Practical UNIX & Internet Security, 10.1. The Basic Log Files
checklist for : Practical UNIX & Internet Security, A.1.1.9. Chapter 10: Auditing and Logging
creating with SOCKS : Building Internet Firewalls, 7.6. Using SOCKS for
critical messages
Practical UNIX & Internet Security, 10.5.3. syslog Messages
Practical UNIX & Internet Security, 10.5.3.1. Beware false log entries
documenting incidents : Building Internet Firewalls, 13.1.7. Document the Incident
downloaded files
Practical UNIX & Internet Security, 10.3.3. xferlog Log File
Practical UNIX & Internet Security, 10.3.5. access_log Log File
of dropped packets : Building Internet Firewalls, 6.9. Where to Do Packet Filtering
failed su attempts : Practical UNIX & Internet Security, 4.3.7. The Bad su Log
file format : Practical UNIX & Internet Security, 8.2. Monitoring File Format
files transferred by FTP : Practical UNIX & Internet Security, 10.3.3. xferlog Log File
to hardcopy device : Practical UNIX & Internet Security, 10.5.2.1. Logging to a printer
individual users
Practical UNIX & Internet Security, 10.4. Per-User Trails in the Filesystem
Practical UNIX & Internet Security, 10.4.3. Network Setup
lastlog : Practical UNIX & Internet Security, 10.1.1. lastlog File
managing : Practical UNIX & Internet Security, 10.8. Managing Log Files
manually logging
Practical UNIX & Internet Security, 10.7. Handwritten Logs
Practical UNIX & Internet Security, 10.7.2.2. Informational material
memory required for
Building Internet Firewalls, 12.1.3. Managing Your Disk Space
Building Internet Firewalls, 12.2.2. What Should You Watch For?
mistyped passwords : Practical UNIX & Internet Security, 10.5.3. syslog Messages
network services : Practical UNIX & Internet Security, 10.3.6. Logging Network Services
outgoing mail : Practical UNIX & Internet Security, 10.4.2. Mail
per-machine : Practical UNIX & Internet Security, 10.7.2. Per-Machine Logs
per-site : Practical UNIX & Internet Security, 10.7.1. Per-Site Logs
potentially criminal activity : Practical UNIX & Internet Security, 26.2.6. Other Tips
proxy services and : Building Internet Firewalls, 7.1.1.2. Proxy services are good at logging
refer_log file : Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
of router actions : Building Internet Firewalls, 6.4.1. Logging Actions
sulog : (see sulog file)
Swatch program
Practical UNIX & Internet Security, 10.6. Swatch: A Log File Tool
Practical UNIX & Internet Security, 10.6.2. The Swatch Configuration File
Practical UNIX & Internet Security, E.4.9. Swatch
syslog facility
Practical UNIX & Internet Security, 10.5. The UNIX System Log (syslog) Facility
Practical UNIX & Internet Security, 10.5.3.1. Beware false log entries
sendmail, 26.1.1. syslog(3)
system clock and : Practical UNIX & Internet Security, 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
tracking intruders with : Practical UNIX & Internet Security, 24.3. The Log Files: Discovering an Intruder's
trimlog program for : Building Internet Firewalls, B.6.5. trimlog
unexpectedly deleted or modified : Building Internet Firewalls, 12.2.3. The Good, the Bad, and the Ugly
/usr/adm/messages : Practical UNIX & Internet Security, 10.2.3. messages Log File
utmp and wtmp
Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files
Practical UNIX & Internet Security, 10.1.3.1. Pruning the wtmp file
UUCP : Practical UNIX & Internet Security, 10.3.4. uucp Log Files
/var/adm/acct : Practical UNIX & Internet Security, 10.2. The acct/pacct Process Accounting File
/var/adm/loginlog : Practical UNIX & Internet Security, 10.1.4. loginlog File
of web servers : Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
what not to log : Practical UNIX & Internet Security, 10.5.3. syslog Messages
what to watch for : Building Internet Firewalls, 12.2.2. What Should You Watch For?
-X switch for : sendmail, 26.4. Log Transactions with -X
xferlog : Practical UNIX & Internet Security, 10.3.3. xferlog Log File
long distance service
Practical UNIX & Internet Security, 14.5.4. Physical Protection of Modems
Practical UNIX & Internet Security, 17.3.3. TELNET (TCP Port 23)
"Looked for PTR, Found CNAME" : DNS & BIND, 13.5.4. Resolver Reports Looked for PTR, Found CNAME
looking up database keys : sendmail, 20.3. Alphabetized V8.8 Subroutines
lookups, DNS
Building Internet Firewalls, 8.10.1. Packet Filtering Characteristics of
Building Internet Firewalls, 8.10.4.2. Mismatched data between the hostname
loopback
address
DNS & BIND, 4.2.8. The Loopback Address
DNS & BIND, 6.1.4. The nameserver Directive
Building Internet Firewalls, C.9. The IP Address
TCP/IP Network Administration, 2.2.2.1. Final notes on IP addresses
TCP/IP Network Administration, 3.2. The Host Table
TCP/IP Network Administration, 8.3.4. The named.local File
devices : TCP/IP Network Administration, 5.3.1.2. Pseudo-device
domain : TCP/IP Network Administration, 8.3.1.1. Configuring a caching-only nameserver
files : TCP/IP Network Administration, 8.1.1. BIND Configurations
interface
TCP/IP Network Administration, 4.7. netconfig
TCP/IP Network Administration, 6.1.1. Determining the Interface Name
TCP/IP Network Administration, 6.1.5.6. Putting ifconfig in the startup files
route
TCP/IP Network Administration, 2.5. The Routing Table
TCP/IP Network Administration, 7.2. The Minimal Routing Table
TCP/IP Network Administration, 12.7.2. Routing control
loops
forwarding : sendmail, 25.7.2. Forwarding Loops
in HELO command : sendmail, 30.8. Alphabetized F= Flags
in rule sets : sendmail, 28.6.2. Rewrite Once Prefix: $:
losses, cost of preventing
Practical UNIX & Internet Security, 2.3. Cost-Benefit Analysis
Practical UNIX & Internet Security, 2.3.4. Convincing Management
LOTUS_NOTES_HACK macro : sendmail, 18.8. Alphabetized Reference
lowest-cost path : TCP/IP Network Administration, 7.4.3. Open Shortest Path First
lp (user) : Practical UNIX & Internet Security, 4.1. Users and Groups
lp directory : TCP/IP Network Administration, 9.2.2. Solaris Line Printer Service
lp printing system : Building Internet Firewalls, 2.14. Printing Systems
configuring : Building Internet Firewalls, 8.17. Printing Protocols (lpr and lp)
lpd (Line Printer Daemon)
Practical UNIX & Internet Security, 17.3.18.6. /etc/hosts.lpd file
TCP/IP Network Administration, 9.2. Line Printer Daemon
commands, listed : TCP/IP Network Administration, 9.2.1.2. Using LPD
lpr printing system
Building Internet Firewalls, 2.14. Printing Systems
TCP/IP Network Administration, 3.7.2. Print Services
TCP/IP Network Administration, 9.2.1.2. Using LPD
configuring : Building Internet Firewalls, 8.17. Printing Protocols (lpr and lp)
lpr server, IP address of : TCP/IP Network Administration, 9.4. A BOOTP Server
lpsystem command : TCP/IP Network Administration, 9.2.2. Solaris Line Printer Service
lrand48 function : Practical UNIX & Internet Security, 23.7.3. drand48 ( ), lrand48 ( ), and mrand48 ( )
ls command
DNS & BIND, 11.6.3. Zone Transfers
Practical UNIX & Internet Security, 5.1.4. Using the ls Command
Practical UNIX & Internet Security, 5.1.5. File Times
Practical UNIX & Internet Security, 9.2.2. Checklists and Metadata
TCP/IP Network Administration, 8.4. Using nslookup
TCP/IP Network Administration, 11.6. Checking Name Service
-c option
Practical UNIX & Internet Security, 5.1.5. File Times
Practical UNIX & Internet Security, 24.4.1.6. Changes to startup files
-d option : Practical UNIX & Internet Security, 9.2.2.1. Simple listing
-e option : Practical UNIX & Internet Security, 5.2.5.1. AIX Access Control Lists
-F option : Practical UNIX & Internet Security, 5.1.4. Using the ls Command
-g option : Practical UNIX & Internet Security, 5.1.4. Using the ls Command
-H option
Practical UNIX & Internet Security, 5.9.2. Context-Dependent Files
Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories
-i option : Practical UNIX & Internet Security, 9.2.2.1. Simple listing
-l option
Practical UNIX & Internet Security, 5.1.4. Using the ls Command
Practical UNIX & Internet Security, 5.2.5.1. AIX Access Control Lists
Practical UNIX & Internet Security, 5.5.1. SUID, SGID, and Sticky Bits
Practical UNIX & Internet Security, 24.4.1.6. Changes to startup files
-q option : Practical UNIX & Internet Security, 5.4. Using Directory Permissions
-u option : Practical UNIX & Internet Security, 5.1.5. File Times
lsacl command : Practical UNIX & Internet Security, 5.2.5.2. HP-UX access control lists
lserver command (nslookup) : DNS & BIND, 11.5.3. Switching Servers
lsof program : Practical UNIX & Internet Security, 25.2.2.7. Hidden space
lstat function : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
Lucifer algorithm
Practical UNIX & Internet Security, 6.4.4. DES
Practical UNIX & Internet Security, 6.4.4.3. DES strength
LUCIFER cipher : Practical UNIX & Internet Security, 6.4.4. DES
LUSER-RELAY macro (m4)
sendmail, 19.6. Alphabetized m4 Macros
sendmail, 31.10. Alphabetized Reference


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.