Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: O

O configuration command
sendmail, 5.3.7. Options
sendmail, 13.1. Options: An Overview
-o database switch : sendmail, 33.3.4.8. -o the database file is optional (V8.1 and above)
-O database switch : sendmail, 33.3.4.7. -O adaptive versus never add a null (V8.2 and above)
o flag : sendmail, 30.8. Alphabetized F= Flags
O lines in sendmail.cf : sendmail, 3.1. Role in the Filesystem
$o macro : (see OperatorChars (o) option)
o option : (see OldStyleHeaders (o) option)
O option : (see DaemonPortOptions (O) option)
-o switch (F command) : sendmail, 12.2. The File Form of Class
-o switch (makemap) : sendmail, 33.2.1.4. -o append to, don't overwrite the file
-o switch (sendmail) : sendmail, 36.7. Alphabetized Reference
-O switch (sendmail) : sendmail, 36.7. Alphabetized Reference
OBJADD= directive : sendmail, 18.4.10. OBJADD=
object identifier : TCP/IP Network Administration, 11.9. Simple Network Management Protocol
obscurity
Building Internet Firewalls, 1.3.2. Security Through Obscurity
Practical UNIX & Internet Security, 2.5. The Problem with Security Through Obscurity
Practical UNIX & Internet Security, 2.5.3. Final Words: Risk Management Means Common Sense
Practical UNIX & Internet Security, 8.8.9. Account Names Revisited: Using Aliases for Increased
Practical UNIX & Internet Security, 18.2.4. Keep Your Scripts Secret!
obtaining
BIND via FTP : sendmail, 21.1.1. Which DNS? 4.8.3 or 4.9?
db library package : sendmail, C.2. Get the Source
sendmail source code
sendmail, 2.1. Get the Source
sendmail, 18.3. Obtain the Source
octal file permissions
Practical UNIX & Internet Security, 5.2.3. Calculating Octal File Permissions
Practical UNIX & Internet Security, 5.2.4. Using Octal File Permissions
octal-type arguments : sendmail, 34.5. Option Argument Types
octet data
Practical UNIX & Internet Security, 16.2.1. Internet Addresses
TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
octet-stream application subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
octets
DNS & BIND, 2.6.4. Mapping Addresses to Names
DNS & BIND, A.1. Master File Format
compressing domain names : DNS & BIND, 14.2.3. Domain Name Compression
data transmission order : DNS & BIND, A.3.3. Data Transmission Order
resource record data and : DNS & BIND, A.4.1.1. Domain name
subnetting on/off octet boundaries : DNS & BIND, 9.5.1. Subnetting on an Octet Boundary
Odlyzko, Andrew : Practical UNIX & Internet Security, 19.3.4. Limitations of Secure RPC
-odq switch : sendmail, 23.6.1. Periodically with -q
Oerrs (output errors) : TCP/IP Network Administration, 11.4.3. Checking the Interface with netstat
OFB (output feedback) : Practical UNIX & Internet Security, 6.4.4.2. DES modes
off-site name server : DNS & BIND, 8.1. How Many Name Servers?
offsite primary name servers : sendmail, 21.5.2. Offsite Servers
"ok" message : sendmail, 4.2. Verbose (-v)
old-style address lists : sendmail, 13.2.7. Accept Old-Style Lists of Addresses
OLD_NEWDB macro : sendmail, 18.8. Alphabetized Reference
OldStyleHeaders (o) option
sendmail, 13.2.7. Accept Old-Style Lists of Addresses
sendmail, 34.8. Alphabetized Reference
on program : Building Internet Firewalls, 2.3. Remote Terminal Access and Command
on-the-job security
Practical UNIX & Internet Security, 13.2. On the Job
Practical UNIX & Internet Security, 13.2.6. Departure
one : Practical UNIX & Internet Security, 9.2.1. Comparison Copies
one-answer format : DNS & BIND, 10.4.1.4. More efficient zone transfers
one-command accounts : Practical UNIX & Internet Security, 8.1.3. Accounts That Run a Single Command
one-time pad encryption
Practical UNIX & Internet Security, 6.4.7. An Unbreakable Encryption Algorithm
Practical UNIX & Internet Security, 8.7.3. Code Books
one-time passwords
Building Internet Firewalls, 10.3.1. One-Time Passwords
Practical UNIX & Internet Security, 8.7. One-Time Passwords
Practical UNIX & Internet Security, 8.7.3. Code Books
Practical UNIX & Internet Security, 17.4. Security Implications of Network Services
Practical UNIX & Internet Security, 23.3. Tips on Writing Network Programs
TCP/IP Network Administration, Preface
TCP/IP Network Administration, 12.2.3. One-Time Passwords
One-time Passwords In Everything (OPIE) : TCP/IP Network Administration, 12.2.4. OPIE
one-way phone lines : Practical UNIX & Internet Security, 14.4.1. One-Way Phone Lines
ONEX command, in ESMTP : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
open access, tradition of : Practical UNIX & Internet Security, 1.4.1. Expectations
open accounts
Practical UNIX & Internet Security, 8.1.4. Open Accounts
Practical UNIX & Internet Security, 8.1.4.6. Potential problems with rsh
Practical UNIX & Internet Security, 8.8.7. Algorithm and Library Changes
open command
Practical UNIX & Internet Security, 5.1.7. File Permissions in Detail
Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
O_CREAT and O_EXCL flags : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
open file descriptors : sendmail, 26.3.3.1. -- open file descriptors: --
open files limit
DNS & BIND, 7.6.1. Common Syslog Messages
DNS & BIND, 10.4.2.4. Changing the open files limit
DNS & BIND, 13.5.3. Name Server Reports Too Many Open Files
open protocol suite : TCP/IP Network Administration, 3.7.1. File Sharing
Open Server : DNS & BIND, 6.4.7. SCO's Open Server 5.0
Open Shortest Path First : (see OSPF protocol)
Open Software Foundation (OSF) : Practical UNIX & Internet Security, 1.3. History of UNIX
Open System Interconnection (OSI)
Building Internet Firewalls, C.2.1. OSI Reference Model
Practical UNIX & Internet Security, 16.4.4. OSI
TCP/IP Network Administration, 1.2. A Data Communications Model
TCP/IP Network Administration, 6.1.1. Determining the Interface Name
opendir library call : Practical UNIX & Internet Security, 5.4. Using Directory Permissions
openlog command : sendmail, 26.1.1. syslog(3)
operating systems
Building Internet Firewalls, Platforms
Practical UNIX & Internet Security, 1.2. What Is an Operating System?
Practical UNIX & Internet Security, 12.3.3. Other Media
administration : (see system administration)
choosing : Building Internet Firewalls, 5.3.1. What Operating System?
errors
sendmail, 36.5.3. EX_IOERR A System I/O Error Occurred
sendmail, 36.5.5. EX_OSERR A System Resource Error
file failure : sendmail, 36.5.6. EX_OSFILE A Critical System File Failure
fixing bugs in : Building Internet Firewalls, 5.8.1.2. Fix all known system bugs
installation of : Building Internet Firewalls, 5.8.1.1. Start with a minimal clean operating system
keeping secret : Practical UNIX & Internet Security, 2.5. The Problem with Security Through Obscurity
load : (see performance)
multiple, and proxying : Building Internet Firewalls, 7.1. Why Proxying?
OSTYPE declaration
sendmail, 16.2.2. OSTYPE
sendmail, 19.3.1. OSTYPE()
TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros
defines, listed : TCP/IP Network Administration, E.3.3. OSTYPE
in sendmail
TCP/IP Network Administration, E.3. m4 sendmail Macros
TCP/IP Network Administration, E.3.3. OSTYPE
testing reload of : Building Internet Firewalls, 13.5.6. Testing the Reload of the Operating
UNIX : (see UNIX)
OperatorChars (o) option
sendmail, 8.3. Rule Sets
sendmail, 31.10. Alphabetized Reference
sendmail, 34.8. Alphabetized Reference
operators, token separation : (see OperatorChars (o) option)
opiekey software : TCP/IP Network Administration, 12.2.4. OPIE
opiepassword : TCP/IP Network Administration, 12.2.4. OPIE
${opmode} macro : sendmail, 31.10. Alphabetized Reference
optic cables : (see cables, network)
optical vampire taps : Practical UNIX & Internet Security, 12.3.1.5. Fiber optic cable
option field, in DHCP : TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
option set, invoking dialup IP (dip) : TCP/IP Network Administration, A.1. Dial-Up IP
optional database files : sendmail, 33.3.4.8. -o the database file is optional (V8.1 and above)
Options command : Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
options directive
DNS & BIND, 6.1.6. The options Directive
DNS & BIND, 14.2.5. The _res Structure
DNS & BIND, F.1.10. options (4.9.3)
DNS & BIND, F.1.19. options (8.X.X)
options allow-query : DNS & BIND, 10.11.2. Restricting Queries
options auth-nxdomain : DNS & BIND, 13.5.7. Other Name Servers Don't Cache Your Negative Answers
options cleaning-interval : DNS & BIND, 10.4.3.1. Cleaning interval
options coresize : DNS & BIND, 10.4.2.3. Changing the core size limit
options debug
DNS & BIND, 6.1.6. The options Directive
DNS & BIND, F.2.7. options debug (4.9.3 and later versions)
options fake-iquery : DNS & BIND, F.1.10.5. options fake-iquery
options fetch-glue
DNS & BIND, 10.9. A Nonrecursive Name Server
DNS & BIND, 10.11.5. Delegated Name Server Configuration
options files : DNS & BIND, 10.4.2.4. Changing the open files limit
options forward-only
DNS & BIND, 10.8. A More Restricted Name Server
DNS & BIND, F.1.10.1. options forward-only
options forwarders : DNS & BIND, 10.7. Building Up a Large Site-wide Cache with Forwarders
options interface-interval : DNS & BIND, 10.4.3.2. Interface interval
options listen-on : DNS & BIND, 10.11.7. Two Name Servers in One
options ndots
DNS & BIND, 6.1.6. The options Directive
DNS & BIND, F.2.6. options ndots (4.9.3 and later versions)
options no-fetch-glue
DNS & BIND, 10.9. A Nonrecursive Name Server
DNS & BIND, 10.11.5. Delegated Name Server Configuration
DNS & BIND, F.1.10.3. options no-fetch-glue
options no-recursion
DNS & BIND, 10.9. A Nonrecursive Name Server
DNS & BIND, 10.11.5. Delegated Name Server Configuration
DNS & BIND, F.1.10.2. options no-recursion
options pid-file : DNS & BIND, 10.11.4. Running BIND as a Non-Root User
options query-log
DNS & BIND, 7.6.1. Common Syslog Messages
DNS & BIND, 13.2.3. Logging Queries
DNS & BIND, F.1.10.4. options query-log
options recursion
DNS & BIND, 10.9. A Nonrecursive Name Server
DNS & BIND, 10.11.5. Delegated Name Server Configuration
options statistics-interval : DNS & BIND, 10.4.3.3. Statistics interval
options transfer-format : DNS & BIND, 10.4.1.4. More efficient zone transfers
options entry, in resolv.conf : TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
options file
TCP/IP Network Administration, 6.3.1. The PPP Daemon
TCP/IP Network Administration, 6.3.2. Dial-Up PPP
options statement : TCP/IP Network Administration, 5.3.1.1. Options
in gated : TCP/IP Network Administration, B.5. Options Statements
INET
TCP/IP Network Administration, 5.3.1.1. Options
TCP/IP Network Administration, A.2. The PPP Daemon
options, sendmail
sendmail, 3.1. Role in the Filesystem
sendmail, 4. How to Run sendmail
sendmail, 5.3.7. Options
sendmail, 13. Setting Options
sendmail, 19.4.1. Options
sendmail, 34. Options
(see also switches, command-line)
m4 and : sendmail, 34.3. Configuring with V8 m4 Options
multicharacter
sendmail, 34.1.2. V8.7 Multicharacter Options in the Command Line
sendmail, 36.7. Alphabetized Reference
required : sendmail, 13.2. Required Options
safe : sendmail, 34.1.4. Options that Are Safe
security : sendmail, 22.8.3. Security Options
single-character : sendmail, 36.7. Alphabetized Reference
testing : sendmail, 13.3. Testing the Options
options.device file : TCP/IP Network Administration, A.2. The PPP Daemon
Orange Book : Practical UNIX & Internet Security, 2.3.3. Adding Up the Numbers
ORCPT address : sendmail, 23.9. The qf File Internals
order keyword : DNS & BIND, 6.4.8. Linux
order, data transmission : DNS & BIND, A.3.3. Data Transmission Order
org domain
DNS & BIND, 2.2.1. Top-Level Domains
TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
organizing db files : DNS & BIND, 7.3. Organizing Your Files
origin date, message : (see $a macro)
$ORIGIN entries (db files)
DNS & BIND, 7.3.2. Changing the Origin in a Database File
DNS & BIND, A.1. Master File Format
origin, db file
DNS & BIND, 4.4.1. Appending Domains
DNS & BIND, 7.3.2. Changing the Origin in a Database File
originate mode : Practical UNIX & Internet Security, 14.3.1. Originate and Answer
originate testing : Practical UNIX & Internet Security, 14.5.3.1. Originate testing
orphaned locks : sendmail, 23.2.3.3. Locks can get stuck
os data category (logging) : DNS & BIND, 7.5.3. Category Details
OSF (Open Software Foundation) : Practical UNIX & Internet Security, 1.3. History of UNIX
OSF/1 operating system : Practical UNIX & Internet Security, 1.3. History of UNIX
OSI (Open System Interconnection)
Building Internet Firewalls, C.2.1. OSI Reference Model
Practical UNIX & Internet Security, 16.4.4. OSI
TCP/IP Network Administration, 1.2. A Data Communications Model
TCP/IP Network Administration, 6.1.1. Determining the Interface Name
OSPF protocol
TCP/IP Network Administration, Preface
TCP/IP Network Administration, 1.7. Application Layer
TCP/IP Network Administration, 7.4.3. Open Shortest Path First
authenticating packets : TCP/IP Network Administration, B.8.1. The ospf Statement
enabling (in gated)
TCP/IP Network Administration, 7.7.1.2. Interior gateway configurations
TCP/IP Network Administration, 7.7.1.3. Exterior gateway configuration
TCP/IP Network Administration, B.8.1. The ospf Statement
ospf statement (in gated) : TCP/IP Network Administration, B.8.1. The ospf Statement
ospfase protocol : TCP/IP Network Administration, 7.7.1.3. Exterior gateway configuration
OSTYPE command (m4)
sendmail, 16.2.2. OSTYPE
sendmail, 19.3.1. OSTYPE()
TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros
defines, listed : TCP/IP Network Administration, E.3.3. OSTYPE
in sendmail
TCP/IP Network Administration, E.3. m4 sendmail Macros
TCP/IP Network Administration, E.3.3. OSTYPE
out-of-date files, defined : TCP/IP Network Administration, 9.6.1. rdist
out-of-zone resource records : DNS & BIND, 13.4.2. Name Server Behavior
outages : DNS & BIND, 8.5.1. Outages
Outcome table (NIS+) : Practical UNIX & Internet Security, 19.5.3. NIS+ Tables
outdated software : (see software)
outgoing (outbound)
calls : Practical UNIX & Internet Security, 14.5. Modems and UNIX
finger requests : Building Internet Firewalls, 8.8.1. finger
mail, logging : Practical UNIX & Internet Security, 10.4.2. Mail
packets : Building Internet Firewalls, 6.2.2. Be Careful of `Inbound'
filtering rules for : Building Internet Firewalls, 6.8.6. It Should Apply Rules Separately to
Telnet : Building Internet Firewalls, 6.7.1. Outbound Telnet Service
output
debugging : sendmail, 37.3. Interpreting the Output
errors (Oerrs) : TCP/IP Network Administration, 11.4.3. Checking the Interface with netstat
feedback (OFB) : Practical UNIX & Internet Security, 6.4.4.2. DES modes
rule testing : sendmail, 38.6.4. The Output
syslog : sendmail, 26.1.3. syslog's Output
output, debugging : (see debugging)
"outside zone" message : DNS & BIND, 7.6.1. Common Syslog Messages
outsiders : Practical UNIX & Internet Security, 13.3. Outsiders
overload attacks
Practical UNIX & Internet Security, 25.2. Overload Attacks
Practical UNIX & Internet Security, 25.2.5. Soft Process Limits: Preventing Accidental Denial
overruns : (see buffers, overruns)
overtime : Practical UNIX & Internet Security, 13.2.3. Performance Reviews and Monitoring
overwhelming the server : TCP/IP Network Administration, 9.4. A BOOTP Server
overworked name server : DNS & BIND, 8.1.2. Capacity Planning
overwriting
files : sendmail, 33.2.1.4. -o append to, don't overwrite the file
media : Practical UNIX & Internet Security, 12.3.2.3. Sanitize your media before disposal
rule sets : sendmail, 8.4. Rules
OW- (sendmail.cf) : Practical UNIX & Internet Security, 17.3.4.2. Using sendmail to receive email
"owner name is invalid" message : DNS & BIND, 7.6.1. Common Syslog Messages
owner, mailing list : sendmail, 25.3. Defining a Mailing List Owner
owner-admin alias : TCP/IP Network Administration, 10.3. sendmail Aliases
owners of information : Practical UNIX & Internet Security, 2.4.4.1. Assign an owner
owners, changing : Practical UNIX & Internet Security, 5.7. chown: Changing a File's Owner
ownership : (see permissions)
ownership notices : Practical UNIX & Internet Security, 26.2.6. Other Tips


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.