start page | rating of books | rating of authors | reviews | copyrights
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: D
- D configuration command
- sendmail, 5.3.2. Macros
- sendmail, 7.1. Overview
- sendmail, 31.3. Configuration File Definitions
- d flag : sendmail, 30.8. Alphabetized F= Flags
- D flag
- sendmail, 14.2.2. The Date: Header
- sendmail, 30.8. Alphabetized F= Flags
- D line (host status file) : sendmail, B.1. Status file lines
- D line (qf file) : sendmail, 23.9. The qf File Internals
- $d macro : sendmail, 31.10. Alphabetized Reference
- d option : (see DeliveryMode (d) option)
- D option : (see AutoRebuildAliases (D) option)
- .D rule-testing command : sendmail, 38.2.1. Define a Macro with .D
- -d switch (makemap) : sendmail, 33.2.1.1. -d allow duplicate keys
- -d switch (sendmail)
- sendmail, 4.3. Debugging (-d)
- sendmail, 36.7. Alphabetized Reference
- sendmail, 37.1. The Syntax of -d
- complete list of switches : sendmail, 37.5. Reference in Numerical Order
- -d0.1 switch
- sendmail, 7.3.1. The hostname
- sendmail, 11.6. Handling user@thishost
- sendmail, 37.5. Reference in Numerical Order
- -d0.15 switch
- sendmail, 6.3.3. Testing the New Delivery Agent Definitions
- sendmail, 37.5. Reference in Numerical Order
- -d0.4 switch
- sendmail, 31.7.1. Macros and the System Identity
- sendmail, 37.5. Reference in Numerical Order
- -d21.12 switch
- sendmail, 10.5. Details of Rule Flow
- sendmail, 37.5. Reference in Numerical Order
- -d35.9 switch
- sendmail, 7.3. Predefined Macros
- sendmail, 37.5. Reference in Numerical Order
- -d37.1 switch
- sendmail, 13.3. Testing the Options
- sendmail, 37.5. Reference in Numerical Order
- with rule testing : sendmail, 38.7. Add Debugging for Detail
- D= equate : sendmail, 30.4. The Equates
- DAC (Discretionary Access Controls) : Practical UNIX & Internet Security, 4.1.3. Groups and Group Identifiers (GIDs)
- daemon
- TCP/IP Network Administration, 3.2. The Host Table
- TCP/IP Network Administration, 5.4. The Internet Daemon
- options for : sendmail, 34.8. Alphabetized Reference
- preventing from running : sendmail, 15.5. Prevent the Daemon from Running
- privacy of : sendmail, 34.8. Alphabetized Reference
- signals : sendmail, 26.3. Signaling the Daemon
- tools for : Building Internet Firewalls, B.5. Daemons
- user
- Practical UNIX & Internet Security, 4.1. Users and Groups
- sendmail, 14.6. Trusted User
- TCP/IP Network Administration, 5.4. The Internet Daemon
- daemon mode
- sendmail, 3.4. Role as a Daemon
- sendmail, 4.1.1. Daemon Mode (-bd)
- sendmail, 36.7. Alphabetized Reference
- DaemonPortOptions (O) option : sendmail, 34.8. Alphabetized Reference
- damage, liability for : Practical UNIX & Internet Security, 26.4.6. Liability for Damage
- "dangerous write permissions" warning : sendmail, 22.5.1. Dangerous Write Permissions
- dash (hyphen)
- in machine conversation : sendmail, 4.2. Verbose (-v)
- non-equivalent host : TCP/IP Network Administration, 12.2.5. Secure the r Commands
- DAT (Digital Audio Tape) : Practical UNIX & Internet Security, 7.1.4. Guarding Against Media Failure
- data : Building Internet Firewalls, 1.1.1. Your Data
- assigning owners to : Practical UNIX & Internet Security, 2.4.4.1. Assign an owner
- availability of : Practical UNIX & Internet Security, 2.1. Planning Your Security Needs
- communication equipment (DCE) : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- communications model : TCP/IP Network Administration, 1.2. A Data Communications Model
- communications protocols : (see TCP/IP services)
- compression, not provided in SLIP : TCP/IP Network Administration, 6.2.1. The Serial Protocols
- confidential
- Practical UNIX & Internet Security, 2.1. Planning Your Security Needs
- Practical UNIX & Internet Security, 2.5.2. Confidential Information
- disclosure of : Practical UNIX & Internet Security, 11.2. Damage
- DNS
- Building Internet Firewalls, 8.10.3. DNS Data
- Building Internet Firewalls, 8.10.4.2. Mismatched data between the hostname
- espionage
- Building Internet Firewalls, 1.2.2.4. Spies (Industrial and
- Practical UNIX & Internet Security, 11.3. Authors
- giving away with NIS : Practical UNIX & Internet Security, 19.4.5. Unintended Disclosure of Site Information with NIS
- identifying assets : Practical UNIX & Internet Security, 2.2.1.1. Identifying assets
- protecting from sniffers : Building Internet Firewalls, 10.1.2. Packet Sniffing
- spoofing : Practical UNIX & Internet Security, 16.3. IP Security
- terminal equipment (DTE) : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- theft of : (see information, theft and espionage)
- transferring
- Building Internet Firewalls, 6. Packet Filtering
- (see email; files, transferring)
- allowing/disallowing : Building Internet Firewalls, 6.1. Why Packet Filtering?
- via TCP : Building Internet Firewalls, 6.3.3.1. TCP
- user-specified, and proxying : Building Internet Firewalls, 7.4.4. User-Specified Data
- Data Carrier Detect (DCD) : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- DATA command, in SMTP : TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
- Data Defense Network (DDN) : Practical UNIX & Internet Security, F.3.4.20. MILNET
- Data Encryption Standard : (see DES)
- DATA keyword : sendmail, 4.2. Verbose (-v)
- Data Link Layer
- TCP/IP Network Administration, 1.2. A Data Communications Model
- TCP/IP Network Administration, 5.3.1.2. Pseudo-device
- TCP/IP Network Administration, 6.1.1. Determining the Interface Name
- in PPP : TCP/IP Network Administration, 6.2.1. The Serial Protocols
- Data Set Ready (DSR) : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- Data Terminal Ready (DTR)
- Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- TCP/IP Network Administration, A.2. The PPP Daemon
- data terminology : TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
- data-driven attacks : Building Internet Firewalls, 8.1. Electronic Mail
- database files : Practical UNIX & Internet Security, 1.2. What Is an Operating System?
- database macros : sendmail, 33. Database Macros
- databases : (see networks and networking, databases, network)
- classes for : sendmail, 33.8. Alphabetized Reference
- external (keyed)
- sendmail, 5.3.11. Keyed Databases
- sendmail, 20.3. Alphabetized V8.8 Subroutines
- K command types : sendmail, 33.3.2. The class
- library support : sendmail, 18.4.1. DBMDEF=
- m4 and : sendmail, 33.6. Database Maps and m4
- /map rule-testing command : sendmail, 38.5.3. Look up a Database Item with /map
- sendmail : TCP/IP Network Administration, 10.6.2.1. Transforming with a database
- User Database
- sendmail, 33.5. The User Database
- sendmail, 33.8. Alphabetized Reference
- sendmail, 34.8. Alphabetized Reference
- datagrams
- Building Internet Firewalls, C.5.1.1. The datagram
- TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
- TCP/IP Network Administration, 1.5.1.1. The datagram
- TCP/IP Network Administration, 1.7. Application Layer
- (see also IP datagrams)
- (see also User Datagram Protocol)
- connectionless delivery of : TCP/IP Network Administration, 1.6. Transport Layer
- converting source address of : TCP/IP Network Administration, 4.2.1. Obtaining an IP Address
- forwarding : TCP/IP Network Administration, 5.3.1.1. Options
- fragmented
- Building Internet Firewalls, C.5.1.3. Fragmenting datagrams
- TCP/IP Network Administration, 1.5.1.3. Fragmenting datagrams
- TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- headers
- TCP/IP Network Administration, 2.7.1. Protocol Numbers
- TCP/IP Network Administration, 2.7.2. Port Numbers
- marking end of : TCP/IP Network Administration, 6.2.1. The Serial Protocols
- routing : TCP/IP Network Administration, 1.5.1.2. Routing datagrams
- silently discarding : TCP/IP Network Administration, 11.8. Protocol Case Study
- date : (see time and date)
- date command
- Practical UNIX & Internet Security, 8.1.3. Accounts That Run a Single Command
- Practical UNIX & Internet Security, 24.5.1. Never Trust Anything Except Hardcopy
- "Date:" header line
- sendmail, 1.5. The Header
- sendmail, 14.2.2. The Date: Header
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 35.10. Alphabetized Reference
- day-zero backups : Practical UNIX & Internet Security, 7.1.3. Types of Backups
- db library package
- sendmail, 2.4.1. Eliminate or Keep db Support?
- sendmail, 18.8. Alphabetized Reference
- sendmail, C.1. Overview
- compiling and installing : sendmail, C.3. Compile and Install
- dbm database : sendmail, 33.8. Alphabetized Reference
- alias file and
- sendmail, 22.6.1. The Alias Database Files
- sendmail, 24.5. The Aliases Database
- dbx debugger : Practical UNIX & Internet Security, C.4. The kill Command
- DCC (Direct Client Connections) : Building Internet Firewalls, 8.9.2. Internet Relay Chat
- DCD (Data Carrier Detect) modem control line : TCP/IP Network Administration, A.2. The PPP Daemon
- DCE (data communication equipment) : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- DCE (Distributed Computing Environment)
- Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
- Practical UNIX & Internet Security, 8.7.3. Code Books
- Practical UNIX & Internet Security, 16.2.6.2. Other naming services
- Practical UNIX & Internet Security, 19.2. Sun's Remote Procedure Call (RPC)
- Practical UNIX & Internet Security, 19.7.1. DCE
- dd command
- Practical UNIX & Internet Security, 6.6.1.2. Ways of improving the security of crypt
- Practical UNIX & Internet Security, 7.4.1. Simple Local Copies
- DDN (Data Defense Network)
- Building Internet Firewalls, C.10. Internet Routing Architecture
- Practical UNIX & Internet Security, F.3.4.20. MILNET
- TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
- Protocol Handbook : TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
- deadlock : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- debug command
- Practical UNIX & Internet Security, 17.3.4.2. Using sendmail to receive email
- sendmail, 22.3.1. SMTP debug
- debug_dumpstate rule set : sendmail, 26.3.3.3. -- ruleset debug_dumpstate returns stat ..., pv: --
- debugfs command : Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
- debugging
- Building Internet Firewalls, 6.1.2.1. Current filtering tools are not perfect
- sendmail, 4.3. Debugging (-d)
- sendmail, 6.3.3. Testing the New Delivery Agent Definitions
- sendmail, 37.2. Debugging Behavior
- TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
- TCP/IP Network Administration, C.1.1. Signal Processing
- (see also bugs)
- (see also -d switch (sendmail))
- (see also testing)
- (see also troubleshooting)
- operating system : Building Internet Firewalls, 5.8.1.2. Fix all known system bugs
- with rule testing : sendmail, 38.7. Add Debugging for Detail
- SMTPDEBUG macro
- sendmail, 18.8. Alphabetized Reference
- sendmail, 22.3.1. SMTP debug
- debugging mode : sendmail, 36.7. Alphabetized Reference
- DEC (Digital Equipment Corporation) : Practical UNIX & Internet Security, F.3.4.9. DEC (Digital Equipment Corporation)
- decentralizing management : TCP/IP Network Administration, 2.3. Subnets
- declaring
- classes
- sendmail, 12.1.1. Declaring a Class
- sendmail, 32.1. Class Configuration Commands
- delivery agents : sendmail, 19.3.2. MAILER()
- macros
- sendmail, 7.2. Defining Macros
- sendmail, 31.2. Command-Line Definitions
- sites for SITECONFIG : sendmail, 19.6. Alphabetized m4 Macros
- trusted users : (see T configuration command)
- DECnet network
- Practical UNIX & Internet Security, 16.4.3. DECnet
- sendmail, 3.3.3. Other Protocols
- $C macro : sendmail, 31.10. Alphabetized Reference
- DECNET-RELAY macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
- decode alias
- Practical UNIX & Internet Security, 17.3.4.2. Using sendmail to receive email
- sendmail, 22.6. The Aliases File
- decryption
- TCP/IP Network Administration, 12.6. Encryption
- (see encryption)
- dedicated connections
- TCP/IP Network Administration, 6.3.1. The PPP Daemon
- TCP/IP Network Administration, 6.4. Installing SLIP
- dedicated proxy servers : Building Internet Firewalls, 7.3.2. Generic Versus Dedicated Proxies
- defamation : Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication, and Defamation
- default
- accounts : Practical UNIX & Internet Security, 8.1.2. Default Accounts
- canonicalization : sendmail, 28.6.6.2. Default in canonicalization: $:
- character set : sendmail, 30.4. The Equates
- content-type character set : sendmail, 34.8. Alphabetized Reference
- database key : sendmail, 33.4.1. Specify a Default with $:
- delivery agent : sendmail, 34.8. Alphabetized Reference
- delivery mode : sendmail, 13.2.3. The Default Delivery Mode
- deny : Practical UNIX & Internet Security, 21.1.1. Default Permit vs. Default Deny
- domain
- Practical UNIX & Internet Security, 16.2.3. Hostnames
- TCP/IP Network Administration, 3.3.3. Domain Names
- TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
- how used : TCP/IP Network Administration, 3.3.3. Domain Names
- file permissions : sendmail, 13.2.4. The Default File Permissions
- gateway
- TCP/IP Network Administration, 2.5. The Routing Table
- TCP/IP Network Administration, 4.3. Planning Routing
- address : TCP/IP Network Administration, 4. Getting Started
- hostname : sendmail, 33.5.3. A :default Outgoing Hostname
- logging level : sendmail, 13.2.6. The Default Logging Level
- macro definitions : sendmail, 7.3. Predefined Macros
- mask : TCP/IP Network Administration, 2.2.2. Classless IP Addresses
- passwords : TCP/IP Network Administration, 12.2. User Authentication
- permit : Practical UNIX & Internet Security, 21.1.1. Default Permit vs. Default Deny
- route
- TCP/IP Network Administration, 2.2.2.1. Final notes on IP addresses
- TCP/IP Network Administration, 2.5. The Routing Table
- TCP/IP Network Administration, 7.3. Building a Static Routing Table
- defining : TCP/IP Network Administration, 7.4.1.1. Running RIP with routed
- sender's address format : sendmail, 31.10. Alphabetized Reference
- User Database location : sendmail, 18.8. Alphabetized Reference
- user identity
- sendmail, 13.2.5. The Default User Identities
- sendmail, 22.8.3.1. The DefaultUser option
- sendmail, 34.8. Alphabetized Reference
- values : TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
- default deny stance
- Building Internet Firewalls, 3.5.1. Default Deny Stance: That Which Is Not
- Building Internet Firewalls, 6.2.3. Default Permit Versus Default Deny
- default permit stance
- Building Internet Firewalls, 3.5.2. Default Permit Stance: That Which Is
- Building Internet Firewalls, 6.2.3. Default Permit Versus Default Deny
- DefaultCharSet option : sendmail, 34.8. Alphabetized Reference
- defaultdomain file : TCP/IP Network Administration, 9.3. Network Information Service
- defaultroute option : TCP/IP Network Administration, 6.3.1. The PPP Daemon
- DefaultUser (u,g) option
- sendmail, 13.2.5. The Default User Identities
- sendmail, 22.8.3.1. The DefaultUser option
- sendmail, 34.8. Alphabetized Reference
- Defense Communications Agency (DCA) : TCP/IP Network Administration, 1.1. TCP/IP and the Internet
- Defense Data Network (DDN) : Building Internet Firewalls, C.10. Internet Routing Architecture
- defense in depth
- Building Internet Firewalls, 3.2. Defense in Depth
- Building Internet Firewalls, 9.2.3.2. Defense in depth
- define() : sendmail, 20.3. Alphabetized V8.8 Subroutines
- define macro (in sendmail)
- TCP/IP Network Administration, E.3. m4 sendmail Macros
- TCP/IP Network Administration, E.3.1. define
- define statements (m4)
- sendmail, 19.1. The m4 Preprocessor
- sendmail, 19.4.1. Options
- defining
- headers : (see H configuration command)
- macros
- sendmail, 20.3. Alphabetized V8.8 Subroutines
- sendmail, 34.8. Alphabetized Reference
- sendmail, 36.7. Alphabetized Reference
- sendmail, 38.2.1. Define a Macro with .D
- definition statements (in gated) : TCP/IP Network Administration, B.7. Definition Statements
- delay= equate (syslog output) : sendmail, 26.1.3.2. delay= total time to deliver
- delay, transaction : sendmail, 26.1.3.13. xdelay= transaction
- delays, inserting
- TCP/IP Network Administration, 6.3.2. Dial-Up PPP
- TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
- DELETE key : Practical UNIX & Internet Security, 3.4. Changing Your Password
- deleting
- destructive attack via : Practical UNIX & Internet Security, 25.1. Destructive Attacks
- files : Practical UNIX & Internet Security, 5.4. Using Directory Permissions
- header lines : sendmail, 20.3. Alphabetized V8.8 Subroutines
- delimiters
- database key column : sendmail, 33.3.4.12. -z specify the column delimiter (V8.7 and above)
- tokens
- sendmail, 31.10. Alphabetized Reference
- sendmail, 34.8. Alphabetized Reference
- "Delivered-To:" header line : sendmail, 35.10. Alphabetized Reference
- delivermail program : sendmail, History
- delivery
- sendmail, 19.6. Alphabetized m4 Macros
- (see also users)
- alias, forms of : sendmail, 24.2. Forms of Alias Delivery
- failure count : sendmail, 23.9. The qf File Internals
- via FAX machine : sendmail, 3.3.3. Other Protocols
- to files : (see appending to files)
- local
- sendmail, 3.2. Role in Local Delivery
- sendmail, 29.6.3. Delivering to Local Recipient
- sendmail, 30.8. Alphabetized F= Flags
- (see local)
- looking up addresses with DNS : sendmail, 21.2.3. Look Up Addresses for Delivery
- to mailbox : sendmail, 3.2.1. Delivery to a Mailbox
- to multiple recipients : sendmail, 30.8. Alphabetized F= Flags
- path of : (see "Received:" header line)
- precedence : (see priority, message)
- to programs
- sendmail, 3.2.2. Delivery Through a Program
- sendmail, 24.2.3. Delivery via Programs
- sendmail, 25.7.4. Piping Through Programs
- sendmail, 30.8. Alphabetized F= Flags
- relays : (see relays)
- single threaded : sendmail, 34.8. Alphabetized Reference
- total time for : sendmail, 26.1.3.2. delay= total time to deliver
- delivery agents (MTAs)
- Building Internet Firewalls, 8.1. Electronic Mail
- sendmail, 1.1. MUA Versus MTA
- sendmail, 5.3.1. Mail Delivery Agents
- sendmail, 6.2. Define a Mail Delivery Agent
- sendmail, 30. Delivery Agents
- (see also M configuration command)
- $# operator and
- sendmail, 9.2.1. The Delivery Agent ($#)
- sendmail, 28.6.5. Specify a Delivery Agent: $#
- advantages to sendmail : sendmail, 18.1. To Use or Not to Use
- choosing
- sendmail, 9. Rule Set 0
- sendmail, 9.5. Things to Try
- declaring : sendmail, 19.3.2. MAILER()
- default : sendmail, 34.8. Alphabetized Reference
- equates for : sendmail, 30.4. The Equates
- for errors : sendmail, 9.4. The error Delivery Agent
- expensive
- sendmail, 23.6.1. Periodically with -q
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 34.8. Alphabetized Reference
- flags
- sendmail, 6.3. The local Delivery Agent
- sendmail, 6.4. Add the Missing Parts to Mhub
- sendmail, 14.2. Headers Versus Delivery Agent Flags
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 35.4. ?flags? in Header Definitions
- ignoring MX records : sendmail, 21.3.5. What? They Ignore MX Records?
- local
- sendmail, 6.3. The local Delivery Agent
- sendmail, 19.6. Alphabetized m4 Macros
- logging : sendmail, 26.1.3.4. mailer= the delivery agent used
- printing list of : sendmail, 38.4.2. Show Delivery Agents with =M
- as recipients : sendmail, 30.8. Alphabetized F= Flags
- scripts via : sendmail, 24.3. Write a Delivery Agent Script
- statistics : (see statistics)
- symbolic name : sendmail, 30.2. The Symbolic Name
- testing : sendmail, 38.5.6. Try a Delivery Agent with /try
- UUCP : sendmail, 19.4.6. UUCP
- delivery mode : sendmail, 13.2.3. The Default Delivery Mode
- delivery program : sendmail, 25.7.5.1. The deliver program
- Delivery Status Notification : (see DSN)
- DeliveryMode (d) option
- sendmail, 13.2.3. The Default Delivery Mode
- sendmail, 23.6.1. Periodically with -q
- sendmail, 34.8. Alphabetized Reference
- Demilitarized Zone (DMZ) : Building Internet Firewalls, 4.1. Some Firewall Definitions
- demo accounts : Practical UNIX & Internet Security, 8.1.2. Default Accounts
- demultiplexing : TCP/IP Network Administration, 2.7. Protocols, Ports, and Sockets
- denial of service
- Building Internet Firewalls, 1.2.1.2. Denial of Service
- Practical UNIX & Internet Security, 1.5. Role of This Book
- Practical UNIX & Internet Security, 17.1.3. The /etc/inetd Program
- Practical UNIX & Internet Security, 17.3.21.5. Denial of service attacks under X
- Practical UNIX & Internet Security, 25. Denial of Service Attacks and Solutions
- Practical UNIX & Internet Security, 25.3. Network Denial of Service Attacks
- Practical UNIX & Internet Security, 25.3.4. Clogging
- TCP/IP Network Administration, 12.1.1. Assessing the Threat
- accidental
- Building Internet Firewalls, 1.2.3. Stupidity and Accidents
- Practical UNIX & Internet Security, 25.2.5. Soft Process Limits: Preventing Accidental Denial
- automatic lockout : Practical UNIX & Internet Security, 3.3. Entering Your Password
- checklist for : Practical UNIX & Internet Security, A.1.1.24. Chapter 25: Denial of Service Attacks and Solutions
- destructive attacks : Practical UNIX & Internet Security, 25.1. Destructive Attacks
- disk attacks
- Practical UNIX & Internet Security, 25.2.2. Disk Attacks
- Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
- inodes : Practical UNIX & Internet Security, 25.2.2.3. Inode problems
- internal inetd services : Practical UNIX & Internet Security, 17.1.3. The /etc/inetd Program
- on networks
- Practical UNIX & Internet Security, 25.3. Network Denial of Service Attacks
- Practical UNIX & Internet Security, 25.3.4. Clogging
- overload attacks
- Practical UNIX & Internet Security, 25.2. Overload Attacks
- Practical UNIX & Internet Security, 25.2.5. Soft Process Limits: Preventing Accidental Denial
- via syslog : Practical UNIX & Internet Security, 10.5.1. The syslog.conf Configuration File
- system overload attacks : Practical UNIX & Internet Security, 25.2.1.2. System overload attacks
- X Window System : Practical UNIX & Internet Security, 17.3.21.5. Denial of service attacks under X
- departure of employees : Practical UNIX & Internet Security, 13.2.6. Departure
- depository directories, FTP : Practical UNIX & Internet Security, 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP
- dequote database
- sendmail, 33.8. Alphabetized Reference
- TCP/IP Network Administration, 10.7.1. Modifying Local Information
- DES (Data Encryption Standard)
- Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
- Practical UNIX & Internet Security, 6.4.4. DES
- Practical UNIX & Internet Security, 6.4.5.2. Triple DES
- Practical UNIX & Internet Security, 6.6.2. des: The Data Encryption Standard
- Practical UNIX & Internet Security, 7.4.4. Encrypting Your Backups
- Practical UNIX & Internet Security, 8.6.1. The crypt()
- (see also authentication)
- authentication (NIS+) : Practical UNIX & Internet Security, 19.5.4. Using NIS+
- improving security of
- Practical UNIX & Internet Security, 6.4.5. Improving the Security of DES
- Practical UNIX & Internet Security, 6.4.5.2. Triple DES
- designated router : TCP/IP Network Administration, 7.4.3. Open Shortest Path First
- designing firewalls : Building Internet Firewalls, 1.4.3. Buying Versus Building
- destination
- TCP/IP Network Administration, 1.7. Application Layer
- (see also unreachable destinations, detecting)
- fields : TCP/IP Network Administration, 2.5. The Routing Table
- host : TCP/IP Network Administration, 2.5. The Routing Table
- Destination Address
- TCP/IP Network Administration, 1.5.1.1. The datagram
- TCP/IP Network Administration, 2.2. The IP Address
- Destination Port number
- TCP/IP Network Administration, 1.6.1. User Datagram Protocol
- TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
- destination unreachable codes : (see ICMP)
- Destination Unreachable Message : TCP/IP Network Administration, 1.5.2. Internet Control Message Protocol
- destroying media : Practical UNIX & Internet Security, 12.3.2.3. Sanitize your media before disposal
- destructive attacks : Practical UNIX & Internet Security, 25.1. Destructive Attacks
- detached signatures : Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
- detail data, DSN delivery : sendmail, 30.5.2.1. The $@ dsn part
- detectors
- cable tampering : Practical UNIX & Internet Security, 12.3.1.1. Wiretapping
- carbon-monoxide : Practical UNIX & Internet Security, 12.2.1.2. Smoke
- humidity : Practical UNIX & Internet Security, 12.2.1.11. Humidity
- logging alarm systems : Practical UNIX & Internet Security, 10.7.1.1. Exception and activity reports
- smoke : Practical UNIX & Internet Security, 12.2.1.2. Smoke
- temperature alarms : Practical UNIX & Internet Security, 12.2.1.6. Temperature extremes
- water sensors : Practical UNIX & Internet Security, 12.2.1.12. Water
- Deutsches Forschungsnetz : Practical UNIX & Internet Security, F.3.4.14. Germany: DFN-WiNet Internet sites
- /dev directory
- Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer
- TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
- /dev/audio device : Practical UNIX & Internet Security, 23.8. Picking a Random Seed
- /dev/console device : Practical UNIX & Internet Security, 5.6. Device Files
- /dev/kmem device
- Practical UNIX & Internet Security, 5.6. Device Files
- Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
- sendmail, 18.8. Alphabetized Reference
- /dev/null device
- Practical UNIX & Internet Security, 5.6. Device Files
- sendmail, 5.2. The Minimal File
- /dev/random device : Practical UNIX & Internet Security, 23.7.4. Other random number generators
- /dev/swap device : Practical UNIX & Internet Security, 5.5.1. SUID, SGID, and Sticky Bits
- /dev/urandom device : Practical UNIX & Internet Security, 23.7.4. Other random number generators
- device statement : TCP/IP Network Administration, 5.3.1.3. Devices
- devices : Practical UNIX & Internet Security, 5.6. Device Files
- managing with SNMP : Practical UNIX & Internet Security, 17.3.15. Simple Network Management Protocol (SNMP) (UDP Ports
- modem control : Practical UNIX & Internet Security, 14.5.2. Setting Up the UNIX Device
- numbers for : sendmail, 23.9. The qf File Internals
- Devices file : Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer
- df -i command : Practical UNIX & Internet Security, 25.2.2.3. Inode problems
- df files
- sendmail, 3.1.2. The Queue Directory
- sendmail, 23.2.2. The Data (Message Body) File: df
- sendmail, 23.9. The qf File Internals
- inode and device information : sendmail, 23.9. The qf File Internals
- dfstab file
- TCP/IP Network Administration, 9.1.2.1. The share command
- TCP/IP Network Administration, 9.1.5.1. NFS print services
- dgram sockets : TCP/IP Network Administration, 5.4. The Internet Daemon
- DHCP (Dynamic Host Configuration Protocol)
- TCP/IP Network Administration, Preface
- TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
- interoperability and : TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
- backwards-compatible : TCP/IP Network Administration, 9.5. DHCP
- based on Bootstrap Protocol (BOOTP) : TCP/IP Network Administration, 9.4.2. BOOTP extensions
- benefits of : TCP/IP Network Administration, 9.5. DHCP
- daemon (dhcpd) : TCP/IP Network Administration, 9.5.1. dhcpd.conf
- command : TCP/IP Network Administration, D.2. The dhcpd Command
- compiling : TCP/IP Network Administration, D.1. Compiling dhcpd
- configuring : TCP/IP Network Administration, D.3. The dhcpd.conf Configuration File
- tools reference : TCP/IP Network Administration, D. A dhcpd Reference
- using latest versions of : TCP/IP Network Administration, D. A dhcpd Reference
- dhcpd.conf file : TCP/IP Network Administration, 9.5.1. dhcpd.conf
- dhcpd.pid file : TCP/IP Network Administration, D.2. The dhcpd Command
- options available with : TCP/IP Network Administration, D.3.3. DHCP Options
- commonly used : TCP/IP Network Administration, D.3.3.1. Commonly used options
- others : TCP/IP Network Administration, D.3.3.2. Other options
- diagnostic tools : TCP/IP Network Administration, 11.2. Diagnostic Tools
- diagramming the system : Building Internet Firewalls, 13.5.2. Labeling and Diagraming Your System
- dial-up connections : TCP/IP Network Administration, 6.3.1. The PPP Daemon
- dial-up IP (dip)
- TCP/IP Network Administration, 6.3.2. Dial-Up PPP
- TCP/IP Network Administration, 6.4.2. Dial-Up IP
- script file : TCP/IP Network Administration, A.1.1. The dip Script File
- for SLIP : TCP/IP Network Administration, 6.4.2. Dial-Up IP
- sample : TCP/IP Network Administration, A.1.1.1. A sample dip script
- special variables, listed : TCP/IP Network Administration, A.1.1. The dip Script File
- tools reference : TCP/IP Network Administration, A.1. Dial-Up IP
- dial-up PPP : TCP/IP Network Administration, 6.3.2. Dial-Up PPP
- DialDelay option : sendmail, 34.8. Alphabetized Reference
- dictionary attacks
- Building Internet Firewalls, 10.3.1. One-Time Passwords
- Practical UNIX & Internet Security, 8.6.1. The crypt()
- TCP/IP Network Administration, 12.2. User Authentication
- Diffie-Hellman key exchange system
- Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
- Practical UNIX & Internet Security, 18.6. Dependence on Third Parties
- Practical UNIX & Internet Security, 19.3. Secure RPC (AUTH_DES)
- breaking key : Practical UNIX & Internet Security, 19.3.4. Limitations of Secure RPC
- exponential key exchange : Practical UNIX & Internet Security, 19.3.1. Secure RPC Authentication
- dig
- TCP/IP Network Administration, 11.2. Diagnostic Tools
- TCP/IP Network Administration, 11.3. Testing Basic Connectivity
- TCP/IP Network Administration, 11.6.4. dig: An Alternative to nslookup
- digest multipart subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- Digital Audio Tape (DAT) : Practical UNIX & Internet Security, 7.1.4. Guarding Against Media Failure
- digital computers : Practical UNIX & Internet Security, 6.1.2. Cryptography and Digital Computers
- Digital Equipment Corporation (DEC) : Practical UNIX & Internet Security, F.3.4.9. DEC (Digital Equipment Corporation)
- Digital Signature Algorithm : (see DSA)
- digital signatures
- Practical UNIX & Internet Security, 6.4. Common Cryptographic Algorithms
- Practical UNIX & Internet Security, 6.5. Message Digests and Digital Signatures
- Practical UNIX & Internet Security, 6.5.5.2. Message authentication codes
- Practical UNIX & Internet Security, 9.2.3. Checksums and Signatures
- TCP/IP Network Administration, 12.6. Encryption
- checksums
- Building Internet Firewalls, 5.8.5.3. About checksums for auditing
- Practical UNIX & Internet Security, 6.5.5.1. Checksums
- Practical UNIX & Internet Security, 9.2.3. Checksums and Signatures
- TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
- TCP/IP Network Administration, 11.8. Protocol Case Study
- keeping secure : Building Internet Firewalls, 13.5.3. Keeping Secured Checksums
- recalculating
- TCP/IP Network Administration, 4.2.1. Obtaining an IP Address
- TCP/IP Network Administration, 5.3.1.1. Options
- using Tripwire for : Building Internet Firewalls, 5.8.5.1. Auditing packages
- detached signatures : Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
- with PGP : Practical UNIX & Internet Security, 6.6.3.4. Adding a digital signature to an announcement
- Digital UNIX
- Practical UNIX & Internet Security, 1.3. History of UNIX
- (see also Ultrix)
- Dijkstra Shortest Path First (SPF) algorithm : TCP/IP Network Administration, 7.4.3. Open Shortest Path First
- dip (dial-up IP)
- TCP/IP Network Administration, 6.3.2. Dial-Up PPP
- TCP/IP Network Administration, 6.4.2. Dial-Up IP
- script file : TCP/IP Network Administration, A.1.1. The dip Script File
- for SLIP : TCP/IP Network Administration, 6.4.2. Dial-Up IP
- sample : TCP/IP Network Administration, A.1.1.1. A sample dip script
- tools reference : TCP/IP Network Administration, A.1. Dial-Up IP
- diphosts file : TCP/IP Network Administration, 6.4.3. SLIP Server Configuration
- diplogin command : TCP/IP Network Administration, 6.4.3. SLIP Server Configuration
- Direct Client Connections (DCC) : Building Internet Firewalls, 8.9.2. Internet Relay Chat
- direct delivery : TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
- directive statements (in gated) : TCP/IP Network Administration, B.3. Directive Statements
- directives, Makefile : sendmail, 18.4. Tuning Makefile
- directories
- Practical UNIX & Internet Security, 5.1.1. Directories
- Practical UNIX & Internet Security, 5.1.3. Current Directory and Paths
- ancestor : Practical UNIX & Internet Security, 9.2.2.2. Ancestor directories
- backing up by : Practical UNIX & Internet Security, 7.1.3. Types of Backups
- CDFs (context-dependent files) : Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories
- cf : sendmail, 16.1. The cf/cf Directory
- checklist for : Practical UNIX & Internet Security, A.1.1.4. Chapter 5: The UNIX Filesystem
- dot, dot-dot, and / : Practical UNIX & Internet Security, 5.1.1. Directories
- FTP depositories : Practical UNIX & Internet Security, 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP
- immutable : Practical UNIX & Internet Security, 9.1.1. Immutable and Append-Only Files
- listing automatically (Web) : Practical UNIX & Internet Security, 18.2.2.2. Additional configuration issues
- mounted
- Practical UNIX & Internet Security, 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
- Practical UNIX & Internet Security, 19.3.2.5. Mounting a secure filesystem
- nested : Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
- NFS : (see NFS)
- permissions : Practical UNIX & Internet Security, 5.4. Using Directory Permissions
- queue : (see queue directory)
- read-only : Practical UNIX & Internet Security, 9.1.2. Read-only Filesystems
- recipient's home : sendmail, 31.10. Alphabetized Reference
- requirement for mounting : TCP/IP Network Administration, 9.1.3. Mounting Remote Filesystems
- restricted
- Practical UNIX & Internet Security, 8.1.5. Restricted Filesystem
- Practical UNIX & Internet Security, 8.1.5.2. Checking new software
- root : (see root directory)
- for safe file writes : sendmail, 34.8. Alphabetized Reference
- SGI and sticky bits on : Practical UNIX & Internet Security, 5.5.6. SGID and Sticky Bits on Directories
- Web server structure of
- Practical UNIX & Internet Security, 18.2.2. Understand Your Server's Directory Structure
- Practical UNIX & Internet Security, 18.2.2.2. Additional configuration issues
- world-writable : Practical UNIX & Internet Security, 11.6.1.1. World-writable user files and directories
- directory statement : TCP/IP Network Administration, 8.3.1.2. Primary and secondary server configurations
- <Directory> blocks
- Practical UNIX & Internet Security, 18.3.1. The access.conf and .htaccess Files
- Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
- Practical UNIX & Internet Security, 18.3.2.1. Examples
- disabling Internet services : Building Internet Firewalls, 5.8.2. Disabling Nonrequired Services
- disabling routing : (see routers and routing, disabling)
- disasters and disaster recovery
- Practical UNIX & Internet Security, 12.2.6.4. Minimizing downtime
- sendmail, 21.5. Prepare for Disaster
- TCP/IP Network Administration, 11.10. Summary
- TCP/IP Network Administration, 12.1.1. Assessing the Threat
- TCP/IP Network Administration, 12.1.3. Writing a Security Policy
- TCP/IP Network Administration, 12.8. Words to the Wise
- disclosure of information, threat of : TCP/IP Network Administration, 12.1.1. Assessing the Threat
- disconnecting after incident : Building Internet Firewalls, 13.1.2. Disconnect or Shut Down, as
- disconnecting machine : Building Internet Firewalls, 13.4.3. Planning for Disconnecting or
- disk attacks
- Practical UNIX & Internet Security, 25.2.2. Disk Attacks
- Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
- disk quotas : Practical UNIX & Internet Security, 25.2.2.5. Using quotas
- disk space : (see memory; resources)
- diskettes : (see backups; media)
- disks, needs for : Building Internet Firewalls, 5.3.3. What Hardware Configuration?
- dismissed employees : Practical UNIX & Internet Security, 13.2.6. Departure
- dismounting directories, by booting : TCP/IP Network Administration, 9.1.3.1. The mount command
- disposing of materials : Practical UNIX & Internet Security, 12.3.3. Other Media
- Distfile : TCP/IP Network Administration, 9.6.1. rdist
- distributed
- architecture : TCP/IP Network Administration, 7.5.1. Exterior Gateway Protocol
- control : TCP/IP Network Administration, 12.1.2. Distributed Control
- servers, managing : TCP/IP Network Administration, 9.6. Managing Distributed Servers
- Distributed Computing Environment : (see DCE)
- Distributed File System (DFS) : TCP/IP Network Administration, 3.7.1. File Sharing
- distributing public keys : TCP/IP Network Administration, 12.6. Encryption
- diversity of defense systems : Building Internet Firewalls, 3.7. Diversity of Defense
- divert command (m4)
- sendmail, 19.1.4. m4 diversions
- sendmail, 19.6. Alphabetized m4 Macros
- dividing problem into manageable pieces : TCP/IP Network Administration, 11.1.1. Troubleshooting Hints
- DMBDEF variable : TCP/IP Network Administration, E.4.4. The sendmail K Command
- DMBDEF= directive : sendmail, 18.4.1. DBMDEF=
- dmesg command : TCP/IP Network Administration, 6.1.1. Determining the Interface Name
- DMZ (Demilitarized Zone) : Building Internet Firewalls, 4.1. Some Firewall Definitions
- dnl command (m4) : sendmail, 19.1.2. m4 and dnl
- DNS (Domain Name Service)
- Building Internet Firewalls, 2.9. Name Service
- Building Internet Firewalls, 5.6. Selecting Services Provided by the
- Practical UNIX & Internet Security, 16.2.6. Name Service
- Practical UNIX & Internet Security, 16.2.6.2. Other naming services
- Practical UNIX & Internet Security, 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
- Practical UNIX & Internet Security, 17.3.6.2. DNS nameserver attacks
- sendmail, 17.2.1. Is the Host Local?
- sendmail, 21.1. Overview
- TCP/IP Network Administration, 1.7. Application Layer
- TCP/IP Network Administration, 3.1. Names and Addresses
- TCP/IP Network Administration, 3.3. Domain Name Service
- (see also name service)
- benefits of
- TCP/IP Network Administration, 3.3. Domain Name Service
- TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
- bestmx_is_local feature : sendmail, 19.6. Alphabetized m4 Macros
- configuring : Building Internet Firewalls, 8.10. Domain Name System
- in screened host architecture : Building Internet Firewalls, 9.2.1.6. DNS
- in screened subnet architecture : Building Internet Firewalls, 9.1.1.6. DNS
- without hiding information : Building Internet Firewalls, 8.10.6. Setting up DNS Without Hiding
- data : Building Internet Firewalls, 8.10.3. DNS Data
- disasters : sendmail, 21.5. Prepare for Disaster
- eliminating support for : sendmail, 2.4.2. Eliminate DNS Support
- error numbers : sendmail, B.1. Status file lines
- fake server : Building Internet Firewalls, 8.10.5.1. Set up a `fake'
- hiding information with : Building Internet Firewalls, 8.10.5. Setting Up DNS to Hide
- MX records
- Building Internet Firewalls, 8.10.5.1. Set up a `fake'
- Practical UNIX & Internet Security, 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
- sendmail, 15.3. MX Records
- sendmail, 18.8. Alphabetized Reference
- sendmail, 21.3. Set Up MX Records
- sendmail, 34.8. Alphabetized Reference
- sendmail, 38.5.2. Look Up MX Records with /mx
- TCP/IP Network Administration, 8.3.2. Standard Resource Records
- TCP/IP Network Administration, 8.3.6. The named.hosts File
- TCP/IP Network Administration, 8.4. Using nslookup
- TCP/IP Network Administration, 10.7.1. Modifying Local Information
- TCP/IP Network Administration, C.3.1.4. Mail exchanger record
- 0 flag : sendmail, 30.8. Alphabetized F= Flags
- bestmx database class : sendmail, 33.8. Alphabetized Reference
- bestmx_is_local feature : sendmail, 19.6. Alphabetized m4 Macros
- fallback MX host : sendmail, 34.8. Alphabetized Reference
- ignored by delivery agents : sendmail, 21.3.5. What? They Ignore MX Records?
- looking up for addresses : sendmail, 21.2.3. Look Up Addresses for Delivery
- offsite hosts : sendmail, 21.5.1. Offsite MX Hosts
- with wildcards : sendmail, 21.3.4. Wildcard MX Records
- nameserver attacks : Practical UNIX & Internet Security, 17.3.6.2. DNS nameserver attacks
- omitting support : sendmail, 19.6. Alphabetized m4 Macros
- querying : TCP/IP Network Administration, 10.7.1. Modifying Local Information
- resource on : sendmail, Other Books, Other Problems
- revealing information to attackers : Building Internet Firewalls, 8.10.4.3. Revealing too much information to
- rogue servers : Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
- security and : Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
- server for internal hosts : Building Internet Firewalls, 8.10.5.2. Set up a real DNS
- starting : TCP/IP Network Administration, 5.4. The Internet Daemon
- tuning lookups : sendmail, 34.8. Alphabetized Reference
- zone transfers
- Practical UNIX & Internet Security, 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
- Practical UNIX & Internet Security, 17.3.6.1. DNS zone transfers
- docs/warnings file : TCP/IP Network Administration, 12.4.3.1. COPS
- documentation
- Practical UNIX & Internet Security, 2.5. The Problem with Security Through Obscurity
- Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- historical, of problems : TCP/IP Network Administration, 11.1.1. Troubleshooting Hints
- incidents : Building Internet Firewalls, 13.1.7. Document the Incident
- plan for : Building Internet Firewalls, 13.4.7. Planning for Documentation
- sendmail
- sendmail, Additional Sources of Information
- sendmail, 2.2. Read the Documents
- system after incident
- Building Internet Firewalls, 13.1.5. Snapshot the System
- Building Internet Firewalls, 13.4.5. Planning for Snapshots
- using : TCP/IP Network Administration, 4.6. Informing the Users
- dollar sign ($)
- $ line (qf file) : sendmail, 23.9. The qf File Internals
- $ rule-testing command : sendmail, 38.3.1. Dump a Defined Macro with $
- in macro names : sendmail, 31.5. Macro Expansion: $ and $&
- wildcard operators
- sendmail, 8.7. Wildcard Operators
- (see also wildcard operators)
- $1, $2, ... : (see positional operators)
- $&
- sendmail, 28.6.4. Rewrite Through Another Rule Set: $>set
- sendmail, 31.5.3. Use Value as Is with $&
- $> : sendmail, 28.6.4. Rewrite Through Another Rule Set: $>set
- $* : sendmail, 10.2.1. The LHS
- $@
- sendmail, 9.2.2. The Host ($@)
- sendmail, 9.3. Testing Rule Set 0
- sendmail, 11.4.1. Rewrite the Lone Username
- sendmail, 17.1.1.3. Handle null address
- sendmail, 28.6.3. Rewrite-and-Return Prefix: $@
- sendmail, 30.5.2.1. The $@ dsn part
- sendmail, 33.4.2. Specify Numbered Substitution with $@
- $[ and $]
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 21.2.4. The $[ and $] Operators
- sendmail, 28.6.6. Canonicalize Hostname: $[ and $]
- sendmail, 33.4.3. $[ and $]: A Special Case
- $:
- sendmail, 9.2.3. The User ($:)
- sendmail, 9.3. Testing Rule Set 0
- sendmail, 28.6.2. Rewrite Once Prefix: $:
- sendmail, 29.6.1. Further Processing: $:user
- sendmail, 30.5.3. The $: Part
- sendmail, 33.4.1. Specify a Default with $:
- sendmail, 33.4. Use Maps with $( and $) in Rules
- $.
- sendmail, 14.1.3. Testing So Far
- sendmail, 31.6. Macro Conditionals: $?, $|, and $.
- $=
- sendmail, 12.1. The Class Command
- sendmail, 32.2.1. Matching Any in a Class: $=
- sendmail, 38.3.2. Dump a Class Macro with $=
- $#
- sendmail, 9.2.1. The Delivery Agent ($#)
- sendmail, 28.6.5. Specify a Delivery Agent: $#
- $- : sendmail, 11.4.1. Rewrite the Lone Username
- $( and $) : sendmail, 33.4. Use Maps with $( and $) in Rules
- $+ : sendmail, 8.7. Wildcard Operators
- $?
- sendmail, 14.1.3. Testing So Far
- sendmail, 31.6. Macro Conditionals: $?, $|, and $.
- $~ : sendmail, 32.2.2. Matching Any Not in a Class: $~
- $| : sendmail, 31.6. Macro Conditionals: $?, $|, and $.
- $_ macro
- sendmail, 20.2.4. Verify identd Information
- sendmail, 23.9. The qf File Internals
- sendmail, 26.1.3.9. relay= the host that sent or accepted the message
- sendmail, 31.10. Alphabetized Reference
- DOL macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
- DOMAIN() : sendmail, 19.3.3. DOMAIN()
- DOMAIN macro (in sendmail) : TCP/IP Network Administration, E.3. m4 sendmail Macros
- Domain Name Pointer records : (see PTR resource records)
- Domain Name Service : (see DNS)
- domain names
- Practical UNIX & Internet Security, 16.2.3. Hostnames
- sendmail, 8.1. A Fictional Network
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 31.10. Alphabetized Reference
- TCP/IP Network Administration, 3.3.3. Domain Names
- TCP/IP Network Administration, 4. Getting Started
- application form : TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
- fully qualified : TCP/IP Network Administration, 3.3.3. Domain Names
- in NIS : TCP/IP Network Administration, 9.3. Network Information Service
- obtaining : TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
- parameter : TCP/IP Network Administration, 9.4. A BOOTP Server
- DOMAIN source file (in sendmail)
- TCP/IP Network Administration, E.3.2. FEATURE
- TCP/IP Network Administration, E.3.4. DOMAIN
- mail relay defines, listed : TCP/IP Network Administration, E.3.4. DOMAIN
- domain-type addresses : sendmail, 17.1.3. Internet Addresses
- domain/named.root : TCP/IP Network Administration, 11.6.3. Cache corruption
- domainname command
- Practical UNIX & Internet Security, 19.4.3. NIS Domains
- TCP/IP Network Administration, 9.3. Network Information Service
- domains
- Practical UNIX & Internet Security, 19.4.3. NIS Domains
- TCP/IP Network Administration, 1.7. Application Layer
- accepting only internal mail : sendmail, 20.2.1. Accept Mail Only From Our Domain
- adding to recipient address : sendmail, 30.8. Alphabetized F= Flags
- administration
- TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
- TCP/IP Network Administration, 8.1. BIND: UNIX Name Service
- contacting : TCP/IP Network Administration, 13.6. The White Pages
- allocating : (see Network Information Center)
- always_add_domain feature : sendmail, 19.6. Alphabetized m4 Macros
- creating : TCP/IP Network Administration, 3.3.2. Creating Domains and Subdomains
- downloading an entire : TCP/IP Network Administration, 8.4. Using nslookup
- entry, in resolv.conf : TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
- FQDN : (see FQDNs)
- hierarchy
- TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
- TCP/IP Network Administration, 8.1. BIND: UNIX Name Service
- list of local : sendmail, 32.5. Alphabetized Reference
- masquerading : sendmail, 19.6. Alphabetized m4 Macros
- name servers : TCP/IP Network Administration, 4.2.1.1. Assigning host addresses
- parameter : TCP/IP Network Administration, 9.4. A BOOTP Server
- organizational : TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
- part of hostname : (see $m macro)
- virtual, mapping to addresses : sendmail, 19.6. Alphabetized m4 Macros
- domaintable database
- TCP/IP Network Administration, 10.7.1. Modifying Local Information
- sendmail, 19.6. Alphabetized m4 Macros
- DontExpandCNames option : sendmail, 34.8. Alphabetized Reference
- DontInitGroups option : sendmail, 34.8. Alphabetized Reference
- DontPruneRoutes command : sendmail, 34.8. Alphabetized Reference
- dormant accounts
- Practical UNIX & Internet Security, 8.4. Managing Dormant Accounts
- Practical UNIX & Internet Security, 8.4.3. Finding Dormant Accounts
- dot (.)
- . line (qf file) : sendmail, 23.9. The qf File Internals
- checking for in ${pd} : sendmail, D.1. Sun Enhancements
- for current directory : Practical UNIX & Internet Security, 5.1.1. Directories
- to end messages
- sendmail, 4.2. Verbose (-v)
- sendmail, 30.8. Alphabetized F= Flags
- filenames starting with, disabling creation of : Building Internet Firewalls, 8.2.1.6. Be careful of writable
- host status file line : sendmail, B.1. Status file lines
- leading in messages : sendmail, 34.8. Alphabetized Reference
- trailing in FQDNs
- sendmail, 15.3. MX Records
- sendmail, 17.4. Rule Set 4
- sendmail, 29.5.1. Stripping Trailing Dots
- .. directory : Practical UNIX & Internet Security, 5.1.1. Directories
- .. for domain name : TCP/IP Network Administration, C.3.1. Standard Resource Records
- dotted decimal notation : TCP/IP Network Administration, 2.3. Subnets
- Double DES : Practical UNIX & Internet Security, 6.4.5. Improving the Security of DES
- double quotation marks (")
- sendmail, 13.2.8. The Unquoted Space Replacement Character
- sendmail, 31.3.2. Syntax of the Configuration File Macro's Text
- double-reverse lookups
- Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
- Building Internet Firewalls, 8.10.4.2. Mismatched data between the hostname
- Building Internet Firewalls, 8.10.5.1. Set up a `fake'
- DoubleBounceAddress option : sendmail, 34.8. Alphabetized Reference
- DOW USA : Practical UNIX & Internet Security, F.3.4.10. DOW USADOW USA
- down sites : sendmail, 23.7.1. Handling a Down Site
- downloading files : Practical UNIX & Internet Security, 12.3.4. Protecting Local Storage
- logging
- Practical UNIX & Internet Security, 10.3.3. xferlog Log File
- Practical UNIX & Internet Security, 10.3.5. access_log Log File
- downtime : Practical UNIX & Internet Security, 12.2.6.4. Minimizing downtime
- due to criminal investigations : Practical UNIX & Internet Security, 26.2.4. Hazards of Criminal Prosecution
- logging : Practical UNIX & Internet Security, 10.7.2.1. Exception and activity reports
- drand48 function : Practical UNIX & Internet Security, 23.7.3. drand48 ( ), lrand48 ( ), and mrand48 ( )
- Drawbridge package : Building Internet Firewalls, B.3.2. Drawbridge
- drills, security : Practical UNIX & Internet Security, 24.1.3. Rule #3: PLAN AHEAD
- drink : Practical UNIX & Internet Security, 12.2.2.1. Food and drink
- ds.internic.net : TCP/IP Network Administration, 13.4. Retrieving RFCs
- DSA (Digital Signature Algorithm)
- Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
- Practical UNIX & Internet Security, 6.5.3. Digital Signatures
- DSN (Delivery Status Notification)
- sendmail, 6.3. The local Delivery Agent
- sendmail, B.1. Status file lines
- DSN macro : sendmail, 18.8. Alphabetized Reference
- ENVID identifier
- sendmail, 23.9. The qf File Internals
- sendmail, 36.7. Alphabetized Reference
- ORCPT address : sendmail, 23.9. The qf File Internals
- original envelope ID : sendmail, 31.10. Alphabetized Reference
- types for : (see T= equate)
- DTE (data terminal equipment) : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- du command : Practical UNIX & Internet Security, 25.2.2.1. Disk-full attacks
- dual-homed hosts
- Building Internet Firewalls, 7. Proxy Systems
- (see also proxy servers/services)
- architecture of : Building Internet Firewalls, 4.2.1. Dual-Homed Host Architecture
- with screen subnet architecture : Building Internet Firewalls, 4.3.8. It's OK to Use
- as firewall : Building Internet Firewalls, 5.8.2.5. Turning off routing
- nonrouting : Building Internet Firewalls, 5.2.1. Nonrouting Dual-homed Hosts
- proxy services and : (see proxy servers/services)
- dual universes : Practical UNIX & Internet Security, 5.9.1. Dual Universes
- ducts, air : Practical UNIX & Internet Security, 12.2.3.2. Entrance through air ducts
- dummy interface : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- dump : TCP/IP Network Administration, 7.7.2. Testing the Configuration
- dump/restore program
- Practical UNIX & Internet Security, 7.1.3. Types of Backups
- Practical UNIX & Internet Security, 7.4.3. Specialized Backup Programs
- Practical UNIX & Internet Security, 7.4.4. Encrypting Your Backups
- dumping macros : sendmail, 38.3. Dump a Macro
- dumping state : sendmail, 26.3.3. SIGUSR1 Dump States
- dumpster diving : Practical UNIX & Internet Security, 12.3.3. Other Media
- duplicate database keys : sendmail, 33.2.1.1. -d allow duplicate keys
- duplicate entries in alias file : sendmail, 24.4.4. Duplicate Entries and Automation
- duress code : Practical UNIX & Internet Security, 8.7.2. Token Cards
- dust : Practical UNIX & Internet Security, 12.2.1.3. Dust
- dynamic
- assignment of addresses
- TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
- TCP/IP Network Administration, 4.2.1.1. Assigning host addresses
- automatic under DHCP : TCP/IP Network Administration, 9.5. DHCP
- circumstances favoring : TCP/IP Network Administration, 4.3. Planning Routing
- packet filtering
- Building Internet Firewalls, 6.3.3.2. UDP
- Building Internet Firewalls, 8.2.1.1. Packet filtering characteristics of
- port allocation : TCP/IP Network Administration, 2.7.3. Sockets
- routing
- TCP/IP Network Administration, 4.3. Planning Routing
- TCP/IP Network Administration, 7.1. Common Routing Configurations
- Dynamic DNS : TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
- Dynamic Host Configuration Protocol : (see DHCP)
- dynamic-bootp flag : TCP/IP Network Administration, D.3.2. Configuration Parameters
- dynamic-bootp-lease-cutoff parameter : TCP/IP Network Administration, 9.5.1. dhcpd.conf
- dynamic-bootp-lease-length parameter : TCP/IP Network Administration, 9.5.1. dhcpd.conf
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.