Полезная информация

Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: F

F configuration command
sendmail, 5.3.6. File Class Macros
sendmail, 12.2. The File Form of Class
sendmail, 18.8. Alphabetized Reference
sendmail, 32.1. Class Configuration Commands
sendmail, 32.1.2. The F Class Command
sendmail, 33. Database Macros
file form : sendmail, 22.4.2. The F Command - File Form
program form : sendmail, 22.4.3. The F Command - Program Form
-f database switch : sendmail, 33.3.4.3. -f don't fold keys to lowercase (V8.1 and above)
f flag
sendmail, 30.7. Pitfalls
sendmail, 30.8. Alphabetized F= Flags
F flag : sendmail, 30.8. Alphabetized F= Flags
F line (qf file)
sendmail, 23.3.5. Funny Flag Bits in qf File
sendmail, 23.9. The qf File Internals
$f macro : sendmail, 31.10. Alphabetized Reference
$F macro : sendmail, 31.10. Alphabetized Reference
f option : (see SaveFromLine (f) option)
F option : (see TempFileMode (F) option)
-f switch (makemap) : sendmail, 33.2.1.2. -f don't fold uppercase to lowercase
-f switch (sendmail)
sendmail, 11.6. Handling user@thishost
sendmail, 14.6. Trusted User
sendmail, 22.8.1. Trusted Users
sendmail, 30.8. Alphabetized F= Flags
sendmail, 36.7. Alphabetized Reference
-F switch (sendmail) : sendmail, 36.7. Alphabetized Reference
F= equate
sendmail, 30.4. The Equates
(see flags, delivery agent)
facility, mail-handling program : sendmail, 26.1.1. syslog(3)
factoring numbers
Practical UNIX & Internet Security, 6.4.6. RSA and Public Key Cryptography
Practical UNIX & Internet Security, 6.4.6.3. Strength of RSA
(see also RSA algorithm)
fail-safe stance
Building Internet Firewalls, 3.5. Fail-Safe Stance
Building Internet Firewalls, 9.1.4.5. Fail-safe stance
Building Internet Firewalls, 9.2.3.5. Fail-safe stance
failed login attempts : (see logging in)
failures, computer
Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures
Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
(see also bugs)
fair use laws : Practical UNIX & Internet Security, 26.4.2. Copyright Infringement
fallbackhost : TCP/IP Network Administration, E.4.2. sendmail Options
FallbackMXhost (V) option
sendmail, 21.2.3. Look Up Addresses for Delivery
sendmail, 34.8. Alphabetized Reference
false authentication : Building Internet Firewalls, 10.1.3. False Authentication
FAQ, sendmail : sendmail, 2.2. Read the Documents
Fast Filesystem (FFS) : Practical UNIX & Internet Security, 25.2.2.6. Reserved space
fast ports : (see Ethernet)
FAX (facsimile machine)
sendmail, 3.3.3. Other Protocols
sendmail, 31.10. Alphabetized Reference
FAX-RELAY macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
fax-support, built-in : TCP/IP Network Administration, E.3.5. MAILER
FAX_RELAY macro (m4) : sendmail, 31.10. Alphabetized Reference
FBI (Federal Bureau of Investigation)
Practical UNIX & Internet Security, 26.2.2. Federal Jurisdiction
Practical UNIX & Internet Security, F.3.2. FBI (Federal Bureau of Investigation)
fbtab file : Practical UNIX & Internet Security, 17.3.21.1. etc/fbtab and /etc/logindevperm
fcntl command : sendmail, 23.2.3. The Lock File (obsolete as of V5.62): lf
FDDI network : TCP/IP Network Administration, 6.1.5.4. Maximum transmission unit
backbone : TCP/IP Network Administration, 11.8. Protocol Case Study
FEATURE macro
sendmail, 16.2.3. FEATURE
sendmail, 19.3.4. FEATURE()
sendmail, 19.6. Alphabetized m4 Macros
TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros
in sendmail
TCP/IP Network Administration, E.3. m4 sendmail Macros
TCP/IP Network Administration, E.3.2. FEATURE
features, listed : TCP/IP Network Administration, E.3.2. FEATURE
Federal Information Exchanges (FIXs) : TCP/IP Network Administration, 1.1. TCP/IP and the Internet
Federal Information Processing Standard (FIPS) : Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
federal law enforcement
Practical UNIX & Internet Security, 26.2.2. Federal Jurisdiction
Practical UNIX & Internet Security, 26.2.3. Federal Computer Crime Laws
_FFR_ macro : sendmail, 18.8. Alphabetized Reference
FFS (Fast File System) : Practical UNIX & Internet Security, 25.2.2.6. Reserved space
fgetfolded routine : sendmail, 18.8. Alphabetized Reference
fgets function : Practical UNIX & Internet Security, 23.1.1. The Lesson of the Internet Worm
Fiber Digital Data Interface (FDDI)
TCP/IP Network Administration, 1.7. Application Layer
TCP/IP Network Administration, 5.3.1.2. Pseudo-device
(see also FDDI network)
fiber optic cables : (see cables, network)
file class macros : sendmail, 5.3.6. File Class Macros
*file* delivery agent : sendmail, 30.5.1. The *file* and *include* Agents
File Handles : Practical UNIX & Internet Security, 20.1.2. File HandlesFile Handles
File Service Protocol
Building Internet Firewalls, 2.2. File Transfer
Building Internet Firewalls, 8.2.3. File Service Protocol (FSP)
File Transfer Protocol : (see FTP (File Transfer Protocol))
filenames, attacks via : Practical UNIX & Internet Security, 11.5.1.4. Filename attacks
files : Practical UNIX & Internet Security, 5.1. Files
appending to
sendmail, 33.2.1.4. -o append to, don't overwrite the file
(see appending to files)
automatic directory listings : Practical UNIX & Internet Security, 18.2.2.2. Additional configuration issues
backing up
Practical UNIX & Internet Security, 7. Backups
Practical UNIX & Internet Security, 7.4.7. inode Modification Times
automatic system for
Practical UNIX & Internet Security, 7.3.2. Building an Automatic Backup System
Practical UNIX & Internet Security, 18.2.3.5. Beware stray CGI scripts
critical files
Practical UNIX & Internet Security, 7.3. Backing Up System Files
Practical UNIX & Internet Security, 7.3.2. Building an Automatic Backup System
prioritizing : Practical UNIX & Internet Security, 7.3.1. What Files to Back Up?
changing owner of : Practical UNIX & Internet Security, 5.7. chown: Changing a File's Owner
checking : TCP/IP Network Administration, 12.4.2.1. Checking files
configuration : (see configuration, files)
context-dependent (CDFs)
Practical UNIX & Internet Security, 5.9.2. Context-Dependent Files
Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories
core : Practical UNIX & Internet Security, C.4. The kill Command
delivery to : sendmail, 30.8. Alphabetized F= Flags
descriptors : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
detecting changes to
Practical UNIX & Internet Security, 9.2. Detecting Change
Practical UNIX & Internet Security, 9.3. A Final Note
device : Practical UNIX & Internet Security, 5.6. Device Files
directory for safe writes : sendmail, 34.8. Alphabetized Reference
downloading, logs of
Practical UNIX & Internet Security, 10.3.3. xferlog Log File
Practical UNIX & Internet Security, 10.3.5. access_log Log File
F configuration command : sendmail, 22.4.2. The F Command - File Form
finding : TCP/IP Network Administration, 13.3. Finding Files
finding all SUID/SGID
Practical UNIX & Internet Security, 5.5.4. Finding All of the SUID and SGID Files
Practical UNIX & Internet Security, 5.5.4.1. The ncheck command
format, monitoring : Practical UNIX & Internet Security, 8.2. Monitoring File Format
group-writable : Practical UNIX & Internet Security, 11.6.1.2. Writable system files and directories
hidden : Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories
hidden space : Practical UNIX & Internet Security, 25.2.2.7. Hidden space
history : Practical UNIX & Internet Security, 10.4.1. Shell History
immutable : Practical UNIX & Internet Security, 9.1.1. Immutable and Append-Only Files
integrity of : (see integrity)
intruder's changes to : Practical UNIX & Internet Security, 24.4.1.1. Changes in file contents
locating largest : Practical UNIX & Internet Security, 25.2.2.1. Disk-full attacks
location, sendmail options for : sendmail, 34.6.1. File Locations
lock requests, handling : TCP/IP Network Administration, 9.1.1. NFS Daemons
locking : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
log : (see logs/logging)
mail sent directly to : Practical UNIX & Internet Security, 15.7. Early Security Problems with UUCP
mailbox : (see mailbox file)
of masquerading domains : sendmail, 19.6. Alphabetized m4 Macros
modification times of
Practical UNIX & Internet Security, 5.1.2. Inodes
Practical UNIX & Internet Security, 5.1.5. File Times
Practical UNIX & Internet Security, 7.4.7. inode Modification Times
Practical UNIX & Internet Security, 9.2.2. Checklists and Metadata
network configuration : Practical UNIX & Internet Security, 10.4.3. Network Setup
output, can't write to : sendmail, 36.5.1. EX_CANTCREAT Can't Write a User's File
queue : sendmail, 3.1.2. The Queue Directory
remote access to
Practical UNIX & Internet Security, 15.4.1. USERFILE: Providing Remote File Access
Practical UNIX & Internet Security, 15.4.2.1. Some bad examples
removing from anonymous FTP area : Building Internet Firewalls, 8.2.1.6. Be careful of writable
servers, names of : TCP/IP Network Administration, 4.5.1. File servers
SGID bit on : Practical UNIX & Internet Security, 5.5.7. SGID Bit on Files (System V UNIX Only): Mandatory
sharing
TCP/IP Network Administration, 1.7. Application Layer
TCP/IP Network Administration, 3.7.1. File Sharing
different from file transfer : TCP/IP Network Administration, 3.7.1. File Sharing
in src directory : sendmail, 2.3. What's What in src
startup
Practical UNIX & Internet Security, 11.5.2. Start-up File Attacks
Practical UNIX & Internet Security, 11.5.2.7. Other initializations
storing classes in : sendmail, 12.2. The File Form of Class
system database : Practical UNIX & Internet Security, 1.2. What Is an Operating System?
temporary, permissions for : sendmail, 34.8. Alphabetized Reference
transferring
Building Internet Firewalls, 2.2. File Transfer
Building Internet Firewalls, 8.2. File Transfer
Building Internet Firewalls, 8.14. Network File System
Practical UNIX & Internet Security, 15.1.1. uucp Command
(see also NFS)
interactive transfers : TCP/IP Network Administration, 1.7. Application Layer
types of : Practical UNIX & Internet Security, 5.1.6. Understanding File Permissions
unowned : Practical UNIX & Internet Security, 24.4.1.8. Unowned files
uploading by prearrangement : Building Internet Firewalls, 8.2.1.6. Be careful of writable
on Web servers : (see Web servers)
world-writable : Practical UNIX & Internet Security, 11.6.1.1. World-writable user files and directories
zero-filled bytes in : Practical UNIX & Internet Security, 7.4. Software for Backups
filesystems : (see directories)
backing up : Building Internet Firewalls, 13.5.1. Backing Up Your Filesystems
hierarchy : sendmail, 3.1. Role in the Filesystem
mounting as read-only : Building Internet Firewalls, 5.8.4.3. Mount filesystems as read-only
network : Building Internet Firewalls, 2.12. Network File Systems
filter files (mail) : Practical UNIX & Internet Security, 11.5.2.5. .forward, .procmailrc
filter programs
sendmail, 24.4.1. The Postmaster Alias
sendmail, 24.6.2. Filtering Recipients with a Shell Script
filtering air : Practical UNIX & Internet Security, 12.2.1.3. Dust
filtering packets : (see packet filtering)
filtering router : (see screening routers)
FIN bit : TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
find command
Practical UNIX & Internet Security, 5.5.4. Finding All of the SUID and SGID Files
Practical UNIX & Internet Security, 11.5.1.4. Filename attacks
-H option : Practical UNIX & Internet Security, 5.9.2. Context-Dependent Files
-ls option : Practical UNIX & Internet Security, 9.2.2.1. Simple listing
-size option : Practical UNIX & Internet Security, 25.2.2.1. Disk-full attacks
-H option : Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories
-print option : Practical UNIX & Internet Security, 5.5.4. Finding All of the SUID and SGID Files
in security checks : TCP/IP Network Administration, 12.4.2.1. Checking files
type -f option : Practical UNIX & Internet Security, 5.5.4. Finding All of the SUID and SGID Files
-xdev option : Practical UNIX & Internet Security, 5.5.4. Finding All of the SUID and SGID Files
finding addresses : (see rule set 3)
finger service
Building Internet Firewalls, 2.7. Information About People
Building Internet Firewalls, 5.6. Selecting Services Provided by the
Building Internet Firewalls, 5.8.2.4. Which services should you disable?
Building Internet Firewalls, 8.8.1. finger
Practical UNIX & Internet Security, 8.1.3. Accounts That Run a Single Command
Practical UNIX & Internet Security, 10.1.1. lastlog File
Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files
Practical UNIX & Internet Security, 15.3.1. Assigning Additional UUCP Logins
Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution
Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
Practical UNIX & Internet Security, 17.3.8. finger (TCP Port 79)
Practical UNIX & Internet Security, 17.3.8.3. Replacing finger
Practical UNIX & Internet Security, 21.4.4.1. Creating an ftpout account to allow FTP without proxies.
Practical UNIX & Internet Security, 23.1.1. The Lesson of the Internet Worm
Practical UNIX & Internet Security, 24.2.1. Catching One in the Act
Practical UNIX & Internet Security, 24.2.4.2. How to contact the system administrator of a computer
(see also Worm program)
disabling : Practical UNIX & Internet Security, 17.3.8.2. Disabling finger
monitoring access to daemon : TCP/IP Network Administration, 12.5.1. wrapper
service : TCP/IP Network Administration, 5.4. The Internet Daemon
target for intruders : TCP/IP Network Administration, C.3.1.8. Well-Known Services record
fingerd server
Building Internet Firewalls, 5.8.2.4. Which services should you disable?
sendmail, 22.3.2. SMTP vrfy and expn
fingerprint authentication : Building Internet Firewalls, 10.2.1. Something You Are
finite state machine (FSM)
diagrams or tables : TCP/IP Network Administration, B.4. Trace Statements
transitions, tracing : TCP/IP Network Administration, B.8.10. The routerdiscovery Statement
FIPS (Federal Information Processing Standard) : Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
fired employees : Practical UNIX & Internet Security, 13.2.6. Departure
fires
Practical UNIX & Internet Security, 12.2.1.1. Fire
Practical UNIX & Internet Security, 12.2.1.2. Smoke
Practical UNIX & Internet Security, 12.4.1.1. Fire hazards
TCP/IP Network Administration, 12.1.1. Assessing the Threat
extinguishers and radio transmitters : Practical UNIX & Internet Security, 12.2.1.8. Electrical noise
firewalls
Building Internet Firewalls, 1.4. What Is an Internet Firewall?
Practical UNIX & Internet Security, 8.8.9. Account Names Revisited: Using Aliases for Increased
Practical UNIX & Internet Security, 17.2. Controlling Access to Servers
Practical UNIX & Internet Security, 21. Firewalls
Practical UNIX & Internet Security, 21.4.2. Electronic Mail
Practical UNIX & Internet Security, 21.5. Special Considerations
TCP/IP Network Administration, 9.3.2. NIS+
TCP/IP Network Administration, 12.7. Firewalls
(see also security)
accepting only internal mail : sendmail, 20.2.1. Accept Mail Only From Our Domain
architecture of : Building Internet Firewalls, 4.2. Firewall Architectures
backing up : Building Internet Firewalls, 12.1.1. Backing Up Your Firewall
blocking troubleshooting measures : TCP/IP Network Administration, 11.1.1. Troubleshooting Hints
buying versus building : Building Internet Firewalls, 1.4.3. Buying Versus Building
checklist for : Practical UNIX & Internet Security, A.1.1.20. Chapter 21: Firewalls
configuring NTP with : Building Internet Firewalls, 8.13.3. Configuring NTP to
configuring SMTP with : Building Internet Firewalls, 8.1.1.6. Configuring SMTP to
defined : TCP/IP Network Administration, 12.7. Firewalls
definition of : Building Internet Firewalls, 1.4. What Is an Internet Firewall?
designing : Building Internet Firewalls, 4. Firewall Design
disadvantage of : TCP/IP Network Administration, 12.7.1. Functions of the firewall
dual-homed host as : Building Internet Firewalls, 5.8.2.5. Turning off routing
FAQ for : Building Internet Firewalls, A.7. Papers
functions of : TCP/IP Network Administration, 12.7.1. Functions of the firewall
headers and : sendmail, 20.2.5. Prune Received: Headers at Firewall
internal : Building Internet Firewalls, 4.4. Internal Firewalls
bastion hosts on : Building Internet Firewalls, 4.4.6. An Internal Firewall May or May Not
IP multicasting and : Building Internet Firewalls, 8.9.3. The Multicast Backbone (MBONE)
IPv6 and : Building Internet Firewalls, 6.3.6. IP Version 6
on joint networks : Building Internet Firewalls, 4.4.4. Joint Venture Firewalls
keeping current : Building Internet Firewalls, 12.3. Keeping Up to Date
layering : Building Internet Firewalls, 3.2. Defense in Depth
limiting connectivity : TCP/IP Network Administration, 10.7.1. Modifying Local Information
mailing list for
Practical UNIX & Internet Security, E.1.3.1. Academic-Firewalls
Practical UNIX & Internet Security, E.1.3.7. Firewalls
mailing lists : Building Internet Firewalls, A.3.1. Firewalls
maintaining : Building Internet Firewalls, 12. Maintaining Firewalls
multiple bastion hosts : Building Internet Firewalls, 4.3.1. It's OK to Use
nameservers and : Practical UNIX & Internet Security, 17.3.6.2. DNS nameserver attacks
need for professional installation : TCP/IP Network Administration, 12.7.1. Functions of the firewall
for NIS sites : Practical UNIX & Internet Security, 19.4.5. Unintended Disclosure of Site Information with NIS
portmapper program and : Practical UNIX & Internet Security, 19.2.1. Sun's portmap/rpcbind
recreating entirely : Building Internet Firewalls, 12.5. When Should You Start Over?
resources for : Building Internet Firewalls, A. Resources
responding to probes of : Building Internet Firewalls, 12.2.4. Responding to Probes
responding to security incidents : Building Internet Firewalls, 13. Responding to Security Incidents
routing control within
TCP/IP Network Administration, 12.7.2. Routing control
TCP/IP Network Administration, E.4.2. sendmail Options
RunAsUser option : sendmail, 34.8. Alphabetized Reference
samples of : Building Internet Firewalls, 9. Two Sample Firewalls
security policies for : Building Internet Firewalls, 11. Security Policies
setting up NNTP in : Building Internet Firewalls, 8.5.3. Dangerous Ways to Set up
for specific network services : Practical UNIX & Internet Security, G. Table of IP Services
testing : Building Internet Firewalls, 6.8.7. It Should Be Able to Log Accepted and
tools for : Building Internet Firewalls, B. Tools
using BSD system as : TCP/IP Network Administration, 5.3.1.1. Options
using Linux system as : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
utilities for : Building Internet Firewalls, B.6. Utilities
weakest link and : Building Internet Firewalls, 3.4. Weakest Link
what to protect : Building Internet Firewalls, 1.1. What Are You Trying to
X11 window system and : Building Internet Firewalls, 8.16. X11 Window System
FIRST mailing list : TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
FIRST response teams
Building Internet Firewalls, A.5.2. FIRST
Practical UNIX & Internet Security, 24.6. Resuming Operation
Practical UNIX & Internet Security, E.3.3. FIRST
first-class precedence : sendmail, 14.4. Precedence
Fitzgerald, Tom : Practical UNIX & Internet Security, 22.5. UDP Relayer
Flags field : TCP/IP Network Administration, 1.5.1.3. Fragmenting datagrams
flags, delivery agent
sendmail, 6.3. The local Delivery Agent
sendmail, 6.4. Add the Missing Parts to Mhub
sendmail, 14.2. Headers Versus Delivery Agent Flags
sendmail, 14.2.3. The Message-ID: Header
sendmail, 30.4. The Equates
sendmail, 30.8. Alphabetized F= Flags
sendmail, 35.4. ?flags? in Header Definitions
(see also under specific flag)
flags, qf file : sendmail, 23.9. The qf File Internals
flags, routine table
TCP/IP Network Administration, 2.5. The Routing Table
TCP/IP Network Administration, 7.2. The Minimal Routing Table
defining interface characteristics : TCP/IP Network Administration, 6.1.2. Checking the Interface with ifconfig
flock command : sendmail, 23.2.3. The Lock File (obsolete as of V5.62): lf
flooding
Building Internet Firewalls, 1.2.1.2. Denial of Service
TCP/IP Network Administration, 7.4.3. Open Shortest Path First
TCP/IP Network Administration, B.8.1. The ospf Statement
client : Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
messages : Practical UNIX & Internet Security, 25.3.2. Message Flooding
servers with requests : Practical UNIX & Internet Security, 25.3.1. Service Overloading
water : (see water)
floors, raised : Practical UNIX & Internet Security, 12.2.3.1. Raised floors and dropped ceilings
floppy disks : (see backups; media)
flow control
Building Internet Firewalls, C.6.2. Transmission Control Protocol
TCP/IP Network Administration, 1.5.2. Internet Control Message Protocol
TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
flows, IPv6 : Building Internet Firewalls, 6.3.6. IP Version 6
focused address : sendmail, 17.1.1.3. Handle null address
folders : (see directories)
FollowSymLinks option : Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
font, Japanese conversion : sendmail, 36.7. Alphabetized Reference
foo.org database : TCP/IP Network Administration, 12.4.3.2. SATAN
food : Practical UNIX & Internet Security, 12.2.2.1. Food and drink
forged mail messages
sendmail, 13.2.1. The Location of the Queue Directory
sendmail, 22.7. Forged Mail
forged packets : Building Internet Firewalls, 6.3.7. Non-IP Protocols
forgery : (see also security)
man-in-the-middle : Building Internet Firewalls, 6.6.1. Risks of Filtering by Source
source address : Building Internet Firewalls, 6.6.1. Risks of Filtering by Source
fork command
Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
Practical UNIX & Internet Security, 25.2.1.1. Too many processes
Practical UNIX & Internet Security, C.2. Creating Processes
sendmail, 30.6.1. Fork
sendmail, 34.8. Alphabetized Reference
FORK macro : sendmail, 18.8. Alphabetized Reference
ForkEachJob (Y) option : sendmail, 34.8. Alphabetized Reference
format
address
sendmail, 6.3. The local Delivery Agent
sendmail, 31.10. Alphabetized Reference
file, monitoring : Practical UNIX & Internet Security, 8.2. Monitoring File Format
redoing as destructive attack : Practical UNIX & Internet Security, 25.1. Destructive Attacks
USERFILE entries : Practical UNIX & Internet Security, 15.4.1.3. Format of USERFILE entry without system name
Forum of Incident Response and Security Teams (FIRST) : TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
.forward file
Practical UNIX & Internet Security, 11.5.2.5. .forward, .procmailrc
Practical UNIX & Internet Security, 21.4.2. Electronic Mail
Practical UNIX & Internet Security, 24.4.1.6. Changes to startup files
sendmail, 18.8. Alphabetized Reference
sendmail, 22.5.3. Permissions for ~/.forward Files
sendmail, 23.9. The qf File Internals
sendmail, 25.7. The User's ~/.forward File
sendmail, 34.8. Alphabetized Reference
TCP/IP Network Administration, 10.3.1. Personal mail forwarding
chain of : sendmail, 25.7.1. Unscrambling Forwards
ForwardPath (J) option
sendmail, 22.8.3.2. The ForwardPath option
sendmail, 34.8. Alphabetized Reference
smrsh program : sendmail, 22.8.2. The smrsh Program
forwarders
sendmail, 8.1.1. The dc.gov Domain
TCP/IP Network Administration, 8.3.1.1. Configuring a caching-only nameserver
TCP/IP Network Administration, C.2. named.boot Configuration Commands
forwarding
sendmail, 29.6.6. Forwarding over the Network
TCP/IP Network Administration, 1.5.1.4. Passing datagrams to the transport layer
loops : sendmail, 25.7.2. Forwarding Loops
with Resent- headers : sendmail, 35.7. Forwarding with Resent-Headers
ForwardPath (J) option
sendmail, 22.8.3.2. The ForwardPath option
sendmail, 34.8. Alphabetized Reference
FQDNs (fully qualified domain names)
sendmail, 4.2. Verbose (-v)
sendmail, 7.3.1. The hostname
sendmail, 8.1. A Fictional Network
sendmail, 21.1. Overview
TCP/IP Network Administration, 3.3.3. Domain Names
(see also $j macro)
trailing dot for
sendmail, 15.3. MX Records
sendmail, 17.4. Rule Set 4
sendmail, 29.5.1. Stripping Trailing Dots
fragmentation
Building Internet Firewalls, 6.3.1.2. IP layer
Building Internet Firewalls, 6.3.2.2. IP fragmentation
Building Internet Firewalls, C.5.1.3. Fragmenting datagrams
TCP/IP Network Administration, 1.5.1.3. Fragmenting datagrams
avoiding : TCP/IP Network Administration, 6.1.5.4. Maximum transmission unit
datagrams : (see datagrams)
Fragmentation Offset field : TCP/IP Network Administration, 1.5.1.3. Fragmenting datagrams
Frame Ground (FG) : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
frames : TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
fraud
Practical UNIX & Internet Security, 14.4.1. One-Way Phone Lines
Practical UNIX & Internet Security, 26.2.2. Federal Jurisdiction
FreeBSD systems
TCP/IP Network Administration, 5.3. The BSD Kernel Configuration File
TCP/IP Network Administration, 5.3.1.1. Options
freezing sendmail.cf configuration file : sendmail, 36.7. Alphabetized Reference
"From:" header line
sendmail, 1.5. The Header
sendmail, 5.3.10. Trusted Users
sendmail, 14.1.1. The From: Header
sendmail, 18.8. Alphabetized Reference
sendmail, 30.7. Pitfalls
sendmail, 30.8. Alphabetized F= Flags
sendmail, 31.10. Alphabetized Reference
sendmail, 34.8. Alphabetized Reference
sendmail, 35.7.1. Remove and Recreate the From: Header
sendmail, 35.10. Alphabetized Reference
(see also $l macro)
(see also trusted users)
from= equate (syslog output) : sendmail, 26.1.3.3. from= show envelope sender
fscanf function : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
fsck program
Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories
Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
fsirand command : Practical UNIX & Internet Security, 20.4.8. Use fsirand
FSP (File Service Protocol)
Building Internet Firewalls, 2.2. File Transfer
Building Internet Firewalls, 8.2.3. File Service Protocol (FSP)
fstab file
Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
Practical UNIX & Internet Security, 19.3.2.5. Mounting a secure filesystem
TCP/IP Network Administration, 9.1.3.2. The vfstab and fstab files
FTP (File Transfer Protocol)
Building Internet Firewalls, 2.2. File Transfer
Building Internet Firewalls, 5.8.2.4. Which services should you disable?
Building Internet Firewalls, 8.2.2. Trivial File Transfer Protocol
Practical UNIX & Internet Security, 17.3.2. (FTP) File Transfer Protocol (TCP Ports 20 and 21)
Practical UNIX & Internet Security, 17.3.2.7. Allowing only FTP access
TCP/IP Network Administration, 1.7. Application Layer
TCP/IP Network Administration, 9.6. Managing Distributed Servers
(see also TFTP)
anonymous
Practical UNIX & Internet Security, 4.1. Users and Groups
Practical UNIX & Internet Security, 17.3.2.1. Using anonymous FTP
Practical UNIX & Internet Security, 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP
TCP/IP Network Administration, 13.2. Anonymous FTP
anonymous
and HTTP : Practical UNIX & Internet Security, 18.2.4.1. Beware mixing HTTP with anonymous FTP
Archie : Building Internet Firewalls, 2.6. Other Information Services
configuring : Building Internet Firewalls, 8.2.1. File Transfer Protocol
in screened host architecture : Building Internet Firewalls, 9.2.1.2. FTP
in screened subnet architecture : Building Internet Firewalls, 9.1.1.2. FTP
~ftp/bin directory : Practical UNIX & Internet Security, 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP
~ftp/etc directory : Practical UNIX & Internet Security, 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP
~ftp/pub directory : Practical UNIX & Internet Security, 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP
logging transferred files : Practical UNIX & Internet Security, 10.3.3. xferlog Log File
obtaining BIND via : sendmail, 21.1.1. Which DNS? 4.8.3 or 4.9?
obtaining source code via
sendmail, 2.1. Get the Source
sendmail, 18.3. Obtain the Source
passive (or PASV) mode : Building Internet Firewalls, 8.2.1.1. Packet filtering characteristics of
passive mode
Practical UNIX & Internet Security, 17.3.2.2. Passive vs. active FTP
Practical UNIX & Internet Security, 17.3.2.3. FTP passive mode
problem for firewalls : TCP/IP Network Administration, 12.7.1. Functions of the firewall
proxying with TIS FWTK : Building Internet Firewalls, 7.7.1. FTP Proxying with
resources for : Building Internet Firewalls, A.2. FTP Sites
server, creating : TCP/IP Network Administration, 13.2.1. Creating an FTP Server
setting up server
Practical UNIX & Internet Security, 17.3.2.4. Setting up an FTP server
Practical UNIX & Internet Security, 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP
via proxy server : Building Internet Firewalls, 7.2.2. Using Custom User Procedures for
write-only incoming directory : Building Internet Firewalls, 8.2.1.6. Be careful of writable
wuarchive daemon : Building Internet Firewalls, B.5.1. wuarchive ftpd
wuarchive server : Building Internet Firewalls, 8.2.1.4. Using the wuarchive
ftp account : (see anonymous FTP)
ftp-gw proxy server : Building Internet Firewalls, 9.1.1.2. FTP
ftp.bunyip.com : TCP/IP Network Administration, 13.3.1.1. archie client software
ftp.isc.org : TCP/IP Network Administration, 8.3.4. The named.local File
ftp://rs.internic.net/netinfo/networks.txt : TCP/IP Network Administration, 3.2. The Host Table
ftpd server
Building Internet Firewalls, 5.8.2.4. Which services should you disable?
Practical UNIX & Internet Security, 8.4.2. Changing the Account's Login
Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
Practical UNIX & Internet Security, 17.3.2. (FTP) File Transfer Protocol (TCP Ports 20 and 21)
Practical UNIX & Internet Security, 17.3.2.4. Setting up an FTP server
for backups : Practical UNIX & Internet Security, 7.4.5. Backups Across the Net
security hole : Practical UNIX & Internet Security, 6.5.2. Using Message Digests
UUCP enabled on : Practical UNIX & Internet Security, 15.8. UUCP Over Networks
ftpout account, firewalls : Practical UNIX & Internet Security, 21.4.4.1. Creating an ftpout account to allow FTP without proxies.
ftpusers file : Practical UNIX & Internet Security, 17.3.2.5. Restricting FTP with the standard UNIX FTP server
ftruncate system call : Practical UNIX & Internet Security, 5.1.7. File Permissions in Detail
full backups : Practical UNIX & Internet Security, 7.1.3. Types of Backups
full duplex : TCP/IP Network Administration, 6.3.5. PPP Server Configuration
full name, sender : sendmail, 36.7. Alphabetized Reference
full zone transfers : TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
"Full-Name:" header line
sendmail, 14.2.1. The Full-Name: Header
sendmail, 30.8. Alphabetized F= Flags
sendmail, 35.10. Alphabetized Reference
fully qualified domain names : (see FQDNs)
function keys : Practical UNIX & Internet Security, 12.3.4.5. Function keys
functionality, add-on : Practical UNIX & Internet Security, 1.4.3. Add-On Functionality Breeds Problems
functions, SOCKS vs. network : Building Internet Firewalls, 7.6. Using SOCKS for
future of sendmail : sendmail, The Future
fuzzy name matching : sendmail, 18.8. Alphabetized Reference
FWALL-Users mailing list : Building Internet Firewalls, A.3.2. FWALL-Users


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.