Table of Contents for
Practical UNIX and Internet Security, 3rd Edition

Version ebook / Retour

Cover image for bash Cookbook, 2nd Edition Practical UNIX and Internet Security, 3rd Edition by Alan Schwartz Published by O'Reilly Media, Inc., 2003
  1. Cover
  2. Practical Unix & Internet Security, 3rd Edition
  3. A Note Regarding Supplemental Files
  4. Preface
  5. Unix “Security”?
  6. Scope of This Book
  7. Which Unix System?
  8. Conventions Used in This Book
  9. Comments and Questions
  10. Acknowledgments
  11. A Note to Would-Be Attackers
  12. I. Computer Security Basics
  13. 1. Introduction: Some Fundamental Questions
  14. What Is Computer Security?
  15. What Is an Operating System?
  16. What Is a Deployment Environment?
  17. Summary
  18. 2. Unix History and Lineage
  19. History of Unix
  20. Security and Unix
  21. Role of This Book
  22. Summary
  23. 3. Policies and Guidelines
  24. Planning Your Security Needs
  25. Risk Assessment
  26. Cost-Benefit Analysis and Best Practices
  27. Policy
  28. Compliance Audits
  29. Outsourcing Options
  30. The Problem with Security Through Obscurity
  31. Summary
  32. II. Security Building Blocks
  33. 4. Users, Passwords, and Authentication
  34. Logging in with Usernames and Passwords
  35. The Care and Feeding of Passwords
  36. How Unix Implements Passwords
  37. Network Account and Authorization Systems
  38. Pluggable Authentication Modules (PAM)
  39. Summary
  40. 5. Users, Groups, and the Superuser
  41. Users and Groups
  42. The Superuser (root)
  43. The su Command: Changing Who You Claim to Be
  44. Restrictions on the Superuser
  45. Summary
  46. 6. Filesystems and Security
  47. Understanding Filesystems
  48. File Attributes and Permissions
  49. chmod: Changing a File’s Permissions
  50. The umask
  51. SUID and SGID
  52. Device Files
  53. Changing a File’s Owner or Group
  54. Summary
  55. 7. Cryptography Basics
  56. Understanding Cryptography
  57. Symmetric Key Algorithms
  58. Public Key Algorithms
  59. Message Digest Functions
  60. Summary
  61. 8. Physical Security for Servers
  62. Planning for the Forgotten Threats
  63. Protecting Computer Hardware
  64. Preventing Theft
  65. Protecting Your Data
  66. Story: A Failed Site Inspection
  67. Summary
  68. 9. Personnel Security
  69. Background Checks
  70. On the Job
  71. Departure
  72. Other People
  73. Summary
  74. III. Network and Internet Security
  75. 10. Modems and Dialup Security
  76. Modems: Theory of Operation
  77. Modems and Security
  78. Modems and Unix
  79. Additional Security for Modems
  80. Summary
  81. 11. TCP/IP Networks
  82. Networking
  83. IP: The Internet Protocol
  84. IP Security
  85. Summary
  86. 12. Securing TCP and UDP Services
  87. Understanding Unix Internet Servers and Services
  88. Controlling Access to Servers
  89. Primary Unix Network Services
  90. Managing Services Securely
  91. Putting It All Together: An Example
  92. Summary
  93. 13. Sun RPC
  94. Remote Procedure Call (RPC)
  95. Secure RPC (AUTH_DES)
  96. Summary
  97. 14. Network-Based Authentication Systems
  98. Sun’s Network Information Service (NIS)
  99. Sun’s NIS+
  100. Kerberos
  101. LDAP
  102. Other Network Authentication Systems
  103. Summary
  104. 15. Network Filesystems
  105. Understanding NFS
  106. Server-Side NFS Security
  107. Client-Side NFS Security
  108. Improving NFS Security
  109. Some Last Comments on NFS
  110. Understanding SMB
  111. Summary
  112. 16. Secure Programming Techniques
  113. One Bug Can Ruin Your Whole Day . . .
  114. Tips on Avoiding Security-Related Bugs
  115. Tips on Writing Network Programs
  116. Tips on Writing SUID/SGID Programs
  117. Using chroot( )
  118. Tips on Using Passwords
  119. Tips on Generating Random Numbers
  120. Summary
  121. IV. Secure Operations
  122. 17. Keeping Up to Date
  123. Software Management Systems
  124. Updating System Software
  125. Summary
  126. 18. Backups
  127. Why Make Backups?
  128. Backing Up System Files
  129. Software for Backups
  130. Summary
  131. 19. Defending Accounts
  132. Dangerous Accounts
  133. Monitoring File Format
  134. Restricting Logins
  135. Managing Dormant Accounts
  136. Protecting the root Account
  137. One-Time Passwords
  138. Administrative Techniques for Conventional Passwords
  139. Intrusion Detection Systems
  140. Summary
  141. 20. Integrity Management
  142. The Need for Integrity
  143. Protecting Integrity
  144. Detecting Changes After the Fact
  145. Integrity-Checking Tools
  146. Summary
  147. 21. Auditing, Logging, and Forensics
  148. Unix Log File Utilities
  149. Process Accounting: The acct/pacct File
  150. Program-Specific Log Files
  151. Designing a Site-Wide Log Policy
  152. Handwritten Logs
  153. Managing Log Files
  154. Unix Forensics
  155. Summary
  156. V. Handling Security Incidents
  157. 22. Discovering a Break-in
  158. Prelude
  159. Discovering an Intruder
  160. Cleaning Up After the Intruder
  161. Case Studies
  162. Summary
  163. 23. Protecting Against Programmed Threats
  164. Programmed Threats: Definitions
  165. Damage
  166. Authors
  167. Entry
  168. Protecting Yourself
  169. Preventing Attacks
  170. Summary
  171. 24. Denial of Service Attacks and Solutions
  172. Types of Attacks
  173. Destructive Attacks
  174. Overload Attacks
  175. Network Denial of Service Attacks
  176. Summary
  177. 25. Computer Crime
  178. Your Legal Options After a Break-in
  179. Criminal Hazards
  180. Criminal Subject Matter
  181. Summary
  182. 26. Who Do You Trust?
  183. Can You Trust Your Computer?
  184. Can You Trust Your Suppliers?
  185. Can You Trust People?
  186. Summary
  187. VI. Appendixes
  188. A. Unix Security Checklist
  189. Preface
  190. Chapter 1: Introduction: Some Fundamental Questions
  191. Chapter 2: Unix History and Lineage
  192. Chapter 3: Policies and Guidelines
  193. Chapter 4: Users, Passwords, and Authentication
  194. Chapter 5: Users, Groups, and the Superuser
  195. Chapter 6: Filesystems and Security
  196. Chapter 7: Cryptography Basics
  197. Chapter 8: Physical Security for Servers
  198. Chapter 9: Personnel Security
  199. Chapter 10: Modems and Dialup Security
  200. Chapter 11: TCP/IP Networks
  201. Chapter 12: Securing TCP and UDP Services
  202. Chapter 13: Sun RPC
  203. Chapter 14: Network-Based Authentication Systems
  204. Chapter 15: Network Filesystems
  205. Chapter 16: Secure Programming Techniques
  206. Chapter 17: Keeping Up to Date
  207. Chapter 18: Backups
  208. Chapter 19: Defending Accounts
  209. Chapter 20: Integrity Management
  210. Chapter 21: Auditing, Logging, and Forensics
  211. Chapter 22: Discovering a Break-In
  212. Chapter 23: Protecting Against Programmed Threats
  213. Chapter 24: Denial of Service Attacks and Solutions
  214. Chapter 25: Computer Crime
  215. Chapter 26: Who Do You Trust?
  216. Appendix A: Unix Security Checklist
  217. Appendix B: Unix Processes
  218. Appendixes C, D, and E: Paper Sources, Electronic Sources, and Organizations
  219. B. Unix Processes
  220. About Processes
  221. Signals
  222. Controlling and Examining Processes
  223. Starting Up Unix and Logging In
  224. C. Paper Sources
  225. Unix Security References
  226. Other Computer References
  227. D. Electronic Resources
  228. Mailing Lists
  229. Web Sites
  230. Usenet Groups
  231. Software Resources
  232. E. Organizations
  233. Professional Organizations
  234. U.S. Government Organizations
  235. Emergency Response Organizations
  236. Index
  237. Index
  238. Index
  239. Index
  240. Index
  241. Index
  242. Index
  243. Index
  244. Index
  245. Index
  246. Index
  247. Index
  248. Index
  249. Index
  250. Index
  251. Index
  252. Index
  253. Index
  254. Index
  255. Index
  256. Index
  257. Index
  258. Index
  259. Index
  260. Index
  261. Index
  262. Index
  263. About the Authors
  264. Colophon
  265. Copyright

L

L-devices file, Connecting a Modem to Your Computer
Lai, Xuejia (“On the Design and Security of Block Ciphers”), Cryptography Papers and Other Publications
LaMacchia, Brian A., Limitations of Secure RPC, Cryptography Papers and Other Publications
“Computation of Discrete Logarithms in Prime Fields”, Cryptography Papers and Other Publications
LANs (Local Area Networks), Eavesdropping on 802.11 wireless LANs, Networking, IP: The Internet Protocol
laptops, Explosions, Extreme temperatures, Vibration, Laptops and Portable Computers, Locks, Tagging, Laptop Recovery Software and Services
locking, Locks
recovery from theft, Laptop Recovery Software and Services
ruggedized, Explosions
tagging, Tagging
temperature of, Extreme temperatures
theft prevention for, Laptops and Portable Computers
vibration protection for, Vibration
last program, Finding Dormant Accounts, Examining the utmp and wtmp files, last program, Pruning the wtmp file
lastcomm program, Process Accounting: The acct/pacct File, Accounting with BSD and Linux
lastlog file, Essential Log Files, lastlog Filelastlog File
laws, Computer Crime (see legal issues)
LDAP (Lightweight Directory Access Protocol), Using Network Authorization Systems, LDAP, Networking and Unix, Using Kerberos, LDAPSetting up the LDAP clients, LDAP, LDAP: The Protocol, LDAP Integrity and Reliability, LDAP Integrity and Reliability, Authentication with LDAP, pam_ldap, Configuring Authentication with nss_ldapSetting up the LDAP clients, Setting up the LDAP clients
authentication with, Authentication with LDAP
data integrity and, LDAP Integrity and Reliability
nss_ldap configuration, Configuring Authentication with nss_ldapSetting up the LDAP clients
protocol for, LDAP: The Protocol
reliability and, LDAP Integrity and Reliability
TLS support for, Setting up the LDAP clients
using with Kerberos, Using Kerberos
using with PAM, pam_ldap
versions of, LDAP
Learning Perl (Schwartz, Randal L. and Phoenix, Tom), Miscellaneous References
leased telephone lines, Protection of Modems and Lines
least privilege principle, An example of a SUID attack: IFS and the /usr/lib/preserve hole, Least Privilege and Separation of Duties
legal issues, Kinds of eavesdropping, Legal Issues, Comparison Copies, Monitoring the Intruder, Worms, Your Legal Options After a Break-inThe Responsibility to Report Crime, Your Legal Options After a Break-in, Filing a Criminal ComplaintFederal jurisdiction, Choosing jurisdictionFederal jurisdiction, Federal Computer Crime Laws, Hazards of Criminal ProsecutionHazards of Criminal Prosecution, The Responsibility to Report Crime, The Responsibility to Report Crime, Criminal HazardsCriminal Hazards, Access Devices and Copyrighted Software, Access Devices and Copyrighted Software, Pornography, Indecency, and ObscenityChild pornography, Copyrighted Works, Chapter 25: Computer Crime, Computer Crime and Law
access device limitations, Access Devices and Copyrighted Software
avoiding computer abuse, The Responsibility to Report Crime
backups, Legal Issues
comparison copies and, Comparison Copies
compromised networks, risks of being prosecuted for, Criminal HazardsCriminal Hazards
copyright laws, Access Devices and Copyrighted Software, Copyrighted Works
criminal complaints, filing, Filing a Criminal ComplaintFederal jurisdiction
criminal prosecution, disadvantages of, Hazards of Criminal ProsecutionHazards of Criminal Prosecution
federal laws regarding computer crimes, Federal Computer Crime Laws
jurisdiction for computer crimes, Choosing jurisdictionFederal jurisdiction
law enforcement, wiretapping by, Kinds of eavesdropping
license agreements for worms, Worms
monitoring intruders, Monitoring the Intruder
pornography, indecency, obscenity, Pornography, Indecency, and ObscenityChild pornography
published resources on, Computer Crime and Law
recourses after a break-in, Your Legal Options After a Break-inThe Responsibility to Report Crime
responsibilities to report crime, The Responsibility to Report Crime
security checklist for, Chapter 25: Computer Crime
situations requiring legal action, Your Legal Options After a Break-in
Lenstra, Arjen, Key search attacks, Cryptography Papers and Other Publications
“The Number Field Sieve”, Cryptography Papers and Other Publications
Lenstra, H. W., Jr. (“The Number Field Sieve”), Cryptography Papers and Other Publications
Lesk, Mike, The Birth of Unix
level-zero backup, Types of Backups
Leveson, Nancy G. (Safeware: System Safety and Computers. A Guide to Preventing Accidents and Losses Caused by Technology), Computer-Related Risks
Levy, Steven (Hackers: Heroes of the Computer Revolution), Understanding the Computer Security “Culture”
Leyland, Paul, Key search attacks
/lib directory, Other files
Libes, Don, Password Generators
license agreements, comparison copies and, Comparison Copies
lie-detector tests, of employees, Intensive Investigations
lightning, Protecting Computer Hardware, Lightning
Lightweight Directory Access Protocol, Using Network Authorization Systems (see LDAP)
limit command, Soft Process Limits: Preventing Accidental Denial of Service
LINK function (RPC), The NFS Protocol
link-level encryption, Using Encryption to Protect IP Networks from Eavesdropping
links, Directories and linksDirectories and links, Directories and links, Directories and links, Tips on Writing SUID/SGID Programs
(see also symbolic links)
to directories, Directories and links
static, Tips on Writing SUID/SGID Programs
Linux, What This Book Is Not, Versions Covered in This Book, Versions Covered in This Book, Versions Covered in This Book, Versions Covered in This Book, “Secure” Versions of Unix, What Is a Deployment Environment?, Linux, Businesses adopt Unix, Businesses adopt Unix, Businesses adopt Unix, What the Future Holds, What the Future Holds, Software Quality, The shadow password and master password files, Using Network Authorization Systems, Pluggable Authentication Modules (PAM), What the Superuser Can Do, The sulog under Red Hat Linux, sudo: A More Restrictive su, Linux CapabilitiesLinux Capabilities, The Virtual Filesystem Interface, The Virtual Filesystem Interface, The Virtual Filesystem Interface, File Times, File Permissions, Access Control Lists, Startup on different Unix systems, Access Control Lists with TCP Wrappers, Using a Host-Based Packet Firewall, Using a Host-Based Packet Firewall, The ipfw host-based firewall, SMTP: Simple Mail Transfer Protocol (TCP Port 25), Sun RPC’s portmapper (UDP and TCP Ports 111), /etc/logindevperm, /etc/exports/usr/etc/exportfs, Set the portmon Variable, Samba Client Security, The Lesson of the Internet Worm, What he found, Package-Based Systems, Source code and patches, Specialized Backup Programs, Default Accounts, Setting up the chroot( ) environment, Finding Dormant Accounts, Secure Terminals, The sudo Program, Codebooks, Constraining Passwords, Immutable and Append-Only Files, Immutable and Append-Only Files, The chflags command, Kernel security level, BSD’s mtree and Periodic Security Scans, Packaging Tools, Integrity checking with RPM under Linux, Rotating Logs with newsyslog, Accounting with BSD and Linux, Monitoring the Intruder, Recovering from too many processes, Swapping to files, Using quotas, Reserved space, Tree structure attacks, Listing processes with versions of Unix derived from BSD, including Linux, Process real and effective UIDs, Unix Programming and System Administration
(see also System V Unix)
ACL support for, Access Control Lists
append-only files, Immutable and Append-Only Files
bug fixes, responsibility for, What This Book Is Not
capabilities system, Linux CapabilitiesLinux Capabilities
chattr() system call, The chflags command
chroot wrapper, Setting up the chroot( ) environment
Cryptfs support for, The Virtual Filesystem Interface
current trends, What the Future Holds
debugfs command, File Times
default accounts for, Default Accounts
exim mailer program for, SMTP: Simple Mail Transfer Protocol (TCP Port 25)
expiring accounts, Finding Dormant Accounts
exporting NFS directories, /etc/exports/usr/etc/exportfs
ext2fs filesystem, The Virtual Filesystem Interface, Reserved space, Tree structure attacks
FIFO file type, File Permissions
filesystem UID (FSUID), Process real and effective UIDs
filesystem, minfree amount, What the Superuser Can Do
filesystems, The Virtual Filesystem Interface
group disk quotas, Using quotas
for handheld computers, What the Future Holds
history of, Linux, Businesses adopt Unix
host-based firewall for, Using a Host-Based Packet Firewall, The ipfw host-based firewall
immutable files, Immutable and Append-Only Files
Kerberos client for, Using Network Authorization Systems
kernel security levels, Kernel security level
logrotate program, Rotating Logs with newsyslog
mobile versions of, What Is a Deployment Environment?
npasswd package, Constraining Passwords
Openwall patches, The Lesson of the Internet Worm
packaging tools, Packaging Tools
PAM, Pluggable Authentication Modules (PAM), Recovering from too many processes
resource limits, Recovering from too many processes
support for, Pluggable Authentication Modules (PAM)
periodic security-checking scripts, BSD’s mtree and Periodic Security Scans
portmapper program, Sun RPC’s portmapper (UDP and TCP Ports 111)
portmon variable, Set the portmon Variable
process accounting with, Accounting with BSD and Linux
ps command, Listing processes with versions of Unix derived from BSD, including Linux
published resources on, Unix Programming and System Administration
Red Hat, Businesses adopt Unix (see Red Hat Linux)
reliability of, What he found
RPM Package Manager, Package-Based Systems, Integrity checking with RPM under Linux
S/Key support, Codebooks
secure terminals, Secure Terminals
secure versions of, “Secure” Versions of Unix
server startup on, Startup on different Unix systems
shadow password file, The shadow password and master password files
smbfs support, Samba Client Security
software quality, Software Quality
source packages, Source code and patches
stateful inspection program, Using a Host-Based Packet Firewall
sudo program, sudo: A More Restrictive su, The sudo Program
sulog, scanning, The sulog under Red Hat Linux
swapping to files, Swapping to files
TCP Wrappers support, Access Control Lists with TCP Wrappers
ttywatch program, Monitoring the Intruder
VA, Businesses adopt Unix (see VA Linux)
versions of, Versions Covered in This Book, Versions Covered in This Book
X security, /etc/logindevperm
“no dump” file attribute, Specialized Backup Programs
Littman, Jonathan (The Fugitive Game: Online with Kevin Mitnick), Understanding the Computer Security “Culture”
Liu, Cricket (DNS and BIND), Unix Programming and System Administration
ln command, Directories and links
load shedding, Things to Do
local area networks, Networking (see LANs)
LOCAL authentication (NIS+), Using NIS+
local jurisdiction, Local jurisdiction
local storage, protecting, Protecting Local StorageFunction keys
lock program, Screensavers
lock-down, Eavesdropping over local area networks (Ethernet and twisted pairs)
locking accounts, Entering your password
locking files, chmod: Changing a File’s Permissions, Design Principles
locks, hardware, Locks
log books, Handwritten LogsInformational material
log events, Auditing, Logging, and Forensics
log files, NTP: Network Time Protocol (UDP Port 123), Sudden changes in time, Immutable and Append-Only Files, Auditing, Logging, and ForensicsEssential Log Files, Unix Log File Utilities, Essential Log Files, Essential Log Files, Unix syslog, Rotating Logs with newsyslogRotating Logs with newsyslog, Swatch: A Log File Analysis Tool, lastlog Filelastlog File, utmp and wtmp FilesPruning the wtmp file, utmp and wtmp FilesPruning the wtmp file, utmp and wtmp Files, loginlog File, Process Accounting: The acct/pacct File, Process Accounting: The acct/pacct File, messages Log File, aculog Log File, sulog Log File, access_log Log File, Logging to a printer, Managing Log Files, Shell History, cron, Monitoring commands, Tracing a Connection, Analyzing the Log Files, Never Trust Anything Except Hardcopy, System initialization files
(see also history files; email, logging)
access_log, access_log Log File
acct, Process Accounting: The acct/pacct File
aculog, aculog Log File
analysis tools, Swatch: A Log File Analysis Tool
analyzing for intruders, Analyzing the Log Files
created during initialization, System initialization files
crontab, cron
hardcopy of, Logging to a printer, Never Trust Anything Except Hardcopy
immutable, Immutable and Append-Only Files
lastlog, lastlog Filelastlog File
list of, Essential Log Files
locations of, Unix Log File Utilities
loginlog, loginlog File
managing, Managing Log Files
messages, messages Log File
pacct, Process Accounting: The acct/pacct File
rotating, Rotating Logs with newsyslogRotating Logs with newsyslog
sulog, Essential Log Files, sulog Log File
syslog creating, Unix syslog
system clock and, NTP: Network Time Protocol (UDP Port 123), Sudden changes in time
utmp, utmp and wtmp FilesPruning the wtmp file, Monitoring commands, Tracing a Connection
wtmp, utmp and wtmp FilesPruning the wtmp file
wtmpx, utmp and wtmp Files
log server, Unix Log File Utilities
logcheck program, Swatch: A Log File Analysis Tool
logdaemon package, Specifying trusted hosts with /etc/hosts.equiv and ~/.rhosts
logger program, Unix syslog, Incorporating syslog into your own programs
logging, Types of Security, The su Log, Coding Standards, Auditing, Logging, and ForensicsUnix Log File Utilities, Essential Log Files, Unix syslogBeware false syslog log entries, Rotating Logs with newsyslogRotating Logs with newsyslog, Swatch: A Log File Analysis Tool, utmp and wtmp FilesPruning the wtmp file, Process Accounting: The acct/pacct Filemessages Log File, Logging Network Services, Other Logs, Designing a Site-Wide Log PolicyLogging everything everywhere, Logging to a printer, Logging across the network, Logging everything everywhere, Logging everything everywhere, Logging everything everywhere, Handwritten LogsInformational material, Unix ForensicsNetwork Setup, Mail, Rule #2: Document, System initialization files, The Responsibility to Report Crime, Chapter 21: Auditing, Logging, and Forensics
(see also forensics; log files)
across networks, Logging across the network
break-ins, Rule #2: Document
C2 audit, Essential Log Files
criminal investigations, and, The Responsibility to Report Crime
critical messages from, Logging everything everywhere
failed passwords, Logging everything everywhere
failed su attempts, The su Log
from third-party software, Other Logs
handwritten logs, Handwritten LogsInformational material
to hardcopy device, Logging to a printer
individual users, Unix ForensicsNetwork Setup
network services, Logging Network Services
newsyslog program, Rotating Logs with newsyslogRotating Logs with newsyslog
outgoing mail, Mail
policy for, Designing a Site-Wide Log PolicyLogging everything everywhere
process accounting, Process Accounting: The acct/pacct Filemessages Log File
security checklist for, Chapter 21: Auditing, Logging, and Forensics
Swatch program, Swatch: A Log File Analysis Tool
syslog facility, Unix syslogBeware false syslog log entries
what not to log, Logging everything everywhere
who is logged in, utmp and wtmp FilesPruning the wtmp file
logging in, FTP: File Transfer Protocol (TCP Ports 20 and 21), Allowing only FTP access, TACACS and TACACS+ (UDP Port 49), Using Secure RPC, Initial loginInitial login, Restricting Logins, Managing Dormant AccountsFinding Dormant Accounts, lastlog Filelastlog File, loginlog File, Startup File AttacksOther initializations, Starting Up Unix and Logging InRunning the User’s Shell
authentication of, TACACS and TACACS+ (UDP Port 49)
failed attempts, logging, loginlog File
FTP, FTP: File Transfer Protocol (TCP Ports 20 and 21), Allowing only FTP access
access without, Allowing only FTP access
Kerberos system, Initial loginInitial login
preventing for dormant accounts, Managing Dormant AccountsFinding Dormant Accounts
recorded in log file, lastlog Filelastlog File
restricting, Restricting Logins
with Secure RPC, Using Secure RPC
startup file attacks, Startup File AttacksOther initializations
logging out, Built-in shell autologout, Using Secure RPC
automatic, Built-in shell autologout
with Secure RPC, Using Secure RPC
logic bombs, Programmed Threats: Definitions, Logic Bombs, Viruses on the Distribution Disk
login file, Secure Terminals, Changes to startup files, .login, .profile, /etc/profile
login program, The Unix Encrypted Password System, Using NIS+, Trusted path, Back Doors and Trap Doors
back doors in, Back Doors and Trap Doors
trusted path for, Trusted path
login service, TCP
logindevperm file, /etc/logindevperm
loginlog file, Essential Log Files, loginlog File, loginlog File
logins command, Accounts Without Passwords
.logout file, Using Secure RPC
long distance service, Protection of Modems and Lines
LOOKUP function (RPC), The NFS Protocol
loopback encryption, The Virtual Filesystem Interface
losses, The Cost of Loss, The Probability of a Loss, The Cost of Prevention, Adding Up the NumbersAdding Up the Numbers, The Disaster Recovery Plan
(see also disaster planning)
calculating cost of, The Cost of Loss
calculating cost of prevention, The Cost of Prevention
determining whether to protect against, Adding Up the NumbersAdding Up the Numbers
estimating probability of, The Probability of a Loss
lp user, Users and Groups
lpd system, /etc/hosts.lpd file
lrand48() system call, drand48( ), lrand48( ), and mrand48( )
ls command, Exploring with the ls CommandFile Times, File Times, File Permissions, Directory Permissions, Sticky Bits, Checklists and Metadata, Simple listing, Simple listing, Changes to startup files, Changes to startup files, Hidden files and directories
-d option, Simple listing
-i option, Simple listing
-c option, Changes to startup files
file permissions listed by, File Permissions
file times displayed by, File Times
-H option, Hidden files and directories
indicating SUID/SGID programs, Sticky Bits
-l option, Changes to startup files
listing files with control characters, Directory Permissions
lsof command, Monitoring Your Host with netstat, Limitation of netstat and lsof, Discovering an Intruder, Tracing a Connection, Hidden space, lsof: Examining a Process
lstat() system call, Coding Standards