M
- MAC
(Mandatory Access Controls), Groups and Group Identifiers (GIDs), The Superuser (root)
- Mac OS X, Versions Covered in This Book, Versions Covered in This Book, Second-Generation Commercial Unix Systems, NetInfo, NetInfo, sudo: A More Restrictive su, BSD Kernel Security Levels, Startup on different Unix systems, Access Control Lists with TCP Wrappers, Using a Host-Based Packet Firewall, The ipfw host-based firewall, Understanding SMB, Accounts Without Passwords, The sudo Program, Codebooks
- (see also BSD Unix)
- history
of, Second-Generation Commercial Unix Systems
- host-based firewall for, Using a Host-Based Packet Firewall, The ipfw host-based firewall
- kernel security levels
on, BSD Kernel Security Levels
- NetInfo, NetInfo
- password
database, NetInfo
- password file,
printing, Accounts Without Passwords
- S/Key
support, Codebooks
- server startup
on, Startup on different Unix systems
- SMB support, Understanding SMB
- sudo program, sudo: A More Restrictive su, The sudo Program
- TCP Wrappers
support, Access Control Lists with TCP Wrappers
- Mach
kernel, The Unix Wars: Why Berkeley 4.2 over System V
- machine
name, Format of the hostname
- macro
virus, Viruses (see viruses)
- MACs (message authentication
codes), Message Digest Algorithms at Work, Uses of Message Digest Functions, Eavesdropping over local area networks (Ethernet and twisted pairs)
- magic
cookies, Using Xauthority magic cookies
- magic
number, File Permissions
- magnetic
tapes, Verify your backups (see tapes)
- mail, Overflowing system mailboxes (see email)
- MAIL command, SMTP, Security concerns with SMTP banners and commands
- mail handler
(MH), .forward, .procmailrc
- mail
systems, SMTP: Simple Mail Transfer Protocol (TCP Port 25) (see MTAs)
- mail user, Users and Groups
- mailboxes, Overflowing system mailboxes (see email)
- mailing
lists, security-related, Mailing Lists–SANS Security Alert Consensus
- mailq command, Security concerns with SMTP banners and commands
- Mail_Aliases table
(NIS+), NIS+ Tables and Other Objects
- main.cf
file, SMTP relaying and bulk email (a.k.a. spam)
- maintenance
mode, Process #1: /etc/init
- maintenance personnel, security
regarding, Other People
- makedbm
program, Setting up netgroups
- malicious
code, Programmed Threats: Definitions (see programmed threats)
- malware, Programmed Threats: Definitions (see programmed
threats)
- man-in-the-middle
attack, Host authentication with SSH
- management, Policies and Guidelines, Steps in Risk Assessment, Convincing Management, The Problem with Security Through Obscurity
- participation in
security policy, Steps in Risk Assessment
- role
of, Policies and Guidelines, Convincing Management, The Problem with Security Through Obscurity
- Manasse, M. S. (“The
Number Field Sieve”), Cryptography Papers and Other Publications
- Mandatory Access
Controls, Groups and Group Identifiers (GIDs) (see MAC)
- mandatory
filtering software, Mandatory blocking
- mandatory record
locking, SGID Bit on Files (System V-Derived Unix Only): Mandatory Record Locking
- Mann, Charles C.
(@ Large), Computer Crime and Law
- manpages, Design Principles
- MANs (metropolitan area
networks), Networking
- manuals, What This Book Is, The Problem with Security Through Obscurity
- reading, What This Book Is
- restricting
availability of, The Problem with Security Through Obscurity
- maps, NIS, NIS Fundamentals (see NIS)
- Markoff,
John, Understanding the Computer Security “Culture”, Understanding the Computer Security “Culture”
- Cyberpunk: Outlaws and
Hackers on the Computer Frontier, Understanding the Computer Security “Culture”
- Takedown: The Pursuit and
Capture of Kevin Mitnick, America’s Most Wanted Computer Outlaw
-- By the Man Who Did it, Understanding the Computer Security “Culture”
- master password file, The shadow password and master password files
- master
server, NIS Fundamentals, NIS Fundamentals
- (see also NIS)
- master.passwd
file, The shadow password and master password files, The /etc/passwd File
- MCF (Modular Crypt
Format), crypt16( ), DES Extended, and Modular Crypt Format
- McGraw, Gary (Building Secure
Software<Default Para Font), General Computer Security
- McKusick,
Marshall Kirk (The Design and Implementation of the
4.4 BSD UNIX Operating System), Unix Programming and System Administration
- MD2 functions, Message Digest Functions
- MD4 functions, Message Digest Functions
- MD5 algorithm, POP, POPS: Post Office Protocol, and IMAP, IMAPS: Internet Message Access Protocol (TCP Ports 109, 110, 143, 993, 995), A Good Random Seed Generator
- MD5
cryptographic checksum, Upgrading Distributed Applications
- MD5 functions, Message Digest Functions
- media, Verify your backups, Sanitizing Media Before Disposal–Sanitizing Printed Media, Sanitizing Media Before Disposal, Sanitizing Media Before Disposal, Sanitizing Printed Media, Sanitizing Printed Media, Types of Backups, Guarding Against Media Failure, Replace tapes as needed, How Long Should You Keep a Backup?, How Long Should You Keep a Backup?, How Long Should You Keep a Backup?, Read-Only Filesystems, Unix Log File Utilities, Logging to a printer, Never Trust Anything Except Hardcopy, Viruses
- backing up
to, How Long Should You Keep a Backup? (see backups)
- destroying, Sanitizing Media Before Disposal, Sanitizing Printed Media
- failure of, for
backups, Guarding Against Media Failure
- overwriting, Sanitizing Media Before Disposal
- print through
process, Verify your backups
- printed, Sanitizing Printed Media, Logging to a printer, Never Trust Anything Except Hardcopy
- read-only, Read-Only Filesystems
- rotating for
backups, Types of Backups
- sanitizing, Sanitizing Media Before Disposal–Sanitizing Printed Media
- tapes, Replace tapes as needed, How Long Should You Keep a Backup?
- upgrading, How Long Should You Keep a Backup?
- viruses
from, Viruses
- write-once, logging
to, Unix Log File Utilities
- meet-in-the-middle
plaintext attacks, Common Symmetric Key Algorithms
- memory, swap
space, running out of, Swap Space Problems–Swapping to files
- Merkle,
Ralph, Cryptography Papers and Other Publications, Cryptography Papers and Other Publications, Cryptography Papers and Other Publications
- “Hiding Information and Signatures in Trap
Door Knapsacks”, Cryptography Papers and Other Publications
- “On the
Security of Multiple Encryption”, Cryptography Papers and Other Publications
- “Secure Communication Over Insecure
Channels”, Cryptography Papers and Other Publications
- Merkle,
Robert, Public Key Algorithms
- message
authentication codes, Message Digest Algorithms at Work (see MACs)
- message digest functions, Cryptographic Algorithms and Functions, Message Digest Functions–Attacks on Message Digest Functions, Message Digest Algorithms at Work, Uses of Message Digest Functions, HMAC, Attacks on Message Digest Functions, Checksums and Signatures, Tripwire–Running Tripwire
- applications of, Message Digest Algorithms at Work, Uses of Message Digest Functions
- attacks on, Attacks on Message Digest Functions
- checksums generated
with, Checksums and Signatures
- HMAC, HMAC
- Tripwire package
and, Tripwire–Running Tripwire
- message
flooding, Message Flooding–Message Flooding
- Message Transfer
Agents, SMTP: Simple Mail Transfer Protocol (TCP Port 25) (see MTAs)
- Message User
Agents (MUA), SMTP: Simple Mail Transfer Protocol (TCP Port 25)
- messages
file, The su Log, Essential Log Files, Essential Log Files, messages Log File, messages Log File
- (see also syslog
file)
- metadata, Understanding Filesystems, Checklists and Metadata
- Metcalf, Bob, Add-on Functionality Breeds Problems
- “A Method for Obtaining Digital Signatures” (Rivest, Ron;
Shamir, A.; Adleman, L.), Cryptography Papers and Other Publications
- metropolitan area
networks (MANs), Networking
- MH (mail
handler), .forward, .procmailrc
- Miller, Barton
P., An Empirical Study of the Reliability of Unix Utilities–Where’s the beef?, Buggy Software, Miscellaneous References
- “An Empirical Study of the Reliability of UNIX
Utilities”, Miscellaneous References
- Minix operating
system, Minix
- mirror sites, Software Management Systems
- mirrored disks and
servers, Defending Against Acts of War and Terrorism
- MIT Kerberos, Using Network Authorization Systems (see Kerberos
system)
- MIT-KERBEROS-5
authentication, The xhost facility
- Mitnick,
Kevin, Network Providers That Network Too Well, Understanding the Computer Security “Culture”
- MKDIR function (RPC), The NFS Protocol
- mknod
command, What the Superuser Can Do
- MKNOD function (RPC), The NFS Protocol
- mkpasswd
program, Password Generators
- mkstemp() system
call, Coding Standards
- MLS
(Multilevel Security) environment, “Secure” Versions of Unix
- MNT request, The MOUNT Protocol
- mobile Unix systems, What Is a Deployment Environment?
- mode
bits, Inodes (see permissions)
- modems, Modems and Dialup Security–Additional Security for Modems, Modems and Dialup Security, Modems: Theory of Operation, Serial Interfaces, The RS-232 Serial Protocol–The RS-232 Serial Protocol, Originate and Answer, Originate and Answer, Baud and bps, Baud and bps, Modems and Security–Limitations of scanning and firewalls, Modems and Security, Banners–Banners, Caller-ID and Automatic Number Identification–Caller-ID and Automatic Number Identification, One-Way Phone Lines, One-Way Phone Lines, Protecting Against Eavesdropping–Eavesdropping countermeasures, Managing Unauthorized Modems with Telephone Scanning and Telephone Firewalls, Managing Unauthorized Modems with Telephone Scanning and Telephone Firewalls, Modems and Unix, Connecting a Modem to Your Computer, Setting Up the Unix Device, Checking Your Modem–Privilege testing, Protection of Modems and Lines–Additional Security for Modems, Additional Security for Modems, Additional Security for Modems, Additional Security for Modems, Additional Security for Modems, Additional Security for Modems, aculog Log File, Tracing a Connection–Tracing a Connection, Clogging (SYN Flood Attacks), Chapter 10: Modems and Dialup Security, Catching Signals
- answer
mode, Originate and Answer
- banners
displayed by, Banners–Banners
- baud, Baud and bps
- bps (bits per
second), Baud and bps
- callback schemes
and, One-Way Phone Lines, Additional Security for Modems
- Caller-ID
and, Caller-ID and Automatic Number Identification–Caller-ID and Automatic Number Identification, Additional Security for Modems
- clogging, Clogging (SYN Flood Attacks)
- connecting, Connecting a Modem to Your Computer
- current trends for use
of, Modems: Theory of Operation
- eavesdropping
and, Protecting Against Eavesdropping–Eavesdropping countermeasures
- encrypting, Additional Security for Modems
- hanging up with
SIGHUP, Catching Signals
- initiating calls
with, Modems and Unix
- one-way phone lines
used by, One-Way Phone Lines
- originate
mode, Originate and Answer
- password, Additional Security for Modems
- phone numbers for,
changing, Modems and Security
- physical
security of, Protection of Modems and Lines–Additional Security for Modems
- reasons to
use, Modems and Dialup Security
- recording call
information, aculog Log File
- RS-232
serial protocol used by, The RS-232 Serial Protocol–The RS-232 Serial Protocol
- security
and, Modems and Security–Limitations of scanning and firewalls, Additional Security for Modems
- security checklist
for, Chapter 10: Modems and Dialup Security
- serial interfaces used
by, Serial Interfaces
- telephone scanning and
firewalls for, Managing Unauthorized Modems with Telephone Scanning and Telephone Firewalls
- testing, Checking Your Modem–Privilege testing
- tracing
connections, Tracing a Connection–Tracing a Connection
- unauthorized, Managing Unauthorized Modems with Telephone Scanning and Telephone Firewalls
- Unix devices
for, Setting Up the Unix Device
- modification times,
files, Large Service-Based Networks with Large Budget, Checklists and Metadata
- Modular Crypt
Format (MCF), crypt16( ), DES Extended, and Modular Crypt Format
- Mona Lisa Overdrive (Gibson, William), Understanding the Computer Security “Culture”
- monitoring, Auditing, Logging, and Forensics, Auditing, Logging, and Forensics
- (see also logging)
- monitoring
services, Monitoring Services
- Morris,
Robert H., The Unix Encrypted Password System, The traditional crypt ( ) algorithm, Unix Security References
- “UNIX Operating System
Security”, Unix Security References
- Morris, Robert T., Understanding the Computer Security “Culture”
- motion detectors, Entrance through air ducts
- mount
command, Turning Off SUID and SGID in Mounted Filesystems, Hard, soft, and spongy mounts, Client-Side NFS Security
- MOUNT
protocol, The MOUNT Protocol–The MOUNT Protocol
- mountd daemon, The MOUNT Protocol
- mounted
filesystems, Turning Off SUID and SGID in Mounted Filesystems
- mrand48() system call, drand48( ), lrand48( ), and mrand48( )
- MSDOS filesystem, The Virtual Filesystem Interface
- MTAs (Message Transfer
Agents), SMTP: Simple Mail Transfer Protocol (TCP Port 25)–SMTP: Simple Mail Transfer Protocol (TCP Port 25)
- mtime, Inodes, File Times, Checklists and Metadata, Changes to startup files
- mtree program, BSD’s mtree and Periodic Security Scans
- MUA (Message User Agents), SMTP: Simple Mail Transfer Protocol (TCP Port 25)
- Muddleftpd server, Setting up an FTP server
- MUDs (Multiuser
Dungeons/Dimensions), Communicating with MUDs, Internet Relay Chat (IRC), and Instant Messaging
- Muffet, Alec, Unix salt, Beware false syslog log entries
- multicast
groups, Classical network addresses
- MULTICS (Multiplexed Information and
Computing Service), Multics: The Unix Prototype–Multics: The Unix Prototype
- multilevel security (defense in
depth), Defend in depth, Risk Management Means Common Sense, Controlling Access to Servers
- multitasking, Security and Unix
- multithreaded programming, Processes and Programs
- Multiuser Dungeons/Dimensions
(MUDs), Communicating with MUDs, Internet Relay Chat (IRC), and Instant Messaging
- multiuser operating
systems, Security and Unix
- multiuser, shared systems, What Is a Deployment Environment?
- MX record type, Domain Name System (DNS) (TCP and UDP Port 53)