R
- rabbit programs, Programmed Threats: Definitions, Bacteria and Rabbits
- race conditions, Design Principles
- radio transmissions, Electrical noise, Eavesdropping by radio and using TEMPEST, Kinds of eavesdropping
- computer
malfunctions caused by, Electrical noise
- eavesdropping
on, Eavesdropping by radio and using TEMPEST, Kinds of eavesdropping
- RADIUS (Remote Authentication Dial-In User
Service), Using Network Authorization Systems, RADIUS, Caller-ID and Automatic Number Identification
- RAID
filesystems, Understanding Filesystems
- RAM
theft, RAM Theft
- rand() system call, rand( )
- random
device, Picking a Random Seed
- random
numbers, Tips on Generating Random Numbers–A Good Random Seed Generator, Tips on Generating Random Numbers, Tips on Generating Random Numbers, Picking a Random Seed–A Good Random Seed Generator, Picking a Random Seed
- device file abstractions
for, Picking a Random Seed
- requirements
for, Tips on Generating Random Numbers
- seeds, Tips on Generating Random Numbers, Picking a Random Seed–A Good Random Seed Generator
- random() system call, random( )
- raw
devices, Device Files
- rc
script, Startup on different Unix systems, Process #1: /etc/init
- RC2 algorithm, Common Symmetric Key Algorithms
- RC4 algorithm, Common Symmetric Key Algorithms
- RC5 algorithm, Common Symmetric Key Algorithms
- rcp
command, Add-on Functionality Breeds Problems, Network Backup Systems
- RCS (Revision Control
System), Primary Unix Network Services, Building an Automatic Backup System
- RD (Receive Data), The RS-232 Serial Protocol
- rdist
program, rdist
- rdump/rrestore program, Network Backup Systems
- read command, File Permissions
- READ function (RPC), The NFS Protocol
- read
permission, File Permissions, Directory Permissions, chmod: Changing a File’s Permissions
- directories, Directory Permissions
- files, File Permissions
- read() system call, timeouts
on, Things to Do
- read-only
filesystems, Read-Only Filesystems–Read-Only Filesystems, Writable system files and directories
- READADDR function
(RPC), The NFS Protocol
- readdir()
system call, Directory Permissions
- READDIRPLUS function
(RPC), The NFS Protocol
- READLINK function
(RPC), The NFS Protocol
- real
GIDs, Other IDs
- real
UIDs, Real and Effective UIDs with the su Command, Process real and effective UIDs
- realpath() system
call, Things to Avoid
- reboots, Key Switches, last program
- logged by wtmp
file, last program
- single-user, Key Switches
- Receive Data (RD), The RS-232 Serial Protocol
- record locking,
mandatory, SGID Bit on Files (System V-Derived Unix Only): Mandatory Record Locking
- Red Hat Linux, Businesses adopt Unix, The sulog under Red Hat Linux, /etc/logindevperm, Default Accounts
- default
accounts for, Default Accounts
- sulog, scanning, The sulog under Red Hat Linux
- X security, /etc/logindevperm
- reiserfs filesystem, The Virtual Filesystem Interface
- relative
pathnames, Current Directory and Paths
- Remote Authentication Dial-In User
Service, Using Network Authorization Systems (see RADIUS)
- remote
command execution, rexec (TCP Port 512)
- remote
file, Connecting a Modem to Your Computer, aculog Log File
- Remote Job Entry
(RJE), The /etc/passwd File
- remote log server, Unix Log File Utilities
- Remote Method
Invocation (RMI), Remote Procedure Call (RPC)
- remote network filesystems, Turning Off SUID and SGID in Mounted Filesystems
- Remote Procedure
Call, Sun RPC–AUTH_KERB (see RPC)
- REMOVE function (RPC), The NFS Protocol
- RENAME function (RPC), The NFS Protocol
- renice
command, CPU overload attacks, Process priority and niceness
- replay
attacks, Sudden changes in time, Using the ticket-granting ticket
- replicated
filesystems, Understanding Filesystems
- Request to Send (RTS), The RS-232 Serial Protocol
- resolution,
time, Picking a Random Seed
- resolv.conf
file, DNS under Unix
- resolver library
(BIND), DNS under Unix
- resolving
(DNS), Domain Name System (DNS) (TCP and UDP Port 53)
- response
teams, Response Personnel?, Response Teams and Vendors, Emergency Response Organizations–Computer Emergency Response Team Coordination Center (CERT/CC)
- mailing lists
for, Response Teams and Vendors
- trusting, Response Personnel?
- restore, Specialized Backup Programs (see dump program)
- restore program, Specialized Backup Programs
- restricted
accounts, How to set up a restricted account with rsh
- restricted
filesystems, Restricted Filesystem with the chroot( ) Jail–Checking new software
- restricted logins, Restricting Logins
- restricted
shells, Restricted shells–Potential problems with restricted shells
- restricted terminals, Secure Terminals
- restrictmailq
option, sendmail, Security concerns with SMTP banners and commands
- retention of backups, Retention schedule (see backups,
retention of)
- return codes, checking, Coding Standards
- reverse
lookup, Authentication and DNS, Things to Do
- Revision Control
System (RCS), Primary Unix Network Services, Building an Automatic Backup System
- rexd
service, AUTH_KERB
- rexec
service, rexec (TCP Port 512)
- RFC (Request For Comments), web site
for, The /etc/services File
- .rhosts file, Trusted hosts and users, Specifying trusted hosts with /etc/hosts.equiv and ~/.rhosts–Specifying trusted hosts with /etc/hosts.equiv and ~/.rhosts, Specifying trusted hosts with /etc/hosts.equiv and ~/.rhosts, Network Setup, Back Doors and Trap Doors
- back door in, Back Doors and Trap Doors
- searching for, Specifying trusted hosts with /etc/hosts.equiv and ~/.rhosts
- RI (Ring Indicator), The RS-232 Serial Protocol
- Rijmen, Vincent, Common Symmetric Key Algorithms
- Ring Indicator (RI), The RS-232 Serial Protocol
- Rinjdael (AES)
algorithm, Key Length with Symmetric Key Algorithms, Key Length with Symmetric Key Algorithms, Common Symmetric Key Algorithms
- RIP (Routing Internet
Protocol), RIP Routed: Routing Internet Protocol (UDP Port 520)
- risks, Risk Assessment–Review Your Risks, Cost-Benefit Analysis and Best Practices, Adding Up the Numbers, Adding Up the Numbers, Best Practices, Risk Management Means Common Sense
- (see also cost-benefit
analysis)
- assessment
of, Risk Assessment–Review Your Risks, Risk Management Means Common Sense
- difficulty in
analyzing, Best Practices
- inability to
eliminate, Adding Up the Numbers
- secondary, Adding Up the Numbers
- RISKS mailing
list, RISKS
- Ritchie, Dennis, Multics: The Unix Prototype, Security and Unix, Unix Programming and System Administration
- discussing
Unix security, Security and Unix
- The UNIX Programming
Environment, Unix Programming and System Administration
- Unix
developed by, Multics: The Unix Prototype
- Rivest, Ron, Common Symmetric Key Algorithms, Public Key Algorithms, Message Digest Functions, Cryptography Papers and Other Publications
- “A Method for
Obtaining Digital Signatures”, Cryptography Papers and Other Publications
- RJE (Remote
Job Entry), The /etc/passwd File
- rlogin
program, Add-on Functionality Breeds Problems, Verifying your new password, Authentication and DNS, rlogin and rsh (TCP Ports 513 and 514)–/etc/hosts.lpd file, rlogin and rsh (TCP Ports 513 and 514), rlogin and rsh (TCP Ports 513 and 514)
- compared to
telnet, rlogin and rsh (TCP Ports 513 and 514)
- security
and, rlogin and rsh (TCP Ports 513 and 514)
- verifying new password
with, Verifying your new password
- rm
command, Understanding Filesystems, Directories and links, Directory Permissions, Tree structure attacks
- RMDIR function (RPC), The NFS Protocol
- RMI (Remote Method
Invocation), Remote Procedure Call (RPC)
- Rogue Programs: Viruses, Worms
and Trojan Horses (Hoffman, Lance
J.), Computer Viruses and Programmed Threats
- ROM monitor passwords, Key Switches
- root
account, Conventions Used in This Book, Users, Groups, and the Superuser, Problems with SUID
- (see also superuser)
- prompt for, Conventions Used in This Book
- root
domain server (NIS+), What NIS+ Does
- root user, Users and Groups (see superuser)
- rootkits, Programmed Threats: Definitions, Controlling and Examining Processes
- route service, UDP
- routed daemon, RIP Routed: Routing Internet Protocol (UDP Port 520)
- routers, IP: The Internet Protocol
- routing, Routing
- Routing Internet
Protocol (RIP), RIP Routed: Routing Internet Protocol (UDP Port 520)
- RPC (Remote Procedure Call), Networking and Unix, UDP, UDP, Sun RPC’s portmapper (UDP and TCP Ports 111), RPC rpc.rexd (TCP Port 512), Sun RPC–AUTH_KERB, Sun’s portmap/rpcbind, RPC Authentication–AUTH_KERB, AUTH_DES, Secure RPC (AUTH_DES)–Limitations of Secure RPC, Spoofing RPC, NIS+ Tables and Other Objects, Understanding NFS, The MOUNT Protocol, The MOUNT Protocol, The NFS Protocol, The NFS Protocol, Chapter 13: Sun RPC
- authentication
of, RPC Authentication–AUTH_KERB
- functions used with
NFS, The NFS Protocol
- MOUNT based on, The MOUNT Protocol, The MOUNT Protocol
- NFS built
on, Understanding NFS
- NFS protocol based
on, The NFS Protocol
- portmapper program
and, UDP, UDP, Sun RPC’s portmapper (UDP and TCP Ports 111), Sun’s portmap/rpcbind
- rpc.rexd, RPC rpc.rexd (TCP Port 512)
- Secure, AUTH_DES, Secure RPC (AUTH_DES)–Limitations of Secure RPC
- security checklist
for, Chapter 13: Sun RPC
- spoofing, Spoofing RPC
- table (NIS+), NIS+ Tables and Other Objects
- rpc.mountd
daemon, The MOUNT Protocol
- rpc.rexd
service, RPC rpc.rexd (TCP Port 512)
- rpcbind, Sun’s portmap/rpcbind (see portmapper
program)
- rpm
command, Upgrading Distributed Applications
- rpm
files, Software Management Systems
- RPM Package
Manager, Source code and patches, Integrity checking with RPM under Linux
- RS-232 serial
protocol, The RS-232 Serial Protocol–The RS-232 Serial Protocol
- RSA algorithm, Public Key Algorithms
- RSA Data Security, Common Symmetric Key Algorithms, Key search attacks, SSH: The Secure Shell (TCP Port 22), Host authentication with SSH
- factoring
challenges, Key search attacks
- SSH
using, SSH: The Secure Shell (TCP Port 22), Host authentication with SSH
- rsh
(restricted shell), Restricted shells–Potential problems with restricted shells
- rsh program, TCP, Authentication and DNS, rlogin and rsh (TCP Ports 513 and 514)–/etc/hosts.lpd file
- rshd program, back doors in, Back Doors and Trap Doors
- rsync
program, Backup plan, Network Backup Systems
- RTS (Request to
Send), The RS-232 Serial Protocol
- rtty program, Monitoring the Intruder
- RUID, Process real and effective UIDs (see real UIDs)
- run
levels, Startup on different Unix systems
- runacct
command, Process Accounting: The acct/pacct File
- Running Linux (Welsh, Matt; Kaufman, Lar; Dalheimer, Matthias K.; Dawson,
Terry), Unix Programming and System Administration
- Russell, Deborah
(Computer Security Basics), General Computer Security