Index: P
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: P
- packages, auditing: 10.10.7.1. Auditing packages
 
  
  - Unix: 11.6. Running a Security Audit
 
 
- packet altering: 4.1. What Does a Packet Look Like?
 
  
  - IP (see IP)
 
 
- packet filtering: 5.1. Some Firewall Definitions
 
  - 5.2. Packet Filtering
 
  - 8. Packet Filtering
 
  
  - implementations, on general-purpose computers: 8.9. Packet Filtering Implementations for General-Purpose Computers
 
  
  - on Windows NT: 8.9.5. Windows NT Packet Filtering
 
  
  - by address: 8.6. Filtering by Address
 
  
  - administering systems: 8.4. Packet Filtering Tips and Tricks
 
  
  - bastion hosts, protection for: 10.10.4. Controlling Inbound Traffic
 
  
  - bugs in packages: 5.2.2.1. Current filtering tools are not perfect
 
  
  - conventions for: 8.8.3. It Should Allow Simple Specification of Rules
 
  
  - dynamic: 8.1.2. Stateful or Dynamic Packet Filtering
 
  
  - examples of: 8.12. Putting It All Together
 
  
  - with exterior router: 6.3.4. Exterior Router
 
  
  - inbound vs. outbound: 8.8.6. It Should Apply Rules Separately to Incoming and Outgoing Packets, on a Per-Interface Basis
 
  
  - with interior router: 6.3.3. Interior Router
 
  
  - perimeter, encryption and: 5.5.1. Where Do You Encrypt?
 
  
  - routers,
    
    configuring: 8.2. Configuring a Packet Filtering Router
 
  
  
  - rules for: 8.5. Conventions for Packet Filtering Rules
 
    - 8.11. What Rules Should You Use?
 
    - 8.12. Putting It All Together
 
    - 24.2.2. Packet Filtering Rules
 
    
    - in screened subnet architecture: 24.1.2. Packet Filtering Rules
 
    
    - editing offline: 8.4.1. Edit Your Filtering Rules Offline
 
    
    - IP addresses in: 8.4.4. Always Use IP Addresses, Never Hostnames
 
    
    - reloading: 8.4.2. Reload Rule Sets from Scratch Each Time
 
    
    - sequence of: 8.8.5. It Should Apply Rules in the Order Specified
 
    
    - updating: 8.4.3. Replace Packet Filters Atomically
 
  
 
  
  - with screened host architecture: 6.2. Screened Host Architectures
 
  
  - by service: 8.7. Filtering by Service
 
  
  - by source port: 8.7.4. Risks of Filtering by Source Port
 
  
  - stateful: 8.1.2. Stateful or Dynamic Packet Filtering
 
  
  - tools for: B.3. Packet Filtering Tools
 
  
  - where to do: 8.10. Where to Do Packet Filtering
 
 
- packet ltering
 
  
  - routers,
    
    choosing: 8.8. Choosing a Packet Filtering Router
 
  
  
  - testing: 8.8.8. It Should Have Good Testing and Validation Capabilities
 
 
- packet sniffing attacks: 13.1.6. Packet Sniffing
 
  
  - protecting against: 13.1.10. Protecting Services
 
 
- packets: 4. Packets and Protocols 
 
  - 5.1. Some Firewall Definitions
 
  - 22.4.2. traceroute
 
  - (see also traceroute program)
 
  
  - accepted/dropped, logging: 8.8.7. It Should Be Able to Log Accepted and Dropped Packets
 
  
  - forged: 8.2.3. Default Permit Versus Default Deny
 
  
  - fragmenting: 4.1.1.2. IP layer
 
    - 4.2.3. IP Fragmentation
 
  
 
  
  - handling (by router): 8.3. What Does the Router Do with Packets?
 
  
  - headers of: 4.1. What Does a Packet Look Like?
 
  
  - ICMP: 22.4.3. Other ICMP Packets
 
  
  - inbound vs. outbound: 8.2.2. Be Careful of "Inbound" Versus "Outbound" Semantics
 
  
  - sniffing: 4.8.4. Packet Interception
 
    - 13.1.10. Protecting Services
 
    
    - programs: 13.1.6. Packet Sniffing
 
  
 
  
  - source-routed: 10.10.3. Turning Off Routing
 
  
  - structure: 4.1. What Does a Packet Look Like?
 
  
  - TCP: 4.3.1. TCP
 
  
  - UDP: 4.3.2. UDP
 
 
- page process: 11.3.3. Which Services Should You Leave Enabled?
 
- PAM (Pluggable Authentication Modules): 21.4.2. Pluggable Authentication Modules (PAM)
 
- papers, security-related: A.8. Papers
 
- passive (or PASV) mode, FTP: 17.1.1. Packet Filtering Characteristics of FTP
 
- password aging: 26.1.2. Managing Your Accounts
 
- passwords: 21.1. What Is Authentication?
 
  - 21.1.2. Something You Know
 
  
  - for packet filters: 8.4.5. Password Protect Your Packet Filters
 
  
  - on PostScript printers: 17.6. Printing Protocols
 
  
  - in SSH: 18.2.5.3. SSH client authentication
 
  
  - on web pages: 15.2.1. Inadvertent Release of Information
 
  
  - automatically generated: 21.2. Passwords
 
  
  - cracking: 21.2. Passwords
 
  
  - false authentication and: 13.1.4. False Authentication of Clients
 
  
  - one-time: 21.1.3. Something You Have
 
    - 21.3.1. One-Time Password Software
 
  
 
  
  - stealing with network taps: 1.2.1.3. Information theft
 
  
  - time-based: 21.5. Kerberos
 
  
  - Unix: 21.2. Passwords
 
  
  - Windows NT: 21.2. Passwords
 
 
- patches: 26.3.2. Keeping Your Systems up to Date
 
- pcbind service: 11.3.4.2. Other RPC services
 
- Performance Monitor: 22.1.4. Performance Monitor and Network Monitor
 
- performance, with multiple interior routers: 6.5.5. It's Dangerous to Use Multiple Interior Routers
 
- perimeter networks: 5.1. Some Firewall Definitions
 
  - 6.3.1. Perimeter Network
 
  
  - shared: 6.7.5. A Shared Perimeter Network Allows an "Arms-Length"Relationship
 
 
- PGP program: 12.4.3. Next Steps After Disabling Services
 
- ping program: 2.9.3. Network Diagnostics
 
  - 22.4.1. ping
 
 
- PKIX (Public-Key Infrastructure X.509): C.3.2. Certificates
 
- plaintext: C.2.1. Encryption
 
- platforms: 0.3. Platforms
 
- playback attacks: 13.1.4. False Authentication of Clients
 
- Plug and Play service: 12.4.4. Which Services Should You Leave Enabled?
 
- plug-gw proxy: 9.6.3. Generic Proxying with TIS FWTK
 
- plug-ins: 2.2.1. Web Client Security Issues
 
  - 15.2.2. External Viewers
 
 
- Pluggable Authentication Modules (PAM): 21.4.2. Pluggable Authentication Modules (PAM)
 
- PlugPlayServiceType registry key: 12.4.1.1. Registry keys
 
- Point-to-Point Protocol (PPP): 14.11. Point-to-Point Tunneling Protocol (PPTP)
 
- Pointcast program: 15.6. Push Technologies
 
- policy, security (see security, policies for)
 
- POP (Post Ofce Protocol): 2.3.1. Electronic Mail
 
- POP (Post Office Protocol): 16.6. Post Office Protocol (POP)
 
- port forwarding, in SSH: 18.2.5.6. Port forwarding
 
- port numbers
 
  
  - assigned: 13.4.4. Assigned Ports
 
    
    - finding: 13.3. Analyzing Other Protocols
 
  
 
  
  - client: 13. Internet Services and Firewalls
 
  
  - setting: 14.1.3. Packet Filtering Characteristics of RPC
 
 
- portmap service: 11.3.4.2. Other RPC services
 
  - 11.3.4.2. Other RPC services
 
  - B.5.7. portmap
 
 
- portmapper server: 14.1. Remote Procedure Call (RPC)
 
  - 17.3.6. Packet Filtering Characteristics of NFS
 
 
- ports
 
  
  - network address translation: 5.4.2.5. Dynamic allocation of ports may interfere with packet filtering
 
  
  - scanning: 4.8.1. Port Scanning
 
  
  - source, filtering by: 8.7.4. Risks of Filtering by Source Port
 
 
- Postfix program: 16.2.8.2. Postfix
 
- PostScript
 
  
  - files: 15.2.2. External Viewers
 
  
  - printers, attacks from: 17.6. Printing Protocols
 
 
- PPP (Point-to-Point Protocol): 14.11. Point-to-Point Tunneling Protocol (PPTP)
 
- printing: 3.1. Least Privilege
 
  - 17.6. Printing Protocols
 
  
  - Hewlett-Packard printers: 17.6.3. Other Printing Systems
 
  
  - PostScript printers: 17.6. Printing Protocols
 
  
  - systems: 2.4.3. Printing Systems
 
  
  - Windows-based: 17.6.2. Windows-based Printing
 
 
- private newsgroups: 2.3.2. Usenet News
 
- privileges, root: 16.2.7. Sendmail
 
- probes, responding to: 26.2.5. Responding to Probes
 
- procedures for proxying, custom: 9.2.3. Using Proxy-Aware User Procedures for Proxying
 
- processing speed: 10.3.2. How Fast a Machine?
 
- programming languages, web-related: 15.4. Mobile Code and Web-Related Languages
 
- programs
 
  
  - uploading on HTTP servers: 15.1.1.2. Running unexpected external programs
 
  
  - evaluating security of: 13.5. Choosing Security-Critical Programs
 
  
  - external
 
    
    - on HTTP clients: 15.2.3. Extension Systems
 
    
    - on HTTP servers: 15.1.1. HTTP Extensions
 
  
 
  
  - removing nonessential: 11.5.2. Remove Nonessential Programs
 
  
  - removing nonessential on Windows NT: 12.4.3. Next Steps After Disabling Services
 
 
- promiscuous mode: 10.5. Locating Bastion Hosts on the Network
 
- Protected Storage service: 12.4.4. Which Services Should You Leave Enabled?
 
- protocol checking: 8.1.3. Protocol Checking
 
- protocol modification: 13.4.5. Protocol Security
 
- protocols
 
  
  - from OSI: 16.3. Other Mail Transfer Protocols
 
  
  - analyzing: 13.2.4. What Else Can Come in If I Allow This Service?
 
  
  - assigned port numbers: 13.4.4. Assigned Ports
 
  
  - bidirectionality of: 8.2.1. Protocols Are Usually Bidirectional
 
  
  - custom: 23.1.1.4. Using a custom protocol to connect to a perimeter web server
 
  
  - evaluating: 13.2.1. What Operations Does the Protocol Allow?
 
  
  - file synchronization: 22.6. File Synchronization
 
  
  - implementation of, evaluating: 13.2.3. How Well Is the Protocol Implemented?
 
  
  - above IP: 4.3. Protocols Above IP
 
  
  - below IP: 4.4. Protocols Below IP
 
  
  - non-IP: 4.7. Non-IP Protocols
 
  
  - routing: 22.2. Routing Protocols
 
  
  - security of: C.4. What Makes a Protocol Secure?
 
    
    - proxying and: 13.4.5. Protocol Security
 
  
 
  
  - time-dependence of: 22.5. Network Time Protocol (NTP)
 
 
- Proxy Server: 9.7. Using Microsoft Proxy Server
 
- proxy services: 5.1. Some Firewall Definitions
 
  - 5.3. Proxy Services
 
  - 9. Proxy Systems
 
  
  - without proxy server: 9.4. Proxying Without a Proxy Server
 
  
  - advantages/disadvantages: 5.3.1. Advantages of Proxying
 
  
  - application- versus circuit-level: 9.3.1. Application-Level Versus Circuit-Level Proxies
 
  
  - generic vs. dedicated: 9.3.2. Generic Versus Dedicated Proxies
 
  
  - intelligent servers: 9.3.3. Intelligent Proxy Servers
 
  
  - Microsoft Proxy Server: 9.7. Using Microsoft Proxy Server
 
  
  - multiple operating systems: 9.1. Why Proxying?
 
  
  - protocol security: 13.4.5. Protocol Security
 
  
  - SOCKS package for: 9.5. Using SOCKS for Proxying
 
  
  - software for: 9.2. How Proxying Works
 
  
  - TIS Internet Firewalls Toolkit for: 9.6. Using the TIS Internet Firewall Toolkit for Proxying
 
  
  - tools for: B.4. Proxy Systems Tools
 
  
  - when unable to provide: 9.8. What If You Can't Proxy?
 
 
- public key cryptography: C.2.1.1. Kinds of encryption algorithms
 
  - C.4.3. Sharing a Secret
 
  
  - in SSH: 18.2.5.2. SSH server authentication
 
    - 18.2.5.3. SSH client authentication
 
  
 
 
- Public-Key Infrastructure X.509 (PKIX): C.3.2. Certificates
 
- pull technology: 15.6. Push Technologies
 
- pursuing intruders: 27.3. Pursuing and Capturing the Intruder
 
- push technologies: 15.6. Push Technologies
 
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2002
O'Reilly & Associates, Inc.
All Rights Reserved.