Index

The parenthesized number on an index entry indicates the location of the entry within the book. Entries before the first numbered section in a chapter are identified as Sec. n.0.


Click letter for quick access:
[Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Special Characters

.rhosts file
        suggested permissions on (Sec. 3.1.6)
        suggested permissions on (Sec. 3.1.6)

Click letter for quick access:
[Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

A

abbreviated audit reports (Sec. 10.8.3)

absolute pathname (Sec. 16.4)

access control list (ACL) (Sec. 5.2)
        protecting files (Sec. 2.6.5)

access control list (Sec. 11.0)
access control list (Sec. 5.0)
        See also ACL

accessing the databases (Sec. 17.1)

account lock (Sec. 18.4)

account management (Sec. 9.5)

account tempates (Sec. 9.1.1.3)

account template, modifying (Sec. 9.2.5)

accountability (Sec. 1.1.3)
accountability (Sec. 1.2)

accounting tools (Sec. 10.14)

accounts (Sec. 9.1)
accounts (Sec. 9.5.4)
        adding (Sec. 7.1.1)
        anonymous ftp (Sec. 3.1.4)
        creating (Sec. 7.6)
        creating (Sec. 9.1)
        deleting (Sec. 9.2.4)
        disabled (Sec. 9.2.2)
        locked (Sec. 9.2.2)
        maintaining (Sec. 9.1)
        modifying (Sec. 9.0)
        new (Sec. 9.2.2)
        passwords (Sec. 9.2.2)
        retiring (Sec. 9.2.3)

ACL (Sec. 11.0)
ACL (Sec. 5.0)
        administering (Sec. 11.2)
        administration (Sec. 11.0)
        archival tools (Sec. 11.6)
        base entry (Sec. 21.1)
        configuring (Sec. 7.5.2)
        decision process (Sec. 5.6)
        default (Sec. 21.6)
        default (Sec. 5.2)
        description (Sec. 6.3.3)
        enabling (Sec. 11.3.1)
        entry rules (Sec. 21.4.3)
        example of setting for file (Sec. 21.5)
        external representation (Sec. 21.2.2)
        format (Sec. 5.5)
        getacl command (Sec. 5.4)
        getacl command (Sec. 5.4.3)
        inheritance (Sec. 21.6)
        inheritance (Sec. 5.7.2)
        initialization (Sec. 5.7.2)
        installation (Sec. 11.0)
        installing (Sec. 11.3)
        kernel status (Sec. 11.3.1)
        library routines (Sec. 21.3)
        ls command (Sec. 5.4.4)
        maintaining (Sec. 5.8)
        object creation rule (Sec. 21.4.1)
        overview (Sec. 11.1)
        overview (Sec. 5.2)
        propagation (Sec. 21.4.1)
        protecting objects (Sec. 5.4)
        recovery (Sec. 11.4)
        replication rule (Sec. 21.4.2)
        setacl command (Sec. 5.4.2)
        standalone system (Sec. 11.5)
        status (Sec. 5.3)
        umask (Sec. 21.4.1)
        using (Sec. 5.0)
        verifying status (Sec. 11.3.1)
        viewing (Sec. 5.4)
        working storage (Sec. 21.2.1)
        working storage: example (Sec. 21.5)

administrating a trusted operating system (Sec. 6.5)

administrative roles
        See role responsibilities

administrators, introduction (Sec. 6.0)

aliases for audit events (Sec. 10.6.1.2)

aliases for auditable events (Sec. B.2)

allowSendEvents resource (Sec. 16.7.2)

anonymous ftp account (Sec. 3.1.4)

ANSI C
        symbol preemption (Sec. E.1)

antecedent directories (Sec. 15.4)

application-specific auditing (Sec. 10.5.2)

applications
        adding to the file control database (Sec. 12.3)

assigning terminal devices (Sec. 7.7.3)
assigning terminal devices (Sec. 8.1)

attributes, file
        See file attributes

audcntl routine (Sec. C.1.2)

audgen command (Sec. 10.1.2.1)

audgen system call (Sec. C.1.1)

audgen() (Sec. 19.1)
        specifying audit log (Sec. 19.9)

audgen8 trusted event (Sec. 10.5.1)

audgenl()
        example (Sec. 19.1)
        example (Sec. 19.7)
        example (Sec. 19.8.2)

audit (Sec. 10.1)
audit (Sec. 10.4.2)
audit (Sec. 10.6.1.1)
        accessing the graphic interface (Sec. 10.1.2.2)
        accounting tools (Sec. 10.14)
        active processes (Sec. 10.9.2)
        administration tools (Sec. 10.1.2)
        advanced configuration (Sec. 10.3)
        application-specific auditing (Sec. 10.5.2)
        application-specific records (Sec. 19.7)
        audcntl flag (Sec. 19.6)
        audgen command (Sec. 10.1.2.1)
        audit control flag (Sec. 10.6.1.1)
        audit hosts file (Sec. 10.7)
        audit hub (Sec. 10.7)
        audit log dump (Sec. 19.10.2)
        Audit Manager (Sec. 10.1.2.2)
        audit mask (Sec. 10.6.1.1)
                control flag (Sec. 10.6.1.1)
        auditable events (Sec. 10.5)
        auditconfig command (Sec. 10.1.2.1)
        auditconfig command (Sec. 10.2)
        auditconfig command (Sec. 10.3)
        auditd command (Sec. 10.1.2.1)
        auditd command (Sec. 10.4.1)
        auditing remotely (Sec. 10.7)
        auditmask command (Sec. 10.1.2.1)
        auditmask command (Sec. 10.4.2)
        auditmask flag (Sec. 19.6)
        audit_tool command (Sec. 10.1.2.1)
        audit_tool command (Sec. 10.4.3)
        audit_tool command (Sec. 10.4.3)
        audit_tool command (Sec. 10.9)
        audit_tool command (Sec. 10.9)
        audit_tool.ultrix command (Sec. 10.1.2.1)
        AUD_T public tokens (Sec. 19.3.1)
        AUD_TP private tokens (Sec. 19.3.2)
        AUID (audit ID) (Sec. 10.8)
        CDE interface (Sec. 10.1.2.2)
        choosing events (Sec. 10.5)
        commands (Sec. 10.1.2.1)
        configuring (Sec. 10.2)
        configuring (Sec. 10.3)
        configuring (Sec. 10.4.1)
        console messages (Sec. 10.1.1)
        content of records (Sec. 10.8)
        control flag (Sec. 10.6.1.1)
        crash recovery (Sec. 10.10)
        creating own log (Sec. 19.9)
        data recovery (Sec. 10.10)
        data--managing growth of (Sec. 10.6)
        dependencies among audit events (Sec. 10.5.3)
        deselection files for audit reports (Sec. 10.9.1)
        disabling system-call auditing (Sec. 19.5)
        /etc/sec/auditd_clients file (Sec. 10.7)
        event types (Sec. 19.2)
        events (Sec. 10.5)
                preselection (Sec. 10.6)
                site-defined events (Sec. 10.5.2)
                state-dependent information (Sec. 10.5.3)
                trusted events (Sec. 10.5.1)
        files (Sec. 10.1.1)
                site_events file (Sec. 10.5.2)
        filtering data (Sec. 10.9.1)
        fixed-length tokens (Sec. 19.3.1)
        generating reports (Sec. 10.4.3)
        generating reports (Sec. 10.9)
        getting started (Sec. 10.2)
        graphic interface (Sec. 10.1.2.2)
        GUI (Sec. 10.1.2.2)
        ID (AUID) (Sec. 10.8)
        implementation notes (Sec. 10.11)
        iovec-type tokens (Sec. 19.3.1)
        log files (Sec. 10.1.1)
        log location (Sec. 10.4.1)
        logging tools (Sec. 10.14)
        login audit mask
                setting (Sec. 10.6.1.1)
        login process mask (Sec. 10.6.1.1)
        LUID (login ID) (Sec. 10.8)
        managing data (Sec. 10.6)
        masks (Sec. 10.6.1.1)
        masks (Sec. 19.4)
        messages (Sec. 10.1.1)
        modifying for process (Sec. 19.6)
        network audit hosts file (Sec. 10.7)
        networked auditing (Sec. 10.7)
        octal dump of audit log (Sec. 19.10.2)
        overflow handling (Sec. 10.4.1)
        overview (Sec. 10.1)
        pointer-type tokens (Sec. 19.3.1)
        preselection (Sec. 10.4.2)
        preselection (Sec. 10.6)
        process audit mask (Sec. 10.6.1.1)
        process control flag (Sec. 19.4)
        processing audit information (Sec. 10.4.3)
        processing audit information (Sec. 10.9)
        quick start (Sec. 10.2)
        record as series of tuples (Sec. 19.3)
        record content (Sec. 10.8)
        record generation (Sec. 19.0)
        record length (Sec. 19.10.2)
        reducing audit information (Sec. 10.4.3)
        reducing audit information (Sec. 10.9)
        report deselection files (Sec. 10.9.1)
        reports (Sec. 10.4.3)
        reports (Sec. 10.9)
        reports, abbreviated (Sec. 10.8.3)
        responding to audit reports (Sec. 10.12)
        selecting audit events (Sec. 10.4.2)
        selecting events (Sec. 10.5)
        self-auditing commands (Sec. 10.5.1)
        site-defined events (Sec. 10.5.2)
        site-defined events (Sec. 19.8)
        starting (Sec. 10.2)
        starting (Sec. 10.3)
        system audit mask (Sec. 10.6.1.1)
        tokens (Sec. 19.3)
        tools (Sec. 10.1.2)
        tracing system calls (Sec. 10.13)
        trusted application (Sec. 19.0)
        trusted events (Sec. 10.5.1)
        tuples (Sec. 19.3)
        turning off/on auditing (Sec. 10.4.1)
        user audit mask
                setting (Sec. 10.6.1.1)
        user process mask (Sec. 10.6.1.1)

audit events
        default events (Sec. B.1)

audit features (Sec. 6.3.1)

audit ID (AUID) (Sec. 1.1.3)
audit ID (AUID) (Sec. 1.2)
audit ID (AUID) (Sec. 18.0)

audit log
        reading (Sec. 19.10)
        reading algorithm (Sec. 19.10.4)
        tuple formats (Sec. 19.10.1)

Audit Manager graphic interface (Sec. 10.1.2.2)

audit subsystem (Sec. 1.1.3)
        See also audit
        anonymous ftp (Sec. 3.1.4)
        configuring (Sec. 7.5.1)
        default auditable events (Sec. B.1)
        default event aliases (Sec. B.2)
        setting up (Sec. 7.7.4)
        ULTRIX compatibility (Sec. C.3)

audit trail (Sec. 1.1.3)

auditable events (Sec. 10.5)
auditable events (Sec. B.1)

auditconfig command (Sec. 10.1.2.1)
auditconfig command (Sec. 10.2)
auditconfig command (Sec. 10.3)

auditconfig trusted event (Sec. 10.5.1)

auditd command (Sec. 10.1.2.1)
auditd command (Sec. 10.4.1)

auditing for applications (Sec. 10.5.2)

auditing in a cluster (Sec. G.4)

auditmask command (Sec. 10.1.2.1)
auditmask command (Sec. 10.4.2)

audit_daemon_exit trusted event (Sec. 10.5.1)

audit_log_change trusted event (Sec. 10.5.1)

audit_log_create trusted event (Sec. 10.5.1)

audit_log_overwrite trusted event (Sec. 10.5.1)

audit_reboot trusted event (Sec. 10.5.1)

audit_start trusted event (Sec. 10.5.1)

audit_stop trusted event (Sec. 10.5.1)

audit_subsystem
        event aliases (Sec. 10.6.1.2)

audit_suspend trusted event (Sec. 10.5.1)

audit_tool command (Sec. 10.1.2.1)
audit_tool command (Sec. 10.4.3)
audit_tool command (Sec. 10.9)

audit_tool.ultrix command (Sec. 10.1.2.1)

audit_xmit_fail trusted event (Sec. 10.5.1)

AUD_MAXEVENT_LEN (Sec. 19.8)

AUD_T public audit tokens (Sec. 19.3.1)

AUD_TP private audit tokens (Sec. 19.3.2)

AUID (audit ID) (Sec. 10.8)

authaudit routines (Sec. C.1.3)

authck command (Sec. 12.0)

authck program (Sec. 12.2)

authentication (Sec. 18.0)
authentication (Sec. 6.3.2)
authentication (Sec. 9.1)
        programming concerns (Sec. 18.0)

authentication configuration (Sec. 7.5.4)
        encryption (Sec. 7.5.4.12)
        failed login records (Sec. 7.5.4.9)
        log in records (Sec. 7.5.4.7)
        maximum log in attempts (Sec. 7.5.4.4)
        password aging (Sec. 7.5.4.1)
        password change time (Sec. 7.5.4.2)
        password-changing controls (Sec. 7.5.4.3)
        profile migration (Sec. 7.5.4.10)
        successful login records (Sec. 7.5.4.8)
        terminal breakin (Sec. 7.5.4.5)
        time between log in attempts (Sec. 7.5.4.5)
        time between log ins (Sec. 7.5.4.6)
        vouching (Sec. 7.5.4.11)

authentication database (Sec. 12.0)
authentication database (Sec. 12.1)
authentication database (Sec. 17.0)
authentication database (Sec. 9.1)
        conversion (Sec. 7.1.2)

authentication files (Sec. C.2)

authentication in a cluster (Sec. G.3)

authentication profile (Sec. 1.2)
authentication profile (Sec. 14.2.1)
authentication profile (Sec. 17.6)
authentication profile (Sec. 18.0)
authentication profile (Sec. 2.1.1)
authentication profile (Sec. 6.5.1.1)
authentication profile (Sec. 6.5.2.1)

authentication program (Sec. 18.1)

authentication subsystem (Sec. 9.1)

authorization list
        See terminal authorization list

auth_event trusted event (Sec. 10.5.1)

A_PROCMASK_SET macro (Sec. 19.6)

Click letter for quick access:
[Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

B

background job (Sec. 2.6.2)

backup procedures (Sec. 14.0)
backup procedures (Sec. 7.8)

Berkeley database (Sec. 6.3.5)

binary compatibility (Sec. 6.1)

boot loading software (Sec. 14.2.12)

buffer management (Sec. 17.2.2.1)

Click letter for quick access:
[Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

C

C2 features
        audit (Sec. 1.1.3)
        login control (Sec. 1.1.1)
        password control (Sec. 1.1.2)

CDE
        authorizing host access (Sec. 4.2)
        secure keyboard (Sec. 4.4)
        security (Sec. 4.0)

CDE session
        pausing current (Sec. 4.5)
        screen lock (Sec. 4.5)

centralized account management (Sec. 9.5)

changing a password (Sec. 2.2)

changing permissions (Sec. 5.1)

character-mode terminal (Sec. 2.0)

chgrp
        command (Sec. 5.1)

child process
        inherited file access (Sec. 16.6)
        signal mask and (Sec. 16.5)

chmod command (Sec. 5.1)
chmod command (Sec. 5.1)
        octal example of (Sec. 3.1.6)

chown system call
        SUID or SGID permissions (Sec. 16.1)

close-on-exec flag (Sec. 16.6)

cluster
        overview (Sec. 6.6)

clusters
        auditing (Sec. G.4)
        authetication (Sec. G.3)
        distributed logins (Sec. G.2.4)
        NIS (Sec. G.2.4)
        restrictions (Sec. G.5)
        terminal logging (Sec. G.5.2)
        upgrades (Sec. G.5.1)

commands
        chgrp (Sec. 5.1)
        chmod (Sec. 5.1)

compatibility with ULTRIX auditing (Sec. C.3)

configuration
        encryption (Sec. 7.5.4.12)
        failed login records (Sec. 7.5.4.9)
        log in records (Sec. 7.5.4.7)
        maximum log in attempts (Sec. 7.5.4.4)
        password aging (Sec. 7.5.4.1)
        password change time (Sec. 7.5.4.2)
        password-changing controls (Sec. 7.5.4.3)
        profile migration (Sec. 7.5.4.10)
        succesful login records (Sec. 7.5.4.8)
        terminal breakin (Sec. 7.5.4.5)
        time between log in attempts (Sec. 7.5.4.5)
        time between log ins (Sec. 7.5.4.6)
        vouching (Sec. 7.5.4.11)

configuring
        ACLs (Sec. 7.5.2)
        audit (Sec. 10.2)
        audit (Sec. 10.3)
        audit (Sec. 10.4.1)
        audit (Sec. 7.5.1)
        enhanced passwords (Sec. 7.5.3)
        security features (Sec. 7.5)

configuring enhanced security (Sec. 6.4.1)

connecting to other systems (Sec. 3.0)

console file (Sec. 14.2.8)

console messages
        audit (Sec. 10.1.1)

content of audit records (Sec. 10.8)

control flag
        audit control flag (Sec. 10.6.1.1)

convauth command (Sec. 7.1.2)

core files (Sec. 16.5)

crash recovery
        audit data (Sec. 10.10)

create_file_securely() library routine (Sec. 17.4)

creating accounts (Sec. 7.6)
creating accounts (Sec. 9.1)

creating groups (Sec. 7.6)
creating groups (Sec. 9.2.1)

crypt() support (Sec. 7.5.4.12)

cu command (Sec. 3.3.2)
        example of (Sec. 3.3.2)

Click letter for quick access:
[Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

D

DAC
        protecting the TCB (Sec. 15.5)

daemon programs (Sec. 18.3)

data
        storing in a secure location (Sec. 16.3)

data files (Sec. 15.4)

data loss (Sec. 14.0)

database update (Sec. 17.2.2.5)

databases (Sec. 6.3.5)
        accessing (Sec. 17.1)
        enhanced password (Sec. 14.2.1)
        entries (Sec. 17.2)
        file control (Sec. 12.3)
        groups (Sec. 14.2.6)
        system defaults (Sec. 17.2)
        terminal control (Sec. 17.2.1)
        update (Sec. 17.2.2)

databases fields (Sec. 17.2)

dcp command (Sec. 3.4)

DECnet protocol (Sec. 3.0)
DECnet protocol (Sec. 3.4)
        dcp command (Sec. 3.4)
        dlogin command (Sec. 3.4)
        dls command (Sec. 3.4)
        generic guest accounts (Sec. 3.4)

default ACL (Sec. 21.6)

defaults database (Sec. 6.5.2.2)

defaults for devices (Sec. 8.1)

deleting layered security products (Sec. 13.6)

deleting user accounts (Sec. 9.2.4)

denial of service (Sec. 6.2)

dependencies among audit events (Sec. 10.5.3)

deselection files for audit reports (Sec. 10.9.1)

/dev/console file (Sec. 14.2.8)

/dev/pts/* file (Sec. 14.2.9)

/dev/tty* file (Sec. 14.2.9)

device
        assignment (Sec. 6.5.1.1)
        assignment (Sec. 7.7.3)
        assignment (Sec. 8.1)
        defaults (Sec. 8.1)
        installation (Sec. 8.1)

device assignment database (Sec. 12.1)
device assignment database (Sec. 17.3)
device assignment database (Sec. 6.5.2.5)
device assignment database (Sec. 8.2)

devices (Sec. 8.1)

differences between file and directory permissions (Sec. 5.1)

directories
        permissions (Sec. 5.1)

disabled accounts (Sec. 9.2.2)

display access (Sec. 4.1)

distributed logins in a cluster (Sec. G.2.4)

dlogin command (Sec. 3.4)

dls command (Sec. 3.4)

DOP (Sec. H.0)

dtterm window
        protecting (Sec. 4.4)

dxaccounts program (Sec. 6.4)
dxaccounts program (Sec. 6.4)

dxaudit program (Sec. 6.4)
dxaudit program (Sec. 6.4)

dxdevices program (Sec. 6.4)
dxdevices program (Sec. 6.4)

Click letter for quick access:
[Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

E

EACCES errno value (Sec. 16.2)

effective group ID (Sec. 2.1.1)

effective user ID (Sec. 2.1.1)

EGID
        See effective group ID

encrypted password (Sec. 14.2.1)
encrypted password (Sec. 17.6)

encryption configuration (Sec. 7.5.4.12)

enhanced password database (Sec. 12.1)
enhanced password database (Sec. 14.2.1)
enhanced password database (Sec. 17.6)
enhanced password database (Sec. 18.0)
enhanced password database (Sec. 18.4)
enhanced password database (Sec. 6.5.2.1)

enhanced passwords (Sec. 7.5.3)
enhanced passwords (Sec. 9.5.4)

enhanced profile configuration (Sec. 7.5.4)

enhanced security

entry points (Sec. E.1)

EPERM errno value (Sec. 16.2)

EROFS errno value (Sec. 16.2)

errno variable (Sec. 16.2)

/etc/auth/system/default file (Sec. 14.2.3)

/etc/auth/system/devassign file (Sec. 14.2.4)

/etc/auth/system/ttys file (Sec. 17.7)

/etc/auth/system/ttys.db file (Sec. 14.2.2)

/etc/group file (Sec. 14.2.6)

/etc/hosts.equiv file
        interaction with .rhosts file (Sec. 3.1.3)
        security concerns (Sec. 3.1.2)

/etc/passwd file (Sec. 12.2)
/etc/passwd file (Sec. 14.2.5)
/etc/passwd file (Sec. 17.6)
/etc/passwd file (Sec. 18.4)

/etc/sec/auditd_clients file (Sec. 10.7)

/etc/sec/audit_events file (Sec. B.1)

/etc/sec/event_aliases (Sec. 10.6.1.2)

/etc/sec/event_aliases file (Sec. B.2)

/etc/sec/site_events file (Sec. 10.5.2)
/etc/sec/site_events file (Sec. 19.8)

/etc/sysconfigtab
        setting audit-site-events (Sec. 19.8)

EUID
        See effective user ID

evasion time configuration (Sec. 7.5.4.5)

event
        audit (Sec. 19.2)

event aliases (Sec. B.2)

events
        aliases for audit events (Sec. 10.6.1.2)
        managing audit events (Sec. 10.6)
        site-defined audit events (Sec. 10.5.2)
        trusted audit events (Sec. 10.5.1)

events to audit (Sec. B.1)

example
        ACL creation (Sec. 21.5)
        ACL inheritance (Sec. 21.6)
        ACL permission removal (Sec. 21.6)
        application-specific audit record (Sec. 19.7)
        audgenl() (Sec. 19.1)
        audit tuple parsing macros (Sec. 19.10.4)
        audit: iovec-type record (Sec. 19.3.1)
        auditmask (Sec. 19.6)
        site-defined audit event (Sec. 19.8.2)

execute permission (Sec. 5.1)

execve system call (Sec. 16.5)

extended passwords
        See enhanced passwords

external representation
        ACL (Sec. 21.2.2)

Click letter for quick access:
[Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

F

fcntl system call
        close-on-exec flag (Sec. 16.6)

features (Sec. 1.1)
features (Sec. 6.3.1)

file
        protecting (Sec. 16.3)
        required (Sec. 14.2)

file attributes (Sec. 14.3)

file control database (Sec. 12.3)
        description (Sec. 17.4)
        description (Sec. 6.5.2.4)
        location (Sec. 12.1)

file descriptors (Sec. 16.6)

file permissions
        remote sessions (Sec. 3.1.6)

file summary (Sec. A.0)

file systems (Sec. 6.5.1.2)

files
        protecting (Sec. 5.1)

filtering audit data (Sec. 10.9.1)

fork system call (Sec. 16.5)
fork system call (Sec. 18.1)

ftp command (Sec. 3.1.4)
        description of (Sec. 3.1.4)
        security risks of anonymous ftp (Sec. 3.1.4)
        use of .netrc file with (Sec. 3.1.4)

FTP protocol (Sec. 3.0)

fverfy command (Sec. 14.3)

Click letter for quick access:
[Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

G

generating audit reports (Sec. 10.4.3)
generating audit reports (Sec. 10.9)

getacl command (Sec. 5.4)

getluid system call (Sec. 18.1)

getty command (Sec. 2.6.2)

GID
        See group ID

graphic interface
        for audit subsystem (Sec. 10.1.2.2)

group database (Sec. 14.2.6)

group ID
        effective (EGID) (Sec. 2.1.1)
        real (RGID) (Sec. 2.1.1)

groups
        creating (Sec. 7.6)
        creating (Sec. 9.2.1)
        database file (Sec. 14.2.6)
        supplementary (Sec. 2.1.1)

Click letter for quick access:
[Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

H

hardware privilege (Sec. 6.2)

header files (Sec. 15.1)

Click letter for quick access:
[Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

I

I and A (Sec. 1.2)
I and A (Sec. 18.0)
I and A (Sec. 6.3.2)

identification (Sec. 18.0)

identification and authentication
        See I and A

Information Systems Security Officer
        ISSO (Sec. 6.5.1.1)

installation (Sec. 7.1)

installing enhanced security (Sec. 6.4.1)

installing layered security products (Sec. 13.4)

integrating security mechanisms (Sec. 20.11)

integrity (Sec. 12.0)
integrity (Sec. 6.2)
integrity (Sec. 6.2)
integrity (Sec. 6.5.1.1)
integrity (Sec. 6.5.2.4)

integrity features (Sec. 6.3.4)

interoperating with ULTRIX auditing (Sec. C.3)

interprocess communication
        security consideration (Sec. 16.3)

introduction for administrators (Sec. 6.0)

introduction for users (Sec. 1.0)

iovec
        audit record using (Sec. 19.3.1)

ISSO (Sec. 6.5.1.1)
        tasks (Sec. 7.7)

Click letter for quick access:
[Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

K

keyboard
        securing (Sec. 16.7.1)
        securing in CDE environment (Sec. 4.4)

keyboard input (Sec. 4.4)

Click letter for quick access:
[Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

L

LAT protocol (Sec. 3.0)
        description of (Sec. 3.2)
        LAT groups (Sec. 3.2)

libaud library (Sec. 15.1)

libraries
        as part of the TCB (Sec. 15.4)
        security relevent (Sec. 15.1)

library routines (Sec. 15.3)

library routines for ACLs (Sec. 21.3)

libsecurity library (Sec. 15.1)

Local Area Transport (LAT) (Sec. 3.2)

Local Area Transport
        See LAT protocol

lock file (Sec. 14.1)

locked accounts (Sec. 9.2.2)

log files (Sec. 10.1.1)
log files (Sec. 10.14)
        designating (Sec. 10.4.1)

log in
        maximum tries configuration (Sec. 7.5.4.4)

log in records configuration (Sec. 7.5.4.7)

logging in (Sec. 2.1)
        to remote systems with rlogin (Sec. 3.1.1)

logging tools (Sec. 10.14)

login (Sec. 2.1)
        audit mask (Sec. 10.6.1.1)
        audit mask, setting (Sec. 10.6.1.1)
        enhancements (Sec. 1.1.1)
        invalidating terminal file descriptors (Sec. 2.6.2)
        login ID (LUID) (Sec. 10.8)
        problems (Sec. 2.6.6)
        setting password during (Sec. 2.2)
        shell (Sec. 2.1.1)
        trusted event (Sec. 10.5.1)
        user ID (AUID) (Sec. 2.1.1)

login command (Sec. 2.6.2)

login records configuration (Sec. 7.5.4.8)
login records configuration (Sec. 7.5.4.9)

login timouts (Sec. 8.2)

login tips (Sec. 2.5)

login user ID (Sec. 2.3)

logout tips (Sec. 2.5)

logout trusted event (Sec. 10.5.1)

LUID (login ID) (Sec. 10.8)

Click letter for quick access:
[Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

M

macro
        audit tuple parsing (Sec. 19.10.4)

maintaining accounts (Sec. 9.1)

matrix.conf file (Sec. 13.3)
matrix.conf file (Sec. 20.16)

mechanism-dependent interface (Sec. 20.17)

migration issues
        audcntl routine (Sec. C.1.2)
        audgen system call (Sec. C.1.1)
        authaudit routines (Sec. C.1.3)
        BIND/Hesiod authentication files (Sec. C.2)
        MLS+ (Sec. C.1.3)
        NIS (Sec. 9.5.4)
        password databases (Sec. C.1.5)
        secauthmigrate script (Sec. C.2)
        secure attention key (SAK) (Sec. C.1.7)
        trusted path (Sec. C.1.6)
        ULTRIX (Sec. C.0)
        ULTRIX authentication files (Sec. C.2)

MIN_SITE_EVENT (Sec. 19.8)

modem
        with tip and cu commands (Sec. 3.3.2)
        with UUCP utility (Sec. 3.3)

modifying database entries (Sec. 17.2.2.5)

modifying the account template (Sec. 9.2.5)

modifying user accounts (Sec. 9.1)

mouse
        securing (Sec. 16.7.2)

Click letter for quick access:
[Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

N

naming routines (Sec. E.2)

need-to-know access (Sec. 6.2)

.netrc (Sec. 3.1.4)

network
        audit hub (Sec. 10.7)
        auditing across a network (Sec. 10.7)

network protocols (Sec. 3.0)

network security concerns (Sec. 4.2)
        .rhosts file (Sec. 3.1.3)
        anonymous ftp (Sec. 3.1.4)
        DECnet generic guest accounts (Sec. 3.4)
        /etc/hosts.equiv file (Sec. 3.1.2)
        file permissions (Sec. 3.1.6)
        tip and cu commands (Sec. 3.3.2)
        UUCP commands (Sec. 3.3)
        workstation display access (Sec. 4.2)

NIS
        account management (Sec. 9.5)
        automated procedures (Sec. 9.5.1.2)
        backing out (Sec. 9.5.5)
        client setup (Sec. 9.5.3)
        large databases (Sec. 9.5.1.2)
        master server setup (Sec. 9.5.1)
        migration (Sec. 9.5.4)
        overrides (Sec. 9.1.2.1)
        overrides (Sec. 9.1.2.2)
        slave server setup (Sec. 9.5.2)
        user account database (Sec. 9.1.2.1)

null password (Sec. 18.4)

Click letter for quick access:
[Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

O

object code (Sec. 15.4)

open file descriptor (Sec. 16.6)

operational features (Sec. 6.2)

operator responsibilities (Sec. 6.5.1.3)

overflow handling
        audit (Sec. 10.4.1)

Click letter for quick access:
[Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

P

passwd file (Sec. 14.2.5)

password (Sec. 18.6)
        aging (Sec. 2.2.3)
        aging configuration (Sec. 7.5.4.1)
        change time configuration (Sec. 7.5.4.2)
        choosing (Sec. 2.2)
        coding example (Sec. D.0)
        configuration (Sec. 7.5.4)
        controls configuration (Sec. 7.5.4.3)
        database (Sec. 14.2.5)
        enhanced (Sec. 7.5.3)
        enhanced database (Sec. 6.5.2.1)
        enhancements (Sec. 1.1.2)
        expiration (Sec. 2.1)
        expiration of (Sec. 2.2.3)
        expiration time (Sec. 2.6.1)
        maximum tries configuration (Sec. 7.5.4.4)
        new accounts (Sec. 9.2.2)
        random character (Sec. 2.2.1)
        random letter (Sec. 2.2.1)
        random pronounceable (Sec. 2.2.1)
        setting and changing (Sec. 2.2)
        system-generated (Sec. 2.2.2)
        threats (Sec. 3.1.2)
        tips (Sec. 2.4)

password databases (Sec. C.1.5)

passwords (Sec. 18.0)
passwords (Sec. 2.2)

PATH variable
        defining (Sec. 16.4)
        null entry in (Sec. 16.4)
        secure shell scripts (Sec. 16.8)

pathname
        absolute (Sec. 16.4)
        relative (Sec. 16.4)

pausing CDE sessions (Sec. 4.5)

permanent file (Sec. 16.3)

permissions
        changing (Sec. 5.1)
        directory (Sec. 5.1)

physical device (Sec. 6.5.2.5)

physical security
        in CDE environment (Sec. 4.6)

preselection of audit events (Sec. 10.4.2)
preselection of audit events (Sec. 10.6)

private audit tokens (Sec. 19.3.2)

privileges (Sec. H.0)

process
        audit control flag (Sec. 19.4)

process audit mask (Sec. 10.6.1.1)

process priority (Sec. 17.6)

profile migration configuration (Sec. 7.5.4.10)

programming in the trusted environment (Sec. 15.0)

protected passwords
        See enhanced passwords

protected subsystem pseudogroup (Sec. 17.2.2)

protected subsystems (Sec. 6.5.2)

protecting files (Sec. 5.1)
        access control list (ACL) (Sec. 2.6.5)

protecting removable media (Sec. 4.6)

prpasswd file (Sec. 9.5.4)

pseudo tty (Sec. 14.2.9)

pts/* file (Sec. 14.2.9)

Click letter for quick access:
[Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

R

rcp command (Sec. 3.1.1)

rc[023] files (Sec. 14.2.7)

read permission (Sec. 5.1)

read-only file systems (Sec. 15.5)

recovering
        audit data (Sec. 10.10)

recovering ACLs (Sec. 11.4)

reducing audit data (Sec. 10.4.3)
reducing audit data (Sec. 10.9)

relative pathname (Sec. 16.4)

remote auditing (Sec. 10.7)

remote commands (Sec. 3.1.1)

remote file transfer
        with UUCP utility (Sec. 3.3)

remote login
        suggestions for tip and cu commands (Sec. 3.3.2)
        using dlogin command (Sec. 3.4)
        using rlogin command (Sec. 3.1.1)
        using tip and cu commands (Sec. 3.3.2)

remote systems
        in .rhosts file (Sec. 3.1.3)
        in /etc/hosts.equiv file (Sec. 3.1.2)

reports
        audit reports (Sec. 10.4.3)
        audit reports (Sec. 10.9)

required files (Sec. 14.2)

responding to audit reports (Sec. 10.12)

responsibilities
        ISSO (Sec. 6.5.1.1)
        operator (Sec. 6.5.1.3)
        system administrator (Sec. 6.5.1.2)
        user (Sec. 1.3)

retiring user accounts (Sec. 9.2.3)

.rhosts file
        interaction with /etc/hosts.equiv file (Sec. 3.1.3)
        security concerns (Sec. 3.1.3)

rlogin command (Sec. 3.1.1)

role responsibilities (Sec. 6.0)
        ISSO (Sec. 6.5.1.1)
        operator (Sec. 6.5.1.3)
        system administration (Sec. 6.5.1)
        system administrator (Sec. 6.5.1.2)

root authentication profile (Sec. 14.2.1)

root user (Sec. 2.3)

rsh command (Sec. 3.1.1)

Click letter for quick access:
[Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

S

/sbin/rc[023] files (Sec. 14.2.7)

screen lock in CDE sessions (Sec. 4.5)

secauthmigrate script (Sec. C.2)

secconfig command (Sec. 7.4)

secure attention key (SAK) (Sec. C.1.7)

secure devices (Sec. 8.1)

secure keyboard (Sec. 4.4)

Secure Keyboard menu item (Sec. 16.7.1)

security
        authentication programming concerns (Sec. 18.0)

security breach
        possible program responses to (Sec. 16.2)

Security Integration Architecture
        See SIA

Security Integration Architecture (SIA) (Sec. 13.0)
Security Integration Architecture (SIA) (Sec. 20.0)

security policy (Sec. 6.2)
security policy (Sec. F.2)

security requirements (Sec. 8.1)

security sensitive commands (Sec. 20.1)

segment sharing (Sec. 7.2)

segments (Sec. 16.3)

selecting audit events (Sec. 10.4.2)

semaphores (Sec. 16.3)

set group ID on execution
        See SGID

set user ID on execution
        See SUID

setluid system call (Sec. 18.1)

setting
        file permissions (Sec. 5.1)

setting up a trusted system (Sec. 7.0)

setting up enhanced security (Sec. 7.5)

set_auth_parameters() library routine (Sec. 18.2)

SGID
        set group ID on execution (Sec. 2.6.4)
        set group ID programs (Sec. 16.1)

shadowed passwords
        See enhanced passwords

shared libraries (Sec. 7.2)

shell
        defining variables (Sec. 16.4)
        path variable syntax (Sec. 16.4)
        rsh command invokes remote (Sec. 3.1.1)

shell process (Sec. 2.3)

shell script (Sec. 15.4)
        security consideration (Sec. 16.8)

shell variable
        specific shell variables (Sec. 16.4)

SIA
        accessing secure information (Sec. 20.14)
        administering (Sec. 13.0)
        audit logging (Sec. 20.10)
        callbacks (Sec. 20.7)
        changing a user shell (Sec. 20.13.3)
        changing finger information (Sec. 20.13.2)
        changing secure information (Sec. 20.13)
        coding example (Sec. D.0)
        debugging (Sec. 20.10)
        deleting layered security product (Sec. 13.6)
        group info, accessing (Sec. 20.14.2)
        header files (Sec. 20.5)
        initialization (Sec. 20.3)
        installing layered security product (Sec. 13.4)
        installing layered security product (Sec. 13.5)
        integrating mechanisms (Sec. 20.11)
        interface routines (Sec. 20.1)
        layering (Sec. 20.2)
        login process (Sec. 20.12.6.1)
        logs (Sec. 20.10)
        maintaining state (Sec. 20.8)
        matrix.conf file (Sec. 13.3)
        matrix.conf file (Sec. 20.16)
        mechanism-dependent interface (Sec. 20.17)
        packaging layered products (Sec. 20.16)
        parameter collection (Sec. 20.15)
        parameter collection (Sec. 20.7)
        password, accessing (Sec. 20.14.1)
        passwords, changing (Sec. 20.13.1)
        programming (Sec. 20.0)
        return values (Sec. 20.12)
        return values (Sec. 20.9)
        rlogind process (Sec. 20.12.6.3)
        rshd process (Sec. 20.12.6.2)
        security sensitive commands (Sec. 20.1)
        session authentication (Sec. 20.12.2)
        session establishment (Sec. 20.12.3)
        session initialization (Sec. 20.12.1)
        session launch (Sec. 20.12.4)
        session processing (Sec. 20.12)
        session release (Sec. 20.12.5)
        SIAENTITY structure (Sec. 20.6)
        siainit command (Sec. 20.3)
        sialog file (Sec. 20.10)
        vouching (Sec. 20.11)

signal
        secure response to (Sec. 16.5)

signal routine (Sec. 16.5)

SIGQUIT signal
        security consideration (Sec. 16.5)

SIGTRAP signal
        security consideration (Sec. 16.5)

single-user mode (Sec. 14.2.1)

site-defined audit events (Sec. 10.5.2)
site-defined audit events (Sec. 19.8)

site_events file (Sec. 19.8)

standalone system
        ACLs (Sec. 11.5)

starting the audit subsystem (Sec. 10.2)
starting the audit subsystem (Sec. 10.3)

startup script (Sec. 18.1)

state-dependent audit events (Sec. 10.5.3)

sticky bit (Sec. 15.5)
        setting (Sec. 2.6.3)
        using to secure temporary files (Sec. 16.3)
        UUCP directory (Sec. 3.3.1)

sticky directory (Sec. 2.6.3)

strong symbols (Sec. E.2)

su command (Sec. 2.3)

subset installation (Sec. 7.1)

SUID
        set user ID on execution (Sec. 2.6.4)
        set user ID programs (Sec. 16.1)

superuser authority (Sec. 5.1)

supplementary groups (Sec. 2.1.1)

symbol preemption (Sec. E.1)

system administrator
        See also role responsibilities
        remote file transfer concerns (Sec. 3.1.4)
        tasks (Sec. 7.6)

system audit mask (Sec. 10.6.1.1)

system call
        common return value (Sec. 16.2)
        security consideration for a failed call (Sec. 16.2)

system console (Sec. 14.2.2)
system console (Sec. 14.2.8)

system defaults database
        description (Sec. 17.5)
        description (Sec. 6.5.2.2)
        undefined fields (Sec. 17.2)
        updating (Sec. 8.2)

system startup (Sec. 14.0)

Click letter for quick access:
[Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

T

TCB (Sec. 15.4)
TCB (Sec. 6.2)
        defining a trusted system (Sec. 6.2)
        executable file (Sec. 15.4)
        hardware privilege (Sec. 6.2)
        indirect programs (Sec. 15.4)
        kernel (Sec. 6.2)
        security configuration (Sec. 15.1)
        trusted program (Sec. 15.4)
        trusted system directories (Sec. 15.2)

/tcb/files/auth/r/root file (Sec. 14.2.1)

TCP/IP protocol (Sec. 3.0)

templates for user accounts (Sec. 9.1.1.3)

temporary files (Sec. 16.3)
temporary files (Sec. 17.4)

terminal authorization list (Sec. 2.1.2)

terminal breakin configuration (Sec. 7.5.4.5)

terminal character-mode (Sec. 2.0)

terminal control database (Sec. 12.1)
terminal control database (Sec. 17.2.1)
terminal control database (Sec. 17.7)
terminal control database (Sec. 6.5.2.3)
terminal control database (Sec. 8.2)

terminal devices, assigning (Sec. 7.7.3)
terminal devices, assigning (Sec. 8.1)

terminal file descriptors
        invalidating (Sec. 2.6.2)

terminal logging (Sec. G.5.2)

terminal session
        security suggestions (Sec. 3.3.2)

tftp command (Sec. 3.1.5)
        description of (Sec. 3.1.5)

TFTP protocol (Sec. 3.0)

time delay (Sec. 17.7)

tip command (Sec. 3.3.2)

tmp file
        security consideration (Sec. 16.4)

token
        audit fixed-length (Sec. 19.3.1)
        audit iovec-type (Sec. 19.3.1)
        audit pointer-type (Sec. 19.3.1)
        audit private (Sec. 19.3.2)
        audit public (Sec. 19.3.1)

tools for auditing (Sec. 10.1.2)

tracing system calls (Sec. 10.13)

traditional file protection mechanism
        group (Sec. 5.5)
        owner (Sec. 5.5)
        permission bits (Sec. 5.5)

traditional logging (Sec. 10.14)

traditional security (Sec. 1.1)

trojan horse program (Sec. 3.3.2)

troubleshooting (Sec. 14.0)

trusted computing base
        See also TCB
trusted computing base (Sec. 6.0)

trusted events (Sec. 10.5.1)

trusted path (Sec. C.1.6)

trusted program (Sec. 15.4)

trusted programming techniques (Sec. 16.0)

trusted Tru64 UNIX

tty* file (Sec. 14.2.9)

tuple
        common to audit logs (Sec. 19.10.1)
        detailed description (Sec. 19.10.3)
        parsing audit (Sec. 19.10.4)

Click letter for quick access:
[Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

U

ULTRIX audit compatibility (Sec. C.3)

ULTRIX authentication files (Sec. C.2)
ULTRIX authentication files (Sec. C.2)

ULTRIX interoperability issues (Sec. C.3)

ULTRIX migration issues (Sec. C.0)

umask
        ACL (Sec. 21.4.1)

umask system call
        using to secure temporary files (Sec. 16.3)

undefined field (Sec. 17.2)

UNIX-to-UNIX Copy Program
        See UUCP

unlink system call
        protecting file access (Sec. 16.3)

update installation (Sec. 7.1.2)

user audit mask (Sec. 10.6.1.1)
        setting (Sec. 10.6.1.1)

user ID (Sec. 2.1.1)
        effective (EUID) (Sec. 2.1.1)
        real (RUID) (Sec. 2.1.1)

user input
        security consideration (Sec. 16.7.1)

users, introduction (Sec. 1.0)

/usr/spool/uucppublic (Sec. 3.3.1)

/usr/tmp file
        tmp file (Sec. 16.4)

uucp command (Sec. 3.3.1)

UUCP utility (Sec. 3.3)

uux command (Sec. 3.3.3)

Click letter for quick access:
[Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

V

vouching (Sec. 20.11)

vouching configuration (Sec. 7.5.4.11)

Click letter for quick access:
[Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

W

weak symbols (Sec. E.2)

windowing environment (Sec. 4.0)

working storage
        ACL (Sec. 21.2.1)

workstation
        See also CDE
        physical security (Sec. 4.6)
        protecting removable media (Sec. 4.6)

workstation environment (Sec. 4.0)

workstation physical security (Sec. 4.6)

write permission (Sec. 5.1)

writing database entries (Sec. 17.2.2.5)

Click letter for quick access:
[Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

X

X displays (Sec. 8.2)

X environment
        use of in a secure environment (Sec. 16.7.1)
        writing secure programs in (Sec. 16.7)

X window
        See also X environment

XGrabKeyboard() routine (Sec. 16.7.1)

XReparentWindow() routine
        using in a secure environment (Sec. 16.7.3)

XSendEvent() routine (Sec. 16.7.2)