Click letter for quick access:
[Special Characters]
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
.rhosts file
interaction with /etc/hosts.equiv file
security concerns
suggested permissions on
.Xdefaults file
block input with allowSendEvents
/etc/auth/system/devassign file
/etc/auth/system/gr_id_map file
/etc/auth/system/pw_id_map file
/etc/hosts.equiv file
interaction with .rhosts file
security concerns
/etc/passwd file
/etc/passwd file
/etc/passwd file
/etc/passwd file
/etc/sec/auditd_clients file
/etc/sec/auditd_clients file
/etc/sec/audit_events file for
/usr/tmp file
tmp file
Click letter for quick access:
[Special Characters]
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
access control list
See ACL
accounts
adding
anonymous ftp
creating
creating
disabled
locked
maintaining
modifying
new
passwords
retiring
ACL
ACL
ACL
administering
administration
base entry
configuring
data package structure
data package
decision process
default
default
description
disabling
discretionary access control (DAC)
emacs editor
enabling
entry rules
execute access definition
exported data
external representation
format
getacl command
getacl command
header for data package structure
imported data
inheritance
inheritance
initialization
installation
installing
kernel status
library routines
ls command
maintaining
object creation rule
object creation
overview
overview
owner access definition
permission bits
propagation
protecting objects
recovery
replication rule
search access definition
setacl command
setacl command
setting example
setting
standalone system
status
storage
umask
using
verifying status
viewing
working storage data structure
working storage
write access definition
administrative roles
See role responsibilities
aliases for auditable events
aliases for auditable events
allowSendEvents resource
allowSendEvents resource
ANSI C
symbol preemption
applications
adding to the file control database
audit records
disabling auditing in
generating audit records in
modifying process audit attributes of
assigning terminal devices
assigning terminal devices
attributes, file
See file attributes
audgen command
described
using to create log entries
audit events
default events
dependencies
state-dependent
audit ID (AUID)
audit ID (AUID)
audit ID (AUID)
audit log
default
failure
overflow
remote
audit subsystem
/etc/sec/auditd_clients file
accounting tools
activating
active processes
administration tools
anonymous ftp
application records
audit hub
auditing remotely
audit_setup script
audit_tool command
choosing events
configuring
continuous reporting of
creating log entries for
data recovery
default auditable events
default event aliases
default event auditing
dependencies among audit events
deselection files
deselection files
deselection
disabling
dxaudit
enabling
events to audit
example report
fallback location
files used for
filtering data
fixed-length tokens
generating reports
implementation notes
log file location
log files
log overflow
logging tools
negative process IDs
new log
object selection/deselection
overview
pointer-type tokens
preselection
processing audit information
reading audit reports
reducing audit information
report location
reports by AUID
reports by dxaudit
reports by events
reports by process IDs
reports by time range
reports by trusted events
reports
reports, abbreviated
selecting audit records
selecting events
selection files
selection
setting up
setup
site event mask
site-defined events
status display
suggested audit events
system audit mask
tokens
tracing system calls
trusted application audit data
trusted application responsibility
trusted events
turning off
ULTRIX compatibility
user audit mask
using audgen
using audit_tool interactively
auditi subsystem
reports by process IDs
audit_daemon_exit trusted event
audit_log_change trusted event
audit_log_create trusted event
audit_log_overwrite trusted event
audit_setup trusted event
audit_setup trusted event
audit_tool command
audit_tool command
audit_tool.ultrix command
audit_tool.ultrix command
AUID
See audit ID
authentication configuration
encryption
log in records
maximum log in attempts
password aging
password change time
password-changing controls
profile migration
terminal break-in
time between log in attempts
time between log ins
vouching
authentication database
authentication database
authentication database
authentication database
conversion
authentication profile
authentication profile
authentication profile
authentication profile
authentication profile
authentication profile
authentication profile
authorization list
See terminal authorization list
Click letter for quick access:
[Special Characters]
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
backup procedures
backup procedures
Click letter for quick access:
[Special Characters]
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
C2 features
audit
login control
password control
centralized account management
child process
inherited file access
signal mask and
chmod command
octal example of
chown system call
SUID or SGID permissions
compatibility with ULTRIX auditing
configuration
encryption
log in records
maximum log in attempts
password aging
password change time
password-changing controls
profile migration
terminal break-in
time between log in attempts
time between log ins
vouching
configuring
ACLs
audit
extended passwords
security features
create_file_securely() library routine
creating accounts
creating accounts
creating groups
creating groups
Click letter for quick access:
[Special Characters]
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
DAC
inheritance attribute
overview
protecting the TCB
data package ACL representation example
data package
ACL
data structure
opaque
data
storing in a secure location
databases
entries
databases
accessing
file control
file control
groups
protected password
system defaults
terminal control
update
DECnet protocol
dcp command
dlogin command
dls command
generic guest accounts
DECterm window
See also DECwindows environment
if application not using
protecting
DECwindows ACLs
DECwindows ACLs
contention between system and local
saving changes to
system list in /etc/X*.hosts
DECwindows environment
use of in a secure environment
writing secure programs in
DECwindows secure keyboard
example of
DECwindows session
pausing current
DECwindows
authorizing host access
blocking keyboard and mouse information
controlling application access to
secure keyboard
deleting layered security products
dependencies among audit events
deselection files
deselection files
device assignment database
device assignment database
device assignment database
device assignment database
device
assignment
assignment
assignment
defaults
installation
discretionary access control
See DAC
dxaccounts program
dxaccounts program
dxaudit program
dxaudit program
Click letter for quick access:
[Special Characters]
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
EGID
See effective group ID
encrypted password
encrypted password
EUID
See effective user ID
events to audit
events to audit
execute access
ACL definition
exported data
ACLs
extended profile configuration
external representation
ACL
Click letter for quick access:
[Special Characters]
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
fcntl system call
close-on-exec flag
file control database
description
description
location
reading and writing
file permissions
remote sessions
restrict access to .Xdefaults file
file
deselection files
deselection for audit
protecting with ACLs
protecting
required
selection for audit
fork system call
fork system call
ftp command
description of
security risks of anonymous ftp
use of .netrc file with
Click letter for quick access:
[Special Characters]
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
GID
See group ID
group ID
effective (EGID)
map file
real (RGID)
groups
creating
creating
database file
supplementary
Click letter for quick access:
[Special Characters]
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Click letter for quick access:
[Special Characters]
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
identification and authentication
See I and A
imported data
ACLs
Information Systems Security Officer
ISSO
inheritance
ACL
installing layered security products
integrating security mechanisms
integrity
integrity
integrity
integrity
integrity
interoperating with ULTRIX auditing
interprocess communication
security consideration
Click letter for quick access:
[Special Characters]
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
keyboard
securing in DECwindows environment
securing
Click letter for quick access:
[Special Characters]
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
LAT protocol
description of
LAT groups
libraries
as part of the TCB
security relevent
libsecurity library
libsecurity library
Local Area Transport
See LAT protocol
log files
audit
audit
creating entries in
log in
maximum tries configuration
logging in
to remote systems with rlogin
login
enhancements
invalidating terminal file descriptors
problems
setting password during
shell
user ID (AUID)
Click letter for quick access:
[Special Characters]
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
mask
system audit mask
user audit mask
matrix.conf file
matrix.conf file
migration issues
audcntl routine
audgen system call
authaudit routines
BIND/Hesiod authentication files
MLS+
NIS
password databases
secauthmigrate script
secure attention key (SAK)
trusted path
ULTRIX authentication files
ULTRIX
modem
with tip and cu commands
with UUCP utility
modifying the account template
mouse
securing
Click letter for quick access:
[Special Characters]
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
network security concerns
.rhosts file
/etc/hosts.equiv file
anonymous ftp
DECnet generic guest accounts
file permissions
tip and cu commands
UUCP commands
workstation display access
network
audit hub
auditing across a network
NIS
account management
automated procedures
backing out
client setup
databases
large databases
master server setup
migration
overrides
overrides
password database
slave server setup
user account database
Click letter for quick access:
[Special Characters]
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
opaque data structure
ACL
owner access
ACL definition
Click letter for quick access:
[Special Characters]
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
password protection
DECwindows secure keyboard mode
password
aging configuration
aging
change time configuration
choosing
coding example
configuration
controls configuration
database
enhancements
expiration of
expiration time
expiration
extended
ID map file
maximum tries configuration
new accounts
protected database
random character
random letter
random pronounceable
setting and changing
system-generated
threats
tips
PATH variable
defining
null entry in
secure shell scripts
permission bits
ACL
physical security
in DECwindows environment
profile migration configuration
protected password database
protected password database
protected password database
protected password database
protected password database
protected password database
protected subsystem pseudogroup
Click letter for quick access:
[Special Characters]
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
read access
ACL definition
ACL definition
remote file transfer
with UUCP utility
remote login
suggestions for tip and cu commands
using dlogin command
using rlogin command
using tip and cu commands
remote systems
in .rhosts file
in /etc/hosts.equiv file
reports
See audit subsystem
audit
responsibilities
ISSO
operator
system administrator
user
role responsibilities
ISSO
operator
system administration
system administrator
Click letter for quick access:
[Special Characters]
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
search access
ACL definition
security administrator
DECwindows ACLs
security breach
possible program responses to
Security Integration Architecture (SIA)
Security Integration Architecture (SIA)
Security Integration Architecture
See SIA
set group ID on execution
See SGID
set user ID on execution
See SUID
set_auth_parameters() library routine
SGID
set group ID on execution
set group ID programs
shadowed passwords
shadowed passwords
shadowed passwords
shell script
security consideration
shell variable
specific shell variables
shell
defining variables
path variable syntax
rsh command invokes remote
SIA
accessing secure information
administering
audit logging
callbacks
changing a user shell
changing finger information
changing secure information
coding example
debugging
deleting layered security product
group info, accessing
header files
initialization
installing layered security product
installing layered security product
integrating mechanisms
interface routines
layering
login process
logs
maintaining state
matrix.conf file
matrix.conf file
mechanism-dependent interface
packaging layered products
parameter collection
parameter collection
password, accessing
passwords, changing
programming
return values
return values
rlogind process
rshd process
security sensitive commands
session authentication
session establishment
session initialization
session launch
session processing
session release
SIAENTITY structure
siainit command
sialog file
vouching
signal
secure response to
SIGQUIT signal
security consideration
SIGTRAP signal
security consideration
standalone system
ACLs
sticky bit
setting
using to secure temporary files
UUCP directory
su command
set secure keyboard
SUID
set user ID on execution
set user ID programs
symbolic link
ACL
system administrator
remote file transfer concerns
See also role responsibilities
tasks
system call
common return value
security consideration for a failed call
system defaults database
description
description
undefined fields
updating
Click letter for quick access:
[Special Characters]
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
TCB
TCB
defining a trusted system
executable file
hardware privilege
indirect programs
kernel
security configuration
trusted program
trusted system directories
temporary files
temporary files
terminal break-in configuration
terminal control database
terminal control database
terminal control database
terminal control database
terminal control database
terminal devices, assigning
terminal devices, assigning
terminal file descriptors
invalidating
terminal session
security suggestions
tftp command
description of
tmp file
security consideration
traditional file protection mechanism
group
owner
permission bits
trusted computing base
See TCB
Click letter for quick access:
[Special Characters]
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
ULTRIX authentication files
ULTRIX authentication files
ULTRIX interoperability issues
umask system call
using to secure temporary files
umask
ACL
UNIX-to-UNIX Copy Program
See UUCP
unlink system call
protecting file access
user ID
effective (EUID)
real (RUID)
user input
security consideration
Click letter for quick access:
[Special Characters]
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Click letter for quick access:
[Special Characters]
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
working storage
ACL
workstation
See also DECwindows
physical security
protecting removable media
write access
ACL definition
Click letter for quick access:
[Special Characters]
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
XReparentWindow() routine
using in a secure environment