[ Team LiB ]

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

packet filtering
    Linux, website for 
    stateful 
    stateless 
packet sniffers
    dsniff, for switched networks 
    enabling unconfigured network interfaces with ifconfig 
    network intrusion detection system (NIDS) 
    ngrep, using for 
    observing network traffic with 
        promiscuous mode on network interfaces 
        unconfigured interface for stealth sniffer 
    Snort, using as 
packets, refusing with DROP or REJECT 
PAM (Pluggable Authentication Modules) 
    access control lists (ACLs), creating  2nd 
    controlling imapd password validation 
    creating PAM-aware application 
    enforcing password strength 
    imapd validation of passwords, controlling 
    Kerberos, using with 
    Linux Developers Guide 
    Linux-PAM, web site 
    modules 
pam_stack module 
passphrases
    backing up for GnuPG private keys 
    caching SSH private keys to avoid typing 
    forcing erasure by Mailcrypt with mc-deactivate-passwd 
    secret, for GnuPG public keys 
    SSH 
passwd file, DES-based crypt( ) hashes in 
passwd program 
passwords
    authorizing changes via sudo 
    dsniff program
        captured from FTP and Telnet sessions 
        using libnids to reassemble 
    encrypting files with 
    enforcing strength with PAM 
    interactive authentication without (ssh-agent) 
    keeping track of 
    Kerberos (kpasswd command) 
    local, authentication via (Kerberos with PAM) 
    login, testing for strength 
        CrackLib, using 
        John the Ripper, using 
    mail servers (IMAP/POP), protection by SSL 
    master password for KDC database 
        storage of 
    protection with SSH 
    root 
    sudo command
        bypassing password authentication 
        forcing authentication with 
    testing and monitoring on system 
PATH environment variable, splitting with Perl script 
pathnames
    mutation in attacks against protocols 
    in remote file copying 
paths
    search path, testing 
    to server executable (inetd.conf) 
pattern matching  [See regular expressions]
payload, observing 
PEM format (certificates) 
    converting DER format to 
per_source keyword (xinetd) 
performance, effects of promiscuous mode 
period (.), in search path 
Perl scripts
    CA.pl 
    canonical hostname for SSH client, finding 
    CrackLib, using with module 
    functions provided by system logger API 
    merging lastlog databases from several systems 
    merging log files 
    process accounting records, reading and unpacking 
    writing system log entries  2nd 
permissions  2nd 
    changes since last Tripwire check 
    examining carefully for security 
    inability to track with manual integrity check 
    log files 
    preventing directory listings 
    Snort logging directory 
    world-writable files and directories, finding 
PermitRootLogin (sshd_config) 
PGP (Pretty Good Privacy) 
    Evolution mailer, using with 
    integrating with MH 
    keys, using in GnuPG operations 
    setting in mutt mailer headers 
PID (process ID)
    adding to system log messages 
    looking up 
pidof command, killing all processes with given name 
Pine
    securing POP/IMAP with SSH and Pine 
    securing POP/IMAP with SSL and 
    sending/receiving encrypted email 
PinePGP 
pings
    nmap, use of TCP and ICMP pings for host discovery 
    preventing responses to 
plaintext keys 
    including in system backups, security risks of 
    using with forced command 
Pluggable Authentication Modules  [See PAM]
policies
    default, for ipchains and iptables 
    Tripwire 
        displaying 
        generating in human-readable format and adding file to 
        modifying 
        signing with site key 
POP
    capturing messages from with dsniff mailsnarf command 
    enabling POP daemon within xinetd or inetd 
    Kerberos authentication, using with 
    mail server, running with SSL 
    running mail server with SSL 
    securing email session with SSL and mutt 
    securing mail server with SSH 
    securing mail server with SSH and Pine 
    securing mail server with stunnel and SSL 
    securing with SSL and pine 
    STLS command 
    testing SSL connection to server 
port forwarding
    disabling for authorized keys 
    SSH 
    tunneling TCP session through SSH 
port numbers, conversion to service names by netstat and lsof 
port scanners, presence evidenced by SYN_RECV state 
portmappers
    displaying registrations with lsof +M 
    querying from a different machine 
ports
    assigned to RPC services 
    default, IMAP and POP over SSL 
    nonstandard, used by network protocols 
    SSL-port on mail servers 
    testing for open 
        nc command, using 
        nmap command, port scanning capabilities 
        port scans with nmap 
        TCP port, testing with telnet connection 
        TCP RST packets returned by firewalls blocking ports 
        UDP ports, problems with 
preprocessors, Snort
    alert messages produced by 
    enabling or tuning 
prerotate and postrotate scripts 
Pretty Good Privacy  [See PGP]
principals, Kerberos 
    adding another principal to your ~/.k5login file 
    adding new with ank command 
    adding to IMAP service on server host 
    database for
        records for users and hosts 
    database, creating for KDC 
    host principal, testing for new host 
    ksu authentication 
    new host, adding to KDC database 
    POP, adding to 
    setting up with admin privileges and host principal for KDC host 
priority
    levels for Snort alerts 
    for system messages 
private keys  [See cryptographic authentication]2nd 
    GnuPG, backing up 
    PGP, exporting and using in GnuPG 
process accounting 
    displaying all executed commands 
        lastcomm utility, using 
    dump-acct command 
    enabling with accton command 
process IDs
    adding to system log messages 
    looking up 
process substitution 
processes
    /proc/<pid> directories 
    killing
        with pidof command 
        with sudo command 
    listing
        all open files (and network connections) for all processes 
        all open files for specific 
        command name (lsof -c) 
        by ID (lsof -p) 
        network connections for all 
        by username (lsof -u) 
    owned by others, examination by superuser 
    that use RPC services, examining with losf +M 
    tracing 
        strace command, using 
promiscuous mode (for network interfaces) 
    enabling for specific interfaces with ifconfig 
    performance and 
    setting for Snort 
prosum (integrity checker) 
protocol tree for selected packet (Ethereal) 
protocols
    attacks on, detection by Snort preprocessors 
    insecure, detecting use of with ngrep 
    matching a filter expression, searching network traffic for 
    network, detecting insecure 
ps command, reading /proc files 
psacct RPM  2nd 
pseudo-ttys 
    disabling allocation of for authorized keys 
    forcing ssh to allocate 
PubkeyAuthentication (sshd_config) 
public keys
    adding to GnuPG keyring 
    inserting into current mail buffer with mc-insert-public-key 
    keyserver, storing and retrieving with 
    listing for GnuPG 
    PGP, exporting and using in GnuPG 
public-key authentication  [See cryptographic authentication]
public-key encryption 
    decrypting files encrypted with GNUPG 
    expiration for keys 
    find method, use by 
    GnuPG  2nd 
        bit length of keys 
        generating key pair 
        secret passphrase for keys 
    sharing public keys 
    unique identifier for keys 

[ Team LiB ]