home *** CD-ROM | disk | FTP | other *** search
/ Forum of Incident Response & Security Teams / Forum_of_Incident_Response_and_Security_Teams_FIRST_October_1994.iso / 00readme.txt < prev    next >
Text File  |  1994-07-04  |  178KB  |  2,047 lines

  1.  
  2.  
  3.  
  4.  
  5.  
  6.  
  7.              FFFFoooorrrruuuummmm ooooffff IIIInnnncccciiiiddddeeeennnntttt RRRReeeessssppppoooonnnnsssseeee aaaannnndddd SSSSeeeeccccuuuurrrriiiittttyyyy TTTTeeeeaaaammmmssss
  8.                1111999999994444 SSSSeeeeccccuuuurrrriiiittttyyyy TTTToooooooollllssss aaaannnndddd TTTTeeeecccchhhhnnnniiiiqqqquuuueeeessss CCCCDDDD----RRRROOOOMMMM
  9.  
  10.                                _J_u_l_y, _1_9_9_4
  11.  
  12.  
  13.  
  14.  
  15. _I_n_t_r_o_d_u_c_t_i_o_n
  16.  
  17. Welcome to the FIRST 1994 Security Tools and Techniques CD-ROM.  On this
  18. disc,  you  will  find over 275 megabytes of information related to com-
  19. puter and data security, including over one hundred  papers  on  various
  20. topics,  over  fifty  software packages for UNIX systems, numerous virus
  21. scanners and similar tools for PCs and Macs, complete collections of the
  22. advisories  issued  by many of the FIRST member teams, password cracking
  23. dictionaries, summaries of computer-related laws by state  and  country,
  24. electronic ``hacker'' magazines, and more.  The information contained on
  25. the FIRST CD-ROM has been collected from anonymous FTP sites around  the
  26. world.   Indeed, that is the primary purpose of the disc:  to collect in
  27. a single place the information and tools that are  scattered  about  the
  28. Internet,  so  that you, the user, can have a single place from which to
  29. obtain them.
  30.  
  31.              _TTTT_HHHH_EEEE _MMMM_AAAA_TTTT_EEEE_RRRR_IIII_AAAA_LLLL _OOOO_NNNN _TTTT_HHHH_IIII_SSSS _CCCC_DDDD_----_RRRR_OOOO_MMMM _IIII_SSSS _PPPP_RRRR_OOOO_VVVV_IIII_DDDD_EEEE_DDDD _AAAA_SSSS_----_IIII_SSSS
  32.  
  33.      We (the Forum of Incident Response  and  Security  Teams,  the
  34.      United  States  Government,  Purdue  University,  and David A.
  35.      Curry) disclaim all warranties with regard to the contents  of
  36.      this disc, including all implied warranties of merchantibility
  37.      and fitness.  In no event shall we be liable for any  special,
  38.      indirect  or  consequential  damages or any damages whatsoever
  39.      resulting from loss of use, data or  profits,  whether  in  an
  40.      action of contract, negligence or other tortious action, aris-
  41.      ing out of or in connection with the use or performance of the
  42.      contents of this disc.
  43.  
  44.                 _UUUU_SSSS_EEEE _OOOO_FFFF _TTTT_HHHH_IIII_SSSS _MMMM_AAAA_TTTT_EEEE_RRRR_IIII_AAAA_LLLL _IIII_SSSS _AAAA_TTTT _YYYY_OOOO_UUUU_RRRR _OOOO_WWWW_NNNN _RRRR_IIII_SSSS_KKKK
  45.  
  46.      The material on this disc has been collected via the  Internet
  47.      from  anonymous  FTP  sites all over the world.  No effort has
  48.      been made to verify that the software thus  obtained  is  free
  49.      from  viruses, Trojan horses, or other forms of malicious pro-
  50.      gramming.  No effort has been made to verify that the software
  51.      performs  as  its  authors  claim,  or  that it even compiles.
  52.      Before making use of any of this software, we  recommend  that
  53.      you  examine  the  source code, if available, and be sure that
  54.      you believe it to be free of  malicious  code.   Likewise,  we
  55.      recommend  that  you  scan  binary programs for viruses before
  56.      installing or executing them on your system.  In short,  treat
  57.      this  material with the same caution and care you would use if
  58.      you had FTPed it yourself.
  59.  
  60.  
  61.  
  62.  
  63.  
  64.                               July 4, 1994
  65.  
  66.  
  67.  
  68.  
  69.  
  70.                                  - 2 -
  71.  
  72.  
  73. _D_i_s_k _F_o_r_m_a_t
  74.  
  75. This CD-ROM is formatted according to the ISO-9660  standard,  which  is
  76. based  on  a  _d_e  _f_a_c_t_o industry standard format called ``High Sierra.''
  77. The ISO-9660 format is very portable; nearly every system that  supports
  78. CD-ROMs supports the ISO-9660 format in addition to any operating system
  79. specific formats the system  offers.   Most  systems  that  support  the
  80. ``High  Sierra''  format  (such  as  SunOS  4.1._x) will also support the
  81. ISO-9660 format.  If you're not sure whether or not your system supports
  82. this  format,  the easiest way to find out is just to try it.  Since the
  83. CD-ROM is a read-only media, you can't do any permanent damage.
  84.  
  85. Unfortunately, to obtain the maximum portability between operating  sys-
  86. tems,  the designers of the ISO-9660 format had to impose rather serious
  87. constraints on the file and directory naming scheme that could be  used.
  88. An ISO-9660 file system is very much like the one offered by MS-DOS:
  89.  
  90.      +o     File and directory names may contain only upper-case letters,
  91.           digits, and underscore characters.
  92.  
  93.      +o     File names consist of a 0-8 character  base  name,  a  period
  94.           (`.'),  and  a  0-3 character extension name.  Either the base
  95.           name or the extension name (but not both) may be missing.
  96.  
  97.      +o     A version number, separated from the file  name  by  a  semi-
  98.           colon (e.g., ``;1'') is required for all file names.
  99.  
  100.      +o     Directory names consist of a  0-8  character  base  name,  no
  101.           period, and no extension name.
  102.  
  103.      +o     A maximum of eight levels of  directories  are  allowed,  and
  104.           only 510 files may appear in any directory.  A path name (com-
  105.           plete file name as specified from the top-level directory)  is
  106.           limited to a total length of 65 characters.
  107.  
  108.      +o     No facilities are provided for file ownership, access permis-
  109.           sions, links, and so forth.
  110.  
  111. When you use an ISO-9660 format disc on most UNIX  systems,  the  CD-ROM
  112. driver  typically  makes some silent modifications to the ISO-9660 names
  113. so that they follow UNIX conventions.  For  example,  many  systems  map
  114. alphabetic characters to lower case, hide the version numbers, and some-
  115. times hide trailing periods.  They typically give all files  and  direc-
  116. tories a permission mode of 0555 (r-xr-xr-x).
  117.  
  118. In the table of contents on the following pages, all file and  directory
  119. names  are  shown  in lower case, and version numbers are not shown (all
  120. files have version number ``;1'').  If your system displays  upper  case
  121. names  and/or  version  numbers and does not map lower case letters into
  122. upper case or automatically append version numbers when needed, you will
  123. have to make these conversions yourself when accessing the disc.  Within
  124. path names in the table of contents, the  UNIX  convention  of  using  a
  125. slash    (``/'')    to    separate    path    name   components   (e.g.,
  126. /_o_n_e/_t_w_o/_t_h_r_e_e/_f_i_l_e._t_x_t) is  used.   If  your  system  uses  some  other
  127.  
  128.  
  129.  
  130.                               July 4, 1994
  131.  
  132.  
  133.  
  134.  
  135.  
  136.                                  - 3 -
  137.  
  138.  
  139. convention,  such  as  the backslash (``\'') of MS-DOS, you will have to
  140. make this conversion yourself as well.
  141.  
  142. _F_i_l_e _N_a_m_e _E_x_t_e_n_s_i_o_n_s
  143.  
  144. For each file on the disc, the file name extension is used  to  indicate
  145. the  format  of  the file.  The extensions in use on this edition of the
  146. disc are:
  147.  
  148.      _...._hhhh_qqqq_xxxx         A BinHex'd file for  the  Macintosh.   Use  BinHex  or
  149.                   StuffIt to debinhex the file.
  150.  
  151.      _...._pppp_ssss          PostScript, the page description language from  Adobe.
  152.                   You  can send this to a laser printer that understands
  153.                   PostScript, such as any Apple LaserWriter, or most  of
  154.                   the  newer Hewlett-Packaer LaserJet printers.  You can
  155.                   also preview it on the screen using a PostScript  pre-
  156.                   viewer such as ghostscript.
  157.  
  158.      _...._ssss_eeee_aaaa         A BinHex'd self-extracting Compact Pro archive for the
  159.                   Macintosh.   Use  Compact  Pro,  BinHex, or StuffIt to
  160.                   debinhex  the  files,  then  double   click   on   the
  161.                   debinhexed files to extract the files from the compac-
  162.                   tor archives.
  163.  
  164.      _...._tttt_aaaa_rrrr         A UNIX ``tar'' (tape archive) file.   This  file  con-
  165.                   tains  an  archive of other files and directories.  It
  166.                   can be extracted into the current directory on a  UNIX
  167.                   system  by  using  the command tar -xvf _ffff_iiii_llll_eeee_nnnn_aaaa_mmmm_eeee, or a
  168.                   table of contents of the  archive  can  be  listed  by
  169.                   using  the  command  tar  -tvf  _ffff_iiii_llll_eeee_nnnn_aaaa_mmmm_eeee.   For PC and
  170.                   Macintosh users, some public-domain programs that  can
  171.                   read  UNIX  ``tar'' archives have been supplied in the
  172.                   _aaaa_rrrr_cccc_hhhh_pppp_rrrr_oooo_gggg directory on the disc.
  173.  
  174.      _...._tttt_xxxx_tttt         Plain ASCII text.  May contain backspaces  for  under-
  175.                   lining  or  bold  face,  and  may occasionally contain
  176.                   non-ASCII (but usually ISO Latin-1)  symbols  such  as
  177.                   letters with diacritical marks.
  178.  
  179.      _...._zzzz_iiii_pppp         A ``zip'' archive file.  This file contains an archive
  180.                   of  other  files  and  directories, and is in a format
  181.                   that is commonly used on MS-DOS systems.   It  can  be
  182.                   extracted into the current directory using the command
  183.                   unzip _ffff_iiii_llll_eeee_nnnn_aaaa_mmmm_eeee.  For UNIX and  Macintosh  users,  some
  184.                   public-domain  programs that can read ``zip'' archives
  185.                   has been supplied in the  _aaaa_rrrr_cccc_hhhh_pppp_rrrr_oooo_gggg  directory  on  the
  186.                   disc.
  187.  
  188.  
  189.  
  190.  
  191.  
  192.  
  193.  
  194.  
  195.  
  196.                               July 4, 1994
  197.  
  198.  
  199.  
  200.  
  201.  
  202.                                  - 4 -
  203.  
  204.  
  205. _1.  _T_h_e _T_o_p-_L_e_v_e_l _D_i_r_e_c_t_o_r_y
  206.  
  207. At the top level  of  the  CD-ROM  directory  tree,  the  collection  of
  208. software,  papers,  and  so  forth  has  been  subdivided  into  several
  209. categories.  Each category is contained in its own  directory;  most  of
  210. the  categories  have  been further subdivided into subdirectories.  The
  211. rest of this document provides a detailed listing of each  file  on  the
  212. disc, and a brief description of its contents.
  213.  
  214. At the top level, the following subdirectories are available:
  215.  
  216.      _aaaa_rrrr_cccc_hhhh_pppp_rrrr_oooo_gggg     Software for various platforms  to  read  the  archive
  217.                   files stored on the rest of the disc.
  218.  
  219.      _eeee_tttt_hhhh_iiii_cccc_ssss       A collection  of  ``ethics''  documents  and  computer
  220.                   usage  policies,  maintained  by  Dave  Grisham of the
  221.                   University of New Mexico.
  222.  
  223.      _mmmm_aaaa_iiii_llll_llll_iiii_ssss_tttt     Archives of various security-related mailing lists and
  224.                   electronically distributed journals and magazines.
  225.  
  226.      _pppp_aaaa_pppp_eeee_rrrr_ssss       Research papers, journal articles, documentation,  and
  227.                   other  information  on  a wide variety of computer and
  228.                   data security-related topics.
  229.  
  230.      _pppp_aaaa_ssss_ssss_dddd_iiii_cccc_tttt     A collection of password cracking dictionaries.
  231.  
  232.      _pppp_oooo_llll_iiii_cccc_iiii_eeee_ssss     A collection of policies on vaious topics,  maintained
  233.                   as part of the Computers and Academic Freedom archives
  234.                   of the Electronic Freedom Foundation.
  235.  
  236.      _ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee     Public domain (or  freely  available)  software  tools
  237.                   that  are  releated  to  computer security or incident
  238.                   response.  Some of these programs are directed at com-
  239.                   puter  security,  others  have  primary purposes doing
  240.                   other things, but can be useful in the security  field
  241.                   as well.  Where possible, source code is provided.  In
  242.                   cases where binaries only are provided,  use  them  at
  243.                   your own risk.
  244.  
  245.      _tttt_eeee_aaaa_mmmm_iiii_nnnn_ffff_oooo     Information about and provided  by  the  FIRST  member
  246.                   teams.  Includes advisories, articles, etc.
  247.  
  248. _1._1.  _////_aaaa_rrrr_cccc_hhhh_pppp_rrrr_oooo_gggg
  249.  
  250. The _////_aaaa_rrrr_cccc_hhhh_pppp_rrrr_oooo_gggg directory contains software for various platforms to  read
  251. the  archive  files  stored  on the rest of the disc.  The files in this
  252. directory are:
  253.  
  254.      _dddd_oooo_ssss_tttt_aaaa_rrrr_...._zzzz_iiii_pppp   An MS-DOS  implementation  of  the  tar  _cccc_oooo_mmmm_mmmm_aaaa_nnnn_dddd_,,,,  _ffff_oooo_rrrr
  255.                   _eeee_xxxx_tttt_rrrr_aaaa_cccc_tttt_iiii_nnnn_gggg _````_````_tttt_aaaa_rrrr_''''_'''' _ffff_oooo_rrrr_mmmm_aaaa_tttt _aaaa_rrrr_cccc_hhhh_iiii_vvvv_eeee _ffff_iiii_llll_eeee_ssss_....
  256.  
  257.      _mmmm_aaaa_cccc_tttt_aaaa_rrrr_...._hhhh_qqqq_xxxx   A Macintosh implementation of  the  tar  _cccc_oooo_mmmm_mmmm_aaaa_nnnn_dddd_,,,,  _ffff_oooo_rrrr
  258.                   _eeee_xxxx_tttt_rrrr_aaaa_cccc_tttt_iiii_nnnn_gggg  _````_````_tttt_aaaa_rrrr_''''_''''  _ffff_oooo_rrrr_mmmm_aaaa_tttt  _aaaa_rrrr_cccc_hhhh_iiii_vvvv_eeee  _ffff_iiii_llll_eeee_ssss_....   _VVVV_eeee_rrrr_ssss_iiii_oooo_nnnn
  259.  
  260.  
  261.  
  262.                               July 4, 1994
  263.  
  264.  
  265.  
  266.  
  267.  
  268.                                  - 5 -
  269.  
  270.  
  271.                   _4444_...._0000_bbbb_....
  272.  
  273.      _mmmm_aaaa_cccc_uuuu_nnnn_zzzz_iiii_pppp_...._hhhh_qqqq_xxxx The Info-ZIP Macintosh  implementation  of  the  unzip
  274.                   _cccc_oooo_mmmm_mmmm_aaaa_nnnn_dddd_,,,,  _ffff_oooo_rrrr _eeee_xxxx_tttt_rrrr_aaaa_cccc_tttt_iiii_nnnn_gggg _````_````_zzzz_iiii_pppp_''''_'''' _ffff_oooo_rrrr_mmmm_aaaa_tttt _aaaa_rrrr_cccc_hhhh_iiii_vvvv_eeee _ffff_iiii_llll_eeee_ssss_....
  275.                   _VVVV_eeee_rrrr_ssss_iiii_oooo_nnnn _5555_...._1111_....
  276.  
  277.      _uuuu_nnnn_xxxx_uuuu_nnnn_zzzz_iiii_pppp_...._tttt_aaaa_rrrr The Info-ZIP UNIX implementation of the unzip _cccc_oooo_mmmm_mmmm_aaaa_nnnn_dddd_,,,,
  278.                   _ffff_oooo_rrrr  _eeee_xxxx_tttt_rrrr_aaaa_cccc_tttt_iiii_nnnn_gggg _````_````_zzzz_iiii_pppp_''''_'''' _ffff_oooo_rrrr_mmmm_aaaa_tttt _aaaa_rrrr_cccc_hhhh_iiii_vvvv_eeee _ffff_iiii_llll_eeee_ssss_....  _VVVV_eeee_rrrr_ssss_iiii_oooo_nnnn
  279.                   _5555_...._1111_....
  280.  
  281. _1._2.  _////_eeee_tttt_hhhh_iiii_cccc_ssss
  282.  
  283. The _////_eeee_tttt_hhhh_iiii_cccc_ssss directory contains a collection of ``ethics'' documents  and
  284. computer usage policies, maintained by Dave Grisham of the University of
  285. New Mexico.
  286.  
  287. _1._3.  _////_mmmm_aaaa_iiii_llll_llll_iiii_ssss_tttt
  288.  
  289. The _////_mmmm_aaaa_iiii_llll_llll_iiii_ssss_tttt directory  contains  the  archives  of  various  security-
  290. related  mailing lists and electronically distributed journals and maga-
  291. zines.  The subdirectories in this directory are:
  292.  
  293.      _bbbb_uuuu_gggg_tttt_rrrr_aaaa_qqqq      The  archives  of   the   bugtraq@crimelab.com   _ffff_uuuu_llll_llll_----
  294.                   _dddd_iiii_ssss_cccc_llll_oooo_ssss_uuuu_rrrr_eeee _ssss_eeee_cccc_uuuu_rrrr_iiii_tttt_yyyy _hhhh_oooo_llll_eeee _mmmm_aaaa_iiii_llll_iiii_nnnn_gggg _llll_iiii_ssss_tttt_....
  295.  
  296.      _cccc_uuuu_dddd          The Computer Underground Digest electronic magazine.
  297.  
  298.      _ffff_iiii_rrrr_eeee_wwww_aaaa_llll_llll     The archives of the firewalls@greatcircle.com  _mmmm_aaaa_iiii_llll_iiii_nnnn_gggg
  299.                   _llll_iiii_ssss_tttt_....
  300.  
  301.      _nnnn_iiii_aaaa          The Network Information Access electronic magazine.
  302.  
  303.      _pppp_hhhh_rrrr_aaaa_cccc_kkkk       The Phrack electronic magazine.
  304.  
  305.      _ssss_uuuu_rrrr_ffff_pppp_uuuu_nnnn_kkkk     The SURFPUNK Technical Journal electronic magazine.
  306.  
  307.      _vvvv_iiii_rrrr_uuuu_ssss______llll      The archives of the virus-l@lehigh.edu _mmmm_aaaa_iiii_llll_iiii_nnnn_gggg _llll_iiii_ssss_tttt_....
  308.  
  309. _1._4.  _////_pppp_aaaa_pppp_eeee_rrrr_ssss
  310.  
  311. The _////_pppp_aaaa_pppp_eeee_rrrr_ssss directory contains research papers, journal articles,  docu-
  312. mentation,  and other information on a wide variety of computer and data
  313. security-related topics.  Within the _////_pppp_aaaa_pppp_eeee_rrrr_ssss  directory,  the  following
  314. subdirectories are available:
  315.  
  316.      _aaaa_uuuu_tttt_hhhh_eeee_nnnn_tttt      Documents related to authentication of users, communi-
  317.                   cations, and hosts.
  318.  
  319.      _cccc_rrrr_iiii_tttt_eeee_rrrr_iiii_aaaa     Documents related to security evaluation criteria  for
  320.                   computer systems and protocols.
  321.  
  322.      _cccc_rrrr_yyyy_pppp_tttt_oooo       Documents  related  to  cryptograhic   protocols   and
  323.                   methods.
  324.  
  325.  
  326.  
  327.  
  328.                               July 4, 1994
  329.  
  330.  
  331.  
  332.  
  333.  
  334.                                  - 6 -
  335.  
  336.  
  337.      _ffff_iiii_rrrr_eeee_wwww_aaaa_llll_llll     Documents related to the construction and use of  net-
  338.                   work firewalls.
  339.  
  340.      _gggg_eeee_nnnn_eeee_rrrr_aaaa_llll      Documents that cover computer security in general  and
  341.                   other miscellaneous topics.
  342.  
  343.      _llll_eeee_gggg_aaaa_llll        Documents related to computer security, the  law,  and
  344.                   ethics.
  345.  
  346.      _pppp_aaaa_ssss_ssss_wwww_oooo_rrrr_dddd     Documents related to passwords.
  347.  
  348.      _pppp_rrrr_oooo_tttt_oooo_cccc_oooo_llll     Documents related to the design of secure network pro-
  349.                   tocols,  and to the security analysis of existing pro-
  350.                   tocols.
  351.  
  352.      _uuuu_nnnn_iiii_xxxx         Documents related to the security of the UNIX  operat-
  353.                   ing system.
  354.  
  355.      _vvvv_iiii_rrrr_uuuu_ssss        Documents related to  computer  viruses,  worms,  etc.
  356.                   The Internet Worm papers are in this directory.
  357.  
  358. _1._4._1.  _////_pppp_aaaa_pppp_eeee_rrrr_ssss_////_aaaa_uuuu_tttt_hhhh_eeee_nnnn_tttt
  359.  
  360. The _////_pppp_aaaa_pppp_eeee_rrrr_ssss_////_aaaa_uuuu_tttt_hhhh_eeee_nnnn_tttt directory contains documents related to  authentica-
  361. tion  of  users, communications, and hosts.  The files in this directory
  362. are:
  363.  
  364.      _kkkk_eeee_rrrr_bbbb_eeee_rrrr_oooo_ssss_...._pppp_ssss  Steiner, Jennifer  G.,  Clifford  Neuman,  Jeffrey  I.
  365.                   Schiller.   ``Kerberos:  An Authentication Service for
  366.                   Open Network Systems.''  A description of the Kerberos
  367.                   authentication system.
  368.  
  369.      _kkkk_eeee_rrrr_bbbb_dddd_iiii_aaaa_llll_...._pppp_ssss  Bryant, Bill.  ``Designing an Authentication System: A
  370.                   Dialogue  in  Four  Scenes.''  A ``play'' in which the
  371.                   characters end up designing an  authentication  system
  372.                   much  like  Kerberos.   Provides an easy-to-understand
  373.                   description of why Kerberos is the way it is.
  374.  
  375.      _kkkk_eeee_rrrr_bbbb_llll_iiii_mmmm_...._pppp_ssss   Bellovin, Steven M. and  Michael  Merritt.   ``Limita-
  376.                   tions  of  the  Kerberos  Authentication  System.''  A
  377.                   description of some limitations and weaknesses in  the
  378.                   Kerberos authentication system.
  379.  
  380.      _kkkk_kkkk_nnnn_iiii_gggg_hhhh_tttt_...._pppp_ssss   Molva,  Refik,  Gene  Tsudik,  Els  Van   Herreweghen,
  381.                   Stefano  Zatti.  ``KryptoKnight Authentication and Key
  382.                   Distribution System.'' An authentication and key  dis-
  383.                   tribution  system  that provides facilities for secure
  384.                   communication in any type of network environment.
  385.  
  386.      _llll_oooo_nnnn_gggg_jjjj_oooo_bbbb_ssss_...._pppp_ssss  Rubin, A. D. and P. Honeyman.  ``Long Running Jobs  in
  387.                   an  Authenticated Environment.''  A system for running
  388.                   batch jobs in an environment in which users must  have
  389.                   tokens or tickets to run.
  390.  
  391.  
  392.  
  393.  
  394.                               July 4, 1994
  395.  
  396.  
  397.  
  398.  
  399.  
  400.                                  - 7 -
  401.  
  402.  
  403.      _nnnn_tttt_nnnn_...._pppp_ssss       Neuman, B. Clifford and Stuart  G.  Stubblebine.   ``A
  404.                   Note  on the Use of Timestamps as Nonces.''  A note on
  405.                   the use of timestamps in authentication protocols.
  406.  
  407. _1._4._2.  _////_pppp_aaaa_pppp_eeee_rrrr_ssss_////_cccc_rrrr_iiii_tttt_eeee_rrrr_iiii_aaaa
  408.  
  409. The _////_pppp_aaaa_pppp_eeee_rrrr_ssss_////_cccc_rrrr_iiii_tttt_eeee_rrrr_iiii_aaaa directory contains documents  related  to  security
  410. evaluation  criteria  for  computer systems and protocols.  The files in
  411. this directory are:
  412.  
  413.      _cccc_tttt_cccc_pppp_eeee_cccc_1111_...._pppp_ssss   ``Canadian Trusted Computer  Product  Evaluation  Cri-
  414.                   teria, Part 1.''  The Canadian ``Orange Book.''
  415.  
  416.      _cccc_tttt_cccc_pppp_eeee_cccc_2222_...._pppp_ssss   ``Canadian Trusted Computer  Product  Evaluation  Cri-
  417.                   teria, Part 2.''  The Canadian ``Orange Book.''
  418.  
  419.      _eeee_xxxx_eeee_gggg_uuuu_iiii_dddd_eeee_...._tttt_xxxx_tttt Helsing, Cheryl, Marianne Swanson, and Mary Anne Todd.
  420.                   ``Executive  Guide  to  the  Protection of Information
  421.                   Resources.''  A U.S. National Institute  of  Standards
  422.                   and Technology publication.
  423.  
  424.      _ffff_cccc_vvvv_oooo_llll_1111_...._pppp_ssss    ``Federal Criteria for  Information  Technology  Secu-
  425.                   rity, Volume 1.''  The new ``Orange Book.''
  426.  
  427.      _ffff_cccc_vvvv_oooo_llll_2222_...._pppp_ssss    ``Federal Criteria for  Information  Technology  Secu-
  428.                   rity, Volume 2.''  The new ``Orange Book.''
  429.  
  430.      _gggg_rrrr_eeee_eeee_nnnn_bbbb_kkkk_...._tttt_xxxx_tttt  ``Green Book on the Security of Information Systems.''
  431.                   A  document  that  sets  out the development of a con-
  432.                   sistent approach to Information  Security  in  Europe,
  433.                   taking  into account common interests with other coun-
  434.                   tries.
  435.  
  436.      _hhhh_aaaa_rrrr_mmmm_oooo_nnnn_yyyy_...._pppp_ssss   ``Foundations for  the  Harmonization  of  Information
  437.                   Technology  Security  Standards.''  An analysis of the
  438.                   differences between the U.S., Canadian,  and  European
  439.                   Information  Technology  Security efforts, and discus-
  440.                   sions of how to make them more similar.
  441.  
  442.      _hhhh_oooo_rrrr_ssss_eeee_ssss_...._pppp_ssss    Hambridge, Sally and Jeffrey C. Sedayao.  ``Horses and
  443.                   Barn  Doors:   Evolution  of  Corporate Guidelines for
  444.                   Internet Usage.''  A description of how Intel  Corp.'s
  445.                   Internet usage policies were developed.
  446.  
  447.      _iiii_nnnn_tttt_eeee_rrrr_nnnn_eeee_tttt_...._tttt_xxxx_tttt Pethia, R., S. Crocker, and B.  Fraser.   ``Guidelines
  448.                   for the Secure Operation of the Internet - RFC 1281.''
  449.                   Provides a set of guidelines  to  aid  in  the  secure
  450.                   operation of the Internet.
  451.  
  452.      _iiii_tttt_ssss_eeee_cccc_...._tttt_xxxx_tttt    ``Information  Technology  Security  Evaluation   Cri-
  453.                   teria.''  The European ``Orange Book.''
  454.  
  455.      _mmmm_gggg_tttt_gggg_uuuu_iiii_dddd_eeee_...._tttt_xxxx_tttt Helsing, Cheryl, Marianne Swanson, and Mary Anne Todd.
  456.                   ``Management  Guide  to  the Protection of Information
  457.  
  458.  
  459.  
  460.                               July 4, 1994
  461.  
  462.  
  463.  
  464.  
  465.  
  466.                                  - 8 -
  467.  
  468.  
  469.                   Resources.''  A U.S. National Institute  of  Standards
  470.                   and Technology publication.
  471.  
  472.      _oooo_ssss_ssss          Karila,  Arto  T.   This  subdirectory  contains   the
  473.                   PostScript files that make up ``Open Systems Security:
  474.                   An  Architectural  Framework.''  Thesis   dissertation
  475.                   presenting  an  architecture  for building secure open
  476.                   systems communication via untrusted global  data  net-
  477.                   works.
  478.  
  479.      _pppp_ssss_ffff_oooo_ssss_...._pppp_ssss     Neuman, B. Clifford.  ``Protection and Security Issues
  480.                   for  Future Systems.''  An examination of the problems
  481.                   of protection and security as applied to  future  com-
  482.                   puter systems.
  483.  
  484.      _rrrr_eeee_llll_aaaa_tttt_eeee_...._pppp_ssss    ``Relating  Functionality  Class  and  Security   Sub-
  485.                   Profile  Specifications.''   A  discussion  of various
  486.                   alternatives for associating functionality  class  and
  487.                   security  sub-profiile  specifications,  such as those
  488.                   presented  in  the  Federal  Criteria  (_ffff_cccc_vvvv_oooo_llll_1111_...._pppp_ssss  and
  489.                   _ffff_cccc_vvvv_oooo_llll_2222_...._pppp_ssss).
  490.  
  491.      _tttt_cccc_ssss_eeee_cccc_...._tttt_xxxx_tttt    ``Department  of  Defense  Trusted   Computer   System
  492.                   Evaluation Criteria.''  The ``Orange Book.''
  493.  
  494. _1._4._3.  _////_pppp_aaaa_pppp_eeee_rrrr_ssss_////_cccc_rrrr_yyyy_pppp_tttt_oooo
  495.  
  496. The _////_pppp_aaaa_pppp_eeee_rrrr_ssss_////_cccc_rrrr_yyyy_pppp_tttt_oooo directory contains documents related to cryptographic
  497. protocols and methods.  The files in this directory are:
  498.  
  499.      _aaaa_cccc_mmmm_cccc_rrrr_yyyy_pppp_tttt_...._pppp_ssss  Landan, Susan, et al.  ``Codes, Keys,  and  Conflicts:
  500.                   Issues in U.S.  Crypto Policy.'' A report of a special
  501.                   panel of the ACM (Association for Computing Machinery)
  502.                   U.S. Public Policy Committee.
  503.  
  504.      _aaaa_eeee_kkkk_eeee_...._pppp_ssss      Bellovin, Steven M. and Michael Merritt.   ``Augmented
  505.                   Encrypted  Key  Exchange:  A  Password-Based  Protocol
  506.                   Secure Against Dictionary Attacks  and  Password  File
  507.                   Compromise.''   An extension of the protocol described
  508.                   in _nnnn_eeee_kkkk_eeee_...._pppp_ssss that removes the requirement that the  host
  509.                   store passwords in cleartext.
  510.  
  511.      _cccc_ffff_ssss_...._pppp_ssss       Blaze,  Matt.   ``A  Cryptographic  File  System   for
  512.                   Unix.''  A description of a UNIX file system implemen-
  513.                   tation  that  provides  transparent   encryption   and
  514.                   decryption of files stored on the disk.
  515.  
  516.      _cccc_ffff_ssss_kkkk_eeee_yyyy_...._pppp_ssss    Blaze, Matt.  ``Key Management in an  Encrypting  File
  517.                   System.''  A description of how ``smart cards'' can be
  518.                   used to manage the keys used by  the  encryption  file
  519.                   system described in _cccc_ffff_ssss_...._pppp_ssss.
  520.  
  521.      _dddd_eeee_ssss_...._pppp_ssss       Feldmeier,  David  C.   ``A  High-Speed  Software  DES
  522.                   Implementation.''   Describes  a  high-speed  software
  523.  
  524.  
  525.  
  526.                               July 4, 1994
  527.  
  528.  
  529.  
  530.  
  531.  
  532.                                  - 9 -
  533.  
  534.  
  535.                   implementation of the Data Encryption Standard.
  536.  
  537.      _dddd_eeee_ssss_bbbb_rrrr_eeee_aaaa_kkkk_...._pppp_ssss  Wayner, Peter C.  ``Using  Content-Addressable  Search
  538.                   Engines  to  Encrypt  and  Break DES.''  A very simple
  539.                   parallel  architecture  using  a  modifed  version  of
  540.                   content-addressable  memory can be used to cheaply and
  541.                   efficiently encipher and decipher data  with  DES-like
  542.                   systems.   Describes  how  to implement these systems,
  543.                   and also how to construct a  large  scale  engine  for
  544.                   exhaustively searching the keyspace of DES.
  545.  
  546.      _eeee_eeee_ssss_pppp_rrrr_oooo_tttt_oooo_...._pppp_ssss  Blaze,  Matt.   ``Protocol  Failure  in  the  Escrowed
  547.                   Encryption Standard.''  A description of some protocol
  548.                   weaknesses in the  Clinton  administration's  Escrowed
  549.                   Encryption Standard, also known as the Clipper Chip.
  550.  
  551.      _ffff_aaaa_iiii_llll_...._pppp_ssss      Anderson, Ross.  ``Why Cryptosystems Fail.''  A survey
  552.                   of  the  failure  modes of retail banking systems, the
  553.                   second largest application of cryptography.
  554.  
  555.      _nnnn_eeee_kkkk_eeee_...._pppp_ssss      Bellovin, Steven M. and Michael  Merrit.   ``Encrypted
  556.                   Key Exchange:  Password-Based Protocols Secure Against
  557.                   Dictionary Attacks.'' A  combination  of  public-  and
  558.                   private-key cryptography that allows two parties shar-
  559.                   ing a common password  to  exchange  confidential  and
  560.                   authenticated  information  over  an insecure network.
  561.                   The protocol is secure against active attack, and also
  562.                   against off-line ``dictionary'' attacks.
  563.  
  564.      _pppp_kkkk_cccc_ssss         This subdirectory  contains  the  complete  family  of
  565.                   Public-Key  Cryptography  Standards  from  RSA Labora-
  566.                   tories.  They cover RSA encryption, Diffie-Hellman key
  567.                   agreement,    password-based   encryption,   extended-
  568.                   certificate  syntax,  cryptographic  message   syntax,
  569.                   private-key   information  syntax,  and  certification
  570.                   request syntax, as well as selected  attributes.   The
  571.                   files in this subdirectory are:
  572.  
  573.                   _eeee_xxxx_aaaa_mmmm_pppp_llll_eeee_ssss_...._pppp_ssss  ``Some Examples of the PKCS Standards.''
  574.  
  575.                   _llll_aaaa_yyyy_mmmm_aaaa_nnnn_...._pppp_ssss    ``A Layman's Guide to a Subset of  ASN.1,
  576.                                BER, and DER.''
  577.  
  578.                   _oooo_vvvv_eeee_rrrr_vvvv_iiii_eeee_wwww_...._pppp_ssss  ``An Overview of the PKCS Standards.''
  579.  
  580.                   _pppp_kkkk_cccc_ssss______1111_...._pppp_ssss    ``RSA Encryption Standard.''
  581.  
  582.                   _pppp_kkkk_cccc_ssss______2222_...._pppp_ssss    Deprecated.
  583.  
  584.                   _pppp_kkkk_cccc_ssss______3333_...._pppp_ssss    ``Diffie-Hellman   Key-Agreement    Stan-
  585.                                dard.''
  586.  
  587.                   _pppp_kkkk_cccc_ssss______4444_...._pppp_ssss    Deprecated.
  588.  
  589.  
  590.  
  591.  
  592.                               July 4, 1994
  593.  
  594.  
  595.  
  596.  
  597.  
  598.                                  - 10 -
  599.  
  600.  
  601.                   _pppp_kkkk_cccc_ssss______5555_...._pppp_ssss    ``Password-Based Encryption Standard.''
  602.  
  603.                   _pppp_kkkk_cccc_ssss______6666_...._pppp_ssss    ``Extended-Certificate Syntax Standard.''
  604.  
  605.                   _pppp_kkkk_cccc_ssss______7777_...._pppp_ssss    ``Cryptographic  Message   Syntax   Stan-
  606.                                dard.''
  607.  
  608.                   _pppp_kkkk_cccc_ssss______8888_...._pppp_ssss    ``Private-Key  Information  Syntax  Stan-
  609.                                dard.''
  610.  
  611.                   _pppp_kkkk_cccc_ssss______9999_...._pppp_ssss    ``Selected Attribute Types.''
  612.  
  613.                   _pppp_kkkk_cccc_ssss______1111_0000_...._pppp_ssss   ``Certifcation Request Syntax Standard.''
  614.  
  615.      _pppp_rrrr_iiii_vvvv_kkkk_eeee_yyyy_...._pppp_ssss   Davis, Don and Ralph Swick.   ``Network  Security  via
  616.                   Private-Key  Certificates.''  Some  practical security
  617.                   protocols  that  use  private-key  encryption  in  the
  618.                   public-key style.
  619.  
  620.      _rrrr_ssss_aaaa_ffff_aaaa_qqqq_...._pppp_ssss    Fahn, Paul.  ``Answers to Frequently  Asked  Questions
  621.                   About Today's Cryptography.''
  622.  
  623.      _ssss_cccc_ffff_aaaa_qqqq_...._tttt_xxxx_tttt    Readers of _s_c_i._c_r_y_p_t.  ``Cryptography FAQ.''
  624.  
  625.      _ssss_kkkk_iiii_pppp_jjjj_aaaa_cccc_kkkk_...._tttt_xxxx_tttt Brickell, Ernest F., Dorothy E.  Denning,  Stephen  T.
  626.                   Kent,  David P. Maher, and Walter Tuchman.  ``SKIPJACK
  627.                   Review: Interim Report: The SKIPJACK Algorithm.''  The
  628.                   report  from the group of non-government cryptologists
  629.                   who reviewed the classified SKIPJACK encryption  algo-
  630.                   rithm used in the Clinton administration's Clipper and
  631.                   Capstone chips.
  632.  
  633.      _ssss_wwww_iiii_pppp_eeee_...._pppp_ssss     Ioannidis, John and Matt  Blaze.   ``The  Architecture
  634.                   and  Implementation  of  Network  Layer Security Under
  635.                   Unix.'' A description of a network-layer security pro-
  636.                   tocol  for the IP protocol suite that provides authen-
  637.                   tication,  integrity,  and   confidentiality   of   IP
  638.                   datagrams.
  639.  
  640.      _vvvv_iiii_ssss_aaaa_...._pppp_ssss      Estrin,  Deborah,  Gene  Tsudik,  and  Jeffrey  Mogul.
  641.                   ``Visa  Protocols for Controlling Inter-Organizational
  642.                   Datagram Flow.''  A cryptographic method for authenti-
  643.                   cating and authorizing a flow of datagrams.
  644.  
  645.      _vvvv_iiii_ssss_aaaa_eeee_xxxx_tttt_...._pppp_ssss   Estrin,  Deborah,  Gene  Tsudik,  and  Jeffrey  Mogul.
  646.                   ``Visa  Protocols for Controlling Inter-Organizational
  647.                   Datagram  Flow:  Extended  Description.''   A  crypto-
  648.                   graphic  method  for  authenticating and authorizing a
  649.                   flow of datagrams.
  650.  
  651. _1._4._4.  _////_pppp_aaaa_pppp_eeee_rrrr_ssss_////_ffff_iiii_rrrr_eeee_wwww_aaaa_llll_llll
  652.  
  653. The _////_pppp_aaaa_pppp_eeee_rrrr_ssss_////_ffff_iiii_rrrr_eeee_wwww_aaaa_llll_llll directory contains documents related  to  the  con-
  654. struction  and  use  of  network firewalls.  The files in this directory
  655.  
  656.  
  657.  
  658.                               July 4, 1994
  659.  
  660.  
  661.  
  662.  
  663.  
  664.                                  - 11 -
  665.  
  666.  
  667. are:
  668.  
  669.      _cccc_ssss_llll_aaaa_tttt_eeee_rrrr_...._pppp_ssss   Corbridge, Bruce, Robert Henig,  and  Charles  Slater.
  670.                   ``Packet  Filtering  in an IP Router.''  A description
  671.                   of how the packet filtering facility  in  the  Telebit
  672.                   NetBlazer was designed and developed.
  673.  
  674.      _dddd_eeee_cccc_...._pppp_ssss       Ranum, Marcus J.  ``A Network Firewall.''  A  descrip-
  675.                   tion   of   Digital  Equipment  Corporation's  network
  676.                   firewall between its corporate network and the  Inter-
  677.                   net.
  678.  
  679.      _ffff_wwww_aaaa_llll_llll_ssss_...._pppp_ssss    Ranum, Marcus  J.   ``Thinking  About  Firewalls.''  A
  680.                   description  of  some of the considerations and trade-
  681.                   offs in designing network firewalls.
  682.  
  683.      _gggg_aaaa_tttt_eeee_kkkk_eeee_eeee_pppp_...._pppp_ssss  Schauer, Herve' and Christphe Wolfhugel.  ``An Internet
  684.                   Gatekeeper.''   A  description  of how to construct an
  685.                   Internet firewall.
  686.  
  687.      _gggg_aaaa_tttt_eeee_wwww_aaaa_yyyy_...._pppp_ssss   Cheswick, Bill.  ``The Design  of  a  Secure  Internet
  688.                   Gateway.''    A  description  of  the  design  of  the
  689.                   firewall used by AT&T to protect their corporate  net-
  690.                   work from the Internet.
  691.  
  692.      _iiii_ssss_oooo_cccc_9999_4444_...._pppp_ssss    Avolio, Frederick M. and Marcus J. Ranum.  ``A Network
  693.                   Perimeter  With  Secure External Access.''  A descrip-
  694.                   tion of the firewall in use at _w_h_i_t_e_h_o_u_s_e._g_o_v.
  695.  
  696.      _pppp_aaaa_cccc_kkkk_eeee_tttt_ssss_...._pppp_ssss   Bellovin, Steven M.  ``Packets Found on an Internet.''
  697.                   A  description  of  the types of packets, particularly
  698.                   the  anomalous  ones,  that  appeared  at   the   AT&T
  699.                   firewall.
  700.  
  701.      _pppp_kkkk_tttt_ffff_iiii_llll_tttt_...._pppp_ssss   Chapman, D. Brent.  ``Network (In)Security Through  IP
  702.                   Packet  Filtering.''   A description of how to use the
  703.                   packet filtering features of commercial routers  as  a
  704.                   security tool.
  705.  
  706.      _ssss_cccc_rrrr_eeee_eeee_nnnn_...._pppp_ssss    Mogul, Jeffrey  C.   ``Simple  and  Flexible  Datagram
  707.                   Access Controls for Unix-based Gateways.''  A descrip-
  708.                   tion of the screend _pppp_aaaa_cccc_kkkk_eeee_tttt _ffff_iiii_llll_tttt_eeee_rrrr_iiii_nnnn_gggg _ssss_yyyy_ssss_tttt_eeee_mmmm_....
  709.  
  710.      _tttt_cccc_pppp_wwww_rrrr_aaaa_pppp_...._pppp_ssss   Venema, Wietse.  ``TCP  Wrapper:  Network  Monitoring,
  711.                   Access  Control,  and Booby Traps.''  A description of
  712.                   the author's tcpwrapper _ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_....
  713.  
  714.      _tttt_oooo_oooo_llll_kkkk_iiii_tttt_...._pppp_ssss   Ranum,  Marcus  J.  and  Frederick  M.  Avoilio.   ``A
  715.                   Toolkit  and  Methods  for  Internet  Firewalls.''   A
  716.                   description  of  the   Trusted   Information   Systems
  717.                   Firewall Toolkit.
  718.  
  719.      _uuuu_nnnn_iiii_xxxx_nnnn_eeee_tttt_...._pppp_ssss   Reinhardt, Robert B.  ``An Architectural  Overview  of
  720.                   UNIX  Network Security.'' A description of a number of
  721.  
  722.  
  723.  
  724.                               July 4, 1994
  725.  
  726.  
  727.  
  728.  
  729.  
  730.                                  - 12 -
  731.  
  732.  
  733.                   UNIX-related components of network security,  particu-
  734.                   larly as they pertain to firewalls.
  735.  
  736.      _xxxx_tttt_hhhh_rrrr_uuuu_ffff_wwww_...._pppp_ssss   Treese, G. Winfield and Alec Wolman.  ``X Through  the
  737.                   Firewall,  and  Other Application Relays.'  A descrip-
  738.                   tion of how to create  application-specifc  relays  to
  739.                   pass traffic through a network firewall.
  740.  
  741. _1._4._5.  _////_pppp_aaaa_pppp_eeee_rrrr_ssss_////_gggg_eeee_nnnn_eeee_rrrr_aaaa_llll
  742.  
  743. The _////_pppp_aaaa_pppp_eeee_rrrr_ssss_////_gggg_eeee_nnnn_eeee_rrrr_aaaa_llll directory contains  documents  that  cover  computer
  744. security  in general, and some other miscellaneous topics.  The files in
  745. this directory are:
  746.  
  747.      _bbbb_eeee_rrrr_ffff_eeee_rrrr_dddd_...._pppp_ssss   Cheswick, Bill.  ``An Evening With Berferd: In Which a
  748.                   Cracker  is Lured, Endured, and Studied.''  A descrip-
  749.                   tion of how the  author  kept  an  attacker  ``on  the
  750.                   line''  for  several  months  in  order  to  learn his
  751.                   methods.
  752.  
  753.      _cccc_eeee_rrrr_tttt_rrrr_eeee_ssss_pppp_...._pppp_ssss  Pethia, Richard D. and Kenneth R. van Wyk.  ``Computer
  754.                   Emergency  Response  -  An International Problem.''  A
  755.                   call for international  cooperation  between  computer
  756.                   emergency  response  teams,  and suggested methods for
  757.                   achieving it.
  758.  
  759.      _cccc_oooo_mmmm_pppp_rrrr_oooo_...._tttt_xxxx_tttt   Klaus, Christopher William.   ``Compromise:   What  if
  760.                   Your   Machines  are  Compromised  by  an  Intruder.''
  761.                   Suggestions for securing a system after it has already
  762.                   been compromised.
  763.  
  764.      _dddd_rrrr_aaaa_gggg_oooo_nnnn_ssss_...._pppp_ssss   Bellovin, Steven M.  ``There Be Dragons.''  A descrip-
  765.                   tion  of  the wide variety of attacks attempted on the
  766.                   AT&T Internet firewall.
  767.  
  768.      _eeee_ssss_tttt_cccc_ssss_iiii_rrrr_cccc_...._pppp_ssss  Wack, John  P.   ``Establishing  a  Computer  Security
  769.                   Incident  Response Capability.'' Procedures and issues
  770.                   for establishing a computer security incident response
  771.                   team.
  772.  
  773.      _ffff_aaaa_qqqq_...._tttt_xxxx_tttt      Muffett, Alec.  ``Almost Everything You Wanted To Know
  774.                   About Security.''
  775.  
  776.      _ffff_oooo_rrrr_eeee_nnnn_ssss_iiii_cccc_...._pppp_ssss  Spafford, Eugene  H.   ``Software  Forensics:  Can  We
  777.                   Track  Code  to its Authors?''  An idea that it may be
  778.                   possible to identify the authors of malicious software
  779.                   by the style and features of their programs.
  780.  
  781.      _ffff_tttt_pppp_ffff_aaaa_qqqq_...._tttt_xxxx_tttt   Klaus, Christopher William.  ``How to Set Up a  Secure
  782.                   Anonymous  FTP Site.''  Methods for numerous different
  783.                   operating systems.
  784.  
  785.      _ffff_uuuu_aaaa_tttt_...._pppp_ssss      Baran,  Fuat,  Howard  Kaye,  and  Margarita   Suarez.
  786.                   ``Security Breaches: Five Recent Incidents at Columbia
  787.  
  788.  
  789.  
  790.                               July 4, 1994
  791.  
  792.  
  793.  
  794.  
  795.  
  796.                                  - 13 -
  797.  
  798.  
  799.                   University.''  A detailed account of five break-ins at
  800.                   Columbia University, and the steps taken to stop them.
  801.  
  802.      _hhhh_aaaa_cccc_kkkk_eeee_rrrr_...._tttt_xxxx_tttt   Meyer, Gordon R.  ``The  Social  Organization  of  the
  803.                   Computer  Underground.''   The  author's  thesis for a
  804.                   master's degree in sociology.
  805.  
  806.      _hhhh_aaaa_nnnn_dddd_bbbb_oooo_oooo_kkkk_...._tttt_xxxx_tttt Holbrook, P. and J. Reynolds.  ``Site  Security  Hand-
  807.                   book  -  RFC 1244.''  The product of the Site Security
  808.                   Policy  Handbook  Working  Group   of   the   Internet
  809.                   Engineering Task Force.
  810.  
  811.      _hhhh_oooo_llll_llll_aaaa_nnnn_dddd_...._pppp_ssss   Van Doorn, Leendert.   ``Computer  Break-ins:  A  Case
  812.                   Study.''   A  study  of  multiple break-in attempts at
  813.                   Vrije Universiteit in Amsterdam.
  814.  
  815.      _nnnn_eeee_tttt_cccc_aaaa_ssss_hhhh_1111_...._pppp_ssss  Medvinsky, Gennady and B.  Clifford  Neuman.   ``Elec-
  816.                   tronic  Currency  for the Internet.''  A framework for
  817.                   electronic currency for the Internet that  provides  a
  818.                   real-time electronic payment system.
  819.  
  820.      _nnnn_eeee_tttt_cccc_aaaa_ssss_hhhh_2222_...._pppp_ssss  Medvinsky, Gennady and B. Clifford Neuman.  ``NetCash:
  821.                   A  Design  for  Practical  Electronic  Currency on the
  822.                   Internet.'' A framework for  electronic  currency  for
  823.                   the Internet that provides a real-time electronic pay-
  824.                   ment system.
  825.  
  826.      _nnnn_iiii_ssss_tttt_...._tttt_xxxx_tttt     Helsing, Cheryl, Marianne Swanson, and Mary Anne Todd.
  827.                   ``Computer  User's Guide to the Protection of Informa-
  828.                   tion Resources.''  A report  from  the  U.S.  National
  829.                   Institute of Standards and Technology.
  830.  
  831.      _nnnn_iiii_ssss_tttt_bbbb_oooo_oooo_kkkk     Roback, Edward and Barbara Guttman.  ``An Introduction
  832.                   to  Computer Security:  The NIST Handbook.''  A publi-
  833.                   cation of the U.S. National Institute of Standards and
  834.                   Technology.   This is a draft copy, included with per-
  835.                   mission.
  836.  
  837.      _pppp_aaaa_tttt_cccc_hhhh_eeee_ssss_...._tttt_xxxx_tttt  Klaus, Christopher William.   ``Security  Patches  FAQ
  838.                   for Your System: The Patch List.''  A list of security
  839.                   patches for most any  operating  system,  and  how  to
  840.                   obtain them.
  841.  
  842.      _pppp_bbbb_aaaa_aaaa_...._pppp_ssss      Neuman, B. Clifford.  ``Proxy-Based Authorization  and
  843.                   Accounting for Distributed Systems.'' A method to sup-
  844.                   port both authorization and accounting  in  a  distri-
  845.                   buted environment.
  846.  
  847.      _pppp_nnnn_eeee_tttt_eeee_xxxx_tttt_...._pppp_ssss   Bellovin, S. M.  ``Pseudo-Network Drivers and  Virtual
  848.                   Networks.''   A  method  for creating pseudo-networks,
  849.                   much like the pseudo-terminals in  use  on  many  UNIX
  850.                   systems.
  851.  
  852.      _pppp_rrrr_iiii_mmmm_eeee_rrrr_...._pppp_ssss    Brand,  Russell  L.   ``Coping  with  the  Threat   of
  853.  
  854.  
  855.  
  856.                               July 4, 1994
  857.  
  858.  
  859.  
  860.  
  861.  
  862.                                  - 14 -
  863.  
  864.  
  865.                   Computer Security Incidents:  A Primer from Prevention
  866.                   through Recovery.'' A  basic  text  for  the  author's
  867.                   one-day  seminar  on the practical aspects of computer
  868.                   security in an unclassified networked environment.
  869.  
  870.      _tttt_oooo_oooo_llll_ssss_...._pppp_ssss     Polk, W. Timothy.  ``Automated Tools for Testing  Com-
  871.                   puter  System  Vulnerability.''  Discusses some of the
  872.                   automated tools for checking the security  of  a  wide
  873.                   variety of systems.
  874.  
  875.      _vvvv_eeee_nnnn_dddd_oooo_rrrr_ssss_...._tttt_xxxx_tttt  Klaus, Christopher William.   ``Vendor  Security  Con-
  876.                   tacts:  Reporting  Vulnerabilities  and  Obtaining New
  877.                   Patches.''  Contact names, numbers, and addresses  for
  878.                   most major operating systems.
  879.  
  880. _1._4._6.  _////_pppp_aaaa_pppp_eeee_rrrr_ssss_////_llll_eeee_gggg_aaaa_llll
  881.  
  882. The _////_pppp_aaaa_pppp_eeee_rrrr_ssss_////_llll_eeee_gggg_aaaa_llll directory contains documents related to computer secu-
  883. rity, the law, and ethics.  The files in this directory are:
  884.  
  885.      _bbbb_bbbb_ssss_llll_iiii_bbbb_eeee_llll_...._tttt_xxxx_tttt Kahn, John R.  ``Defamation Liability of  Computerized
  886.                   Bulletin  Board  Operators and Problems of Proof.''  A
  887.                   discussion of the libel and slander laws, and how they
  888.                   apply to bulletin board operators.
  889.  
  890.      _cccc_ffff_aaaa_...._tttt_xxxx_tttt      Complete text of the Computer Fraud and Abuse  Act  of
  891.                   1986, 18 U.S.C. 1030.
  892.  
  893.      _cccc_oooo_pppp_yyyy_rrrr_ffff_aaaa_qqqq_...._tttt_xxxx_tttt Carroll, Terry.  ``Frequently  Asked  Questions  About
  894.                   Copyright.''
  895.  
  896.      _cccc_ssss_llll_aaaa_wwww_...._tttt_xxxx_tttt    Morris, Gary S.  ``Computer Security and the Law.''  A
  897.                   review  of legal issues surrounding computer security,
  898.                   for the system administrator.
  899.  
  900.      _cccc_uuuu_bbbb_bbbb_yyyy_...._tttt_xxxx_tttt    The complete text of the judge's decision in the Cubby
  901.                   v.  CompuServe  libel  case,  in  which CompuServe was
  902.                   found not to be responsible for material posted on one
  903.                   of their bulletin boards.
  904.  
  905.      _eeee_cccc_pppp_aaaa_...._tttt_xxxx_tttt     Complete text of the Electronic Communications Privacy
  906.                   Act of 1986, United States Public Law 99-508.
  907.  
  908.      _eeee_llll_aaaa_wwww_...._pppp_ssss      Loundy, David J.  ``E-Law: Legal Issues Affecting Com-
  909.                   puter  Information Systems and System Operator Liabil-
  910.                   ity.''  First appeared in the Albany  Law  Journal  of
  911.                   Science and Technology, Volume 3, Number 1.
  912.  
  913.      _eeee_tttt_hhhh_iiii_cccc_ssss_...._pppp_ssss    Spafford, Eugene H.  ``Are Computer  Hacker  Break-ins
  914.                   Ethical?''   Lists  and  refutes  many  of the reasons
  915.                   given to justify computer break-ins.
  916.  
  917.      _ffff_eeee_rrrr_pppp_aaaa_...._tttt_xxxx_tttt    The complete text of the U.S. Family Educational Right
  918.                   to  Privacy  Act  (the  Buckley  Amendment), 20 U.S.C.
  919.  
  920.  
  921.  
  922.                               July 4, 1994
  923.  
  924.  
  925.  
  926.  
  927.  
  928.                                  - 15 -
  929.  
  930.  
  931.                   1232g.
  932.  
  933.      _ffff_rrrr_llll_aaaa_wwww_...._tttt_xxxx_tttt    Information about the computer crime laws in France.
  934.  
  935.      _hhhh_aaaa_nnnn_ssss_eeee_nnnn_...._tttt_xxxx_tttt   Hansen, Stephen E.  ``Legal Issues, A  Site  Manager's
  936.                   Nightmare.''  Examines the legal ramifications of com-
  937.                   puter security laws on system administrators.
  938.  
  939.      _llll_iiii_bbbb_eeee_llll_...._tttt_xxxx_tttt    Godwin,  Mike.   ``Internet  Libel:  Is  the  Provider
  940.                   Responsible?''   An  examination  of the Cubby v. Com-
  941.                   puserve case as it applies to Internet service provid-
  942.                   ers.
  943.  
  944.      _mmmm_aaaa_iiii_llll_pppp_rrrr_iiii_vvvv_...._tttt_xxxx_tttt Hernandez, Ruel T.   ``Computer  Electronic  Mail  and
  945.                   Privacy.''   A discussion of the Electronic Communica-
  946.                   tions Privacy Act as it applies to electronic mail.
  947.  
  948.      _mmmm_uuuu_ssss_iiii_nnnn_gggg_ssss_...._pppp_ssss   Spafford, Eugene H.  ``Some Musings on Ethics and Com-
  949.                   puter Break-Ins.''  A discussion of ethics and respon-
  950.                   sibility, particularly as they pertain to the Internet
  951.                   Worm of November, 1988.
  952.  
  953.      _pppp_rrrr_iiii_vvvv_aaaa_cccc_yyyy_...._pppp_ssss   Complete text of the Privacy Act of  1974  and  Amend-
  954.                   ments, 5 U.S.C. 552a.
  955.  
  956.      _ssss_iiii_mmmm_ssss_oooo_nnnn_...._pppp_ssss    Garfinkel,  Simson.   ``An  Introduction  to  Computer
  957.                   Security  for Lawyers.''  A number of articles serving
  958.                   to introduce lawyers to the concepts  behind  computer
  959.                   security.
  960.  
  961.      _ssss_eeee_nnnn_tttt_eeee_nnnn_cccc_eeee_...._tttt_xxxx_tttt King,  Jack.   ``Revised  Computer  Crime   Sentencing
  962.                   Guidelines.''   A  description of the new federal sen-
  963.                   tencing guidelines that address the Computer Fraud and
  964.                   Abuse Act.
  965.  
  966.      _ssss_tttt_aaaa_tttt_eeee_llll_aaaa_wwww_...._tttt_xxxx_tttt Computer crime laws, listed by state.
  967.  
  968. _1._4._7.  _////_pppp_aaaa_pppp_eeee_rrrr_ssss_////_pppp_aaaa_ssss_ssss_wwww_oooo_rrrr_dddd
  969.  
  970. The _////_pppp_aaaa_pppp_eeee_rrrr_ssss_////_pppp_aaaa_ssss_ssss_wwww_oooo_rrrr_dddd directory contains documents related to  passwords.
  971. The files in this directory are:
  972.  
  973.      _dddd_oooo_dddd_pppp_wwww_mmmm_aaaa_nnnn_...._tttt_xxxx_tttt ``Department of  Defense  Password  Management  Guide-
  974.                   line.''   Enumerates a number of good password manage-
  975.                   ment practices.
  976.  
  977.      _ffff_iiii_pppp_ssss_1111_8888_1111_...._tttt_xxxx_tttt  National  Institute  of  Standards   and   Technology.
  978.                   ``Standard   for   Automated   Password   Generator.''
  979.                   Federal Information Processing Standard No. 181.
  980.  
  981.      _kkkk_llll_eeee_iiii_nnnn_...._pppp_ssss     Klein, Daniel V.  ``Foiling the Cracker: A Survey  of,
  982.                   and  Improvements  to,  Password  Security.''   Demon-
  983.                   strates the ease with  which  most  passwords  can  be
  984.                   guessed by a motivated attacker.
  985.  
  986.  
  987.  
  988.                               July 4, 1994
  989.  
  990.  
  991.  
  992.  
  993.  
  994.                                  - 16 -
  995.  
  996.  
  997.      _oooo_bbbb_ssss_eeee_rrrr_vvvv_eeee_...._pppp_ssss   Spafford, Eugene  H.   ``Observing  Reusable  Password
  998.                   Choices.''   A  method  for observing password choices
  999.                   made by users,  and  how  to  protect  it  from  being
  1000.                   compromised.
  1001.  
  1002.      _oooo_pppp_uuuu_ssss_...._pppp_ssss      Spafford, Eugene H.  ``OPUS:  Preventing Weak Password
  1003.                   Choices.''  A system that uses Bloom filters to imple-
  1004.                   ment a constant-time dictionary lookup, regardless  of
  1005.                   dictionary size, to check a user's password choice for
  1006.                   ``goodness.''
  1007.  
  1008.      _pppp_aaaa_ssss_ssss_bbbb_iiii_bbbb_...._pppp_ssss   Spafford, Eugene H. and  Stephen  A.  Weeber.   ``User
  1009.                   Authentication   and   Related  Topics:  An  Annotated
  1010.                   Bibliography.''
  1011.  
  1012.      _pppp_wwww_ssss_tttt_uuuu_dddd_yyyy_...._pppp_ssss   Morris, Robert and Ken Thompson.  ``Password Security:
  1013.                   A  Case History.''  A description of the original UNIX
  1014.                   password algorithm, and the reasons for  replacing  it
  1015.                   with the current one.
  1016.  
  1017.      _pppp_wwww_tttt_eeee_nnnn_yyyy_rrrr_ssss_...._pppp_ssss  Feldmeier, David C. and Philip R. Karn.  ``UNIX  Pass-
  1018.                   word Security - Ten Years Later.''  A reexamination of
  1019.                   the  UNIX  password  algorithm  after  ten  years   of
  1020.                   advances in software and hardware.
  1021.  
  1022.      _ssss_kkkk_eeee_yyyy_...._pppp_ssss      Haller, Neil M.  ``The S/Key  One-Time  Password  Sys-
  1023.                   tem.''  A  freely available implementation of one-time
  1024.                   passwords.
  1025.  
  1026. _1._4._8.  _////_pppp_aaaa_pppp_eeee_rrrr_ssss_////_pppp_rrrr_oooo_tttt_oooo_cccc_oooo_llll
  1027.  
  1028. The _////_pppp_aaaa_pppp_eeee_rrrr_ssss_////_pppp_rrrr_oooo_tttt_oooo_cccc_oooo_llll directory contains documents related to the  design
  1029. of  secure  network  protocols, and to the security analysis of existing
  1030. protocols.  The files in this directory are:
  1031.  
  1032.      _aaaa_ffff_ssss_...._pppp_ssss       Honeyman,  P.,  L.  B.  Huston,  M.  T.    Stolarchuk.
  1033.                   ``Highjacking   AFS.''    A  description  of  security
  1034.                   weaknesses in the Andrew File System (AFS).
  1035.  
  1036.      _eeee_2222_eeee_...._pppp_ssss       Estrin, Deborah  and  Gene  Tsudik.   ``An  End-to-End
  1037.                   Argument  for  Network Layer, Inter-Domain Access Con-
  1038.                   trols.''  A method by which  different  administrative
  1039.                   domains  of  an  internetwork can interconnect without
  1040.                   exposing  their  internal  resources  to  unrestricted
  1041.                   access.
  1042.  
  1043.      _iiii_dddd_eeee_nnnn_tttt_...._tttt_xxxx_tttt    St. Johns, M.  ``Identification Protocol - RFC 1413.''
  1044.                   A  description of the Identification Protocol, a means
  1045.                   to determine the identity of the user of a  particular
  1046.                   TCP connection.
  1047.  
  1048.      _iiii_pppp_eeee_xxxx_tttt_...._pppp_ssss     Bellovin, S. M.  ``Security  Problems  in  the  TCP/IP
  1049.                   Protocol Suite.''  A description of several attacks on
  1050.                   TCP/IP protocols including sequence  number  spoofing,
  1051.  
  1052.  
  1053.  
  1054.                               July 4, 1994
  1055.  
  1056.  
  1057.  
  1058.  
  1059.  
  1060.                                  - 17 -
  1061.  
  1062.  
  1063.                   routing  attacks, source address spoofing, and authen-
  1064.                   tication attacks.
  1065.  
  1066.      _nnnn_iiii_ssss_...._pppp_ssss       Hess, David K., David R. Safford, and  Udo  W.  Pooch.
  1067.                   ``A  Unix  Network  Protocol  Security  Study: Network
  1068.                   Information Service.''  A discussion of  the  security
  1069.                   weaknesses  in the Network Information Service (Yellow
  1070.                   Pages) protocol from Sun Microsystems.
  1071.  
  1072.      _nnnn_tttt_pppp_...._pppp_ssss       Bishop, Matt.  ``A Security Analysis of the NTP Proto-
  1073.                   col.''  A security analysis of the Network Time Proto-
  1074.                   col (NTP).
  1075.  
  1076.      _oooo_aaaa_kkkk_9999_3333_...._pppp_ssss     Stubblebine, Stuart G. and Virgil D. Gligar.  ``Proto-
  1077.                   col  Design  for  Integrity  Protection.''   A  design
  1078.                   method for message integrity protection.
  1079.  
  1080.      _pppp_eeee_mmmm_...._pppp_ssss       Bishop, Matt.  ``Privacy-Enhanced  Electronic  Mail.''
  1081.                   A  description  of  the Internet Privacy-Enhanced Mail
  1082.                   protocols.
  1083.  
  1084.      _tttt_cccc_pppp_...._pppp_ssss       Morris, Robert T.  ``A Weakness in the  4.2BSD  TCP/IP
  1085.                   Software.''   A  description of a security weakness of
  1086.                   the TCP/IP protocol suite  as  implemented  in  4.2BSD
  1087.                   UNIX.
  1088.  
  1089.      _tttt_iiii_mmmm_eeee_...._pppp_ssss      Bishop, Matt.  ``Security  Analyses  of  Network  Time
  1090.                   Services.''   An analysis of the security requirements
  1091.                   for a network time service.
  1092.  
  1093.      _tttt_rrrr_aaaa_nnnn_ssss_iiii_tttt_...._pppp_ssss   Estrin, Deborah and Gene Tsudik.  ``Secure Control  of
  1094.                   Transit  Internetwork Traffic.''  Methods for control-
  1095.                   ling traffic traversing a local  network  on  its  way
  1096.                   from one remote network to another.
  1097.  
  1098.      _tttt_ssss_uuuu_dddd_iiii_kkkk       Tsudik,  Gene.    This   subdirectory   contains   the
  1099.                   PostScript  files  that  make  up ``Access Control and
  1100.                   Policy Enforcement  in  Internetworks.''   Methods  of
  1101.                   controlling  access  policy between different adminis-
  1102.                   trative domains of an internetwork.
  1103.  
  1104. _1._4._9.  _////_pppp_aaaa_pppp_eeee_rrrr_ssss_////_uuuu_nnnn_iiii_xxxx
  1105.  
  1106. The _////_pppp_aaaa_pppp_eeee_rrrr_ssss_////_uuuu_nnnn_iiii_xxxx directory contains documents related to the security of
  1107. the UNIX operating system.  The files in this directory are:
  1108.  
  1109.      _cccc_oooo_pppp_ssss_...._pppp_ssss      Farmer, Daniel and Eugene  H.  Spafford.   ``The  COPS
  1110.                   Security  Checker  System.''   A description of one of
  1111.                   the most popular UNIX security scanners.
  1112.  
  1113.      _ffff_aaaa_rrrr_mmmm_eeee_rrrr_...._tttt_xxxx_tttt   Farmer, Dan and Wietse Venema.  ``Improving the  Secu-
  1114.                   rity  of  Your Site by Breaking Into It.''  Discussion
  1115.                   of a number of commonly used attacks on UNIX  systems,
  1116.                   and  how  to  check  your systems for vulnerability to
  1117.  
  1118.  
  1119.  
  1120.                               July 4, 1994
  1121.  
  1122.  
  1123.  
  1124.  
  1125.  
  1126.                                  - 18 -
  1127.  
  1128.  
  1129.                   them.
  1130.  
  1131.      _nnnn_iiii_dddd_eeee_ssss        This  subdirectory  contains  papers  describing   the
  1132.                   Next-Generation   Intrusion  Detection  Expert  System
  1133.                   (NIDES) from SRI International.  This system  monitors
  1134.                   the  C2  audit trails generated by Sun workstations in
  1135.                   real-time and alerts the  administrator  to  anomalous
  1136.                   user behavior.  The papers in this subdirectory are:
  1137.  
  1138.                   _cccc_aaaa_nnnn_aaaa_dddd_aaaa_9999_3333_...._pppp_ssss  Lunt, Teresa F.  ``Detecting Intruders in
  1139.                                Computer Systems.''
  1140.  
  1141.                   _rrrr_eeee_qqqq_tttt_ssss_9999_4444_...._pppp_ssss   Lunt,  Teresa  F.  and  Debra   Anderson.
  1142.                                ``Software   Requirements  Specification:
  1143.                                Next   Generation   Intrusion   Detection
  1144.                                Expert System.''
  1145.  
  1146.                   _ssss_aaaa_ffff_eeee_gggg_aaaa_rrrr_dddd_...._pppp_ssss  Anderson, Debra, Teresa F.  Lunt,  Harold
  1147.                                Javitz,   Ann   Tamaru,  Alfonso  Valdes.
  1148.                                ``SAFEGUARD   Final   Report:   Detecting
  1149.                                Unusual  Program Behavior Using the NIDES
  1150.                                Statistical Component.''
  1151.  
  1152.                   _ssss_tttt_aaaa_tttt_rrrr_eeee_pppp_tttt_...._pppp_ssss  Javitz, Harold  S.  and  Alfonso  Valdes.
  1153.                                ``The    NIDES   Statistical   Component:
  1154.                                Description and Justification.''
  1155.  
  1156.                   _ssss_uuuu_rrrr_vvvv_eeee_yyyy_...._pppp_ssss    Lunt, Teresa F.  ``Automated Audit  Trail
  1157.                                Analysis and Intrusion Detection:  A Sur-
  1158.                                vey.''
  1159.  
  1160.      _nnnn_oooo_rrrr_oooo_oooo_tttt_...._pppp_ssss    Simmons, Steve.  ``Life Without Root.'' A  method  for
  1161.                   authorizing  users  to perform certain system adminis-
  1162.                   tration tasks without giving them the super-user pass-
  1163.                   word.
  1164.  
  1165.      _pppp_aaaa_ssss_ssss_wwww_oooo_rrrr_dddd_...._pppp_ssss  Belgers, Walter.  ``UNIX Password Security.''  A  dis-
  1166.                   cussion  of  the  importance of well-chosen passwords,
  1167.                   and how passwords are cracked.
  1168.  
  1169.      _rrrr_iiii_tttt_cccc_hhhh_iiii_eeee_...._pppp_ssss   Ritchie, Dennis M.  ``On the Security of UNIX.''   The
  1170.                   original UNIX security paper.
  1171.  
  1172.      _ssss_eeee_ssss_ssss_eeee_xxxx_tttt_...._pppp_ssss   Bellovin, S. M.  ``The  `Session  Tty'  Manager.''   A
  1173.                   method  for  controlling  access to terminals by back-
  1174.                   ground processes after the user has logged out.
  1175.  
  1176.      _ssss_rrrr_iiii_...._pppp_ssss       Curry, David A.  ``Improving the Security of Your UNIX
  1177.                   System.''   A  description  of  many  of  the security
  1178.                   features of the average UNIX system, and  how  to  use
  1179.                   them.
  1180.  
  1181.      _tttt_oooo_oooo_llll_ssss_...._pppp_ssss     Morrison, Geoff.  ``UNIX Security Tools.''  An  excel-
  1182.                   lent  summary  of  most  of  the  public  domain  UNIX
  1183.  
  1184.  
  1185.  
  1186.                               July 4, 1994
  1187.  
  1188.  
  1189.  
  1190.  
  1191.  
  1192.                                  - 19 -
  1193.  
  1194.  
  1195.                   security tools, and where to obtain them.  Almost  all
  1196.                   of these tools are available on this CD-ROM.
  1197.  
  1198.      _tttt_rrrr_iiii_pppp_wwww_iiii_rrrr_eeee_...._pppp_ssss  Kim, Gene H. and Eugene H. Spafford.  ``The Design and
  1199.                   Implementation  of  Tripwire:  A File System Integrity
  1200.                   Checker.''  Tripwire computes checksums  of  files  on
  1201.                   the  system,  and  then scans later for any changes to
  1202.                   those files.
  1203.  
  1204.      _tttt_wwww_eeee_xxxx_pppp_eeee_rrrr_...._pppp_ssss   Kim, Gene H. and Eugene  H.  Spafford.   ``Experiences
  1205.                   With  Tripwire: Using Integrity Checkers for Intrusion
  1206.                   Detection.''   A  description  of  how  the   Tripwire
  1207.                   integrity  checker  (see _tttt_rrrr_iiii_pppp_wwww_iiii_rrrr_eeee_...._pppp_ssss) has performed in
  1208.                   the field.
  1209.  
  1210.      _uuuu_nnnn_iiii_xxxx_ssss_eeee_cccc_...._pppp_ssss   Bac'`ic', Eugen Mate.  ``UNIX  &  Security.''   Describes
  1211.                   many  of  the  security features of the UNIX operating
  1212.                   system, as well as features that  could  be  added  to
  1213.                   result in an evaluatable system at Class C2.
  1214.  
  1215.      _uuuu_tttt_nnnn_eeee_tttt_...._pppp_ssss     Spurgeon, Charles.  ``UTnet Guide to UNIX System Secu-
  1216.                   rity.''  A guide to UNIX security resources.
  1217.  
  1218. _1._4._1_0.  _////_pppp_aaaa_pppp_eeee_rrrr_ssss_////_vvvv_iiii_rrrr_uuuu_ssss
  1219.  
  1220. The _////_pppp_aaaa_pppp_eeee_rrrr_ssss_////_vvvv_iiii_rrrr_uuuu_ssss  directory  contains  documents  related  to  computer
  1221. viruses,  worms,  etc.   The Internet Worm papers are in this directory.
  1222. The files in this directory are:
  1223.  
  1224.      _aaaa_llll_iiii_ffff_eeee_...._pppp_ssss     Spafford, Eugene H.  ``Computer Viruses as  Artificial
  1225.                   Life.''  A consideration of computer viruses as artif-
  1226.                   icial life - self-replicating organisms.
  1227.  
  1228.      _ffff_aaaa_qqqq_...._tttt_xxxx_tttt      Readers of _V_I_R_U_S-_L and _c_o_m_p._v_i_r_u_s.  ``Frequently Asked
  1229.                   Questions on VIRUS-L/comp.virus.''
  1230.  
  1231.      _ffff_eeee_dddd_eeee_llll_iiii_...._tttt_xxxx_tttt   Fedeli, Alan.   ``Organizing  a  Corporate  Anti-Virus
  1232.                   Effort.''   A description of how IBM Corp. has learned
  1233.                   to cope with computer viruses and related threats.
  1234.  
  1235.      _gggg_aaaa_oooo_...._tttt_xxxx_tttt      United States Government  Accounting  Office.   ``Com-
  1236.                   puter  Security.'' The G.A.O.'s report on the Internet
  1237.                   Worm of November, 1988, and on the then-current  state
  1238.                   of  Internet  vulnerabilities  and prosecution of com-
  1239.                   puter virus cases.
  1240.  
  1241.      _iiii_wwww_oooo_rrrr_mmmm_1111_...._pppp_ssss    Spafford, Eugene H.  ``The Internet Worm  Program:  An
  1242.                   Analysis.''  A  description  of the algorithms used by
  1243.                   the Internet Worm program of November 2, 1988.
  1244.  
  1245.      _iiii_wwww_oooo_rrrr_mmmm_2222_...._pppp_ssss    Spafford, Eugene H.  ``The Internet  Worm  Incident.''
  1246.                   A  description  of the events involved in the Internet
  1247.                   Worm of November 2, 1988.
  1248.  
  1249.  
  1250.  
  1251.  
  1252.                               July 4, 1994
  1253.  
  1254.  
  1255.  
  1256.  
  1257.  
  1258.                                  - 20 -
  1259.  
  1260.  
  1261.      _mmmm_aaaa_llll_llll_oooo_gggg_iiii_cccc_...._pppp_ssss  Bishop, Matt.  ``An Overview of Computer Viruses in  a
  1262.                   Research  Environment.''   An  examination of computer
  1263.                   viruses as malicious logic in a research and  develop-
  1264.                   ment environment and current techniques in controlling
  1265.                   the threats of viruses and other malicious logic  pro-
  1266.                   grams.
  1267.  
  1268.      _mmmm_gggg_tttt_gggg_uuuu_iiii_dddd_eeee_...._pppp_ssss  Wack,  John  P.  and  Lisa  J.  Carnahan.   ``Computer
  1269.                   Viruses  and  Related  Threats:  A Management Guide.''
  1270.                   Guidelines for preventing, deterring, containing,  and
  1271.                   recovering   from   attacks  of  viruses  and  related
  1272.                   threats.  A report from the U.S. National Institute of
  1273.                   Standards and Technology.
  1274.  
  1275.      _mmmm_iiii_tttt_...._pppp_ssss       Eichin, Mark W. and Jon A. Rochlis.  ``With Microscope
  1276.                   and  Tweezers:  An  Analysis  of the Internet Virus of
  1277.                   November 1988.''  A detailed description of the events
  1278.                   of  the  Internet Worm of November 2, 1988 from one of
  1279.                   the teams of people who combatted it.
  1280.  
  1281.      _ssss_eeee_llll_gggg_uuuu_iiii_dddd_eeee_...._pppp_ssss  Polk, W. T. and L.  E.  Bassham.   ``A  Guide  to  the
  1282.                   Selection  of  Anti-Virus Tools and Techniques.'' Cri-
  1283.                   teria for judging the functionality, practicality, and
  1284.                   convenience  of  anti-virus  tools.  A report from the
  1285.                   U.S. National Institute of Standards and Technology.
  1286.  
  1287.      _tttt_oooo_uuuu_rrrr_...._pppp_ssss      Seeley, Donn.  ``A Tour of the Worm.''  A tour of  the
  1288.                   Internet Worm of November 2, 1988.
  1289.  
  1290. _1._5.  _////_pppp_aaaa_ssss_ssss_dddd_iiii_cccc_tttt
  1291.  
  1292. The _////_pppp_aaaa_ssss_ssss_dddd_iiii_cccc_tttt directory contains a collection of password cracking  dic-
  1293. tionaries   in  various  languages.   The  directory  is  subdivided  by
  1294. language, with dictionaries from different sources in different files.
  1295.  
  1296. _1._6.  _////_pppp_oooo_llll_iiii_cccc_iiii_eeee_ssss
  1297.  
  1298. The _////_pppp_oooo_llll_iiii_cccc_iiii_eeee_ssss directory contains a  collection  of  policies  on  vaious
  1299. topics,  maintained  as  part  of  the  Computers  and  Academic Freedom
  1300. archives of the Electronic Freedom Foundation.
  1301.  
  1302. _N_O_T_E:  The files in this  directory  are  stored  in  a  single  ``tar''
  1303. archive,  because  the  archive  creators used extremely long file names
  1304. that are not  easily  reduced  to  the  8-character  limit  required  by
  1305. ISO-9660.  This ``tar'' archive will have to be extracted on a UNIX sys-
  1306. tem; MS-DOS will not handle the file names well at all.
  1307.  
  1308. _1._7.  _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee
  1309.  
  1310. The _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee directory contains public  domain  (or  freely  available)
  1311. software  tools  that  are  related  to  computer  security  or incident
  1312. response.  Some of these programs are  directed  at  computer  security,
  1313. others  have  primary  purposes doing other things, but can be useful in
  1314. the security field as well.  Where possible, source  code  is  provided.
  1315.  
  1316.  
  1317.  
  1318.                               July 4, 1994
  1319.  
  1320.  
  1321.  
  1322.  
  1323.  
  1324.                                  - 21 -
  1325.  
  1326.  
  1327. In  cases  where  binaries only are provided, use them at your own risk.
  1328. Within the _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee directory, the following subdirectories are  avail-
  1329. able:
  1330.  
  1331.      _dddd_oooo_ssss          Software for PCs running MS-DOS.
  1332.  
  1333.      _mmmm_aaaa_cccc          Software for the Macintosh.
  1334.  
  1335.      _uuuu_nnnn_iiii_xxxx         Software for various flavors  of  the  UNIX  operating
  1336.                   system.
  1337.  
  1338. _1._7._1.  _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_dddd_oooo_ssss
  1339.  
  1340. The _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_dddd_oooo_ssss directory contains software for  PCs  running  MS-DOS.
  1341. The subdirectories of this directory are:
  1342.  
  1343.      _nnnn_eeee_tttt_wwww_oooo_rrrr_kkkk      Programs for controlling access to a  system  via  the
  1344.                   network.
  1345.  
  1346.      _ssss_eeee_cccc_uuuu_rrrr_iiii_tttt_yyyy     Programs for controlling PC security.
  1347.  
  1348.      _vvvv_iiii_rrrr_uuuu_ssss        Anti-virus utilities.
  1349.  
  1350. _1._7._1._1.  _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_dddd_oooo_ssss_////_nnnn_eeee_tttt_wwww_oooo_rrrr_kkkk
  1351.  
  1352. The _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_dddd_oooo_ssss_////_nnnn_eeee_tttt_wwww_oooo_rrrr_kkkk directory contains  programs  for  controlling
  1353. access to a system via the network.  The files in this subdirectory are:
  1354.  
  1355.      _kkkk_bbbb_rrrr_iiii_dddd_gggg_eeee_...._zzzz_iiii_pppp  The KarlBridge _pppp_aaaa_cccc_kkkk_aaaa_gggg_eeee _bbbb_yyyy _DDDD_oooo_uuuu_gggg _KKKK_aaaa_rrrr_llll_....  _AAAA  _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm  _tttt_hhhh_aaaa_tttt
  1356.                   _rrrr_uuuu_nnnn_ssss  _oooo_nnnn _aaaa _PPPP_CCCC _wwww_iiii_tttt_hhhh _tttt_wwww_oooo _EEEE_tttt_hhhh_eeee_rrrr_nnnn_eeee_tttt _bbbb_oooo_aaaa_rrrr_dddd_ssss_,,,, _tttt_uuuu_rrrr_nnnn_iiii_nnnn_gggg _tttt_hhhh_eeee _PPPP_CCCC
  1357.                   _iiii_nnnn_tttt_oooo  _aaaa  _ssss_oooo_pppp_hhhh_iiii_ssss_tttt_iiii_cccc_aaaa_tttt_eeee_dddd_,,,,  _hhhh_iiii_gggg_hhhh_----_llll_eeee_vvvv_eeee_llll_,,,,  _pppp_aaaa_cccc_kkkk_eeee_tttt_----_ffff_iiii_llll_tttt_eeee_rrrr_iiii_nnnn_gggg
  1358.                   _bbbb_rrrr_iiii_dddd_gggg_eeee_....   _IIII_tttt _cccc_aaaa_nnnn _ffff_iiii_llll_tttt_eeee_rrrr _pppp_aaaa_cccc_kkkk_eeee_tttt_ssss _bbbb_aaaa_ssss_eeee_dddd _oooo_nnnn _aaaa_nnnn_yyyy _ssss_pppp_eeee_cccc_iiii_ffff_iiii_eeee_dddd
  1359.                   _pppp_rrrr_oooo_tttt_oooo_cccc_oooo_llll_,,,,  _iiii_nnnn_cccc_llll_uuuu_dddd_iiii_nnnn_gggg  _IIII_PPPP_,,,,  _XXXX_NNNN_SSSS_,,,,  _DDDD_EEEE_CCCC_NNNN_EEEE_TTTT_,,,,   _LLLL_AAAA_TTTT_,,,,   _IIII_PPPP_XXXX_,,,,
  1360.                   _AAAA_pppp_pppp_llll_eeee_TTTT_aaaa_llll_kkkk_,,,, _eeee_tttt_cccc_....  _VVVV_eeee_rrrr_ssss_iiii_oooo_nnnn _2222_...._0000_....
  1361.  
  1362. _1._7._1._2.  _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_dddd_oooo_ssss_////_ssss_eeee_cccc_uuuu_rrrr_iiii_tttt_yyyy
  1363.  
  1364. The _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_dddd_oooo_ssss_////_ssss_eeee_cccc_uuuu_rrrr_iiii_tttt_yyyy directory contains programs  for  controlling
  1365. PC  security.   The  files  in this directory are a mirror of the SimTel
  1366. _////_mmmm_ssss_dddd_oooo_ssss_////_ssss_eeee_cccc_uuuu_rrrr_iiii_tttt_yyyy archive from oak.oakland.edu_....  _SSSS_eeee_eeee _tttt_hhhh_eeee _ffff_iiii_llll_eeee _0000_0000______iiii_nnnn_dddd_eeee_xxxx_...._tttt_xxxx_tttt
  1367. _ffff_oooo_rrrr _aaaa _dddd_eeee_ssss_cccc_rrrr_iiii_pppp_tttt_iiii_oooo_nnnn _oooo_ffff _tttt_hhhh_eeee _ffff_iiii_llll_eeee_ssss _iiii_nnnn _tttt_hhhh_iiii_ssss _dddd_iiii_rrrr_eeee_cccc_tttt_oooo_rrrr_yyyy_....
  1368.  
  1369. _1._7._1._3.  _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_dddd_oooo_ssss_////_vvvv_iiii_rrrr_uuuu_ssss
  1370.  
  1371. The _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_dddd_oooo_ssss_////_vvvv_iiii_rrrr_uuuu_ssss directory contains  anti-virus  utilities.   The
  1372. files  in this directory are a mirror of the SimTel _////_mmmm_ssss_dddd_oooo_ssss_////_vvvv_iiii_rrrr_uuuu_ssss archive
  1373. from oak.oakland.edu_....  _SSSS_eeee_eeee _tttt_hhhh_eeee _ffff_iiii_llll_eeee _0000_0000______iiii_nnnn_dddd_eeee_xxxx_...._tttt_xxxx_tttt _ffff_oooo_rrrr  _aaaa  _dddd_eeee_ssss_cccc_rrrr_iiii_pppp_tttt_iiii_oooo_nnnn  _oooo_ffff
  1374. _tttt_hhhh_eeee _ffff_iiii_llll_eeee_ssss _iiii_nnnn _tttt_hhhh_iiii_ssss _dddd_iiii_rrrr_eeee_cccc_tttt_oooo_rrrr_yyyy_....
  1375.  
  1376. _1._7._2.  _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_mmmm_aaaa_cccc
  1377.  
  1378. The _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_mmmm_aaaa_cccc directory contains software for  the  Macintosh.   The
  1379. subdirectories of this directory are:
  1380.  
  1381.  
  1382.  
  1383.  
  1384.                               July 4, 1994
  1385.  
  1386.  
  1387.  
  1388.  
  1389.  
  1390.                                  - 22 -
  1391.  
  1392.  
  1393.      _vvvv_iiii_rrrr_uuuu_ssss        Anti-virus utilities.
  1394.  
  1395. _1._7._2._1.  _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_mmmm_aaaa_cccc_////_vvvv_iiii_rrrr_uuuu_ssss
  1396.  
  1397. The _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_mmmm_aaaa_cccc_////_vvvv_iiii_rrrr_uuuu_ssss directory contains  anti-virus  utilities.   The
  1398. files in this directory are:
  1399.  
  1400.      _dddd_iiii_ssss_iiii_nnnn_ffff_...._ssss_eeee_aaaa   The Disinfectant virus scanner,  preventer,  and  rem-
  1401.                   over.  Version 3.5.
  1402.  
  1403.      _gggg_aaaa_tttt_eeee_kkkk_eeee_eeee_pppp_...._hhhh_qqqq_xxxx The Gatekeeper virus preventer.  Version 1.3.
  1404.  
  1405.      _ssss_aaaa_mmmm_pppp_llll_eeee_...._ssss_eeee_aaaa   The public source code for the reusable  human  inter-
  1406.                   face modules from Disinfectant.  Version 2.4.
  1407.  
  1408.      _vvvv_iiii_rrrr_uuuu_ssss_dddd_eeee_tttt_...._hhhh_qqqq_xxxx The Virus Detective virus scanner.  Version 5.05.
  1409.  
  1410. _1._7._3.  _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_uuuu_nnnn_iiii_xxxx
  1411.  
  1412. The _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_uuuu_nnnn_iiii_xxxx directory contains software for  various  flavors  of
  1413. the UNIX operating system.  The subdirectories of this directory are:
  1414.  
  1415.      _aaaa_uuuu_tttt_hhhh_eeee_nnnn_tttt      Programs for performing user and  program  authentica-
  1416.                   tion.
  1417.  
  1418.      _dddd_iiii_gggg_ssss_iiii_gggg       Programs for  computing  digital  signatures  (crypto-
  1419.                   graphic checksums).
  1420.  
  1421.      _ffff_iiii_rrrr_eeee_wwww_aaaa_llll_llll     Programs for constructing network firewalls.
  1422.  
  1423.      _nnnn_eeee_tttt_mmmm_oooo_nnnn       Programs for monitoring network security.
  1424.  
  1425.      _nnnn_eeee_tttt_wwww_oooo_rrrr_kkkk      Programs for controlling access to a  system  via  the
  1426.                   network.
  1427.  
  1428.      _pppp_aaaa_ssss_ssss_wwww_oooo_rrrr_dddd     Programs pertaining to password security.
  1429.  
  1430.      _ssss_yyyy_ssss_mmmm_oooo_nnnn       Programs for monitoring system security.
  1431.  
  1432.      _tttt_oooo_oooo_llll_ssss        Programs that are not specifically designed  for  com-
  1433.                   puter  security  uses,  but are nevertheless useful to
  1434.                   the security practitioner.
  1435.  
  1436. _1._7._3._1.  _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_uuuu_nnnn_iiii_xxxx_////_aaaa_uuuu_tttt_hhhh_eeee_nnnn_tttt
  1437.  
  1438. The _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_uuuu_nnnn_iiii_xxxx_////_aaaa_uuuu_tttt_hhhh_eeee_nnnn_tttt directory contains  software  for  performing
  1439. user and program authentication.  The files in this directory are:
  1440.  
  1441.      _kkkk_eeee_rrrr_bbbb_eeee_rrrr_oooo_ssss     This subdirectory contains the sources and  documenta-
  1442.                   tion  for  the Kerberos package from the Massachusetts
  1443.                   Institute of Technology.  There are two subdirectories
  1444.                   of this directory:
  1445.  
  1446.                   _vvvv_4444           Version 4 Patchlevel  10.   This  is  the
  1447.  
  1448.  
  1449.  
  1450.                               July 4, 1994
  1451.  
  1452.  
  1453.  
  1454.  
  1455.  
  1456.                                  - 23 -
  1457.  
  1458.  
  1459.                                final  release  of  Version 4; all future
  1460.                                development efforts will be based on Ver-
  1461.                                sion 5.  Release date:  9 December 1992.
  1462.  
  1463.                   _vvvv_5555           Version 5 Beta 4.  This  is  the  current
  1464.                                release   of   Version   5;  all  current
  1465.                                development efforts  are  based  on  this
  1466.                                version.  Release date: 15 June 1994.
  1467.  
  1468.      _llll_iiii_bbbb_iiii_dddd_eeee_nnnn_tttt_...._tttt_aaaa_rrrr The libident _llll_iiii_bbbb_rrrr_aaaa_rrrr_yyyy _bbbb_yyyy _PPPP_eeee_tttt_eeee_rrrr _EEEE_rrrr_iiii_kkkk_ssss_ssss_oooo_nnnn_....  _AAAA _llll_iiii_bbbb_rrrr_aaaa_rrrr_yyyy  _oooo_ffff
  1469.                   _ffff_uuuu_nnnn_cccc_tttt_iiii_oooo_nnnn_ssss  _tttt_oooo _iiii_nnnn_tttt_eeee_rrrr_ffff_aaaa_cccc_eeee _wwww_iiii_tttt_hhhh _aaaa_nnnn _RRRR_FFFF_CCCC_1111_4444_1111_3333 _iiii_dddd_eeee_nnnn_tttt_iiii_ffff_iiii_cccc_aaaa_tttt_iiii_oooo_nnnn
  1470.                   _ssss_eeee_rrrr_vvvv_eeee_rrrr_....  _VVVV_eeee_rrrr_ssss_iiii_oooo_nnnn _0000_...._1111_4444_....
  1471.  
  1472.      _pppp_iiii_dddd_eeee_nnnn_tttt_dddd_...._tttt_aaaa_rrrr  The pident _dddd_aaaa_eeee_mmmm_oooo_nnnn _bbbb_yyyy _PPPP_eeee_tttt_eeee_rrrr _EEEE_rrrr_iiii_kkkk_ssss_ssss_oooo_nnnn_....   _IIII_mmmm_pppp_llll_eeee_mmmm_eeee_nnnn_tttt_ssss  _tttt_hhhh_eeee
  1473.                   _RRRR_FFFF_CCCC_1111_4444_1111_3333  _iiii_dddd_eeee_nnnn_tttt_iiii_ffff_iiii_cccc_aaaa_tttt_iiii_oooo_nnnn  _ssss_eeee_rrrr_vvvv_eeee_rrrr_,,,,  _tttt_hhhh_aaaa_tttt  _cccc_aaaa_nnnn _bbbb_eeee _uuuu_ssss_eeee_dddd _tttt_oooo
  1474.                   _qqqq_uuuu_eeee_rrrr_yyyy _aaaa _rrrr_eeee_mmmm_oooo_tttt_eeee _hhhh_oooo_ssss_tttt _ffff_oooo_rrrr _tttt_hhhh_eeee _iiii_dddd_eeee_nnnn_tttt_iiii_ffff_iiii_cccc_aaaa_tttt_iiii_oooo_nnnn _oooo_ffff _tttt_hhhh_eeee _uuuu_ssss_eeee_rrrr
  1475.                   _mmmm_aaaa_kkkk_iiii_nnnn_gggg _aaaa _TTTT_CCCC_PPPP _cccc_oooo_nnnn_nnnn_eeee_cccc_tttt_iiii_oooo_nnnn _rrrr_eeee_qqqq_uuuu_eeee_ssss_tttt_....  _VVVV_eeee_rrrr_ssss_iiii_oooo_nnnn _2222_...._2222_....
  1476.  
  1477.      _ssss_kkkk_eeee_yyyy_...._tttt_aaaa_rrrr     The S/Key  one-time  password  system  from  Bellcore.
  1478.                   Implements   one-time   passwords  for  UNIX  systems.
  1479.                   Includes one-time password generator programs for  PCs
  1480.                   and Macs.
  1481.  
  1482. _1._7._3._2.  _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_uuuu_nnnn_iiii_xxxx_////_dddd_iiii_gggg_ssss_iiii_gggg
  1483.  
  1484. The _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_uuuu_nnnn_iiii_xxxx_////_dddd_iiii_gggg_ssss_iiii_gggg  directory  contains  programs  for  computing
  1485. digital  signatures (cryptographic checksums).  The files in this direc-
  1486. tory are:
  1487.  
  1488.      _mmmm_dddd_2222_...._tttt_xxxx_tttt      The source code and specification for the MD-2 message
  1489.                   digest function.
  1490.  
  1491.      _mmmm_dddd_4444_...._tttt_xxxx_tttt      The source code and specification for the MD-4 message
  1492.                   digest function.
  1493.  
  1494.      _mmmm_dddd_5555_...._tttt_xxxx_tttt      The source code and specification for the MD-5 message
  1495.                   digest function.
  1496.  
  1497.      _ssss_nnnn_eeee_ffff_rrrr_uuuu_...._tttt_aaaa_rrrr   The source code and documentation for the Snefru  mes-
  1498.                   sage  digest  function  (Xerox  Secure Hash Function).
  1499.                   Version 2.5a.
  1500.  
  1501. _1._7._3._3.  _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_uuuu_nnnn_iiii_xxxx_////_ffff_iiii_rrrr_eeee_wwww_aaaa_llll_llll
  1502.  
  1503. The _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_uuuu_nnnn_iiii_xxxx_////_ffff_iiii_rrrr_eeee_wwww_aaaa_llll_llll directory contains software for constructing
  1504. network firewalls.  The files in this directory are:
  1505.  
  1506.      _gggg_aaaa_uuuu_...._tttt_aaaa_rrrr      The Gateway Access  Utilities  package  from  Sterling
  1507.                   Software.   Supports  access to the Internet through a
  1508.                   network firewall without  requiring  that  users  have
  1509.                   accounts  on  the  firewall  host  itself.   These are
  1510.                   modifed  TELNET  and  FTP  programs  that  work  in  a
  1511.                   ``proxy'' fashion through the firewall.  Version of 22
  1512.                   March 1993.
  1513.  
  1514.  
  1515.  
  1516.                               July 4, 1994
  1517.  
  1518.  
  1519.  
  1520.  
  1521.  
  1522.                                  - 24 -
  1523.  
  1524.  
  1525.      _ssss_oooo_cccc_kkkk_ssss_...._tttt_aaaa_rrrr    The socks _pppp_aaaa_cccc_kkkk_aaaa_gggg_eeee_,,,, _bbbb_yyyy _DDDD_aaaa_vvvv_iiii_dddd _aaaa_nnnn_dddd _MMMM_iiii_cccc_hhhh_eeee_llll_llll_eeee  _KKKK_oooo_bbbb_llll_aaaa_ssss_....   _AAAA_nnnn
  1526.                   _IIII_nnnn_tttt_eeee_rrrr_nnnn_eeee_tttt  _````_````_ssss_oooo_cccc_kkkk_eeee_tttt  _ssss_eeee_rrrr_vvvv_eeee_rrrr_''''_''''  _cccc_oooo_nnnn_ssss_iiii_ssss_tttt_iiii_nnnn_gggg  _oooo_ffff  _aaaa _ssss_eeee_tttt _oooo_ffff
  1527.                   _cccc_llll_iiii_eeee_nnnn_tttt _llll_iiii_bbbb_rrrr_aaaa_rrrr_yyyy _rrrr_oooo_uuuu_tttt_iiii_nnnn_eeee_ssss _aaaa_nnnn_dddd  _aaaa  _dddd_aaaa_eeee_mmmm_oooo_nnnn  _tttt_hhhh_aaaa_tttt  _iiii_nnnn_tttt_eeee_rrrr_aaaa_cccc_tttt
  1528.                   _tttt_hhhh_rrrr_oooo_uuuu_gggg_hhhh  _aaaa  _ssss_iiii_mmmm_pppp_llll_eeee  _pppp_rrrr_oooo_tttt_oooo_cccc_oooo_llll _tttt_oooo _pppp_rrrr_oooo_vvvv_iiii_dddd_eeee _cccc_oooo_nnnn_vvvv_eeee_nnnn_iiii_eeee_nnnn_tttt _aaaa_nnnn_dddd
  1529.                   _ssss_eeee_cccc_uuuu_rrrr_eeee _nnnn_eeee_tttt_wwww_oooo_rrrr_kkkk _cccc_oooo_nnnn_nnnn_eeee_cccc_tttt_iiii_vvvv_iiii_tttt_yyyy _tttt_hhhh_rrrr_oooo_uuuu_gggg_hhhh _aaaa  _ffff_iiii_rrrr_eeee_wwww_aaaa_llll_llll  _hhhh_oooo_ssss_tttt_....
  1530.                   _VVVV_eeee_rrrr_ssss_iiii_oooo_nnnn _3333_....
  1531.  
  1532.      _ssss_cccc_kkkk_ssss_cccc_ssss_tttt_cccc_...._tttt_aaaa_rrrr The CSTC release of the socks _pppp_aaaa_cccc_kkkk_aaaa_gggg_eeee _((((_ssss_eeee_eeee _ssss_oooo_cccc_kkkk_ssss_...._tttt_aaaa_rrrr_))))_....
  1533.                   _TTTT_hhhh_iiii_ssss _vvvv_eeee_rrrr_ssss_iiii_oooo_nnnn _iiii_nnnn_cccc_llll_uuuu_dddd_eeee_ssss _ffff_uuuu_llll_llll _ssss_oooo_uuuu_rrrr_cccc_eeee _ffff_oooo_rrrr _tttt_hhhh_eeee _SSSS_OOOO_CCCC_KKKK_SSSS _ssss_eeee_rrrr_vvvv_eeee_rrrr
  1534.                   _aaaa_nnnn_dddd  _SSSS_OOOO_CCCC_KKKK_SSSS_----_iiii_ffff_iiii_eeee_dddd  _cccc_llll_iiii_eeee_nnnn_tttt  _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm_ssss  _ffff_oooo_rrrr  _ffff_iiii_nnnn_gggg_eeee_rrrr_,,,,  _ffff_tttt_pppp_,,,,
  1535.                   _tttt_eeee_llll_nnnn_eeee_tttt_,,,, _aaaa_nnnn_dddd _wwww_hhhh_oooo_iiii_ssss_....  _VVVV_eeee_rrrr_ssss_iiii_oooo_nnnn _4444_...._1111_....
  1536.  
  1537.      _tttt_cccc_pppp_rrrr_...._tttt_aaaa_rrrr     The tcpr _pppp_aaaa_cccc_kkkk_aaaa_gggg_eeee  _bbbb_yyyy  _PPPP_aaaa_uuuu_llll  _ZZZZ_iiii_eeee_mmmm_bbbb_aaaa_....   _AAAA  _ssss_eeee_tttt  _oooo_ffff  _PPPP_eeee_rrrr_llll
  1538.                   _ssss_cccc_rrrr_iiii_pppp_tttt_ssss _tttt_hhhh_aaaa_tttt _eeee_nnnn_aaaa_bbbb_llll_eeee _tttt_hhhh_eeee _uuuu_ssss_eeee _oooo_ffff _FFFF_TTTT_PPPP _aaaa_nnnn_dddd _TTTT_EEEE_LLLL_NNNN_EEEE_TTTT _aaaa_cccc_rrrr_oooo_ssss_ssss _aaaa
  1539.                   _ffff_iiii_rrrr_eeee_wwww_aaaa_llll_llll_....  _IIII_tttt _cccc_oooo_nnnn_ssss_iiii_ssss_tttt_ssss  _oooo_ffff  _aaaa_nnnn  _iiii_nnnn_eeee_tttt_dddd-like  server,  a
  1540.                   relay  program, and a client that talks to the server.
  1541.                   Version 1.1.5.
  1542.  
  1543.      _tttt_iiii_ssss_ffff_wwww_tttt_kkkk      This subdirectory  contains  the  Trusted  Information
  1544.                   Systems  (TIS) Firewall Toolkit, a fairly complete set
  1545.                   of programs and instructions for constructing  network
  1546.                   firewalls.  The contents of this directory are:
  1547.  
  1548.                   _aaaa_llll_pppp_hhhh_aaaa_...._tttt_aaaa_rrrr    The latest ``prerelease'' version of  the
  1549.                                toolkit, for those who wish to experiment
  1550.                                with  or  modify  the  version  that   is
  1551.                                currently  under development.  It is con-
  1552.                                sidered a stable release but may not con-
  1553.                                tain  up-to-date documentation or porting
  1554.                                fixes.  There are a number of portability
  1555.                                fixes   in  this  version  that  are  not
  1556.                                present in Version 1.2.
  1557.  
  1558.                   _ffff_wwww_tttt_kkkk_dddd_oooo_cccc_...._tttt_aaaa_rrrr  The toolkit documentation.  Version 1.2.
  1559.  
  1560.                   _ffff_wwww_tttt_kkkk_ssss_rrrr_cccc_...._tttt_aaaa_rrrr  The toolkit source code.  Version 1.2.
  1561.  
  1562.      _uuuu_dddd_pppp_rrrr_eeee_llll_aaaa_yyyy_...._tttt_aaaa_rrrr The udprelay _pppp_aaaa_cccc_kkkk_aaaa_gggg_eeee _bbbb_yyyy _TTTT_oooo_mmmm _FFFF_iiii_tttt_zzzz_gggg_eeee_rrrr_aaaa_llll_dddd_....  _AAAA _dddd_aaaa_eeee_mmmm_oooo_nnnn _pppp_rrrr_oooo_----
  1563.                   _cccc_eeee_ssss_ssss  _tttt_hhhh_aaaa_tttt  _rrrr_uuuu_nnnn_ssss  _oooo_nnnn  _aaaa _ffff_iiii_rrrr_eeee_wwww_aaaa_llll_llll _hhhh_oooo_ssss_tttt _aaaa_nnnn_dddd _ffff_oooo_rrrr_wwww_aaaa_rrrr_dddd_ssss _UUUU_DDDD_PPPP
  1564.                   _pppp_aaaa_cccc_kkkk_eeee_tttt_ssss _iiii_nnnn_tttt_oooo _aaaa_nnnn_dddd _oooo_uuuu_tttt _oooo_ffff  _tttt_hhhh_eeee  _ffff_iiii_rrrr_eeee_wwww_aaaa_llll_llll_eeee_dddd  _nnnn_eeee_tttt_wwww_oooo_rrrr_kkkk_,,,,  _aaaa_ssss
  1565.                   _dddd_iiii_rrrr_eeee_cccc_tttt_eeee_dddd _bbbb_yyyy _aaaa _cccc_oooo_nnnn_ffff_iiii_gggg_uuuu_rrrr_aaaa_tttt_iiii_oooo_nnnn _ffff_iiii_llll_eeee_....  _VVVV_eeee_rrrr_ssss_iiii_oooo_nnnn _0000_...._2222_....
  1566.  
  1567.      _xxxx_ffff_oooo_rrrr_wwww_aaaa_rrrr_dddd_...._tttt_aaaa_rrrr The xforward _pppp_aaaa_cccc_kkkk_aaaa_gggg_eeee _bbbb_yyyy _WWWW_iiii_nnnn _TTTT_rrrr_eeee_eeee_ssss_eeee_....  _UUUU_ssss_eeee_dddd _ffff_oooo_rrrr _rrrr_eeee_llll_aaaa_yyyy_iiii_nnnn_gggg
  1568.                   _XXXX  _WWWW_iiii_nnnn_dddd_oooo_wwww _SSSS_yyyy_ssss_tttt_eeee_mmmm _cccc_oooo_nnnn_nnnn_eeee_cccc_tttt_iiii_oooo_nnnn_ssss _aaaa_cccc_rrrr_oooo_ssss_ssss _nnnn_eeee_tttt_wwww_oooo_rrrr_kkkk _ffff_iiii_rrrr_eeee_wwww_aaaa_llll_llll_ssss_....
  1569.                   _VVVV_eeee_rrrr_ssss_iiii_oooo_nnnn _1111_...._0000_....
  1570.  
  1571. _1._7._3._4.  _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_uuuu_nnnn_iiii_xxxx_////_nnnn_eeee_tttt_mmmm_oooo_nnnn
  1572.  
  1573. The _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_uuuu_nnnn_iiii_xxxx_////_nnnn_eeee_tttt_mmmm_oooo_nnnn directory  contains  programs  for  monitoring
  1574. network security.  The files in this directory are:
  1575.  
  1576.      _nnnn_eeee_tttt_mmmm_aaaa_nnnn       This subdirectory contains the NETMAN package of  net-
  1577.                   work  monitoring  and  visualization tools from Curtin
  1578.                   University.  The  etherman  _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm  _iiii_ssss  _aaaa_nnnn  _XXXX  _WWWW_iiii_nnnn_dddd_oooo_wwww
  1579.  
  1580.  
  1581.  
  1582.                               July 4, 1994
  1583.  
  1584.  
  1585.  
  1586.  
  1587.  
  1588.                                  - 25 -
  1589.  
  1590.  
  1591.                   _SSSS_yyyy_ssss_tttt_eeee_mmmm  _tttt_oooo_oooo_llll  _tttt_hhhh_aaaa_tttt  _dddd_iiii_ssss_pppp_llll_aaaa_yyyy_ssss _aaaa _rrrr_eeee_pppp_rrrr_eeee_ssss_eeee_nnnn_tttt_aaaa_tttt_iiii_oooo_nnnn _oooo_ffff _rrrr_eeee_aaaa_llll_----
  1592.                   _tttt_iiii_mmmm_eeee _EEEE_tttt_hhhh_eeee_rrrr_nnnn_eeee_tttt _cccc_oooo_mmmm_mmmm_uuuu_nnnn_iiii_cccc_aaaa_tttt_iiii_oooo_nnnn_ssss_....   _TTTT_hhhh_eeee  _iiii_nnnn_tttt_eeee_rrrr_mmmm_aaaa_nnnn  program
  1593.                   focuses  on  IP  connectivity within a single segment.
  1594.                   The packetman _tttt_oooo_oooo_llll _iiii_ssss _aaaa _rrrr_eeee_tttt_rrrr_oooo_ssss_pppp_eeee_cccc_tttt_iiii_vvvv_eeee _EEEE_tttt_hhhh_eeee_rrrr_nnnn_eeee_tttt  _pppp_aaaa_cccc_kkkk_eeee_tttt
  1595.                   _aaaa_nnnn_aaaa_llll_yyyy_zzzz_eeee_rrrr_....   _WWWW_iiii_tttt_hhhh_iiii_nnnn _tttt_hhhh_eeee _ssss_uuuu_bbbb_dddd_iiii_rrrr_eeee_cccc_tttt_oooo_rrrr_yyyy _aaaa_rrrr_eeee _bbbb_iiii_nnnn_aaaa_rrrr_iiii_eeee_ssss _ffff_oooo_rrrr _aaaa
  1596.                   _nnnn_uuuu_mmmm_bbbb_eeee_rrrr _oooo_ffff _dddd_iiii_ffff_ffff_eeee_rrrr_eeee_nnnn_tttt _pppp_llll_aaaa_tttt_ffff_oooo_rrrr_mmmm_ssss_....  _SSSS_oooo_uuuu_rrrr_cccc_eeee _cccc_oooo_dddd_eeee _iiii_ssss  _aaaa_vvvv_aaaa_iiii_llll_----
  1597.                   _aaaa_bbbb_llll_eeee  _ffff_oooo_rrrr  _$$$$_5555_0000_0000_...._0000_0000  _ffff_oooo_rrrr _uuuu_nnnn_iiii_vvvv_eeee_rrrr_ssss_iiii_tttt_iiii_eeee_ssss _aaaa_nnnn_dddd _$$$$_1111_,,,,_0000_0000_0000_...._0000_0000 _ffff_oooo_rrrr
  1598.                   _cccc_oooo_mmmm_pppp_aaaa_nnnn_iiii_eeee_ssss _aaaa_nnnn_dddd _oooo_tttt_hhhh_eeee_rrrr _gggg_rrrr_oooo_uuuu_pppp_ssss_....  _VVVV_eeee_rrrr_ssss_iiii_oooo_nnnn _1111_...._1111_....
  1599.  
  1600.      _nnnn_oooo_cccc_oooo_llll_...._tttt_aaaa_rrrr    The NOCOL (Network Operations Center On-Line)  package
  1601.                   from  JVNC-Net.  Can monitor various network variables
  1602.                   such as ICMP or RPC reachability, name servers, ether-
  1603.                   net  load,  port  reachability, host performance, SNMP
  1604.                   traps, modem line usage, AppleTalk and  Novell  routes
  1605.                   and  services, BGP peers, etc.  The software is exten-
  1606.                   sible and new monitors can be added  easily.   Version
  1607.                   4.0beta (the beta release is very near formal release,
  1608.                   and is recommended over the previous version).
  1609.  
  1610.      _tttt_cccc_pppp_wwww_hhhh_oooo_...._tttt_aaaa_rrrr   The tcpwho _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm _bbbb_yyyy _SSSS_cccc_oooo_tttt_tttt _CCCC_hhhh_aaaa_ssss_iiii_nnnn_....  _DDDD_iiii_ssss_pppp_llll_aaaa_yyyy_ssss  _aaaa  _llll_iiii_ssss_tttt
  1611.                   _oooo_ffff _aaaa_llll_llll _TTTT_CCCC_PPPP _cccc_oooo_nnnn_nnnn_eeee_cccc_tttt_iiii_oooo_nnnn_ssss _aaaa_nnnn_dddd _tttt_hhhh_eeee _cccc_oooo_rrrr_rrrr_eeee_ssss_pppp_oooo_nnnn_dddd_iiii_nnnn_gggg _uuuu_ssss_eeee_rrrr _nnnn_aaaa_mmmm_eeee
  1612.                   _aaaa_nnnn_dddd _pppp_rrrr_oooo_cccc_eeee_ssss_ssss _iiii_dddd_eeee_nnnn_tttt_iiii_ffff_iiii_eeee_rrrr _aaaa_ssss_ssss_oooo_cccc_iiii_aaaa_tttt_eeee_dddd  _wwww_iiii_tttt_hhhh  _eeee_aaaa_cccc_hhhh  _cccc_oooo_nnnn_nnnn_eeee_cccc_----
  1613.                   _tttt_iiii_oooo_nnnn_....  _VVVV_eeee_rrrr_ssss_iiii_oooo_nnnn _1111_...._0000_....
  1614.  
  1615. _1._7._3._5.  _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_uuuu_nnnn_iiii_xxxx_////_nnnn_eeee_tttt_wwww_oooo_rrrr_kkkk
  1616.  
  1617. The _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_uuuu_nnnn_iiii_xxxx_////_nnnn_eeee_tttt_wwww_oooo_rrrr_kkkk directory contains programs  for  controlling
  1618. access to a system via the network.  The files in this subdirectory are:
  1619.  
  1620.      _iiii_pppp_aaaa_cccc_llll_...._tttt_aaaa_rrrr    The ipacl _pppp_aaaa_cccc_kkkk_aaaa_gggg_eeee _ffff_rrrr_oooo_mmmm _SSSS_iiii_eeee_mmmm_eeee_nnnn_ssss_....  _FFFF_oooo_rrrr_cccc_eeee_ssss  _aaaa_llll_llll  _TTTT_CCCC_PPPP  _aaaa_nnnn_dddd
  1621.                   _UUUU_DDDD_PPPP  _pppp_aaaa_cccc_kkkk_eeee_tttt_ssss  _tttt_oooo  _pppp_aaaa_ssss_ssss  _tttt_hhhh_rrrr_oooo_uuuu_gggg_hhhh _aaaa_nnnn _aaaa_cccc_cccc_eeee_ssss_ssss _cccc_oooo_nnnn_tttt_rrrr_oooo_llll _llll_iiii_ssss_tttt
  1622.                   _ffff_aaaa_cccc_iiii_llll_iiii_tttt_yyyy_....  _TTTT_hhhh_eeee _cccc_oooo_nnnn_ffff_iiii_gggg_uuuu_rrrr_aaaa_tttt_iiii_oooo_nnnn _ffff_iiii_llll_eeee _aaaa_llll_llll_oooo_wwww_ssss _pppp_aaaa_cccc_kkkk_eeee_tttt_ssss _tttt_oooo _bbbb_eeee
  1623.                   _aaaa_cccc_cccc_eeee_pppp_tttt_eeee_dddd_,,,, _rrrr_eeee_jjjj_eeee_cccc_tttt_eeee_dddd_,,,, _cccc_oooo_nnnn_dddd_iiii_tttt_iiii_oooo_nnnn_aaaa_llll_llll_yyyy _aaaa_cccc_cccc_eeee_pppp_tttt_eeee_dddd_,,,, _aaaa_nnnn_dddd _cccc_oooo_nnnn_dddd_iiii_----
  1624.                   _tttt_iiii_oooo_nnnn_aaaa_llll_llll_yyyy _rrrr_eeee_jjjj_eeee_cccc_tttt_eeee_dddd _bbbb_aaaa_ssss_eeee_dddd  _oooo_nnnn  _cccc_hhhh_aaaa_rrrr_aaaa_cccc_tttt_eeee_rrrr_iiii_ssss_tttt_iiii_cccc_ssss  _ssss_uuuu_cccc_hhhh  _aaaa_ssss
  1625.                   _ssss_oooo_uuuu_rrrr_cccc_eeee   _aaaa_dddd_dddd_rrrr_eeee_ssss_ssss_,,,,  _dddd_eeee_ssss_tttt_iiii_nnnn_aaaa_tttt_iiii_oooo_nnnn  _aaaa_dddd_dddd_rrrr_eeee_ssss_ssss_,,,,  _ssss_oooo_uuuu_rrrr_cccc_eeee  _pppp_oooo_rrrr_tttt
  1626.                   _nnnn_uuuu_mmmm_bbbb_eeee_rrrr_,,,, _aaaa_nnnn_dddd _dddd_eeee_ssss_tttt_iiii_nnnn_aaaa_tttt_iiii_oooo_nnnn _pppp_oooo_rrrr_tttt _nnnn_uuuu_mmmm_bbbb_eeee_rrrr_....  _SSSS_hhhh_oooo_uuuu_llll_dddd _bbbb_eeee  _pppp_oooo_rrrr_tttt_----
  1627.                   _aaaa_bbbb_llll_eeee  _tttt_oooo _aaaa_nnnn_yyyy _ssss_yyyy_ssss_tttt_eeee_mmmm _tttt_hhhh_aaaa_tttt _uuuu_ssss_eeee_ssss _SSSS_yyyy_ssss_tttt_eeee_mmmm _VVVV _SSSS_TTTT_RRRR_EEEE_AAAA_MMMM_SSSS _ffff_oooo_rrrr _iiii_tttt_ssss
  1628.                   _nnnn_eeee_tttt_wwww_oooo_rrrr_kkkk _cccc_oooo_dddd_eeee_....  _VVVV_eeee_rrrr_ssss_iiii_oooo_nnnn _oooo_ffff _1111_3333 _JJJJ_aaaa_nnnn_uuuu_aaaa_rrrr_yyyy _1111_9999_9999_3333_....
  1629.  
  1630.      _llll_dddd_aaaa_eeee_mmmm_oooo_nnnn_...._tttt_aaaa_rrrr  The logdaemon  _pppp_aaaa_cccc_kkkk_aaaa_gggg_eeee  _bbbb_yyyy  _WWWW_iiii_eeee_tttt_ssss_eeee  _VVVV_eeee_nnnn_eeee_mmmm_aaaa_....   _PPPP_rrrr_oooo_vvvv_iiii_dddd_eeee_ssss
  1631.                   _mmmm_oooo_dddd_iiii_ffff_iiii_eeee_dddd  _vvvv_eeee_rrrr_ssss_iiii_oooo_nnnn_ssss  _oooo_ffff  _rrrr_ssss_hhhh_dddd,  rlogind_,,,,  _ffff_tttt_pppp_dddd, rexecd_,,,,
  1632.                   _llll_oooo_gggg_iiii_nnnn, and telnetd _tttt_hhhh_aaaa_tttt _llll_oooo_gggg _ssss_iiii_gggg_nnnn_iiii_ffff_iiii_cccc_aaaa_nnnn_tttt_llll_yyyy _mmmm_oooo_rrrr_eeee  _iiii_nnnn_ffff_oooo_rrrr_----
  1633.                   _mmmm_aaaa_tttt_iiii_oooo_nnnn  _tttt_hhhh_aaaa_nnnn  _tttt_hhhh_eeee  _ssss_tttt_aaaa_nnnn_dddd_aaaa_rrrr_dddd  _vvvv_eeee_nnnn_dddd_oooo_rrrr _vvvv_eeee_rrrr_ssss_iiii_oooo_nnnn_ssss_,,,, _eeee_nnnn_aaaa_bbbb_llll_iiii_nnnn_gggg
  1634.                   _bbbb_eeee_tttt_tttt_eeee_rrrr _aaaa_uuuu_dddd_iiii_tttt_iiii_nnnn_gggg _oooo_ffff _pppp_rrrr_oooo_bbbb_llll_eeee_mmmm_ssss _vvvv_iiii_aaaa  _tttt_hhhh_eeee  _llll_oooo_gggg_ffff_iiii_llll_eeee_ssss_....   _AAAA_llll_ssss_oooo
  1635.                   _iiii_nnnn_cccc_llll_uuuu_dddd_eeee_ssss _ssss_uuuu_pppp_pppp_oooo_rrrr_tttt _ffff_oooo_rrrr _tttt_hhhh_eeee _SSSS_////_KKKK_eeee_yyyy _oooo_nnnn_eeee_----_tttt_iiii_mmmm_eeee _pppp_aaaa_ssss_ssss_wwww_oooo_rrrr_dddd _pppp_aaaa_cccc_kkkk_----
  1636.                   _aaaa_gggg_eeee_....  _VVVV_eeee_rrrr_ssss_iiii_oooo_nnnn _4444_...._2222_....
  1637.  
  1638.      _pppp_oooo_rrrr_tttt_mmmm_aaaa_pppp_...._tttt_aaaa_rrrr  The portmap _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm _bbbb_yyyy _WWWW_iiii_eeee_tttt_ssss_eeee _VVVV_eeee_nnnn_eeee_mmmm_aaaa_....   _AAAA  _rrrr_eeee_pppp_llll_aaaa_cccc_eeee_mmmm_eeee_nnnn_tttt
  1639.                   _ffff_oooo_rrrr  _tttt_hhhh_eeee  _ssss_tttt_aaaa_nnnn_dddd_aaaa_rrrr_dddd  _SSSS_uuuu_nnnn _pppp_oooo_rrrr_tttt_mmmm_aaaa_pppp program (portable to a
  1640.                   number of vendors' systems) that attempts to close all
  1641.                   known  holes  in portmap_....  _TTTT_hhhh_iiii_ssss _iiii_nnnn_cccc_llll_uuuu_dddd_eeee_ssss _pppp_rrrr_eeee_vvvv_eeee_nnnn_tttt_iiii_oooo_nnnn _oooo_ffff
  1642.                   _NNNN_IIII_SSSS _pppp_aaaa_ssss_ssss_wwww_oooo_rrrr_dddd _ffff_iiii_llll_eeee _tttt_hhhh_eeee_ffff_tttt_,,,,  _pppp_rrrr_eeee_vvvv_eeee_nnnn_tttt_iiii_oooo_nnnn  _oooo_ffff  _uuuu_nnnn_aaaa_uuuu_tttt_hhhh_oooo_rrrr_iiii_zzzz_eeee_dddd
  1643.                   _yyyy_pppp_ssss_eeee_tttt  commands,  and  prevention  of  NFS file handle
  1644.                   theft.  Version 3.
  1645.  
  1646.  
  1647.  
  1648.                               July 4, 1994
  1649.  
  1650.  
  1651.  
  1652.  
  1653.  
  1654.                                  - 26 -
  1655.  
  1656.  
  1657.      _rrrr_pppp_cccc_bbbb_iiii_nnnn_dddd_...._tttt_aaaa_rrrr  The rpcbind _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm _bbbb_yyyy _WWWW_iiii_eeee_tttt_ssss_eeee _VVVV_eeee_nnnn_eeee_mmmm_aaaa_....   _AAAA  _rrrr_eeee_pppp_llll_aaaa_cccc_eeee_mmmm_eeee_nnnn_tttt
  1658.                   _ffff_oooo_rrrr _tttt_hhhh_eeee _SSSS_uuuu_nnnn _rrrr_pppp_cccc_bbbb_iiii_nnnn_dddd program that offers access control
  1659.                   and copious logging.  Allows host access control based
  1660.                   on network addresses.  Preliminary version.
  1661.  
  1662.      _ssss_cccc_rrrr_eeee_eeee_nnnn_dddd_...._tttt_aaaa_rrrr  The screend _pppp_aaaa_cccc_kkkk_aaaa_gggg_eeee _bbbb_yyyy _JJJJ_eeee_ffff_ffff _MMMM_oooo_gggg_uuuu_llll_....  _PPPP_rrrr_oooo_vvvv_iiii_dddd_eeee_ssss _aaaa  _dddd_aaaa_eeee_mmmm_oooo_nnnn
  1663.                   _aaaa_nnnn_dddd  _kkkk_eeee_rrrr_nnnn_eeee_llll  _mmmm_oooo_dddd_iiii_ffff_iiii_cccc_aaaa_tttt_iiii_oooo_nnnn_ssss  _tttt_oooo _aaaa_llll_llll_oooo_wwww _aaaa_llll_llll _pppp_aaaa_cccc_kkkk_eeee_tttt_ssss _tttt_oooo _bbbb_eeee
  1664.                   _ffff_iiii_llll_tttt_eeee_rrrr_eeee_dddd _bbbb_aaaa_ssss_eeee_dddd _oooo_nnnn _ssss_oooo_uuuu_rrrr_cccc_eeee _aaaa_dddd_dddd_rrrr_eeee_ssss_ssss_,,,, _dddd_eeee_ssss_tttt_iiii_nnnn_aaaa_tttt_iiii_oooo_nnnn _aaaa_dddd_dddd_rrrr_eeee_ssss_ssss_,,,,
  1665.                   _oooo_rrrr  _aaaa_nnnn_yyyy  _oooo_tttt_hhhh_eeee_rrrr  _bbbb_yyyy_tttt_eeee  _oooo_rrrr  _ssss_eeee_tttt  _oooo_ffff _bbbb_yyyy_tttt_eeee_ssss _iiii_nnnn _tttt_hhhh_eeee _pppp_aaaa_cccc_kkkk_eeee_tttt_....
  1666.                   _SSSS_hhhh_oooo_uuuu_llll_dddd _wwww_oooo_rrrr_kkkk _oooo_nnnn _mmmm_oooo_ssss_tttt _ssss_yyyy_ssss_tttt_eeee_mmmm_ssss  _tttt_hhhh_aaaa_tttt  _uuuu_ssss_eeee  _BBBB_eeee_rrrr_kkkk_eeee_llll_eeee_yyyy_----_ssss_tttt_yyyy_llll_eeee
  1667.                   _nnnn_eeee_tttt_wwww_oooo_rrrr_kkkk_iiii_nnnn_gggg  _iiii_nnnn _tttt_hhhh_eeee _kkkk_eeee_rrrr_nnnn_eeee_llll_,,,, _bbbb_uuuu_tttt _rrrr_eeee_qqqq_uuuu_iiii_rrrr_eeee_ssss _kkkk_eeee_rrrr_nnnn_eeee_llll _mmmm_oooo_dddd_iiii_ffff_iiii_----
  1668.                   _cccc_aaaa_tttt_iiii_oooo_nnnn_ssss _((((_iiii_...._eeee_...._,,,, _kkkk_eeee_rrrr_nnnn_eeee_llll _ssss_oooo_uuuu_rrrr_cccc_eeee  _cccc_oooo_dddd_eeee_))))_....   _VVVV_eeee_rrrr_ssss_iiii_oooo_nnnn  _oooo_ffff  _2222_1111
  1669.                   _JJJJ_aaaa_nnnn_uuuu_aaaa_rrrr_yyyy _1111_9999_9999_3333_....
  1670.  
  1671.      _ssss_eeee_cccc_llll_iiii_bbbb_...._tttt_aaaa_rrrr   The securelib _pppp_aaaa_cccc_kkkk_aaaa_gggg_eeee _bbbb_yyyy _WWWW_iiii_llll_llll_iiii_aaaa_mmmm _LLLL_eeee_FFFF_eeee_bbbb_vvvv_rrrr_eeee_....  _PPPP_rrrr_oooo_vvvv_iiii_dddd_eeee_ssss _aaaa
  1672.                   _rrrr_eeee_pppp_llll_aaaa_cccc_eeee_mmmm_eeee_nnnn_tttt  _ssss_hhhh_aaaa_rrrr_eeee_dddd  _llll_iiii_bbbb_rrrr_aaaa_rrrr_yyyy  _ffff_oooo_rrrr  _SSSS_uuuu_nnnn_OOOO_SSSS _4444_...._1111_...._x _ssss_yyyy_ssss_tttt_eeee_mmmm_ssss
  1673.                   _tttt_hhhh_aaaa_tttt _oooo_ffff_ffff_eeee_rrrr_ssss _nnnn_eeee_wwww _vvvv_eeee_rrrr_ssss_iiii_oooo_nnnn_ssss _oooo_ffff _tttt_hhhh_eeee _aaaa_cccc_cccc_eeee_pppp_tttt, _r_e_c_v_f_r_o_m_,,,,  _aaaa_nnnn_dddd
  1674.                   _rrrr_eeee_cccc_vvvv_mmmm_ssss_gggg _n_e_t_w_o_r_k_i_n_g _s_y_s_t_e_m _c_a_l_l_s.  _T_h_e_s_e _c_a_l_l_s _a_r_e _c_o_m_-
  1675.                   _p_a_t_i_b_l_e _w_i_t_h _t_h_e _o_r_i_g_i_n_a_l_s, _e_x_c_e_p_t _t_h_a_t _t_h_e_y _c_h_e_c_k _t_h_e
  1676.                   _a_d_d_r_e_s_s  _o_f  _t_h_e  _m_a_c_h_i_n_e _i_n_i_t_i_a_t_i_n_g _t_h_e _c_o_n_n_e_c_t_i_o_n _t_o
  1677.                   _m_a_k_e _s_u_r_e _i_t _i_s _a_l_l_o_w_e_d _t_o _c_o_n_n_e_c_t, _b_a_s_e_d _o_n _t_h_e  _c_o_n_-
  1678.                   _t_e_n_t_s  _o_f _a _c_o_n_f_i_g_u_r_a_t_i_o_n _f_i_l_e.  _T_h_e _a_d_v_a_n_t_a_g_e _o_f _t_h_i_s
  1679.                   _a_p_p_r_o_a_c_h _i_s _t_h_a_t _i_t _c_a_n _b_e _i_n_s_t_a_l_l_e_d _w_i_t_h_o_u_t _r_e_c_o_m_p_i_l_-
  1680.                   _i_n_g _a_n_y _s_o_f_t_w_a_r_e.  _V_e_r_s_i_o_n _3.
  1681.  
  1682.      _tttt_cccc_pppp_wwww_rrrr_aaaa_pppp_...._tttt_aaaa_rrrr  The tcp_wrapper _pppp_aaaa_cccc_kkkk_aaaa_gggg_eeee _bbbb_yyyy  _WWWW_iiii_eeee_tttt_ssss_eeee  _VVVV_eeee_nnnn_eeee_mmmm_aaaa_....   _FFFF_oooo_rrrr_mmmm_eeee_rrrr_llll_yyyy
  1683.                   _cccc_aaaa_llll_llll_eeee_dddd  _llll_oooo_gggg______tttt_cccc_pppp.   Allows  monitoring and control over
  1684.                   who connects to a host's TFTP, EXEC, FTP, RSH, TELNET,
  1685.                   RLOGIN,  FINGER,  and  SYSTAT  ports.  Also includes a
  1686.                   library so that other programs can be  controlled  and
  1687.                   monitored in the same fashion.  Version 6.3.
  1688.  
  1689.      _xxxx_iiii_nnnn_eeee_tttt_dddd_...._tttt_aaaa_rrrr   The  xinetd  _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm  _bbbb_yyyy  _PPPP_aaaa_nnnn_aaaa_gggg_iiii_oooo_tttt_iiii_ssss  _TTTT_ssss_iiii_rrrr_iiii_gggg_oooo_tttt_iiii_ssss_....    _AAAA
  1690.                   _rrrr_eeee_pppp_llll_aaaa_cccc_eeee_mmmm_eeee_nnnn_tttt  _ffff_oooo_rrrr _tttt_hhhh_eeee _iiii_nnnn_eeee_tttt_dddd program that can be config-
  1691.                   ured to perform access control based on  host  address
  1692.                   or time of day, and to log significantly more informa-
  1693.                   tion than most vendor versions.  Version 2.0.6.
  1694.  
  1695. _1._7._3._6.  _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_uuuu_nnnn_iiii_xxxx_////_pppp_aaaa_ssss_ssss_wwww_oooo_rrrr_dddd
  1696.  
  1697. The _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_uuuu_nnnn_iiii_xxxx_////_pppp_aaaa_ssss_ssss_wwww_oooo_rrrr_dddd directory contains  programs  pertaining  to
  1698. password security.  The files in this subdirectory are:
  1699.  
  1700.      _aaaa_nnnn_llll_pppp_aaaa_ssss_ssss_wwww_...._tttt_aaaa_rrrr The anlpasswd  _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm  _((((_ffff_oooo_rrrr_mmmm_eeee_rrrr_llll_yyyy  _pppp_eeee_rrrr_llll_----_pppp_aaaa_ssss_ssss_wwww_dddd_2222)  from
  1701.                   Argonne   National   Library.   A  proactive  password
  1702.                   checker that refuses to let users choose ``bad'' pass-
  1703.                   words.  Version 2.2.
  1704.  
  1705.      _cccc_rrrr_aaaa_cccc_kkkk_...._tttt_aaaa_rrrr    The  crack  _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm  _bbbb_yyyy  _AAAA_llll_eeee_cccc  _MMMM_uuuu_ffff_ffff_eeee_tttt_tttt_....   _AAAA  _pppp_aaaa_ssss_ssss_wwww_oooo_rrrr_dddd_----
  1706.                   _cccc_rrrr_aaaa_cccc_kkkk_iiii_nnnn_gggg _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm _wwww_iiii_tttt_hhhh _aaaa _cccc_oooo_nnnn_ffff_iiii_gggg_uuuu_rrrr_aaaa_tttt_iiii_oooo_nnnn _llll_aaaa_nnnn_gggg_uuuu_aaaa_gggg_eeee_,,,, _aaaa_llll_llll_oooo_wwww_----
  1707.                   _iiii_nnnn_gggg _tttt_hhhh_eeee _uuuu_ssss_eeee_rrrr _tttt_oooo _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm _tttt_hhhh_eeee  _tttt_yyyy_pppp_eeee_ssss  _oooo_ffff  _gggg_uuuu_eeee_ssss_ssss_eeee_ssss  _uuuu_ssss_eeee_dddd_....
  1708.                   _VVVV_eeee_rrrr_ssss_iiii_oooo_nnnn _4444_...._1111_....
  1709.  
  1710.      _cccc_rrrr_aaaa_cccc_kkkk_llll_iiii_bbbb_...._tttt_aaaa_rrrr The cracklib _dddd_iiii_ssss_tttt_rrrr_iiii_bbbb_uuuu_tttt_iiii_oooo_nnnn_,,,, _bbbb_yyyy _AAAA_llll_eeee_cccc _MMMM_uuuu_ffff_ffff_eeee_tttt_tttt_....  _AAAA _llll_iiii_bbbb_rrrr_aaaa_rrrr_yyyy
  1711.  
  1712.  
  1713.  
  1714.                               July 4, 1994
  1715.  
  1716.  
  1717.  
  1718.  
  1719.  
  1720.                                  - 27 -
  1721.  
  1722.  
  1723.                   _oooo_ffff  _ffff_uuuu_nnnn_cccc_tttt_iiii_oooo_nnnn_ssss _tttt_hhhh_aaaa_tttt _cccc_aaaa_nnnn _bbbb_eeee _cccc_aaaa_llll_llll_eeee_dddd _ffff_rrrr_oooo_mmmm _pppp_aaaa_ssss_ssss_wwww_dddd-like pro-
  1724.                   grams to try to prevent users from choosing  passwords
  1725.                   that crack _wwww_oooo_uuuu_llll_dddd _bbbb_eeee _aaaa_bbbb_llll_eeee _tttt_oooo _gggg_uuuu_eeee_ssss_ssss_....  _VVVV_eeee_rrrr_ssss_iiii_oooo_nnnn _2222_...._5555_....
  1726.  
  1727.      _nnnn_pppp_aaaa_ssss_ssss_wwww_dddd_...._tttt_aaaa_rrrr  The  npasswd  _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm  _bbbb_yyyy  _CCCC_llll_yyyy_dddd_eeee  _HHHH_oooo_oooo_vvvv_eeee_rrrr_....    _AAAA   _pppp_llll_uuuu_gggg_----
  1728.                   _cccc_oooo_mmmm_pppp_aaaa_tttt_iiii_bbbb_llll_eeee  _rrrr_eeee_pppp_llll_aaaa_cccc_eeee_mmmm_eeee_nnnn_tttt  _ffff_oooo_rrrr  _pppp_aaaa_ssss_ssss_wwww_dddd  that  refuses to
  1729.                   accept ``bad'' passwords.  Includes support for System
  1730.                   V  Release 3 password aging and Sun's Network Informa-
  1731.                   tion Service (NIS) (Yellow Pages).  Version 1.2.4.
  1732.  
  1733.      _oooo_bbbb_vvvv_iiii_oooo_uuuu_ssss_...._tttt_aaaa_rrrr  The obvious-pw _ffff_uuuu_nnnn_cccc_tttt_iiii_oooo_nnnn _bbbb_yyyy _JJJJ_oooo_hhhh_nnnn _NNNN_aaaa_gggg_llll_eeee_....  _TTTT_hhhh_iiii_ssss  _ffff_uuuu_nnnn_cccc_tttt_iiii_oooo_nnnn
  1734.                   _dddd_eeee_pppp_eeee_nnnn_dddd_ssss  _uuuu_pppp_oooo_nnnn _aaaa _ssss_uuuu_bbbb_tttt_llll_eeee _pppp_rrrr_oooo_pppp_eeee_rrrr_tttt_yyyy _oooo_ffff _EEEE_nnnn_gggg_llll_iiii_ssss_hhhh_....  _LLLL_eeee_ssss_ssss _tttt_hhhh_aaaa_nnnn
  1735.                   _oooo_nnnn_eeee_----_tttt_hhhh_iiii_rrrr_dddd _oooo_ffff _tttt_hhhh_eeee _pppp_oooo_ssss_ssss_iiii_bbbb_llll_eeee  _````_````_tttt_rrrr_iiii_pppp_llll_eeee_ssss_,,,,_''''_''''  _ssss_eeee_qqqq_uuuu_eeee_nnnn_cccc_eeee_ssss  _oooo_ffff
  1736.                   _tttt_hhhh_rrrr_eeee_eeee  _llll_eeee_tttt_tttt_eeee_rrrr_ssss_,,,,  _aaaa_rrrr_eeee _uuuu_ssss_eeee_dddd _iiii_nnnn _EEEE_nnnn_gggg_llll_iiii_ssss_hhhh _wwww_oooo_rrrr_dddd_ssss_....  _TTTT_hhhh_iiii_ssss _pppp_rrrr_oooo_----
  1737.                   _pppp_eeee_rrrr_tttt_yyyy _mmmm_aaaa_kkkk_eeee_ssss _iiii_tttt _pppp_oooo_ssss_ssss_iiii_bbbb_llll_eeee _tttt_oooo _dddd_iiii_ssss_tttt_iiii_nnnn_gggg_uuuu_iiii_ssss_hhhh  _rrrr_aaaa_nnnn_dddd_oooo_mmmm  _llll_eeee_tttt_tttt_eeee_rrrr
  1738.                   _ssss_tttt_rrrr_iiii_nnnn_gggg_ssss  _ffff_rrrr_oooo_mmmm  _ssss_tttt_rrrr_iiii_nnnn_gggg_ssss  _tttt_hhhh_aaaa_tttt  _llll_oooo_oooo_kkkk _llll_iiii_kkkk_eeee _EEEE_nnnn_gggg_llll_iiii_ssss_hhhh _wwww_oooo_rrrr_dddd_ssss_....
  1739.                   _TTTT_hhhh_eeee _iiii_dddd_eeee_aaaa _iiii_ssss _tttt_oooo _rrrr_eeee_jjjj_eeee_cccc_tttt  _pppp_aaaa_ssss_ssss_wwww_oooo_rrrr_dddd_ssss  _tttt_hhhh_aaaa_tttt  _````_````_llll_oooo_oooo_kkkk  _llll_iiii_kkkk_eeee_''''_''''
  1740.                   _EEEE_nnnn_gggg_llll_iiii_ssss_hhhh _wwww_oooo_rrrr_dddd_ssss_....  _VVVV_eeee_rrrr_ssss_iiii_oooo_nnnn _oooo_ffff _1111_0000 _NNNN_oooo_vvvv_eeee_mmmm_bbbb_eeee_rrrr _1111_9999_8888_8888_....
  1741.  
  1742.      _pppp_wwww_pppp_llll_uuuu_ssss_...._tttt_aaaa_rrrr   The passwd+ _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm _bbbb_yyyy _MMMM_aaaa_tttt_tttt _BBBB_iiii_ssss_hhhh_oooo_pppp_....  _AAAA _pppp_rrrr_oooo_aaaa_cccc_tttt_iiii_vvvv_eeee _pppp_aaaa_ssss_ssss_----
  1743.                   _wwww_oooo_rrrr_dddd _cccc_hhhh_eeee_cccc_kkkk_eeee_rrrr _tttt_hhhh_aaaa_tttt _iiii_ssss _dddd_rrrr_iiii_vvvv_eeee_nnnn _bbbb_yyyy _aaaa _cccc_oooo_nnnn_ffff_iiii_gggg_uuuu_rrrr_aaaa_tttt_iiii_oooo_nnnn _ffff_iiii_llll_eeee _tttt_oooo
  1744.                   _dddd_eeee_tttt_eeee_rrrr_mmmm_iiii_nnnn_eeee _wwww_hhhh_aaaa_tttt _tttt_yyyy_pppp_eeee_ssss _oooo_ffff  _pppp_aaaa_ssss_ssss_wwww_oooo_rrrr_dddd_ssss  _aaaa_rrrr_eeee  _aaaa_nnnn_dddd  _aaaa_rrrr_eeee  _nnnn_oooo_tttt
  1745.                   _aaaa_llll_llll_oooo_wwww_eeee_dddd_....   _TTTT_hhhh_eeee  _cccc_oooo_nnnn_ffff_iiii_gggg_uuuu_rrrr_aaaa_tttt_iiii_oooo_nnnn  _ffff_iiii_llll_eeee  _aaaa_llll_llll_oooo_wwww_ssss _tttt_hhhh_eeee _uuuu_ssss_eeee _oooo_ffff
  1746.                   _rrrr_eeee_gggg_uuuu_llll_aaaa_rrrr  _eeee_xxxx_pppp_rrrr_eeee_ssss_ssss_iiii_oooo_nnnn_ssss_,,,,  _tttt_hhhh_eeee  _cccc_oooo_mmmm_pppp_aaaa_rrrr_iiii_ssss_oooo_nnnn  _oooo_ffff   _pppp_aaaa_ssss_ssss_wwww_oooo_rrrr_dddd_ssss
  1747.                   _aaaa_gggg_aaaa_iiii_nnnn_ssss_tttt  _tttt_hhhh_eeee  _cccc_oooo_nnnn_tttt_eeee_nnnn_tttt_ssss  _oooo_ffff _ffff_iiii_llll_eeee_ssss _((((_eeee_...._gggg_...._,,,, _dddd_iiii_cccc_tttt_iiii_oooo_nnnn_aaaa_rrrr_iiii_eeee_ssss_))))_,,,,
  1748.                   _aaaa_nnnn_dddd _tttt_hhhh_eeee _cccc_aaaa_llll_llll_iiii_nnnn_gggg _oooo_ffff _eeee_xxxx_tttt_eeee_rrrr_nnnn_aaaa_llll _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm_ssss  _tttt_oooo  _eeee_xxxx_aaaa_mmmm_iiii_nnnn_eeee  _tttt_hhhh_eeee
  1749.                   _pppp_aaaa_ssss_ssss_wwww_oooo_rrrr_dddd_....  _VVVV_eeee_rrrr_ssss_iiii_oooo_nnnn _oooo_ffff _1111 _DDDD_eeee_cccc_eeee_mmmm_bbbb_eeee_rrrr _1111_9999_9999_3333_....
  1750.  
  1751.      _ssss_hhhh_aaaa_dddd_oooo_wwww_...._tttt_aaaa_rrrr   The shadow _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm _bbbb_yyyy _JJJJ_oooo_hhhh_nnnn _FFFF_.... _HHHH_aaaa_uuuu_gggg_hhhh_,,,, _IIII_IIII_....   _AAAA  _rrrr_eeee_pppp_llll_aaaa_cccc_eeee_----
  1752.                   _mmmm_eeee_nnnn_tttt  _ffff_oooo_rrrr  _llll_oooo_gggg_iiii_nnnn and passwd _tttt_hhhh_aaaa_tttt _cccc_aaaa_nnnn _eeee_nnnn_aaaa_bbbb_llll_eeee _aaaa_nnnn_yyyy _ssss_yyyy_ssss_tttt_eeee_mmmm
  1753.                   _tttt_oooo _uuuu_ssss_eeee _ssss_hhhh_aaaa_dddd_oooo_wwww _pppp_aaaa_ssss_ssss_wwww_oooo_rrrr_dddd _ffff_iiii_llll_eeee_ssss_....   _IIII_nnnn_cccc_llll_uuuu_dddd_eeee_ssss  _ssss_uuuu_pppp_pppp_oooo_rrrr_tttt  _ffff_oooo_rrrr
  1754.                   _ssss_hhhh_aaaa_dddd_oooo_wwww  _pppp_aaaa_ssss_ssss_wwww_oooo_rrrr_dddd  _ffff_iiii_llll_eeee_ssss_,,,, _ssss_hhhh_aaaa_dddd_oooo_wwww _gggg_rrrr_oooo_uuuu_pppp _ffff_iiii_llll_eeee_ssss_,,,, _DDDD_BBBB_MMMM _pppp_aaaa_ssss_ssss_----
  1755.                   _wwww_oooo_rrrr_dddd _ffff_iiii_llll_eeee_ssss_,,,,  _dddd_oooo_uuuu_bbbb_llll_eeee  _llll_eeee_nnnn_gggg_tttt_hhhh  _pppp_aaaa_ssss_ssss_wwww_oooo_rrrr_dddd_ssss_,,,,  _aaaa_nnnn_dddd  _pppp_aaaa_ssss_ssss_wwww_oooo_rrrr_dddd
  1756.                   _aaaa_gggg_iiii_nnnn_gggg_....  _VVVV_eeee_rrrr_ssss_iiii_oooo_nnnn _3333_...._1111_...._4444_....
  1757.  
  1758. _1._7._3._7.  _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_uuuu_nnnn_iiii_xxxx_////_ssss_yyyy_ssss_mmmm_oooo_nnnn
  1759.  
  1760. The _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_uuuu_nnnn_iiii_xxxx_////_ssss_yyyy_ssss_mmmm_oooo_nnnn directory  contains  programs  for  monitoring
  1761. system security.  The files in this directory are:
  1762.  
  1763.      _bbbb_iiii_nnnn_aaaa_uuuu_dddd_iiii_tttt_...._tttt_aaaa_rrrr The RIACS Intelligent Auditing and  Categorizing  Sys-
  1764.                   tem, from the Research Institute for Advanced Computer
  1765.                   Science.  A file system auditing program that compares
  1766.                   current  contents  against  previously-generated list-
  1767.                   ings, and reports differences.  Version 3.1.3.
  1768.  
  1769.      _cccc_oooo_pppp_ssss_...._tttt_aaaa_rrrr     The Computer Oracle and Password System (COPS) package
  1770.                   from  Purdue  University.   Examines  a  system  for a
  1771.                   number of  known  weaknesses  and  alerts  the  system
  1772.                   administrator  to them; in some cases it can automati-
  1773.                   cally correct these problems.  Version 1.04.
  1774.  
  1775.      _cccc_pppp_mmmm_...._tttt_aaaa_rrrr      The  cpm  program  from  Carnegie  Mellon  University.
  1776.                   Checks   a   system  for  any  network  interfaces  in
  1777.  
  1778.  
  1779.  
  1780.                               July 4, 1994
  1781.  
  1782.  
  1783.  
  1784.  
  1785.  
  1786.                                  - 28 -
  1787.  
  1788.  
  1789.                   promiscuous mode; this may indicate that  an  attacker
  1790.                   has  broken  in and started a packet snooping program.
  1791.                   Version 1.0.
  1792.  
  1793.      _iiii_ffff_ssss_tttt_aaaa_tttt_uuuu_ssss_...._tttt_aaaa_rrrr The ifstatus _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm _bbbb_yyyy _DDDD_aaaa_vvvv_eeee _CCCC_uuuu_rrrr_rrrr_yyyy_....  _CCCC_hhhh_eeee_cccc_kkkk_ssss  _aaaa  _ssss_yyyy_ssss_tttt_eeee_mmmm
  1794.                   _ffff_oooo_rrrr  _aaaa_nnnn_yyyy  _nnnn_eeee_tttt_wwww_oooo_rrrr_kkkk _iiii_nnnn_tttt_eeee_rrrr_ffff_aaaa_cccc_eeee_ssss _iiii_nnnn _pppp_rrrr_oooo_mmmm_iiii_ssss_cccc_uuuu_oooo_uuuu_ssss _mmmm_oooo_dddd_eeee_;;;; _tttt_hhhh_iiii_ssss
  1795.                   _mmmm_aaaa_yyyy _iiii_nnnn_dddd_iiii_cccc_aaaa_tttt_eeee  _tttt_hhhh_aaaa_tttt  _aaaa_nnnn  _aaaa_tttt_tttt_aaaa_cccc_kkkk_eeee_rrrr  _hhhh_aaaa_ssss  _bbbb_rrrr_oooo_kkkk_eeee_nnnn  _iiii_nnnn  _aaaa_nnnn_dddd
  1796.                   _ssss_tttt_aaaa_rrrr_tttt_eeee_dddd _aaaa _pppp_aaaa_cccc_kkkk_eeee_tttt _ssss_nnnn_oooo_oooo_pppp_iiii_nnnn_gggg _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm_....  _DDDD_eeee_ssss_iiii_gggg_nnnn_eeee_dddd _tttt_oooo _bbbb_eeee _rrrr_uuuu_nnnn
  1797.                   _oooo_uuuu_tttt _oooo_ffff _cccc_rrrr_oooo_nnnn.
  1798.  
  1799.      _iiii_ssss_ssss_...._tttt_aaaa_rrrr      The iss _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm _bbbb_yyyy _CCCC_hhhh_rrrr_iiii_ssss_tttt_oooo_pppp_hhhh_eeee_rrrr _KKKK_llll_aaaa_uuuu_ssss_....   _AAAA  _mmmm_uuuu_llll_tttt_iiii_----_llll_eeee_vvvv_eeee_llll
  1800.                   _ssss_eeee_cccc_uuuu_rrrr_iiii_tttt_yyyy  _ssss_cccc_aaaa_nnnn_nnnn_eeee_rrrr  _tttt_hhhh_aaaa_tttt  _cccc_hhhh_eeee_cccc_kkkk_ssss  _aaaa  _UUUU_NNNN_IIII_XXXX  _ssss_yyyy_ssss_tttt_eeee_mmmm _ffff_oooo_rrrr _aaaa
  1801.                   _nnnn_uuuu_mmmm_bbbb_eeee_rrrr _oooo_ffff _kkkk_nnnn_oooo_wwww_nnnn _ssss_eeee_cccc_uuuu_rrrr_iiii_tttt_yyyy _hhhh_oooo_llll_eeee_ssss _ssss_uuuu_cccc_hhhh _aaaa_ssss  _pppp_rrrr_oooo_bbbb_llll_eeee_mmmm_ssss  _wwww_iiii_tttt_hhhh
  1802.                   _ssss_eeee_nnnn_dddd_mmmm_aaaa_iiii_llll, improperly configured NFS file sharing, etc.
  1803.                   Version 1.21.
  1804.  
  1805.      _ssss_eeee_cccc_uuuu_rrrr_eeee_...._tttt_aaaa_rrrr   The programs and scripts from  the  appendix  of  _U_N_I_X
  1806.                   _S_y_s_t_e_m  _S_e_c_u_r_i_t_y  by  Patrick  Wood and Steven Kochan.
  1807.                   Version of 25 February 1989.
  1808.  
  1809.      _ssss_wwww_aaaa_tttt_cccc_hhhh_...._tttt_aaaa_rrrr   The Swatch _pppp_aaaa_cccc_kkkk_aaaa_gggg_eeee _bbbb_yyyy _SSSS_tttt_eeee_pppp_hhhh_eeee_nnnn _HHHH_aaaa_nnnn_ssss_eeee_nnnn _aaaa_nnnn_dddd _TTTT_oooo_dddd_dddd  _AAAA_tttt_kkkk_iiii_nnnn_ssss_....
  1810.                   _AAAA  _ssss_yyyy_ssss_tttt_eeee_mmmm  _ffff_oooo_rrrr  _mmmm_oooo_nnnn_iiii_tttt_oooo_rrrr_iiii_nnnn_gggg _eeee_vvvv_eeee_nnnn_tttt_ssss _oooo_nnnn _aaaa _llll_aaaa_rrrr_gggg_eeee _nnnn_uuuu_mmmm_bbbb_eeee_rrrr _oooo_ffff
  1811.                   _ssss_yyyy_ssss_tttt_eeee_mmmm_ssss_....  _MMMM_oooo_dddd_iiii_ffff_iiii_eeee_ssss _cccc_eeee_rrrr_tttt_aaaa_iiii_nnnn _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm_ssss _tttt_oooo  _eeee_nnnn_hhhh_aaaa_nnnn_cccc_eeee  _tttt_hhhh_eeee_iiii_rrrr
  1812.                   _llll_oooo_gggg_gggg_iiii_nnnn_gggg _cccc_aaaa_pppp_aaaa_bbbb_iiii_llll_iiii_tttt_iiii_eeee_ssss_,,,, _aaaa_nnnn_dddd _ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee _tttt_oooo _tttt_hhhh_eeee_nnnn _mmmm_oooo_nnnn_iiii_tttt_oooo_rrrr _tttt_hhhh_eeee
  1813.                   _ssss_yyyy_ssss_tttt_eeee_mmmm _llll_oooo_gggg_ssss _ffff_oooo_rrrr _````_````_iiii_mmmm_pppp_oooo_rrrr_tttt_aaaa_nnnn_tttt_''''_'''' _mmmm_eeee_ssss_ssss_aaaa_gggg_eeee_ssss_....  _VVVV_eeee_rrrr_ssss_iiii_oooo_nnnn _2222_...._1111_....
  1814.  
  1815.      _tttt_aaaa_mmmm_uuuu         This subdirectory contains the various  TAMU  security
  1816.                   tools from Texas A&M University.  The contents of this
  1817.                   directory are:
  1818.  
  1819.                   _cccc_hhhh_eeee_cccc_kkkk_...._tttt_xxxx_tttt    A shell script for checking the integrity
  1820.                                of the distribution.
  1821.  
  1822.                   _dddd_rrrr_aaaa_wwww_bbbb_rrrr_iiii_dddd_...._tttt_aaaa_rrrr The drawbridge _bbbb_rrrr_iiii_dddd_gggg_iiii_nnnn_gggg _ffff_iiii_llll_tttt_eeee_rrrr_....  _IIII_tttt  _uuuu_ssss_eeee_ssss
  1823.                                _aaaa  _PPPP_CCCC  _wwww_iiii_tttt_hhhh _tttt_wwww_oooo _eeee_tttt_hhhh_eeee_rrrr_nnnn_eeee_tttt _cccc_aaaa_rrrr_dddd_ssss _tttt_oooo _pppp_eeee_rrrr_ffff_oooo_rrrr_mmmm
  1824.                                _tttt_hhhh_eeee _ffff_iiii_llll_tttt_eeee_rrrr_iiii_nnnn_gggg_....  _VVVV_eeee_rrrr_ssss_iiii_oooo_nnnn _1111_...._1111_....
  1825.  
  1826.                   _nnnn_eeee_tttt_llll_oooo_gggg_...._tttt_aaaa_rrrr   The netlog _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm_ssss_....  _TTTT_hhhh_eeee_ssss_eeee _cccc_oooo_nnnn_ssss_tttt_iiii_tttt_uuuu_tttt_eeee  _aaaa
  1827.                                _TTTT_CCCC_PPPP   _aaaa_nnnn_dddd  _UUUU_DDDD_PPPP  _tttt_rrrr_aaaa_ffff_ffff_iiii_cccc  _llll_oooo_gggg_gggg_iiii_nnnn_gggg  _ssss_yyyy_ssss_tttt_eeee_mmmm_,,,,
  1828.                                _uuuu_ssss_aaaa_bbbb_llll_eeee _ffff_oooo_rrrr  _llll_oooo_cccc_aaaa_tttt_iiii_nnnn_gggg  _ssss_uuuu_ssss_pppp_iiii_cccc_iiii_oooo_uuuu_ssss  _nnnn_eeee_tttt_wwww_oooo_rrrr_kkkk
  1829.                                _tttt_rrrr_aaaa_ffff_ffff_iiii_cccc_....  _VVVV_eeee_rrrr_ssss_iiii_oooo_nnnn _1111_...._2222_....
  1830.  
  1831.                   _ssss_pppp_aaaa_rrrr_...._tttt_aaaa_rrrr     The spar  _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm_,,,,  _ffff_oooo_rrrr  _ssss_hhhh_oooo_wwww_iiii_nnnn_gggg  _pppp_rrrr_oooo_cccc_eeee_ssss_ssss
  1832.                                _aaaa_cccc_cccc_oooo_uuuu_nnnn_tttt_iiii_nnnn_gggg  _rrrr_eeee_cccc_oooo_rrrr_dddd_ssss_....   _MMMM_uuuu_cccc_hhhh _mmmm_oooo_rrrr_eeee _ffff_llll_eeee_xxxx_iiii_bbbb_llll_eeee
  1833.                                _aaaa_nnnn_dddd _pppp_oooo_wwww_eeee_rrrr_ffff_uuuu_llll _tttt_hhhh_aaaa_nnnn _tttt_hhhh_eeee _ssss_tttt_aaaa_nnnn_dddd_aaaa_rrrr_dddd _UUUU_NNNN_IIII_XXXX _uuuu_tttt_iiii_llll_----
  1834.                                _iiii_tttt_iiii_eeee_ssss _ssss_uuuu_cccc_hhhh _aaaa_ssss _llll_aaaa_ssss_tttt_cccc_oooo_mmmm_mmmm.  Version 1.2.
  1835.  
  1836.                   _ssss_rrrr_aaaa_...._tttt_aaaa_rrrr      The sra _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm_,,,,  _wwww_hhhh_iiii_cccc_hhhh  _pppp_rrrr_oooo_vvvv_iiii_dddd_eeee_ssss  _ssss_eeee_cccc_uuuu_rrrr_eeee
  1837.                                _RRRR_PPPP_CCCC  _aaaa_uuuu_tttt_hhhh_eeee_nnnn_tttt_iiii_cccc_aaaa_tttt_iiii_oooo_nnnn  _ffff_oooo_rrrr  _FFFF_TTTT_PPPP _aaaa_nnnn_dddd _TTTT_EEEE_LLLL_NNNN_EEEE_TTTT_....
  1838.                                _VVVV_eeee_rrrr_ssss_iiii_oooo_nnnn _1111_...._3333_....
  1839.  
  1840.                   _tttt_iiii_gggg_eeee_rrrr_...._tttt_aaaa_rrrr    The tiger _pppp_aaaa_cccc_kkkk_aaaa_gggg_eeee  _oooo_ffff  _ssss_yyyy_ssss_tttt_eeee_mmmm  _mmmm_oooo_nnnn_iiii_tttt_oooo_rrrr_iiii_nnnn_gggg
  1841.                                _ssss_cccc_rrrr_iiii_pppp_tttt_ssss_....   _SSSS_iiii_mmmm_iiii_llll_aaaa_rrrr  _tttt_oooo  _CCCC_OOOO_PPPP_SSSS _iiii_nnnn _wwww_hhhh_aaaa_tttt _tttt_hhhh_eeee_yyyy
  1842.                                _dddd_oooo_,,,, _bbbb_uuuu_tttt _ssss_iiii_gggg_nnnn_iiii_ffff_iiii_cccc_aaaa_nnnn_tttt_llll_yyyy _mmmm_oooo_rrrr_eeee  _uuuu_pppp  _tttt_oooo  _dddd_aaaa_tttt_eeee_,,,,
  1843.  
  1844.  
  1845.  
  1846.                               July 4, 1994
  1847.  
  1848.  
  1849.  
  1850.  
  1851.  
  1852.                                  - 29 -
  1853.  
  1854.  
  1855.                                _aaaa_nnnn_dddd _eeee_aaaa_ssss_iiii_eeee_rrrr _tttt_oooo _cccc_oooo_nnnn_ffff_iiii_gggg_uuuu_rrrr_eeee _aaaa_nnnn_dddd _uuuu_ssss_eeee_....  _VVVV_eeee_rrrr_ssss_iiii_oooo_nnnn
  1856.                                _2222_...._2222_...._3333_....
  1857.  
  1858.                   _tttt_iiii_gggg_eeee_rrrr_ssss_iiii_gggg_...._tttt_aaaa_rrrr The  digital  signature   databases   for
  1859.                                several  operating  system distributions,
  1860.                                for use by the tiger _ffff_iiii_llll_eeee _iiii_nnnn_tttt_eeee_gggg_rrrr_iiii_tttt_yyyy _ssss_cccc_aaaa_nnnn_----
  1861.                                _nnnn_iiii_nnnn_gggg  _ssss_cccc_rrrr_iiii_pppp_tttt_ssss_....   _VVVV_eeee_rrrr_ssss_iiii_oooo_nnnn  _oooo_ffff  _2222_3333 _DDDD_eeee_cccc_eeee_mmmm_bbbb_eeee_rrrr
  1862.                                _1111_9999_9999_3333_....
  1863.  
  1864.      _tttt_rrrr_iiii_pppp_wwww_iiii_rrrr_eeee_...._tttt_aaaa_rrrr The Tripwire package from  Purdue  University.   Scans
  1865.                   file  systems  and computes digital signatures for the
  1866.                   files therein, then can be used later to  check  those
  1867.                   files for any changes.  Version 1.1.
  1868.  
  1869.      _wwww_aaaa_tttt_cccc_hhhh_eeee_rrrr_...._tttt_aaaa_rrrr  The Watcher _pppp_aaaa_cccc_kkkk_aaaa_gggg_eeee _bbbb_yyyy _KKKK_eeee_nnnn_nnnn_eeee_tttt_hhhh _IIII_nnnn_gggg_hhhh_aaaa_mmmm_....  _AAAA _cccc_oooo_nnnn_ffff_iiii_gggg_uuuu_rrrr_aaaa_bbbb_llll_eeee
  1870.                   _aaaa_nnnn_dddd  _eeee_xxxx_tttt_eeee_nnnn_ssss_iiii_bbbb_llll_eeee  _ssss_yyyy_ssss_tttt_eeee_mmmm  _mmmm_oooo_nnnn_iiii_tttt_oooo_rrrr_iiii_nnnn_gggg _tttt_oooo_oooo_llll _tttt_hhhh_aaaa_tttt _iiii_ssss_ssss_uuuu_eeee_ssss _aaaa
  1871.                   _nnnn_uuuu_mmmm_bbbb_eeee_rrrr _oooo_ffff _uuuu_ssss_eeee_rrrr_----_ssss_pppp_eeee_cccc_iiii_ffff_iiii_eeee_dddd _cccc_oooo_mmmm_mmmm_aaaa_nnnn_dddd_ssss_,,,, _pppp_aaaa_rrrr_ssss_eeee_ssss _tttt_hhhh_eeee  _oooo_uuuu_tttt_pppp_uuuu_tttt_,,,,
  1872.                   _cccc_hhhh_eeee_cccc_kkkk_ssss  _ffff_oooo_rrrr _iiii_tttt_eeee_mmmm_ssss _oooo_ffff _ssss_iiii_gggg_nnnn_iiii_ffff_iiii_cccc_aaaa_nnnn_cccc_eeee_,,,, _aaaa_nnnn_dddd _rrrr_eeee_pppp_oooo_rrrr_tttt_ssss _tttt_hhhh_eeee_mmmm _tttt_oooo
  1873.                   _tttt_hhhh_eeee _ssss_yyyy_ssss_tttt_eeee_mmmm _aaaa_dddd_mmmm_iiii_nnnn_iiii_ssss_tttt_rrrr_aaaa_tttt_oooo_rrrr_....  _VVVV_eeee_rrrr_ssss_iiii_oooo_nnnn _oooo_ffff _1111_5555 _JJJJ_uuuu_llll_yyyy _1111_9999_9999_1111_....
  1874.  
  1875. _1._7._3._8.  _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_uuuu_nnnn_iiii_xxxx_////_tttt_oooo_oooo_llll_ssss
  1876.  
  1877. The  _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_uuuu_nnnn_iiii_xxxx_////_tttt_oooo_oooo_llll_ssss  directory  contains  programs  that  are  not
  1878. specifically  designed  for computer security uses, but are nevertheless
  1879. useful to the security practitioner.  The files in this directory are:
  1880.  
  1881.      _dddd_iiii_gggg_...._tttt_aaaa_rrrr      The dig _uuuu_tttt_iiii_llll_iiii_tttt_yyyy _bbbb_yyyy _SSSS_tttt_eeee_vvvv_eeee _HHHH_oooo_tttt_zzzz  _aaaa_nnnn_dddd  _PPPP_aaaa_uuuu_llll  _MMMM_oooo_cccc_kkkk_aaaa_pppp_eeee_tttt_rrrr_iiii_ssss_....
  1882.                   _TTTT_hhhh_iiii_ssss  _iiii_ssss  _aaaa _cccc_oooo_mmmm_mmmm_aaaa_nnnn_dddd_----_llll_iiii_nnnn_eeee _tttt_oooo_oooo_llll _ffff_oooo_rrrr _qqqq_uuuu_eeee_rrrr_yyyy_iiii_nnnn_gggg _DDDD_oooo_mmmm_aaaa_iiii_nnnn _NNNN_aaaa_mmmm_eeee
  1883.                   _SSSS_yyyy_ssss_tttt_eeee_mmmm  _ssss_eeee_rrrr_vvvv_eeee_rrrr_ssss_....   _IIII_tttt  _iiii_ssss  _mmmm_uuuu_cccc_hhhh  _eeee_aaaa_ssss_iiii_eeee_rrrr  _tttt_oooo  _uuuu_ssss_eeee  _tttt_hhhh_aaaa_nnnn
  1884.                   _nnnn_ssss_llll_oooo_oooo_kkkk_uuuu_pppp,  and  is  well-suited  for  use within shell
  1885.                   scripts.  Version 2.0.
  1886.  
  1887.      _ffff_rrrr_eeee_mmmm_oooo_nnnn_tttt_...._tttt_aaaa_rrrr  The fremont _uuuu_tttt_iiii_llll_iiii_tttt_yyyy _ffff_rrrr_oooo_mmmm _tttt_hhhh_eeee _UUUU_nnnn_iiii_vvvv_eeee_rrrr_ssss_iiii_tttt_yyyy  _oooo_ffff  _CCCC_oooo_llll_oooo_rrrr_aaaa_dddd_oooo_....
  1888.                   _AAAA  _rrrr_eeee_ssss_eeee_aaaa_rrrr_cccc_hhhh  _pppp_rrrr_oooo_tttt_oooo_tttt_yyyy_pppp_eeee  _ffff_oooo_rrrr  _dddd_iiii_ssss_cccc_oooo_vvvv_eeee_rrrr_iiii_nnnn_gggg  _kkkk_eeee_yyyy  _nnnn_eeee_tttt_wwww_oooo_rrrr_kkkk
  1889.                   _cccc_hhhh_aaaa_rrrr_aaaa_cccc_tttt_eeee_rrrr_iiii_ssss_tttt_iiii_cccc_ssss _ssss_uuuu_cccc_hhhh _aaaa_ssss _hhhh_oooo_ssss_tttt_ssss_,,,, _gggg_aaaa_tttt_eeee_wwww_aaaa_yyyy_ssss_,,,, _aaaa_nnnn_dddd _tttt_oooo_pppp_oooo_llll_oooo_gggg_yyyy_....
  1890.                   _SSSS_tttt_oooo_rrrr_eeee_ssss  _tttt_hhhh_iiii_ssss  _iiii_nnnn_ffff_oooo_rrrr_mmmm_aaaa_tttt_iiii_oooo_nnnn  _iiii_nnnn _aaaa _dddd_aaaa_tttt_aaaa_bbbb_aaaa_ssss_eeee_,,,, _aaaa_nnnn_dddd _cccc_aaaa_nnnn _tttt_hhhh_eeee_nnnn
  1891.                   _nnnn_oooo_tttt_iiii_ffff_yyyy _tttt_hhhh_eeee _aaaa_dddd_mmmm_iiii_nnnn_iiii_ssss_tttt_rrrr_aaaa_tttt_oooo_rrrr _oooo_ffff _aaaa_nnnn_oooo_mmmm_aaaa_llll_iiii_eeee_ssss _dddd_eeee_tttt_eeee_cccc_tttt_eeee_dddd_....   _VVVV_eeee_rrrr_----
  1892.                   _ssss_iiii_oooo_nnnn _1111_...._0000_2222_....
  1893.  
  1894.      _gggg_aaaa_tttt_eeee_dddd_...._tttt_aaaa_rrrr    The gated _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm _ffff_rrrr_oooo_mmmm _CCCC_oooo_rrrr_nnnn_eeee_llll_llll _UUUU_nnnn_iiii_vvvv_eeee_rrrr_ssss_iiii_tttt_yyyy_....  _AAAA  _nnnn_eeee_tttt_wwww_oooo_rrrr_kkkk
  1895.                   _rrrr_oooo_uuuu_tttt_iiii_nnnn_gggg _dddd_aaaa_eeee_mmmm_oooo_nnnn _tttt_hhhh_aaaa_tttt _uuuu_nnnn_dddd_eeee_rrrr_ssss_tttt_aaaa_nnnn_dddd_ssss _tttt_hhhh_eeee _BBBB_GGGG_PPPP_,,,, _EEEE_GGGG_PPPP_,,,, _RRRR_IIII_PPPP_,,,, _RRRR_IIII_PPPP
  1896.                   _IIII_IIII_,,,, _OOOO_SSSS_PPPP_FFFF_,,,, _aaaa_nnnn_dddd _HHHH_EEEE_LLLL_LLLL_OOOO _pppp_rrrr_oooo_tttt_oooo_cccc_oooo_llll_ssss_....  _TTTT_hhhh_eeee _pppp_rrrr_iiii_mmmm_aaaa_rrrr_yyyy  _aaaa_dddd_vvvv_aaaa_nnnn_tttt_aaaa_gggg_eeee
  1897.                   _tttt_oooo _gggg_aaaa_tttt_eeee_dddd is that it is much more configurable than the
  1898.                   routed _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm _tttt_hhhh_aaaa_tttt _cccc_oooo_mmmm_eeee_ssss _wwww_iiii_tttt_hhhh _mmmm_oooo_ssss_tttt _UUUU_NNNN_IIII_XXXX _ssss_yyyy_ssss_tttt_eeee_mmmm_ssss_;;;; _tttt_hhhh_iiii_ssss
  1899.                   _cccc_aaaa_nnnn _bbbb_eeee _uuuu_ssss_eeee_ffff_uuuu_llll _wwww_hhhh_eeee_nnnn _cccc_oooo_nnnn_ssss_tttt_rrrr_uuuu_cccc_tttt_iiii_nnnn_gggg _ffff_iiii_rrrr_eeee_wwww_aaaa_llll_llll_ssss _oooo_rrrr _oooo_tttt_hhhh_eeee_rrrr_wwww_iiii_ssss_eeee
  1900.                   _tttt_rrrr_yyyy_iiii_nnnn_gggg _tttt_oooo _llll_iiii_mmmm_iiii_tttt _tttt_hhhh_eeee  _aaaa_dddd_vvvv_eeee_rrrr_tttt_iiii_ssss_eeee_mmmm_eeee_nnnn_tttt  _oooo_rrrr  _aaaa_cccc_cccc_eeee_pppp_tttt_aaaa_nnnn_cccc_eeee  _oooo_ffff
  1901.                   _rrrr_oooo_uuuu_tttt_iiii_nnnn_gggg _iiii_nnnn_ffff_oooo_rrrr_mmmm_aaaa_tttt_iiii_oooo_nnnn_....  _VVVV_eeee_rrrr_ssss_iiii_oooo_nnnn _3333_...._0000_...._3333_....
  1902.  
  1903.      _hhhh_oooo_ssss_tttt_...._tttt_aaaa_rrrr     The host _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm _bbbb_yyyy _EEEE_rrrr_iiii_cccc  _WWWW_aaaa_ssss_ssss_eeee_nnnn_aaaa_aaaa_rrrr_....   _AAAA  _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm  _ffff_oooo_rrrr
  1904.                   _oooo_bbbb_tttt_aaaa_iiii_nnnn_iiii_nnnn_gggg  _iiii_nnnn_ffff_oooo_rrrr_mmmm_aaaa_tttt_iiii_oooo_nnnn  _ffff_rrrr_oooo_mmmm  _tttt_hhhh_eeee  _DDDD_oooo_mmmm_aaaa_iiii_nnnn _NNNN_aaaa_mmmm_eeee _SSSS_yyyy_ssss_tttt_eeee_mmmm_....
  1905.                   _MMMM_uuuu_cccc_hhhh _mmmm_oooo_rrrr_eeee _ffff_llll_eeee_xxxx_iiii_bbbb_llll_eeee _tttt_hhhh_aaaa_nnnn _nnnn_ssss_llll_oooo_oooo_kkkk_uuuu_pppp, and well-suited  for
  1906.                   use in shell scripts.  Version of 23 June 1994.
  1907.  
  1908.      _llll_ssss_oooo_ffff_...._tttt_aaaa_rrrr     The lsof _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm _bbbb_yyyy _VVVV_iiii_cccc _AAAA_bbbb_eeee_llll_llll_....  _AAAA _dddd_eeee_ssss_cccc_eeee_nnnn_dddd_aaaa_nnnn_tttt _oooo_ffff _oooo_ffff_iiii_llll_eeee_ssss
  1909.  
  1910.  
  1911.  
  1912.                               July 4, 1994
  1913.  
  1914.  
  1915.  
  1916.  
  1917.  
  1918.                                  - 30 -
  1919.  
  1920.  
  1921.                   and  fstat,  lsof  is used to list all open files (and
  1922.                   network connections, pipes, streams, etc.) on  a  sys-
  1923.                   tem.   Can  find out which processes have a given file
  1924.                   open, which files a specific process has open, and  so
  1925.                   forth.   Useful for tracing network connections to the
  1926.                   processes using them, as well.  Version 3.02.
  1927.  
  1928.      _nnnn_ffff_ssss_wwww_aaaa_tttt_cccc_hhhh_...._tttt_aaaa_rrrr The nfswatch _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm _bbbb_yyyy _DDDD_aaaa_vvvv_eeee  _CCCC_uuuu_rrrr_rrrr_yyyy  _aaaa_nnnn_dddd  _JJJJ_eeee_ffff_ffff  _MMMM_oooo_gggg_uuuu_llll_....
  1929.                   _MMMM_oooo_nnnn_iiii_tttt_oooo_rrrr_ssss  _tttt_hhhh_eeee  _llll_oooo_cccc_aaaa_llll  _nnnn_eeee_tttt_wwww_oooo_rrrr_kkkk  _ffff_oooo_rrrr  _NNNN_FFFF_SSSS  _pppp_aaaa_cccc_kkkk_eeee_tttt_ssss_,,,,  _aaaa_nnnn_dddd
  1930.                   _dddd_eeee_cccc_oooo_dddd_eeee_ssss _tttt_hhhh_eeee_mmmm _bbbb_yyyy  _cccc_llll_iiii_eeee_nnnn_tttt  _aaaa_nnnn_dddd  _ssss_eeee_rrrr_vvvv_eeee_rrrr  _nnnn_aaaa_mmmm_eeee_,,,,  _pppp_rrrr_oooo_cccc_eeee_dddd_uuuu_rrrr_eeee
  1931.                   _nnnn_aaaa_mmmm_eeee_,,,, _aaaa_nnnn_dddd _ssss_oooo _ffff_oooo_rrrr_tttt_hhhh_....  _CCCC_aaaa_nnnn _bbbb_eeee _uuuu_ssss_eeee_dddd _tttt_oooo _dddd_eeee_tttt_eeee_rrrr_mmmm_iiii_nnnn_eeee _hhhh_oooo_wwww _mmmm_uuuu_cccc_hhhh
  1932.                   _tttt_rrrr_aaaa_ffff_ffff_iiii_cccc _eeee_aaaa_cccc_hhhh _cccc_llll_iiii_eeee_nnnn_tttt _iiii_ssss _ssss_eeee_nnnn_dddd_iiii_nnnn_gggg _tttt_oooo _aaaa _ssss_eeee_rrrr_vvvv_eeee_rrrr_,,,, _wwww_hhhh_aaaa_tttt _uuuu_ssss_eeee_rrrr_ssss
  1933.                   _aaaa_rrrr_eeee  _aaaa_cccc_cccc_eeee_ssss_ssss_iiii_nnnn_gggg  _tttt_hhhh_eeee  _ssss_eeee_rrrr_vvvv_eeee_rrrr_,,,,  _aaaa_nnnn_dddd _ssss_eeee_vvvv_eeee_rrrr_aaaa_llll _oooo_tttt_hhhh_eeee_rrrr _mmmm_oooo_dddd_eeee_ssss_....
  1934.                   _VVVV_eeee_rrrr_ssss_iiii_oooo_nnnn _4444_...._1111_....
  1935.  
  1936.      _rrrr_dddd_iiii_ssss_tttt_...._tttt_aaaa_rrrr    The rdist _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm _ffff_rrrr_oooo_mmmm _tttt_hhhh_eeee _UUUU_nnnn_iiii_vvvv_eeee_rrrr_ssss_iiii_tttt_yyyy _oooo_ffff _SSSS_oooo_uuuu_tttt_hhhh_eeee_rrrr_nnnn _CCCC_aaaa_llll_----
  1937.                   _iiii_ffff_oooo_rrrr_nnnn_iiii_aaaa_....  _TTTT_hhhh_iiii_ssss _iiii_ssss _aaaa _rrrr_eeee_pppp_llll_aaaa_cccc_eeee_mmmm_eeee_nnnn_tttt _ffff_oooo_rrrr _tttt_hhhh_eeee _rrrr_dddd_iiii_ssss_tttt software
  1938.                   distribution utility that originated in Berkeley  UNIX
  1939.                   and  is  now  shipped with most vendors' releases.  In
  1940.                   addition to a number of  wonderful  new  features  and
  1941.                   improvements,  this  version  has  had all known rdist
  1942.                   _ssss_eeee_cccc_uuuu_rrrr_iiii_tttt_yyyy _hhhh_oooo_llll_eeee_ssss _ffff_iiii_xxxx_eeee_dddd_....  _TTTT_hhhh_iiii_ssss _vvvv_eeee_rrrr_ssss_iiii_oooo_nnnn _dddd_oooo_eeee_ssss _nnnn_oooo_tttt  _nnnn_eeee_eeee_dddd  _tttt_oooo
  1943.                   _rrrr_uuuu_nnnn _ssss_eeee_tttt_----_uuuu_ssss_eeee_rrrr_----_iiii_dddd _````_````_rrrr_oooo_oooo_tttt_,,,,_''''_'''' _uuuu_nnnn_llll_iiii_kkkk_eeee _tttt_hhhh_eeee _ssss_tttt_aaaa_nnnn_dddd_aaaa_rrrr_dddd _vvvv_eeee_rrrr_ssss_iiii_oooo_nnnn_....
  1944.                   _VVVV_eeee_rrrr_ssss_iiii_oooo_nnnn _6666_...._1111_...._0000_....
  1945.  
  1946.      _ssss_eeee_nnnn_dddd_mmmm_aaaa_iiii_llll     The sendmail _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm _bbbb_yyyy _EEEE_rrrr_iiii_cccc _AAAA_llll_llll_mmmm_aaaa_nnnn_....   _TTTT_hhhh_iiii_ssss  _ssss_uuuu_bbbb_dddd_iiii_rrrr_eeee_cccc_----
  1947.                   _tttt_oooo_rrrr_yyyy _cccc_oooo_nnnn_tttt_aaaa_iiii_nnnn_ssss _tttt_hhhh_eeee _ssss_eeee_nnnn_dddd_mmmm_aaaa_iiii_llll source code, the documenta-
  1948.                   tion, and the sample configuration files.   This  ver-
  1949.                   sion  is  a  successor to the version described in the
  1950.                   _s_e_n_d_m_a_i_l book from O'Reilly  and  Associates,  and  is
  1951.                   much newer than the versions shipped by most UNIX ven-
  1952.                   dors.  In addition to a number of improvements and bug
  1953.                   fixes,  this  version  has all known sendmail _s_e_c_u_r_i_t_y
  1954.                   _h_o_l_e_s _f_i_x_e_d.   _I_t  _i_s  _l_i_k_e_l_y  _t_h_a_t  _t_h_i_s  _v_e_r_s_i_o_n  _o_f
  1955.                   _s_e_n_d_m_a_i_l  is  more secure than the versions shipped by
  1956.                   any UNIX vendor.  Version 8.6.9.
  1957.  
  1958.      _tttt_cccc_pppp_dddd_uuuu_mmmm_pppp_...._tttt_aaaa_rrrr  The tcpdump _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm _bbbb_yyyy _VVVV_aaaa_nnnn _JJJJ_aaaa_cccc_oooo_bbbb_ssss_oooo_nnnn_....  _TTTT_hhhh_iiii_ssss _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm  _iiii_ssss
  1959.                   _ssss_iiii_mmmm_iiii_llll_aaaa_rrrr _tttt_oooo _SSSS_uuuu_nnnn_''''_ssss _eeee_tttt_hhhh_eeee_rrrr_ffff_iiii_nnnn_dddd, but somewhat more powerful
  1960.                   and slightly easier to use.  It captures packets  from
  1961.                   an  Ethernet  in  promiscuous mode, and displays their
  1962.                   contents.  Numerous options exist to filter the output
  1963.                   down  to only those packets of interest.  This version
  1964.                   runs on a number of different UNIX platforms.  Version
  1965.                   3.0.
  1966.  
  1967.      _tttt_rrrr_aaaa_cccc_eeee_rrrr_tttt_...._tttt_aaaa_rrrr  The traceroute _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm _bbbb_yyyy _VVVV_aaaa_nnnn _JJJJ_aaaa_cccc_oooo_bbbb_ssss_oooo_nnnn_....  _AAAA _uuuu_tttt_iiii_llll_iiii_tttt_yyyy  _tttt_oooo
  1968.                   _tttt_rrrr_aaaa_cccc_eeee  _tttt_hhhh_eeee  _rrrr_oooo_uuuu_tttt_eeee  _IIII_PPPP  _pppp_aaaa_cccc_kkkk_eeee_tttt_ssss _ffff_rrrr_oooo_mmmm _tttt_hhhh_eeee _cccc_uuuu_rrrr_rrrr_eeee_nnnn_tttt _ssss_yyyy_ssss_tttt_eeee_mmmm
  1969.                   _tttt_aaaa_kkkk_eeee _iiii_nnnn _gggg_eeee_tttt_tttt_iiii_nnnn_gggg _tttt_oooo _ssss_oooo_mmmm_eeee _dddd_eeee_ssss_tttt_iiii_nnnn_aaaa_tttt_iiii_oooo_nnnn  _ssss_yyyy_ssss_tttt_eeee_mmmm_....   _VVVV_eeee_rrrr_ssss_iiii_oooo_nnnn
  1970.                   _oooo_ffff _2222_8888 _FFFF_eeee_bbbb_rrrr_uuuu_aaaa_rrrr_yyyy _1111_9999_8888_9999_....
  1971.  
  1972.      _wwww_uuuu_ffff_tttt_pppp_dddd_...._tttt_aaaa_rrrr   The ftpd _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm  _ffff_rrrr_oooo_mmmm  _WWWW_aaaa_ssss_hhhh_iiii_nnnn_gggg_tttt_oooo_nnnn  _UUUU_nnnn_iiii_vvvv_eeee_rrrr_ssss_iiii_tttt_yyyy_....   _TTTT_hhhh_iiii_ssss
  1973.                   _vvvv_eeee_rrrr_ssss_iiii_oooo_nnnn  _iiii_ssss  _dddd_eeee_ssss_iiii_gggg_nnnn_eeee_dddd  _ffff_oooo_rrrr _uuuu_ssss_eeee _bbbb_yyyy _llll_aaaa_rrrr_gggg_eeee _FFFF_TTTT_PPPP _ssss_iiii_tttt_eeee_ssss_,,,, _aaaa_nnnn_dddd
  1974.                   _pppp_rrrr_oooo_vvvv_iiii_dddd_eeee_ssss _aaaa _nnnn_uuuu_mmmm_bbbb_eeee_rrrr _oooo_ffff  _ffff_eeee_aaaa_tttt_uuuu_rrrr_eeee_ssss  _nnnn_oooo_tttt  _ffff_oooo_uuuu_nnnn_dddd  _iiii_nnnn  _vvvv_eeee_nnnn_dddd_oooo_rrrr
  1975.  
  1976.  
  1977.  
  1978.                               July 4, 1994
  1979.  
  1980.  
  1981.  
  1982.  
  1983.  
  1984.                                  - 31 -
  1985.  
  1986.  
  1987.                   _vvvv_eeee_rrrr_ssss_iiii_oooo_nnnn_ssss_,,,,  _iiii_nnnn_cccc_llll_uuuu_dddd_iiii_nnnn_gggg  _iiii_nnnn_cccc_rrrr_eeee_aaaa_ssss_eeee_dddd _ssss_eeee_cccc_uuuu_rrrr_iiii_tttt_yyyy_....  _TTTT_hhhh_iiii_ssss _iiii_ssss _tttt_hhhh_eeee
  1988.                   _ffff_tttt_pppp_dddd  used  by  most  major   FTP   sites,   including
  1989.                   _w_u_a_r_c_h_i_v_e._w_u_s_t_l._e_d_u,  _f_t_p._u_u._n_e_t, and _o_a_k._o_a_k_l_a_n_d._e_d_u.
  1990.                   _N_O_T_E:  Releases of wu-ftpd _p_r_i_o_r _t_o _v_e_r_s_i_o_n _2._4 _h_a_v_e _a
  1991.                   _s_e_r_i_o_u_s  _s_e_c_u_r_i_t_y _h_o_l_e _i_n _t_h_e_m, _a_n_d _s_h_o_u_l_d _b_e _r_e_p_l_a_c_e_d
  1992.                   _a_s _s_o_o_n _a_s _p_o_s_s_i_b_l_e _w_i_t_h _t_h_e _l_a_t_e_s_t _v_e_r_s_i_o_n.   _V_e_r_s_i_o_n
  1993.                   _2._4.
  1994.  
  1995. _1._8.  _////_tttt_eeee_aaaa_mmmm_iiii_nnnn_ffff_oooo
  1996.  
  1997. The _////_tttt_eeee_aaaa_mmmm_iiii_nnnn_ffff_oooo directory contains information about and provided  by  the
  1998. FIRST  member teams.  Includes advisories, articles, etc.  The subdirec-
  1999. tories of this directory are:
  2000.  
  2001.      _aaaa_ssss_ssss_iiii_ssss_tttt       The United States Department of Defense Automated Sys-
  2002.                   tems Security Incident Response Team (ASSIST).
  2003.  
  2004.      _cccc_eeee_rrrr_tttt         The     DARPA     Computer     Emergency      Response
  2005.                   Team/Coordination Center (CERT/CC).
  2006.  
  2007.      _cccc_eeee_rrrr_tttt______iiii_tttt      The Italian Computer Emergency Response  Team  at  the
  2008.                   University of Milan.  (CERT-IT).
  2009.  
  2010.      _cccc_eeee_rrrr_tttt______nnnn_llll      The Netherlands (SURFnet) Computer Emergency  Response
  2011.                   Team (CERT-NL).
  2012.  
  2013.      _cccc_iiii_aaaa_cccc         The  United  States  Department  of  Energy   Computer
  2014.                   Incident Advisory Capability.  (CIAC).
  2015.  
  2016.      _dddd_dddd_nnnn_ssss_cccc_cccc       The United States Defense Information  Systems  Agency
  2017.                   (DISA)  Defense  Data  Network  Security  Coordination
  2018.                   Center.  (DDN SCC).
  2019.  
  2020.      _dddd_ffff_nnnn______cccc_eeee_rrrr_tttt     The  German  Research   Network   Computer   Emergency
  2021.                   Response Team.  (DFN-CERT).
  2022.  
  2023.      _ffff_iiii_rrrr_ssss_tttt        The Forum of  Incident  Response  and  Security  Teams
  2024.                   (FIRST).
  2025.  
  2026.      _nnnn_aaaa_ssss_iiii_rrrr_cccc       The NASA Automated Systems Incident Response  Capabil-
  2027.                   ity (NASIRC).
  2028.  
  2029.      _nnnn_iiii_ssss_tttt         The United States National Institute of Standards  and
  2030.                   Technology  Computer  Security  Resource  Center (NIST
  2031.                   CSRC).
  2032.  
  2033.  
  2034.  
  2035.  
  2036.  
  2037.  
  2038.  
  2039.  
  2040.  
  2041.  
  2042.  
  2043.  
  2044.                               July 4, 1994
  2045.  
  2046.  
  2047.