The _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_dddd_oooo_ssss_////_nnnn_eeee_tttt_wwww_oooo_rrrr_kkkk directory contains programs for controlling
access to a system via the network. The files in this subdirectory are:
_kkkk_bbbb_rrrr_iiii_dddd_gggg_eeee_...._zzzz_iiii_pppp The KarlBridge _pppp_aaaa_cccc_kkkk_aaaa_gggg_eeee _bbbb_yyyy _DDDD_oooo_uuuu_gggg _KKKK_aaaa_rrrr_llll_.... _AAAA _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm _tttt_hhhh_aaaa_tttt
The _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_dddd_oooo_ssss_////_ssss_eeee_cccc_uuuu_rrrr_iiii_tttt_yyyy directory contains programs for controlling
PC security. The files in this directory are a mirror of the SimTel
_////_mmmm_ssss_dddd_oooo_ssss_////_ssss_eeee_cccc_uuuu_rrrr_iiii_tttt_yyyy archive from oak.oakland.edu_.... _SSSS_eeee_eeee _tttt_hhhh_eeee _ffff_iiii_llll_eeee _0000_0000______iiii_nnnn_dddd_eeee_xxxx_...._tttt_xxxx_tttt
The _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_uuuu_nnnn_iiii_xxxx_////_aaaa_uuuu_tttt_hhhh_eeee_nnnn_tttt directory contains software for performing
user and program authentication. The files in this directory are:
_kkkk_eeee_rrrr_bbbb_eeee_rrrr_oooo_ssss This subdirectory contains the sources and documenta-
tion for the Kerberos package from the Massachusetts
Institute of Technology. There are two subdirectories
of this directory:
_vvvv_4444 Version 4 Patchlevel 10. This is the
July 4, 1994
- 23 -
final release of Version 4; all future
development efforts will be based on Ver-
sion 5. Release date: 9 December 1992.
_vvvv_5555 Version 5 Beta 4. This is the current
release of Version 5; all current
development efforts are based on this
version. Release date: 15 June 1994.
_llll_iiii_bbbb_iiii_dddd_eeee_nnnn_tttt_...._tttt_aaaa_rrrr The libident _llll_iiii_bbbb_rrrr_aaaa_rrrr_yyyy _bbbb_yyyy _PPPP_eeee_tttt_eeee_rrrr _EEEE_rrrr_iiii_kkkk_ssss_ssss_oooo_nnnn_.... _AAAA _llll_iiii_bbbb_rrrr_aaaa_rrrr_yyyy _oooo_ffff
The _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_uuuu_nnnn_iiii_xxxx_////_dddd_iiii_gggg_ssss_iiii_gggg directory contains programs for computing
digital signatures (cryptographic checksums). The files in this direc-
tory are:
_mmmm_dddd_2222_...._tttt_xxxx_tttt The source code and specification for the MD-2 message
digest function.
_mmmm_dddd_4444_...._tttt_xxxx_tttt The source code and specification for the MD-4 message
digest function.
_mmmm_dddd_5555_...._tttt_xxxx_tttt The source code and specification for the MD-5 message
digest function.
_ssss_nnnn_eeee_ffff_rrrr_uuuu_...._tttt_aaaa_rrrr The source code and documentation for the Snefru mes-
sage digest function (Xerox Secure Hash Function).
The _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_uuuu_nnnn_iiii_xxxx_////_ffff_iiii_rrrr_eeee_wwww_aaaa_llll_llll directory contains software for constructing
network firewalls. The files in this directory are:
_gggg_aaaa_uuuu_...._tttt_aaaa_rrrr The Gateway Access Utilities package from Sterling
Software. Supports access to the Internet through a
network firewall without requiring that users have
accounts on the firewall host itself. These are
modifed TELNET and FTP programs that work in a
``proxy'' fashion through the firewall. Version of 22
March 1993.
July 4, 1994
- 24 -
_ssss_oooo_cccc_kkkk_ssss_...._tttt_aaaa_rrrr The socks _pppp_aaaa_cccc_kkkk_aaaa_gggg_eeee_,,,, _bbbb_yyyy _DDDD_aaaa_vvvv_iiii_dddd _aaaa_nnnn_dddd _MMMM_iiii_cccc_hhhh_eeee_llll_llll_eeee _KKKK_oooo_bbbb_llll_aaaa_ssss_.... _AAAA_nnnn
_ssss_cccc_kkkk_ssss_cccc_ssss_tttt_cccc_...._tttt_aaaa_rrrr The CSTC release of the socks _pppp_aaaa_cccc_kkkk_aaaa_gggg_eeee _((((_ssss_eeee_eeee _ssss_oooo_cccc_kkkk_ssss_...._tttt_aaaa_rrrr_))))_....
The _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_uuuu_nnnn_iiii_xxxx_////_nnnn_eeee_tttt_mmmm_oooo_nnnn directory contains programs for monitoring
network security. The files in this directory are:
_nnnn_eeee_tttt_mmmm_aaaa_nnnn This subdirectory contains the NETMAN package of net-
work monitoring and visualization tools from Curtin
University. The etherman _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm _iiii_ssss _aaaa_nnnn _XXXX _WWWW_iiii_nnnn_dddd_oooo_wwww
The _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_uuuu_nnnn_iiii_xxxx_////_nnnn_eeee_tttt_wwww_oooo_rrrr_kkkk directory contains programs for controlling
access to a system via the network. The files in this subdirectory are:
_iiii_pppp_aaaa_cccc_llll_...._tttt_aaaa_rrrr The ipacl _pppp_aaaa_cccc_kkkk_aaaa_gggg_eeee _ffff_rrrr_oooo_mmmm _SSSS_iiii_eeee_mmmm_eeee_nnnn_ssss_.... _FFFF_oooo_rrrr_cccc_eeee_ssss _aaaa_llll_llll _TTTT_CCCC_PPPP _aaaa_nnnn_dddd
_pppp_oooo_rrrr_tttt_mmmm_aaaa_pppp_...._tttt_aaaa_rrrr The portmap _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm _bbbb_yyyy _WWWW_iiii_eeee_tttt_ssss_eeee _VVVV_eeee_nnnn_eeee_mmmm_aaaa_.... _AAAA _rrrr_eeee_pppp_llll_aaaa_cccc_eeee_mmmm_eeee_nnnn_tttt
_ffff_oooo_rrrr _tttt_hhhh_eeee _ssss_tttt_aaaa_nnnn_dddd_aaaa_rrrr_dddd _SSSS_uuuu_nnnn _pppp_oooo_rrrr_tttt_mmmm_aaaa_pppp program (portable to a
number of vendors' systems) that attempts to close all
known holes in portmap_.... _TTTT_hhhh_iiii_ssss _iiii_nnnn_cccc_llll_uuuu_dddd_eeee_ssss _pppp_rrrr_eeee_vvvv_eeee_nnnn_tttt_iiii_oooo_nnnn _oooo_ffff
The _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_uuuu_nnnn_iiii_xxxx_////_pppp_aaaa_ssss_ssss_wwww_oooo_rrrr_dddd directory contains programs pertaining to
password security. The files in this subdirectory are:
_aaaa_nnnn_llll_pppp_aaaa_ssss_ssss_wwww_...._tttt_aaaa_rrrr The anlpasswd _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm _((((_ffff_oooo_rrrr_mmmm_eeee_rrrr_llll_yyyy _pppp_eeee_rrrr_llll_----_pppp_aaaa_ssss_ssss_wwww_dddd_2222) from
Argonne National Library. A proactive password
checker that refuses to let users choose ``bad'' pass-
words. Version 2.2.
_cccc_rrrr_aaaa_cccc_kkkk_...._tttt_aaaa_rrrr The crack _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm _bbbb_yyyy _AAAA_llll_eeee_cccc _MMMM_uuuu_ffff_ffff_eeee_tttt_tttt_.... _AAAA _pppp_aaaa_ssss_ssss_wwww_oooo_rrrr_dddd_----
grams to try to prevent users from choosing passwords
that crack _wwww_oooo_uuuu_llll_dddd _bbbb_eeee _aaaa_bbbb_llll_eeee _tttt_oooo _gggg_uuuu_eeee_ssss_ssss_.... _VVVV_eeee_rrrr_ssss_iiii_oooo_nnnn _2222_...._5555_....
_nnnn_pppp_aaaa_ssss_ssss_wwww_dddd_...._tttt_aaaa_rrrr The npasswd _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm _bbbb_yyyy _CCCC_llll_yyyy_dddd_eeee _HHHH_oooo_oooo_vvvv_eeee_rrrr_.... _AAAA _pppp_llll_uuuu_gggg_----
_cccc_oooo_mmmm_pppp_aaaa_tttt_iiii_bbbb_llll_eeee _rrrr_eeee_pppp_llll_aaaa_cccc_eeee_mmmm_eeee_nnnn_tttt _ffff_oooo_rrrr _pppp_aaaa_ssss_ssss_wwww_dddd that refuses to
accept ``bad'' passwords. Includes support for System
V Release 3 password aging and Sun's Network Informa-
tion Service (NIS) (Yellow Pages). Version 1.2.4.
_oooo_bbbb_vvvv_iiii_oooo_uuuu_ssss_...._tttt_aaaa_rrrr The obvious-pw _ffff_uuuu_nnnn_cccc_tttt_iiii_oooo_nnnn _bbbb_yyyy _JJJJ_oooo_hhhh_nnnn _NNNN_aaaa_gggg_llll_eeee_.... _TTTT_hhhh_iiii_ssss _ffff_uuuu_nnnn_cccc_tttt_iiii_oooo_nnnn
The _////_ssss_oooo_ffff_tttt_wwww_aaaa_rrrr_eeee_////_uuuu_nnnn_iiii_xxxx_////_ssss_yyyy_ssss_mmmm_oooo_nnnn directory contains programs for monitoring
system security. The files in this directory are:
_bbbb_iiii_nnnn_aaaa_uuuu_dddd_iiii_tttt_...._tttt_aaaa_rrrr The RIACS Intelligent Auditing and Categorizing Sys-
tem, from the Research Institute for Advanced Computer
Science. A file system auditing program that compares
current contents against previously-generated list-
ings, and reports differences. Version 3.1.3.
_cccc_oooo_pppp_ssss_...._tttt_aaaa_rrrr The Computer Oracle and Password System (COPS) package
from Purdue University. Examines a system for a
number of known weaknesses and alerts the system
administrator to them; in some cases it can automati-
cally correct these problems. Version 1.04.
_cccc_pppp_mmmm_...._tttt_aaaa_rrrr The cpm program from Carnegie Mellon University.
Checks a system for any network interfaces in
July 4, 1994
- 28 -
promiscuous mode; this may indicate that an attacker
has broken in and started a packet snooping program.
Version 1.0.
_iiii_ffff_ssss_tttt_aaaa_tttt_uuuu_ssss_...._tttt_aaaa_rrrr The ifstatus _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm _bbbb_yyyy _DDDD_aaaa_vvvv_eeee _CCCC_uuuu_rrrr_rrrr_yyyy_.... _CCCC_hhhh_eeee_cccc_kkkk_ssss _aaaa _ssss_yyyy_ssss_tttt_eeee_mmmm
_iiii_ssss_ssss_...._tttt_aaaa_rrrr The iss _pppp_rrrr_oooo_gggg_rrrr_aaaa_mmmm _bbbb_yyyy _CCCC_hhhh_rrrr_iiii_ssss_tttt_oooo_pppp_hhhh_eeee_rrrr _KKKK_llll_aaaa_uuuu_ssss_.... _AAAA _mmmm_uuuu_llll_tttt_iiii_----_llll_eeee_vvvv_eeee_llll
_MMMM_uuuu_cccc_hhhh _mmmm_oooo_rrrr_eeee _ffff_llll_eeee_xxxx_iiii_bbbb_llll_eeee _tttt_hhhh_aaaa_nnnn _nnnn_ssss_llll_oooo_oooo_kkkk_uuuu_pppp, and well-suited for