|
|
Авторизация |
|
|
Поиск по указателям |
|
|
|
|
|
|
|
|
|
|
Snader J.C. — VPNs Illustrated: Tunnels, VPNs, and IPsec |
|
|
Предметный указатель |
PPTP, control message header, definition of
PPTP, control messages
PPTP, definition of
PPTP, extended GRE header, definition of
Preneel, B.
printf function
PRIVATE
private address 2nd 3rd 4th 5th
private address, ranges
Private Communications Technology [See PCT]
private, group, definition of
private, peering
Protocol
protocol, distance vector 2nd
Protocol, ICMP
protocol, IDs, IPsec
protocol, IP
protocol, label distribution
protocol, link-state 2nd
protocol, path-vector
protocol, TCP
Protocol, UDP
protocol, version, definition of
protocols, IPSec
Provan, D.
Proxy
proxy, ARP, definition of
proxy, authen challenge, definition of
proxy, authen ID, definition of
proxy, authen name, definition of
proxy, authen response, definition of
proxy, authen type, definition of
pseudo-header 2nd
pseudo-randomness, definition of
pseudowire
PSH flag, definition of
Public Key Infrastructure [See PKI]
public key signature data, SSHv2
Pyle, E.
python program 2nd 3rd 4th 5th
Quick mode, definition of
rand function 2nd
Random
random device
random, device, definition of
random, vector, definition of
random/urandom device
RAS (remote access server), definition of
rbiff program
rbiffd program 2nd
RC4 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
RC4, alleged
rcp program 2nd
read function 2nd
receive window, definition of
record layer
record layer, message types, SSL
record layer, SSL
recv_char() program
reference model, OSI
Rekhter, Y. 2nd 3rd 4th 5th 6th
reliable 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
remote access server [See RAS]
remote variable
Rescorla, E. 2nd 3rd 4th 5th 6th
Result code AVP
result codes, StopCCN
resumed session, SSL
rexec program
Reynold, J.K.
Rijndael [See AES]
RIP
Rivest, R. 2nd 3rd 4th 5th
rlogin program
Robshaw, M. 2nd
Romkey, J.L.
Roos, A.
rootcert.pem file
Rosen, E.C. 2nd
round keys
round trip time [See RTT]
route program
Routing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th
RSA 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st
RSA, Laboratories 2nd
rsh program 2nd
RST flag, definition of
RTT (round trip time)
Rubens, A. 2nd
Rx connect speed, definition of
S-box (substitution box), definition of
SA (security association) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
SA, definition of 2nd
SA, proposal and transform payloads
SAD (security association database), definition of
SCCCN AVPs
SCCRP AVPs
SCCRQ AVPs
Schertler, M.
Schiller, J.I.
Schneider, M.
Schneier, B. 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th
scp (Secure Copy Program)
scp program 2nd 3rd 4th
Secure Copy Program [See SCP]
Secure Data Network System [See SP3]
Secure Hash Algorithm [See SHA]
Secure Shell [See SSH]
Secure Sockets Layer [See SSL]
security association 3rd 4th 5th 6th 7th 8th [See SA]
security association database [See SAD]
security parameter index [See SPI]
security policy database [See SPD]
select function 2nd
sendto function
send_char() program
sequencing required, definition of
SEQ_LT macro
SEQ_LT, definition of
Serial Line Protocol [See SLIP]
server
server, hello, SSL
server, key, SSH
session
session, key generation, SSHv2
session, key, definition of
set link info message [See SLI]
setkey program 2nd
sftp program
sh program
SHA (Secure Hash Algorithm) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st
Shamir, A. 2nd 3rd 4th 5th
Shea, R. 2nd
SHELL variable
shortest path, definition of
Signature, digital 2nd 3rd 4th 5th 6th 7th 8th
Silverman, R.E.
Simone, D.
Simpson, W.A. 2nd
Siverman, R.E. 2nd
sleep function
SLI (set link info message)
SLI, AVPs
SLI, definition of
SLIP (Serial Line Protocol) 2nd
Smurf attack
Snader, J.C.
Snader, M
Snader, R.
snoop program
| SOCKADDR macro
sockaddr structure
sockaddr_in structure
SOCK_RAW socket option
soft state 2nd
solaris work station 2nd 3rd
Solo, D.
Song, D.X.
SopCCN AVPs
SP3 (Secure Data Network System), definition of
Spam
SPD (security policy database)
SPD, definition of
Speciner, M.
SPI (security parameter index), definition of
Srisuresh, P.
SSH (Secure Shell) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
ssh program 2nd 3rd 4th 5th 6th 7th 8th
SSH, general authentication messages
SSH, port forwarding
SSH, server key
SSH, VPN
sshd program 2nd 3rd 4th 5th 6th
SSHv1
SSHv1, authentication
SSHv1, binary packet, definition of
SSHv1, message types
SSHv1, remote commands
SSHv1, security
SSHv1, user authentication
SSHv2
SSHv2, authentication
SSHv2, binary packet, definition of
SSHv2, channel messages
SSHv2, connection protocol
SSHv2, data transfer
SSHv2, Diffie-Hellman key exchange
SSHv2, exchange hash
SSHv2, key generation
SSHv2, keyboard interactive authentication
SSHv2, none authentication
SSHv2, open failure reason codes
SSHv2, parameter negotiation
SSHv2, password authentication
SSHv2, port forwarding
SSHv2, public key authentication
SSHv2, public key signature data
SSHv2, remote commands
SSHv2, security
SSHv2, services
SSHv2, session key generation
SSHv2, subsystems
SSHv2, transport message types
SSHv2, transport protocol
SSHv2, user authentication request, definition of
sshvpn
sshvpn, program
SSH_CMSG_PORT_FORWARD_REQUEST, definition of
SSH_CMSG_REQUEST_PTY, definition of
SSH_CMSG_SESSION_KEY, definition of
SSH_CMSG_X11_REQUEST_FORWARDING, definition of
SSH_MSG_CHANNEL_DATA, definition of
SSH_MSG_CHANNEL_EXTENDED_DATA, definition of
SSH_MSG_CHANNEL_OPEN, definition of
SSH_MSG_CHANNEL_OPEN_CONFIRMATION, definition of 2nd
SSH_MSG_CHANNEL_OPEN_FAILURE, definition of
SSH_MSG_CHANNEL_REQUEST, definition of
SSH_MSG_GLOBAL_REQUEST, definition of
SSH_MSG_KEXDH_GEX_REPLY, definition of
SSH_MSG_KEXDH_REQUEST, definition of
SSH_MSG_KEXINIT, definition of
SSH_MSG_PORT_OPEN, definition of
SSH_MSG_USERAUTH_FAILURE, definition of
SSH_MSG_USERAUTH_INFO_REQUEST, definition of
SSH_MSG_USERAUTH_INFO_RESPONSE, definition of
SSH_MSG_USERAUTH_PASSWD_CHANGEREQ, definition of
SSH_SMSG_PUBLIC_KEY, definition of
SSL (Secure Sockets Layer) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th
SSL, alert
SSL, alert message types
SSL, alert message, definition of
SSL, certificate 2nd 3rd 4th 5th 6th 7th 8th
SSL, certificate message, definition of
SSL, change cipher spec
SSL, cipher suite
SSL, cipher suite, definition of
SSL, cipher suites
SSL, client authentication
SSL, client cert. request, definition of
SSL, client hello
SSL, client hello, definition of
SSL, client key exchange
SSL, client key exchange message, definition of
SSL, closure notification
SSL, definition of
SSL, Diffie-Hellman key exchange
SSL, finished message
SSL, finished message, definition of
SSL, handshake header, definition of
SSL, handshake messages
SSL, handshake types
SSL, hello done
SSL, MasterSecret, definition of
SSL, PreMasterSecret, definition of
SSL, protocol
SSL, record format, definition of
SSL, record layer
SSL, record layer message types
SSL, resumed session
SSL, security
SSL, server hello
SSL, server hello done, definition of
SSL, server hello, definition of
SSL, server key exchange message, definition of
SSL, v2 client hello
SSL, v2 record-client hello, definition of
SSL, VPN
ssldump
ssldump program 2nd 3rd 4th 5th 6th 7th
sslecho program 2nd 3rd
sslecho.pem file
SSL_accept function
SSL_read function 2nd
SSL_set_bio function
SSL_write function
STACK
stack, definition of
stack, TCP/IP
Staddon, J. 2nd
startup function 2nd
static mode, definition of
Stenberg, M. 2nd
Stevens, W.R. 2nd 3rd 4th 5th 6th
Stevenson, F.A.
StopCCN result codes
Stream cipher 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
strerror function
strong collision resistance, definition of
stunnel
stunnel, program 2nd 3rd 4th
stunnel. program
stunnel.client file
stunnel.server file 2nd
subaddress, definition of
subnetting
substitution box [See S-box]
subsystems, SSHv2
Swander, B. 2nd
symmetric
symmetric, cipher 2nd 3rd 4th
|
|
|
Реклама |
|
|
|