21.03.2013 Views

Problem - Kevin Tafuro

Problem - Kevin Tafuro

Problem - Kevin Tafuro

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

attacks (continued)<br />

capture replay attacks, preventing, 303<br />

collision attacks, 251<br />

cross-site scripting attacks, 103<br />

dictionary attacks, 133<br />

RSA and, 335<br />

double-encoding attacks, 100<br />

format-string attacks, preventing, 75–78<br />

length extension attacks, 252<br />

preventing, 269<br />

man-in-the-middle attacks, 161, 310,<br />

432, 503<br />

preventing, 436<br />

methods targeting authentication, 365<br />

on entropy sources, 622<br />

replay attacks, prevention, 134<br />

rollback attacks, 161, 492<br />

shatter attacks, protecting Windows<br />

from, 716<br />

SQL injection attacks, 107–110<br />

stack-smashing attacks, 79<br />

surreptitious forwarding attacks, 343<br />

timing attacks, 337<br />

audit logging, 734–737<br />

log entries, signing and encrypting, 736<br />

logging to CD-R, 736<br />

MACs for detection of log file<br />

manipulation, 737<br />

network logging, 734<br />

VPNs (virtual private networks), 735<br />

authenticate-and-encrypt paradigm, 299<br />

authenticated secure channels, building<br />

without SSL, 491–501<br />

authentication, 362–372<br />

attacks against, preparing for, 365<br />

authentication factors, 363<br />

common technologies, 367–372<br />

cookies, using, 419–421<br />

delays after failed attempts, 398<br />

DSA and Diffie-Hellman, 436<br />

Kerberos, using, 414–418<br />

and key exchange using RSA, 429–431<br />

mechanisms, requirements for, 364–367<br />

methods, choosing, 362–372<br />

minimizing risk when done with no<br />

PKI, 438–444<br />

number of failed attempts, 398<br />

password-based using PBKDF2, 408–411<br />

password-based with<br />

MD5-MCF, 402–408<br />

securing against rollback attacks, 492<br />

throttling failed attempts, 398–400<br />

740 | Index<br />

Unix domain sockets, using, 482–485<br />

via PAM API, 411–414<br />

without third-party, 438–444<br />

Avaya Labs LibSafe, 83<br />

AX_compute_credentials( ), 423<br />

AX_connect( ), 427<br />

AX_CRED_deserialize( ), 424<br />

AX_CRED_serialize( ), 424<br />

AX_exchange( ), 428<br />

AX_get_credentials_callback( ), 424<br />

AX_get_salt( ), 424<br />

AX_set_salt( ), 428<br />

AX_srv_accept( ), 426<br />

AX_srv_exchange( ), 426<br />

AX_srv_listen( ), 425<br />

This is the Title of the Book, eMatter Edition<br />

Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved.<br />

B<br />

Balabit IT Security LTD, 735<br />

base64<br />

decoding, 125<br />

public interface to code example, 128<br />

encoding, 123–125<br />

characters in output, 123<br />

public interface to code example, 125<br />

base64 encoding, 123–125<br />

basic data validation techniques, 71–75<br />

Berkeley socket interface for TCP/IP, 477<br />

Bernstein, Dan, 82, 250, 287<br />

big numbers, integer-based math and, 315<br />

big-endian vs. little-endian storage, 118<br />

BIGNUM library (OpenSSL), 315–323<br />

precomputation of key values, 328<br />

BIGNUM objects<br />

assigning random values, 317–319<br />

assignment of numerical values, 316<br />

binary numbers, representing as, 319<br />

common tests on, 320<br />

initialization, 315<br />

malloc( ) and, 316<br />

math operations supported on, 321<br />

outputting, 319<br />

BIGNUM_clear_free( ), 316<br />

binary data, representing as English text, 128<br />

binary keys, conversion from text, 130<br />

binary strings, conversion<br />

from integers for use with RSA, 331<br />

to integers for use with RSA, 330<br />

BIO filters, 456<br />

BIO objects, 456<br />

BIO_free_all( ), 457<br />

BIO_new_mem_buf( ), 554<br />

BIO_read( ), 457

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!