Practical UNIX and Internet Security

Errata for Practical UNIX and Internet Security

Submit your own errata for this product.


The errata list is a list of errors and their corrections that were found after the product was released. If the error was corrected in a later version or reprint the date of the correction will be displayed in the column titled "Date Corrected".

The following errata were submitted by our customers and approved as valid errors by the author or editor.

Color Key: Serious Technical Mistake Minor Technical Mistake Language or formatting error Typo Question Note Update



Version Location Description Submitted By Date Submitted Date Corrected
Printed
Page xxviii
changed "103 Morris Street, Suite A" to "101 Morris Street"

Anonymous    Apr 01, 1998
Printed
Page xxviii & xxix
The following information was added to the Preface

Comments and Questions We have tested and verified the information in this book to the best of our ability, but you may find that features have changed (or even that we have made mistakes!). Please let us know about any errors you find, as well as your suggestions for future editions, by writing to: O'Reilly & Associates, Inc. 101 Morris Street Sebastopol, CA 95472 1-800-998-9938 (in the U.S. or Canada) 1-707-829-0515 (international/local) 1-707-829-0104 (FAX) You can also send us messages electronically. To be put on the mailing list or request a catalog, send email to: info@oreilly.com To ask technical questions or comment on the book, send email to: bookquestions@oreilly.com We have a web site for the book, where we'll list examples, errata, and any plans for future editions. You can access this page at: http://www.oreilly.com/catalog/9781565921481/ For more information about this book and others, see the O'Reilly web site: http://www.oreilly.com

Anonymous    Mar 01, 2000
Printed
Page 62
3rd paragraph

Instead of trying every combination of letters, starting with AAAAAA (or whatever), crackers use hit lists of common passwords such as wizard or demo. In the book, only the 'ard' of 'wizard' is in italics. Seems like the whole word should be in italics ******* The following is a list of errata submitted by readers, to which the authors offer an explanation as to why these changes will not be made. *******

Note from the Author or Editor:
Fixed in the 3rd edition

Anonymous   
Printed
Page 77
Figure 4.1, in the "Users Group" section: gid was changed from "102" to

"100."

Anonymous    Mar 01, 2000
Printed
Page 87
In the "Restricting su" section, the first sentence of the first

paragraph did read: "...process group wheel..." It now reads: "...unix group wheel...".

Anonymous    Mar 01, 2000
Printed
Page 101
The first footnote, marked with an asterisk, did read:

"...NFS..." It now reads: "...NFS or another distributed file system..."

Anonymous    Mar 01, 2000
Printed
Page 118
The last sentence of the first paragraph, did read:

"...not to give one..." It now reads: "...not give one..."

Anonymous    Mar 01, 2000
Printed
Page 131

The paragraph beginning with "Note that some versions..." did read: "...on remote machines..." It now reads: "...on client machines..."

Anonymous    Mar 01, 2000
Printed
Page 150
In the paragraph entitled "crypt", the last sentence did read:

"...crypt program..." It now reads: "...crypt() system call..."

Anonymous    Mar 01, 2000
Printed
Page 167
The bulleted section titled "Authentication" did read:

"...makes possible mathematically verifying..." It now reads: "...makes it possible to mathematically verify..."

Anonymous    Mar 01, 2000
Printed
Page 178
made 1st heading B-Head instead of A-Head

Anonymous    Apr 01, 1998
Printed
Page 217

The second sentence in the second paragraph did read: "Alternatively, you can also use RCS (Revision Control System) or SCCS (Source Code Control System) to archive these files and keep a revision history." It now reads: "Alternatively, you can also use RCS (Revision Control System), CVS (Concurrent Versions System), or SCCS (Source Code Control System) to archive these files and keep a revision history."

Anonymous    Mar 01, 2000
Printed
Page 233
in figure, changed both instances of "is" to "ls"

Anonymous    Apr 01, 1998
Printed
Page 233
The third line of the second paragraph did read:

"...chroot system command..." It now reads: "...chroot() system call..."

Anonymous    Mar 01, 2000
Printed
Page 236
in the script, added a forward slash to the line

my_tty="$(bin/tty)" to read my_tty="$(/bin/tty)" Also, added a footnote at the end of the 5th paragraph (ending "simple shell script:") that says: "This script should work on most Unix systems with POSIX-compliant Korn shells, but may require modification for older ksh versions. See tip #24 on page 713." and to the last line, removed quotes: exec -a -${real_shell##*/} $real_shell "${1+"$@"} now reads exec -a -${real_shell##*/} $real_shell ${1+"$@"}

Anonymous    Nov 01, 1998
Printed
Page 236

A footnote has been added for the "Restricting Logins" title that reads: "There may be mechanisms and methods under other versions of Unix for restricting accounts and managing dormant accounts. We present the most common methods in these sections of the book."

Anonymous    Mar 01, 2000
Printed
Page 238

The second sentence in the last paragraph did read: "You can tell you are using shadow passwords if the password field in /etc/passwd is blank or contains an asterisk or hash marks for every password, instead of containing regular encrypted passwords." It now reads: "You can tell you are using shadow passwords if the password field in /etc/passwd is blank, or contains a symbol such as ! or # for every password, instead of containing regular encrypted passwords."

Anonymous    Mar 01, 2000
Printed
Page 263
The third sentence of the third paragraph in the section "Shadow

Password Files" did read: "(For instance, SVR4 uses the file /etc/shadow, with protected mode 400, and owned by root; ...)" It now reads: "(For instance, SVR4 uses the file /etc/shadow, with protected mode 600, and owned by root; ...)"

Anonymous    Mar 01, 2000
Printed
Page 288
2nd paragraph

The textual description of how a computer uses DNS to resolve a name is in error. The text suggests that only partial suffixes of the full hostname are sent to the nameservers and the redirections are followed until the full hostname is sent. As the figure on page 289 implies, the full hostname is sent everytime.

Anonymous   
Printed
Page 294
Example 10-1, line 10

for (uid = 0;..... now reads for ($uid = 0;.....

Anonymous    Nov 01, 1998
Printed
Page 298
Example on how to backup log files

# make a copy of the log file and zero the old one rm /var/adm/wtmp.old ln /var/adm/wtmp.old /var/adm/wtmp cp /dev/null /var/adm/wtmp mv /var/adm/wtmp.nul /var/adm/wtmp It now reads: mv /var/adm/wtmp /var/adm/wtmp.old cp /dev/null /var/adm/wtmp chmod 600 /var/adm/wtmp

Anonymous    Mar 01, 1999
Printed
Page 300
The first line of the first paragraph did read:

"This command can..." It now reads: "This file can..."

Anonymous    Mar 01, 2000
Printed
Page 301

Middle of the page, the line that read: It is typically /var/adm/acct or /var/adm/acct. now reads: It is typically /var/adm/acct.

Anonymous    Jul 01, 1999
Printed
Page 311
A footnote has been added for the "NOTE" section in the middle of the

page, which reads: "AIX silently ignores .* as priority, one has to use .debug."

Anonymous    Mar 01, 2000
Printed
Page 316
In Table 10-5, the fourth row in the "Message" column, which read "root

logged in.", has been moved to column 3, line 2.

Anonymous    Mar 01, 2000
Printed
Page 332
The second line in the fourth paragraph did read:

"...wishes to run--a game..." It now reads: "...wishes to run--login, a game..."

Anonymous    Mar 01, 2000
Printed
Page 342
The third line of the first paragraph did read:

"...not contain a / symbol..." It now reads: "...not contain a leading / symbol..."

Anonymous    Mar 01, 2000
Printed
Page 342
The third code section did read:

"PATH= /usr/bin......." It now reads: "PATH=/usr/bin........" (extra blank between "=" and "/" deleted)

Anonymous    Mar 01, 2000
Printed
Page 344
Regarding the "$HOME attacks" section: if a shell uses $HOME it is also

vulnerable, not only if it uses ~ as a shortcut.

Anonymous   
Printed
Page 355
In the NOTE, the extra blanks before "access" in the Berkley example

have been deleted.

Anonymous    Mar 01, 2000
Printed
Page 531
line -3: removed the final (lowercase) "u" from "GHOTI.LCS.MIT.EDUu"

Anonymous    Nov 01, 1998
Printed
Page 541
Under the Warning heading: Replaced the sentence

"Do not run your server as root!" (all in italics) with "Do not specify the user "root" for the user to run httpd in your httpd configuration file." (all in italics)

Anonymous    Nov 01, 1998
Printed
Page 542
In para 2, replaced the sentence

"Because the httpd program is run as root..." with the two sentences "The httpd server must be run by the superuser so that it can bind to port 80. It then changes to the user ID specified in the configuration file." ("httpd" in italics as before)

Anonymous    Nov 01, 1998
Printed
Page 675
The first ftp site under "Getting tcpwrapper" was listed as:

ftp://ftp.win.tue.nl/pub/security/tcp_wrapper_XXX.tar.gz Now reads: ftp://ftp.porcupine.org/pub/security/index.html Also, in the second paragraph of this section, changed "ftp.win.tue.nl" to "ftp.porcupine.org."

Anonymous    Nov 01, 2000
Printed
Page 679

The first line of Item 5 did read: "...man pages host_access and host_options." Now reads: "...man pages hosts_access and hosts_options." (colophon, 974) The last two sentences of the first paragraph did read: "Whenever possible, our books use RepKover, or Otabind, a durable and flexible lay-flat binding. If the page count exceeds RepKover's limit..." They now read: "Whenever possible, our books use a durable and flexible lay-flat binding. If the page count exceeds this binding's limit..."

Anonymous    Nov 01, 2000
Printed
Page 700
Line 4

for (iloop = 1; i loop < argc; iloop++) Now reads: for (iloop = 1; iloop < argc; iloop++) There is no space on 2nd parameter of the iloop.

Anonymous    Sep 01, 2001
Printed
Page 954
"netnews~firewalls, 661"

has been changed to read: "netnews (see Usenet)"

Anonymous    Mar 01, 1999
Printed
Page 956
The entries "one" and "Open Source Distribution" have been

deleted.

Anonymous    Mar 01, 1999
Printed
Page 968
A subentry "firewealls, 661" has been added under the entry

Usenet.

Anonymous    Mar 01, 1999
Printed
Page 974
added the following to the next-to-last para

Whenever possible, our books use RepKover (tm), a durable and flexible lay-flat binding. If the page count exceeds RepKover's limit, perfect binding is used.

Anonymous    Apr 01, 1998