F. Anklesaria, M. McCahill, P. Lindner, D. Johnson, D. Torrey and B. Alberti. The Internet Gopher Protocol (a distributed document search and retrieval protocol). RFC 1436, March 1993. (Format: TXT=36493 bytes)
ANS CO+RE Systems Inc. Interlock 2.1. August 18, 1993. Commercial Product.
Frederick M. Avolio and Marcus J. Ranum. A
Network Perimeter with Secure External Access. Proceedings of the
Internet Society Symposium on Network and Distributed System Security,
San Diego, CA, February 3, 1994.
Original at: ftp://ftp.tis.com/pub/firewalls/isoc94-paper.ps.Z
D. Balenson. Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms, Modes, and Identifiers. RFC 1423, February 1993. (Format: TXT=33277 bytes) (Obsoletes RFC1115)
S.M. Bellovin, Security Problems in the TCP/IP Protocol Suite.
Computer Communications Review, 19(2):32-48, April 1989.
Original
at:
ftp://ftp.research.att.com/dist/internet_security/ipext.ps.Z
S.M. Bellovin, Pseudo-Network Drivers and Virtual Networks.
USENIX Conference Proceeding, Pages 229-244, Washington D.C.,
January 22-26, 1990
Original at: ftp://ftp.research.att.com/dist/smb/pnet.ext.ps.Z
Steven M. Bellovin. There Be Dragons. A description of cracker assaults vs. the ramparts of ATT.COM. August 15, 1992.
S.M. Bellovin, Pseudo-Network Drivers and Virtual Networks.
USENIX Conference Proceeding, Pages 229-244, Washington D.C.,
January 22-26, 1990
Original at: ftp://ftp.research.att.com/dist/smb/packets.ps
S. Bellovin. Firewall-Friendly FTP. RFC 1579. February 1994. (Format: TXT=8806 bytes)
Steven M. Bellovin and Michael Merritt.
Limitations of the Kerberos Authentication System. USENIX
Conference Proceedings, Pages 253-267, Dallas, TX, Winter 1991.
Original
at: ftp://ftp.research.att.com/dist/internet_security/kerblimit.usenix.ps
Steven M. Bellovin and Michael Merritt,
Encrypted key exchange: Password-based protocols secure against
dictionary attacks. Proceedings IEEE Computer Society Symposium on
Research in Security and Privacy, Pages 72-84, Oakland, CA, May
1992.
Original at: ftp://ftp.research.att.com/dist/smb/neke.ps
Steven M. Bellovin and Michael Merritt,
Augmented Encrypted Key Exchange: a Password-Based Protocol Secure
Against Dictionary Attacks and Password File Compromise. Proceedings
of the First ACM Conference on Computer and Communications Security,
Pages 244-250, Fairfax, VA, November 1993.
Original at: ftp://ftp.research.att.com/dist/smb/aeke.ps
Matt
Bishop. A Security Analysis of the NTP Protocol. Sixth Annual
Computer Security Conference Proceedings, Pages 20-29, Tuscon, AZ,
December 1990.
Original at: ftp://louie.udel.edu/pub/ntp/doc/security.ps.Z
Matt
Blaze. A Cryptographic File System for Unix. Proceedings of the
First ACM Conference on Computer and Communications Security, Pages
9-16, Fairfax, VA, November 1993.
Original at: ftp://ftp.research.att.com/dist/mab/cfs.ps
N. Borenstein & N. Freed. MIME (Multipurpose Internet Mail Extensions) Part One: Mechanisms for Specifying and Describing the Format of Internet Message Bodies. RFC 1521. September 1993. (Format: TXT=187424) (Obsoletes RFC 1341)
D. Borman, Editor. Telnet Authentication: Kerberos Version 4. RFC 1411. January 1993. (Format: TXT=7967 bytes)
D. Borman, Editor. Telnet Authentication Option. RFC 1416. February 1993. (Format: TXT=13270 bytes) (Obsoletes RFC1409)
R. Braden, D. Clark, S. Crocker & C. Huitema. Report of IAB Workshop on Security in the Internet Architecture - February 8-10, 1994. RFC 1636. June 1994. (Format: TXT=130761 bytes)
Russell L. Brand, Lawrence Livermore National Labs. Coping with the Threat of Computer Security Incidents - A Primer from Prevention through Recovery. June 8, 1990.
Brent Chapman. Network (In)Security Through IP Packet
Filtering. Proceedings of the Third Usenix UNIX Security Symposium,
Pages 63-76, Baltimore, MD, September 1992.
Original at: ftp://ftp.greatcircle.com/pub/firewalls/pkt_filtering.ps.Z
Bill Cheswick. The Design of a Secure Internet Gateway. April 20, 1990.
Bill Cheswick. An Evening with Berferd In Which a
Cracker is Lured, Endured, and Studied. Proceedings, Winter USENIX
Conference, San Francisco, CA, January 1992.
Original at: ftp://ftp.research.att.com/dist/internet_security/berferd.ps
William R. Cheswick and Steven M. Bellovin.
Firewalls and Internet Security: Stalking the Wily Hacker. Addison
Wesley, ISBN 0-201-63357-4. 1994. The Cover, Preface and Table of
Contents of this excellent book.
The Original for the above and
Errata are at ftp://ftp.research.att.com/dist/internet_security/firewall.book/.
D. Crocker. Standard for the format of ARPA Internet text messages. RFC 822. Aug-13-1982. (Format: TXT=109200 bytes) (Obsoletes RFC0733) (Updated by RFC1123, RFC1148, RFC1138)
David A. Curry. Improving the Security of your Unix System. A valuable document for understanding security holes in Unix and patching them. The precursor to his excellent book. SRI Information and Telecommunications Sciences and Technology Division Technical Report ITSTD-721-FR-90-21.
S.E. Deering. Host extensions for IP multicasting. RFC 1112. Aug-01-1989. (Format: TXT=39904 bytes) (Obsoletes RFC0988, RFC1054)
Department of Defence Trusted Computer System Evaliation Criteria. DoD 5200.28-STD. 1985. The famous Orange Book.
D. Eastlake. Physical Link Security Type of Service. RFC 1455. May 1993. (Format: TXT=12391 bytes)
Mark W. Eichlin and Jon A. Rochlis. With
Microscope and Tweezers: An Analysis of the Internet Virus of November
1988. Proceedings, IEEE Symposium on Research in Security and
Privacy, Pages 326-345, Oakland, CA, May, 1989.
Original at:
ftp://athena-dist.mit.edu/pub/virus/mit.PS
Paul Fahn, RSA Laboratories. Answers to Frequently Asked Questions About Today's Cryptography. September 14, 1992.
Dan Farmer and Eugene H. Spafford. The COPS
security checker system. USENIX Conference Proceedings, Pages
165-170, Anaheim, CA, Summer 1990.
Original at: ftp://ftp.cs.purdue.edu/pub/spaf/security/COPS.PS.Z
Dan Farmer and Wietse Venema. Improving the Security of Your Site by
Breaking Into it.
Original at: ftp://ftp.win.tue.nl/pub/security/admin-guide-to-cracking.101.Z
J. Galvin,K. McCloghrie,J. Davin. SNMP Security Protocols. RFC 1352. July 1992. (Format: TXT=95732 bytes)
J. Galvin & K. McCloghrie. Security Protocols for version 2 of the Simple Network Management Protocol (SNMPv2). RFC 1446. April 1993. (Format: TXT=108733 bytes)
E. Gavron. A Security Problem and Proposed Correction With Widely Deployed DNS Software. RFC 1535. October 1993. (Format: TXT=9722 bytes)
Neil M. Haller. The S/KEY One-Time Password System. Proceedings of
the Internet Society Symposium on Network and Distributed System
Security, San Diego, CA, February 3, 1994.
Original at: ftp://thumper.bellcore.com/pub/skey/docs/ISOC.symp.ps
Stephen E. Hansen and E. Todd Atkins. Automated System Monitoring and Notification with Swatch. Proceedings, LISA 1993, Montrey, CA November 1-5, 1993.
Charles L. Hedrick. Computer Science Facilities Group, RUTGERS. Introduction to the Internet Protocols. October 3, 1988.
Charles L. Hedrick. Computer Science Facilities Group, RUTGERS. Introduction to Administration of an Internet-based Local Network. October 3, 1988.
J.P. Holbrook, J.K. Reynolds. Site Security Handbook. RFC 1244 Jul-01-1991. (Format: TXT=259129 bytes) (Also FYI0008). There is also a PostScript Version.
R. Housley. Security Label Framework for the Internet. RFC 1457. May 1993. (Format: TXT=35802 bytes)
John Ioannidis and Matt Blaze. The Architecture
and Implementation of Network-Layer Security Under Unix. Proceedings
of the Fourth Usenix UNIX Security Symposium, Pages 29-39, October
1993.
Original at: ftp://ftp.research.att.com/dist/mab/swipeusenix.ps
B. Kaliski. The MD2 Message-Digest Algorithm. RFC 1319. April 1992. (Format: TXT=25661 bytes)
B. Kaliski. Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certification and Related Services. RFC 1424. February 1993. (Format: TXT=17537 bytes)
B. Kantor, P. Lapsley. Network News Transfer Protocol. RFC 977. Feb-01-1986. (Format: TXT=55062 bytes)
F. Kastenholz. The Definitions of Managed Objects for the Security Protocols of the Point-to-Point Protocol. RFC 1472. June 1993. (Format: TXT=27152 bytes)
C. Kaufman. DASS - Distributed Authentication Security Service. RFC 1507. September 1993. (Format: TXT=287809 bytes)
S. Kent. U.S. Department of Defense Security Options for the Internet Protocol. RFC 1108. November 1991. (Format: TXT=41791 bytes) (Obsoletes RFC1038)
S. Kent. Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management. RFC 1422. February 1993. (Format: TXT=86085 bytes) (Obsoletes RFC1114)
Gene Kim and Eugene H. Spafford. The Design and
Implementation of Tripwire: A File System Integrity Checker. Technical
Report CSD-TR-93-071, Purdue University, 1993.
Original at: ftp://ftp.cs.purdue.edu/pub/spaf/security/Tripwire.PS.Z
Thomas M. Kroeger. How to improve security on a newly installed SunOS 4.1.3 system. Version 1.0. July 94.
J. Linn. Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures. RFC 1421. February 1993. (Format: TXT=103894 bytes) (Obsoletes RFC1113)
J. Linn. Generic Security Service Application Program Interface. RFC 1508. September 1993. (Format: TXT=111228 bytes)
Livingston Enterprises. Firewall Application Notes. March 1995.
B. Lloyd, W. Simpson. PPP Authentication Protocols. RFC 1334. October 1992. (Format: TXT=33248 bytes)
M. Lottor. Domain administrators operations guide. RFC 1033. Nov-01-1987. (Format: TXT=37263 bytes)
Livermore Software Laboratories Inc. PORTUS. 1994. Commercial Product.
G. Malkin. RIP Version 2 Carrying Additional Information. RFC 1388. January 1993. (Format: TXT=16227 bytes)
Rob McMillan. Australian Security Emergency Response Team. Site Security Policy Development. November 1993.
J.C. Mogul, J. Postel. Internet Standard Subnetting Procedure. RFC 950. Aug-01-1985. (Format: TXT=37985 bytes) (Updates RFC0792)
Alec D.E. Muffett. Crack - A Sensible Password Checker for Unix.
Alec D.E. Muffett. WAN-Hacking with AutoHack - Auditing Security behind the Firewall.
NIST/NSA. Federal Criteria for Information Technology Security, Volumes 1 and 2, VERSION 1.0, December 1992. This is a draft version of a proposed FIPS (Federal Information Processing Standard) which will eventually replace the NCSC's "Orange Book".
1995-02-03 NIST Special Publication 800-10 "Keeping Your Site Comfortably Secure: An Introduction to Internet Firewalls". Also available in PostScript.
R. Pethia, S. Crocker, B. Fraser. Guidelines for the Secure Operation of the Internet. RFC 1281. November 1991. (Format: TXT=22618 bytes). Also available in PostScript.
Richard D Pethin, Kenneth R van Wyk - CERT Computer Emergency Response - An International Problem.
W. Timothy Polk. Automated Tools for Testing Computer System Vulnerability. NIST-800-6. December 3, 1992.
D.C. Plummer. Ethernet Address Resolution Protocol: Or converting network protocol addresses to 48.bit Ethernet address for transmission on Ethernet hardware. RFC 826. Nov-01-1982. (Format: TXT=22026 bytes)
J. Postel. User Datagram Protocol. RFC 768. Aug-28-1980. (Format: TXT=5896 bytes)
J. Postel. Internet Protocol. RFC 791. Sep-01-1981. (Format: TXT=97779 bytes) (Obsoletes RFC0760)
J. Postel. Internet Control Message Protocol. RFC 792. Sep-01-1981. (Format: TXT=30404 bytes) (Obsoletes RFC0777) (Updated by RFC0950)
J. Postel. Transmission Control Protocol. RFC 793. Sep-01-1981. (Format: TXT=177957 bytes)
J. Postel. Simple Mail Tran>