Usable Security: Design Principles for Creating Systems That Are Simultaneously Usable and Secure

Total Page:16

File Type:pdf, Size:1020Kb

Usable Security: Design Principles for Creating Systems That Are Simultaneously Usable and Secure Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Proposal for Thesis Research in Partial Fulfillment Of the Requirements for the Degree of Doctor of Philosophy Title: Usable Security: Design Principles for Creating Systems that are Simultaneously Usable and Secure Submitted by: Simson L. Garfinkel 634 Pleasant Street (Signature of Author) Belmont, MA 02478 Date of Submission October 15, 2003 Expected Date of Completion: September 1, 2004 Laboratory where thesis will be done CSAIL Brief Statement of the Problem: Usability and security are widely seen as two antagonistic design goals for complex computer systems. This thesis argues that conventional wisdom is wrong: for the majority of users and applications, increased security cannot be achieved with technology that decreases usability. This thesis aims to develop a set of design principles for creating and evaluating security systems — principles that, when followed, simultaneously provide for increased security and increased usability. These principles will be used to analyize a significant number of security-related applications that have been deployed in recent years, and will be applied to several areas of active concern in the computer security community, including the leakage of confidential information on repurposed digital storage media, secure messaging, and firewall configuration. 2 Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Cambridge, Massachusetts 02139 Doctoral Thesis Supervision Agreement To: Department Graduate Committee From: David D. Clark, Thesis Supervisor The program outlined in the proposal: Title: Usable Security: Design Principles for Creating Systems that are Simultaneously Usable and Secure Author: Simson L. Garfinkel Date: October 15, 2003 is adequate for a Doctoral thesis. I believe that appropriate readers for this thesis would be: Reader 1: Ronald Rivest Reader 2: Daniel J. Weitzner Facilities and Support for the research outlined in the proposal are available. I am willing to supervise the research and evaluate the thesis report. Signed: David D. Clark Title: Senior Research Scientist, MIT CSAIL Date: Comments: 3 Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Cambridge, Massachusetts 02139 Doctoral Thesis Supervision Agreement To: Department Graduate Committee From: Robert C. Miller, Thesis Supervisor The program outlined in the proposal: Title: Usable Security: Design Principles for Creating Systems that are Simultaneously Usable and Secure Author: Simson L. Garfinkel Date: October 15, 2003 is adequate for a Doctoral thesis. I believe that appropriate readers for this thesis would be: Reader 1: Ronald Rivest Reader 2: Daniel J. Weitzner Facilities and Support for the research outlined in the proposal are available. I am willing to supervise the research and evaluate the thesis report. Signed: Robert C. Miller Title: Assistant Professor, MIT Department of Electrical Engineering and Computer Science Date: Comments: 4 Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Cambridge, Massachusetts 02139 Doctoral Thesis Reader Agreement To: Department Graduate Committee From: Ronald Rivest, Thesis Reader The program outlined in the proposal: Title: Usable Security: Design Principles for Creating Systems that are Simultaneously Usable and Secure Author: Simson L. Garfinkel Date: October 15, 2003 Supervisors: David D. Clarkand Robert C. Miller Other Reader: Daniel J. Weitzner is adequate for a Doctoral thesis. I am willing to aid in guiding the research and in evaluating the thesis report as a reader. Signed: Ronald Rivest Title: Andrew & Erna Viterbi Professor Of Computer Science and Engineering Date: Comments: 5 Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Cambridge, Massachusetts 02139 Doctoral Thesis Reader Agreement To: Department Graduate Committee From: Daniel J. Weitzner, Thesis Reader The program outlined in the proposal: Title: Usable Security: Design Principles for Creating Systems that are Simultaneously Usable and Secure Author: Simson L. Garfinkel Date: October 15, 2003 Supervisors: David D. Clarkand Robert C. Miller Other Reader: Ronald Rivest is adequate for a Doctoral thesis. I am willing to aid in guiding the research and in evaluating the thesis report as a reader. Signed: Daniel J. Weitzner Title: Principal Research Scientist Date: Comments: CONTENTS 6 Contents 1 Introduction 8 1.1 Work in Security Requires Realistic Threat Models . 9 1.2 A Workable Threat Model for Today’s Desktop Computing Environment . 12 1.3 Previous Attempts at Assuring Desktop Security: Mandatory Access Controls and User Education . 14 1.4 The “Usable Security” Thesis . 17 2 Related Work 18 3 Related Work on HCI and Computer Security 18 3.1 Norman’s Design Rules and Error Analysis . 18 3.2 Johnson’s Usability Barriers in GUIs . 19 3.3 HCI-SEC Bloopers, Definitions and Principles . 20 3.4 Other HCI-SEC Work . 24 3.5 Other Factors That Can Affect Software: Economics and Regulation . 25 4 Designing for Usable Security 27 4.1 Case Study #1: The Success of SSH and SSL . 28 4.2 Case Study #2: Browser History in Microsoft Internet Explorer, Apple Safari, and Mozilla 1.4 . 30 4.3 Case Study #3: Confidential Information on Discarded Media . 42 4.3.1 The Remembrance of Data Passed Study . 44 4.4 Case Study #4: How the PGP and S/MIME Encryption Standards have Pro- duced Usability Problems that Blocked Their Own Adoption . 46 4.5 Case Study #5: Why “Decrypt for Display” Has Caused Barriers To Adoption . 51 4.6 Case Study #6: How The Distribution of Public Keys Causes Usability Prob- lems, and Approaches For Resolving The Problem . 52 4.7 Case Study #7: PC Firewall Configuration . 56 5 Research Basis for this Thesis 59 5.1 The Remembrance of Data Passed Traceback Study . 59 5.1.1 Research Justification for the Traceback Study . 61 5.1.2 Related Work on Disk Sanitization . 61 5.2 Stream: A System for Providing Usable Encrypted Electronic Mail . 62 5.2.1 The Need for Usable Email Encryption . 62 5.2.2 Research Justification For Developing Stream . 63 5.2.3 Related Work on Opportunistic Encryption . 64 5.3 Literature and Product Review . 64 6 Work To Be Done 65 6.1 Status of the Traceback Study . 66 6.2 Status of Stream . 66 7 Committee and Timetable 67 1 Introduction It is widely believed that security and usability are two antagonistic goals in system design. A classic example of this argument is passwords: systems without passwords are thought to be usable, but not very secure, while systems with long passwords that must be frequently changed are thought to be secure, but not very usable. I believe that this reasoning is flawed. Systems that sacrifice security for usability may work fine in the laboratory, but they fail when exposed to the hostile environment of the outwide world. Alternatively, systems that sacrifice usability in favor of security fail because the secu- rity features are disabled by users, or because the systems are used far less than they would be otherwise. This is not a novel argument. In 1975, Saltzer and Schroeder[SS75] identified eight design principles for building secure computer systems. These eight principles have become stan- dards of the computer security lexicon: economy of mechanism; fail-safe defaults; complete mediation; open design; separation of privilege; least privilege; least common mechanism; and psychological acceptability. On the subject of psychological acceptability, Saltzer and Schroeder wrote: “It is essential that the human interface be designed for ease of use, so that users routinely and automatically apply the protection mechanisms correctly. Also, to the extent that the user’s mental image of his protection goals matches the mecha- nisms he must use, mistakes will be minimized. If he must translate his image of his protection needs into a radically different specification language, he will make errors.”[SS75] In other words, it must to be easier to use security mechanisms than to bypass them. For the two decades following the publication of Saltzer and Schroeder’s article, the need for deploying security systems that provide for “psychological acceptability” was frequently repeated but rarely expounded upon. Indeed, it is only recently that computer security researchers have turned their attention to the issue of Human Computer Interface (HCI) design — or that the HCI community has turned its attention to the topic of computer security. For example, in 1999 Adams and Saase noted “it seems that currently, hackers pay more attention to the human link in the security chain than security designers do.”[AS99]. Similar sentiments were expressed by Whitten and Tygar, who wrote: “We have found very little published research to date on the problem of usability for security.”[WT99] 1 INTRODUCTION 9 At the same time, there is growing recognition that many security breaches are not the result of technical failures, but instead are the result of the failure of humans to use computer systems in a secure manner. [Sch02, MS02] Some researchers go further. Carl Ellison and others have argued that the problem facing security software is not poor interfaces, but the fact that they have user interfaces at all. At the February 2000 meeting of the American Association for the Advancement of Science, Ellison went further and proposed1 this somewhat charming rule-of-thumb: “The user base for strong cryptography declines by
Recommended publications
  • THE FUTURE of IDEAS This Work Is Licensed Under a Creative Commons Attribution-Noncommercial License (US/V3.0)
    less_0375505784_4p_fm_r1.qxd 9/21/01 13:49 Page i THE FUTURE OF IDEAS This work is licensed under a Creative Commons Attribution-Noncommercial License (US/v3.0). Noncommercial uses are thus permitted without any further permission from the copyright owner. Permissions beyond the scope of this license are administered by Random House. Information on how to request permission may be found at: http://www.randomhouse.com/about/ permissions.html The book maybe downloaded in electronic form (freely) at: http://the-future-of-ideas.com For more permission about Creative Commons licenses, go to: http://creativecommons.org less_0375505784_4p_fm_r1.qxd 9/21/01 13:49 Page iii the future of ideas THE FATE OF THE COMMONS IN A CONNECTED WORLD /// Lawrence Lessig f RANDOM HOUSE New York less_0375505784_4p_fm_r1.qxd 9/21/01 13:49 Page iv Copyright © 2001 Lawrence Lessig All rights reserved under International and Pan-American Copyright Conventions. Published in the United States by Random House, Inc., New York, and simultaneously in Canada by Random House of Canada Limited, Toronto. Random House and colophon are registered trademarks of Random House, Inc. library of congress cataloging-in-publication data Lessig, Lawrence. The future of ideas : the fate of the commons in a connected world / Lawrence Lessig. p. cm. Includes index. ISBN 0-375-50578-4 1. Intellectual property. 2. Copyright and electronic data processing. 3. Internet—Law and legislation. 4. Information society. I. Title. K1401 .L47 2001 346.04'8'0285—dc21 2001031968 Random House website address: www.atrandom.com Printed in the United States of America on acid-free paper 24689753 First Edition Book design by Jo Anne Metsch less_0375505784_4p_fm_r1.qxd 9/21/01 13:49 Page v To Bettina, my teacher of the most important lesson.
    [Show full text]
  • ESSAY Untangling Attribution David D. Clark* and Susan Landau**
    ESSAY Untangling Attribution David D. Clark* and Susan Landau** I. Introduction In February 2010, former Director of the National Security Agency Mike McConnell wrote, "We need to develop an early-warning system to monitor cyberspace, identify intrusions and locate the source of attacks with a trail of evidence that can support diplomatic, military and legal options and we must be able to do this in milliseconds. More specifically, we need to reengineer the Internet to make attribution, geolocation, intelligence analysis and impact assessment - who did it, from where, why and what was the result - more manageable."I The Internet was not designed with the goal of deterrence in mind, and perhaps a future Internet should be designed differently. McConnell's statement is part of a recurring theme that a secure Internet must provide better attribution for actions occurring on the network. Although attribution generally means assigning a cause to an action, as used here attribution refers to identifying the agent responsible for the action (specifically, "determining * David Clark, Senior Research Scientist, MIT, Cambridge MA 02139, ddc acsail.mit.edu. Clark's effort on this work was funded by the Office of Naval Research under award number N00014-08-1-0898. Any opinions, findings, and conclusions or recommendations expressed in this Essay are those of the authors and do not necessarily reflect the views of the Office of Naval Research. " Susan Landau, Fellow, Radcliffe Institute for Advanced Study, Harvard University, Cambridge, MA 02138, susan.landau(a) rivacvink.oru. An earlier version of this Essay appeared in COMMI. ON DLTLRRING CYBERATTACKS, NAT'L RLSLARCH COUNCIL, PROCELDINGS OF A WORKSHOP ON DLTLRRING CYBLRATTACKS: INFORMING STRATEGILS AND DLVLLOPING OPTIONS FOR U.S.
    [Show full text]
  • Pgpfone Pretty Good Privacy Phone Owner’S Manual Version 1.0 Beta 7 -- 8 July 1996
    Phil’s Pretty Good Software Presents... PGPfone Pretty Good Privacy Phone Owner’s Manual Version 1.0 beta 7 -- 8 July 1996 Philip R. Zimmermann PGPfone Owner’s Manual PGPfone Owner’s Manual is written by Philip R. Zimmermann, and is (c) Copyright 1995-1996 Pretty Good Privacy Inc. All rights reserved. Pretty Good Privacy™, PGP®, Pretty Good Privacy Phone™, and PGPfone™ are all trademarks of Pretty Good Privacy Inc. Export of this software may be restricted by the U.S. government. PGPfone software is (c) Copyright 1995-1996 Pretty Good Privacy Inc. All rights reserved. Phil’s Pretty Good engineering team: PGPfone for the Apple Macintosh and Windows written mainly by Will Price. Phil Zimmermann: Overall application design, cryptographic and key management protocols, call setup negotiation, and, of course, the manual. Will Price: Overall application design. He persuaded the rest of the team to abandon the original DOS command-line approach and designed a multithreaded event-driven GUI architecture. Also greatly improved call setup protocols. Chris Hall: Did early work on call setup protocols and cryptographic and key management protocols, and did the first port to Windows. Colin Plumb: Cryptographic and key management protocols, call setup negotiation, and the fast multiprecision integer math package. Jeff Sorensen: Speech compression. Will Kinney: Optimization of GSM speech compression code. Kelly MacInnis: Early debugging of the Win95 version. Patrick Juola: Computational linguistic research for biometric word list. -2- PGPfone Owner’s
    [Show full text]
  • Digital Forensics and Preservation 1
    01000100 01010000 Digital 01000011 Forensics 01000100 and Preservation 01010000 Jeremy Leighton John 01000011 01000100 DPC Technology Watch Report 12-03 November 2012 01010000 01000011 01000100 01010000 Series editors on behalf of the DPC 01000011 Charles Beagrie Ltd. Principal Investigator for the Series 01000100 Neil Beagrie 01010000 01000011DPC Technology Watch Series © Digital Preservation Coalition 2012 and Jeremy Leighton John 2012 Published in association with Charles Beagrie Ltd. ISSN: 2048-7916 DOI: http://dx.doi.org/10.7207/twr12-03 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, without the prior permission in writing from the publisher. The moral right of the author has been asserted. First published in Great Britain in 2012 by the Digital Preservation Coalition. Foreword The Digital Preservation Coalition (DPC) is an advocate and catalyst for digital preservation, ensuring our members can deliver resilient long-term access to digital content and services. It is a not-for- profit membership organization whose primary objective is to raise awareness of the importance of the preservation of digital material and the attendant strategic, cultural and technological issues. It supports its members through knowledge exchange, capacity building, assurance, advocacy and partnership. The DPC’s vision is to make our digital memory accessible tomorrow. The DPC Technology Watch Reports identify, delineate, monitor and address topics that have a major bearing on ensuring our collected digital memory will be available tomorrow. They provide an advanced introduction in order to support those charged with ensuring a robust digital memory, and they are of general interest to a wide and international audience with interests in computing, information management, collections management and technology.
    [Show full text]
  • The Internet Is a Semicommons
    GRIMMELMANN_10_04_29_APPROVED_PAGINATED 4/29/2010 11:26 PM THE INTERNET IS A SEMICOMMONS James Grimmelmann* I. INTRODUCTION As my contribution to this Symposium on David Post’s In Search of Jefferson’s Moose1 and Jonathan Zittrain’s The Future of the Internet,2 I’d like to take up a question with which both books are obsessed: what makes the Internet work? Post’s answer is that the Internet is uniquely Jeffersonian; it embodies a civic ideal of bottom-up democracy3 and an intellectual ideal of generous curiosity.4 Zittrain’s answer is that the Internet is uniquely generative; it enables its users to experiment with new uses and then share their innovations with each other.5 Both books tell a story about how the combination of individual freedom and a cooperative ethos have driven the Internet’s astonishing growth. In that spirit, I’d like to suggest a third reason that the Internet works: it gets the property boundaries right. Specifically, I see the Internet as a particularly striking example of what property theorist Henry Smith has named a semicommons.6 It mixes private property in individual computers and network links with a commons in the communications that flow * Associate Professor, New York Law School. My thanks for their comments to Jack Balkin, Shyam Balganesh, Aislinn Black, Anne Chen, Matt Haughey, Amy Kapczynski, David Krinsky, Jonathon Penney, Chris Riley, Henry Smith, Jessamyn West, and Steven Wu. I presented earlier versions of this essay at the Commons Theory Workshop for Young Scholars (Max Planck Institute for the Study of Collective Goods), the 2007 IP Scholars conference, the 2007 Telecommunications Policy Research Conference, and the December 2009 Symposium at Fordham Law School on David Post’s and Jonathan Zittrain’s books.
    [Show full text]
  • Design Principles and Patterns for Computer Systems That Are
    Bibliography [AB04] Tom Anderson and David Brady. Principle of least astonishment. Ore- gon Pattern Repository, November 15 2004. http://c2.com/cgi/wiki? PrincipleOfLeastAstonishment. [Acc05] Access Data. Forensic toolkit—overview, 2005. http://www.accessdata. com/Product04_Overview.htm?ProductNum=04. [Adv87] Display ad 57, February 8 1987. [Age05] US Environmental Protection Agency. Wastes: The hazardous waste mani- fest system, 2005. http://www.epa.gov/epaoswer/hazwaste/gener/ manifest/. [AHR05a] Ben Adida, Susan Hohenberger, and Ronald L. Rivest. Fighting Phishing Attacks: A Lightweight Trust Architecture for Detecting Spoofed Emails (to appear), 2005. Available at http://theory.lcs.mit.edu/⇠rivest/ publications.html. [AHR05b] Ben Adida, Susan Hohenberger, and Ronald L. Rivest. Separable Identity- Based Ring Signatures: Theoretical Foundations For Fighting Phishing Attacks (to appear), 2005. Available at http://theory.lcs.mit.edu/⇠rivest/ publications.html. [AIS77] Christopher Alexander, Sara Ishikawa, and Murray Silverstein. A Pattern Lan- guage: towns, buildings, construction. Oxford University Press, 1977. (with Max Jacobson, Ingrid Fiksdahl-King and Shlomo Angel). [AKM+93] H. Alvestrand, S. Kille, R. Miles, M. Rose, and S. Thompson. RFC 1495: Map- ping between X.400 and RFC-822 message bodies, August 1993. Obsoleted by RFC2156 [Kil98]. Obsoletes RFC987, RFC1026, RFC1138, RFC1148, RFC1327 [Kil86, Kil87, Kil89, Kil90, HK92]. Status: PROPOSED STANDARD. [Ale79] Christopher Alexander. The Timeless Way of Building. Oxford University Press, 1979. 429 430 BIBLIOGRAPHY [Ale96] Christopher Alexander. Patterns in architecture [videorecording], October 8 1996. Recorded at OOPSLA 1996, San Jose, California. [Alt00] Steven Alter. Same words, different meanings: are basic IS/IT concepts our self-imposed Tower of Babel? Commun. AIS, 3(3es):2, 2000.
    [Show full text]
  • Free As in Freedom (2.0): Richard Stallman and the Free Software Revolution
    Free as in Freedom (2.0): Richard Stallman and the Free Software Revolution Sam Williams Second edition revisions by Richard M. Stallman i This is Free as in Freedom 2.0: Richard Stallman and the Free Soft- ware Revolution, a revision of Free as in Freedom: Richard Stallman's Crusade for Free Software. Copyright c 2002, 2010 Sam Williams Copyright c 2010 Richard M. Stallman Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License." Published by the Free Software Foundation 51 Franklin St., Fifth Floor Boston, MA 02110-1335 USA ISBN: 9780983159216 The cover photograph of Richard Stallman is by Peter Hinely. The PDP-10 photograph in Chapter 7 is by Rodney Brooks. The photo- graph of St. IGNUcius in Chapter 8 is by Stian Eikeland. Contents Foreword by Richard M. Stallmanv Preface by Sam Williams vii 1 For Want of a Printer1 2 2001: A Hacker's Odyssey 13 3 A Portrait of the Hacker as a Young Man 25 4 Impeach God 37 5 Puddle of Freedom 59 6 The Emacs Commune 77 7 A Stark Moral Choice 89 8 St. Ignucius 109 9 The GNU General Public License 123 10 GNU/Linux 145 iii iv CONTENTS 11 Open Source 159 12 A Brief Journey through Hacker Hell 175 13 Continuing the Fight 181 Epilogue from Sam Williams: Crushing Loneliness 193 Appendix A { Hack, Hackers, and Hacking 209 Appendix B { GNU Free Documentation License 217 Foreword by Richard M.
    [Show full text]
  • Attribute-Based, Usefully Secure Email
    Dartmouth College Dartmouth Digital Commons Dartmouth College Ph.D Dissertations Theses and Dissertations 8-1-2008 Attribute-Based, Usefully Secure Email Christopher P. Masone Dartmouth College Follow this and additional works at: https://digitalcommons.dartmouth.edu/dissertations Part of the Computer Sciences Commons Recommended Citation Masone, Christopher P., "Attribute-Based, Usefully Secure Email" (2008). Dartmouth College Ph.D Dissertations. 26. https://digitalcommons.dartmouth.edu/dissertations/26 This Thesis (Ph.D.) is brought to you for free and open access by the Theses and Dissertations at Dartmouth Digital Commons. It has been accepted for inclusion in Dartmouth College Ph.D Dissertations by an authorized administrator of Dartmouth Digital Commons. For more information, please contact [email protected]. Attribute-Based, Usefully Secure Email A Thesis Submitted to the Faculty in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science by Christopher P. Masone DARTMOUTH COLLEGE Hanover, New Hampshire August, 2008 Examining Committee: (chair) Sean W. Smith, Ph.D. David F. Kotz, Ph.D. Christopher J. Bailey-Kellogg, Ph.D. Denise L. Anthony, Ph.D. M. Angela Sasse, Ph.D. Charles K. Barlowe, PhD Dean of Graduate Studies Abstract A secure system that cannot be used by real users to secure real-world processes is not really secure at all. While many believe that usability and security are diametrically opposed, a growing body of research from the field of Human-Computer Interaction and Security (HCISEC) refutes this assumption. All researchers in this field agree that focusing on aligning usability and security goals can enable the design of systems that will be more secure under actual usage.
    [Show full text]
  • Jason I. Hong
    Jason I. Hong Human Computer Interaction Institute Office: +1 412 268 1251 School of Computer Science Fax: +1 412 268 1266 Carnegie Mellon University Email: jasonh at cs cmu edu 5000 Forbes Ave Web: http://www.cs.cmu.edu/~jasonh 3523 Newell Simon Hall GScholar: https://scholar.google.com/citations?user=MoFbcc0AAAAJ Pittsburgh, PA 15213‐3891 Citizenship: USA ORCID: http://orcid.org/0000‐0002‐9856‐9654 Research Interests In the near future, our smart devices will know almost everything about us. How can we make use of all of this rich sensor and behavioral data to improve our lives? At the same time, this same data poses many new kinds of risks. How can we make privacy and security easily understandable by people who are not experts? How can we ensure that machine learning models built on this data is fair, accountable, transparent, and ethical? In my research, I draw on ideas and methods from human‐computer interaction, systems, behavioral sciences, and machine learning. Most of my current work centers on smartphones and the emerging Internet of Things. I also make use of data from crowdsourcing or social media, both to better understand people’s behaviors as well as to “outsource” the labor required to manage privacy and security. Education 2005 Ph.D., Computer Science, University of California at Berkeley Advisor: James Landay Thesis topic: An Architecture for Privacy‐Sensitive Ubiquitous Computing 1997 B.S., Discrete Mathematics, Georgia Institute of Technology Highest honors 1997 B.S., Computer Science, Georgia Institute of Technology
    [Show full text]
  • Oreilly Sendmail 4Th Edition.Pdf
    sendmail Other resources from O’Reilly Related titles sendmail 8.13 Companion DNS & Bind Cookbook™ sendmail Cookbook™ DNS and Bind TCP/IP Network Administration oreilly.com oreilly.com is more than a complete catalog of O’Reilly books. You’ll also find links to news, events, articles, weblogs, sample chapters, and code examples. oreillynet.com is the essential portal for developers interested in open and emerging technologies, including new platforms, pro- gramming languages, and operating systems. Conferences O’Reilly brings diverse innovators together to nurture the ideas that spark revolutionary industries. We specialize in document- ing the latest tools and systems, translating the innovator’s knowledge into useful skills for those in the trenches. Visit con- ferences.oreilly.com for our upcoming events. Safari Bookshelf (safari.oreilly.com) is the premier online refer- ence library for programmers and IT professionals. Conduct searches across more than 1,000 books. Subscribers can zero in on answers to time-critical questions in a matter of seconds. Read the books on your Bookshelf from cover to cover or sim- ply flip to the page you need. Try it today for free. FOURTH EDITION sendmail Bryan Costales, George Jansen, and Claus Aßmann with Gregory Neil Shapiro Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo sendmail, Fourth Edition by Bryan Costales, George Jansen, and Claus Aßmann with Gregory Neil Shapiro Copyright © 2008 Bryan Costales, George Jansen, and Claus Aßmann. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use.
    [Show full text]
  • Sendmail Desktop Reference Bryan Costales & Eric Allman
    sendmail Desktop Reference By Bryan Costales & Eric Allman; ISBN 1-56592-278-6, 74 pages. First Edition, March 1997. (See the catalog page for this book.) Search the text of sendmail Desktop Reference. Table of Contents Preface Chapter 1: How to Run Chapter 2: The sendmail.cf File Chapter 3: Databases Chapter 4: Configuring with m4 Chapter 5: Additional Information Sources Copyright © 1999 O'Reilly & Associates. All Rights Reserved. file:///C|/Oreilly Unix etc/O'Reilly Reference Library/networking/smdref/index.htm [2002-04-12 10:39:19] Preface Preface Preface Contents: V8.8 Specific Conventions V8.8 Specific The sendmail program is a Mail Transport Agent (MTA). It accepts mail from Mail User Agents (MUAs), mail users (humans), and other MTAs. It then delivers that mail to Mail Delivery Agents (MDAs) on the local machine, or transports that mail to another MTA at another machine. The behavior of sendmail is determined by its command line and by commands in its configuration file. The sendmail program is written and maintained by Eric Allman at sendmail.org. Versions V8.7 and earlier are no longer supported and are no longer considered secure. If you are not currently running V8.8, we recommend you upgrade now. This Desktop Reference covers sendmail version 8.8.5. This Desktop Reference is a companion to the second edition of the sendmail book by Bryan Costales with Eric Allman, published by O'Reilly & Associates. Section numbers herein reference the section numbers in that book. This is a reference guide only - for detail or tutorial information, refer to the full sendmail book.
    [Show full text]
  • Sendmail Evolution: 8.10 and Beyond
    THE ADVANCED COMPUTING SYSTEMS ASSOCIATION The following paper was originally published in the Proceedings of the FREENIX Track: 1999 USENIX Annual Technical Conference Monterey, California, USA, June 6–11, 1999 Sendmail Evolution: 8.10 and Beyond Gregory Neil Shapiro and Eric Allman Sendmail, Inc. © 1999 by The USENIX Association All Rights Reserved Rights to individual papers remain with the author or the author's employer. Permission is granted for noncommercial reproduction of the work for educational or research purposes. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. For more information about the USENIX Association: Phone: 1 510 528 8649 FAX: 1 510 548 5738 Email: [email protected] WWW: http://www.usenix.org Sendmail Evolution: 8.10 and Beyond Gregory Neil Shapiro [email protected] Eric Allman [email protected] Sendmail, Inc. 6603 Shellmound Street Emeryville,California 94608 ABSTRACT SendmailTM has been the de facto mail transfer agent implementation since the dawn of the Internet. Today, sendmail development is still drivenbyacontinually changing set of network requirements and user demands. Lately,two new driving forces have also contributed to sendmail development. First, as more open source mail transfer agents, such as Exim and Postfix,become available, a newfriendly competition has developed in which the authors of the various MTAs share their ideas via open source and help to advance open standards as opposed to advancing their own particular implementation. Second, a new“hybrid” company, Sendmail, Inc., has been created to offer commercial versions of the open source software while continuing to fuel open source development.
    [Show full text]