Wireless Network Security a Thesis Submitted to The

Total Page:16

File Type:pdf, Size:1020Kb

Wireless Network Security a Thesis Submitted to The WIRELESS NETWORK SECURITY A THESIS SUBMITTED TO THE GRADUATE SCHOOL OF NATURAL AND APPLIED SCIENCES OF ÇANKAYA UNIVERSITY BY ÇA ĞLAR ÜLKÜDERNER IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER ENGINEERING SEPTEMBER 2007 iii iv ABSTRACT WIRELESS NETWORK SECURITY Ülküderner, Ça ğlar M.S.c., Department of Computer Engineering Supervisor : Asst Prof. Dr. Reza Hassanpour SEPTEMBER 2007, 102 pages This thesis includes a comparative study on wireless network security issues. Thesis also introduces a new method using a GSM operator which can control the internet accesses with improved security. By this method, mobile devices without GPRS cards can use internet access services using 802.11x connections and making acceptable investment by GSM operators. Keywords: Wireless Network Security, One Time Password on Wireless Networks v ÖZ KABLOSUZ A Ğ GÜVENL İĞİ Ülküderner, Ça ğlar Yüksek Lisans, Bilgisayar Mühendisli ği Anabilim Dalı Tez Yöneticisi : Yar. Doç. Dr. Reza Hassanpour Eylül 2007, 102 sayfa Bu çalı şma, kablosuz a ğ güvenli ğini incelemektedir. Çalı şma, GSM operatörlerinin, internet eri şim noktalarını nasıl kontrol edebilece ği ve güvenli ği arttırılmı ş yeni bir yöntem içermektedir. Bu yöntem ile mobil araçlar için GPRS kart kullanmadan, 802.11x ba ğlantısı kullanılarak, makul bir yatırımla GSM operatörleri üzerinden internet eri şim hizmeti vermek mümkün olabilir. Anahtar Kelimeler: Kablosuz A ğ Güvenli ği, Kablosuz A ğlarda Tek Kullanımlık ifre vi ACKNOWLEDGMENTS I would like to give my pleasures to my supervisor Asst. Prof. Dr. Reza Hassanpour for his great patience throughout my university life and thesis. Also thanks for the great support to my brother Türker Gülüm. I dedicate this thesis to my mom Gülay Ülküderner. vii TABLE OF CONTENTS STATEMENT OF NON PLAGIARISM..................................................... iii ABSTRACT ............................................................................................. iv ÖZ ............................................................................................................ v ACKNOWLEDGMENTS .......................................................................... vi TABLE OF CONTENTS ......................................................................... vii LIST OF FIGURES...................................................................................x LIST OF TABLES .................................................................................... xi CHAPTERS: 1INTRODUCTION....................................................................................1 1.1Problem Definition and Motivation.......................................................2 1.2 Scope of Thesis .........................................................................2 1.3. Main Challenges ........................................................................3 1.4. Brief Introduction to Methods Used ............................................3 2. FUNDAMENTALS OF WIRELESS NETWORK PROTOCOLS AND SECURITY ISSUES...........................................................................4 2.1. IEEE 802.11 standards ..............................................................5 2.2. Prevalence of Wireless and 802.11............................................7 2.3. General Security Problems on 802.11 .......................................8 2.3.1. EAP-MD5 ............................................................................8 2.3.2. EAP-OTP ..........................................................................10 2.3.3. EAP-GTC..........................................................................10 2.4. Seven Problems on 802.11......................................................10 2.4.1.P ROBLEM #1: EASY ACCESS ..................................................10 2.4.2. Problem #2: "Rogue" Access Points .................................11 viii 2.4.3. Problem #3: Unauthorized Use of Service ........................12 2.4.4. Problem #4: Service and Performance Constraints ..........13 2.4.5. Problem #5: MAC Spoofing and Session Hijacking...........15 2.4.6. Problem #6: Traffic Analysis and Eavesdropping..............16 2.4.7. Problem #7: Higher Level Attacks.....................................17 3.Wi-Fi NETWORK TRAFFIC.................................................................19 3.1. Connection / Access Protocol in Wi-Fi Networks .....................19 3.2. Analyzing Wi-Fi Network Traffic ...............................................20 3.3. Information From All Frames....................................................21 3.4. Information From Data Frames ................................................22 3.5. Information From Management Frames...................................23 3.6. Summary of Wi-Fi traffic...........................................................24 4.WEP Overview ....................................................................................26 4.1. Decrypting data without keys ...................................................29 4.2. WEP IV problems.....................................................................29 4.3. Some attacks ...........................................................................31 4.4. Problems with RC4 ..................................................................34 4.5. Cipher and mode of operation..................................................35 4.6. Session key derivation .............................................................36 5.Wi-Fi PROTECTED ACCESS (WPA)..................................................38 5.1. Background information for WPA.............................................38 5.1.1. WPA-PSK .........................................................................38 5.1.2. Breaking Confidentiality ....................................................38 6.BREAKING THE SECURITY OF WI-FI ...............................................39 6.1. Recovering a Passphrase Seeded WPA Key...........................39 6.2. WI-FI Protected Access (WPA)................................................41 6.3. Software Tools .........................................................................42 6.3.1. KISMET.............................................................................43 6.3.2. TCPDump .........................................................................44 6.3.3. ETHREAL .........................................................................45 6.3.4. Ettercap.............................................................................46 6.3.5. IPTABLES.........................................................................47 ix 6.3.6. HOSTAP ...........................................................................47 6.3.7. WPA Supplicant ................................................................48 6.3.8. MadWiFi............................................................................48 7.GSM LOCATION BASED AUTHENTICATION USING SMS...............49 7.1. Steps Of Authentication............................................................50 8.CONCLUSION.....................................................................................52 REFERENCES...................................................................................... R1 APPENDICESY..................................................................................... A1 A. Acronyms & Abbreviations ...................................................... A1 B. Used Configurations:............................................................... A6 B.1. hostapd.conf .................................................................... A6 B.2. wpa_supplicant.conf......................................................... A3 B.3. wireless_ap configuration shell script............................... A3 B.4. SMS Server-Client Program............................................. A4 B.4.1.corePortAccess.c .................................................... A4 B.4.2.messageSendingCore.c.......................................... A7 B.4.3.zaman.c ................................................................ A19 B.4.4.sms_server.c......................................................... A20 B.4.5.sms_client.c .......................................................... A26 B.4.6.Makefile................................................................. A29 B.4.7.SMSd .................................................................... A30 x LIST OF FIGURES Figure 1 Simple Working Diagram............................................................4 Figure 2 Eap-Md5 Choreography .............................................................9 Figure 3 The Protocols Of Connecting To A Wi-Fi Network. ..................19 Figure 4 Mac Frame Format...................................................................20 Figure 5 Frame Control Field..................................................................21 Figure 6 Capability Field Of The Beacon Frame.....................................23 Figure 7 Kismet Screen Shot..................................................................43 Figure 8 Ethreal Screen Shot .................................................................45 Figure 10 Gsm Location Based Authentication Using Sms ....................50 xi LIST OF TABLES Table 1 Information Available From An Analysis Of Wi-Fi Frames.........24 xii CHAPTER 1 INTRODUCTION There are many authentication techniques for wireless networks. Some of these techniques can be easily cracked by hackers yet others can be cracked by pattern matching, brute force attacks and
Recommended publications
  • Pf3e Index.Pdf
    INDEX Note: Pages numbers followed by f, n, priority-based queues, 136–145 or t indicate figures, notes, and tables, match rule for queue assignment, respectively. 137–138 overview, 134–135 Symbols performance improvement, 136–137 # (hash mark), 13, 15 queuing for servers in DMZ, ! (logical NOT) operator, 42 142–144 setting up, 135–136 A on FreeBSD, 135–136 on NetBSD, 136 Acar, Can Erkin, 173 on OpenBSD, 135 ACK (acknowledgment) packets transitioning to priority and class-based bandwidth allocation, queuing system, 131–133 139–140 anchors, 35–36 HFSC algorithm, 124, 126, 142 authpf program, 61, 63 priority queues, 132, 137–138 listing current contents of, 92 two-priority configuration, loading rules into, 92 120–121, 120n1 manipulating contents, 92 adaptive.end value, 188 relayd daemon, 74 adaptive firewalls, 97–99 restructuring rule set with, 91–94 adaptive.start value, 188 tagging to help policy routing, 93 advbase parameter, 153–154 ancontrol command, 46n1 advskew parameter, 153–154, 158–159 antispoof tool, 27, 193–195, 194f aggressive value, 192 ARP balancing, 151, 157–158 ALTQ (alternate queuing) framework, atomic rule set load, 21 9, 133–145, 133n2 authpf program, 59–63, 60 basic concepts, 134 basic authenticating gateways, class-based bandwidth allocation, 60–62 139–140 public networks, 62–63 overview, 135 queue definition, 139–140 tying queues into rule set, 140 B handling unwanted traffic, 144–145 bandwidth operating system-based queue actual available, 142–143 assignments, 145 class-based allocation of, 139–140 overloading to
    [Show full text]
  • Free, Functional, and Secure
    Free, Functional, and Secure Dante Catalfamo What is OpenBSD? Not Linux? ● Unix-like ● Similar layout ● Similar tools ● POSIX ● NOT the same History ● Originated at AT&T, who were unable to compete in the industry (1970s) ● Given to Universities for educational purposes ● Universities improved the code under the BSD license The License The license: ● Retain the copyright notice ● No warranty ● Don’t use the author's name to promote the product History Cont’d ● After 15 years, the partnership ended ● Almost the entire OS had been rewritten ● The university released the (now mostly BSD licensed) code for free History Cont’d ● AT&T launching Unix System Labories (USL) ● Sued UC Berkeley ● Berkeley fought back, claiming the code didn’t belong to AT&T ● 2 year lawsuit ● AT&T lost, and was found guilty of violating the BSD license History Cont’d ● BSD4.4-Lite released ● The only operating system ever released incomplete ● This became the base of FreeBSD and NetBSD, and eventually OpenBSD and MacOS History Cont’d ● Theo DeRaadt ○ Originally a NetBSD developer ○ Forked NetBSD into OpenBSD after disagreement the direction of the project *fork* Innovations W^X ● Pioneered by the OpenBSD project in 3.3 in 2002, strictly enforced in 6.0 ● Memory can either be write or execute, but but both (XOR) ● Similar to PaX Linux kernel extension (developed later) AnonCVS ● First project with a public source tree featuring version control (1995) ● Now an extremely popular model of software development anonymous anonymous anonymous anonymous anonymous IPSec ● First free operating system to implement an IPSec VPN stack Privilege Separation ● First implemented in 3.2 ● Split a program into processes performing different sub-functions ● Now used in almost all privileged programs in OpenBSD like httpd, bgpd, dhcpd, syslog, sndio, etc.
    [Show full text]
  • Wireless Networks Made Easy
    WIRELESS NETWORKS MADE EASY It is rather tempting to say that on BSD, and OpenBSD in particular, there’s no need to “make wireless networking easy,” because it already is. Getting a wireless network running is not very different from getting a wired one up and running, but there are some issues that turn up simply because we are dealing with radio waves and not wires. We will look briefly at some of the issues before moving on to the practical steps involved in creating a usable setup. Once we have covered the basics of getting a wireless network up and running, we’ll turn to some of the options for making your wireless network more interesting and harder to break. A Little IEEE 802.11 Background Setting up any network interface, in principle, is a two-step process: you estab- lish a link, and then you move on to configuring the interface for TCP/IP traffic. In the case of wired Ethernet-type interfaces, establishing the link usually consists of plugging in a cable and seeing the link indicator light up. However, some interfaces require extra steps. Networking over dial-up connections, for example, requires telephony steps such as dialing a number to get a carrier signal. In the case of IEEE 802.11-style wireless networks, getting the carrier sig- nal involves quite a few steps at the lowest level. First, you need to select the proper channel in the assigned frequency spectrum. Once you find a signal, you need to set a few link-level network identification parameters.
    [Show full text]
  • Freebsd Wireless Networking
    FreeBSDFreeBSD WirelessWireless NetworkingNetworking Sam Leffler Errno Consulting [email protected] ProjectProject GoalsGoals Device-independent 802.11 support Use full hardware functionality Production quality Reusable code: – Portable code but no portability layer – Native management API (e.g. Wireless Extensions) Dual BSD/GPL license 5/13/05 BSDCan 2005 1 BackgroundBackground Original version by Atsushi Onoe Overhaul (1) for multi-mode devices Overhaul (2) for security protocols Overhaul (2.5) multimedia extensions Overhaul (3) for multi-BSS support 5/13/05 BSDCan 2005 2 Background:Background: OriginalOriginal VersionVersion Circa 2001 (NetBSD) Simple devices (e.g. only 11b) Mostly firmware-based devices Pre-shared key WEP for crypto 5/13/05 BSDCan 2005 3 Background:Background: Multi-modeMulti-mode DevicesDevices Summer 2003 (started Fall 2002) Multi-band: 2.4GHz, 5GHz, etc. Multi-mode: 11a, 11b, 11g, Turbo, etc. 11g protocol BIG CHANGE... All the world is not 11b 5/13/05 BSDCan 2005 4 Background:Background: SecuritySecurity ProtocolsProtocols Summer 2004 WPA protocol 802.11i, aka WPA2, protocol TKIP, CCMP, etc.: cipher modules Hardware crypto acceleration BIG CHANGE... All the world is not WEP 5/13/05 BSDCan 2005 5 Background:Background: MultimediaMultimedia ProtocolsProtocols Fall 2004 WME/WMM protocol QoS traffic handling Hardware acceleration BIG CHANGE... All traffic is not equal 5/13/05 BSDCan 2005 6 Background:Background: Multi-BSSMulti-BSS SupportSupport 2005 Multiple BSS with one device WDS support
    [Show full text]
  • Open Source Used in Staros 21.19
    Open Source Used In StarOS 21.19 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. Text Part Number: 78EE117C99-1023749304 Open Source Used In StarOS 21.191 This document contains licenses and notices for open source software used in this product. With respect to the free/open source software listed in this document, if you have any questions or wish to receive a copy of any source code to which you may be entitled under the applicable free/open source license(s) (such as the GNU Lesser/General Public License), please contact us at [email protected]. In your requests please include the following reference number 78EE117C99-1023749304 Contents 1.1 libxml 2.9.2 1.1.1 Available under license 1.2 acpid 2.0.22 1.2.1 Available under license 1.3 net-snmp 5.1.1 1.3.1 Available under license 1.4 libnuma 2.0.11 1.4.1 Available under license 1.5 popt 1.5 1.5.1 Available under license 1.6 procps 3.2.6 1.6.1 Available under license 1.7 python 2.7.6 1.7.1 Available under license 1.8 openssh 7.6 1.8.1 Available under license 1.9 ftpd-bsd 0.3.2 1.9.1 Available under license 1.10 iconv 2.17 1.10.1 Available under license 1.11 procps 3.2.6 1.11.1 Available under license 1.12 dozer 6.4.1 1.12.1 Available under license 1.13 xmlrpc-c 1.06.38 1.13.1 Available under license Open Source Used In StarOS 21.192 1.14 antlr-runtime 4.2 1.15 kexec-tools 2.0.14 1.15.1 Available under license 1.16 pcre 8.41 1.16.1 Available
    [Show full text]
  • Hostapd Reference Manual 0.5.X
    hostapd Reference Manual 0.5.x Generated by Doxygen 1.4.2 Sun Dec 31 13:43:25 2006 Contents 1 Developers’ documentation for hostapd 1 2 hostapd Data Structure Index 3 2.1 hostapd Data Structures .................................... 3 3 hostapd File Index 5 3.1 hostapd File List ....................................... 5 4 hostapd Page Index 9 4.1 hostapd Related Pages .................................... 9 5 hostapd Data Structure Documentation 11 5.1 eap_method Struct Reference ................................. 11 5.2 eap_sm Struct Reference ................................... 14 5.3 hostapd_bss_config Struct Reference ............................. 16 5.4 hostapd_config Struct Reference ............................... 18 5.5 hostapd_config_change Struct Reference ........................... 20 5.6 hostapd_data Struct Reference ................................ 22 5.7 hostapd_iface Struct Reference ................................ 24 5.8 rsn_pmksa_cache_entry Struct Reference .......................... 26 5.9 tls_connection_params Struct Reference ........................... 27 6 hostapd File Documentation 29 6.1 accounting.c File Reference .................................. 29 6.2 accounting.h File Reference ................................. 31 6.3 aes.c File Reference ...................................... 32 6.4 aes.h File Reference ...................................... 38 6.5 aes_wrap.c File Reference .................................. 39 6.6 aes_wrap.h File Reference .................................. 46 6.7 ap.h File Reference .....................................
    [Show full text]
  • A New Authenticator
    A New Authenticator An Alternative to Binary Authentication Using Traffic Shaping JIA GUO KTH Information and Communication Technology Master of Science Thesis Stockholm, Sweden 2010 TRITA-ICT-EX-2010:299 A New Authenticator An Alternative to Binary Authentication Using Traffic Shaping Jia Guo [email protected] 20 November 2010 Master’s Thesis Examiner and Supervisor Prof. Gerald Q. Maguire Jr. Department of Communication Systems School of Information and Communication Technology Royal Institute of Technology (KTH) Stockholm, Sweden Abstract Abstract This thesis is part of a larger project on non-binary alternatives to authentication; in contrast to the binary authentication used in IEEE 802.1X and IEEE 802.11i. This thesis project seeks to define, implement, and evaluate a non-binary wireless access authentication mechanism. It introduces a new authenticator that implements such a new non-binary authentication mechanism. In today’s wireless local area networks it is generally not possible to continue a multimedia roaming session smoothly, because of the long delay caused by authentication – during which no traffic other than authentication traffic is permitted. In the best cases this high delay results in a long communication interruption interval without media, while in the worst cases the session is aborted by the higher layer application as the application believes that the connectivity is lost. Thus introducing a more appropriate authentication mechanism enables mobile users who move into a new wireless local area network cell to continue to send and receive packets with greatly reduced handover latency (in comparison to existing authentication mechanisms). This new authentication mechanism potentially enables seamless roaming for users of conversational multimedia services (for example, a voice over IP call could continue despite a movement from one cell to another).
    [Show full text]
  • The BSD Associate Study Guide the BSD Associate Study Guide: the Beginning BSD Unix Administration Book
    The Beginning BSD Unix Administration Book The BSD Associate Study Guide The BSD Associate Study Guide: The Beginning BSD Unix Administration Book November 24, 2011 Editor: Jeremy C. Reed Book Wiki: http://bsdwiki.reedmedia.net/ Copyright c 2006-2011 BSD Certification Group, Inc. Permission to use, copy, modify, and distribute this documentation for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies. THE DOCUMENTATION IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WAR- RANTIES WITH REGARD TO THIS DOCUMENTATION INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN AC- TION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS DOCUMENTATION. NetBSD and pkgsrc are registered trademarks of the NetBSD Foundation, Inc. FreeBSD is a registered trademark of the FreeBSD Foundation. Contents Introduction vii 1 Installing and Upgrading the OS and Software 1 1.1 Recognize the installation program used by each operating system . 1 1.2 Recognize which commands are available for upgrading the operating system . 5 1.3 Understand the difference between a pre-compiled binary and compiling from source . 6 1.4 Understand when it is preferable to install a pre-compiled binary and how to do so . 7 1.5 Recognize the available methods for compiling a customized binary . 7 1.6 Determine what software is installed on a system .
    [Show full text]
  • What's New in Netbsd in 2006 ?
    What’s new in NetBSD in 2006 ? Emmanuel Dreyfus October 24, 2006 Abstract NetBSD is known as a highly portable operating system, but its strengths are not limited to being available on many platforms. NetBSD goals also include security, performance, standards conformance and clean design. Development of innovative features also occurs. In this paper, we will have a look at the new features that have been integrated into NetBSD this year. 1 NetBSD in the news 1.1 Dead or irrelevant? Thanks to the numerous and valuable contributions from Slashdot’s anonymous coward, we are now all aware that *BSD is dying [1]. While the recurrent Slashdot troll gave us strong warnings about FreeBSD’s and OpenBSD’s imminent deaths for years, NetBSD was often omitted. Did that mean NetBSD was already dead? The EuroBSDCon 2005 social event was called "the night of the living dead", in reference to the Slashdot troll. That was an attractive point of view, since it implied that dead projects like the *BSD could be alive and kicking after all. Unfortunately, NetBSD did not show any sign of life that night, as it was even outperformed by DragonFly BSD at the beer drinking contest. The few people who still remembered an OS called NetBSD were still puzzled about the death of NetBSD: did it occur while nobody was watching? Fortunately, on the 30th of August 2006, one of the NetBSD project founders sent an insightful message to the netbsd-users@ netbsd.org mailing list [2]. In that message, Charles M. Hannum explained that NetBSD had increasingly become irrelevant.
    [Show full text]
  • Openbsd: a Crash Course
    OpenBSD: a crash course Brian Callahan <[email protected]> Overview ● What is OpenBSD? ● The now ● The future ● Why, in 2014, is OpenBSD the choice for you? Overview ● Ask questions during and after ● If you're not asking questions, I'm not doing my job right Who am I? ● OpenBSD developer – My first commit was one year ago, yesterday. ● Ports – mips64el (loongson) ● Built OpenBSD/octeon 5.4 release binaries and snapshots ● “MIPS on OpenBSD” - NYC*BUG, April 2013 ● Not a CS person ● Admin at devio.us (OpenBSD shell provider) ● More about me at gopher://gopher.anthrobsd.net/ What is OpenBSD? What is OpenBSD? ● It's that firewall OS... right...? ● Crazy, paranoid, security people... ● I read an email from them once, they're mean What is OpenBSD? ● Welcome to OpenBSD: The proactively secure Unix-like operating system. – Default /etc/motd ● The OpenBSD project produces a FREE, multi-platform 4.4BSD- based UNIX-like operating system. Our efforts emphasize portability, standardization, correctness, proactive security and integrated cryptography. ● Only two remote holes in the default install, in a heck of a long time! – This is important, way beyond the obvious! ● For developers, by developers What is OpenBSD? ● FREE – BSD-licensed – As per goals.html, acceptable copyright is “ISC or Berkeley style preferred, GPL acceptable as a last recourse but not in the kernel, NDA never acceptable” – As of 2003, the ISC license is preferred license for new code The ISC License ● src/share/misc/license.template It is important to specify the year of the copyright. Additional years should be separated by a comma, e.g.
    [Show full text]
  • Book of PF : a No-Nonsense Guide to the Openbsd Firewall (3Rd Edition)
    EDITION3RD BUILD A Covers OpenBSD 5.6, MORE SECURE FreeBSD 10.x, and NETWORK EDITION NETWORK 3RD NetBSD 6.x WITH PF THETHE BOOKBOOK THE BOOK OF PF OF THE BOOK THE BOOK OF PF OF THE BOOK OFOF PFPF OpenBSD’s stateful packet filter, PF, is the heart of • Build adaptive firewalls to proactively defend against A GUIDE TO THE the OpenBSD firewall. With more and more services attackers and spammers NO-NONSENSE placing high demands on bandwidth and an increas- OPENBSD FIREWALL • Harness OpenBSD’s latest traffic-shaping system ingly hostile Internet environment, no sysadmin can to keep your network responsive, and convert your afford to be without PF expertise. existing ALTQ configurations to the new system The third edition of The Book of PF covers the most • Stay in control of your traffic with monitoring and up-to-date developments in PF, including new content PETER N.M. HANSTEEN visualization tools (including NetFlow) on IPv6, dual stack configurations, the “queues and priorities” traffic-shaping system, NAT and redirection, The Book of PF is the essential guide to building a secure wireless networking, spam fighting, failover provision- network with PF. With a little effort and this book, you’ll ing, logging, and more. be well prepared to unlock PF’s full potential. You’ll also learn how to: ABOUT THE AUTHOR • Create rule sets for all kinds of network traffic, whether Peter N.M. Hansteen is a consultant, writer, and crossing a simple LAN, hiding behind NAT, traversing sysadmin based in Bergen, Norway. A longtime DMZs, or spanning bridges or wider networks Freenix advocate, Hansteen is a frequent lecturer on OpenBSD and FreeBSD topics, an occasional • Set up wireless networks with access points, and contributor to BSD Magazine, and the author of an lock them down using authpf and special access often-slashdotted blog (http://bsdly.blogspot.com/ ).
    [Show full text]
  • Apeosport-VII C7773/C6673/C5573/C4473/C3373/C2273, Docucentre-VII C7773/C6673/C5573/C4473/C3373/C2273 Copyright©2018 Fuji Xerox Co., Ltd
    ライセンス ライセンス ここでは、ライセンスについて説明します。必ずご確認ください。 ApeosPort-VII C7773/C6673/C5573/C4473/C3373/C2273, DocuCentre-VII C7773/C6673/C5573/C4473/C3373/C2273 Copyright©2018 Fuji Xerox Co., Ltd. All rights reserved. 本製品は、「OSS 一覧表」に記載された OSS が含まれています。各 OSS の適用ライ センスおよび著作権表示については、次の「OSS 一覧表」をご参照ください。 また、個別のライセンス条件については、「OSS 一覧表」の下に記載された各 OSS ライセンスをご覧ください。 本製品は、GNU Library General Public License 2.0 など、OSS ライセンス基づき 許諾されるソフトウエアを含んでいます。 OSS ライセンスに基づき、対象となるソフトウエアのソースコードの入手を希望さ れる方は、以下のサイトより入手が可能です。 http://www.fujixerox.co.jp/etc/oss/mfp/ap7_c7773/v1_0 「OSS 一覧表」 適用ライセンス OSS Copyright 表示 Apache License Apache 1.3.4 Copyright (c) 1999-2002 The Apache Software Version 1.1 Foundation. crimson 1.1.3 Copyright (c) 1999-2002 The Apache Software Foundation. Apache License Bonjour 107.6 Copyright (c) 2002-2003 Apple Computer, Inc. Version 2.0 NFCTools for Java Copyright 2011-2012 Adrian Stabiszewski, parent-1.0.M8 [email protected] Jetty 6.1.26 Copyright 2004-2008 Mort Bay Consulting Pty. Ltd. Jetty 9.4.9 Copyright (c) 1995-2018 Mort Bay Consulting Pty. Ltd. brcm_patchram_plus Copyright (C) 2009-2011 Broadcom Corporation 1.0 mbed TLS 2.8.0 Copyright (C) 2006-2015, ARM Limited, All Rights Reserved Boost Software boost 1.28.0 (C) Copyright Boost.org 2001 License 1.0 1 適用ライセンス OSS Copyright 表示 Boost Software boost 1.61.0 Copyright (C) 1992 A. V. Le Blanc License 1.0 ([email protected]) Copyright (C) 2001 Aaron Lehmann Copyright (C) 2002 Al Stone Copyright (C) 1998 Albert Cahalan Copyright (C) 1994, 1996 Alessandro Rubini ([email protected]) Copyright (C) 2004 Alexander Guy Copyright (C) 2002 Andi Kleen, SuSE Labs.
    [Show full text]