Skip to main content

Sicherheitsaspekte von Computernetzwerken

  • Conference paper
GI — 19. Jahrestagung I

Part of the book series: Informatik-Fachberichte ((INFORMATIK,volume 222))

Abstract

Dieser Artikel stellt zentrale Sicherheitsprobleme der IP-Protkollfamilie dar. Zudem werden Sicherheitsprobleme von Netzwerkprogrammen aufgezeigt, die in typischen UNIX-Umgebungen verwendet werden. Obwohl es sich um protokoll- bzw. betriebssystemspezifische Probleme handelt, lassen sich die meisten Erkenntnisse und Strategien zur Vermeidung von Sicherheitslöchern durchaus auch auf Umgebungen anwenden, in denen andere Protokolle bzw. Betriebssysteme zum Einsatz kommen. Weiterhin werden einfache Ansätze zur Vermeidung der resultierenden Gefahren aufgezeigt.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literatur

  1. Comer, D. Internetworking with TCP/IP: Principles Protocols and Architecture, Prentice Hall, 1988

    Google Scholar 

  2. Bellovin, S.M. Security Problems in TCP/IP Protocol Suite, Computer Communications Review, Volume 19 Nr. 2, April 1989.

    Article  Google Scholar 

  3. Steiner, J.G., Neuman, C., Schiller, J.I. Kerberos: An Authentication System for Open Network Systems, Proceedings Winter USENIX, 1988 Dallas, Texas.

    Google Scholar 

  4. Morris, R.T. A Weakness in the 4.2 bsd UNIX TCP/IP Software, Computing Science Technical Report No. 117, AT&T Bell Laboratories, Murray Hill, New Jersey.

    Google Scholar 

  5. Postel, J. Internet Protocol RFC 791, DDN Network Information Center, SRI International, Menlo Park, California, September 1981.

    Google Scholar 

  6. Postel, J. Transmission Control Protocol RFC 793, DDN Network Information Center, SRI International, Menlo Park, California, September 1981.

    Google Scholar 

  7. Postel, J. User Datagram Protocol RFC 768, DDN Network Information Center, SRI International, Menlo Park, California, August 1980

    Google Scholar 

  8. Hedrick, C. Routing Information Protocol RFC 1058, DDN Network Information Center, SRI International, Menlo Park, California, Juni 1988.

    Google Scholar 

  9. Postel, J. Internet Control Message Protocol RFC 792, DDN Network Information Center, SRI International, Menlo Park, California, 1981.

    Google Scholar 

  10. Postel, J., Mogul, J. Internet Standard Subnetting Procedure, RFC 950, DDN Network Information Center, SRI International, Menlo Park, California, August 1985

    Google Scholar 

  11. Harrenstein, K. Name/Finger, RFC 742, DDN Network Information Center, SRI International, Menlo Park, California, December 1977

    Google Scholar 

  12. Sun Microsystems, Inc. The SUN Network File System. SunOS 4.0 Documentation, Vol. 7. Sun Microsystems, Inc. Mai 1988.

    Google Scholar 

  13. Sun Microsystems, Ine Network Programming. SunOS 4.0 Documentation, Vol. 10. Sun Microsystems, Inc. Mai 1988.

    Google Scholar 

  14. Sun Microsystems, Ine XDR: External Data Represantation Standard RFC 1014, DDN Network Information Center, SRI International, Menlo Park, California, Juni 1987

    Google Scholar 

  15. Taylor,B. und Goldberg, D. Secure Networking in the Sun Environement. Proceedings, Summer USENIX,1986, Atlanta, Georgia.

    Google Scholar 

  16. Sun Microsystems, Ine The Sun Yellow Pages Service. SunOS 4.0 Documentation, Vol. 7. Sun Microsystems, Inc. Mai 1988

    Google Scholar 

  17. Security Mailing Listj Anfragen an: security-requestQcpd.com.

    Google Scholar 

  18. Postel, J. File Transfer Protocol RFC 959, DDN Network Information Center, SRI International, Menlo Park, California, 1985.

    Google Scholar 

  19. Rlogin Manual Page, UNIX User’s Reference Manual, Computer Systems Research Group, Department of Electrical Engeneering and Computer Science, University of California, Berkeley, California.

    Google Scholar 

  20. Postel, J., Reynolds, J. Telnet Protocol Specification, RFC 854, DDN Network In-formation Center, SRI International, Menlo Park, California, Mai 1983

    Google Scholar 

  21. Spafford, Eugene H. The Internet Worm Program: An Analysis, Computer Communications Review Volume 19 Nr. 1, Januar 1989.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1989 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Beyer, T. (1989). Sicherheitsaspekte von Computernetzwerken. In: Paul, M. (eds) GI — 19. Jahrestagung I. Informatik-Fachberichte, vol 222. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-75177-6_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-75177-6_41

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-51821-1

  • Online ISBN: 978-3-642-75177-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics