References
[1] R. Braden, editor. Requirements for Internet hosts - com-
munication layers. RFC 1122, Internet Engineering Task
Force, Oct. 1989.
[2] Shadow Hawk gets prison term, February 1989. Phrack
World News XXIV, file 12 of 13.
[3] R. E. Droms and W. Arbaugh, editors. Authentication for
DHCP messages. RFC 3118, Internet Engineering Task
Force, June 2001.
[4] J. Schlyter, editor. DNS security (DNSSEC) NextSECure
(NSEC) RDATA format. RFC 3845, August 2004.
[5] B. Ramsdell, editor. Secure/multipurpose internet mail ex-
tensions (S/MIME) version 3.1 message specification. RFC
3851, July 2004.
[6] D. E. 3rd, S. D. Crocker, and J. Schiller. Randomness rec-
ommendations for security. RFC 1750, Internet Engineer-
ing Task Force, Dec. 1994.
[7] M. Allman and S. Ostermann. FTP security considerations.
RFC 2577, Internet Engineering Task Force, May 1999.
[8] D. Atkins and R. Austein. Threat analysis of the Domain
Name System (DNS). RFC 3833, August 2004.
[9] S. M. Bellovin. Using the domain name system for system
break-ins. In Proceedings of the Fifth Usenix Unix Security
Symposium, pages 199–208, Salt Lake City, UT, June 1995.
[10] S. M. Bellovin. Defending against sequence number at-
tacks. RFC 1948, Internet Engineering Task Force, May
1996.
[11] S. M. Bellovin. Problem areas for the IP security protocols.
In Proceedings of the Sixth Usenix Unix Security Sympo-
sium, pages 205–214, July 1996.
[12] M. Bishop. An application of a fast data encryption stan-
dard implementation. Technical Report PCS-TR88-138,
Department of Mathematics and Computer Science, Dart-
mouth College, Hanover, NH, 1988.
[13] M. Blum and S. Micali. How to generate cryptographically
strong sequences of pseudo-random bits. SIAM J. Comput.,
13(4):850–864, November 1984.
[14] I. A. Board. IAB official protocol standards. RFC 1083,
Internet Engineering Task Force, Dec. 1988.
[15] M. Butler, J. B. Postel, D. Chase, J. Goldberger, and J. F.
Reynolds. Post office protocol: Version 2. RFC 937, Inter-
net Engineering Task Force, Feb. 1985.
[16] P. Calhoun, J. Loughney, E. Guttman, G. Zorn, and
J. Arkko. Diameter base protocol. RFC 3588, Internet En-
gineering Task Force, Sept. 2003.
[17] J. D. Case, M. S. Fedor, M. L. Schoffstall, and J. R. Davin.
Simple network management protocol. RFC 1067, Internet
Engineering Task Force, Aug. 1988.
[18] J. D. Case, R. Mundy, D. Partain, and B. Stewart. Introduc-
tion and applicability statements for internet-standard man-
agement framework. RFC 3410, Internet Engineering Task
Force, Dec. 2002.
[19] Common criteria for information technology security eval-
uation, August 1999. Version 2.1.
[20] B. Cheswick and S. M. Bellovin. A DNS filter and switch
for packet-filtering gateways. In Proceedings of the Sixth
Usenix Unix Security Symposium, pages 15–19, San Jose,
CA, 1996.
[21] D. E. Comer. Internetworking with TCP/IP: Principles,
Protocols, and Architecture, volume I. Prentice-Hall, En-
glewood Cliffs, NJ, second edition, 1991.
[22] Computer Systems Research Group. UNIX User’s Refer-
ence Manual, 4.3 Berkeley Software Distrubtion, Virtual
Vax-11 Version. Computer Science Division, Department
of Electrical Engineering and Computer Science, Univer-
sity of California, Berkeley, 1986.
[23] M. R. Crispin. INTERNET MESSAGE ACCESS PROTO-
COL - VERSION 4rev1. RFC 3501, Internet Engineering
Task Force, Mar. 2003.
[24] D. H. Crocker. Standard for the format of ARPA Internet
text messages. RFC 822, Internet Engineering Task Force,
Aug. 1982.
[25] W. J. Croft and J. Gilmore. Bootstrap protocol. RFC 951,
Internet Engineering Task Force, Sept. 1985.
[26] D. W. Davies and W. L. Price. Security for Computer Net-
works. John Wiley & Sons, second edition, 1989.
[27] Defense Commuications Agency. Defense data network
subscriber security guide, 1983.
[28] D. E. Denning and G. M. Sacco. Timestamps in key distri-
bution protocols. Communications of the ACM, 24(8):533–
536, August 1981.
[29] W. Diffie. The first ten years of public key cryptography.
Proceedings of the IEEE, 76(5):560–577, May 1988.
[30] W. Diffie and M. E. Hellman. New directions in cryptogra-
phy. IEEE Transactions on Information Theory, IT-11:644–
654, November 1976.
[31] DoD trusted computer system evaluation criteria. DoD
5200.28-STD, DoD Computer Security Center, 1985.
[32] Technical rationale behind CSC-STD-003-83: Computer
security requirements. DoD CSC-STD-004-85, DoD Com-
puter Security Center, 1985.
[33] Trusted network interpretation of the “trusted computer sys-
tem evaluation criteria”. DoD NCSC-TG-005, DoD Com-
puter Security Center, 1987.
[34] R. E. Droms. Dynamic host configuration protocol. RFC
2131, Internet Engineering Task Force, Mar. 1997.
[35] M. Dworkin. Recommendation for block cipher modes of
operation: Methods and techniques. National Institute of
Standards and Technology, December 2001. Federal Infor-
mation Processing Standards Publication 81.
[36] S. Dyer. Hesiod. In Proceedings of the Winter Usenix Con-
ference, Dallas, TX, 1988.
[37] D. Eastlake 3rd. Domain name system security extensions.
RFC 2535, Internet Engineering Task Force, Mar. 1999.
[38] M. W. Eichin and J. A. Rochlis. With microscope and
tweezers: An analysis of the Internet virus of november
1988. In Proc. IEEE Symposium on Research in Security
and Privacy, pages 326–345, Oakland, CA, May 1989.
[39] M. Elkins. MIME security with pretty good privacy (PGP).
RFC 2015, Internet Engineering Task Force, Oct. 1996.