Abstract Syntax Notation One (ASN.1)
|
A language used to define the structure and content of objects such
as data records and protocol messages, along the lines of a
super-duper version of the typedef in C, only a lot more
powerful. ASN.1 was developed as part of the Open Systems
Interconnection (OSI) environment, and was originally used for
writing specifications. More recently, though, tools have been
developed that will generate software from ASN.1.
See also: Distinguished Encoding Rules
Web reference: The ASN.1 Consortium (http://www.asn1.org/)
|
Astoundium
|
The element of suprise.
|
Attacker
|
In this context, one who attacks a computer system either to gain
access or, as in a "Denial of Service attack", to cause a
failure in the system or data loss.
See also: Cracker
|
Backup Browser
|
Browser nodes which are not elected to be the Local Master Browser
may be called upon to store a backup Browse List and to respond to a
client request for a copy of the Browse List. These hosts are
called Backup Browsers.
See also: Local Master Browser
|
Backup Domain Controller (BDC)
|
A Windows NT Domain Controller (DC) which keeps a backup copy of the
user/group authentication database in an NT Domain. The master copy
is maintained by the Primary Domain Controller (PDC). A Backup
Domain Controller can be promoted to the role of PDC in a pinch.
Only one PDC is permitted per NT Domain, but there may be any number
of BDCs.
See also: Domain Controller,
Primary Domain Controller
|
BAF Protocol
|
The very first name for the protocol formerly known as SMB. The SMB
protocol was originally developed by Dr. Barry A. Feigenbaum at IBM
and, according to legend, was originally given his initials. It was
later renamed SMB and, more recently, CIFS.
See also: CIFS, SMB
|
Bran
|
Pronounced Brahhn. The name of my dog.
|
Browser Node
|
See: Potential Browser
|
Browser Election
|
The process by which a browser node on a NetBIOS LAN is chosen to be
the primary repository of service information for that LAN (that is,
the Local Master Browser). Under NBT, the election process takes
place within the confines of the local IP subnet.
|
CIFS
|
Common Internet File System. The
protocol formerly known as Server Message Block (SMB) and, before
that, as the BAF protocol (after its original creator, Dr. Barry
Feigenbaum). CIFS is a protocol for file and device sharing
across a network.
See also: SMB
|
Cracker
|
One who attacks a system in an effort to break security, probably to
gain unauthorized access.
Goodguy crackers (sometimes called "White Hat" crackers)
used to provide the very beneficial service of exposing weaknesses
so that they could be fixed, but then the US Congress enacted the
Digital Millennium Copyright Act (DMCA) which made talking about
such things illegal in the US and potentially dangerous elsewhere1.
See also: Attacker
Do not see also: Hacker
|
Distinguished Encoding Rules (DER)
|
A set of rules for encoding and decoding ASN.1 data for network
transport. DER provides a standard format for transport of data
over a network so that the receiving end can convert the data back
into their correct ASN.1 format. DER is a specialized form of a
more general encoding known as BER (Basic Encoding
Rules). DER is designed to work well with security
protocols, and is used for encoding Kerberos and LDAP exchanges.
See also: ASN.1, Kerberos, LDAP
|
Domain Controller (DC)
|
An authentication server in a WindowsNT or Windows2000 Domain.
A Domain Controller (DC) maintains a database of user, group, and
machine accounts and other security information, and provides
authentication services to the NT or W2K Domain.
In an NT Domain, one of the DCs will be designated the
Primary Domain Controller (PDC). All security database
administration is handled via the PDC, and copies of the database
are then distributed to any available Backup Domain
Controllers (BDCs). NT Domain controllers register the Group
Special NetBIOS name nt_domain<1C> to identify
themselves.
In Windows2000 Domains the security database is stored in the
Active Directory, and there is no distinction between primary and
secondary controllers.
See also: Backup Domain Controller,
Primary Domain Controller
|
Domain Name System (DNS)
|
The Domain Name System is a distributed database system that
provides mappings between Internet names and Internet Protocol (IP)
addresses. The DNS name space is hierarchical in structure.
Web reference: the DNS Resources Directory (http://www.dns.net/dnsrd/)
|
Domain Master Browser (DMB)
|
A host system that is designated to coordinate Browse Lists for
matching workgroups across multiple subnets. The DMB receives
subnet Browse List updates from Local Master Browsers, combines
those lists, and distributes the combined list back to the Local
Masters for the workgroup.
See also: Local Master Browser
|
Doveryay, no proveryay
|
Trust, but verify.
|
Encoded NBT Name
|
The term used in this text for the fully qualified Second Level
Encoded form of the NetBIOS Name and Scope ID. For example, the
string
"\x20EGEFCACACACACACACACACACACACACACA\x2FI\x2FO\x3FUM\0"
is the fully encoded form of the NetBIOS name FE<20>
and the scope ID "FI.FO.FUM".
See also: NBT Name,
First Level Encoding,
Scope ID,
Second Level Encoding
|
First Level Encoding
|
The conversion of a NetBIOS name to a format complying with
DNS "best practices".
NetBIOS names may contain characters which are not considered
valid for use in DNS names, yet RFC 1001 and RFC 1002 attempted to
map the NetBIOS name space into the DNS name space. To work around
this conflict, NetBIOS names are encoded by splitting each byte of
the name into two nibbles and then adding the value of 'A' (0x41).
Thus, the '&' character (0x26) would be encoded as "CG".
NetBIOS names are usually padded with spaces before being encoded.
In this book, the term "NBT Name" is used to indicate
the fully qualified form of the First Level Encoded name. The NBT
Name includes the Scope ID.
See also: NBT Name,
Scope ID,
Second Level Encoding
|
GSS-API
|
Generic Security Service Application
Program Interface. A generic interface to a set of
security services. It makes it possible to write software that does
not care what the underlying security mechanisms actually are.
See: RFC
2078
See also: SPNEGO
|
Hacker
|
One who fiddles with an existing system to see if it can be
improved. Hacking is generally the fine art of [creating and]
recursively revising software or a software-based system.
Do not see also: Cracker
|
Kerberos
|
A network authentication service developed at MIT and later adopted
by Microsoft for use with Windows2000 and SMB over naked TCP/IP
transport.
See: RFC
1510
|
LANA
|
NetBIOS LAN Adapter card.
For the original PC Network System, IBM sold both Broadband and
Baseband network interface cards, which they called LAN Adapters.
The NBT system supports the concept of a "virtual LANA".
See also: NBT
|
LDAP
|
The Lightweight Directory Access Protocol.
A standard protocol used to access directory services based on the
X.500 directory service model (eg., Novell Directory Services and
Microsoft Active Directory).
See: RFC
2251
|
Local Master Browser (LMB)
|
A host system that is "elected" to manage the Browse List
for the local IP LAN. The LMB collects service announcements
from servers on the local LAN, distributes the Browse List to any
Backup Browsers on the LAN, and exchanges service lists with the
Domain Master Browser (if there is one).
See also: Domain Master Browser,
Backup Browser
|
Machine Name
|
Host name. A name which is typically assigned in the system
configuration and used as the base name creating the NetBIOS names
of several important services. The service names are composed by
appending a service-specific suffix to the machine name.
|
Master Browser
|
A common short-hand for "Local Master Browser".
See: Local Master Browser
|
MIDL
|
Microsoft Interface Definition Language.
Microsoft's version of the Interface Definition
Language (IDL). MIDL is used to specify the parameters to
MS-RPC function calls. MIDL is also used to define the interfaces
to Microsoft Dynamically Linked Library (DLL)
functions.
See also: MS-RPC
|
Moore's Law
|
The observation (by Gordon Moore) that the transistor density on
computer chips doubles roughly every 1.5 years. This is generally
taken to mean that processing speeds also double every 1.5 years.
Software developers compensate by writing bad code and adding
unnecessary features to maintain status quo.
|
MS-RPC
|
Microsoft Remote Procedure Call.
RPC in general is a system that allows a process on one system to
make function calls against libraries on another system. MS-RPC is
Microsoft's implementation of RPC.
See also: MIDL
|
Naked TCP
|
SMB transport over TCP/IP without the NBT NetBIOS emulation layer.
SMB is traditionally passed via the NetBIOS API to an underlying
transport protocol. SMB over "naked" or "raw" TCP
does not require the use of the NetBIOS API or NetBIOS emulation at
the transport level.
See also: NBT, NetBIOS
|
NBDD
|
NetBIOS Datagram Distribution
Server. This server relays broadcast and multicast (group)
datagrams to all intended recipients.
When a P, M, or H node wishes to send a broadcast or multicast
datagram, it will send the datagram to the NBDD. The NBDD will
obtain the list of destination IPs from the NBNS and then unicast
the datagram to each of those nodes.
Most implementations do not provide NBDD support.
See also: NBNS
|
NBNS
|
NetBIOS Name Server. A server
providing NetBIOS name to IP address mapping. The NBNS is part
of the NBT mechanism and does not need to participate directly in
the NetBIOS LAN.
See also: WINS
|
NBT
|
NetBIOS over TCP/IP; also known as NetBT
and, less commonly, as TCPBEUI. NBT is an implementation of the
NetBIOS API on top of a TCP/IP transport layer.
|
NBT Name
|
The term used in this text for the fully qualified First Level
Encoded form of the NetBIOS Name and Scope ID. For example, the
NBT name:
EGEFCACACACACACACACACACACACACACA.FI.FO.FUM
is composed of the NetBIOS name FE<20> and the scope
ID "FI.FO.FUM".
See also: Scope ID,
First Level Encoding
|
NetBEUI
|
NetBIOS Extended User Interface.
Also known as NetBIOS Frame Protocol (NBF).
NetBEUI provides a simple mapping of NetBIOS API parameters and data
to a transport suitable for passing messages on Ethernet and Token
Ring networks.
Web reference: NetBIOS NetBEUI NBF Networking, by
Timothy D. Evans. (http://ourworld.compuserve.com/homepages/timothydevans/contents.htm)
|
NetBIOS
|
Network Basic Input Output System.
NetBIOS is the Application Programming
Interface (API) to a proprietary LAN system that was
developed by IBM and Sytek. The NetBIOS API has been implemented on
top of several different network transports including TCP/IP, DECnet,
IPX/SPX, and others.
See also: NBT,
NetBT
|
NetBT
|
NetBIOS over TCP/IP. Better known as NBT.
See: NBT
|
Network Data Representation (NDR)
|
The on-the-wire encoding for parameters passed via MS-RPC. MS-RPC
input parameters are marshalled into NDR format for transmission
over the network, and then unmarshalled on the server side. The
process is then reversed to return the results.
See also: MS-RPC
|
NT Domain
|
A Workgroup with a Domain Controller.
See also: Domain Controller,
Workgroup
|
Phrep
|
An expletive, roughly equivalent to "dang", "drat",
or "bother", but without connotation.
|
Primary Domain Controller (PDC)
|
A Windows NT Domain Controller (DC) which keeps the master copy of
the user/group authentication database in an NT Domain. Only one
PDC is permitted per NT Domain. In addition to registering the
nt_domain<1C> Group Special name, the PDC also
registers the unique nt_domain<1B> NetBIOS name
(where nt_domain is the name of the NT Domain). Microsoft's
WINS server ensures that the IP address registered to the
nt_domain<1B> name is always at the top of the list of
IPs associated with the nt_domain<1C> Group Special
name.
See also: Backup Domain Controller,
Domain Controller
|
Potential Browser
|
Any node on a local IP LAN that is willing and able to participate
in browser elections and take on the role of Local Master Browser or
Backup Browser.
See also: Local Master Browser, Backup Browser
|
Scope ID
|
A string of dot-separated labels, formatted per DNS naming rules.
The Scope ID defines a virtual NBT LAN by dividing the NetBIOS
namespace.
See also: NBT Name,
DNS,
First Level Encoding,
Second Level Encoding
|
Second Level Encoding
|
The on-the-wire format of an NBT name. The encoding scheme replaces
the familiar dot characters used in DNS names with a byte containing
the length of the next label. The Second Level Encoded form of the
NBT Name
EGEFCACACACACACACACACACACACACACA.FI.FO.FUM
would be
"\x20EGEFCACACACACACACACACACACACACACA\x02FI\x02FO\x03FUM\0"
See also: NBT Name,
DNS,
First Level Encoding
|
Server Message Block (SMB)
|
A file and print-sharing protocol developed by IBM, Intel, 3Com, and
Microsoft for use with PC-DOS and MS-DOS. It has since been renamed
CIFS.
Also a name for the messages exchanged by the SMB or CIFS
protocol. An SMB message is often referred to simply as "an
SMB".
See also: CIFS
|
Server Service
|
An SMB filesharing service provider. The Server Service registers a
NetBIOS name consisting of the machine name with a suffix value of
0x20. On many platforms, the Server Service will also accept NBT
connection requests with a CALLING NAME of
*SMBSERVER<20>.
|
Simple Protected Negotiation (SPNEGO)
|
The "Simple and Protected GSS-API Negotiation Mechanism"
is a protocol used with GSS-API to negotiate authentication
mechanisms between a client and server.
See: RFC
2478
See also: GSS-API
|
Suffix Byte
|
The sixteenth byte of a NetBIOS name. This byte is used to indicate
the type of service that has registered the name.
See also: Appendix C: Known NetBIOS
Suffix Values
|
TCPBEUI
|
Yet another name for NBT. The name TCPBEUI is
primarily used by folks from IBM.
See: NBT
|
Thermomostat
|
The internal sensor that causes your mother to tell you to put on
a sweater when she is cold.
|
WINS
|
Windows Internet Name Service.
Microsoft's name for their NBNS
implementation.
See: NBNS
|
Workgroup
|
An NT Domain without a Domain Controller.
The distinction between an NT Domain and a Workgroup is blurry.
The two are basically the same thing, except that an NT Domain has a
Domain Controller, which provides authentication services. The
Primary Domain Controller also always runs the Domain Master Browser
(DMB) service, which coordinates the workgroup Browse Lists across
subnets.
See also: Domain Master Browser,
Domain Controller,
Primary Domain Controller
|