[Chapter 13] Internet Information Resources Another browser service that is often used by a network administrator is FTP.. [Chapter 13] Internet Information Resources Reading important a
Trang 1[Chapter 13] Internet Information Resources
some other browsers this field is labeled "Location" or "Netsite," but in all cases it performs the same function: it holds the path to the information resource In the example the location is
http://csrc.nist.gov/secalert/ "URL" stands for universal resource locator It is a standard way of
defining a network resource and it has a specific structure:
service://server/path/file
In the sample URL, http is the service; csrc.nist.gov is the server; and secalerts is the path to the
resource contained on that server This tells the browser to locate a host with the domain name
csrc.nist.gov, and to ask it for the hypertext information located in the secalerts path Hypertext is not
the only type of information that can be retrieved by a browser The browser is intended to provide a consistent interface to various types of network resources HTTP is only one of the services that can
be specified in a URL
A Web browser can be used to view local hypertext files This is how the gated documentation is
delivered Figure 13.2 shows a network administrator reading the gated documentation The URL in
Figure 13.2 is file://localhost/usr/doc/config_guide/config.html The service is file, which means that the resource is to be read via the standard filesystem The server is the local host (localhost) The path
is /usr/doc/config_gated, and the file is config.html.
Figure 13.2: Reading GateD documentation
file:///C|/mynapster/Downloads/warez/tcpip/ch13_01.htm (3 of 6) [2001-10-15 09:19:02]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Trang 2[Chapter 13] Internet Information Resources
Another browser service that is often used by a network administrator is FTP Figure 13.3 shows a network administrator using a browser to download software The URL in Figure 13.3 is
ftp://ftp.ncsa.edu/Web/Mosaic/Unix/binaries/2.6 FTP is the service used to access the resource,
which in this case is a binary file The server is ftp.ncsa.edu, which is the anonymous FTP server at the National Center for Super Computing Applications The path is /Web/Mosaic/Unix/binaries/2.6
and the file is any of the files listed on the screen
Figure 13.3: Browser FTP interface
file:///C|/mynapster/Downloads/warez/tcpip/ch13_01.htm (4 of 6) [2001-10-15 09:19:02]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Trang 3[Chapter 13] Internet Information Resources
Reading important announcements and documentation and downloading files are probably the most common uses a network administrator has for a Web browser There are, however, many other things that can be done with a browser and a huge number of resources available on the network A detailed
discussion of browsers and the Web is beyond the scope of this book See The Whole Internet User's
Guide and Catalog, by Ed Krol (O'Reilly & Associates), for a full treatment of these subjects.
The browser provides a consistent interface to a variety of network services But it is not the only way, or necessarily the best way, to access all of these services In particular, it may not be the fastest
or most efficient way to download a file Figure 13.3 shows a file being downloaded from an
anonymous FTP server An alternative is to invoke ftp directly from the command-line interface.
file:///C|/mynapster/Downloads/warez/tcpip/ch13_01.htm (5 of 6) [2001-10-15 09:19:02]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Trang 4[Chapter 13] Internet Information Resources
Administration
Next: 13.2 Anonymous FTP
[ Library Home | DNS & BIND | TCP/IP | sendmail | sendmail Reference | Firewalls | Practical Security ]
file:///C|/mynapster/Downloads/warez/tcpip/ch13_01.htm (6 of 6) [2001-10-15 09:19:02]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Trang 5[Chapter 13] 13.2 Anonymous FTP
Previous: 13.1 The World
Wide Web
Chapter 13 Internet Information Resources
Next: 13.3 Finding Files
13.2 Anonymous FTP
Anonymous FTP is mentioned throughout this book as a technique for retrieving publicly available
files and programs from the many FTP servers around the Internet Anonymous FTP is simply an ftp
session in which you log into the remote server using the username anonymous and, by convention,
your email address as the password [1] The anonymous FTP example below should make this simple process clear:
[1] Some FTP servers request your real username as a password
% ftp ftp.ncsa.edu
Connected to ftp.ncsa.uiuc.edu
220 FTP server Wed May 21 1997 ready
Name (ftp.ncsa.edu:kathy): anonymous
331 Guest login ok, use email address as password
ftp> get Mosaic-hp-2.6.Z Mosaic.Z
200 PORT command successful
150 Opening BINARY mode data connection for Mosaic-hp-2.6.Z
226 Transfer complete
local: Mosaic.Z remote: Mosaic-hp-2.6.Z
809343 bytes received in 3.5 seconds (2.3e+02 Kbytes/s)
ftp> quit
221 Goodbye
In this example, the user logs into the server ftp.ncsa.edu using the username anonymous and the password kathy@nuts.com, which is her email address With anonymous FTP, she can log in even though she doesn't have an account on ftp.ncsa.edu Of course what she can do is restricted, but she
can retrieve certain files from the system, and that's just what she does She changes to the
/Web/Mosaic/Unix/binaries/2.6 directory and gets the compressed file Mosaic-hp-2.6.Z The file is
retrieved in binary mode
file:///C|/mynapster/Downloads/warez/tcpip/ch13_02.htm (1 of 4) [2001-10-15 09:19:03]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Trang 61 Add user ftp to the /etc/passwd file.
2 Create an ftp home directory owned by user ftp that cannot be written to by anyone.
3 Create a bin directory under the ftp home directory that is owned by root, and that cannot be
written to by anyone The ls program should be placed in this directory and changed to mode
111 (execute-only)
4 Create an etc directory in the ftp home directory that is owned by root, and that cannot be written to by anyone Create special passwd and group files in this directory, and change the
mode of both files to 444 (read-only)
5 Create a pub directory in the ftp home directory that is owned by root and is only writable by
root, i.e., mode 644 Don't allow remote users to store files on your server, unless it is
absolutely necessary and your system is on a private, non-connected network If you must
allow users to store files on the server, change the ownership of this directory to ftp and the
mode to 666 (read and write) This should be the only directory where anonymous FTP users can store files
The following examples show each of these steps First, create the ftp home directory and the required subdirectories In our example, we create the ftp directory under the /usr directory.
Create a group that will be used only by anonymous FTP, a group that has no other members In our
example we create a group called anonymous An entry for this new group is added to the /etc/group file, and a file named /usr/ftp/etc/group is created that contains only this single entry.
Trang 7Set the correct ownership and mode for each of the directories The ownership of /usr/ftp/pub,
/usr/ftp/bin, and /usr/ftp/etc do not need to be changed because the directories were created by root.
If you must allow users to write their own files in the pub directory, make the following changes: [2]
[2] This opens a large security hole Allow users to write their own files to the
anonymous FTP server only if you must
# chown ftp pub
# chmod 666 pub
For most UNIX systems, the installation is complete But if you have a Sun OS 4.x system, a few
more steps are necessary The dynamic linking used by Sun OS requires that the ftp home directory
contains:
1 The runtime loader
2 The shared C library
3 /dev/zero
file:///C|/mynapster/Downloads/warez/tcpip/ch13_02.htm (3 of 4) [2001-10-15 09:19:03]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Trang 8[Chapter 13] 13.2 Anonymous FTP
These Sun-specific steps are shown in the following examples First, create the directory
/usr/ftp/usr/lib, then copy the files ld.so and libc.so.* into the new directory, and set the file
Now you can copy the files you wish to make publicly available into /usr/ftp/pub To prevent these
files from being overwritten by remote users, set the mode to 644 and make sure the files are not
owned by user ftp.
Once you complete the configuration steps necessary for your system, test it thoroughly before
announcing the service Make sure that your server provides the anonymous FTP service you want, without providing additional "services" that you don't want (such as allowing anonymous users access
to files outside of the ftp home directory) Anonymous FTP is a potential security risk If you offer
this service at all, limit the number of systems at your site that provide it (one is usually enough), and take care to ensure that the installation is done properly
Previous: 13.1 The World
Wide Web
TCP/IP Network Administration
Next: 13.3 Finding Files
[ Library Home | DNS & BIND | TCP/IP | sendmail | sendmail Reference | Firewalls | Practical Security ]
file:///C|/mynapster/Downloads/warez/tcpip/ch13_02.htm (4 of 4) [2001-10-15 09:19:03]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Trang 9[Chapter 13] 13.3 Finding Files
Previous: 13.2 Anonymous
FTP
Chapter 13 Internet Information Resources
Next: 13.4 Retrieving RFCs
13.3 Finding Files
Anonymous FTP requires detailed knowledge from the user To retrieve a file, you must know the FTP server and the directory where the file is located When the network was small, this was not a major problem There were a limited number of important FTP servers, and they were well stocked
with files You could always ftp to a major server and search through some directories using ftp's ls
command This old approach is not compatible with a large and expanding Internet for two reasons:
● There are now thousands of major anonymous FTP servers Knowing them all is difficult
● There are now millions of Internet users They cannot all rely on a few well-known servers
The servers would quickly be overwhelmed with ftp requests.
archie is an application designed to help with this problem It provides a database of information
about anonymous FTP sites and the files they contain
servers the file is available from
archie can be used in four different ways: interactively, through electronic mail, via a Web browser,
or from an archie client To use archie interactively, telnet to one of the archie servers [3] Log in
using the username archie and no password At the archie> prompt, type help to get a full set of interactive archie commands.
[3] The list of publicly accessible servers is available at
http://www.bunyip.com/products/archie/world/servers.html
file:///C|/mynapster/Downloads/warez/tcpip/ch13_03.htm (1 of 5) [2001-10-15 09:19:04]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Trang 10[Chapter 13] 13.3 Finding Files
There are many interactive archie commands, but the basic function of locating a program that is
accessible via anonymous FTP can be reduced to two commands
prog pattern
Display all files in the database with names that match the specified pattern
mail address
Mail the output of the last command to address, which is normally your own email address
The following example uses both of these commands to interactively search for gated-R3_5_5.tar, and then mail the results of the search to craig@peanut.nuts.com.
# Bunyip Information Systems, Inc., 1993, 1994, 1995
archie> prog gated-R3_5_5.tar
# Search type: sub
# Your queue position: 1
# Estimated time for completion: 5 seconds
working O
Host ftp.zcu.cz (147.228.206.16)
Last updated 11:32 27 Jun 1997
Location: /pub/security/merit/gated
FILE -r r r 1460773 bytes Jan 1997 gated-R3_5_5.tar.gz
archie> mail craig@peanut.nuts.com
archie> quit
The archie output provides all of the information you need to initiate an anonymous FTP transfer:
● The name of the server (ftp.zcu.cz in our example)
● The directory on the server that contains the file (/pub/security/merit/gated in our example)
● The full name of the file (gated-R3_5_5.tar.gz in our example)
You can also use archie by sending email to archie at any one of the archie servers; for example,
archie@archie.internic.net The text of the mail message must contain a valid archie email command
file:///C|/mynapster/Downloads/warez/tcpip/ch13_03.htm (2 of 5) [2001-10-15 09:19:04]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Trang 11[Chapter 13] 13.3 Finding Files
To get a complete list of archie email commands, send mail containing the help command to one of
the servers In the example below, the email help file is requested from archie.internic.net.
Trang 12[Chapter 13] 13.3 Finding Files
Enter the name of the program you want to locate in the Search for: box and press the Searchbutton Your browser displays the search results with links directly to the file you're seeking For
example, assume we rerun the search for gated-R3_5_5.tar.gz using the
http://archie.bunyip.com/archie.html Web page The server returns a list of eight matches, the first of
which is the anonymous FTP server at ftp.zcu.cz The filename gated-R3_5_5.tar.gz that is displayed next to the FTP server is a link Clicking on the link transfers the file from ftp.zcu.cz to your system
Search and retrieval all in one interface!
While the Web browser provides the easiest interface to archie, some people prefer to run an archie client on their local system Using an archie client reduces the load on the servers and improves
responsiveness for the user If you believe you'll access archie very frequently, it might be worth setting up an archie client.
13.3.1.1 archie client software
archie client software is available via anonymous FTP from the ftp.bunyip.com server The software
is stored in the pub/archie/clients directory The README file in this directory provides a short
description of each type of client There are at least three different client software packages for UNIX:
an X windows client and two command-line clients, one written in C and the other written in Perl
Check the archie servers for the latest developments in client software.
This section uses the command-line archie client written in C as an example The C code and the
instruction to make the client are all contained in the c-archie-1.4.1.tar.gz file from ftp.bunyip.com
Once the client has been made and installed, it is invoked using the command:
% archie [options] string
The string is the name of the file that you are asking archie to find It can be the exact filename, a
substring of the name, or a regular expression
The options control how the string is interpreted The -e option searches for a filename that exactly
matches the string; the -s option matches on any record that contains the string as any part of the filename; and the -r option interprets the string as a UNIX regular expression when looking for
matches
The following example uses the archie client to search for sites from which the ppp software can be retrieved The search uses a regular expression that will match any compressed tar file with a name that starts with ppp.
file:///C|/mynapster/Downloads/warez/tcpip/ch13_03.htm (4 of 5) [2001-10-15 09:19:04]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Trang 13[Chapter 13] 13.3 Finding Files
% archie -r '^ppp.*\.tar\.Z' > ppp.locations
Our example stores archie's output in the file ppp.locations You can then examine ppp.locations to
find the closest FTP server that has the latest version of the ppp tar file Redirecting the output to a file is usually a good idea because archie often produces a lot of output By default, the archie client
will return as many as 95 matches to the search To limit the number of matches returned, use the
option -mn, where n is the maximum number of matches archie should return For example, -m5
limits the search to five matches
The archie database is frequently out-of-date or dominated by obscure FTP servers that have poor connectivity This limits its utility But sometimes archie is the only place you have to start your
search for a file
Previous: 13.2 Anonymous
FTP
TCP/IP Network Administration
Next: 13.4 Retrieving RFCs
[ Library Home | DNS & BIND | TCP/IP | sendmail | sendmail Reference | Firewalls | Practical Security ]
file:///C|/mynapster/Downloads/warez/tcpip/ch13_03.htm (5 of 5) [2001-10-15 09:19:04]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Trang 14[Chapter 13] 13.4 Retrieving RFCs
Internet Information Resources
Next: 13.5 Mailing Lists
of the RFC you want Figure 13.5 shows a network administrator scrolling through the index looking for RFC 1122
Figure 13.5: The RFC index
file:///C|/mynapster/Downloads/warez/tcpip/ch13_04.htm (1 of 4) [2001-10-15 09:19:05]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Trang 15[Chapter 13] 13.4 Retrieving RFCs
In another example the network administrator does not know which RFCs contain the information she
is looking for, but she knows what she wants The administrator is trying to find out more about the SMTP service extensions that have been proposed for Extended SMTP Figure 13.6 shows the four RFCs displayed as a result of her query
Figure 13.6: An RFC Web search
file:///C|/mynapster/Downloads/warez/tcpip/ch13_04.htm (2 of 4) [2001-10-15 09:19:05]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Trang 16[Chapter 13] 13.4 Retrieving RFCs
The Web provides the most popular and best method for browsing through RFCs However, if you know what you want, anonymous FTP can be a faster way to retrieve a specific document RFCs are
stored at ds.internic.net in the rfc directory It stores the RFCs with filenames in the form rfcnnnn.txt
or rfcnnnn.ps, where nnnn is the RFC number and txt or ps indicates whether the RFC is ASCII text or
PostScript To retrieve RFC 1122, ftp to ds.internic.net and enter get rfc/rfc1122.txt at the ftp>prompt This is generally a very quick way to get an RFC, if you know what you want
To help you find out which RFC you do want, get the rfc-index.txt file It is a complete index of all RFCs by RFC number, and it's available from ds.internic.net in the rfc directory You'll only need to
file:///C|/mynapster/Downloads/warez/tcpip/ch13_04.htm (3 of 4) [2001-10-15 09:19:05]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Trang 17[Chapter 13] 13.4 Retrieving RFCs
get a new RFC index occasionally Most of the time, the RFC you're looking for has been in
publication for some time and is already listed in the index Retrieve the RFC index and store it on your system Then search it for references to the RFCs you're interested in
13.4.1 Retrieving RFCs by mail
While anonymous FTP is the fastest way and the Web is the best way to get an RFC, they are not the only ways You can also obtain RFCs through electronic mail Electronic mail is available to many users who are denied direct access to Internet services because they are on a non-connected network
or are sitting behind a restrictive firewall Also, there are times when email provides sufficient service because you don't need the document quickly
Retrieve RFCs through email by sending mail to mailserv@ds.internic.net Leave the Subject: line
blank Request the RFC in the body of the email text, preceding the pathname of the RFC with the keyword FILE In this example, we request RFC 1258
Next: 13.5 Mailing Lists
[ Library Home | DNS & BIND | TCP/IP | sendmail | sendmail Reference | Firewalls | Practical Security ]
file:///C|/mynapster/Downloads/warez/tcpip/ch13_04.htm (4 of 4) [2001-10-15 09:19:05]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Trang 18[Chapter 13] 13.5 Mailing Lists
Previous: 13.4 Retrieving
RFCs
Chapter 13 Internet Information Resources
Next: 13.6 The White Pages
13.5 Mailing Lists
Mailing lists bring together people with similar interests to exchange information and ideas Most mailing lists run under usage guidelines that restricted discussion to a specific topic Mailing lists are often used as places to report problems and get solutions, or to receive announcements Some mailing lists are digests of newsgroups.
There is an enormous number of mailing lists The list-of-lists contains information about many of the
mailing lists that are of interest to network administrators [4] Use a Web browser to search for mailing lists that interest you at http://catalog.com/vivian/interest-group-search.html If you prefer, the list-of-lists can be
downloaded via anonymous FTP from nisc.sri.com in the file netinfo/interest-groups.txt and searched with
standard UNIX tools Either way, you get the same information The following example is the list-of-lists entry for the Berkeley Internet Name Domain (BIND) software mailing list:
[4] Despite its large size, not every network administration mailing list is contained in the
interest-groups.txt file You hear about some lists by word of mouth.
list If the list is manually maintained, as in the BIND example above, send your enrollment request to
listnamerequest@host where listname is the actual name of the list, and is followed by the literal string
-request The -request extension is widely used as the address for administrative requests, such as being
added to or dropped from a list, when lists are manually maintained For example, to join the BIND mailing
list, send your enrollment request to bind-request@uunet.uu.net All other correspondence is sent directly to bind@uunet.uu.net.
Many mailing lists automate list management with programs like majordomo and LISTSERV You can tell
file:///C|/mynapster/Downloads/warez/tcpip/ch13_05.htm (1 of 5) [2001-10-15 09:19:06]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Trang 19[Chapter 13] 13.5 Mailing Lists
the type of server being used by looking at the subscription address in the list-of-lists The user portion of that address will be either "majordomo" or "LISTSERV," depending on the server being used To subscribe
to a majordomo list, send email to the subscription address and type the following in the body of the
message:
subscribe list-address your-address
where list-address is the address of the email list, and your-address is your email address.
To subscribe to a LISTSERV mailing list, send email to the subscription address with the following in the message body:
subscribe list your-name
where list is the name of the list, not necessarily its address, as that name appears in the first line of its of-lists entry your-name is your first and last name This is not your email address LISTSERV takes your email address from the email headers.
Network news is delivered over TCP/IP networks using the Network News Transfer Protocol (NNTP)
NNTP is included as part of the TCP/IP protocol stack on most UNIX systems and requires no special
configuration The only thing you need to know to get started is the name of your closest network news server Ask your ISP Most ISPs provide network news as part of their basic service.
NNTP is a simple command/response protocol The NNTP server listens to port 119:
Connection closed by foreign host.
A help command sent to this server would have produced a list of 23 NNTP commands Luckily this is not
file:///C|/mynapster/Downloads/warez/tcpip/ch13_05.htm (2 of 5) [2001-10-15 09:19:06]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Trang 20[Chapter 13] 13.5 Mailing Lists
how you read network news You use a newsreader.
UNIX systems often include a news reader Our sample Linux system includes several different readers: nn,
rn, tin, and trn Your system may have anyone one of these or another newsreader See the appropriate
manpage for specific instructions on using a particular reader.
Regardless of the reader you have, they all have certain things in common They all provide a way to
subscribe to a news group, read articles from the group, and post your own articles to the group In this trn
example from our Linux system, the titles of the first 26 articles in the comp.os.linux.announce group are
listed To read an article, the user scrolls down to select the article and presses Enter All readers provide a similar interface.
comp.os.linux.announce 50 articles (moderated)
a root 1 Ringconnect
b Clark 1 NTLUG Meeting
d Dave 1 Caldera
e Martin 1 Linux Users Group Meeting
f Evan 1 COMDEX Canada
g Jimn 1 Salt Lake Linux Users Group
i Tyde 1 San Fransisco Linux users' group
j Andy 1 Worcester Linux Users' Group
l Bob 1 MELUG meeting
v Ted 1 Important notice
w Kamran 1 DIPC available
x Ken 1 Web site
y Cindy 1 CD-ROM available now!
z Bishop 1 C program documentation tool
Select threads (date order) Top 38% [>Z]
Our sample Solaris system doesn't include any news readers mentioned above But it doesn't matter News is supported in the Netscape Navigator Web browser Selecting Netscape News from the Windows menu in the Netscape browser opens a news reader Figure 13.7 shows us reading news from comp.os.linux.
Figure 13.7: Netscape news interface
file:///C|/mynapster/Downloads/warez/tcpip/ch13_05.htm (3 of 5) [2001-10-15 09:19:06]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Trang 21[Chapter 13] 13.5 Mailing Lists
There are many, many newsgroups Most of the newsgroups that are of interest to a network administrator
are found in the comp category comp.os contains sub-groups for various operating systems comp.unix lists groups for various flavors of UNIX comp.networks and comp.internet provide information about networks and the Internet comp.security and comp.virus provide security information.
There is a tremendous amount of dross in most news groups But if you need a question answered or
information on a specific topic, they can be invaluable.
file:///C|/mynapster/Downloads/warez/tcpip/ch13_05.htm (4 of 5) [2001-10-15 09:19:06]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Trang 22[Chapter 13] 13.5 Mailing Lists
Previous: 13.4 Retrieving
RFCs
TCP/IP Network Administration
Next: 13.6 The White Pages
[ Library Home | DNS & BIND | TCP/IP | sendmail | sendmail Reference | Firewalls | Practical Security ]
file:///C|/mynapster/Downloads/warez/tcpip/ch13_05.htm (5 of 5) [2001-10-15 09:19:06]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Trang 23[Chapter 13] 13.6 The White Pages
Internet Information Resources
Next: 13.7 Summary
13.6 The White Pages
archie helps you locate important programs The Web helps you retrieve important documents whois
helps you locate important people One of the most important pieces of information in a network is who is
in charge at the other end In Chapter 11, Troubleshooting TCP/IP , we pointed out that it is important to
know who is responsible for the other end of the link when troubleshooting a network problem whois is a
tool that helps you find this out
whois obtains the requested information from the Internet white pages The white pages is a database of
information about responsible people that is maintained by the InterNIC When you request an official
network number or domain name, you are asked to provide your NIC handle, which is the index of your
personal record in the white pages database If you don't have a handle, the InterNIC assigns you one and automatically registers you in the white pages Because of this, everyone who is responsible for an official network or domain has an entry in the white pages, and that entry can be retrieved by anyone who needs to contact them
Many UNIX systems provide a whois command to query the InterNIC white pages The general form of
this command is:
% whois [-h server] name
The name field is the information to be searched for in the white pages database The server field is the name of a system containing the white pages Use rs.internic.net to locate responsible people, which is the
default on most systems
In the following example, we search for an entry for Craig Hunt An individual's name is entered in the white pages as: last-name, first-name initial So we ask to search for Hunt, Craig [5]
[5] whois hunt would return several matches Be as specific as possible to reduce the
number of matches
% whois 'Hunt, Craig'
[rs.internic.net]
Hunt, Craig (CH999) info@foo.bar +1 (123) 555 6789
Hunt, Craig W (CWH3) Hunt@ENH.NIST.GOV (301) 975-3827
To single out one record, look it up with "!xxx", where xxx is the
file:///C|/mynapster/Downloads/warez/tcpip/ch13_06.htm (1 of 4) [2001-10-15 09:19:07]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Trang 24[Chapter 13] 13.6 The White Pages
handle, shown in parenthesis following the name, which comes first.The InterNIC Registration Services Host contains ONLY Internet
Information (Networks, ASN's, Domains, and POC's)
Please use the whois server at nic.ddn.mil for MILNET Information
If multiple matches are returned, as in this case, follow with a query for the individual's NIC handle to get the full information display To query for the NIC handle, which is the field enclosed in parentheses
directly following the username, simply enter the handle on the whois command line The message at the end of the sample output implies that handles are entered as !xxx This is not true The UNIX whois
command does not require the ! syntax For example, to get more details about CWH3, enter:
% whois cwh3
[rs.internic.net]
Hunt, Craig W (CWH3) Hunt@ENH.NIST.GOV
National Institute of Standards and Technology
Computer Systems and Communications Division
Technology Building, Room A151
Gaithersburg, MD 20899
(301) 975-3827 (FTS) 879-3827
Record last updated on 03-Dec-90
Database last updated on 15-Jul-97 04:35:06
User information is generally only useful if you know exactly who you want to send email to and you don't know his or her address The white pages database contains several other kinds of records, a few of which are very helpful for locating the people responsible for networks, domains, and hosts throughout the
Internet These record types are:
Provides general information about the specified host This record type is not as useful as the others
These record types can be used in the whois query to speed processing and limit the amount of output All
of the record types shown above can be abbreviated to their first two letters
A sample query for the domain ora.com produces the following results:
% whois 'do ora.com'
O'Reilly & Associates (ORA-DOM1)
101 Morris Street
file:///C|/mynapster/Downloads/warez/tcpip/ch13_06.htm (2 of 4) [2001-10-15 09:19:07]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Trang 25[Chapter 13] 13.6 The White Pages
Sebastopol, CA 95472
Domain Name: ORA.COM
Administrative Contact, Technical Contact, Zone Contact:
Pearce, Eric (EP86) eap@ORA.COM
707-829-0515 x221
Billing Contact:
Johnston, Rick (RJ724) rick@ORA.COM
707-829-0515 x331
Record last updated on 28-Jan-97
Record created on 14-Jun-89
Database last updated on 15-Jul-97 04:35:06 EDT
Domain servers in listed order:
NS.ORA.COM 207.25.97.8
NS.SONGLINE.COM 204.148.41.1
The query displays the name, address, and telephone number of the contacts for the domain, as well as a list of hosts providing authoritative name service for the domain
To query the host record for a specific host, in this case one of the name servers listed above, simply query
the desired hostname For example, to find out more about ns.songline.com, enter:
% whois 'host ns.songline.com'
[No name] (NS2441-HST)
Hostname: NS.SONGLINE.COM
Address: 204.148.41.1
System: Sun Sparc20 running Solaris 2.4
Record last updated on 21-Aug-95
Database last updated on 15-Jul-97 04:35:06 EDT
This query displays the hostname, IP address, and the system type: essentially the same information we could get from DNS
A much more interesting query is for the point of contact for a specific network To find out, enter a whois
query with the network number In our example, the IP address of one of the servers is 207.25.97.8 This is
a class C address, so the network number is 207.25.97.0 The query is constructed as shown in the example below: