From owner-svn-doc-all@FreeBSD.ORG Sun Feb 23 01:11:45 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 83599F76;
Sun, 23 Feb 2014 01:11:45 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 659891104;
Sun, 23 Feb 2014 01:11:45 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1N1BjMe047912;
Sun, 23 Feb 2014 01:11:45 GMT (envelope-from wblock@svn.freebsd.org)
Received: (from wblock@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1N1BjHr047911;
Sun, 23 Feb 2014 01:11:45 GMT (envelope-from wblock@svn.freebsd.org)
Message-Id: <201402230111.s1N1BjHr047911@svn.freebsd.org>
From: Warren Block
Date: Sun, 23 Feb 2014 01:11:45 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44033 - head/en_US.ISO8859-1/htdocs/docs
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Sun, 23 Feb 2014 01:11:45 -0000
Author: wblock
Date: Sun Feb 23 01:11:45 2014
New Revision: 44033
URL: http://svnweb.freebsd.org/changeset/doc/44033
Log:
Whitespace-only cleanup, translators please ignore.
Modified:
head/en_US.ISO8859-1/htdocs/docs/books.xml
Modified: head/en_US.ISO8859-1/htdocs/docs/books.xml
==============================================================================
--- head/en_US.ISO8859-1/htdocs/docs/books.xml Sun Feb 23 00:32:00 2014 (r44032)
+++ head/en_US.ISO8859-1/htdocs/docs/books.xml Sun Feb 23 01:11:45 2014 (r44033)
@@ -8,331 +8,330 @@
]>
-
- &title;
+
+ &title;
- $FreeBSD$
-
+ $FreeBSD$
+
-
+
-
On this site
-
-
All the documentation on this site can be downloaded in a variety of
- different formats (HTML, Postscript, PDF, and more) and compression
- schemes (BZip2, Zip) from the FreeBSD FTP site.
-
-
Archived copies of the &os; documentation (articles,
- books, and textinfo manuals) are also available online at
- http://docs.FreeBSD.org/doc/.
-
-
This documentation is provided and maintained by the FreeBSD Documentation Project, and we are
- always looking for people to contribute new documentation and maintain
- existing documentation.
The FreeBSD FAQ
- (faq)
- Frequently Asked Questions, and answers, covering all
- aspects of FreeBSD.
-
-
The FreeBSD Handbook
- (handbook)
- A constantly evolving, comprehensive resource for FreeBSD
- users.
-
-
The
- FreeBSD Developers' Handbook (developers-handbook)
- For people who want to develop software for FreeBSD (and not
- just people who are developing FreeBSD itself).
-
-
The
- FreeBSD Architecture Handbook (arch-handbook)
- For FreeBSD system developers. This book covers the
- architectural details of many important FreeBSD kernel
- subsystems.
-
-
The Porter's
- Handbook (porters-handbook)
- Essential reading if you plan on providing a port of a third
- party piece of software.
-
-
The PMake Tutorial
- (pmake)
- A tutorial for the make utility. This book is essential
- reading for anyone who wants to understand all the details of using
- make of reading and writing makefiles.
Explaining
- BSD (explaining-bsd)
- An answer to the question ``What is BSD?''
-
-
FreeBSD
- From Scratch (fbsd-from-scratch)
- How to automatically compile, install and configure a system from
- scratch (i.e. to an empty file system), including your favorite
- ports.
-
-
Filtering
- Bridges (filtering-bridges)
- Configuring firewalls and filtering on FreeBSD hosts acting as
- bridges rather than routers.
-
-
Fonts and
- FreeBSD (fonts)
- A description of the various font technologies in FreeBSD, and
- how to use them with different programs.
Build
- Your Own FreeBSD Update Server
- (freebsd-update-server)
- Using a FreeBSD Update server allows a system
- administrator to perform fast updates for a number of
- machines from a local mirror.
-
-
Writing
- a GEOM Class (geom-class)
- A guide to GEOM internals, and writing your own class.
An MH Primer
- (mh)
- An introduction to using the MH mail reader on
- FreeBSD.
-
-
Introduction
- to NanoBSD (nanobsd)
- Information about the NanoBSD tools, which can be used to
- create FreeBSD system images for embedded applications,
- suitable for use on a Compact Flash card (or other mass
- storage medium).
-
-
FreeBSD
- First Steps (new-users)
- For people coming to FreeBSD and &unix; for the first
- time.
-
-
Perforce
- in FreeBSD Development (p4-primer)
- A guide to the Perforce version control system. It also
- describes how to manage experimental projects with the
- FreeBSD Perforce server.
- Port Mentor Guidelines (port-mentor-guidelines)
- Guidelines for new and/or potential port mentors and
- mentees.
-
-
Package
- building procedures (portbuild)
- Describes the approach used by the FreeBSD port
- manager team to regularly build ports into packages.
- It describes the portbuild cluster, as well as the tools
- needed to do incremental, experimental, and official release
- package builds.
FreeBSD as
- a greylist mail server (relaydelay)
- Implementing a greylist mail server on FreeBSD
- using Sendmail, MySQL, Perl and the relaydelay
- software. This is an excellent method to use in the
- fight against spam.
-
-
FreeBSD
- Release Engineering (releng)
- Describes the approach used by the FreeBSD release
- engineering team to make production quality releases of the
- FreeBSD Operating System. It describes the tools available
- for those interested in producing customized FreeBSD releases
- for corporate rollouts or commercial productization.
-
-
FreeBSD
- Release Engineering for Third Party Packages
- (releng-packages)
- Describes the approach used by the FreeBSD
- ports management team to produce a high quality package set
- suitable for official FreeBSD release media. This document is
- a work in progress, but eventually it will cover the process
- used to build a clean package set on the FreeBSD.org "Ports
- Cluster", how to configure any other set of machines as a
- ports cluster, how to split up the packages for the release
- media, and how to verify that a package set is
- consistent.
All the documentation on this site can be downloaded in a
+ variety of different formats (HTML, Postscript, PDF, and more)
+ and compression schemes (BZip2, Zip) from the FreeBSD FTP
+ site.
+
+
Archived copies of the &os; documentation (articles, books, and
+ textinfo manuals) are also available online at http://docs.FreeBSD.org/doc/.
+
+
This documentation is provided and maintained by the
+ FreeBSD
+ Documentation Project, and we are always looking for
+ people to contribute new documentation and maintain existing
+ documentation.
The FreeBSD FAQ
+ (faq)
+ Frequently Asked Questions, and answers, covering all aspects of
+ FreeBSD.
+
+
The FreeBSD
+ Handbook (handbook)
+ A constantly evolving, comprehensive resource for FreeBSD
+ users.
+
+
The
+ FreeBSD Developers' Handbook (developers-handbook)
+
+ For people who want to develop software for FreeBSD (and not
+ just people who are developing FreeBSD itself).
+
+
The FreeBSD
+ Architecture Handbook (arch-handbook)
+ For FreeBSD system developers. This book covers the
+ architectural details of many important FreeBSD kernel
+ subsystems.
+
+
The Porter's
+ Handbook (porters-handbook)
+ Essential reading if you plan on providing a port of a third
+ party piece of software.
+
+
The PMake Tutorial
+ (pmake)
+ A tutorial for the make utility. This book is
+ essential reading for anyone who wants to understand all the
+ details of using make of reading and writing
+ makefiles.
Explaining
+ BSD (explaining-bsd)
+ An answer to the question ``What is BSD?''
+
+
FreeBSD
+ From Scratch (fbsd-from-scratch)
+ How to automatically compile, install and configure a system
+ from scratch (i.e. to an empty file system), including your
+ favorite ports.
+
+
Filtering
+ Bridges (filtering-bridges)
+ Configuring firewalls and filtering on FreeBSD hosts acting as
+ bridges rather than routers.
+
+
Fonts and FreeBSD
+ (fonts)
+ A description of the various font technologies in FreeBSD, and
+ how to use them with different programs.
Build
+ Your Own FreeBSD Update Server
+ (freebsd-update-server)
+ Using a FreeBSD Update server allows a system administrator to
+ perform fast updates for a number of machines from a local
+ mirror.
+
+
Writing a GEOM
+ Class (geom-class)
+ A guide to GEOM internals, and writing your own class.
An MH Primer
+ (mh)
+ An introduction to using the MH mail reader on FreeBSD.
+
+
Introduction to
+ NanoBSD (nanobsd)
+ Information about the NanoBSD tools, which can be used to create
+ FreeBSD system images for embedded applications, suitable for
+ use on a Compact Flash card (or other mass storage medium).
+
+
FreeBSD First
+ Steps (new-users)
+ For people coming to FreeBSD and &unix; for the first time.
+
+
Perforce in
+ FreeBSD Development (p4-primer)
+ A guide to the Perforce version control system. It also
+ describes how to manage experimental projects with the FreeBSD
+ Perforce server.
Port
+ Mentor Guidelines (port-mentor-guidelines)
+ Guidelines for new and/or potential port mentors and
+ mentees.
+
+
Package building
+ procedures (portbuild)
+ Describes the approach used by the FreeBSD port manager team to
+ regularly build ports into packages. It describes the portbuild
+ cluster, as well as the tools needed to do incremental,
+ experimental, and official release package builds.
FreeBSD as a
+ greylist mail server (relaydelay)
+ Implementing a greylist mail server on FreeBSD using Sendmail,
+ MySQL, Perl and the relaydelay software. This is an excellent
+ method to use in the fight against spam.
+
+
FreeBSD Release
+ Engineering (releng)
+ Describes the approach used by the FreeBSD release engineering
+ team to make production quality releases of the FreeBSD
+ Operating System. It describes the tools available for those
+ interested in producing customized FreeBSD releases for
+ corporate rollouts or commercial productization.
+
+
FreeBSD
+ Release Engineering for Third Party Packages
+ (releng-packages)
+ Describes the approach used by the FreeBSD ports management team
+ to produce a high quality package set suitable for official
+ FreeBSD release media. This document is a work in progress, but
+ eventually it will cover the process used to build a clean
+ package set on the FreeBSD.org "Ports Cluster", how to configure
+ any other set of machines as a ports cluster, how to split up
+ the packages for the release media, and how to verify that a
+ package set is consistent.
+ href="http://www.ruc.dk/~nielsj/research/publications/freebsd.pdf">``Putting
+ it All in the Trunk, Incremental Software Development in
+ the FreeBSD Open Source Project'' [Information Systems
+ Journal (2001) 11, 321-336].
-
Kirk McKusick, one
- of the original architects of BSD at U.C. Berkeley, teaches two 4.4BSD Kernel
- Internals courses using FreeBSD. For those unable to attend
- the courses in person, a video tape series is also now
- available.
+
Kirk McKusick,
+ one of the original architects of BSD at U.C. Berkeley,
+ teaches two
+ 4.4BSD Kernel
+ Internals courses using FreeBSD. For those unable to
+ attend the courses in person, a video tape series is also
+ now available.
-
FreeBSD How-To's for
- the Lazy and Hopeless is another somewhat more light-hearted
- attempt to provide more readable "how-to" style information on
- setting up and configuring FreeBSD.
+
FreeBSD
+ How-To's for the Lazy and Hopeless is another somewhat
+ more light-hearted attempt to provide more readable "how-to"
+ style information on setting up and configuring FreeBSD.
The
- Linux+FreeBSD mini-HOWTO describes how to use
- Linux and FreeBSD on the same system. It introduces FreeBSD and
- discusses how the two operating systems can cooperate, e.g. by
- sharing swap space.
+ Linux+FreeBSD mini-HOWTO describes how to use Linux
+ and FreeBSD on the same system. It introduces FreeBSD and
+ discusses how the two operating systems can cooperate, e.g.
+ by sharing swap space.
The
- SMP support page contains information on the SMP support
- in FreeBSD 4.X and earlier.
+
The
+ SMP support page contains information on the SMP
+ support in FreeBSD 4.X and earlier.
-
Appendix A from the college textbook
- Operating Systems Concepts by Silberschatz, Galvin and
- Gagne has been made available online in
- PDF format.
- The appendix is dedicated to FreeBSD and offers a good
- introduction to FreeBSD's internals.
+
Appendix A from the college textbook
+ Operating Systems Concepts by Silberschatz, Galvin
+ and Gagne has been made available online in PDF
+ format. The appendix is dedicated to FreeBSD and
+ offers a good introduction to FreeBSD's internals.
-
-
-
-
-
+
+
From owner-svn-doc-all@FreeBSD.ORG Sun Feb 23 04:51:32 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id EFBB5448;
Sun, 23 Feb 2014 04:51:31 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id CB9C91714;
Sun, 23 Feb 2014 04:51:31 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1N4pV9V036726;
Sun, 23 Feb 2014 04:51:31 GMT (envelope-from ryusuke@svn.freebsd.org)
Received: (from ryusuke@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1N4pVTl036724;
Sun, 23 Feb 2014 04:51:31 GMT (envelope-from ryusuke@svn.freebsd.org)
Message-Id: <201402230451.s1N4pVTl036724@svn.freebsd.org>
From: Ryusuke SUZUKI
Date: Sun, 23 Feb 2014 04:51:31 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44034 - in head/ja_JP.eucJP/books/handbook: cutting-edge
ports
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Sun, 23 Feb 2014 04:51:32 -0000
Author: ryusuke
Date: Sun Feb 23 04:51:31 2014
New Revision: 44034
URL: http://svnweb.freebsd.org/changeset/doc/44034
Log:
- Merge the following from the English version:
r43769 -> r43773 head/ja_JP.eucJP/books/handbook/cutting-edge/chapter.xml
- Comment out the link to updating-upgrading-portsnap.
head/ja_JP.eucJP/books/handbook/ports/chapter.xml
Modified:
head/ja_JP.eucJP/books/handbook/cutting-edge/chapter.xml
head/ja_JP.eucJP/books/handbook/ports/chapter.xml
Modified: head/ja_JP.eucJP/books/handbook/cutting-edge/chapter.xml
==============================================================================
--- head/ja_JP.eucJP/books/handbook/cutting-edge/chapter.xml Sun Feb 23 01:11:45 2014 (r44033)
+++ head/ja_JP.eucJP/books/handbook/cutting-edge/chapter.xml Sun Feb 23 04:51:31 2014 (r44034)
@@ -3,7 +3,7 @@
The FreeBSD Documentation Project
The FreeBSD Japanese Documentation Project
- Original revision: r43769
+ Original revision: r43773
$FreeBSD$
-->
- システムと Ports Collection
- のアップデートに用いるユーティリティについて
-
-
- freebsd-update,
Subversion もしくは
CTM
@@ -719,109 +714,6 @@ before running "/usr/sbin/freebsd-update
-
-
- Portsnap: Ports Collection アップデートツール
-
-
-
-
- Tom
- Rhodes
-
- 寄稿:
-
-
-
-
-
-
- Colin
- Percival
-
- ベースとなったノートの提供:
-
-
-
-
-
- アップデートとアップグレード
-
-
- Portsnap
- アップデートとアップグレード
-
-
- &os; のベースシステムには、
- Ports Collection をアップデートする &man.portsnap.8; があります。
- このユーティリティは、&os; のサイトに接続し、セキュリティキーを検証し、
- Ports Collection の最新版をダウンロードします。
- セキュリティキーは、
- ダウンロードしたすべてのファイルの検証に用いられます。
- 最新の Ports Collection ファイルをダウンロードするには、
- 以下のコマンドを実行してください。
-
- &prompt.root; portsnap fetch
-Looking up portsnap.FreeBSD.org mirrors... 9 mirrors found.
-Fetching snapshot tag from geodns-1.portsnap.freebsd.org... done.
-Fetching snapshot metadata... done.
-Updating from Tue May 22 02:12:15 CEST 2012 to Wed May 23 16:28:31 CEST 2012.
-Fetching 3 metadata patches.. done.
-Applying metadata patches... done.
-Fetching 3 metadata files... done.
-Fetching 90 patches.....10....20....30....40....50....60....70....80....90. done.
-Applying patches... done.
-Fetching 133 new ports or files... done.
-
- この例では、&man.portsnap.8;
- が現在の ports に対するパッチを見つけ、検証したことを示しています。
- また、ユーティリティは以前に実行していることも示しています。
- もし初めて実行したのであれば、Ports Collection のダウンロードのみが行われます。
-
- &man.portsnap.8; が fetch に成功すると、
- 検証を通った Ports Collection と、
- それに続くパッチがローカルシステムに存在します。
- はじめて portsnap を実行した時には、
- extract を使って、
- ダウンロードしたファイルをインストールしてください。
-
- &prompt.root; portsnap extract
-/usr/ports/.cvsignore
-/usr/ports/CHANGES
-/usr/ports/COPYRIGHT
-/usr/ports/GIDs
-/usr/ports/KNOBS
-/usr/ports/LEGAL
-/usr/ports/MOVED
-/usr/ports/Makefile
-/usr/ports/Mk/bsd.apache.mk
-/usr/ports/Mk/bsd.autotools.mk
-/usr/ports/Mk/bsd.cmake.mk
-...
-
- すでにインストールされている Ports Collection
- をアップデートするには、
- portsnap update を使ってください。
-
- &prompt.root; portsnap update
-
- これでアップデートプロセスは完了しました。
- 更新された Ports Collection を使って、
- アプリケーションをインストールしたり、
- アップグレードできます。
-
- fetch を使う場合には、
- extract および update
- を連続して行うことができます。
-
- &prompt.root; portsnap fetch update
-
- このコマンドにより最新の
- Ports Collection がダウンロードされ、
- /usr/ports
- 以下にあるローカルの Ports Collection がアップデートされます。
-
-
ドキュメントのアップデート
Modified: head/ja_JP.eucJP/books/handbook/ports/chapter.xml
==============================================================================
--- head/ja_JP.eucJP/books/handbook/ports/chapter.xml Sun Feb 23 01:11:45 2014 (r44033)
+++ head/ja_JP.eucJP/books/handbook/ports/chapter.xml Sun Feb 23 04:51:31 2014 (r44034)
@@ -1213,11 +1213,11 @@ Deinstalling ca_root_nss-3.13.5... done<
- Portsnap の詳細と、
+
From owner-svn-doc-all@FreeBSD.ORG Sun Feb 23 12:18:17 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 96DE7618;
Sun, 23 Feb 2014 12:18:17 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 8113916C7;
Sun, 23 Feb 2014 12:18:17 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1NCIH4L013044;
Sun, 23 Feb 2014 12:18:17 GMT (envelope-from ryusuke@svn.freebsd.org)
Received: (from ryusuke@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1NCIHkP013043;
Sun, 23 Feb 2014 12:18:17 GMT (envelope-from ryusuke@svn.freebsd.org)
Message-Id: <201402231218.s1NCIHkP013043@svn.freebsd.org>
From: Ryusuke SUZUKI
Date: Sun, 23 Feb 2014 12:18:17 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44035 - head/ja_JP.eucJP/htdocs/docs
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Sun, 23 Feb 2014 12:18:17 -0000
Author: ryusuke
Date: Sun Feb 23 12:18:17 2014
New Revision: 44035
URL: http://svnweb.freebsd.org/changeset/doc/44035
Log:
- Merge the following from the English version:
r44031 -> r44033 head/ja_JP.eucJP/htdocs/docs/books.xml
Modified:
head/ja_JP.eucJP/htdocs/docs/books.xml
Modified: head/ja_JP.eucJP/htdocs/docs/books.xml
==============================================================================
--- head/ja_JP.eucJP/htdocs/docs/books.xml Sun Feb 23 04:51:31 2014 (r44034)
+++ head/ja_JP.eucJP/htdocs/docs/books.xml Sun Feb 23 12:18:17 2014 (r44035)
@@ -9,325 +9,319 @@
]>
-
+
-
- &title;
+
+ &title;
- $FreeBSD$
-
+ $FreeBSD$
+
-
+
-
+ href="http://www.ruc.dk/~nielsj/research/publications/freebsd.pdf">``Putting
+ it All in the Trunk, Incremental Software Development in
+ the FreeBSD Open Source Project'' [Information Systems
+ Journal (2001) 11, 321-336] を書きました。
-
-
-
-
-
+
+
From owner-svn-doc-all@FreeBSD.ORG Sun Feb 23 12:37:33 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 1CE95707;
Sun, 23 Feb 2014 12:37:33 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id ED9C2185D;
Sun, 23 Feb 2014 12:37:32 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1NCbWEK022072;
Sun, 23 Feb 2014 12:37:32 GMT (envelope-from ryusuke@svn.freebsd.org)
Received: (from ryusuke@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1NCbW1K022071;
Sun, 23 Feb 2014 12:37:32 GMT (envelope-from ryusuke@svn.freebsd.org)
Message-Id: <201402231237.s1NCbW1K022071@svn.freebsd.org>
From: Ryusuke SUZUKI
Date: Sun, 23 Feb 2014 12:37:32 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44036 - head/ja_JP.eucJP/books/handbook/cutting-edge
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Sun, 23 Feb 2014 12:37:33 -0000
Author: ryusuke
Date: Sun Feb 23 12:37:32 2014
New Revision: 44036
URL: http://svnweb.freebsd.org/changeset/doc/44036
Log:
- Merge the following from the English version:
r43773 -> r43778 head/ja_JP.eucJP/books/handbook/cutting-edge/chapter.xml
Modified:
head/ja_JP.eucJP/books/handbook/cutting-edge/chapter.xml
Modified: head/ja_JP.eucJP/books/handbook/cutting-edge/chapter.xml
==============================================================================
--- head/ja_JP.eucJP/books/handbook/cutting-edge/chapter.xml Sun Feb 23 12:18:17 2014 (r44035)
+++ head/ja_JP.eucJP/books/handbook/cutting-edge/chapter.xml Sun Feb 23 12:37:32 2014 (r44036)
@@ -3,7 +3,7 @@
The FreeBSD Documentation Project
The FreeBSD Japanese Documentation Project
- Original revision: r43773
+ Original revision: r43778
$FreeBSD$
-->
-STABLE&os; には二つの開発ブランチがあります。
- それは &os.current; と &os.stable; です。
- この章ではそれぞれについて説明し、
- どのようにしてシステムの対応するツリーを最新の状態に保つかについて説明します。
+ それは &os.current; と &os.stable; です。
+
+ この節ではそれぞれについて説明し、
+ どのようにしてシステムの対応するブランチを最新の状態に保つかについて説明します。
まずは &os.current;、次に &os.stable; について説明します。訳: &a.hanai;、1996 年 11 月 6 日
- 最新の &os; を追いかける
+ &os.current; を使う&os.current; とは &os; の開発の 最前線 です。
&os.current; のユーザは高い技術力を持つことが要求され、
@@ -1167,9 +1168,6 @@ before running "/usr/sbin/freebsd-update
もし &os; を使い始めたばかりなら、
これを運用することについて十分検討を重ねた方が良いでしょう。
-
- &os.current; ってなに?
-
&os.current; は &os; の最新のソースコードです。
中には現在開発途上のソフトウェア、
実験的な変更、あるいは過渡的な機能などが含まれています。
@@ -1181,10 +1179,6 @@ before running "/usr/sbin/freebsd-update
&os.current; が不幸をもたらすか、
それとも非常に素晴らしい機能をもたらすかは、
まさにソースコードを同期した瞬間によるのです!
-
-
-
- 誰が &os.current; を必要としてるの?&os.current; は、
次の 3 つの重要なグループを対象としています。
@@ -1214,11 +1208,9 @@ before running "/usr/sbin/freebsd-update
時々コメントやコードを寄稿してくれます。
-
-
- &os.current;
- に期待してはいけないことは?
+ &os.current;
+ に期待してはいけないことは?
@@ -1238,10 +1230,6 @@ before running "/usr/sbin/freebsd-update
公式のサポート はありません。
-
-
-
- &os.current; を使う
@@ -1345,18 +1333,13 @@ before running "/usr/sbin/freebsd-update
コードを伴う提案はもっとも歓迎されるものです!
-
- 安定版の &os; を使う
+ &os.stable; を使う訳: &a.jp.iwasaki;
-
- &os.stable; ってなに?
- -STABLE
-
&os.stable; とは定期的に公開されるリリースを作成するための開発ブランチです。
このブランチに加えられる変更は原則として、
事前に &os.current; で試験ずみであるという特徴があります。
@@ -1366,10 +1349,6 @@ before running "/usr/sbin/freebsd-update
どんな場合にも使えるものであるとは限らないということです。
このブランチはもう一つの開発の流れというだけであって、
エンドユーザ向けのものではありません。
-
-
-
- 誰が &os.stable; を必要としているの?FreeBSD の開発プロセスに興味があったり、
それに対する貢献を考えていて、特にそれが次回の
@@ -1406,10 +1385,6 @@ before running "/usr/sbin/freebsd-update
もし試験をする資源的な余裕がない場合は、
リリース間のバイナリアップデート機能を利用して、
最新の FreeBSD リリースを使うことを推奨します。
-
-
-
- &os.stable; を使う-STABLE
@@ -1511,7 +1486,6 @@ before running "/usr/sbin/freebsd-update
ときどき必要となる既存システムからの新システムの構築手順についての最新情報を得てください。
-
From owner-svn-doc-all@FreeBSD.ORG Sun Feb 23 16:11:37 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 545CAF04;
Sun, 23 Feb 2014 16:11:37 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 3CD411B2C;
Sun, 23 Feb 2014 16:11:37 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1NGBbZb012488;
Sun, 23 Feb 2014 16:11:37 GMT (envelope-from dru@svn.freebsd.org)
Received: (from dru@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1NGBbd5012487;
Sun, 23 Feb 2014 16:11:37 GMT (envelope-from dru@svn.freebsd.org)
Message-Id: <201402231611.s1NGBbd5012487@svn.freebsd.org>
From: Dru Lavigne
Date: Sun, 23 Feb 2014 16:11:37 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44037 - head/en_US.ISO8859-1/books/handbook/firewalls
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Sun, 23 Feb 2014 16:11:37 -0000
Author: dru
Date: Sun Feb 23 16:11:36 2014
New Revision: 44037
URL: http://svnweb.freebsd.org/changeset/doc/44037
Log:
Initial shuffle to improve flow of IPF NAT section.
Next commit will review actual content.
Sponsored by: iXsystems
Modified:
head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Sun Feb 23 12:37:32 2014 (r44036)
+++ head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Sun Feb 23 16:11:36 2014 (r44037)
@@ -226,6 +226,40 @@
advanced matching abilities capable of defending against the
flood of different attack methods employed by attackers.
+ NAT stands for Network
+ Address Translation.
+ NAT function enables the private LAN behind
+ the firewall to share a single ISP-assigned IP address, even
+ if that address is dynamically assigned. NAT allows each
+ computer in the LAN to have Internet access, without
+ having to pay the ISP for multiple Internet accounts or IP
+ addresses.
+
+ NAT will automatically translate the
+ private LAN IP address for each system on the LAN to the
+ single public IP address as packets exit the firewall bound
+ for the public Internet. It also performs the reverse
+ translation for returning packets.
+
+ According to RFC 1918, the following IP address ranges are
+ reserved for private networks which will never be routed
+ directly to the public Internet, and therefore are available
+ for use with NAT:
+
+
+
+ 10.0.0.0/8.
+
+
+
+ 172.16.0.0/12.
+
+
+
+ 192.168.0.0/16.
+
+
+
When working with the firewall rules, be very
careful. Some configurations can
@@ -2158,117 +2192,6 @@ pass in quick on dc0 proto tcp from any
block in log first quick on dc0 all
-
- Building the Rule Script with Symbolic
- Substitution
-
- Some experienced IPF users create a file containing the
- rules and code them in a manner compatible with running them
- as a script with symbolic substitution. The major benefit
- of doing this is that only the value associated with the
- symbolic name needs to be changed, and when the script is
- run all the rules containing the symbolic name will have the
- value substituted in the rules. Being a script, symbolic
- substitution can be used to code frequently used values and
- substitute them in multiple rules. This can be seen in the
- following example.
-
- The script syntax used here is compatible with the
- &man.sh.1;, &man.csh.1;, and &man.tcsh.1; shells.
-
- Symbolic substitution fields are prefixed with a
- $.
-
- Symbolic fields do not have the $ prefix.
-
- The value to populate the symbolic field must be enclosed
- between double quotes (").
-
- Start the rule file with something like this:
-
- ############# Start of IPF rules script ########################
-
-oif="dc0" # name of the outbound interface
-odns="192.0.2.11" # ISP's DNS server IP address
-myip="192.0.2.7" # my static IP address from ISP
-ks="keep state"
-fks="flags S keep state"
-
-# You can choose between building /etc/ipf.rules file
-# from this script or running this script "as is".
-#
-# Uncomment only one line and comment out another.
-#
-# 1) This can be used for building /etc/ipf.rules:
-#cat > /etc/ipf.rules << EOF
-#
-# 2) This can be used to run script "as is":
-/sbin/ipf -Fa -f - << EOF
-
-# Allow out access to my ISP's Domain name server.
-pass out quick on $oif proto tcp from any to $odns port = 53 $fks
-pass out quick on $oif proto udp from any to $odns port = 53 $ks
-
-# Allow out non-secure standard www function
-pass out quick on $oif proto tcp from $myip to any port = 80 $fks
-
-# Allow out secure www function https over TLS SSL
-pass out quick on $oif proto tcp from $myip to any port = 443 $fks
-EOF
-################## End of IPF rules script ########################
-
- The rules are not important in this example as it instead
- focuses on how the symbolic substitution fields are populated.
- If this example was in a file named
- /etc/ipf.rules.script, these rules could
- be reloaded by running:
-
- &prompt.root; sh /etc/ipf.rules.script
-
- There is one problem with using a rules file with embedded
- symbolics: IPF does not understand symbolic substitution, and
- cannot read such scripts directly.
-
- This script can be used in one of two ways:
-
-
-
- Uncomment the line that begins with
- cat, and comment out the line that
- begins with /sbin/ipf. Place
- ipfilter_enable="YES" into
- /etc/rc.conf, and run the script
- once after each modification to create or update
- /etc/ipf.rules.
-
-
-
- Disable IPFILTER in the
- system startup scripts by adding
- ipfilter_enable="NO"to
- /etc/rc.conf.
-
- Then, add a script like the following to
- /usr/local/etc/rc.d/. The script
- should have an obvious name like
- ipf.loadrules.sh, where the
- .sh extension is mandatory.
-
- #!/bin/sh
-sh /etc/ipf.rules.script
-
- The permissions on this script file must be read,
- write, execute for owner
- root:
-
- &prompt.root; chmod 700 /usr/local/etc/rc.d/ipf.loadrules.sh
-
-
-
- Now, when the system boots, the IPF rules will be
- loaded.
-
-
Configuring NAT
@@ -2286,144 +2209,57 @@ sh /etc/ipf.rules.scriptNAT
- NAT stands for Network
- Address Translation. The IPF
- NAT function enables the private LAN behind
- the firewall to share a single ISP-assigned IP address, even
- if that address is dynamically assigned. NAT allows each
- computer in the LAN to have Internet access, without
- having to pay the ISP for multiple Internet accounts or IP
- addresses.
-
- In IPF, when a packet arrives at the firewall from the LAN
- with a public destination, it passes through the outbound
- filter rules. NAT gets its turn at the
- packet and applies its rules top down, where the first
- matching rule wins. NAT tests each of its
- rules against the packet's interface name and source IP
- address. When a packet's interface name matches a
- NAT rule, the packet's source IP address in
- the private LAN is checked to see if it falls within the IP
- address range specified to the left of the arrow symbol on the
- NAT rule. On a match, the packet has its
- source IP address rewritten with the public IP address
- obtained by the 0/32 keyword.
- NAT posts an entry in its internal
- NAT table so when the packet returns from
- the public Internet it can be mapped back to its original
- private IP address and then passed to the filter rules for
- processing.
-
- NAT will automatically translate the
- private LAN IP address for each system on the LAN to the
- single public IP address as packets exit the firewall bound
- for the public Internet. It also performs the reverse
- translation for returning packets.
-
- According to RFC 1918, the following IP address ranges are
- reserved for private networks which will never be routed
- directly to the public Internet, and therefore are available
- for use with NAT:
-
-
-
- 10.0.0.0/8.
-
-
-
- 172.16.0.0/12.
-
-
-
- 192.168.0.0/16.
-
-
-
ipnat
- To enable IPNAT, add these statements
- to /etc/rc.conf.
-
- To enable the machine to route traffic between
- interfaces:
-
- gateway_enable="YES"
-
- To start IPNAT automatically each
- time:
-
- ipnat_enable="YES"
-
- To specify where to load the IPNAT
- rules from:
-
- ipnat_rules="/etc/ipnat.rules"
-
- NAT rules are loaded using
- ipnat. Typically, the
- NAT rules are stored in
- /etc/ipnat.rules. See &man.ipnat.8; for
- details.
-
- When the file containing the NAT rules
- is edited after NAT has been started, run
- ipnat with to delete
- the internal in use NAT rules and flush the
- contents of the translation table of all active
- entries.
-
- To reload the NAT rules, issue a
- command like this:
-
- &prompt.root; ipnat -CF -f
- /etc/ipnat.rules
-
- To display some NAT statistics, use
- this command:
-
- &prompt.root; ipnat -s
-
- To list the NAT table's current
- mappings, use this command:
-
- &prompt.root; ipnat -l
-
- To turn verbose mode on and display information relating
- to rule processing and active rules/table entries:
-
- &prompt.root; ipnat -v
+ To enable NAT, add these statements
+ to /etc/rc.conf and specify the name of
+ the file containing the NAT rules:
+
+ gateway_enable="YES"
+ipnat_enable="YES"
+ipnat_rules="/etc/ipnat.rules"NAT rules are flexible and can
accomplish many different things to fit the needs of
- commercial and home users.
-
- The rule syntax presented here has been simplified to
- what is most commonly used in a non-commercial environment.
+ commercial and home users. The rule syntax presented here has been simplified to
+ demonstrate common usage.
For a complete rule syntax description, refer to
&man.ipnat.5;.The syntax for a NAT rule looks like
- this:
+ this, where map starts the rule and
+ IF should be replaced with the
+ name of the external
+ interface:map IFLAN_IP_RANGE -> PUBLIC_ADDRESS
- The keyword map starts the rule.
-
- Replace IF with the external
- interface.
-
The LAN_IP_RANGE is used by the
internal clients use for IP Addressing. Usually, this is
something like 192.168.1.0/24.
-
- The PUBLIC_ADDRESS can either
+ class="ipaddress">192.168.1.0/24. The PUBLIC_ADDRESS can either
be the static external IP address or the special keyword
0/32 which uses the IP address assigned to
IF.
-
- NAT for a Large LAN
+ In IPF, when a packet arrives at the firewall from the LAN
+ with a public destination, it passes through the outbound
+ filter rules. NAT gets its turn at the
+ packet and applies its rules top down, where the first
+ matching rule wins. NAT tests each of its
+ rules against the packet's interface name and source IP
+ address. When a packet's interface name matches a
+ NAT rule, the packet's source IP address in
+ the private LAN is checked to see if it falls within the IP
+ address range specified to the left of the arrow symbol on the
+ NAT rule. On a match, the packet has its
+ source IP address rewritten with the public IP address
+ obtained by the 0/32 keyword.
+ NAT posts an entry in its internal
+ NAT table so when the packet returns from
+ the public Internet it can be mapped back to its original
+ private IP address and then passed to the filter rules for
+ processing.For networks that have large numbers of systems on the
LAN or networks with more than a single LAN, the process of
@@ -2476,16 +2312,12 @@ sh /etc/ipf.rules.scriptor using CIDR notation:map dc0 192.168.1.0/24 -> 204.134.75.0/24
-
-
-
- Port RedirectionA common practice is to have a web server, email server,
database server, and DNS server each segregated to a
different system on the LAN. In this case, the traffic from
these servers still has to undergo NAT,
- but there has to be some way to direct the inbound traffic
+ but port redirection is also needed to direct the inbound traffic
to the correct server. For example, a web server operating
on LAN address 10.0.10.25 and using a
@@ -2504,10 +2336,6 @@ sh /etc/ipf.rules.script
rdr dc0 20.20.20.5/32 port 53 -> 10.0.10.33 port 53 udp
-
-
-
- FTP and NATFTP has two modes: active mode and passive mode. The
difference is in how the data channel is acquired. Passive
@@ -2564,7 +2392,145 @@ pass out quick on rl0 proto tcp from any
# Active mode let data channel in from FTP server
pass in quick on rl0 proto tcp from any to any port = 20 flags S keep state
-
+
+ When the file containing the NAT rules
+ is edited after NAT has been started, run
+ ipnat with to delete
+ the internal in use NAT rules and flush the
+ contents of the translation table of all active
+ entries.
+
+ To reload the NAT rules, issue a
+ command like this:
+
+ &prompt.root; ipnat -CF -f
+ /etc/ipnat.rules
+
+ To display some NAT statistics, use
+ this command:
+
+ &prompt.root; ipnat -s
+
+ To list the NAT table's current
+ mappings, use this command:
+
+ &prompt.root; ipnat -l
+
+ To turn verbose mode on and display information relating
+ to rule processing and active rules/table entries:
+
+ &prompt.root; ipnat -v
+
+
+
+ Building the Rule Script with Symbolic
+ Substitution
+
+ Some experienced IPF users create a file containing the
+ rules and code them in a manner compatible with running them
+ as a script with symbolic substitution. The major benefit
+ of doing this is that only the value associated with the
+ symbolic name needs to be changed, and when the script is
+ run all the rules containing the symbolic name will have the
+ value substituted in the rules. Being a script, symbolic
+ substitution can be used to code frequently used values and
+ substitute them in multiple rules. This can be seen in the
+ following example.
+
+ The script syntax used here is compatible with the
+ &man.sh.1;, &man.csh.1;, and &man.tcsh.1; shells.
+
+ Symbolic substitution fields are prefixed with a
+ $.
+
+ Symbolic fields do not have the $ prefix.
+
+ The value to populate the symbolic field must be enclosed
+ between double quotes (").
+
+ Start the rule file with something like this:
+
+ ############# Start of IPF rules script ########################
+
+oif="dc0" # name of the outbound interface
+odns="192.0.2.11" # ISP's DNS server IP address
+myip="192.0.2.7" # my static IP address from ISP
+ks="keep state"
+fks="flags S keep state"
+
+# You can choose between building /etc/ipf.rules file
+# from this script or running this script "as is".
+#
+# Uncomment only one line and comment out another.
+#
+# 1) This can be used for building /etc/ipf.rules:
+#cat > /etc/ipf.rules << EOF
+#
+# 2) This can be used to run script "as is":
+/sbin/ipf -Fa -f - << EOF
+
+# Allow out access to my ISP's Domain name server.
+pass out quick on $oif proto tcp from any to $odns port = 53 $fks
+pass out quick on $oif proto udp from any to $odns port = 53 $ks
+
+# Allow out non-secure standard www function
+pass out quick on $oif proto tcp from $myip to any port = 80 $fks
+
+# Allow out secure www function https over TLS SSL
+pass out quick on $oif proto tcp from $myip to any port = 443 $fks
+EOF
+################## End of IPF rules script ########################
+
+ The rules are not important in this example as it instead
+ focuses on how the symbolic substitution fields are populated.
+ If this example was in a file named
+ /etc/ipf.rules.script, these rules could
+ be reloaded by running:
+
+ &prompt.root; sh /etc/ipf.rules.script
+
+ There is one problem with using a rules file with embedded
+ symbolics: IPF does not understand symbolic substitution, and
+ cannot read such scripts directly.
+
+ This script can be used in one of two ways:
+
+
+
+ Uncomment the line that begins with
+ cat, and comment out the line that
+ begins with /sbin/ipf. Place
+ ipfilter_enable="YES" into
+ /etc/rc.conf, and run the script
+ once after each modification to create or update
+ /etc/ipf.rules.
+
+
+
+ Disable IPFILTER in the
+ system startup scripts by adding
+ ipfilter_enable="NO"to
+ /etc/rc.conf.
+
+ Then, add a script like the following to
+ /usr/local/etc/rc.d/. The script
+ should have an obvious name like
+ ipf.loadrules.sh, where the
+ .sh extension is mandatory.
+
+ #!/bin/sh
+sh /etc/ipf.rules.script
+
+ The permissions on this script file must be read,
+ write, execute for owner
+ root:
+
+ &prompt.root; chmod 700 /usr/local/etc/rc.d/ipf.loadrules.sh
+
+
+
+ Now, when the system boots, the IPF rules will be
+ loaded.
From owner-svn-doc-all@FreeBSD.ORG Sun Feb 23 20:18:56 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id CBF4E188;
Sun, 23 Feb 2014 20:18:56 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 9C30A11A4;
Sun, 23 Feb 2014 20:18:56 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1NKIuOW010270;
Sun, 23 Feb 2014 20:18:56 GMT (envelope-from dru@svn.freebsd.org)
Received: (from dru@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1NKIuLj010269;
Sun, 23 Feb 2014 20:18:56 GMT (envelope-from dru@svn.freebsd.org)
Message-Id: <201402232018.s1NKIuLj010269@svn.freebsd.org>
From: Dru Lavigne
Date: Sun, 23 Feb 2014 20:18:56 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44038 - head/en_US.ISO8859-1/books/handbook/firewalls
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Sun, 23 Feb 2014 20:18:57 -0000
Author: dru
Date: Sun Feb 23 20:18:56 2014
New Revision: 44038
URL: http://svnweb.freebsd.org/changeset/doc/44038
Log:
Editorial pass through first 1/2 of IPF NAT section.
Sponsored by: iXsystems
Modified:
head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Sun Feb 23 16:11:36 2014 (r44037)
+++ head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Sun Feb 23 20:18:56 2014 (r44038)
@@ -178,6 +178,13 @@
Check out this link for port numbers used by Trojans http://www.sans.org/security-resources/idfaq/oddports.php.
+ FTP has two modes: active mode and passive mode. The
+ difference is in how the data channel is acquired. Passive
+ mode is more secure as the data channel is acquired by the
+ ordinal ftp session requester. For a good explanation of
+ FTP and the different modes, see http://www.slacksite.com/other/ftp.html.
+
A firewall ruleset can be either
exclusive or inclusive. An
exclusive firewall allows all traffic through except for the
@@ -2220,167 +2227,143 @@ ipnat_enable="YES"
ipnat_rules="/etc/ipnat.rules"
NAT rules are flexible and can
- accomplish many different things to fit the needs of
+ accomplish many different things to fit the needs of both
commercial and home users. The rule syntax presented here has been simplified to
demonstrate common usage.
For a complete rule syntax description, refer to
&man.ipnat.5;.
- The syntax for a NAT rule looks like
- this, where map starts the rule and
+ The basic syntax for a NAT rule is as
+ follows, where map starts the rule and
IF should be replaced with the
name of the external
interface:map IFLAN_IP_RANGE -> PUBLIC_ADDRESS
- The LAN_IP_RANGE is used by the
- internal clients use for IP Addressing. Usually, this is
- something like The LAN_IP_RANGE is the range
+ of IP addresses used by
+ internal clients. Usually, it is a private address range
+ such as 192.168.1.0/24. The PUBLIC_ADDRESS can either
- be the static external IP address or the special keyword
- 0/32 which uses the IP address assigned to
+ be the static external IP address or the keyword
+ 0/32 which represents the IP address assigned to
IF.
- In IPF, when a packet arrives at the firewall from the LAN
- with a public destination, it passes through the outbound
- filter rules. NAT gets its turn at the
- packet and applies its rules top down, where the first
- matching rule wins. NAT tests each of its
- rules against the packet's interface name and source IP
+ In IPF, when a packet arrives
+ at the firewall from the LAN
+ with a public destination, it first passes through the outbound
+ rules of the firewall ruleset. Then, the packet is passed to the NAT ruleset
+ which is read from the top down, where the first
+ matching rule wins. IPF tests each
+ NAT rule against the packet's interface name and source IP
address. When a packet's interface name matches a
- NAT rule, the packet's source IP address in
- the private LAN is checked to see if it falls within the IP
- address range specified to the left of the arrow symbol on the
- NAT rule. On a match, the packet has its
- source IP address rewritten with the public IP address
- obtained by the 0/32 keyword.
- NAT posts an entry in its internal
- NAT table so when the packet returns from
- the public Internet it can be mapped back to its original
- private IP address and then passed to the filter rules for
- processing.
-
- For networks that have large numbers of systems on the
- LAN or networks with more than a single LAN, the process of
- funneling all those private IP addresses into a single
- public IP address becomes a resource problem that may cause
- problems with the same port numbers being used many times
- across many connections, causing collisions. This section
- describes two ways to relieve this resource problem.
+ NAT rule, the packet's source IP address in
+ the private LAN is checked to see if it falls within the IP
+ address range specified in LAN_IP_RANGE.
+ On a match, the packet has its
+ source IP address rewritten with the public IP address
+ specified by PUBLIC_ADDRESS.
+ IPF posts an entry in its internal
+ NAT table so that when the packet returns from
+ the Internet, it can be mapped back to its original
+ private IP address before being passed to the firewall rules for
+ further processing.
+
+ For networks that have large numbers of internal systems
+ or multiple subnets, the process of
+ funneling every private IP address into a single
+ public IP address becomes a resource problem. Two methods
+ are available to relieve this issue.
- The first method is to assign ports to use. A normal
- NAT rule would look like:
-
- map dc0 192.168.1.0/24 -> 0/32
-
- In the above rule, the packet's source port is unchanged
- as the packet passes through IPNAT. By
+ The first method is to assign a range of ports to use
+ as source ports. By
adding the portmap keyword,
- IPNAT can be directed to only use
- source ports in the specified range. For example, the
- following rule will tell IPNAT to modify
- the source port to be within the range shown:
+ NAT can be directed to only use
+ source ports in the specified range:map dc0 192.168.1.0/24 -> 0/32 portmap tcp/udp 20000:60000
- Additionally, the auto keyword tells
- IPNAT to determine which ports are
+ Alternately, use the auto keyword which tells
+ NAT to determine the ports that are
available for use:map dc0 192.168.1.0/24 -> 0/32 portmap tcp/udp autoThe second method is to use a pool of public addresses.
- In very large LANs there comes a point where there are
- just too many LAN addresses to fit into a single public
- address. If a block of public IP addresses is available,
- these addresses can be used as a pool, and
- IPNAT may pick one of the public IP
- addresses as packet addresses are mapped on their way
+ This is useful when there are
+ too many LAN addresses to fit into a single public
+ address and a block of public IP addresses is available.
+ These public addresses can be used as a pool from which
+ NAT selects an IP address
+ as a packet's address is mapped on its way
out.
- For example, instead of mapping all packets through a
- single public IP address:
-
- map dc0 192.168.1.0/24 -> 204.134.75.1
-
- A range of public IP addresses can be specified either
- with a netmask:
-
- map dc0 192.168.1.0/24 -> 204.134.75.0/255.255.255.0
-
- or using CIDR notation:
-
- map dc0 192.168.1.0/24 -> 204.134.75.0/24
-
- A common practice is to have a web server, email server,
- database server, and DNS server each segregated to a
- different system on the LAN. In this case, the traffic from
+ The range of public IP addresses can
+ be specified
+ using a netmask or CIDR notation. These
+ two rules are equivalent:
+
+ map dc0 192.168.1.0/24 -> 204.134.75.0/255.255.255.0
+map dc0 192.168.1.0/24 -> 204.134.75.0/24
+
+ A common practice is to have a publically accessible web server or mail server
+ segregated to an internal
+ network segment. The traffic from
these servers still has to undergo NAT,
- but port redirection is also needed to direct the inbound traffic
- to the correct server. For example, a web server operating
- on LAN address 10.0.10.25 and using a
- single public IP address of 20.20.20.5, would use this
+ but port redirection is needed to direct inbound traffic
+ to the correct server. For example, to map a web server using
+ the internal address 10.0.10.25 to its
+ public IP address of 20.20.20.5, use this
rule:rdr dc0 20.20.20.5/32 port 80 -> 10.0.10.25 port 80
- or:
+ If it is the only web server, this rule would also work
+ as it redirects all external HTTP
+ requests to 10.0.10.25:rdr dc0 0.0.0.0/0 port 80 -> 10.0.10.25 port 80
- For a LAN DNS server on a private address of
- 10.0.10.33 that
- needs to receive public DNS requests:
-
- rdr dc0 20.20.20.5/32 port 53 -> 10.0.10.33 port 53 udp
-
- FTP has two modes: active mode and passive mode. The
- difference is in how the data channel is acquired. Passive
- mode is more secure as the data channel is acquired by the
- ordinal ftp session requester. For a good explanation of
- FTP and the different modes, see http://www.slacksite.com/other/ftp.html.
-
- IPNAT has a built in FTP proxy option
- which can be specified on the NAT map
- rule. It can monitor all outbound packet traffic for FTP
- active or passive start session requests and dynamically
- create temporary filter rules containing the port number
- being used by the data channel. This eliminates the
- security risk FTP normally exposes the firewall to as it no
- longer needs to open large ranges of high order ports for
- FTP connections.
+ IPF has a built in
+ FTP proxy
+ which can be used with NAT.
+ It monitors all outbound traffic for active or passive FTP
+ connection requests and dynamically
+ creates temporary filter rules containing the port number
+ used by the FTP data channel. This eliminates the
+ need to open large ranges of high order ports for
+ FTP connections.This rule will handle all the traffic for the internal
LAN:map dc0 10.0.10.0/29 -> 0/32 proxy port 21 ftp/tcp
- This rule handles the FTP traffic from the
+ This rule handles the FTP traffic from the
gateway:map dc0 0.0.0.0/0 -> 0/32 proxy port 21 ftp/tcp
- This rule handles all non-FTP traffic from the internal
+ This rule handles all non-FTP traffic from the internal
LAN:map dc0 10.0.10.0/29 -> 0/32
- The FTP map rules go before the
+ The FTP map rules go before the
NAT rule so that when a packet matches an
- FTP rule, the FTP proxy creates temporary filter rules to
- let the FTP session packets pass and undergo
- NAT. All LAN packets that are not FTP
- will not match the FTP rules but will undergo
+ FTP rule, the FTP proxy creates temporary filter rules to
+ let the FTP session packets pass and undergo
+ NAT. All LAN packets that are not FTP
+ will not match the FTP rules but will undergo
NAT if they match the third rule.
- Only one filter rule is needed for FTP if the
- NAT FTP proxy is used.
+ Only one filter rule is needed for FTP if the
+ NAT FTP proxy is used.
- Without the FTP proxy, the following three rules will be
+ Without the FTP proxy, the following three rules will be
needed:# Allow out LAN PC client FTP to public Internet
From owner-svn-doc-all@FreeBSD.ORG Mon Feb 24 04:16:59 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 93E3240B;
Mon, 24 Feb 2014 04:16:59 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 7CB9B1C88;
Mon, 24 Feb 2014 04:16:59 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1O4GxGM005802;
Mon, 24 Feb 2014 04:16:59 GMT (envelope-from dru@svn.freebsd.org)
Received: (from dru@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1O4Gx6k005801;
Mon, 24 Feb 2014 04:16:59 GMT (envelope-from dru@svn.freebsd.org)
Message-Id: <201402240416.s1O4Gx6k005801@svn.freebsd.org>
From: Dru Lavigne
Date: Mon, 24 Feb 2014 04:16:59 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44039 - head/en_US.ISO8859-1/books/handbook/firewalls
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Mon, 24 Feb 2014 04:16:59 -0000
Author: dru
Date: Mon Feb 24 04:16:59 2014
New Revision: 44039
URL: http://svnweb.freebsd.org/changeset/doc/44039
Log:
White space fix only. Translators can ignore.
Sponsored by: iXsystems
Modified:
head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Sun Feb 23 20:18:56 2014 (r44038)
+++ head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Mon Feb 24 04:16:59 2014 (r44039)
@@ -179,11 +179,11 @@
xlink:href="http://www.sans.org/security-resources/idfaq/oddports.php">http://www.sans.org/security-resources/idfaq/oddports.php.FTP has two modes: active mode and passive mode. The
- difference is in how the data channel is acquired. Passive
- mode is more secure as the data channel is acquired by the
- ordinal ftp session requester. For a good explanation of
- FTP and the different modes, see http://www.slacksite.com/other/ftp.html.
+ difference is in how the data channel is acquired. Passive
+ mode is more secure as the data channel is acquired by the
+ ordinal ftp session requester. For a good explanation of FTP
+ and the different modes, see http://www.slacksite.com/other/ftp.html.A firewall ruleset can be either
exclusive or inclusive. An
@@ -234,38 +234,37 @@
flood of different attack methods employed by attackers.NAT stands for Network
- Address Translation.
- NAT function enables the private LAN behind
- the firewall to share a single ISP-assigned IP address, even
- if that address is dynamically assigned. NAT allows each
- computer in the LAN to have Internet access, without
- having to pay the ISP for multiple Internet accounts or IP
- addresses.
-
- NAT will automatically translate the
- private LAN IP address for each system on the LAN to the
- single public IP address as packets exit the firewall bound
- for the public Internet. It also performs the reverse
- translation for returning packets.
-
- According to RFC 1918, the following IP address ranges are
- reserved for private networks which will never be routed
- directly to the public Internet, and therefore are available
- for use with NAT:
-
-
-
- 10.0.0.0/8.
-
-
-
- 172.16.0.0/12.
-
-
-
- 192.168.0.0/16.
-
-
+ Address Translation. NAT
+ function enables the private LAN behind the firewall to share a
+ single ISP-assigned IP address, even if that address is
+ dynamically assigned. NAT allows each computer in the LAN to
+ have Internet access, without having to pay the ISP for multiple
+ Internet accounts or IP addresses.
+
+ NAT will automatically translate the
+ private LAN IP address for each system on the LAN to the
+ single public IP address as packets exit the firewall bound for
+ the public Internet. It also performs the reverse translation
+ for returning packets.
+
+ According to RFC 1918, the following IP address ranges are
+ reserved for private networks which will never be routed
+ directly to the public Internet, and therefore are available
+ for use with NAT:
+
+
+
+ 10.0.0.0/8.
+
+
+
+ 172.16.0.0/12.
+
+
+
+ 192.168.0.0/16.
+
+ When working with the firewall rules, be very
@@ -2228,145 +2227,146 @@ ipnat_rules="/etc/ipnat.rules"NAT rules are flexible and can
accomplish many different things to fit the needs of both
- commercial and home users. The rule syntax presented here has been simplified to
- demonstrate common usage.
- For a complete rule syntax description, refer to
- &man.ipnat.5;.
+ commercial and home users. The rule syntax presented here has
+ been simplified to demonstrate common usage. For a complete
+ rule syntax description, refer to &man.ipnat.5;.The basic syntax for a NAT rule is as
- follows, where map starts the rule and
+ follows, where map starts the rule and
IF should be replaced with the
- name of the external
- interface:
+ name of the external interface:map IFLAN_IP_RANGE -> PUBLIC_ADDRESSThe LAN_IP_RANGE is the range
- of IP addresses used by
- internal clients. Usually, it is a private address range
- such as 192.168.1.0/24. The PUBLIC_ADDRESS can either
- be the static external IP address or the keyword
- 0/32 which represents the IP address assigned to
+ of IP addresses used by internal clients.
+ Usually, it is a private address range such as 192.168.1.0/24. The
+ PUBLIC_ADDRESS can either be the
+ static external IP address or the keyword
+ 0/32 which represents the
+ IP address assigned to
IF.In IPF, when a packet arrives
- at the firewall from the LAN
- with a public destination, it first passes through the outbound
- rules of the firewall ruleset. Then, the packet is passed to the NAT ruleset
- which is read from the top down, where the first
- matching rule wins. IPF tests each
- NAT rule against the packet's interface name and source IP
- address. When a packet's interface name matches a
- NAT rule, the packet's source IP address in
- the private LAN is checked to see if it falls within the IP
- address range specified in LAN_IP_RANGE.
- On a match, the packet has its
- source IP address rewritten with the public IP address
- specified by PUBLIC_ADDRESS.
+ at the firewall from the LAN with a public
+ destination, it first passes through the outbound rules of the
+ firewall ruleset. Then, the packet is passed to the
+ NAT ruleset which is read from the top
+ down, where the first matching rule wins.
+ IPF tests each
+ NAT rule against the packet's interface
+ name and source IP address. When a
+ packet's interface name matches a NAT rule,
+ the packet's source IP address in the
+ private LAN is checked to see if it falls
+ within the IP address range specified in
+ LAN_IP_RANGE. On a match, the
+ packet has its source IP address rewritten
+ with the public IP address specified by
+ PUBLIC_ADDRESS.
IPF posts an entry in its internal
- NAT table so that when the packet returns from
- the Internet, it can be mapped back to its original
- private IP address before being passed to the firewall rules for
- further processing.
-
- For networks that have large numbers of internal systems
- or multiple subnets, the process of
- funneling every private IP address into a single
- public IP address becomes a resource problem. Two methods
- are available to relieve this issue.
-
- The first method is to assign a range of ports to use
- as source ports. By
- adding the portmap keyword,
- NAT can be directed to only use
- source ports in the specified range:
-
- map dc0 192.168.1.0/24 -> 0/32 portmap tcp/udp 20000:60000
-
- Alternately, use the auto keyword which tells
- NAT to determine the ports that are
- available for use:
-
- map dc0 192.168.1.0/24 -> 0/32 portmap tcp/udp auto
-
- The second method is to use a pool of public addresses.
- This is useful when there are
- too many LAN addresses to fit into a single public
- address and a block of public IP addresses is available.
- These public addresses can be used as a pool from which
- NAT selects an IP address
- as a packet's address is mapped on its way
- out.
-
- The range of public IP addresses can
- be specified
- using a netmask or CIDR notation. These
- two rules are equivalent:
+ NAT table so that when the packet returns
+ from the Internet, it can be mapped back to its original
+ private IP address before being passed to
+ the firewall rules for further processing.
+
+ For networks that have large numbers of internal systems
+ or multiple subnets, the process of funneling every private
+ IP address into a single public
+ IP address becomes a resource problem.
+ Two methods are available to relieve this issue.
+
+ The first method is to assign a range of ports to use as
+ source ports. By adding the portmap
+ keyword, NAT can be directed to only use
+ source ports in the specified range:
+
+ map dc0 192.168.1.0/24 -> 0/32 portmap tcp/udp 20000:60000
+
+ Alternately, use the auto keyword
+ which tells NAT to determine the ports
+ that are available for use:
+
+ map dc0 192.168.1.0/24 -> 0/32 portmap tcp/udp auto
+
+ The second method is to use a pool of public addresses.
+ This is useful when there are too many
+ LAN addresses to fit into a single public
+ address and a block of public IP addresses
+ is available. These public addresses can be used as a pool
+ from which NAT selects an
+ IP address as a packet's address is
+ mapped on its way out.
+
+ The range of public IP addresses can
+ be specified using a netmask or CIDR
+ notation. These two rules are equivalent:
- map dc0 192.168.1.0/24 -> 204.134.75.0/255.255.255.0
+ map dc0 192.168.1.0/24 -> 204.134.75.0/255.255.255.0
map dc0 192.168.1.0/24 -> 204.134.75.0/24
- A common practice is to have a publically accessible web server or mail server
- segregated to an internal
- network segment. The traffic from
- these servers still has to undergo NAT,
- but port redirection is needed to direct inbound traffic
- to the correct server. For example, to map a web server using
- the internal address 10.0.10.25 to its
- public IP address of 20.20.20.5, use this
- rule:
+ A common practice is to have a publically accessible web
+ server or mail server segregated to an internal network
+ segment. The traffic from these servers still has to undergo
+ NAT, but port redirection is needed to
+ direct inbound traffic to the correct server. For example, to
+ map a web server using the internal address 10.0.10.25 to its public
+ IP address of 20.20.20.5, use this
+ rule:
+
+ rdr dc0 20.20.20.5/32 port 80 -> 10.0.10.25 port 80
+
+ If it is the only web server, this rule would also work as
+ it redirects all external HTTP requests to
+ 10.0.10.25:
+
+ rdr dc0 0.0.0.0/0 port 80 -> 10.0.10.25 port 80
+
+ IPF has a built in
+ FTP proxy which can be used with
+ NAT. It monitors all outbound traffic for
+ active or passive FTP connection requests
+ and dynamically creates temporary filter rules containing the
+ port number used by the FTP data channel.
+ This eliminates the need to open large ranges of high order
+ ports for FTP connections.
+
+ This rule will handle all the traffic for the internal
+ LAN:
+
+ map dc0 10.0.10.0/29 -> 0/32 proxy port 21 ftp/tcp
+
+ This rule handles the FTP traffic from
+ the gateway:
+
+ map dc0 0.0.0.0/0 -> 0/32 proxy port 21 ftp/tcp
+
+ This rule handles all non-FTP traffic
+ from the internal LAN:
+
+ map dc0 10.0.10.0/29 -> 0/32
+
+ The FTP map rules go
+ before the NAT rule so that when a packet
+ matches an FTP rule, the
+ FTP proxy creates temporary filter rules to
+ let the FTP session packets pass and
+ undergo NAT. All LAN packets that are not
+ FTP will not match the
+ FTP rules but will undergo
+ NAT if they match the third rule.
+
+ Only one filter rule is needed for FTP
+ if the NAT FTP proxy is
+ used.
- rdr dc0 20.20.20.5/32 port 80 -> 10.0.10.25 port 80
-
- If it is the only web server, this rule would also work
- as it redirects all external HTTP
- requests to 10.0.10.25:
-
- rdr dc0 0.0.0.0/0 port 80 -> 10.0.10.25 port 80
-
- IPF has a built in
- FTP proxy
- which can be used with NAT.
- It monitors all outbound traffic for active or passive FTP
- connection requests and dynamically
- creates temporary filter rules containing the port number
- used by the FTP data channel. This eliminates the
- need to open large ranges of high order ports for
- FTP connections.
-
- This rule will handle all the traffic for the internal
- LAN:
-
- map dc0 10.0.10.0/29 -> 0/32 proxy port 21 ftp/tcp
-
- This rule handles the FTP traffic from the
- gateway:
-
- map dc0 0.0.0.0/0 -> 0/32 proxy port 21 ftp/tcp
-
- This rule handles all non-FTP traffic from the internal
- LAN:
-
- map dc0 10.0.10.0/29 -> 0/32
-
- The FTP map rules go before the
- NAT rule so that when a packet matches an
- FTP rule, the FTP proxy creates temporary filter rules to
- let the FTP session packets pass and undergo
- NAT. All LAN packets that are not FTP
- will not match the FTP rules but will undergo
- NAT if they match the third rule.
-
- Only one filter rule is needed for FTP if the
- NAT FTP proxy is used.
-
- Without the FTP proxy, the following three rules will be
- needed:
+ Without the FTP proxy, the following
+ three rules will be needed:
- # Allow out LAN PC client FTP to public Internet
+ # Allow out LAN PC client FTP to public Internet
# Active and passive modes
pass out quick on rl0 proto tcp from any to any port = 21 flags S keep state
From owner-svn-doc-all@FreeBSD.ORG Mon Feb 24 06:18:16 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id B72CDB79;
Mon, 24 Feb 2014 06:18:16 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id A27B11727;
Mon, 24 Feb 2014 06:18:16 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1O6IGod053739;
Mon, 24 Feb 2014 06:18:16 GMT (envelope-from gjb@svn.freebsd.org)
Received: (from gjb@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1O6IGbe053738;
Mon, 24 Feb 2014 06:18:16 GMT (envelope-from gjb@svn.freebsd.org)
Message-Id: <201402240618.s1O6IGbe053738@svn.freebsd.org>
From: Glen Barber
Date: Mon, 24 Feb 2014 06:18:16 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44040 - head/share/xml
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Mon, 24 Feb 2014 06:18:16 -0000
Author: gjb
Date: Mon Feb 24 06:18:16 2014
New Revision: 44040
URL: http://svnweb.freebsd.org/changeset/doc/44040
Log:
Consistently add the trailing '/' after /pub/FreeBSD
Sponsored by: The FreeBSD Foundation
Modified:
head/share/xml/mirrors.xml
Modified: head/share/xml/mirrors.xml
==============================================================================
--- head/share/xml/mirrors.xml Mon Feb 24 04:16:59 2014 (r44039)
+++ head/share/xml/mirrors.xml Mon Feb 24 06:18:16 2014 (r44040)
@@ -1041,8 +1041,8 @@
ftp6.se.FreeBSD.org
- ftp://ftp6.se.FreeBSD.org/pub/FreeBSD
- http://ftp6.se.FreeBSD.org/pub/FreeBSD
+ ftp://ftp6.se.FreeBSD.org/pub/FreeBSD/
+ http://ftp6.se.FreeBSD.org/pub/FreeBSD/
From owner-svn-doc-all@FreeBSD.ORG Mon Feb 24 12:06:50 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 342FD7BC;
Mon, 24 Feb 2014 12:06:50 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 208FB1CCD;
Mon, 24 Feb 2014 12:06:50 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1OC6njv095266;
Mon, 24 Feb 2014 12:06:49 GMT (envelope-from remko@svn.freebsd.org)
Received: (from remko@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1OC6n4m095265;
Mon, 24 Feb 2014 12:06:49 GMT (envelope-from remko@svn.freebsd.org)
Message-Id: <201402241206.s1OC6n4m095265@svn.freebsd.org>
From: Remko Lodder
Date: Mon, 24 Feb 2014 12:06:49 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44041 - head/share/xml
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Mon, 24 Feb 2014 12:06:50 -0000
Author: remko
Date: Mon Feb 24 12:06:49 2014
New Revision: 44041
URL: http://svnweb.freebsd.org/changeset/doc/44041
Log:
Add ftp6.ua.freebsd.org as a mirror, it seems to service ftp/http and rsync.
cvsup didn't reply and is actually not being pushed anymore as a public
servers from our (FreeBSD) end so I didn't list it as such.
PR: 175861
Modified:
head/share/xml/mirrors.xml
Modified: head/share/xml/mirrors.xml
==============================================================================
--- head/share/xml/mirrors.xml Mon Feb 24 06:18:16 2014 (r44040)
+++ head/share/xml/mirrors.xml Mon Feb 24 12:06:49 2014 (r44041)
@@ -1229,6 +1229,13 @@
+ ftp6.ua.FreeBSD.org
+ ftp://ftp6.ua.FreeBSD.org/pub/FreeBSD/
+ http://ftp6.ua.FreeBSD.org/pub/FreeBSD
+ rsync://ftp6.ua.FreeBSD.org/FreeBSD/>
+
+
+ ftp7.ua.FreeBSD.orgftp://ftp7.ua.FreeBSD.org/pub/FreeBSD/
From owner-svn-doc-all@FreeBSD.ORG Mon Feb 24 15:55:32 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id D309884A;
Mon, 24 Feb 2014 15:55:32 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id BE83F1690;
Mon, 24 Feb 2014 15:55:32 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1OFtWhr090621;
Mon, 24 Feb 2014 15:55:32 GMT (envelope-from gjb@svn.freebsd.org)
Received: (from gjb@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1OFtWwp090619;
Mon, 24 Feb 2014 15:55:32 GMT (envelope-from gjb@svn.freebsd.org)
Message-Id: <201402241555.s1OFtWwp090619@svn.freebsd.org>
From: Glen Barber
Date: Mon, 24 Feb 2014 15:55:32 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44042 - head/share/xml
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Mon, 24 Feb 2014 15:55:32 -0000
Author: gjb
Date: Mon Feb 24 15:55:32 2014
New Revision: 44042
URL: http://svnweb.freebsd.org/changeset/doc/44042
Log:
Remove nonexistent ftp4.fr.FreeBSD.org.
Sponsored by: The FreeBSD Foundation
Modified:
head/share/xml/mirrors.xml
Modified: head/share/xml/mirrors.xml
==============================================================================
--- head/share/xml/mirrors.xml Mon Feb 24 12:06:49 2014 (r44041)
+++ head/share/xml/mirrors.xml Mon Feb 24 15:55:32 2014 (r44042)
@@ -398,16 +398,6 @@
- ftp4.fr.FreeBSD.org
- ftp://ftp4.fr.FreeBSD.org/pub/FreeBSD/
- ftp://ftp4.fr.FreeBSD.org/pub/FreeBSD/
- http://ftp4.fr.FreeBSD.org/pub/FreeBSD/
- http://ftp4.fr.FreeBSD.org/pub/FreeBSD/
- rsync://ftp4.fr.FreeBSD.org/FreeBSD/
- rsync://ftp4.fr.FreeBSD.org/FreeBSD/
-
-
- ftp5.fr.FreeBSD.orgftp://ftp5.fr.FreeBSD.org/pub/FreeBSD/
From owner-svn-doc-all@FreeBSD.ORG Mon Feb 24 15:57:59 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id BAEA1AFB;
Mon, 24 Feb 2014 15:57:59 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id A71BA16BE;
Mon, 24 Feb 2014 15:57:59 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1OFvxBx090969;
Mon, 24 Feb 2014 15:57:59 GMT (envelope-from gjb@svn.freebsd.org)
Received: (from gjb@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1OFvxUM090968;
Mon, 24 Feb 2014 15:57:59 GMT (envelope-from gjb@svn.freebsd.org)
Message-Id: <201402241557.s1OFvxUM090968@svn.freebsd.org>
From: Glen Barber
Date: Mon, 24 Feb 2014 15:57:59 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44043 - head/share/xml
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Mon, 24 Feb 2014 15:57:59 -0000
Author: gjb
Date: Mon Feb 24 15:57:59 2014
New Revision: 44043
URL: http://svnweb.freebsd.org/changeset/doc/44043
Log:
ftp2.pl does not respond on ftp port, only http.
Sponsored by: The FreeBSD Foundation
Modified:
head/share/xml/mirrors.xml
Modified: head/share/xml/mirrors.xml
==============================================================================
--- head/share/xml/mirrors.xml Mon Feb 24 15:55:32 2014 (r44042)
+++ head/share/xml/mirrors.xml Mon Feb 24 15:57:59 2014 (r44043)
@@ -787,8 +787,6 @@
ftp2.pl.FreeBSD.org
- ftp://ftp2.pl.FreeBSD.org/pub/FreeBSD/
- ftp://ftp2.pl.FreeBSD.org/pub/FreeBSD/http://ftp2.pl.FreeBSD.org/pub/FreeBSD/http://ftp2.pl.FreeBSD.org/pub/FreeBSD/
From owner-svn-doc-all@FreeBSD.ORG Mon Feb 24 16:09:52 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id D5100F92;
Mon, 24 Feb 2014 16:09:52 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id C138617B6;
Mon, 24 Feb 2014 16:09:52 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1OG9qNu095231;
Mon, 24 Feb 2014 16:09:52 GMT (envelope-from gjb@svn.freebsd.org)
Received: (from gjb@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1OG9q3F095230;
Mon, 24 Feb 2014 16:09:52 GMT (envelope-from gjb@svn.freebsd.org)
Message-Id: <201402241609.s1OG9q3F095230@svn.freebsd.org>
From: Glen Barber
Date: Mon, 24 Feb 2014 16:09:52 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44044 - head/share/xml
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Mon, 24 Feb 2014 16:09:52 -0000
Author: gjb
Date: Mon Feb 24 16:09:52 2014
New Revision: 44044
URL: http://svnweb.freebsd.org/changeset/doc/44044
Log:
ftp9.tw.FreeBSD.org stopped mirroring in 2010.
Sponsored by: The FreeBSD Foundation
Modified:
head/share/xml/mirrors.xml
Modified: head/share/xml/mirrors.xml
==============================================================================
--- head/share/xml/mirrors.xml Mon Feb 24 15:57:59 2014 (r44043)
+++ head/share/xml/mirrors.xml Mon Feb 24 16:09:52 2014 (r44044)
@@ -1142,11 +1142,6 @@
- ftp9.tw.FreeBSD.org
- ftp://ftp9.tw.FreeBSD.org/pub/FreeBSD/
-
-
- ftp10.tw.FreeBSD.orgftp://ftp10.tw.FreeBSD.org/pub/FreeBSD/
From owner-svn-doc-all@FreeBSD.ORG Mon Feb 24 16:12:15 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 00B5780;
Mon, 24 Feb 2014 16:12:14 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id E0F101845;
Mon, 24 Feb 2014 16:12:14 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1OGCEvt098352;
Mon, 24 Feb 2014 16:12:14 GMT (envelope-from gjb@svn.freebsd.org)
Received: (from gjb@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1OGCEMY098351;
Mon, 24 Feb 2014 16:12:14 GMT (envelope-from gjb@svn.freebsd.org)
Message-Id: <201402241612.s1OGCEMY098351@svn.freebsd.org>
From: Glen Barber
Date: Mon, 24 Feb 2014 16:12:14 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44045 - head/share/xml
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Mon, 24 Feb 2014 16:12:15 -0000
Author: gjb
Date: Mon Feb 24 16:12:14 2014
New Revision: 44045
URL: http://svnweb.freebsd.org/changeset/doc/44045
Log:
ftp3.tw.FreeBSD.org is out of sync since 2008.
Sponsored by: The FreeBSD Foundation
Modified:
head/share/xml/mirrors.xml
Modified: head/share/xml/mirrors.xml
==============================================================================
--- head/share/xml/mirrors.xml Mon Feb 24 16:09:52 2014 (r44044)
+++ head/share/xml/mirrors.xml Mon Feb 24 16:12:14 2014 (r44045)
@@ -1110,11 +1110,6 @@
- ftp3.tw.FreeBSD.org
- ftp://ftp3.tw.FreeBSD.org/pub/FreeBSD/
-
-
- ftp4.tw.FreeBSD.orgftp://ftp4.tw.FreeBSD.org/pub/FreeBSD/
From owner-svn-doc-all@FreeBSD.ORG Mon Feb 24 16:30:44 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id A97317F7;
Mon, 24 Feb 2014 16:30:44 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 9131219A1;
Mon, 24 Feb 2014 16:30:44 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1OGUik1005722;
Mon, 24 Feb 2014 16:30:44 GMT (envelope-from gjb@svn.freebsd.org)
Received: (from gjb@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1OGUiUI005721;
Mon, 24 Feb 2014 16:30:44 GMT (envelope-from gjb@svn.freebsd.org)
Message-Id: <201402241630.s1OGUiUI005721@svn.freebsd.org>
From: Glen Barber
Date: Mon, 24 Feb 2014 16:30:44 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44046 - head/share/xml
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Mon, 24 Feb 2014 16:30:44 -0000
Author: gjb
Date: Mon Feb 24 16:30:44 2014
New Revision: 44046
URL: http://svnweb.freebsd.org/changeset/doc/44046
Log:
Remove ftp.sk and ftp2.sk. ftp.sk requires authentication, and ftp2.sk
/pub/FreeBSD directory is empty.
While here, remove cvsup server entry.
Sponsored by: The FreeBSD Foundation
Modified:
head/share/xml/mirrors.xml
Modified: head/share/xml/mirrors.xml
==============================================================================
--- head/share/xml/mirrors.xml Mon Feb 24 16:12:14 2014 (r44045)
+++ head/share/xml/mirrors.xml Mon Feb 24 16:30:44 2014 (r44046)
@@ -873,36 +873,6 @@
ftpadmin@isu.net.sa
-
- Slovak Republic
-
- www.sk.FreeBSD.org
- http://www.sk.FreeBSD.org/
-
-
-
- ftp.sk.FreeBSD.org
- ftp://ftp.sk.FreeBSD.org/pub/FreeBSD/
- ftp://ftp.sk.FreeBSD.org/pub/FreeBSD/
- http://ftp.sk.FreeBSD.org/pub/FreeBSD/
- http://ftp.sk.FreeBSD.org/pub/FreeBSD/
-
-
-
- ftp2.sk.FreeBSD.org
- ftp://ftp2.sk.FreeBSD.org/pub/FreeBSD/
- ftp://ftp2.sk.FreeBSD.org/pub/FreeBSD/
- http://ftp2.sk.FreeBSD.org/pub/FreeBSD/
- http://ftp2.sk.FreeBSD.org/pub/FreeBSD/
-
-
-
- cvsup.sk.FreeBSD.org
-
-
- hostmaster@sk.FreeBSD.org
-
-
Slovenia
From owner-svn-doc-all@FreeBSD.ORG Mon Feb 24 16:36:14 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 69112B3C;
Mon, 24 Feb 2014 16:36:14 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 54A601A68;
Mon, 24 Feb 2014 16:36:14 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1OGaE2q006822;
Mon, 24 Feb 2014 16:36:14 GMT (envelope-from gjb@svn.freebsd.org)
Received: (from gjb@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1OGaEE2006820;
Mon, 24 Feb 2014 16:36:14 GMT (envelope-from gjb@svn.freebsd.org)
Message-Id: <201402241636.s1OGaEE2006820@svn.freebsd.org>
From: Glen Barber
Date: Mon, 24 Feb 2014 16:36:14 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44047 - head/share/xml
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Mon, 24 Feb 2014 16:36:14 -0000
Author: gjb
Date: Mon Feb 24 16:36:13 2014
New Revision: 44047
URL: http://svnweb.freebsd.org/changeset/doc/44047
Log:
Remove ftp10.tw, no longer mirroring FreeBSD.
Sponsored by: The FreeBSD Foundation
Modified:
head/share/xml/mirrors.xml
Modified: head/share/xml/mirrors.xml
==============================================================================
--- head/share/xml/mirrors.xml Mon Feb 24 16:30:44 2014 (r44046)
+++ head/share/xml/mirrors.xml Mon Feb 24 16:36:13 2014 (r44047)
@@ -1107,11 +1107,6 @@
- ftp10.tw.FreeBSD.org
- ftp://ftp10.tw.FreeBSD.org/pub/FreeBSD/
-
-
- ftp11.tw.FreeBSD.orgftp://ftp11.tw.FreeBSD.org/pub/FreeBSD/http://ftp11.tw.FreeBSD.org/FreeBSD/
From owner-svn-doc-all@FreeBSD.ORG Mon Feb 24 18:27:01 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id A581BD04;
Mon, 24 Feb 2014 18:27:01 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 92186165D;
Mon, 24 Feb 2014 18:27:01 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1OIR1XN051214;
Mon, 24 Feb 2014 18:27:01 GMT (envelope-from gjb@svn.freebsd.org)
Received: (from gjb@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1OIR1vN051213;
Mon, 24 Feb 2014 18:27:01 GMT (envelope-from gjb@svn.freebsd.org)
Message-Id: <201402241827.s1OIR1vN051213@svn.freebsd.org>
From: Glen Barber
Date: Mon, 24 Feb 2014 18:27:01 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44048 - head/share/xml
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Mon, 24 Feb 2014 18:27:01 -0000
Author: gjb
Date: Mon Feb 24 18:27:01 2014
New Revision: 44048
URL: http://svnweb.freebsd.org/changeset/doc/44048
Log:
Remove ftp6.de, almost 6 years out of sync.
Sponsored by: The FreeBSD Foundation
Modified:
head/share/xml/mirrors.xml
Modified: head/share/xml/mirrors.xml
==============================================================================
--- head/share/xml/mirrors.xml Mon Feb 24 16:36:13 2014 (r44047)
+++ head/share/xml/mirrors.xml Mon Feb 24 18:27:01 2014 (r44048)
@@ -473,12 +473,7 @@
ftp5.de.FreeBSD.orgftp://ftp5.de.FreeBSD.org/pub/FreeBSD/
-
+
ftp7.de.FreeBSD.orgftp://ftp7.de.FreeBSD.org/pub/FreeBSD/
From owner-svn-doc-all@FreeBSD.ORG Mon Feb 24 20:06:14 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 21B40D1C;
Mon, 24 Feb 2014 20:06:14 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 0D5C01188;
Mon, 24 Feb 2014 20:06:14 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1OK6Dho090837;
Mon, 24 Feb 2014 20:06:13 GMT (envelope-from wblock@svn.freebsd.org)
Received: (from wblock@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1OK6Dgw090836;
Mon, 24 Feb 2014 20:06:13 GMT (envelope-from wblock@svn.freebsd.org)
Message-Id: <201402242006.s1OK6Dgw090836@svn.freebsd.org>
From: Warren Block
Date: Mon, 24 Feb 2014 20:06:13 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44049 - head/share/misc
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Mon, 24 Feb 2014 20:06:14 -0000
Author: wblock
Date: Mon Feb 24 20:06:13 2014
New Revision: 44049
URL: http://svnweb.freebsd.org/changeset/doc/44049
Log:
Improve XHTML table of contents readability by reducing vertical spacing
and using slightly larger fonts for headings.
PR: docs/186858
Submitted by: Allan Jude
Modified:
head/share/misc/docbook.css
Modified: head/share/misc/docbook.css
==============================================================================
--- head/share/misc/docbook.css Mon Feb 24 18:27:01 2014 (r44048)
+++ head/share/misc/docbook.css Mon Feb 24 20:06:13 2014 (r44049)
@@ -120,19 +120,26 @@ body div {
}
dl {
- margin: .8em 0;
+ margin: .4em 0 0 0;
line-height: 1.2;
}
dt {
font-weight: bold;
- margin-top: 1em;
+ margin: 0.4em 0 0 0;
+}
+
+div.abstract div.abstract-title,
+div.toc div.toc-title,
+div.list-of-figures div.toc-title,
+div.list-of-tables div.toc-title,
+div.list-of-examples div.toc-title {
+ font-size: 115%;
}
div.calloutlist dt {
float: left;
- width: 1em;
-}
+ width: 1em;}
div.calloutlist dd {
clear: right;
From owner-svn-doc-all@FreeBSD.ORG Tue Feb 25 12:09:07 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 69D3017B;
Tue, 25 Feb 2014 12:09:07 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 55258119A;
Tue, 25 Feb 2014 12:09:07 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1PC97ui088095;
Tue, 25 Feb 2014 12:09:07 GMT (envelope-from ryusuke@svn.freebsd.org)
Received: (from ryusuke@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1PC97pX088094;
Tue, 25 Feb 2014 12:09:07 GMT (envelope-from ryusuke@svn.freebsd.org)
Message-Id: <201402251209.s1PC97pX088094@svn.freebsd.org>
From: Ryusuke SUZUKI
Date: Tue, 25 Feb 2014 12:09:07 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44050 - head/ja_JP.eucJP/books/handbook/cutting-edge
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-Mailman-Approved-At: Tue, 25 Feb 2014 12:54:04 +0000
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Tue, 25 Feb 2014 12:09:07 -0000
Author: ryusuke
Date: Tue Feb 25 12:09:06 2014
New Revision: 44050
URL: http://svnweb.freebsd.org/changeset/doc/44050
Log:
- Merge the following from the English version:
r43778 -> r43780 head/ja_JP.eucJP/books/handbook/cutting-edge/chapter.xml
Modified:
head/ja_JP.eucJP/books/handbook/cutting-edge/chapter.xml
Modified: head/ja_JP.eucJP/books/handbook/cutting-edge/chapter.xml
==============================================================================
--- head/ja_JP.eucJP/books/handbook/cutting-edge/chapter.xml Mon Feb 24 20:06:13 2014 (r44049)
+++ head/ja_JP.eucJP/books/handbook/cutting-edge/chapter.xml Tue Feb 25 12:09:06 2014 (r44050)
@@ -3,7 +3,7 @@
The FreeBSD Documentation Project
The FreeBSD Japanese Documentation Project
- Original revision: r43778
+ Original revision: r43780
$FreeBSD$
-->
&os; には二つの開発ブランチがあります。
それは &os.current; と &os.stable; です。
- この節ではそれぞれについて説明し、
- どのようにしてシステムの対応するブランチを最新の状態に保つかについて説明します。
- まずは &os.current;、次に &os.stable; について説明します。
+ この節ではそれぞれのブランチと対象としている読者についての説明と、
+ どのようにしてシステムの対応するブランチを最新の状態に保つかについて説明します。訳: &a.hanai;、1996 年 11 月 6 日&os.current; を使う
- &os.current; とは &os; の開発の 最前線 です。
- &os.current; のユーザは高い技術力を持つことが要求され、
- 自分のシステムが抱える困難な問題を自力で解決できなければなりません。
- もし &os; を使い始めたばかりなら、
- これを運用することについて十分検討を重ねた方が良いでしょう。
+ &os.current; とは &os; の開発の 最前線 なので、
+ &os.current; のユーザは高い技術力を持つことが要求されます。
+ そこまでの技術力を持っていないが、
+ 開発ブランチを追いかけたいと考えているユーザは、
+ かわりに &os.stable; を追いかけると良いでしょう。
- &os.current; は &os; の最新のソースコードです。
+ &os.current; は &os; の最新のソースコードであり、
中には現在開発途上のソフトウェア、
実験的な変更、あるいは過渡的な機能などが含まれています。
また、この中に入っている機能がすべて、
次の公式リリースに入るとは限りません。&os.current;
をソースからほぼ毎日コンパイルしている人はたくさんいますが、
- 時期によってはコンパイルさえできない状態になっていることもあります。
+ 短い期間ではコンパイルさえできない状態になっている時期もあります。
これらの問題は可能な限り迅速に解決されますが、
&os.current; が不幸をもたらすか、
- それとも非常に素晴らしい機能をもたらすかは、
+ それとも新しい機能をもたらすかは、
まさにソースコードを同期した瞬間によるのです!&os.current; は、
@@ -1186,51 +1185,41 @@ before running "/usr/sbin/freebsd-update
ソースツリーのある部分に関して活発に作業している
- &os; コミュニティのメンバ。
- 彼らにとっては 最新のもの にしておくのが
- 絶対に必要なことなのです。
-
+ &os; コミュニティのメンバ。
+
活発にテストしている &os; コミュニティのメンバ。
- 彼らは、&os.current;
- が 健全である ことを可能な限り保証するために、
- 種々の問題を解決するのに時間を惜しまない人々です。
- これらのテスターは、さまざまな変更に関する提案や
- &os; の大まかな方向付けを行ないたいと思っている
- 人々でもあり、それを実装するためのパッチを提示します。
+ 彼らは、種々の問題を解決するのに時間を惜しまない人々であり、
+ さまざまな変更に関する提案や
+ &os; の大まかな方向付けを行ないたいと思っている人々でもあり、
+ パッチも提出します。
- 単に、さまざまな事に目を向け、
- 参考のために最新のソースを使いたいと思っている人々。
- これらの人々はまた、
- 時々コメントやコードを寄稿してくれます。
+ さまざまな事に目を向け、
+ 参考のために最新のソースを使いたいと思っていたり、
+ 時々コメントやコードを寄稿したいと考えているユーザ。
- &os.current;
- に期待してはいけないことは?
-
-
-
- 次のリリースの前に、最も早く新しい機能を入手すること。
- リリース前の機能は十分にテストされていないため、
- バグを含んでいく可能性が大いにあります。
-
-
-
- バグを修正するための素早い方法。
- いかなるコミットは、
- 元からあるバグを修正するのと同じく、
- 新しいバグを生み出すおそれがあります。
-
-
-
- 公式のサポート はありません。
-
-
+ &os.current; は、次のリリースの前に、
+ 最も早く新しい機能を入手する手段として、
+ 期待してはいけません。
+ リリース前の機能は十分にテストされていないため、
+ バグを含んでいる可能性が大いにあるためです。
+ また、バグを修正するための素早い方法でもありません。
+ いかなるコミットは、元からあるバグを修正するのと同じく、
+ 新しいバグを生み出すおそれがあります。
+ &os.current; には 公式のサポート はありません。
+
+
+ -CURRENT
+ using
+
+ &os.current;: を追いかけるには
+
&a.current.name; と &a.svn-src-head.name;-CURRENT使用 メーリングリスト
@@ -1254,60 +1243,31 @@ before running "/usr/sbin/freebsd-update
- &os; ミラーサイト
- からソースの入手するには、以下のようないくつかの方法があります。
-
-
-
- svn
-
- Subversion
-
-
- -CURRENT
- Subversion
- を使った同期
-
- を使って、
- 希望する開発ブランチ、
- もしくはリリースブランチをチェックアウトしてください。
- この方法は、開発中の &os; リポジトリへのアクセスを提供しており、
- 推奨されています。
+ &os.current; のソースを同期する。
+ 特に svn を使って
Subversion ミラーサイト
のひとつの head ブランチから
- -CURRENT コードをチェックアウトしてください。
- リポジトリサイズの観点から、
- 希望するサブツリーのみをチェックアウトすることが推奨されます。
+ -CURRENT コードをチェックアウトしてください。
-
- CTM
-
- -CURRENT
- CTM を使った同期
- を用いる。
- 接続料が高額だったり、email でのアクセスしかできないような、
- あまり良質でない TCP/IP 接続の場合には、
- CTM
- を利用すると良いでしょう。ただし、
- Subversion
- ほどには信頼はできません。
- そのため、インターネットに接続しているシステムであれば、
- Subversion
+ インターネットの接続がとても遅かったり、
+ 制限がある場合には、
+ CTM
+ を利用すると良いでしょう。
+ ただし、svn
+ ほどには信頼はできないので、
+ svn
を利用されることを推奨します。
-
-
- もし、ソースを眺めるだけでなく、
- 走らせるために入手するのであれば、
- 一部だけ選ぶのではなく、&os.current;
- の全体を手に入れてください。
- ソースのさまざまな部分が他の部分の更新に依存しており、
- 一部のみをコンパイルしようとすると、
- ほぼ間違いなく問題が起きます。
+ リポジトリのサイズが大きいため、興味のある部分や、
+ パッチを当てる部分のソースのみを同期するユーザもいます。
+ しかしながら、
+ ソースからオペレーティングシステムをコンパイルしようと思っているユーザは、
+ 一部分だけではなく、&os.current; の すべて
+ をダウンロードする必要があります。
&os.current;
@@ -1330,7 +1290,7 @@ before running "/usr/sbin/freebsd-update
アクティブになってください!
&os.current; のユーザには、
拡張やバグ潰しに関して提案することが勧められています。
- コードを伴う提案はもっとも歓迎されるものです!
+ コードを伴う提案はいつでも歓迎されます!
From owner-svn-doc-all@FreeBSD.ORG Tue Feb 25 15:57:18 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 406C5738;
Tue, 25 Feb 2014 15:57:18 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 1ECED18A1;
Tue, 25 Feb 2014 15:57:18 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1PFvHDj084747;
Tue, 25 Feb 2014 15:57:17 GMT (envelope-from dru@svn.freebsd.org)
Received: (from dru@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1PFvHjb084746;
Tue, 25 Feb 2014 15:57:17 GMT (envelope-from dru@svn.freebsd.org)
Message-Id: <201402251557.s1PFvHjb084746@svn.freebsd.org>
From: Dru Lavigne
Date: Tue, 25 Feb 2014 15:57:17 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44051 - head/en_US.ISO8859-1/books/handbook/firewalls
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Tue, 25 Feb 2014 15:57:18 -0000
Author: dru
Date: Tue Feb 25 15:57:17 2014
New Revision: 44051
URL: http://svnweb.freebsd.org/changeset/doc/44051
Log:
Finish editorial pass through IPF NAT.
Comment out symbolic substitution section for now.
It is confusing as written and may no longer be needed with IPF's new syntax.
Sponsored by: iXsystems
Modified:
head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Tue Feb 25 12:09:06 2014 (r44050)
+++ head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Tue Feb 25 15:57:17 2014 (r44051)
@@ -2334,20 +2334,17 @@ map dc0 192.168.1.0/24 -> 204.134.75.
This eliminates the need to open large ranges of high order
ports for FTP connections.
- This rule will handle all the traffic for the internal
- LAN:
-
- map dc0 10.0.10.0/29 -> 0/32 proxy port 21 ftp/tcp
-
- This rule handles the FTP traffic from
- the gateway:
-
- map dc0 0.0.0.0/0 -> 0/32 proxy port 21 ftp/tcp
-
- This rule handles all non-FTP traffic
- from the internal LAN:
-
- map dc0 10.0.10.0/29 -> 0/32
+ In this example, the first rule calls the proxy for
+ outbound FTP traffic from the internal
+ LAN. The second rule passes the
+ FTP traffic from the firewall to the
+ Internet, and the third rule handles all
+ non-FTP traffic from the internal
+ LAN:
+
+ map dc0 10.0.10.0/29 -> 0/32 proxy port 21 ftp/tcp
+map dc0 0.0.0.0/0 -> 0/32 proxy port 21 ftp/tcp
+map dc0 10.0.10.0/29 -> 0/32The FTP map rules go
before the NAT rule so that when a packet
@@ -2359,12 +2356,9 @@ map dc0 192.168.1.0/24 -> 204.134.75.
FTP rules but will undergo
NAT if they match the third rule.
- Only one filter rule is needed for FTP
- if the NAT FTP proxy is
- used.
-
Without the FTP proxy, the following
- three rules will be needed:
+ firewall rules would instead be needed. Note that without the proxy,
+ all ports above 1024 need to be allowed:
# Allow out LAN PC client FTP to public Internet
# Active and passive modes
@@ -2376,35 +2370,32 @@ pass out quick on rl0 proto tcp from any
# Active mode let data channel in from FTP server
pass in quick on rl0 proto tcp from any to any port = 20 flags S keep state
- When the file containing the NAT rules
- is edited after NAT has been started, run
+ Whenever the file containing the NAT rules
+ is edited, run
ipnat with to delete
- the internal in use NAT rules and flush the
- contents of the translation table of all active
- entries.
-
- To reload the NAT rules, issue a
- command like this:
+ the current NAT rules and flush the
+ contents of the dynamic translation table. Include
+ and specify the name
+ of the NAT ruleset to load:
- &prompt.root; ipnat -CF -f
- /etc/ipnat.rules
+ &prompt.root; ipnat -CF -f /etc/ipnat.rules
- To display some NAT statistics, use
- this command:
+ To display the NAT statistics:&prompt.root; ipnat -sTo list the NAT table's current
- mappings, use this command:
+ mappings:
&prompt.root; ipnat -lTo turn verbose mode on and display information relating
- to rule processing and active rules/table entries:
+ to rule processing and active rules and table entries:
&prompt.root; ipnat -v
-
+
IPFSTAT
From owner-svn-doc-all@FreeBSD.ORG Tue Feb 25 17:30:27 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 2A26D84B;
Tue, 25 Feb 2014 17:30:27 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 1488B1276;
Tue, 25 Feb 2014 17:30:27 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1PHUQuf023123;
Tue, 25 Feb 2014 17:30:26 GMT (envelope-from dru@svn.freebsd.org)
Received: (from dru@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1PHUQXQ023122;
Tue, 25 Feb 2014 17:30:26 GMT (envelope-from dru@svn.freebsd.org)
Message-Id: <201402251730.s1PHUQXQ023122@svn.freebsd.org>
From: Dru Lavigne
Date: Tue, 25 Feb 2014 17:30:26 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44052 - head/en_US.ISO8859-1/books/handbook/firewalls
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Tue, 25 Feb 2014 17:30:27 -0000
Author: dru
Date: Tue Feb 25 17:30:26 2014
New Revision: 44052
URL: http://svnweb.freebsd.org/changeset/doc/44052
Log:
Finish initial editorial review of IPF chapter.
Sponsored by: iXsystems
Modified:
head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Tue Feb 25 15:57:17 2014 (r44051)
+++ head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Tue Feb 25 17:30:26 2014 (r44052)
@@ -2508,7 +2508,7 @@ sh /etc/ipf.rules.script
-->
- IPFSTAT
+ Viewing IPF Statisticsipfstat
@@ -2518,16 +2518,16 @@ sh /etc/ipf.rules.scriptstatistics
- The default behavior of &man.ipfstat.8; is to retrieve
- and display the totals of the accumulated statistics gathered
- by applying the rules against packets going in and out of the
- firewall since it was last started, or since the last time the
- accumulators were reset to zero using ipf
+ IPF includes &man.ipfstat.8;
+ which can be used to retrieve
+ and display statistics which are gathered
+ as packets match rules as they go through the
+ firewall. Statistics are accumulated since the firewall was
+ last started or since the last time they
+ were reset to zero using ipf
-Z.
- Refer to &man.ipfstat.8; for details.
-
- The default &man.ipfstat.8; output will look something
+ The default ipfstat output looks
like this:input packets: blocked 99286 passed 1255609 nomatch 14686 counted 0
@@ -2540,58 +2540,47 @@ sh /etc/ipf.rules.scriptTCP RSTs sent: 0
+ ICMP replies: 0 TCP RSTs sent: 0
Result cache hits(in): 1215208 (out): 1098963
IN Pullups succeeded: 2 failed: 0
OUT Pullups succeeded: 0 failed: 0
Fastroute successes: 0 failures: 0
- TCP cksum fails(in): 0 (out): 0
+ TCP cksum fails(in): 0 (out): 0
Packet log flags set: (0)
- When supplied with either for inbound
+ Several options are available. When supplied with either for inbound
or for outbound, the command will retrieve
and display the appropriate list of filter rules currently
- installed and in use by the kernel.
-
- ipfstat -in displays the inbound
- internal rules table with rule numbers.
-
- ipfstat -on displays the outbound
- internal rules table with rule numbers.
-
- The output will look something like this:
+ installed and in use by the kernel. To also see the rule
+ numbers, include . For example,
+ ipfstat -on displays the outbound
+ rules table with rule numbers:@1 pass out on xl0 from any to any
@2 block out on dc0 from any to any
@3 pass out quick on dc0 proto tcp/udp from any to any keep state
- ipfstat -ih displays the inbound
- internal rules table, prefixing each rule with a count of how
- many times the rule was matched.
-
- ipfstat -oh displays the outbound
- internal rules table, prefixing each rule with a count of how
- many times the rule was matched.
-
- The output will look something like this:
+ Include to
+ prefix each rule with a count of how
+ many times the rule was matched. For example,
+ ipfstat -oh displays the outbound
+ internal rules table, prefixing each rule with its usage count:2451423 pass out on xl0 from any to any
354727 block out on dc0 from any to any
430918 pass out quick on dc0 proto tcp/udp from any to any keep state
- One of the most important options of
- ipfstat is which
- displays the state table in a way similar to how &man.top.1;
- shows the &os; running process table. When a firewall is
- under attack, this function provides the ability to identify
+ To display the state table in a format similar to &man.top.1;, use
+ ipfstat -t. When the firewall is
+ under attack, this option provides the ability to identify
and see the attacking packets. The optional sub-flags give
- the ability to select the destination or source IP, port, or
+ the ability to select the destination or source IP, port, or
protocol to be monitored in real time. Refer to
&man.ipfstat.8; for details.
- IPMON
+ IPF Loggingipmon
@@ -2601,17 +2590,16 @@ sh /etc/ipf.rules.scriptlogging
- In order for ipmon to work properly,
- the kernel option IPFILTER_LOG must be
- turned on. This command has two different modes. Native mode
- is the default mode when the command is used without
- .
-
- Daemon mode provides a continuous system log file so that
- logging of past events may be reviewed. &os; has a built in
- facility to automatically rotate system logs. This is why
- outputting the log information to &man.syslogd.8; is better
- than the default of outputting to a regular file. The default
+ IPF provides
+ ipmon, which can be used to write the firewall's logging
+ information in a human readable format. It requires that
+ options IPFILTER_LOG be first added
+ to a custom kernel using the instructions in .
+
+ This command is typically run in
+ daemon mode in order to provide a continuous system log file so that
+ logging of past events may be reviewed. Since &os; has a built in
+ &man.syslogd.8; facility to automatically rotate system logs, the default
rc.confipmon_flags statement uses
:
@@ -2623,48 +2611,38 @@ sh /etc/ipf.rules.scriptLogging provides the ability to review, after the fact,
information such as which packets were dropped, what addresses
- they came from and where they were going. These can all
- provide a significant edge in tracking down attackers.
+ they came from, and where they were going. This information
+ is useful in tracking down attackers.
- Even with the logging facility enabled, IPF will not
- generate any rule logging by default. The firewall
+ Once the logging facility is enabled in
+ rc.conf and started with service
+ ipmon start, IPF will only
+ log the rules which contain the log keyword. The firewall
administrator decides which rules in the ruleset should be
- logged and adds the log keyword to those rules. Normally,
- only deny rules are logged.
-
- It is customary to include a default deny
- everything rule with the log keyword included as the
+ logged and normally
+ only deny rules are logged. It is customary to include the
+ log keyword in the
last rule in the ruleset. This makes it possible to see all
the packets that did not match any of the rules in the
ruleset.
- &man.syslogd.8; uses its own method for segregation of log
- data. It uses groupings called facility and
- level. By default, IPMON in
- mode uses local0 as
- the facility name. The following levels can be
+ By default, ipmon -Ds mode uses
+ local0 as
+ the logging facility. The following logging levels can be
used to further segregate the logged data:LOG_INFO - packets logged using the "log" keyword as the action rather than pass or block.
LOG_NOTICE - packets logged which are also passed
LOG_WARNING - packets logged which are also blocked
-LOG_ERR - packets which have been logged and which can be considered short
+LOG_ERR - packets which have been logged and which can be considered short due to an incomplete header
-
-
- In order to setup IPFILTER to
+ In order to setup IPF to
log all data to /var/log/ipfilter.log,
first create the empty file:&prompt.root; touch /var/log/ipfilter.log
- &man.syslogd.8; is controlled by definition statements in
- /etc/syslog.conf. This file offers
- considerable flexibility in how
- syslog will deal with system
- messages issued by software applications like IPF.
-
- To write all logged messages to the specified file,
+ Then, to write all logged messages to the specified file,
add the following statement to
/etc/syslog.conf:
@@ -2674,7 +2652,7 @@ LOG_ERR - packets which have been logged
to read the modified /etc/syslog.conf,
run service syslogd reload.
- Do not forget to change
+ Do not forget to edit
/etc/newsyslog.conf to rotate the new
log file.
@@ -2702,23 +2680,12 @@ LOG_ERR - packets which have been logged
The group and rule number of the rule in the format
@0:17.
-
- These can be viewed with
- ipfstat -in.
-
- The action: p for passed,
b for blocked, S for
a short packet, n did not match any
- rules, and L for a log rule. The order
- of precedence in showing flags is: S,
- p, b,
- n, L. A capital
- P or B means that
- the packet has been logged due to a global logging
- setting, not a particular rule.
+ rules, and L for a log rule.
@@ -2746,10 +2713,10 @@ LOG_ERR - packets which have been logged
letters corresponding to any flags that were set. Refer to
&man.ipf.5; for a list of letters and their flags.
- If the packet is an ICMP packet, there will be two fields
- at the end: the first always being ICMP and
- the next being the ICMP message and sub-message type,
- separated by a slash. For example: ICMP 3/3 for a port
+ If the packet is an ICMP packet, there will be two fields
+ at the end: the first always being icmp and
+ the next being the ICMP message and sub-message type,
+ separated by a slash. For example: icmp 3/3 for a port
unreachable message.
From owner-svn-doc-all@FreeBSD.ORG Tue Feb 25 17:38:33 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 81464F2D;
Tue, 25 Feb 2014 17:38:33 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 687BF130F;
Tue, 25 Feb 2014 17:38:33 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1PHcXIJ026970;
Tue, 25 Feb 2014 17:38:33 GMT (envelope-from dru@svn.freebsd.org)
Received: (from dru@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1PHcXZR026969;
Tue, 25 Feb 2014 17:38:33 GMT (envelope-from dru@svn.freebsd.org)
Message-Id: <201402251738.s1PHcXZR026969@svn.freebsd.org>
From: Dru Lavigne
Date: Tue, 25 Feb 2014 17:38:33 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44053 - head/en_US.ISO8859-1/books/handbook/firewalls
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Tue, 25 Feb 2014 17:38:33 -0000
Author: dru
Date: Tue Feb 25 17:38:33 2014
New Revision: 44053
URL: http://svnweb.freebsd.org/changeset/doc/44053
Log:
Move the IPF chapter after the IPFW chapter.
Sponsored by: iXsystems
Modified:
head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Tue Feb 25 17:30:26 2014 (r44052)
+++ head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Tue Feb 25 17:38:33 2014 (r44053)
@@ -79,9 +79,8 @@
&os; has three firewalls built into the base system:
PF,
- IPFILTER, also known as
- IPF, and
- IPFW.
+ IPFW, and IPFILTER, also known as
+ IPF.
&os; also provides two traffic shapers for controlling bandwidth
usage: &man.altq.4; and &man.dummynet.4;.
ALTQ has
@@ -117,12 +116,12 @@
How to use and configure the
- IPFILTER firewall.
+ IPFW firewall.How to use and configure the
- IPFW firewall.
+ IPFILTER firewall.
@@ -1585,2294 +1584,2294 @@ block drop out quick on $ext_if from any
-
- IPFILTER (IPF)
+
+ IPFWfirewall
- IPFILTER
+ IPFW
- IPFILTER, also known as
- IPF, is a cross-platform, open source
- firewall which has been ported to several operating systems,
- including &os;, NetBSD, OpenBSD, and &solaris;.
-
- IPFILTER is a kernel-side
- firewall and NAT mechanism that can be
- controlled and monitored by userland programs. Firewall rules
- can be set or deleted using ipf,
- NAT rules can be set or deleted using
- ipnat, run-time statistics for the
- kernel parts of IPFILTER can be
- printed using ipfstat, and
- ipmon can be used to log
- IPFILTER actions to the system log
- files.
-
- IPF was originally written using
- a rule processing logic of the last matching rule
- wins and only used stateless rules. Since then,
- IPF has been enhanced to include the
- quick and keep state
- options.
-
- For a detailed explanation of the legacy rules processing
- method, refer to http://coombs.anu.edu.au/~avalon/ip-filter.html.
+ IPFW is a stateful firewall written for
+ &os; which also provides a traffic shaper, packet scheduler,
+ and in-kernel NAT.
- The IPF FAQ is at http://www.phildev.net/ipf/index.html.
- A searchable archive of the IPFilter mailing list is available
- at http://marc.info/?l=ipfilter.
+ &os; provides a sample ruleset in
+ /etc/rc.firewall. The sample ruleset
+ define several firewall types for common scenarios to assist
+ novice users in generating an appropriate ruleset.
+ &man.ipfw.8; provides a powerful syntax which advanced users can
+ use to craft customized rulesets that meet the security
+ requirements of a given environment.
- This section of the Handbook focuses on
- IPF as it pertains to FreeBSD. It
- provides examples of rules that contain the
- quick and keep state
- options.
+ IPFW is composed of several components: the kernel firewall
+ filter rule processor and its integrated packet accounting
+ facility, the logging facility, the
+ divert rule which triggers
+ NAT, the dummynet traffic shaper facilities,
+ the fwd rule forward facility, the bridge
+ facility, and the ipstealth facility. IPFW supports both IPv4
+ and IPv6.
-
- Enabling IPF
+
+ Enabling IPFW
- IPFILTER
+ IPFWenabling
- IPF is included in the basic
- &os; install as a kernel loadable module, meaning that a
- custom kernel is not needed in order to enable
- IPF.
+ IPFW is included in the basic &os; install as a run time
+ loadable module. The system will dynamically load the kernel
+ module when rc.conf contains the
+ statement firewall_enable="YES". After
+ rebooting the system, the following white highlighted message
+ is displayed on the screen as part of the boot process:
+
+ ipfw2 initialized, divert disabled, rule-based forwarding disabled, default to deny, logging disabled
+
+ The loadable module includes logging ability. To enable
+ logging and set the verbose logging limit, add these
+ statements to
+ /etc/sysctl.conf before rebooting:
+
+ net.inet.ip.fw.verbose=1
+net.inet.ip.fw.verbose_limit=5
+
+
+
+ Kernel Optionskernel options
- IPFILTER
+ IPFIREWALLkernel options
- IPFILTER_LOG
+ IPFIREWALL_VERBOSEkernel options
- IPFILTER_DEFAULT_BLOCK
+ IPFIREWALL_VERBOSE_LIMIT
- IPFILTER
+ IPFWkernel options
- For users who prefer to statically compile
- IPF support into a custom kernel,
- refer to the instructions in .
- The following kernel options are available:
-
- options IPFILTER
-options IPFILTER_LOG
-options IPFILTER_LOOKUP
-options IPFILTER_DEFAULT_BLOCK
-
- where options IPFILTER enables support
- for IPFILTER,
- options IPFILTER_LOG enables
- IPF logging using the
- ipl packet logging pseudo-device for
- every rule that has the log keyword,
- IPFILTER_LOOKUP enables
- IP pools in order to speed up
- IP lookups, and options
- IPFILTER_DEFAULT_BLOCK changes the default
- behavior so that any packet not matching a firewall
- pass rule gets blocked.
-
- To configure the system to enable
- IPF at boot time, add the following
- entries to /etc/rc.conf. These entries
- will also enable logging and default pass
- all. To change the default policy to
- block all without compiling a custom
- kernel, remember to add a block all rule at
- the end of the ruleset.
-
- ipfilter_enable="YES" # Start ipf firewall
-ipfilter_rules="/etc/ipf.rules" # loads rules definition text file
-ipmon_enable="YES" # Start IP monitor log
-ipmon_flags="-Ds" # D = start as daemon
- # s = log to syslog
- # v = log tcp window, ack, seq
- # n = map IP & port to names
+ For those users who wish to statically compile kernel
+ IPFW support, the following options are available for the
+ custom kernel configuration file:
- If NAT functionality is needed, also
- add these lines:
+ options IPFIREWALL
- gateway_enable="YES" # Enable as LAN gateway
-ipnat_enable="YES" # Start ipnat function
-ipnat_rules="/etc/ipnat.rules" # rules definition file for ipnat
+ This option enables IPFW as part of the kernel.
- Then, to start IPF now:
+ options IPFIREWALL_VERBOSE
- &prompt.root; service ipfilter start
+ This option enables logging of packets that pass through
+ IPFW and have the log keyword specified in
+ the ruleset.
- To load the firewall rules, specify the name of the
- ruleset file using ipf. The following
- command can be used to replace the currently running firewall
- rules:
+ options IPFIREWALL_VERBOSE_LIMIT=5
- &prompt.root; ipf -Fa -f /etc/ipf.rules
+ This option limits the number of packets logged through
+ &man.syslogd.8;, on a per-entry basis. This option may be
+ used in hostile environments, when firewall activity logging
+ is desired. This will close a possible denial of service
+ attack via syslog flooding.
- where flushes all the internal rules
- tables and specifies the file containing
- the rules to load.
+
+ kernel options
- This provides the ability to make changes to a custom
- ruleset and update the running firewall with a fresh copy of
- the rules without having to reboot the system. This method is
- convenient for testing new rules as the procedure can be
- executed as many times as needed.
+ IPFIREWALL_DEFAULT_TO_ACCEPT
+
- Refer to &man.ipf.8; for details on the other flags
- available with this command.
-
+ options IPFIREWALL_DEFAULT_TO_ACCEPT
-
- IPF Rule Syntax
+ This option allows everything to pass through the firewall
+ by default, which is a good idea when the firewall is being
+ set up for the first time.
- IPFILTER
+ kernel options
- rule syntax
+ IPDIVERT
- This section describes the IPF
- rule syntax used to create stateful rules. When creating
- rules, keep in mind that unless the quick
- keyword appears in a rule, every rule is read in order, with
- the last matching rule being the one
- that is applied. This means that even if the first rule to
- match a packet is a pass, if there is a
- later matching rule that is a block, the
- packet will be dropped. Sample rulesets can be found in
- /usr/share/examples/ipfilter.
+ options IPDIVERT
- When creating rules, a # character is
- used to mark the start of a comment and may appear at the end
- of a rule, to explain that rule's function, or on its own
- line. Any blank lines are ignored.
+ This option enables the use of NAT
+ functionality.
- The keywords which are used in rules must be written in a
- specific order, from left to right. Some keywords are
- mandatory while others are optional. Some keywords have
- sub-options which may be keywords themselves and also include
- more sub-options. The keyword order is as follows, where the
- words shown in uppercase represent a variable and the words
- shown in lowercase must precede the variable that follows
- it:
+
+ The firewall will block all incoming and outgoing
+ packets if either the
+ IPFIREWALL_DEFAULT_TO_ACCEPT kernel
+ option or a rule to explicitly allow these connections is
+ missing.
+
+
- ACTION DIRECTION OPTIONS proto PROTO_TYPE
- from SRC_ADDR SRC_PORT to DST_ADDR DST_PORT
- TCP_FLAG|ICMP_TYPE keep state STATE
+
+ /etc/rc.conf Options
- This section describes each of these keywords and their
- options. It is not an exhaustive list of every possible
- option. Refer to &man.ipf.5; for a complete description of
- the rule syntax that can be used when creating
- IPF rules and examples for using
- each keyword.
+ Enables the firewall:
-
-
- ACTION
-
- The action keyword indicates what to do with the
- packet if it matches that rule. Every rule
- must have an action. The
- following actions are recognized:
+ firewall_enable="YES"
- block: drops the packet.
+ To select one of the default firewall types provided by
+ &os;, select one by reading
+ /etc/rc.firewall and specify it in
+ the following:
- pass: allows the packet.
+ firewall_type="open"
- log: generates a log
- record.
+ Available values for this setting are:
- count: counts the number of
- packets and bytes which can provide an indication of
- how often a rule is used.
+
+
+ open: passes all traffic.
+
+
+ client: protects only this
+ machine.
+
+
+ simple: protects the whole
+ network.
+
+
+ closed: entirely disables IP
+ traffic except for the loopback interface.
+
+
+ UNKNOWN: disables the loading of
+ firewall rules.
+
+
+ filename:
+ absolute path of the file containing the firewall
+ rules.
+
+
- auth: queues the packet for
- further processing by another program.
+ Two methods are available for loading custom
+ ipfw rules. One is to set the
+ firewall_type variable to the absolute
+ path of the file which contains the firewall rules.
- call: provides access to
- functions built into IPF that
- allow more complex actions.
+ The other method is to set the
+ firewall_script variable to the absolute
+ path of an executable script that includes
+ ipfw commands. A ruleset script that
+ blocks all incoming and outgoing traffic would look like
+ this:
- decapsulate: removes any headers
- in order to process the contents of the packet.
-
-
+ #!/bin/sh
-
- DIRECTION
-
- Next, each rule must explicitly state the direction
- of traffic using one of these keywords:
+ipfw -q flush
- in: the rule is applied against
- an inbound packet.
+ipfw add deny in
+ipfw add deny out
- out: the rule is applied against
- an outbound packet.
+
+ If firewall_type is set to either
+ client or simple,
+ modify the default rules found in
+ /etc/rc.firewall to fit the
+ configuration of the system. The examples used in this
+ section assume that the firewall_script
+ is set to /etc/ipfw.rules.
+
- all: the rule applies to either
- direction.
+ Enable logging:
- If the system has multiple interfaces, the interface
- can be specified along with the direction. An example
- would be in on fxp0.
-
-
+ firewall_logging="YES"
-
- OPTIONS
-
- Options are optional. However, if multiple options
- are specified, they must be used in the order shown
- here.
+
+ firewall_logging sets the
+ net.inet.ip.fw.verbose sysctl
+ variable to the value of 1. There is no
+ rc.conf variable to set log
+ limitations, but the desired value can be set using
+ sysctl or by adding the following
+ variable and desired value to
+ /etc/sysctl.conf:
- log: when performing the
- specified ACTION, the contents of the packet's headers
- will be written to the &man.ipl.4; packet log
- pseudo-device.
+ net.inet.ip.fw.verbose_limit=5
+
- quick: if a packet matches this
- rule, the ACTION specified by the rule occurs and no
- further processing of any following rules will occur for
- this packet.
+ If the machine is acting as a gateway providing
+ NAT using &man.natd.8;,
+ refer to for information
+ regarding the required /etc/rc.conf
+ options.
+
- on: must be followed by the
- interface name as displayed by &man.ifconfig.8;. The
- rule will only match if the packet is going through the
- specified interface in the specified direction.
+
+ The IPFW Command
- When using the
- log keyword, the following qualifiers
- may be used in this order:
+ ipfw
- body: indicates that the first
- 128 bytes of the packet contents will be logged after
- the headers.
+ ipfw can be used to make manual,
+ single rule additions or deletions to the active firewall
+ while it is running. The problem with using this method is
+ that all the changes are lost when the system reboots. It is
+ recommended to instead write all the rules in a file and to
+ use that file to load the rules at boot time and to replace
+ the currently running firewall rules whenever that file
+ changes.
- first: if the
- log keyword is being used in
- conjunction with a keep state option,
- this option is recommended so that only the triggering
- packet is logged and not every packet which matches the
- stateful connection.
+ ipfw is a useful way to display the
+ running firewall rules to the console screen. The IPFW
+ accounting facility dynamically creates a counter for each
+ rule that counts each packet that matches the rule. During
+ the process of testing a rule, listing the rule with its
+ counter is one way to determine if the rule is
+ functioning as expected.
- Additional options are available to specify error
- return messages. Refer to &man.ipf.5; for more
- details.
+ To list all the running rules in sequence:
-
-
+ &prompt.root; ipfw list
-
- PROTO_TYPE
-
- The protocol type is optional. However, it is
- mandatory if the rule needs to specify a SRC_PORT or
- a DST_PORT as it defines the type of protocol. When
- specifying the type of protocol, use the
- proto keyword followed by either a
- protocol number or name from
- /etc/protocols.
- Example protocol names include tcp,
- udp, or icmp. If
- PROTO_TYPE is specified but no SRC_PORT or DST_PORT is
- specified, all port numbers for that protocol will match
- that rule.
-
-
+ To list all the running rules with a time stamp of when
+ the last time the rule was matched:
-
- SRC_ADDR
-
- The from keyword is mandatory and
- is followed by a keyword which represents the source of
- the packet. The source can be a hostname, an
- IP address followed by the
- CIDR mask, an address pool, or the
- keyword all. Refer to &man.ipf.5;
- for examples.
+ &prompt.root; ipfw -t list
- There is no way to match ranges of
- IP addresses which do not express
- themselves easily using the dotted numeric form /
- mask-length notation. The
- net-mgmt/ipcalc package or port may
- be used to ease the calculation of the
- CIDR mask. Additional information is
- available at the utility's web page: http://jodies.de/ipcalc.
-
-
+ The next example lists accounting information and the
+ packet count for matched rules along with the rules
+ themselves. The first column is the rule number, followed by
+ the number of matched packets and bytes, followed by the rule
+ itself.
-
- SRC_PORT
-
- The port number of the source is optional. However,
- if it is used, it requires PROTO_TYPE to be first
- defined in the rule. The port number must also be
- preceded by the proto keyword.
+ &prompt.root; ipfw -a list
- A number of different comparison operators are
- supported: = (equal to),
- != (not equal to),
- < (less than),
- > (greater than),
- <= (less than or equal to), and
- >= (greater than or equal
- to).
+ To list dynamic rules in addition to static rules:
- To specify port ranges, place the two port numbers
- between <> (less than and
- greater than ), >< (greater
- than and less than ), or : (greater
- than or equal to and less than or equal to).
-
-
+ &prompt.root; ipfw -d list
-
- DST_ADDR
-
- The to keyword is mandatory and
- is followed by a keyword which represents the
- destination of the packet. Similar to SRC_ADDR, it can
- be a hostname, an IP address
- followed by the CIDR mask, an address
- pool, or the keyword all.
-
-
+ To also show the expired dynamic rules:
-
- DST_PORT
-
- Similar to SRC_PORT, the port number of the
- destination is optional. However, if it is used, it
- requires PROTO_TYPE to be first defined in the rule.
- The port number must also be preceded by the
- proto keyword.
-
-
+ &prompt.root; ipfw -d -e list
-
- TCP_FLAG|ICMP_TYPE
-
- If tcp is specifed as the
- PROTO_TYPE, flags can be specified as letters, where
- each letter represents one of the possible
- TCP flags used to determine the state
- of a connection. Possible values are:
- S (SYN),
- A (ACK),
- P (PSH),
- F (FIN),
- U (URG),
- R (RST),
- C (CWN), and
- E (ECN).
-
- If icmp is specifed as the
- PROTO_TYPE, the ICMP type to match
- can be specified. Refer to &man.ipf.5; for the
- allowable types.
-
-
+ To zero the counters:
-
- STATE
-
- If a pass rule contains
- keep state,
- IPF will add an entry to its
- dynamic state table and allow subsequent packets that
- match the connection.
- IPF can track state for
- TCP, UDP, and
- ICMP sessions. Any packet that
- IPF can be certain is part of
- an active session, even if it is a different protocol,
- will be allowed.
+ &prompt.root; ipfw zero
- In IPF, packets destined
- to go out through the interface connected to the public
- Internet are first checked against the dynamic state
- table. If the packet matches the next expected packet
- comprising an active session conversation, it exits the
- firewall and the state of the session conversation flow
- is updated in the dynamic state table. Packets that do
- not belong to an already active session are checked
- against the outbound ruleset. Packets coming in from
- the interface connected to the public Internet are first
- checked against the dynamic state table. If the packet
- matches the next expected packet comprising an active
- session, it exits the firewall and the state of the
- session conversation flow is updated in the dynamic
- state table. Packets that do not belong to an already
- active session are checked against the inbound
- ruleset.
+ To zero the counters for just the rule with number
+ NUM:
- Several keywords can be added after
- keep state. If used, these keywords
- set various options that control stateful filtering,
- such as setting connection limits or connection age.
- Refer to &man.ipf.5; for the list of available options
- and their descriptions.
-
-
-
+ &prompt.root; ipfw zero NUM
-
- Example Ruleset
+
+ IPFW Rulesets
- This section demonstrates how to create an example ruleset
- which only allows services matching
- pass rules and blocks all others.
+
+ IPFW
- &os; uses the loopback interface
- (lo0) and the IP
- address 127.0.0.1
- for internal communication. The firewall ruleset must contain
- rules to allow free movement of these internally used
- packets:
+ rule processing order
+
- # no restrictions on loopback interface
-pass in quick on lo0 all
-pass out quick on lo0 all
+ When a packet enters the IPFW firewall,
+ it is compared against the first rule in the ruleset and
+ progresses one rule at a time, moving from top to bottom of
+ the set in ascending rule number sequence order. When the
+ packet matches the selection parameters of a rule, the rule's
+ action field value is executed and the search of the ruleset
+ terminates for that packet. This is referred to as
+ first match wins. If the packet does not match
+ any of the rules, it gets caught by the mandatory IPFW default
+ rule, number 65535, which denies all packets and silently
+ discards them. However, if the packet matches a rule that
+ contains the count,
+ skipto, or tee keywords,
+ the search continues. Refer to &man.ipfw.8; for details on
+ how these keywords affect rule processing.
- The public interface connected to the Internet is used to
- authorize and control access of all outbound and inbound
- connections. If one or more interfaces are cabled to private
- networks, those internal interfaces may require rules to allow
- packets originating from the LAN to flow
- between the internal networks or to the interface attached to
- the Internet. The ruleset should be organized into three
- major sections: any trusted internal interfaces, outbound
- connections through the public interface, and inbound
- connections through the public interface.
+ The examples in this section create an inclusive type
+ firewall ruleset containing the stateful keep
+ state, limit,
+ in, out and
+ via options. For a complete rule syntax
+ description, refer to &man.ipfw.8;.
- These two rules allow all traffic to pass through a
- trusted LAN interface named
- xl0:
+
+ Be careful when working with firewall rules, as it is
+ easy to lock out even the administrator.
+
- # no restrictions on inside LAN interface for private network
-pass out quick on xl0 all
-pass in quick on xl0 all
+
+ Rule Syntax
- The rules for the public interface's outbound and inbound
- sections should have the most frequently matched rules placed
- before less commonly matched rules, with the last rule in the
- section blocking and logging all packets for that interface
- and direction.
+
+ IPFW
- This set of rules defines the outbound section of the
- public interface named dc0. These rules
- keep state and identify the specific services that internal
- systems are authorized for public Internet access. All the
- rules use quick and specify the
- appropriate port numbers and, where applicable, destination
- addresses.
+ rule syntax
+
- # interface facing Internet (outbound)
-# Matches session start requests originating from or behind the
-# firewall, destined for the Internet.
+ This section describes the keywords which comprise an
+ IPFW rule. Keywords must be written in
+ the following order. # is used to mark
+ the start of a comment and may appear at the end of a rule
+ line or on its own line. Blank lines are ignored.
-# Allow outbound access to public DNS servers.
-# Replace x.x.x. with address listed in /etc/resolv.conf.
-# Repeat for each DNS server.
-pass out quick on dc0 proto tcp from any to x.x.x. port = 53 flags S keep state
-pass out quick on dc0 proto udp from any to xxx port = 53 keep state
+ CMD RULE_NUMBER ACTION LOGGING SELECTION
+ STATEFUL
-# Allow access to ISP's specified DHCP server for cable or DSL networks.
-# Use the first rule, then check log for the IP address of DHCP server.
-# Then, uncomment the second rule, replace z.z.z.z with the IP address,
-# and comment out the first rule
-pass out log quick on dc0 proto udp from any to any port = 67 keep state
-#pass out quick on dc0 proto udp from any to z.z.z.z port = 67 keep state
+
+ CMD
-# Allow HTTP and HTTPS
-pass out quick on dc0 proto tcp from any to any port = 80 flags S keep state
-pass out quick on dc0 proto tcp from any to any port = 443 flags S keep state
+ Each new rule has to be prefixed with
+ add to add the rule to the internal
+ table.
+
-# Allow email
-pass out quick on dc0 proto tcp from any to any port = 110 flags S keep state
-pass out quick on dc0 proto tcp from any to any port = 25 flags S keep state
+
+ RULE_NUMBER
-# Allow NTP
-pass out quick on dc0 proto tcp from any to any port = 37 flags S keep state
+ Each rule is associated with a rule_number in the
+ range of 1 to
+ 65535.
+
-# Allow FTP
-pass out quick on dc0 proto tcp from any to any port = 21 flags S keep state
+
+ ACTION
-# Allow SSH
-pass out quick on dc0 proto tcp from any to any port = 22 flags S keep state
+ A rule can be associated with one of the following
+ actions. The specified action will be executed when the
+ packet matches the selection criterion of the rule.
-# Allow ping
-pass out quick on dc0 proto icmp from any to any icmp-type 8 keep state
+ allow | accept | pass |
+ permit
-# Block and log everything else
-block out log first quick on dc0 all
+ These keywords are equivalent as they allow packets
+ that match the rule to exit the firewall rule processing.
+ The search terminates at this rule.
- This example of the rules in the inbound section of the
- public interface blocks all undesirable packets first. This
- reduces the number of packets that are logged by the last
- rule.
+ check-state
- # interface facing Internet (inbound)
-# Block all inbound traffic from non-routable or reserved address spaces
-block in quick on dc0 from 192.168.0.0/16 to any #RFC 1918 private IP
-block in quick on dc0 from 172.16.0.0/12 to any #RFC 1918 private IP
-block in quick on dc0 from 10.0.0.0/8 to any #RFC 1918 private IP
-block in quick on dc0 from 127.0.0.0/8 to any #loopback
-block in quick on dc0 from 0.0.0.0/8 to any #loopback
-block in quick on dc0 from 169.254.0.0/16 to any #DHCP auto-config
-block in quick on dc0 from 192.0.2.0/24 to any #reserved for docs
-block in quick on dc0 from 204.152.64.0/23 to any #Sun cluster interconnect
-block in quick on dc0 from 224.0.0.0/3 to any #Class D & E multicast
+ Checks the packet against the dynamic rules table.
+ If a match is found, execute the action associated with
+ the rule which generated this dynamic rule, otherwise
+ move to the next rule. A check-state
+ rule does not have selection criterion. If no
+ check-state rule is present in the
+ ruleset, the dynamic rules table is checked at the first
+ keep-state or limit
+ rule.
-# Block fragments and too short tcp packets
-block in quick on dc0 all with frags
-block in quick on dc0 proto tcp all with short
+ deny | drop
-# block source routed packets
-block in quick on dc0 all with opt lsrr
-block in quick on dc0 all with opt ssrr
+ Both words mean the same thing, which is to discard
+ packets that match this rule. The search
+ terminates.
+
-# Block OS fingerprint attempts and log first occurrence
-block in log first quick on dc0 proto tcp from any to any flags FUP
+
+ Logging
-# Block anything with special options
-block in quick on dc0 all with ipopts
+ When a packet matches a rule with the
+ log keyword, a message will be logged
+ to &man.syslogd.8; with a facility name of
+ SECURITY. Logging only occurs if the
+ number of packets logged for that particular rule does not
+ exceed the logamount parameter. If no
+ logamount is specified, the limit is
+ taken from the sysctl value of
+ net.inet.ip.fw.verbose_limit. In both
+ cases, a value of zero removes the logging limit. Once
+ the limit is reached, logging can be re-enabled by
+ clearing the logging counter or the packet counter for
+ that rule, using ipfw reset log.
-# Block public pings and ident
-block in quick on dc0 proto icmp all icmp-type 8
-block in quick on dc0 proto tcp from any to any port = 113
+
+ Logging is done after all other packet matching
+ conditions have been met, and before performing the
+ final action on the packet. The administrator decides
+ which rules to enable logging on.
+
+
-# Block incoming Netbios services
-block in log first quick on dc0 proto tcp/udp from any to any port = 137
-block in log first quick on dc0 proto tcp/udp from any to any port = 138
-block in log first quick on dc0 proto tcp/udp from any to any port = 139
-block in log first quick on dc0 proto tcp/udp from any to any port = 81
+
+ Selection
- Any time there are logged messages on a rule with
- the log first option, run
- ipfstat -hio to evaluate how many times the
- rule has been matched. A large number of matches may indicate
- that the system is under attack.
+ The keywords described in this section are used to
+ describe attributes of the packet to be checked when
+ determining whether rules match the packet or not.
+ The following general-purpose attributes are provided for
+ matching, and must be used in this order:
- The rest of the rules in the inbound section define which
- connections are allowed to be initiated from the Internet.
- The last rule denies all connections which were not explicitly
- allowed by previous rules in this section.
+ udp | tcp | icmp
- # Allow traffic in from ISP's DHCP server. Replace z.z.z.z with
-# the same IP address used in the outbound section.
-pass in quick on dc0 proto udp from z.z.z.z to any port = 68 keep state
+ Any other protocol names found in
+ /etc/protocols can be used. The
+ value specified is the protocol to be matched against.
+ This is a mandatory keyword.
-# Allow public connections to specified internal web server
-pass in quick on dc0 proto tcp from any to x.x.x.x port = 80 flags S keep state
+ from src to dst
-# Block and log only first occurrence of all remaining traffic.
-block in log first quick on dc0 all
-
+ The from and to
+ keywords are used to match against IP addresses. Rules
+ must specify both source and
+ destination parameters. any is a
+ special keyword that matches any IP address.
+ me is a special keyword that matches
+ any IP address configured on an interface in the &os;
+ system to represent the PC the firewall is running on.
+ Example usage includes from me to any,
+ from any to me,
+ from 0.0.0.0/0 to any,
+ from any to 0.0.0.0/0,
+ from 0.0.0.0 to any,
+ from any to 0.0.0.0,
+ and from me to 0.0.0.0. IP addresses
+ are specified in dotted IP address format followed by the
+ mask in CIDR notation, or as a single host in dotted IP
+ address format. This keyword is a mandatory requirement.
+ The net-mgmt/ipcalc port may be used to
+ assist the mask calculation.
-
- Configuring NAT
+ port number
- NAT
+ For protocols which support port numbers, such as
+ TCP and UDP, it
+ is mandatory to include the port number of the service
+ that will be matched. Service names from
+ /etc/services may be used instead
+ of numeric port values.
-
- IP masquerading
+ in | out
- NAT
-
*** DIFF OUTPUT TRUNCATED AT 1000 LINES ***
From owner-svn-doc-all@FreeBSD.ORG Tue Feb 25 17:59:16 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id E64AA64E;
Tue, 25 Feb 2014 17:59:16 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id C3DD6152B;
Tue, 25 Feb 2014 17:59:16 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1PHxGko034902;
Tue, 25 Feb 2014 17:59:16 GMT (envelope-from dru@svn.freebsd.org)
Received: (from dru@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1PHxGbF034901;
Tue, 25 Feb 2014 17:59:16 GMT (envelope-from dru@svn.freebsd.org)
Message-Id: <201402251759.s1PHxGbF034901@svn.freebsd.org>
From: Dru Lavigne
Date: Tue, 25 Feb 2014 17:59:16 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44054 - head/en_US.ISO8859-1/books/handbook/firewalls
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Tue, 25 Feb 2014 17:59:17 -0000
Author: dru
Date: Tue Feb 25 17:59:16 2014
New Revision: 44054
URL: http://svnweb.freebsd.org/changeset/doc/44054
Log:
Initial prep work for IPFW section so that it starts to match layout
of other firewall sections.
Many more commits to come.
Sponsored by: iXsystems
Modified:
head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Tue Feb 25 17:38:33 2014 (r44053)
+++ head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Tue Feb 25 17:59:16 2014 (r44054)
@@ -1639,10 +1639,6 @@ block drop out quick on $ext_if from any
net.inet.ip.fw.verbose=1
net.inet.ip.fw.verbose_limit=5
-
-
-
- Kernel Optionskernel options
@@ -1720,12 +1716,8 @@ net.inet.ip.fw.verbose_limit=5
-
-
- /etc/rc.conf Options
-
- Enables the firewall:
+ The following /etc/rc.conf option enables the firewall:firewall_enable="YES"
@@ -1876,7 +1868,7 @@ ipfw add deny out
- IPFW Rulesets
+ IPFW Rule SyntaxIPFW
@@ -1907,14 +1899,6 @@ ipfw add deny out
via options. For a complete rule syntax
description, refer to &man.ipfw.8;.
-
- Be careful when working with firewall rules, as it is
- easy to lock out even the administrator.
-
-
-
- Rule Syntax
-
IPFW
@@ -1930,25 +1914,28 @@ ipfw add deny out
CMD RULE_NUMBER ACTION LOGGING SELECTION
STATEFUL
-
- CMD
-
+
+
+ CMD
+ Each new rule has to be prefixed with
add to add the rule to the internal
table.
-
-
-
- RULE_NUMBER
+
+
+
+ RULE_NUMBER
+ Each rule is associated with a rule_number in the
range of 1 to
65535.
-
-
-
- ACTION
+
+
+
+ ACTION
+ A rule can be associated with one of the following
actions. The specified action will be executed when the
packet matches the selection criterion of the rule.
@@ -1977,11 +1964,12 @@ ipfw add deny out
Both words mean the same thing, which is to discard
packets that match this rule. The search
terminates.
-
-
-
- Logging
+
+
+
+ Logging
+ When a packet matches a rule with the
log keyword, a message will be logged
to &man.syslogd.8; with a facility name of
@@ -2002,11 +1990,12 @@ ipfw add deny out
final action on the packet. The administrator decides
which rules to enable logging on.
-
-
-
- Selection
+
+
+
+ Selection
+ The keywords described in this section are used to
describe attributes of the packet to be checked when
determining whether rules match the packet or not.
@@ -2087,18 +2076,12 @@ ipfw add deny out
specified. limit and
keep-state can not be used on the same
rule as they provide the same stateful function.
-
-
-
-
- Stateful Rule Option
-
-
- IPFW
-
- stateful filtering
-
+
+
+
+ Stateful Rule Option
+ The check-state option is used to
identify where in the IPFW ruleset the packet is to be
tested against the dynamic rules facility. On a match, the
@@ -2119,7 +2102,9 @@ ipfw add deny out
combination occurred. If this count is greater than the
value specified by limit, the packet is
discarded.
-
+
+
+
Logging Firewall Messages
From owner-svn-doc-all@FreeBSD.ORG Tue Feb 25 18:57:41 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 02F29EE2;
Tue, 25 Feb 2014 18:57:41 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id C82831C04;
Tue, 25 Feb 2014 18:57:40 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1PIveOf059587;
Tue, 25 Feb 2014 18:57:40 GMT (envelope-from dru@svn.freebsd.org)
Received: (from dru@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1PIvexO059586;
Tue, 25 Feb 2014 18:57:40 GMT (envelope-from dru@svn.freebsd.org)
Message-Id: <201402251857.s1PIvexO059586@svn.freebsd.org>
From: Dru Lavigne
Date: Tue, 25 Feb 2014 18:57:40 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44055 - head/en_US.ISO8859-1/books/handbook/firewalls
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Tue, 25 Feb 2014 18:57:41 -0000
Author: dru
Date: Tue Feb 25 18:57:40 2014
New Revision: 44055
URL: http://svnweb.freebsd.org/changeset/doc/44055
Log:
Start editorial review. To be continued tomorrow.
Sponsored by: iXsystems
Modified:
head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Tue Feb 25 17:59:16 2014 (r44054)
+++ head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Tue Feb 25 18:57:40 2014 (r44055)
@@ -1585,7 +1585,7 @@ block drop out quick on $ext_if from any
- IPFW
+ IPFWfirewall
@@ -1593,52 +1593,39 @@ block drop out quick on $ext_if from any
IPFW
- IPFW is a stateful firewall written for
- &os; which also provides a traffic shaper, packet scheduler,
- and in-kernel NAT.
+ IPFW is a stateful firewall written for
+ &os; which supports both IPv4
+ and IPv6. It is comprised of several components: the kernel firewall
+ filter rule processor and its integrated packet accounting
+ facility, the logging facility,
+ NAT, the &man.dummynet.4; traffic shaper,
+ a forward facility, a bridge
+ facility, and an ipstealth facility.&os; provides a sample ruleset in
- /etc/rc.firewall. The sample ruleset
- define several firewall types for common scenarios to assist
+ /etc/rc.firewall which
+ defines several firewall types for common scenarios to assist
novice users in generating an appropriate ruleset.
- &man.ipfw.8; provides a powerful syntax which advanced users can
+ IPFW provides a powerful syntax which advanced users can
use to craft customized rulesets that meet the security
requirements of a given environment.
-
- IPFW is composed of several components: the kernel firewall
- filter rule processor and its integrated packet accounting
- facility, the logging facility, the
- divert rule which triggers
- NAT, the dummynet traffic shaper facilities,
- the fwd rule forward facility, the bridge
- facility, and the ipstealth facility. IPFW supports both IPv4
- and IPv6.
+
+ This section describes how to enable
+ IPFW, provides an overview of its
+ rule syntax, and demonstrates several rulesets for common
+ configuration scenarios.
- Enabling IPFW
+ Enabling IPFW
- IPFW
+ IPFWenabling
- IPFW is included in the basic &os; install as a run time
- loadable module. The system will dynamically load the kernel
- module when rc.conf contains the
- statement firewall_enable="YES". After
- rebooting the system, the following white highlighted message
- is displayed on the screen as part of the boot process:
-
- ipfw2 initialized, divert disabled, rule-based forwarding disabled, default to deny, logging disabled
-
- The loadable module includes logging ability. To enable
- logging and set the verbose logging limit, add these
- statements to
- /etc/sysctl.conf before rebooting:
-
- net.inet.ip.fw.verbose=1
-net.inet.ip.fw.verbose_limit=5
+ IPFW is included in the basic &os; install as a kernel
+ loadable module, meaning that a custom kernel is not needed in order to enable IPFW.kernel options
@@ -1659,76 +1646,35 @@ net.inet.ip.fw.verbose_limit=5
- IPFW
+ IPFWkernel options
- For those users who wish to statically compile kernel
- IPFW support, the following options are available for the
+ For those users who wish to statically compile
+ IPFW support into a custom kernel,
+ refer to the instructions in .
+ The following options are available for the
custom kernel configuration file:
- options IPFIREWALL
-
- This option enables IPFW as part of the kernel.
-
- options IPFIREWALL_VERBOSE
-
- This option enables logging of packets that pass through
- IPFW and have the log keyword specified in
- the ruleset.
-
- options IPFIREWALL_VERBOSE_LIMIT=5
-
- This option limits the number of packets logged through
- &man.syslogd.8;, on a per-entry basis. This option may be
- used in hostile environments, when firewall activity logging
- is desired. This will close a possible denial of service
- attack via syslog flooding.
-
-
- kernel options
-
- IPFIREWALL_DEFAULT_TO_ACCEPT
-
-
- options IPFIREWALL_DEFAULT_TO_ACCEPT
+ options IPFIREWALL # enables IPFW
+options IPFIREWALL_VERBOSE # enables logging for rules with log keyword
+options IPFIREWALL_VERBOSE_LIMIT=5 # limits number of logged packets per-entry
+options IPFIREWALL_DEFAULT_TO_ACCEPT # sets default policy to pass what is not explicitly denied
+options IPDIVERT # enables NAT
- This option allows everything to pass through the firewall
- by default, which is a good idea when the firewall is being
- set up for the first time.
-
-
- kernel options
-
- IPDIVERT
-
-
- options IPDIVERT
-
- This option enables the use of NAT
- functionality.
-
-
- The firewall will block all incoming and outgoing
- packets if either the
- IPFIREWALL_DEFAULT_TO_ACCEPT kernel
- option or a rule to explicitly allow these connections is
- missing.
-
-
- The following /etc/rc.conf option enables the firewall:
+ To configure the system to enable
+ IPFW at boot time, add the
+ following entry to /etc/rc.conf:firewall_enable="YES"
- To select one of the default firewall types provided by
- &os;, select one by reading
- /etc/rc.firewall and specify it in
- the following:
+ To use one of the default firewall types provided by
+ &os;, add another line which specifies the type:firewall_type="open"
- Available values for this setting are:
+ The available values for this setting are:
@@ -1747,27 +1693,27 @@ net.inet.ip.fw.verbose_limit=5
+ workstation: protects only this
+ machine using stateful rules.
+
+ UNKNOWN: disables the loading of
firewall rules.filename:
- absolute path of the file containing the firewall
+ full path of the file containing the firewall
rules.
- Two methods are available for loading custom
- ipfw rules. One is to set the
- firewall_type variable to the absolute
- path of the file which contains the firewall rules.
-
- The other method is to set the
+ To instead load a custom ruleset, either
+ set the filename value of
+ firewall_type or set the
firewall_script variable to the absolute
path of an executable script that includes
- ipfw commands. A ruleset script that
- blocks all incoming and outgoing traffic would look like
- this:
+ IPFW commands. This example script
+ blocks all incoming and outgoing traffic:#!/bin/sh
@@ -1811,7 +1757,7 @@ ipfw add deny out
- The IPFW Command
+ The IPFW Commandipfw
@@ -1825,7 +1771,7 @@ ipfw add deny out
changes.
ipfw is a useful way to display the
- running firewall rules to the console screen. The IPFW
+ running firewall rules to the console screen. The IPFW
accounting facility dynamically creates a counter for each
rule that counts each packet that matches the rule. During
the process of testing a rule, listing the rule with its
@@ -1868,10 +1814,10 @@ ipfw add deny out
- IPFW Rule Syntax
+ IPFW Rule Syntax
- IPFW
+ IPFWrule processing order
@@ -1884,7 +1830,7 @@ ipfw add deny out
action field value is executed and the search of the ruleset
terminates for that packet. This is referred to as
first match wins. If the packet does not match
- any of the rules, it gets caught by the mandatory IPFW default
+ any of the rules, it gets caught by the mandatory IPFW default
rule, number 65535, which denies all packets and silently
discards them. However, if the packet matches a rule that
contains the count,
@@ -1900,13 +1846,13 @@ ipfw add deny out
description, refer to &man.ipfw.8;.
- IPFW
+ IPFWrule syntaxThis section describes the keywords which comprise an
- IPFW rule. Keywords must be written in
+ IPFW rule. Keywords must be written in
the following order. # is used to mark
the start of a comment and may appear at the end of a rule
line or on its own line. Blank lines are ignored.
@@ -2083,7 +2029,7 @@ ipfw add deny out
Stateful Rule OptionThe check-state option is used to
- identify where in the IPFW ruleset the packet is to be
+ identify where in the IPFW ruleset the packet is to be
tested against the dynamic rules facility. On a match, the
packet exits the firewall to continue on its way and a new
rule is dynamically created for the next anticipated packet
@@ -2094,7 +2040,7 @@ ipfw add deny out
The dynamic rules facility is vulnerable to resource
depletion from a SYN-flood attack which would open a huge
number of dynamic rules. To counter this type of attack
- with IPFW, use limit.
+ with IPFW, use limit.
This keyword limits the number of simultaneous sessions by
checking that rule's source or destinations fields and using
the packet's IP address in a search of the open dynamic
@@ -2110,12 +2056,12 @@ ipfw add deny out
Logging Firewall Messages
- IPFW
+ IPFWlogging
- Even with the logging facility enabled, IPFW will not
+ Even with the logging facility enabled, IPFW will not
generate any rule logging on its own. The firewall
administrator decides which rules in the ruleset will be
logged, and adds the log keyword to those
@@ -2156,7 +2102,7 @@ ipfw add deny out
Building a Rule Script
- Most experienced IPFW users create a file containing
+ Most experienced IPFW users create a file containing
the rules and code them in a manner compatible with running
them as a script. The major benefit of doing this is the
firewall rules can be refreshed in mass without the need
@@ -2416,17 +2362,17 @@ pif="dc0" # public interface name of
NAT
- and IPFW
+ and IPFWThere are some additional configuration statements that
need to be enabled to activate the NAT
- function of IPFW. For a customized kernel, the kernel
+ function of IPFW. For a customized kernel, the kernel
configuration file needs
option IPDIVERT added to the other
IPFIREWALL options.
- In addition to the normal IPFW options in
+ In addition to the normal IPFW options in
/etc/rc.conf, the following are
needed:
From owner-svn-doc-all@FreeBSD.ORG Tue Feb 25 19:00:36 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 2CE21CB;
Tue, 25 Feb 2014 19:00:36 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 184E91C2C;
Tue, 25 Feb 2014 19:00:36 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1PJ0ZI6063007;
Tue, 25 Feb 2014 19:00:35 GMT
(envelope-from blackend@svn.freebsd.org)
Received: (from blackend@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1PJ0Z6a063006;
Tue, 25 Feb 2014 19:00:35 GMT
(envelope-from blackend@svn.freebsd.org)
Message-Id: <201402251900.s1PJ0Z6a063006@svn.freebsd.org>
From: Marc Fonvieille
Date: Tue, 25 Feb 2014 19:00:35 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44056 - head/fr_FR.ISO8859-1/share/xml
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Tue, 25 Feb 2014 19:00:36 -0000
Author: blackend
Date: Tue Feb 25 19:00:35 2014
New Revision: 44056
URL: http://svnweb.freebsd.org/changeset/doc/44056
Log:
Fix translation of release dates.
PR: www/182877
Submitted by: malt
Modified:
head/fr_FR.ISO8859-1/share/xml/l10n.ent
Modified: head/fr_FR.ISO8859-1/share/xml/l10n.ent
==============================================================================
--- head/fr_FR.ISO8859-1/share/xml/l10n.ent Tue Feb 25 18:57:40 2014 (r44055)
+++ head/fr_FR.ISO8859-1/share/xml/l10n.ent Tue Feb 25 19:00:35 2014 (r44056)
@@ -11,8 +11,8 @@
-
-
+
+
From owner-svn-doc-all@FreeBSD.ORG Tue Feb 25 19:40:14 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 5DC2C277;
Tue, 25 Feb 2014 19:40:14 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 47A0310FE;
Tue, 25 Feb 2014 19:40:14 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1PJeE8w078961;
Tue, 25 Feb 2014 19:40:14 GMT (envelope-from dru@svn.freebsd.org)
Received: (from dru@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1PJeE0u078960;
Tue, 25 Feb 2014 19:40:14 GMT (envelope-from dru@svn.freebsd.org)
Message-Id: <201402251940.s1PJeE0u078960@svn.freebsd.org>
From: Dru Lavigne
Date: Tue, 25 Feb 2014 19:40:14 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44057 - head/en_US.ISO8859-1/books/handbook/firewalls
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Tue, 25 Feb 2014 19:40:14 -0000
Author: dru
Date: Tue Feb 25 19:40:13 2014
New Revision: 44057
URL: http://svnweb.freebsd.org/changeset/doc/44057
Log:
White space fix only. Translators can ignore.
Sponsored by: iXsystems
Modified:
head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Tue Feb 25 19:00:35 2014 (r44056)
+++ head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Tue Feb 25 19:40:13 2014 (r44057)
@@ -78,12 +78,11 @@
&os; has three firewalls built into the base system:
- PF,
- IPFW, and IPFILTER, also known as
- IPF.
- &os; also provides two traffic shapers for controlling bandwidth
- usage: &man.altq.4; and &man.dummynet.4;.
- ALTQ has
+ PF, IPFW,
+ and IPFILTER, also known as
+ IPF. &os; also provides two traffic
+ shapers for controlling bandwidth usage: &man.altq.4; and
+ &man.dummynet.4;. ALTQ has
traditionally been closely tied with
PF and
dummynet with
@@ -1593,23 +1592,23 @@ block drop out quick on $ext_if from any
IPFW
- IPFW is a stateful firewall written for
- &os; which supports both IPv4
- and IPv6. It is comprised of several components: the kernel firewall
- filter rule processor and its integrated packet accounting
- facility, the logging facility,
- NAT, the &man.dummynet.4; traffic shaper,
- a forward facility, a bridge
- facility, and an ipstealth facility.
+ IPFW is a stateful firewall
+ written for &os; which supports both IPv4 and
+ IPv6. It is comprised of several components:
+ the kernel firewall filter rule processor and its integrated
+ packet accounting facility, the logging facility,
+ NAT, the &man.dummynet.4; traffic shaper, a
+ forward facility, a bridge facility, and an ipstealth
+ facility.&os; provides a sample ruleset in
- /etc/rc.firewall which
- defines several firewall types for common scenarios to assist
- novice users in generating an appropriate ruleset.
- IPFW provides a powerful syntax which advanced users can
- use to craft customized rulesets that meet the security
- requirements of a given environment.
-
+ /etc/rc.firewall which defines several
+ firewall types for common scenarios to assist novice users in
+ generating an appropriate ruleset.
+ IPFW provides a powerful syntax which
+ advanced users can use to craft customized rulesets that meet
+ the security requirements of a given environment.
+
This section describes how to enable
IPFW, provides an overview of its
rule syntax, and demonstrates several rulesets for common
@@ -1624,8 +1623,10 @@ block drop out quick on $ext_if from any
enabling
- IPFW is included in the basic &os; install as a kernel
- loadable module, meaning that a custom kernel is not needed in order to enable IPFW.
+ IPFW is included in the basic
+ &os; install as a kernel loadable module, meaning that a
+ custom kernel is not needed in order to enable
+ IPFW.kernel options
@@ -1669,8 +1670,8 @@ options IPDIVERT # enables NATfirewall_enable="YES"
- To use one of the default firewall types provided by
- &os;, add another line which specifies the type:
+ To use one of the default firewall types provided by &os;,
+ add another line which specifies the type:firewall_type="open"
@@ -1701,19 +1702,18 @@ options IPDIVERT # enables NAT
- filename:
- full path of the file containing the firewall
- rules.
+ filename: full path of the file
+ containing the firewall rules.
- To instead load a custom ruleset, either
- set the filename value of
+ To instead load a custom ruleset, either set the
+ filename value of
firewall_type or set the
firewall_script variable to the absolute
path of an executable script that includes
- IPFW commands. This example script
- blocks all incoming and outgoing traffic:
+ IPFW commands. This example script blocks
+ all incoming and outgoing traffic:#!/bin/sh
@@ -1750,10 +1750,9 @@ ipfw add deny outIf the machine is acting as a gateway providing
- NAT using &man.natd.8;,
- refer to for information
- regarding the required /etc/rc.conf
- options.
+ NAT using &man.natd.8;, refer to for information regarding the
+ required /etc/rc.conf options.
@@ -1771,12 +1770,12 @@ ipfw add deny out
changes.
ipfw is a useful way to display the
- running firewall rules to the console screen. The IPFW
- accounting facility dynamically creates a counter for each
- rule that counts each packet that matches the rule. During
- the process of testing a rule, listing the rule with its
- counter is one way to determine if the rule is
- functioning as expected.
+ running firewall rules to the console screen. The
+ IPFW accounting facility
+ dynamically creates a counter for each rule that counts each
+ packet that matches the rule. During the process of testing a
+ rule, listing the rule with its counter is one way to
+ determine if the rule is functioning as expected.
To list all the running rules in sequence:
@@ -1830,13 +1829,14 @@ ipfw add deny out
action field value is executed and the search of the ruleset
terminates for that packet. This is referred to as
first match wins. If the packet does not match
- any of the rules, it gets caught by the mandatory IPFW default
- rule, number 65535, which denies all packets and silently
- discards them. However, if the packet matches a rule that
- contains the count,
- skipto, or tee keywords,
- the search continues. Refer to &man.ipfw.8; for details on
- how these keywords affect rule processing.
+ any of the rules, it gets caught by the mandatory
+ IPFW default rule, number 65535,
+ which denies all packets and silently discards them. However,
+ if the packet matches a rule that contains the
+ count, skipto, or
+ tee keywords, the search continues. Refer
+ to &man.ipfw.8; for details on how these keywords affect rule
+ processing.
The examples in this section create an inclusive type
firewall ruleset containing the stateful keep
@@ -1845,212 +1845,219 @@ ipfw add deny out
via options. For a complete rule syntax
description, refer to &man.ipfw.8;.
-
- IPFW
+
+ IPFW
- rule syntax
-
+ rule syntax
+
- This section describes the keywords which comprise an
- IPFW rule. Keywords must be written in
- the following order. # is used to mark
- the start of a comment and may appear at the end of a rule
- line or on its own line. Blank lines are ignored.
+ This section describes the keywords which comprise an
+ IPFW rule. Keywords must be
+ written in the following order. # is used
+ to mark the start of a comment and may appear at the end of a
+ rule line or on its own line. Blank lines are ignored.
- CMD RULE_NUMBER ACTION LOGGING SELECTION
- STATEFUL
+ CMD RULE_NUMBER ACTION LOGGING SELECTION
+ STATEFUL
-
-
+
+ CMD
- Each new rule has to be prefixed with
- add to add the rule to the internal
- table.
-
-
+ Each new rule has to be prefixed with
+ add to add the rule to the
+ internal table.
+
+ RULE_NUMBER
- Each rule is associated with a rule_number in the
- range of 1 to
- 65535.
-
-
+ Each rule is associated with a rule_number in the
+ range of 1 to
+ 65535.
+
+
ACTION
- A rule can be associated with one of the following
- actions. The specified action will be executed when the
- packet matches the selection criterion of the rule.
-
- allow | accept | pass |
- permit
-
- These keywords are equivalent as they allow packets
- that match the rule to exit the firewall rule processing.
- The search terminates at this rule.
-
- check-state
-
- Checks the packet against the dynamic rules table.
- If a match is found, execute the action associated with
- the rule which generated this dynamic rule, otherwise
- move to the next rule. A check-state
- rule does not have selection criterion. If no
- check-state rule is present in the
- ruleset, the dynamic rules table is checked at the first
- keep-state or limit
- rule.
-
- deny | drop
-
- Both words mean the same thing, which is to discard
- packets that match this rule. The search
- terminates.
-
-
+ A rule can be associated with one of the following
+ actions. The specified action will be executed when the
+ packet matches the selection criterion of the
+ rule.
+
+ allow | accept | pass |
+ permit
+
+ These keywords are equivalent as they allow packets
+ that match the rule to exit the firewall rule
+ processing. The search terminates at this rule.
+
+ check-state
+
+ Checks the packet against the dynamic rules table.
+ If a match is found, execute the action associated with
+ the rule which generated this dynamic rule, otherwise
+ move to the next rule. A check-state
+ rule does not have selection criterion. If no
+ check-state rule is present in the
+ ruleset, the dynamic rules table is checked at the first
+ keep-state or
+ limit rule.
+
+ deny | drop
+
+ Both words mean the same thing, which is to discard
+ packets that match this rule. The search
+ terminates.
+
+
Logging
- When a packet matches a rule with the
- log keyword, a message will be logged
- to &man.syslogd.8; with a facility name of
- SECURITY. Logging only occurs if the
- number of packets logged for that particular rule does not
- exceed the logamount parameter. If no
- logamount is specified, the limit is
- taken from the sysctl value of
- net.inet.ip.fw.verbose_limit. In both
- cases, a value of zero removes the logging limit. Once
- the limit is reached, logging can be re-enabled by
- clearing the logging counter or the packet counter for
- that rule, using ipfw reset log.
-
-
- Logging is done after all other packet matching
- conditions have been met, and before performing the
- final action on the packet. The administrator decides
- which rules to enable logging on.
-
-
-
+ When a packet matches a rule with the
+ log keyword, a message will be logged
+ to &man.syslogd.8; with a facility name of
+ SECURITY. Logging only occurs if the
+ number of packets logged for that particular rule does
+ not exceed the logamount parameter.
+ If no logamount is specified, the
+ limit is taken from the sysctl value
+ of net.inet.ip.fw.verbose_limit. In
+ both cases, a value of zero removes the logging limit.
+ Once the limit is reached, logging can be re-enabled by
+ clearing the logging counter or the packet counter for
+ that rule, using ipfw reset
+ log.
+
+
+ Logging is done after all other packet matching
+ conditions have been met, and before performing the
+ final action on the packet. The administrator decides
+ which rules to enable logging on.
+
+
+
Selection
- The keywords described in this section are used to
- describe attributes of the packet to be checked when
- determining whether rules match the packet or not.
- The following general-purpose attributes are provided for
- matching, and must be used in this order:
-
- udp | tcp | icmp
-
- Any other protocol names found in
- /etc/protocols can be used. The
- value specified is the protocol to be matched against.
- This is a mandatory keyword.
-
- from src to dst
-
- The from and to
- keywords are used to match against IP addresses. Rules
- must specify both source and
- destination parameters. any is a
- special keyword that matches any IP address.
- me is a special keyword that matches
- any IP address configured on an interface in the &os;
- system to represent the PC the firewall is running on.
- Example usage includes from me to any,
- from any to me,
- from 0.0.0.0/0 to any,
- from any to 0.0.0.0/0,
- from 0.0.0.0 to any,
- from any to 0.0.0.0,
- and from me to 0.0.0.0. IP addresses
- are specified in dotted IP address format followed by the
- mask in CIDR notation, or as a single host in dotted IP
- address format. This keyword is a mandatory requirement.
- The net-mgmt/ipcalc port may be used to
- assist the mask calculation.
-
- port number
-
- For protocols which support port numbers, such as
- TCP and UDP, it
- is mandatory to include the port number of the service
- that will be matched. Service names from
- /etc/services may be used instead
- of numeric port values.
-
- in | out
-
- Matches incoming or outgoing packets. It is mandatory
- that one or the other is included as part of the rule
- matching criterion.
-
- via IF
-
- Matches packets going through the interface specified
- by device name. The via keyword causes
- the interface to always be checked as part of the match
- process.
-
- setup
-
- This mandatory keyword identifies the session start
- request for TCP packets.
-
- keep-state
-
- This is a mandatory keyword. Upon a match, the
- firewall will create a dynamic rule, whose default
- behavior is to match bidirectional traffic between source
- and destination IP/port using the same protocol.
-
- limit {src-addr | src-port | dst-addr |
- dst-port}
-
- The firewall will only allow
- N connections with the same
- set of parameters as specified in the rule. One or more
- of source and destination addresses and ports can be
- specified. limit and
- keep-state can not be used on the same
- rule as they provide the same stateful function.
-
-
+ The keywords described in this section are used to
+ describe attributes of the packet to be checked when
+ determining whether rules match the packet or not. The
+ following general-purpose attributes are provided for
+ matching, and must be used in this order:
+
+ udp | tcp | icmp
+
+ Any other protocol names found in
+ /etc/protocols can be used. The
+ value specified is the protocol to be matched against.
+ This is a mandatory keyword.
+
+ from src to dst
+
+ The from and
+ to keywords are used to match against
+ IP addresses. Rules must specify
+ both source and destination
+ parameters. any is a special keyword
+ that matches any IP address. me is a
+ special keyword that matches any IP address configured
+ on an interface in the &os; system to represent the PC
+ the firewall is running on. Example usage includes
+ from me to any,
+ from any to me,
+ from 0.0.0.0/0 to any,
+ from any to 0.0.0.0/0,
+ from 0.0.0.0 to any,
+ from any to 0.0.0.0, and
+ from me to 0.0.0.0. IP addresses
+ are specified in dotted IP address format followed by
+ the mask in CIDR notation, or as a single host in dotted
+ IP address format. This keyword is a mandatory
+ requirement. The net-mgmt/ipcalc
+ port may be used to assist the mask calculation.
+
+ port number
+
+ For protocols which support port numbers, such as
+ TCP and UDP, it is
+ mandatory to include the port number of the service
+ that will be matched. Service names from
+ /etc/services may be used instead
+ of numeric port values.
+
+ in | out
+
+ Matches incoming or outgoing packets. It is
+ mandatory that one or the other is included as part of
+ the rule matching criterion.
+
+ via IF
+
+ Matches packets going through the interface
+ specified by device name. The via
+ keyword causes the interface to always be checked as
+ part of the match process.
+
+ setup
+
+ This mandatory keyword identifies the session start
+ request for TCP packets.
+
+ keep-state
+
+ This is a mandatory keyword. Upon a match, the
+ firewall will create a dynamic rule, whose default
+ behavior is to match bidirectional traffic between
+ source and destination IP/port using the same
+ protocol.
+
+ limit {src-addr | src-port | dst-addr |
+ dst-port}
+
+ The firewall will only allow
+ N connections with the same
+ set of parameters as specified in the rule. One or more
+ of source and destination addresses and ports can be
+ specified. limit and
+ keep-state can not be used on the
+ same rule as they provide the same stateful
+ function.
+
+
-
- Stateful Rule Option
-
- The check-state option is used to
- identify where in the IPFW ruleset the packet is to be
- tested against the dynamic rules facility. On a match, the
- packet exits the firewall to continue on its way and a new
- rule is dynamically created for the next anticipated packet
- being exchanged during this session. On a no match, the
- packet advances to the next rule in the ruleset for
- testing.
-
- The dynamic rules facility is vulnerable to resource
- depletion from a SYN-flood attack which would open a huge
- number of dynamic rules. To counter this type of attack
- with IPFW, use limit.
- This keyword limits the number of simultaneous sessions by
- checking that rule's source or destinations fields and using
- the packet's IP address in a search of the open dynamic
- rules, counting the number of times this rule and IP address
- combination occurred. If this count is greater than the
- value specified by limit, the packet is
- discarded.
-
-
-
+
+ Stateful Rule Option
+
+ The check-state option is used to
+ identify where in the IPFW
+ ruleset the packet is to be tested against the dynamic
+ rules facility. On a match, the packet exits the
+ firewall to continue on its way and a new rule is
+ dynamically created for the next anticipated packet
+ being exchanged during this session. On a no match, the
+ packet advances to the next rule in the ruleset for
+ testing.
+
+ The dynamic rules facility is vulnerable to resource
+ depletion from a SYN-flood attack which would open a
+ huge number of dynamic rules. To counter this type of
+ attack with IPFW, use
+ limit. This keyword limits the
+ number of simultaneous sessions by checking that rule's
+ source or destinations fields and using the packet's IP
+ address in a search of the open dynamic rules, counting
+ the number of times this rule and IP address
+ combination occurred. If this count is greater than the
+ value specified by limit, the packet
+ is discarded.
+
+
+
Logging Firewall Messages
@@ -2061,16 +2068,17 @@ ipfw add deny out
logging
- Even with the logging facility enabled, IPFW will not
- generate any rule logging on its own. The firewall
- administrator decides which rules in the ruleset will be
- logged, and adds the log keyword to those
- rules. Normally only deny rules are logged. It is
- customary to duplicate the ipfw default deny
- everything rule with the log
- keyword included as the last rule in the ruleset. This
- way, it is possible to see all the packets that did not
- match any of the rules in the ruleset.
+ Even with the logging facility enabled,
+ IPFW will not generate any rule
+ logging on its own. The firewall administrator decides
+ which rules in the ruleset will be logged, and adds the
+ log keyword to those rules. Normally
+ only deny rules are logged. It is customary to duplicate
+ the ipfw default deny everything rule with
+ the log keyword included as the last rule
+ in the ruleset. This way, it is possible to see all the
+ packets that did not match any of the rules in the
+ ruleset.Logging is a two edged sword. If one is not careful,
an over abundance of log data or a DoS attack can fill the
@@ -2102,15 +2110,15 @@ ipfw add deny out
Building a Rule Script
- Most experienced IPFW users create a file containing
- the rules and code them in a manner compatible with running
- them as a script. The major benefit of doing this is the
- firewall rules can be refreshed in mass without the need
- of rebooting the system to activate them. This method is
- convenient in testing new rules as the procedure can
- be executed as many times as needed. Being a script,
- symbolic substitution can be used for frequently used
- values to be substituted into multiple rules.
+ Most experienced IPFW users
+ create a file containing the rules and code them in a manner
+ compatible with running them as a script. The major benefit
+ of doing this is the firewall rules can be refreshed in mass
+ without the need of rebooting the system to activate them.
+ This method is convenient in testing new rules as the
+ procedure can be executed as many times as needed. Being a
+ script, symbolic substitution can be used for frequently
+ used values to be substituted into multiple rules.This example script is compatible with the syntax used
by the &man.sh.1;, &man.csh.1;, and &man.tcsh.1; shells.
@@ -2367,12 +2375,13 @@ pif="dc0" # public interface name of
There are some additional configuration statements that
need to be enabled to activate the NAT
- function of IPFW. For a customized kernel, the kernel
- configuration file needs
+ function of IPFW. For a
+ customized kernel, the kernel configuration file needs
option IPDIVERT added to the other
IPFIREWALL options.
- In addition to the normal IPFW options in
+ In addition to the normal
+ IPFW options in
/etc/rc.conf, the following are
needed:
@@ -2380,10 +2389,9 @@ pif="dc0" # public interface name of
natd_interface="rl0" # interface name of public Internet NIC
natd_flags="-dynamic -m" # -m = preserve port numbers if possible
- Utilizing stateful rules with a
- divert natd rule complicates the ruleset
- logic. The positioning of the
- check-state, and
+ Utilizing stateful rules with a divert
+ natd rule complicates the ruleset logic. The
+ positioning of the check-state, and
divert natd rules in the ruleset is
critical and a new action type is used, called
skipto. When using
@@ -3442,8 +3450,9 @@ map dc0 10.0.10.0/29 -> 0/32NAT if they match the third rule.Without the FTP proxy, the following
- firewall rules would instead be needed. Note that without the proxy,
- all ports above 1024 need to be allowed:
+ firewall rules would instead be needed. Note that without the
+ proxy, all ports above 1024 need to be
+ allowed:# Allow out LAN PC client FTP to public Internet
# Active and passive modes
@@ -3455,13 +3464,13 @@ pass out quick on rl0 proto tcp from any
# Active mode let data channel in from FTP server
pass in quick on rl0 proto tcp from any to any port = 20 flags S keep state
- Whenever the file containing the NAT rules
- is edited, run
- ipnat with to delete
- the current NAT rules and flush the
- contents of the dynamic translation table. Include
- and specify the name
- of the NAT ruleset to load:
+ Whenever the file containing the NAT
+ rules is edited, run ipnat with
+ to delete the current
+ NAT rules and flush the contents of the
+ dynamic translation table. Include and
+ specify the name of the NAT ruleset to
+ load:&prompt.root; ipnat -CF -f /etc/ipnat.rules
@@ -3633,35 +3642,35 @@ sh /etc/ipf.rules.script
- Several options are available. When supplied with either for inbound
- or for outbound, the command will retrieve
- and display the appropriate list of filter rules currently
- installed and in use by the kernel. To also see the rule
- numbers, include . For example,
- ipfstat -on displays the outbound
- rules table with rule numbers:
+ Several options are available. When supplied with either
+ for inbound or for
+ outbound, the command will retrieve and display the
+ appropriate list of filter rules currently installed and in
+ use by the kernel. To also see the rule numbers, include
+ . For example, ipfstat
+ -on displays the outbound rules table with rule
+ numbers:@1 pass out on xl0 from any to any
@2 block out on dc0 from any to any
@3 pass out quick on dc0 proto tcp/udp from any to any keep state
- Include to
- prefix each rule with a count of how
- many times the rule was matched. For example,
- ipfstat -oh displays the outbound
- internal rules table, prefixing each rule with its usage count:
+ Include to prefix each rule with a
+ count of how many times the rule was matched. For example,
+ ipfstat -oh displays the outbound internal
+ rules table, prefixing each rule with its usage count:2451423 pass out on xl0 from any to any
354727 block out on dc0 from any to any
430918 pass out quick on dc0 proto tcp/udp from any to any keep state
- To display the state table in a format similar to &man.top.1;, use
- ipfstat -t. When the firewall is
- under attack, this option provides the ability to identify
- and see the attacking packets. The optional sub-flags give
- the ability to select the destination or source IP, port, or
- protocol to be monitored in real time. Refer to
- &man.ipfstat.8; for details.
+ To display the state table in a format similar to
+ &man.top.1;, use ipfstat -t. When the
+ firewall is under attack, this option provides the ability to
+ identify and see the attacking packets. The optional
+ sub-flags give the ability to select the destination or source
+ IP, port, or protocol to be monitored in
+ real time. Refer to &man.ipfstat.8; for details.
@@ -3676,16 +3685,17 @@ sh /etc/ipf.rules.script
IPF provides
- ipmon, which can be used to write the firewall's logging
- information in a human readable format. It requires that
- options IPFILTER_LOG be first added
- to a custom kernel using the instructions in .
-
- This command is typically run in
- daemon mode in order to provide a continuous system log file so that
- logging of past events may be reviewed. Since &os; has a built in
- &man.syslogd.8; facility to automatically rotate system logs, the default
- rc.conf
+ ipmon, which can be used to write the
+ firewall's logging information in a human readable format. It
+ requires that options IPFILTER_LOG be first
+ added to a custom kernel using the instructions in .
+
+ This command is typically run in daemon mode in order to
+ provide a continuous system log file so that logging of past
+ events may be reviewed. Since &os; has a built in
+ &man.syslogd.8; facility to automatically rotate system logs,
+ the default rc.confipmon_flags statement uses
:
@@ -3701,20 +3711,19 @@ sh /etc/ipf.rules.scriptOnce the logging facility is enabled in
rc.conf and started with service
- ipmon start, IPF will only
- log the rules which contain the log keyword. The firewall
- administrator decides which rules in the ruleset should be
- logged and normally
- only deny rules are logged. It is customary to include the
- log keyword in the
- last rule in the ruleset. This makes it possible to see all
- the packets that did not match any of the rules in the
- ruleset.
+ ipmon start, IPF will
+ only log the rules which contain the log
+ keyword. The firewall administrator decides which rules in
+ the ruleset should be logged and normally only deny rules are
+ logged. It is customary to include the
+ log keyword in the last rule in the
+ ruleset. This makes it possible to see all the packets that
+ did not match any of the rules in the ruleset.
By default, ipmon -Ds mode uses
- local0 as
- the logging facility. The following logging levels can be
- used to further segregate the logged data:
+ local0 as the logging facility. The
+ following logging levels can be used to further segregate the
+ logged data:
LOG_INFO - packets logged using the "log" keyword as the action rather than pass or block.
LOG_NOTICE - packets logged which are also passed
@@ -3798,11 +3807,13 @@ LOG_ERR - packets which have been logged
letters corresponding to any flags that were set. Refer to
&man.ipf.5; for a list of letters and their flags.
- If the packet is an ICMP packet, there will be two fields
- at the end: the first always being icmp and
- the next being the ICMP message and sub-message type,
- separated by a slash. For example: icmp 3/3 for a port
- unreachable message.
+ If the packet is an ICMP packet, there
+ will be two fields at the end: the first always being
+ icmp and the next being the
+ ICMP message and sub-message type,
+ separated by a slash. For example:
+ icmp 3/3 for a port unreachable
+ message.
-
+
From owner-svn-doc-all@FreeBSD.ORG Tue Feb 25 19:40:48 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 72D892D6;
Tue, 25 Feb 2014 19:40:48 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 5E1251102;
Tue, 25 Feb 2014 19:40:48 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1PJemwM079366;
Tue, 25 Feb 2014 19:40:48 GMT (envelope-from pluknet@svn.freebsd.org)
Received: (from pluknet@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1PJemV0079365;
Tue, 25 Feb 2014 19:40:48 GMT (envelope-from pluknet@svn.freebsd.org)
Message-Id: <201402251940.s1PJemV0079365@svn.freebsd.org>
From: Sergey Kandaurov
Date: Tue, 25 Feb 2014 19:40:48 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44058 - head/ru_RU.KOI8-R/share/xml
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Tue, 25 Feb 2014 19:40:48 -0000
Author: pluknet
Date: Tue Feb 25 19:40:47 2014
New Revision: 44058
URL: http://svnweb.freebsd.org/changeset/doc/44058
Log:
Update translation of release dates.
Modified:
head/ru_RU.KOI8-R/share/xml/l10n.ent
Modified: head/ru_RU.KOI8-R/share/xml/l10n.ent
==============================================================================
--- head/ru_RU.KOI8-R/share/xml/l10n.ent Tue Feb 25 19:40:13 2014 (r44057)
+++ head/ru_RU.KOI8-R/share/xml/l10n.ent Tue Feb 25 19:40:47 2014 (r44058)
@@ -25,7 +25,7 @@
-
+
@@ -41,7 +41,7 @@
-
+
@@ -53,7 +53,7 @@
-
+
From owner-svn-doc-all@FreeBSD.ORG Tue Feb 25 20:03:50 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 3FAC48EE;
Tue, 25 Feb 2014 20:03:50 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 2B974130F;
Tue, 25 Feb 2014 20:03:50 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1PK3oeu090510;
Tue, 25 Feb 2014 20:03:50 GMT (envelope-from pluknet@svn.freebsd.org)
Received: (from pluknet@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1PK3oq3090509;
Tue, 25 Feb 2014 20:03:50 GMT (envelope-from pluknet@svn.freebsd.org)
Message-Id: <201402252003.s1PK3oq3090509@svn.freebsd.org>
From: Sergey Kandaurov
Date: Tue, 25 Feb 2014 20:03:50 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44059 - head/en_US.ISO8859-1/htdocs/releases
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Tue, 25 Feb 2014 20:03:50 -0000
Author: pluknet
Date: Tue Feb 25 20:03:49 2014
New Revision: 44059
URL: http://svnweb.freebsd.org/changeset/doc/44059
Log:
Fix typo.
Modified:
head/en_US.ISO8859-1/htdocs/releases/index.xml
Modified: head/en_US.ISO8859-1/htdocs/releases/index.xml
==============================================================================
--- head/en_US.ISO8859-1/htdocs/releases/index.xml Tue Feb 25 19:40:47 2014 (r44058)
+++ head/en_US.ISO8859-1/htdocs/releases/index.xml Tue Feb 25 20:03:49 2014 (r44059)
@@ -31,7 +31,7 @@
Currently Supported Releases
-
Complete information about the release date, the classifcation
+
Complete information about the release date, the classification
type, and the estimated End-Of-Life (EOL) for currently supported
releases can be found on the Supported Releases
From owner-svn-doc-all@FreeBSD.ORG Tue Feb 25 22:01:30 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id D41CD9ED;
Tue, 25 Feb 2014 22:01:30 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id BBEAC10C5;
Tue, 25 Feb 2014 22:01:30 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1PM1UYm038472;
Tue, 25 Feb 2014 22:01:30 GMT (envelope-from pluknet@svn.freebsd.org)
Received: (from pluknet@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1PM1UMG038471;
Tue, 25 Feb 2014 22:01:30 GMT (envelope-from pluknet@svn.freebsd.org)
Message-Id: <201402252201.s1PM1UMG038471@svn.freebsd.org>
From: Sergey Kandaurov
Date: Tue, 25 Feb 2014 22:01:30 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44060 - head/ru_RU.KOI8-R/htdocs/releases
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-Mailman-Approved-At: Tue, 25 Feb 2014 22:51:14 +0000
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Tue, 25 Feb 2014 22:01:30 -0000
Author: pluknet
Date: Tue Feb 25 22:01:30 2014
New Revision: 44060
URL: http://svnweb.freebsd.org/changeset/doc/44060
Log:
MFen:
r38209 -> r43583 releases/index.xml / except r41543
Modified:
head/ru_RU.KOI8-R/htdocs/releases/index.xml
Modified: head/ru_RU.KOI8-R/htdocs/releases/index.xml
==============================================================================
--- head/ru_RU.KOI8-R/htdocs/releases/index.xml Tue Feb 25 20:03:49 2014 (r44059)
+++ head/ru_RU.KOI8-R/htdocs/releases/index.xml Tue Feb 25 22:01:30 2014 (r44060)
@@ -7,108 +7,178 @@
-
+
&title;$FreeBSD$
-
+
+
-
-
-
*** DIFF OUTPUT TRUNCATED AT 1000 LINES ***
From owner-svn-doc-all@FreeBSD.ORG Wed Feb 26 01:08:17 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 8A6D8246;
Wed, 26 Feb 2014 01:08:17 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 741BA111A;
Wed, 26 Feb 2014 01:08:17 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1Q18HTv014668;
Wed, 26 Feb 2014 01:08:17 GMT (envelope-from wblock@svn.freebsd.org)
Received: (from wblock@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1Q18H5m014667;
Wed, 26 Feb 2014 01:08:17 GMT (envelope-from wblock@svn.freebsd.org)
Message-Id: <201402260108.s1Q18H5m014667@svn.freebsd.org>
From: Warren Block
Date: Wed, 26 Feb 2014 01:08:17 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44061 - head/en_US.ISO8859-1/books/handbook/mirrors
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 26 Feb 2014 01:08:17 -0000
Author: wblock
Date: Wed Feb 26 01:08:16 2014
New Revision: 44061
URL: http://svnweb.freebsd.org/changeset/doc/44061
Log:
Correct "svn" to Subversion when talking about the application, add
tags around protocol entries like svn, http, https, add markup
to some acronyms.
Modified:
head/en_US.ISO8859-1/books/handbook/mirrors/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/mirrors/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/mirrors/chapter.xml Tue Feb 25 22:01:30 2014 (r44060)
+++ head/en_US.ISO8859-1/books/handbook/mirrors/chapter.xml Wed Feb 26 01:08:16 2014 (r44061)
@@ -621,9 +621,9 @@ Comment out for now until these can be v
xlink:href="http://svnweb.FreeBSD.org/">http://svnweb.FreeBSD.org/.
- The &os; svn mirror network is still in its early days,
+ The &os; Subversion mirror network is still in its early days,
and will likely change. Do not count on this list of mirrors
- being static. In particular, the SSL certificates of the
+ being static. In particular, the SSL certificates of the
servers will likely change at some point.
@@ -641,7 +641,7 @@ Comment out for now until these can be v
Location
- SSL fingerprint
+ SSL Fingerprint
@@ -650,10 +650,10 @@ Comment out for now until these can be v
svn0.us-west.FreeBSD.org
- svn, http,
+ svn, http,
https
+ xlink:href="https://svn0.us-west.FreeBSD.org/">httpsUSA, California
@@ -665,10 +665,10 @@ Comment out for now until these can be v
svn0.us-east.FreeBSD.org
- svn, http,
+ svn, http,
https,
+ xlink:href="https://svn0.us-east.FreeBSD.org/">https,
rsyncUSA, New Jersey
@@ -681,10 +681,10 @@ Comment out for now until these can be v
svn0.eu.FreeBSD.org
- svn, http,
+ svn, http,
https,
+ xlink:href="https://svn0.eu.FreeBSD.org/">https,
rsyncEurope, UK
@@ -728,10 +728,10 @@ Certificate information:
the user will not be asked to verify the fingerprint again until
the certificate expires.
- If HTTPS cannot be used due to firewall
- or other problems, SVN is the next choice,
+ If https cannot be used due to firewall
+ or other problems, svn is the next choice,
with slightly faster transfers. When neither can be used, use
- HTTP.
+ HTTP.
From owner-svn-doc-all@FreeBSD.ORG Wed Feb 26 01:18:04 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 0D5A2680;
Wed, 26 Feb 2014 01:18:04 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id E009F11D3;
Wed, 26 Feb 2014 01:18:03 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1Q1I3XA018995;
Wed, 26 Feb 2014 01:18:03 GMT (envelope-from wblock@svn.freebsd.org)
Received: (from wblock@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1Q1I3IG018994;
Wed, 26 Feb 2014 01:18:03 GMT (envelope-from wblock@svn.freebsd.org)
Message-Id: <201402260118.s1Q1I3IG018994@svn.freebsd.org>
From: Warren Block
Date: Wed, 26 Feb 2014 01:18:03 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44062 - head/en_US.ISO8859-1/books/handbook/disks
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 26 Feb 2014 01:18:04 -0000
Author: wblock
Date: Wed Feb 26 01:18:03 2014
New Revision: 44062
URL: http://svnweb.freebsd.org/changeset/doc/44062
Log:
Replace markup with inside the growing disks
section.
Modified:
head/en_US.ISO8859-1/books/handbook/disks/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/disks/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/disks/chapter.xml Wed Feb 26 01:08:16 2014 (r44061)
+++ head/en_US.ISO8859-1/books/handbook/disks/chapter.xml Wed Feb 26 01:18:03 2014 (r44062)
@@ -295,7 +295,7 @@
List the partitions on the disk to see the current
configuration:
- &prompt.root; gpart show ada0
+ &prompt.root; gpart show ada0
=> 34 83886013 ada0 GPT (48G) [CORRUPT]
34 128 1 freebsd-boot (64k)
162 79691648 2 freebsd-ufs (38G)
@@ -312,7 +312,7 @@
partition table with
gpart:
- &prompt.root; gpart recover ada0
+ &prompt.root; gpart recover ada0
ada0 recovered
@@ -320,7 +320,7 @@ ada0 recovered
use by a new partition, or an existing partition can be
expanded:
- &prompt.root; gpart show ada0
+ &prompt.root; gpart show ada0
=> 34 102399933 ada0 GPT (48G)
34 128 1 freebsd-boot (64k)
162 79691648 2 freebsd-ufs (38G)
@@ -334,10 +334,10 @@ ada0 recovered
unmounted, deleted, and then recreated after resizing other
partitions.
- &prompt.root; swapoff /dev/ada0p3
-&prompt.root; gpart delete -i 3ada0
+ &prompt.root; swapoff /dev/ada0p3
+&prompt.root; gpart delete -i 3ada0
ada0p3 deleted
-&prompt.root; gpart show ada0
+&prompt.root; gpart show ada0
=> 34 102399933 ada0 GPT (48G)
34 128 1 freebsd-boot (64k)
162 79691648 2 freebsd-ufs (38G)
@@ -352,7 +352,7 @@ ada0p3 deleted
system can be resized after disabling GEOM safety
features:
- &prompt.root; sysctl kern.geom.debugflags=16
+ &prompt.root; sysctl kern.geom.debugflags=16Resize the partition, leaving room to recreate a swap
@@ -360,9 +360,9 @@ ada0p3 deleted
the partition. The file system in the partition will be
expanded in a separate step.
- &prompt.root; gpart resize -i 2 -a 4k -s 47Gada0
+ &prompt.root; gpart resize -i 2 -a 4k -s 47Gada0
ada0p2 resized
-&prompt.root; gpart show ada0
+&prompt.root; gpart show ada0
=> 34 102399933 ada0 GPT (48G)
34 128 1 freebsd-boot (64k)
162 98566144 2 freebsd-ufs (47G)
@@ -370,14 +370,14 @@ ada0p2 resized
Recreate the swap partition:
- &prompt.root; gpart add -t freebsd-swap -a 4k ada0
+ &prompt.root; gpart add -t freebsd-swap -a 4k ada0
ada0p3 added
-&prompt.root; gpart show ada0
+&prompt.root; gpart show ada0
=> 34 102399933 ada0 GPT (48G)
34 128 1 freebsd-boot (64k)
162 98566144 2 freebsd-ufs (47G)
98566306 3833661 3 freebsd-swap (1.8G)
-&prompt.root; swapon /dev/ada0p3
+&prompt.root; swapon /dev/ada0p3Grow the UFS file system to use the new
capacity of the resized partition:
@@ -388,7 +388,7 @@ ada0p3 added
versions, the file system must not be mounted.
- &prompt.root; growfs /dev/ada0p2
+ &prompt.root; growfs /dev/ada0p2
Device is mounted read-write; resizing will result in temporary write suspension for /.
It's strongly recommended to make a backup before growing the file system.
OK to grow file system on /dev/ada0p2, mounted on /, from 38GB to 47GB? [Yes/No] Yes
From owner-svn-doc-all@FreeBSD.ORG Wed Feb 26 01:36:00 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 56B3D283;
Wed, 26 Feb 2014 01:36:00 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 42257146A;
Wed, 26 Feb 2014 01:36:00 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1Q1a0hL026702;
Wed, 26 Feb 2014 01:36:00 GMT (envelope-from wblock@svn.freebsd.org)
Received: (from wblock@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1Q1a0W3026701;
Wed, 26 Feb 2014 01:36:00 GMT (envelope-from wblock@svn.freebsd.org)
Message-Id: <201402260136.s1Q1a0W3026701@svn.freebsd.org>
From: Warren Block
Date: Wed, 26 Feb 2014 01:36:00 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44063 - head/en_US.ISO8859-1/books/handbook/mirrors
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 26 Feb 2014 01:36:00 -0000
Author: wblock
Date: Wed Feb 26 01:35:59 2014
New Revision: 44063
URL: http://svnweb.freebsd.org/changeset/doc/44063
Log:
Fix reference to "http" as a lowercase literal to be consistent with the
previous sentence.
Modified:
head/en_US.ISO8859-1/books/handbook/mirrors/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/mirrors/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/mirrors/chapter.xml Wed Feb 26 01:18:03 2014 (r44062)
+++ head/en_US.ISO8859-1/books/handbook/mirrors/chapter.xml Wed Feb 26 01:35:59 2014 (r44063)
@@ -731,7 +731,7 @@ Certificate information:
If https cannot be used due to firewall
or other problems, svn is the next choice,
with slightly faster transfers. When neither can be used, use
- HTTP.
+ http.
From owner-svn-doc-all@FreeBSD.ORG Wed Feb 26 03:19:37 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 6F79848B;
Wed, 26 Feb 2014 03:19:37 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 50ED312BE;
Wed, 26 Feb 2014 03:19:37 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1Q3JbWm069107;
Wed, 26 Feb 2014 03:19:37 GMT (envelope-from wblock@svn.freebsd.org)
Received: (from wblock@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1Q3JbmO069106;
Wed, 26 Feb 2014 03:19:37 GMT (envelope-from wblock@svn.freebsd.org)
Message-Id: <201402260319.s1Q3JbmO069106@svn.freebsd.org>
From: Warren Block
Date: Wed, 26 Feb 2014 03:19:37 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44065 - head/en_US.ISO8859-1/books/fdp-primer/xml-primer
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 26 Feb 2014 03:19:37 -0000
Author: wblock
Date: Wed Feb 26 03:19:36 2014
New Revision: 44065
URL: http://svnweb.freebsd.org/changeset/doc/44065
Log:
Restore tags lost after DocBook 5 conversion.
Modified:
head/en_US.ISO8859-1/books/fdp-primer/xml-primer/chapter.xml
Modified: head/en_US.ISO8859-1/books/fdp-primer/xml-primer/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/fdp-primer/xml-primer/chapter.xml Wed Feb 26 02:33:59 2014 (r44064)
+++ head/en_US.ISO8859-1/books/fdp-primer/xml-primer/chapter.xml Wed Feb 26 03:19:36 2014 (r44065)
@@ -312,7 +312,7 @@
An element's attributes are written
inside the start tag for that element, and
take the form
- attribute-name="attribute-value".
+ attribute-name="attribute-value".
In XHTML, the p
element has an attribute called
@@ -615,9 +615,9 @@ example.xml:5: element head: validity er
superset) of XML.Otherwise, this string will either look like
- -//Owner
+ -//Owner
or
- +//Owner
+ +//Owner
(notice the only difference is the leading
+ or -).
@@ -898,7 +898,7 @@ example.xml:5: element head: validity er
To include the text of a general entity in the document,
include
- &entity-name;
+ &entity-name;
in the text. For example, consider a general entity called
current.version which expands to the
current version number of a product. To use it in the
@@ -962,7 +962,7 @@ example.xml:5: element head: validity er
Parameter entity definitons are similar to those for
general entities. However, parameter entries are included
with
- %entity-name;.
+ %entity-name;.
The definition also includes the % between
the ENTITY keyword and the name of the
entity.
@@ -1226,7 +1226,7 @@ example.xml:5: element head: validity er
Load example.html into the web
browser and confirm that the
- paran.xml
+ paran.xml
files have been included in
example.html.
@@ -1287,7 +1287,7 @@ example.xml:5: element head: validity er
Load example.html into the web
browser and confirm that the
- paran.xml
+ paran.xml
files have been included in
example.html.
From owner-svn-doc-all@FreeBSD.ORG Wed Feb 26 03:26:10 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 9532980D;
Wed, 26 Feb 2014 03:26:10 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 6816A1346;
Wed, 26 Feb 2014 03:26:10 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1Q3QAb0072762;
Wed, 26 Feb 2014 03:26:10 GMT (envelope-from wblock@svn.freebsd.org)
Received: (from wblock@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1Q3QAM4072761;
Wed, 26 Feb 2014 03:26:10 GMT (envelope-from wblock@svn.freebsd.org)
Message-Id: <201402260326.s1Q3QAM4072761@svn.freebsd.org>
From: Warren Block
Date: Wed, 26 Feb 2014 03:26:10 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44067 - head/en_US.ISO8859-1/books/fdp-primer/structure
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 26 Feb 2014 03:26:10 -0000
Author: wblock
Date: Wed Feb 26 03:26:09 2014
New Revision: 44067
URL: http://svnweb.freebsd.org/changeset/doc/44067
Log:
Restore tags lost in the DocBook5 conversion.
Modified:
head/en_US.ISO8859-1/books/fdp-primer/structure/chapter.xml
Modified: head/en_US.ISO8859-1/books/fdp-primer/structure/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/fdp-primer/structure/chapter.xml Wed Feb 26 03:21:15 2014 (r44066)
+++ head/en_US.ISO8859-1/books/fdp-primer/structure/chapter.xml Wed Feb 26 03:26:09 2014 (r44067)
@@ -94,7 +94,8 @@
- lang.encoding
+ lang.encodingOne directory exists for each available translation
and encoding of the documentation, for example
@@ -114,7 +115,7 @@
The
- lang.encoding/
+ lang.encoding/
DirectoriesThese directories contain the documents themselves. The
@@ -158,7 +159,7 @@
manFor translations of the system manual pages. This
- directory will contain one or more mann
+ directory will contain one or more mann
directories, corresponding to the sections that have
been translated.
@@ -166,7 +167,7 @@
- Not every lang.encoding
+ Not every lang.encoding
directory will have all of these subdirectories. It depends
on how much translation has been accomplished by that
translation team.
@@ -236,7 +237,7 @@
- directory/chapter.xml
+ directory/chapter.xmlEach chapter in the Handbook is stored in a file
called chapter.xml in a separate
From owner-svn-doc-all@FreeBSD.ORG Wed Feb 26 03:21:16 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 7F58756C;
Wed, 26 Feb 2014 03:21:16 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 6C47412C6;
Wed, 26 Feb 2014 03:21:16 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1Q3LGMG071044;
Wed, 26 Feb 2014 03:21:16 GMT (envelope-from wblock@svn.freebsd.org)
Received: (from wblock@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1Q3LGVA071043;
Wed, 26 Feb 2014 03:21:16 GMT (envelope-from wblock@svn.freebsd.org)
Message-Id: <201402260321.s1Q3LGVA071043@svn.freebsd.org>
From: Warren Block
Date: Wed, 26 Feb 2014 03:21:16 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44066 -
head/en_US.ISO8859-1/books/fdp-primer/editor-config
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 26 Feb 2014 03:21:16 -0000
Author: wblock
Date: Wed Feb 26 03:21:15 2014
New Revision: 44066
URL: http://svnweb.freebsd.org/changeset/doc/44066
Log:
Restore tags lost after DocBook 5 conversion.
Modified:
head/en_US.ISO8859-1/books/fdp-primer/editor-config/chapter.xml
Modified: head/en_US.ISO8859-1/books/fdp-primer/editor-config/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/fdp-primer/editor-config/chapter.xml Wed Feb 26 03:19:36 2014 (r44065)
+++ head/en_US.ISO8859-1/books/fdp-primer/editor-config/chapter.xml Wed Feb 26 03:21:15 2014 (r44066)
@@ -117,7 +117,7 @@ color ,yellow "^(.{71})|(TAB.{63})|(TAB{
Specify additional helpful options when running the
editor:
- &prompt.user; nano -AKipwz -r 70 -T8 chapter.xml
+ &prompt.user; nano -AKipwz -r 70 -T8 chapter.xmlUsers of &man.csh.1; can define an alias in
~/.cshrc to automate these
@@ -128,7 +128,7 @@ color ,yellow "^(.{71})|(TAB.{63})|(TAB{
After the alias is defined, the options will be added
automatically:
- &prompt.user; nano chapter.xml
+ &prompt.user; nano chapter.xml
From owner-svn-doc-all@FreeBSD.ORG Wed Feb 26 03:50:59 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 50F64382;
Wed, 26 Feb 2014 03:50:59 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 323F51516;
Wed, 26 Feb 2014 03:50:59 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1Q3oxgW082121;
Wed, 26 Feb 2014 03:50:59 GMT (envelope-from wblock@svn.freebsd.org)
Received: (from wblock@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1Q3owtx082115;
Wed, 26 Feb 2014 03:50:58 GMT (envelope-from wblock@svn.freebsd.org)
Message-Id: <201402260350.s1Q3owtx082115@svn.freebsd.org>
From: Warren Block
Date: Wed, 26 Feb 2014 03:50:58 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44069 - in head/en_US.ISO8859-1/books/fdp-primer:
docbook-markup examples overview the-website translations
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 26 Feb 2014 03:50:59 -0000
Author: wblock
Date: Wed Feb 26 03:50:57 2014
New Revision: 44069
URL: http://svnweb.freebsd.org/changeset/doc/44069
Log:
Restore tags lost during the DocBook5 conversion.
Modified:
head/en_US.ISO8859-1/books/fdp-primer/docbook-markup/chapter.xml
head/en_US.ISO8859-1/books/fdp-primer/examples/appendix.xml
head/en_US.ISO8859-1/books/fdp-primer/overview/chapter.xml
head/en_US.ISO8859-1/books/fdp-primer/the-website/chapter.xml
head/en_US.ISO8859-1/books/fdp-primer/translations/chapter.xml
Modified: head/en_US.ISO8859-1/books/fdp-primer/docbook-markup/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/fdp-primer/docbook-markup/chapter.xml Wed Feb 26 03:27:51 2014 (r44068)
+++ head/en_US.ISO8859-1/books/fdp-primer/docbook-markup/chapter.xml Wed Feb 26 03:50:57 2014 (r44069)
@@ -196,7 +196,7 @@
- &man.command.sectionnumber;
+ &man.command.sectionnumber;link to
command manual page in
section
@@ -232,7 +232,7 @@
- &a.listname;
+ &a.listname;link to
listnameEntities are defined for all the
- &url.books.bookname;
+ &url.books.bookname;relative path to
booknameEntities are defined for all the
- &url.articles.articlename;
+ &url.articles.articlename;relative path to
articlenameEntities are defined for all the
general
entities have been created to make this easier.
Each entity takes the form
- &man.manual-page.manual-section;.
+ &man.manual-page.manual-section;.
The file that contains these entities is in
doc/share/xml/man-refs.ent, and can be
@@ -1497,7 +1497,7 @@ This is the file called 'foo2'
When referring to the same command multiple times in
close proximity, it is preferred to use the
- &man.command.section;
+ &man.command.section;
notation to markup the first reference and use
command to markup subsequent references.
This makes the generated output, especially
@@ -1549,7 +1549,7 @@ This is the file called 'foo2'
Notice how the
- &man.command.section;
+ &man.command.section;
notation is easier to follow.
@@ -1980,7 +1980,7 @@ This is the file called 'foo2'
Appearance:The
- maxusers n
+ maxusers n
line in the kernel configuration file determines the size
of many system tables, and is a rough guide to how many
simultaneous logins the system will support.
Modified: head/en_US.ISO8859-1/books/fdp-primer/examples/appendix.xml
==============================================================================
--- head/en_US.ISO8859-1/books/fdp-primer/examples/appendix.xml Wed Feb 26 03:27:51 2014 (r44068)
+++ head/en_US.ISO8859-1/books/fdp-primer/examples/appendix.xml Wed Feb 26 03:50:57 2014 (r44069)
@@ -171,7 +171,7 @@
-c /usr/local/share/xml/docbook/catalog \
-c /usr/local/share/xml/jade/catalog \
-d /usr/local/share/xml/docbook/dsssl/modular/html/docbook.dsl \
- -t sgml file.xml > file.html
+ -t sgml file.xml > file.html
@@ -226,7 +226,7 @@
-c /usr/local/share/xml/docbook/catalog \
-c /usr/local/share/xml/jade/catalog \
-d /usr/local/share/xml/docbook/dsssl/modular/html/docbook.dsl \
- -t sgml file.xml
+ -t sgml file.xml
@@ -283,7 +283,7 @@
-c /usr/local/share/xml/docbook/catalog \
-c /usr/local/share/xml/jade/catalog \
-d /usr/local/share/xml/docbook/dsssl/modular/print/docbook.dsl \
- -t tex file.xml
+ -t tex file.xml
@@ -319,7 +319,7 @@
run through tex, specifying the
&jadetex macro package.
- &prompt.user; tex "&jadetex" file.tex
+ &prompt.user; tex "&jadetex" file.textex commands must be run
at least three times. The first run
@@ -341,12 +341,12 @@
necessary.The output from this stage will be
- file.dvi.
+ file.dvi.Finally, run dvips to convert the
.dvi file to &postscript;.
- &prompt.user; dvips -o file.ps file.dvi
+ &prompt.user; dvips -o file.ps file.dvi
@@ -361,12 +361,12 @@
However, use the &pdfjadetex macro
package instead.
- &prompt.user; pdftex "&pdfjadetex" file.tex
+ &prompt.user; pdftex "&pdfjadetex" file.texAgain, run this command three times.This will generate
- file.pdf,
+ file.pdf,
which does not need to be processed any further.
Modified: head/en_US.ISO8859-1/books/fdp-primer/overview/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/fdp-primer/overview/chapter.xml Wed Feb 26 03:27:51 2014 (r44068)
+++ head/en_US.ISO8859-1/books/fdp-primer/overview/chapter.xml Wed Feb 26 03:50:57 2014 (r44069)
@@ -156,7 +156,7 @@
~/doc (see
).
- &prompt.user; svn checkout https://svn0.us-west.FreeBSD.org/doc/head ~/doc
+ &prompt.user; svn checkout https://svn0.us-west.FreeBSD.org/doc/head ~/doc
@@ -184,7 +184,7 @@
Update the local working copy:
- &prompt.user; svn up ~/doc
+ &prompt.user; svn up ~/doc
@@ -224,7 +224,7 @@
diff file:
&prompt.user; cd /usr/doc
-&prompt.user; svn diff > bsdinstall.diff.txt
+&prompt.user; svn diff > bsdinstall.diff.txtGive the diff file a descriptive name. In the example
above, changes have been made to the
Modified: head/en_US.ISO8859-1/books/fdp-primer/the-website/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/fdp-primer/the-website/chapter.xml Wed Feb 26 03:27:51 2014 (r44068)
+++ head/en_US.ISO8859-1/books/fdp-primer/the-website/chapter.xml Wed Feb 26 03:50:57 2014 (r44069)
@@ -38,7 +38,7 @@
Having obtained the documentation and web site source files,
the web site can be built. In this example, the build directory
- is ~/doc
+ is ~/doc
and all the required files are already in place.The web site is built from the
@@ -76,7 +76,7 @@
jru in their home directory, /usr/home/jru/doc.&prompt.root; cd /home/jru/doc/en_US.ISO8859-1/htdocs
-&prompt.root; env DESTDIR=/usr/local/www make install
+&prompt.root; env DESTDIR=/usr/local/www make installThe install process will not delete any old or outdated
files that existed previously in the same directory. If a new
@@ -84,7 +84,7 @@
will find and delete all files that have not been updated in
three days.
- &prompt.root; find /usr/local/www -ctime 3 -delete
+ &prompt.root; find /usr/local/www -ctime 3 -delete
@@ -129,7 +129,7 @@
If set, build or install only for the languages
- specified by this variable inside the ~/doc
+ specified by this variable inside the ~/doc
directory. All other languages except English will be
ignored. E.g.:
Modified: head/en_US.ISO8859-1/books/fdp-primer/translations/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/fdp-primer/translations/chapter.xml Wed Feb 26 03:27:51 2014 (r44068)
+++ head/en_US.ISO8859-1/books/fdp-primer/translations/chapter.xml Wed Feb 26 03:50:57 2014 (r44069)
@@ -135,7 +135,7 @@
copy of the FreeBSD Subversion repository (at least the
documentation part). This can be done by running:
- &prompt.user; svn checkout https://svn0.us-east.FreeBSD.org/doc/head/ head
+ &prompt.user; svn checkout https://svn0.us-east.FreeBSD.org/doc/head/ headsvn0.us-east.FreeBSD.org
is a public SVN server.
@@ -158,7 +158,7 @@
en_US.ISO8859-1/books/fdp-primer/book.xml,
run:
- &prompt.user; svn diff -r33733:33734 en_US.ISO8859-1/books/fdp-primer/book.xml
+ &prompt.user; svn diff -r33733:33734 en_US.ISO8859-1/books/fdp-primer/book.xml
@@ -284,7 +284,7 @@
sv_SE.ISO8859-1 is the name of the
translation, in
- lang.encoding
+ lang.encoding
form. Note the two Makefiles, which will be used to build
the documentation.
@@ -465,7 +465,7 @@
Your translated documents should include their own
$FreeBSD$ line, and change the
FreeBSD Documentation Project line to
- The FreeBSD language
+ The FreeBSD language
Documentation Project.In addition, you should add a third line which indicates
From owner-svn-doc-all@FreeBSD.ORG Wed Feb 26 02:34:00 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id A0425C9D;
Wed, 26 Feb 2014 02:34:00 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 7F1891DDA;
Wed, 26 Feb 2014 02:34:00 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1Q2Y06o051017;
Wed, 26 Feb 2014 02:34:00 GMT (envelope-from wblock@svn.freebsd.org)
Received: (from wblock@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1Q2Y0gS051016;
Wed, 26 Feb 2014 02:34:00 GMT (envelope-from wblock@svn.freebsd.org)
Message-Id: <201402260234.s1Q2Y0gS051016@svn.freebsd.org>
From: Warren Block
Date: Wed, 26 Feb 2014 02:34:00 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44064 -
head/en_US.ISO8859-1/books/fdp-primer/working-copy
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 26 Feb 2014 02:34:00 -0000
Author: wblock
Date: Wed Feb 26 02:33:59 2014
New Revision: 44064
URL: http://svnweb.freebsd.org/changeset/doc/44064
Log:
Restore tags lost in the DocBook 5 conversion.
Modified:
head/en_US.ISO8859-1/books/fdp-primer/working-copy/chapter.xml
Modified: head/en_US.ISO8859-1/books/fdp-primer/working-copy/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/fdp-primer/working-copy/chapter.xml Wed Feb 26 01:35:59 2014 (r44063)
+++ head/en_US.ISO8859-1/books/fdp-primer/working-copy/chapter.xml Wed Feb 26 02:33:59 2014 (r44064)
@@ -98,12 +98,12 @@
copy of the latest version (head) of
the main documentation tree:
- &prompt.user; svn checkout https://svn0.us-west.FreeBSD.org/doc/head ~/doc
+ &prompt.user; svn checkout https://svn0.us-west.FreeBSD.org/doc/head~/docA checkout of the source code to work on manual pages is
very similar:
- &prompt.user; svn checkout https://svn0.us-west.FreeBSD.org/base/head ~/src
+ &prompt.user; svn checkout https://svn0.us-west.FreeBSD.org/base/head~/src
@@ -118,7 +118,7 @@
svn update on the directory containing the
local working copy:
- &prompt.user; svn update ~/doc
+ &prompt.user; svn update ~/docGet in the protective habit of using
svn update before editing document files.
@@ -152,8 +152,8 @@
by redirecting the output of svn diff into a
file:
- &prompt.user; cd ~/doc
-&prompt.user; svn diff > doc-fix-spelling.diff
+ &prompt.user; cd ~/doc
+&prompt.user; svn diff > doc-fix-spelling.diffGive the file a meaningful name that identifies the
contents. The example above is for spelling fixes to the whole
@@ -172,8 +172,8 @@
be submitted yet, provide a list of only the files that are to
be included:
- &prompt.user; cd ~/doc
-&prompt.user; svn diff disks/chapter.xml printers/chapter.xml > disks-printers.diff
+ &prompt.user; cd ~/doc
+&prompt.user; svn diff disks/chapter.xml printers/chapter.xml > disks-printers.diff
From owner-svn-doc-all@FreeBSD.ORG Wed Feb 26 03:27:52 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 7E1AC913;
Wed, 26 Feb 2014 03:27:52 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 6B14A1352;
Wed, 26 Feb 2014 03:27:52 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1Q3Rqm8072957;
Wed, 26 Feb 2014 03:27:52 GMT (envelope-from wblock@svn.freebsd.org)
Received: (from wblock@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1Q3Rq9T072956;
Wed, 26 Feb 2014 03:27:52 GMT (envelope-from wblock@svn.freebsd.org)
Message-Id: <201402260327.s1Q3Rq9T072956@svn.freebsd.org>
From: Warren Block
Date: Wed, 26 Feb 2014 03:27:52 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44068 - head/en_US.ISO8859-1/books/fdp-primer/doc-build
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 26 Feb 2014 03:27:52 -0000
Author: wblock
Date: Wed Feb 26 03:27:51 2014
New Revision: 44068
URL: http://svnweb.freebsd.org/changeset/doc/44068
Log:
Restore tags lost in the DocBook5 conversion.
Modified:
head/en_US.ISO8859-1/books/fdp-primer/doc-build/chapter.xml
Modified: head/en_US.ISO8859-1/books/fdp-primer/doc-build/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/fdp-primer/doc-build/chapter.xml Wed Feb 26 03:26:09 2014 (r44067)
+++ head/en_US.ISO8859-1/books/fdp-primer/doc-build/chapter.xml Wed Feb 26 03:27:51 2014 (r44068)
@@ -92,7 +92,7 @@
Make
includes are the glue that perform the document
production, and are usually of the form
- doc.xxx.mk.
+ doc.xxx.mk.
@@ -338,9 +338,9 @@ PRI_LANG?= en_US.ISO8859-1
Targets and MacrosDependencies are described by
- target:
- dependency1 dependency2
- ... tuples, where to build
+ target:
+ dependency1 dependency2
+ ... tuples, where to build
target, the given
dependencies must be built first.
From owner-svn-doc-all@FreeBSD.ORG Wed Feb 26 05:41:30 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id B5A8FB98;
Wed, 26 Feb 2014 05:41:30 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 9FEE61CE1;
Wed, 26 Feb 2014 05:41:30 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1Q5fU1n029738;
Wed, 26 Feb 2014 05:41:30 GMT (envelope-from wblock@svn.freebsd.org)
Received: (from wblock@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1Q5fUtd029737;
Wed, 26 Feb 2014 05:41:30 GMT (envelope-from wblock@svn.freebsd.org)
Message-Id: <201402260541.s1Q5fUtd029737@svn.freebsd.org>
From: Warren Block
Date: Wed, 26 Feb 2014 05:41:30 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44073 - head/en_US.ISO8859-1/books/handbook/mirrors
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 26 Feb 2014 05:41:30 -0000
Author: wblock
Date: Wed Feb 26 05:41:30 2014
New Revision: 44073
URL: http://svnweb.freebsd.org/changeset/doc/44073
Log:
Remove Using CVSup and CVS Tags sections from the Handbook. Thanks,
CVS, it was a long road.
Modified:
head/en_US.ISO8859-1/books/handbook/mirrors/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/mirrors/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/mirrors/chapter.xml Wed Feb 26 04:16:27 2014 (r44072)
+++ head/en_US.ISO8859-1/books/handbook/mirrors/chapter.xml Wed Feb 26 05:41:30 2014 (r44073)
@@ -734,1720 +734,6 @@ Certificate information:
http.
-
- Using CVSup (Deprecated)
-
-
- Introduction
-
-
- CVS and cvsup have been deprecated by
- the &os; Project. Subversion
- should be used instead.
-
-
- CVSup is a software package for
- distributing and updating source trees from a master CVS
- repository on a remote server host. The &os; sources are
- maintained in a CVS repository on a central development
- machine in California. With CVSup,
- &os; users can easily keep their own source trees up to
- date.
-
- CVSup uses the so-called
- pull model of updating. Under the pull
- model, each client asks the server for updates, if and when
- they are wanted. The server waits passively for update
- requests from its clients. Thus all updates are instigated by
- the client. The server never sends unsolicited updates.
- Users must either run the CVSup
- client manually to get an update, or they must set up a
- cron job to run it automatically on a
- regular basis.
-
- The term CVSup, capitalized
- just so, refers to the entire software package. Its main
- components are the client cvsup which runs
- on each user's machine, and the server
- cvsupd which runs at each of the &os;
- mirror sites.
-
-
- The csup utility is a rewrite
- of the CVSup software in C. Its
- biggest advantage is, that it is faster and does not depend
- on the Modula-3 language, thus you do not need to install it
- as a requirement. Moreover you can use it out-of-the-box,
- since it is included in the base system. If you decided to
- use csup, just skip the steps on
- the installation of CVSup and
- substitute the references of
- CVSup with
- csup while following the
- remainder of this article.
-
-
-
-
- Installation
-
- The easiest way to install
- CVSup is to use the precompiled
- net/cvsup package from the &os; packages collection. If you
- prefer to build CVSup from source,
- you can use the net/cvsup port instead.
- But be forewarned: the net/cvsup port
- depends on the Modula-3 system, which takes a substantial
- amount of time and disk space to download and build.
-
-
- If you are going to be using
- CVSup on a machine which will not
- have &xorg; installed, such as a
- server, be sure to use the port which does not include the
- CVSup GUI,
- net/cvsup-without-gui.
-
-
-
-
- CVSup Configuration
-
- CVSup's operation is controlled
- by a configuration file called the
- supfile. There are some sample
- supfiles in the directory /usr/share/examples/cvsup/.
-
- The information in a supfile answers
- the following questions for
- CVSup:
-
-
-
- Which files do you
- want to receive?
-
-
-
- Which versions of
- them do you want?
-
-
-
- Where do you want
- to get them from?
-
-
-
- Where do you want to
- put them on your own machine?
-
-
-
- Where do you want
- to put your status files?
-
-
-
- In the following sections, we will construct a typical
- supfile by answering each of these
- questions in turn. First, we describe the overall structure
- of a supfile.
-
- A supfile is a text file. Comments
- begin with # and extend to the end of the
- line. Lines that are blank and lines that contain only
- comments are ignored.
-
- Each remaining line describes a set of files that the user
- wishes to receive. The line begins with the name of a
- collection, a logical grouping of files defined
- by the server. The name of the collection tells the server
- which files you want. After the collection name come zero or
- more fields, separated by white space. These fields answer
- the questions listed above. There are two types of fields:
- flag fields and value fields. A flag field consists of a
- keyword standing alone, e.g., delete or
- compress. A value field also begins with a
- keyword, but the keyword is followed without intervening white
- space by = and a second word. For example,
- release=cvs is a value field.
-
- A supfile typically specifies more
- than one collection to receive. One way to structure a
- supfile is to specify all of the relevant
- fields explicitly for each collection. However, that tends to
- make the supfile lines quite long, and it
- is inconvenient because most fields are the same for all of
- the collections in a supfile.
- CVSup provides a defaulting
- mechanism to avoid these problems. Lines beginning with the
- special pseudo-collection name *default can
- be used to set flags and values which will be used as defaults
- for the subsequent collections in the
- supfile. A default value can be
- overridden for an individual collection, by specifying a
- different value with the collection itself. Defaults can also
- be changed or augmented in mid-supfile by additional
- *default lines.
-
- With this background, we will now proceed to construct a
- supfile for receiving and updating the
- main source tree of
- &os;-CURRENT.
-
-
-
- Which files do
- you want to receive?
-
- The files available via
- CVSup are organized into named
- groups called collections. The collections
- that are available are described in the
- following section. In
- this example, we wish to receive the entire main source
- tree for the &os; system. There is a single large
- collection src-all which will give us
- all of that. As a first step toward constructing our
- supfile, we simply list the
- collections, one per line (in this case, only one
- line):
-
- src-all
-
-
-
- Which version(s)
- of them do you want?
-
- With CVSup, you can receive
- virtually any version of the sources that ever existed.
- That is possible because the
- cvsupd server works directly
- from the CVS repository, which contains all of the
- versions. You specify which one of them you want using
- the tag= and
- value fields.
-
-
- Be very careful to specify any
- tag= fields correctly. Some tags are
- valid only for certain collections of files. If you
- specify an incorrect or misspelled tag,
- CVSup will delete files which
- you probably do not want deleted. In particular, use
- only tag=. for
- the ports-* collections.
-
-
- The tag= field names a symbolic tag
- in the repository. There are two kinds of tags, revision
- tags and branch tags. A revision tag refers to a specific
- revision. Its meaning stays the same from day to day. A
- branch tag, on the other hand, refers to the latest
- revision on a given line of development, at any given
- time. Because a branch tag does not refer to a specific
- revision, it may mean something different tomorrow than it
- means today.
-
- contains branch tags that
- users might be interested in. When specifying a tag in
- CVSup's configuration file, it
- must be preceded with tag=
- (RELENG_8 will become
- tag=RELENG_8).
- Keep in mind that only the tag=. is
- relevant for the Ports Collection.
-
-
- Be very careful to type the tag name exactly as
- shown. CVSup cannot
- distinguish between valid and invalid tags. If you
- misspell the tag, CVSup will
- behave as though you had specified a valid tag which
- happens to refer to no files at all. It will delete
- your existing sources in that case.
-
-
- When you specify a branch tag, you normally receive
- the latest versions of the files on that line of
- development. If you wish to receive some past version,
- you can do so by specifying a date with the
- value field. The &man.cvsup.1;
- manual page explains how to do that.
-
- For our example, we wish to receive &os;-CURRENT. We
- add this line at the beginning of our
- supfile:
-
- *default tag=.
-
- There is an important special case that comes into
- play if you specify neither a tag=
- field nor a date= field. In that case,
- you receive the actual RCS files directly from the
- server's CVS repository, rather than receiving a
- particular version. Developers generally prefer this mode
- of operation. By maintaining a copy of the repository
- itself on their systems, they gain the ability to browse
- the revision histories and examine past versions of files.
- This gain is achieved at a large cost in terms of disk
- space, however.
-
-
-
- Where do you want
- to get them from?
-
- We use the host= field to tell
- cvsup where to obtain its updates. Any
- of the CVSup mirror sites will
- do, though you should try to select one that is close to
- you in cyberspace. In this example we will use a
- fictional &os; distribution site, cvsup99.FreeBSD.org:
-
- *default host=cvsup99.FreeBSD.org
-
- You will need to change the host to one that actually
- exists before running CVSup.
- On any particular run of cvsup, you can
- override the host setting on the command line, with
- .
-
-
-
- Where do you want
- to put them on your own machine?
-
- The prefix= field tells
- cvsup where to put the files it
- receives. In this example, we will put the source files
- directly into our main source tree,
- /usr/src. The
- src directory is already implicit in
- the collections we have chosen to receive, so this is the
- correct specification:
-
- *default prefix=/usr
-
-
-
- Where should
- cvsup maintain its status files?
-
- The CVSup client maintains
- certain status files in what is called the
- base directory. These files help
- CVSup to work more efficiently,
- by keeping track of which updates you have already
- received. We will use the standard base directory,
- /var/db:
-
- *default base=/var/db
-
- If your base directory does not already exist, now
- would be a good time to create it. The
- cvsup client will refuse to run if the
- base directory does not exist.
-
-
-
- Miscellaneous supfile
- settings:
-
- There is one more line of boiler plate that normally
- needs to be present in the
- supfile:
-
- *default release=cvs delete use-rel-suffix compress
-
- release=cvs indicates that the
- server should get its information out of the main &os; CVS
- repository. This is virtually always the case, but there
- are other possibilities which are beyond the scope of this
- discussion.
-
- delete gives
- CVSup permission to delete
- files. You should always specify this, so that
- CVSup can keep your source tree
- fully up-to-date. CVSup is
- careful to delete only those files for which it is
- responsible. Any extra files you happen to have will be
- left strictly alone.
-
- use-rel-suffix is ... arcane. If
- you really want to know about it, see the &man.cvsup.1;
- manual page. Otherwise, just specify it and do not worry
- about it.
-
- compress enables the use of
- gzip-style compression on the communication channel. If
- your network link is T1 speed or faster, you probably
- should not use compression. Otherwise, it helps
- substantially.
-
-
-
- Putting it all together:
-
- Here is the entire supfile for
- our example:
-
- *default tag=.
-*default host=cvsup99.FreeBSD.org
-*default prefix=/usr
-*default base=/var/db
-*default release=cvs delete use-rel-suffix compress
-
-src-all
-
-
-
-
- The refuse File
-
- As mentioned above, CVSup
- uses a pull method. Basically, this
- means that you connect to the
- CVSup server, and it says,
- Here is what you can download from me..., and
- your client responds
- OK, I will take this, this, this, and this.
- In the default configuration, the
- CVSup client will take every file
- associated with the collection and tag you chose in the
- configuration file. In order to download a partial tree,
- use the refuse file.
-
- The refuse file tells
- CVSup that it should not take
- every single file from a collection; in other words, it
- tells the client to refuse certain
- files from the server. The refuse file
- can be found (or, if you do not yet have one, should be
- placed) in
- base/sup/.
- base is defined in your
- supfile; our defined
- base is
- /var/db, which means that by default
- the refuse file is
- /var/db/sup/refuse.
-
- The refuse file has a very simple
- format; it simply contains the names of files or directories
- that you do not wish to download. For example:
-
- bin/
-usr.bin/
-
- Users who are on
- slow links or pay by the minute for their Internet
- connection will be able to save time as they will
- no longer need to download files that they will never use.
- For more information on refuse files
- and other neat features of CVSup,
- please view its manual page.
-
-
-
-
- Running CVSup
-
- You are now ready to try an update. The command line for
- doing this is quite simple:
-
- &prompt.root; cvsup supfile
-
- where
- supfile is of
- course the name of the supfile you have
- just created. Assuming you are running under X11,
- cvsup will display a GUI window with some
- buttons to do the usual things. Press the
- go button, and watch it run.
-
- Since you are updating your actual
- /usr/src tree in this example, you will
- need to run the program as root so that
- cvsup has the permissions it needs to
- update your files. Having just created your configuration
- file, and having never used this program before, that might
- understandably make you nervous. There is an easy way to do a
- trial run without touching your precious files. Just create
- an empty directory somewhere convenient, and name it as an
- extra argument on the command line:
-
- &prompt.root; mkdir /var/tmp/dest
-&prompt.root; cvsup supfile /var/tmp/dest
-
- The directory you specify will be used as the destination
- directory for all file updates.
- CVSup will examine your usual files
- in /usr/src, but it will not modify or
- delete any of them. Any file updates will instead land in
- /var/tmp/dest/usr/src.
- CVSup will also leave its base
- directory status files untouched when run this way. The new
- versions of those files will be written into the specified
- directory. As long as you have read access to
- /usr/src, you do not even need to be
- root to perform this
- kind of trial run.
-
- If you are not running X11 or if you just do not like
- GUIs, you should add a couple of options to the command line
- when you run cvsup:
-
- &prompt.root; cvsup -g -L 2 supfile
-
- The tells
- CVSup not to use its GUI. This is
- automatic if you are not running X11, but otherwise you have
- to specify it.
-
- The tells
- CVSup to print out the
- details of all the file updates it is doing. There are three
- levels of verbosity, from to
- . The default is 0, which means total
- silence except for error messages.
-
- There are plenty of other options available. For a brief
- list of them, type cvsup -H. For more
- detailed descriptions, see the manual page.
-
- Once you are satisfied with the way updates are working,
- you can arrange for regular runs of
- CVSup using &man.cron.8;.
- Obviously, you should not let CVSup
- use its GUI when running it from &man.cron.8;.
-
-
-
- CVSup File Collections
-
- The file collections available via
- CVSup are organized hierarchically.
- There are a few large collections, and they are divided into
- smaller sub-collections. Receiving a large collection is
- equivalent to receiving each of its sub-collections. The
- hierarchical relationships among collections are reflected by
- the use of indentation in the list below.
-
- The most commonly used collection is
- src-all.
-
-
-
- cvs-all release=cvs
-
-
- The main &os; CVS repository, including the
- cryptography code.
-
-
-
- distrib release=cvs
-
-
- Files related to the distribution and
- mirroring of &os;.
-
-
-
-
-
- projects-all release=cvs
-
-
-
- Sources for the &os; projects
- repository.
-
-
-
-
- src-all release=cvs
-
-
- The main &os; sources, including the
- cryptography code.
-
-
-
- src-base
- release=cvs
-
-
- Miscellaneous files at the top of
- /usr/src.
-
-
-
-
- src-bin
- release=cvs
-
-
- User utilities that may be needed in
- single-user mode
- (/usr/src/bin).
-
-
-
-
- src-cddl
- release=cvs
-
-
- Utilities and libraries covered by the
- CDDL license
- (/usr/src/cddl).
-
-
-
-
- src-contrib
- release=cvs
-
-
- Utilities and libraries from outside the
- &os; project, used relatively unmodified
- (/usr/src/contrib).
-
-
-
-
-
- src-crypto release=cvs
-
-
-
- Cryptography utilities and libraries
- from outside the &os; project, used
- relatively unmodified
-
- (/usr/src/crypto).
-
-
-
-
-
- src-eBones release=cvs
-
-
-
- Kerberos and DES
- (/usr/src/eBones). Not
- used in current releases of &os;.
-
-
-
-
- src-etc
- release=cvs
-
-
- System configuration files
- (/usr/src/etc).
-
-
-
-
- src-games
- release=cvs
-
-
- Games
- (/usr/src/games).
-
-
-
-
- src-gnu
- release=cvs
-
-
- Utilities covered by the GNU Public
- License
- (/usr/src/gnu).
-
-
-
-
- src-include
- release=cvs
-
-
- Header files
- (/usr/src/include).
-
-
-
-
- src-kerberos5
- release=cvs
-
-
- Kerberos5 security package
- (/usr/src/kerberos5).
-
-
-
-
- src-kerberosIV
- release=cvs
-
-
- KerberosIV security package
- (/usr/src/kerberosIV).
-
-
-
-
- src-lib
- release=cvs
-
-
- Libraries
- (/usr/src/lib).
-
-
-
-
- src-libexec
- release=cvs
-
-
- System programs normally executed by
- other programs
- (/usr/src/libexec).
-
-
-
-
- src-release
- release=cvs
-
-
- Files required to produce a &os;
- release
- (/usr/src/release).
-
-
-
-
- src-rescue
- release=cvs
-
-
- Statically linked programs for emergency
- recovery; see &man.rescue.8;
- (/usr/src/rescue).
-
-
-
-
-
- src-sbin release=cvs
-
-
-
- System utilities for single-user mode
- (/usr/src/sbin).
-
-
-
-
- src-secure
- release=cvs
-
-
- Cryptographic libraries and commands
- (/usr/src/secure).
-
-
-
-
- src-share
- release=cvs
-
-
- Files that can be shared across multiple
- systems
- (/usr/src/share).
-
-
-
-
- src-sys
- release=cvs
-
-
- The kernel
- (/usr/src/sys).
-
-
-
-
- src-sys-crypto
- release=cvs
-
-
- Kernel cryptography code
- (/usr/src/sys/crypto).
-
-
-
-
- src-tools
- release=cvs
-
-
- Various tools for the maintenance of
- &os;
- (/usr/src/tools).
-
-
-
-
- src-usrbin
- release=cvs
-
-
- User utilities
- (/usr/src/usr.bin).
-
-
-
-
- src-usrsbin
- release=cvs
-
-
- System utilities
- (/usr/src/usr.sbin).
-
-
-
-
-
-
-
-
-
-
- distrib release=self
-
-
- The CVSup server's own
- configuration files. Used by
- CVSup mirror sites.
-
-
-
-
- gnats release=current
-
-
- The GNATS bug-tracking database.
-
-
-
-
- mail-archive release=current
-
-
- &os; mailing list archive.
-
-
-
-
-
-
- For More Information
-
- For the CVSup FAQ and other
- information about CVSup, see
- The
- CVSup Home Page.
-
- Most &os;-related discussion of
- CVSup takes place on the
- &a.hackers;. New versions of the software are announced
- there, as well as on the &a.announce;.
-
- For questions or bug reports about
- CVSup take a look at the
-
- CVSup FAQ.
-
-
-
- CVSup Sites
-
- CVSup servers for &os; are
- running at the following sites:
-
- &chap.mirrors.cvsup.index.inc;
-
- &chap.mirrors.lastmod.inc;
-
- &chap.mirrors.cvsup.inc;
-
-
-
-
-
- CVS Tags
-
-
- CVS has been deprecated by the project, and its use is not
- recommended. Subversion should be
- used instead.
-
-
- When obtaining or updating sources using
- cvs or
- CVSup, a revision tag must be
- specified. A revision tag refers to either a particular line of
- &os; development, or a specific point in time. The first type
- are called branch tags, and the second type are
- called release tags.
-
-
- Branch Tags
-
- All of these, with the exception of
- HEAD (which is always a valid tag), only
- apply to the src/ tree. The
- ports/, doc/, and
- www/ trees are not branched.
-
-
-
- HEAD
-
-
- Symbolic name for the main line, or &os;-CURRENT.
- Also the default when no revision is specified.
-
- In CVSup, this tag is
- represented by a . (not punctuation,
- but a literal . character).
-
-
- In CVS, this is the default when no revision tag
- is specified. It is usually not
- a good idea to checkout or update to CURRENT sources
- on a STABLE machine, unless that is your
- intent.
-
-
-
-
-
- RELENG_9
-
-
- The line of development for &os;-9.X, also known
- as &os; 9-STABLE
-
-
-
-
- RELENG_9_1
-
-
- The release branch for &os;-9.1, used only for
- security advisories and other critical fixes.
-
-
-
-
- RELENG_9_0
-
-
- The release branch for &os;-9.0, used only for
- security advisories and other critical fixes.
-
-
-
-
- RELENG_8
-
-
- The line of development for &os;-8.X, also known
- as &os; 8-STABLE
-
-
-
-
- RELENG_8_3
-
-
- The release branch for &os;-8.3, used only for
- security advisories and other critical fixes.
-
-
-
-
- RELENG_8_2
-
-
- The release branch for &os;-8.2, used only for
- security advisories and other critical fixes.
-
-
-
-
- RELENG_8_1
-
-
- The release branch for &os;-8.1, used only for
- security advisories and other critical fixes.
-
-
-
-
- RELENG_8_0
-
-
- The release branch for &os;-8.0, used only for
- security advisories and other critical fixes.
-
-
-
*** DIFF OUTPUT TRUNCATED AT 1000 LINES ***
From owner-svn-doc-all@FreeBSD.ORG Wed Feb 26 07:09:18 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id DE5BF543;
Wed, 26 Feb 2014 07:09:18 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id CB8BD13D4;
Wed, 26 Feb 2014 07:09:18 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1Q79I2H064297;
Wed, 26 Feb 2014 07:09:18 GMT (envelope-from wblock@svn.freebsd.org)
Received: (from wblock@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1Q79I3E064296;
Wed, 26 Feb 2014 07:09:18 GMT (envelope-from wblock@svn.freebsd.org)
Message-Id: <201402260709.s1Q79I3E064296@svn.freebsd.org>
From: Warren Block
Date: Wed, 26 Feb 2014 07:09:18 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44074 -
head/en_US.ISO8859-1/books/porters-handbook/porting-dads
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 26 Feb 2014 07:09:18 -0000
Author: wblock
Date: Wed Feb 26 07:09:18 2014
New Revision: 44074
URL: http://svnweb.freebsd.org/changeset/doc/44074
Log:
Link to the section ID rather than the title ID.
Modified:
head/en_US.ISO8859-1/books/porters-handbook/porting-dads/chapter.xml
Modified: head/en_US.ISO8859-1/books/porters-handbook/porting-dads/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/porters-handbook/porting-dads/chapter.xml Wed Feb 26 05:41:30 2014 (r44073)
+++ head/en_US.ISO8859-1/books/porters-handbook/porting-dads/chapter.xml Wed Feb 26 07:09:18 2014 (r44074)
@@ -37,7 +37,7 @@
installing ports from a CDROM for an example of
building ports from a read-only tree). If you need to modify
one of the pkg-* files, do so by
- redefining a variable,
+ redefining a variable,
not by writing over it.
From owner-svn-doc-all@FreeBSD.ORG Wed Feb 26 16:22:52 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id B1A143BC;
Wed, 26 Feb 2014 16:22:52 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 8F39B1B1F;
Wed, 26 Feb 2014 16:22:52 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1QGMqA5090567;
Wed, 26 Feb 2014 16:22:52 GMT (envelope-from ryusuke@svn.freebsd.org)
Received: (from ryusuke@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1QGMqq7090566;
Wed, 26 Feb 2014 16:22:52 GMT (envelope-from ryusuke@svn.freebsd.org)
Message-Id: <201402261622.s1QGMqq7090566@svn.freebsd.org>
From: Ryusuke SUZUKI
Date: Wed, 26 Feb 2014 16:22:52 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44075 - head/ja_JP.eucJP/books/handbook/preface
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 26 Feb 2014 16:22:52 -0000
Author: ryusuke
Date: Wed Feb 26 16:22:52 2014
New Revision: 44075
URL: http://svnweb.freebsd.org/changeset/doc/44075
Log:
- Merge the following from the English version:
r29932 -> r33266 head/ja_JP.eucJP/books/handbook/preface/preface.xml
Modified:
head/ja_JP.eucJP/books/handbook/preface/preface.xml
Modified: head/ja_JP.eucJP/books/handbook/preface/preface.xml
==============================================================================
--- head/ja_JP.eucJP/books/handbook/preface/preface.xml Wed Feb 26 07:09:18 2014 (r44074)
+++ head/ja_JP.eucJP/books/handbook/preface/preface.xml Wed Feb 26 16:22:52 2014 (r44075)
@@ -3,7 +3,7 @@
The FreeBSD Documentation Project
The FreeBSD Japanese Documentation Project
- Original revision: r29932
+ Original revision: r33266
$FreeBSD$
-->
@@ -383,7 +383,21 @@
RAID レベルの設定方法について説明しています。
--->
+
+ , File Systems Support
+
+ &sun; の Z ファイルシステムのような、
+ ネイティブではないファイルシステムの &os;
+ における対応について検討します。
+
+
+
+ , Virtualization
+
+ 仮想化が何を提供するか、&os;
+ でどのように使うことができるかについて説明しています。
+
+ -->
, 地域化
@@ -391,6 +405,16 @@
システムとアプリケーション両方のレベルの地域化を扱っています。
+
@@ -403,6 +427,15 @@
その方法の概要をまとめています。
+
, シリアル通信
From owner-svn-doc-all@FreeBSD.ORG Wed Feb 26 17:05:29 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 2D518D49;
Wed, 26 Feb 2014 17:05:29 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 171921096;
Wed, 26 Feb 2014 17:05:29 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1QH5S9n006879;
Wed, 26 Feb 2014 17:05:28 GMT (envelope-from dru@svn.freebsd.org)
Received: (from dru@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1QH5SsX006878;
Wed, 26 Feb 2014 17:05:28 GMT (envelope-from dru@svn.freebsd.org)
Message-Id: <201402261705.s1QH5SsX006878@svn.freebsd.org>
From: Dru Lavigne
Date: Wed, 26 Feb 2014 17:05:28 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44076 - head/en_US.ISO8859-1/books/handbook/firewalls
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 26 Feb 2014 17:05:29 -0000
Author: dru
Date: Wed Feb 26 17:05:28 2014
New Revision: 44076
URL: http://svnweb.freebsd.org/changeset/doc/44076
Log:
Initial pass through enabling IPFW.
Shuffle IPFW command to later in the chapter, might get shuffled again.
Begin prep work for syntax section.
Sponsored by: iXsystems
Modified:
head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Wed Feb 26 16:22:52 2014 (r44075)
+++ head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Wed Feb 26 17:05:28 2014 (r44076)
@@ -1675,7 +1675,7 @@ options IPDIVERT # enables NATfirewall_type="open"
- The available values for this setting are:
+ The available types are:
@@ -1702,114 +1702,48 @@ options IPDIVERT # enables NAT
- filename: full path of the file
- containing the firewall rules.
+ filename: full path of the file
+ containing the firewall ruleset.
- To instead load a custom ruleset, either set the
- filename value of
- firewall_type or set the
- firewall_script variable to the absolute
- path of an executable script that includes
- IPFW commands. This example script blocks
- all incoming and outgoing traffic:
-
- #!/bin/sh
-
-ipfw -q flush
-
-ipfw add deny in
-ipfw add deny out
-
-
- If firewall_type is set to either
+ If firewall_type is set to either
client or simple,
modify the default rules found in
/etc/rc.firewall to fit the
- configuration of the system. The examples used in this
- section assume that the firewall_script
- is set to /etc/ipfw.rules.
-
-
- Enable logging:
-
- firewall_logging="YES"
+ configuration of the system.
-
- firewall_logging sets the
- net.inet.ip.fw.verbose sysctl
- variable to the value of 1. There is no
- rc.conf variable to set log
- limitations, but the desired value can be set using
- sysctl or by adding the following
- variable and desired value to
- /etc/sysctl.conf:
-
- net.inet.ip.fw.verbose_limit=5
-
-
- If the machine is acting as a gateway providing
- NAT using &man.natd.8;, refer to for information regarding the
- required /etc/rc.conf options.
-
+ Note that the
+ filename type is used to load a custom ruleset.
-
- The IPFW Command
-
- ipfw
-
- ipfw can be used to make manual,
- single rule additions or deletions to the active firewall
- while it is running. The problem with using this method is
- that all the changes are lost when the system reboots. It is
- recommended to instead write all the rules in a file and to
- use that file to load the rules at boot time and to replace
- the currently running firewall rules whenever that file
- changes.
-
- ipfw is a useful way to display the
- running firewall rules to the console screen. The
- IPFW accounting facility
- dynamically creates a counter for each rule that counts each
- packet that matches the rule. During the process of testing a
- rule, listing the rule with its counter is one way to
- determine if the rule is functioning as expected.
-
- To list all the running rules in sequence:
-
- &prompt.root; ipfw list
-
- To list all the running rules with a time stamp of when
- the last time the rule was matched:
-
- &prompt.root; ipfw -t list
-
- The next example lists accounting information and the
- packet count for matched rules along with the rules
- themselves. The first column is the rule number, followed by
- the number of matched packets and bytes, followed by the rule
- itself.
-
- &prompt.root; ipfw -a list
-
- To list dynamic rules in addition to static rules:
-
- &prompt.root; ipfw -d list
+ An alternate way to load a custom ruleset is to set the
+ firewall_script variable to the absolute
+ path of an executable script that includes
+ IPFW commands. The examples used in this
+ section assume that the firewall_script
+ is set to /etc/ipfw.rules:
- To also show the expired dynamic rules:
+ firewall_script="/etc/ipfw.rules"
- &prompt.root; ipfw -d -e list
+ To enable logging, include this line:
- To zero the counters:
-
- &prompt.root; ipfw zero
+ firewall_logging="YES"
- To zero the counters for just the rule with number
- NUM:
+ There is no
+ /etc/rc.conf variable to set logging
+ limits. To limit the number of times a rule is logged
+ per connection attempt, specify the number using this line
+ in
+ /etc/sysctl.conf:
- &prompt.root; ipfw zero NUM
+ net.inet.ip.fw.verbose_limit=5
+
+ After saving the needed edits, start the firewall. To
+ enable logging limits now, also set the
+ sysctl value specified above:
+
+ &prompt.root; service ipfw start
+&prompt.root; sysctl net.inet.ip.fw.verbose_limit=5
@@ -1821,16 +1755,16 @@ ipfw add deny out
rule processing order
- When a packet enters the IPFW firewall,
+ When a packet enters the IPFW firewall,
it is compared against the first rule in the ruleset and
progresses one rule at a time, moving from top to bottom of
the set in ascending rule number sequence order. When the
packet matches the selection parameters of a rule, the rule's
- action field value is executed and the search of the ruleset
+ action is executed and the search of the ruleset
terminates for that packet. This is referred to as
first match wins. If the packet does not match
any of the rules, it gets caught by the mandatory
- IPFW default rule, number 65535,
+ IPFW default rule number 65535,
which denies all packets and silently discards them. However,
if the packet matches a rule that contains the
count, skipto, or
@@ -1838,11 +1772,8 @@ ipfw add deny out
to &man.ipfw.8; for details on how these keywords affect rule
processing.
- The examples in this section create an inclusive type
- firewall ruleset containing the stateful keep
- state, limit,
- in, out and
- via options. For a complete rule syntax
+ This section provides an overview of the rule syntax for creating
+ stateful rules. For a complete rule syntax
description, refer to &man.ipfw.8;.
@@ -1851,11 +1782,11 @@ ipfw add deny out
rule syntax
- This section describes the keywords which comprise an
- IPFW rule. Keywords must be
- written in the following order. # is used
+ When creating an
+ IPFW rule, keywords must be
+ written in the following order. The # symbol is used
to mark the start of a comment and may appear at the end of a
- rule line or on its own line. Blank lines are ignored.
+ rule or on its own line. Blank lines are ignored.CMD RULE_NUMBER ACTION LOGGING SELECTION
STATEFUL
@@ -1915,7 +1846,7 @@ ipfw add deny out
- Logging
+ LOGGINGWhen a packet matches a rule with the
log keyword, a message will be logged
@@ -1942,7 +1873,7 @@ ipfw add deny out
- Selection
+ SELECTIONThe keywords described in this section are used to
describe attributes of the packet to be checked when
@@ -2031,7 +1962,7 @@ ipfw add deny out
- Stateful Rule Option
+ STATEFULThe check-state option is used to
identify where in the IPFW
@@ -2058,6 +1989,63 @@ ipfw add deny out
+
+
+
+ The IPFW Command
+
+ ipfw
+
+ ipfw can be used to make manual,
+ single rule additions or deletions to the active firewall
+ while it is running. The problem with using this method is
+ that all the changes are lost when the system reboots. It is
+ recommended to instead write all the rules in a file and to
+ use that file to load the rules at boot time and to replace
+ the currently running firewall rules whenever that file
+ changes.
+
+ ipfw is a useful way to display the
+ running firewall rules to the console screen. The
+ IPFW accounting facility
+ dynamically creates a counter for each rule that counts each
+ packet that matches the rule. During the process of testing a
+ rule, listing the rule with its counter is one way to
+ determine if the rule is functioning as expected.
+
+ To list all the running rules in sequence:
+
+ &prompt.root; ipfw list
+
+ To list all the running rules with a time stamp of when
+ the last time the rule was matched:
+
+ &prompt.root; ipfw -t list
+
+ The next example lists accounting information and the
+ packet count for matched rules along with the rules
+ themselves. The first column is the rule number, followed by
+ the number of matched packets and bytes, followed by the rule
+ itself.
+
+ &prompt.root; ipfw -a list
+
+ To list dynamic rules in addition to static rules:
+
+ &prompt.root; ipfw -d list
+
+ To also show the expired dynamic rules:
+
+ &prompt.root; ipfw -d -e list
+
+ To zero the counters:
+
+ &prompt.root; ipfw zero
+
+ To zero the counters for just the rule with number
+ NUM:
+
+ &prompt.root; ipfw zero NUMLogging Firewall Messages
From owner-svn-doc-all@FreeBSD.ORG Wed Feb 26 20:32:12 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 50046BE1;
Wed, 26 Feb 2014 20:32:12 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 37CCD18CE;
Wed, 26 Feb 2014 20:32:12 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1QKWCDk089827;
Wed, 26 Feb 2014 20:32:12 GMT (envelope-from dru@svn.freebsd.org)
Received: (from dru@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1QKWCZg089826;
Wed, 26 Feb 2014 20:32:12 GMT (envelope-from dru@svn.freebsd.org)
Message-Id: <201402262032.s1QKWCZg089826@svn.freebsd.org>
From: Dru Lavigne
Date: Wed, 26 Feb 2014 20:32:12 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44077 - head/en_US.ISO8859-1/books/handbook/firewalls
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 26 Feb 2014 20:32:12 -0000
Author: dru
Date: Wed Feb 26 20:32:11 2014
New Revision: 44077
URL: http://svnweb.freebsd.org/changeset/doc/44077
Log:
Modernize the IPFW Rule Syntax section.
Sponsored by: iXsystems
Modified:
head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Wed Feb 26 17:05:28 2014 (r44076)
+++ head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Wed Feb 26 20:32:11 2014 (r44077)
@@ -1757,8 +1757,8 @@ options IPDIVERT # enables NATWhen a packet enters the IPFW firewall,
it is compared against the first rule in the ruleset and
- progresses one rule at a time, moving from top to bottom of
- the set in ascending rule number sequence order. When the
+ progresses one rule at a time, moving from top to bottom in
+ sequence. When the
packet matches the selection parameters of a rule, the rule's
action is executed and the search of the ruleset
terminates for that packet. This is referred to as
@@ -1772,10 +1772,6 @@ options IPDIVERT # enables NAT
- This section provides an overview of the rule syntax for creating
- stateful rules. For a complete rule syntax
- description, refer to &man.ipfw.8;.
-
IPFW
@@ -1784,33 +1780,58 @@ options IPDIVERT # enables NATWhen creating an
IPFW rule, keywords must be
- written in the following order. The # symbol is used
+ written in the following order. Some keywords are mandatory
+ while other keywords are optional. The words shown in uppercase
+ represent a variable and the words shown in lowercase must
+ precede the variable that follows it. The # symbol is used
to mark the start of a comment and may appear at the end of a
rule or on its own line. Blank lines are ignored.
- CMD RULE_NUMBER ACTION LOGGING SELECTION
- STATEFUL
+ CMD RULE_NUMBER set SET_NUMBER ACTION log
+ LOG_AMOUNT PROTO from SRC SRC_PORT to DST DST_PORT
+ OPTIONS
+
+ This section provides an overview of these keywords and
+ their options. It is not an exhaustive list of every possible
+ option. Refer to &man.ipfw.8; for a complete description of
+ the rule syntax that can be used when creating
+ IPFW rules.CMD
- Each new rule has to be prefixed with
- add to add the rule to the
- internal table.
+ Every rule must start with
+ ipfw add.RULE_NUMBER
- Each rule is associated with a rule_number in the
+ Each rule is associated with a number in the
range of 1 to
- 65535.
+ 65534. The number is used to
+ indicate the order of rule processing. Multiple rules can have the same
+ number, in which case they are checked according to
+ the order in which they have been added.
+ SET_NUMBER
+
+ Each rule is associated with a set number in the
+ range of 0 to
+ 31. Sets can be individually
+ disabled or enabled, making it possible to quickly add
+ or delete a set of rules. If a SET_NUMBER is not
+ specified, the rule will be added to set 0.
+
+
+
+
+ ACTIONA rule can be associated with one of the following
@@ -1819,15 +1840,10 @@ options IPDIVERT # enables NAT
allow | accept | pass |
- permit
-
- These keywords are equivalent as they allow packets
- that match the rule to exit the firewall rule
- processing. The search terminates at this rule.
-
- check-state
+ permit: these keywords are equivalent and allow packets
+ that match the rule.
- Checks the packet against the dynamic rules table.
+ check-state: checks the packet against the dynamic state table.
If a match is found, execute the action associated with
the rule which generated this dynamic rule, otherwise
move to the next rule. A check-state
@@ -1837,27 +1853,31 @@ options IPDIVERT # enables NATkeep-state or
limit rule.
- deny | drop
-
- Both words mean the same thing, which is to discard
- packets that match this rule. The search
- terminates.
+ count: updates counters for
+ all packets that match rule. The search continues with
+ the next rule.
+
+ deny | drop: either word discards
+ packets that match this rule.
+
+ Additional actions are available. Refer to
+ &man.ipfw.8; for details.
- LOGGING
+ LOG_AMOUNTWhen a packet matches a rule with the
log keyword, a message will be logged
to &man.syslogd.8; with a facility name of
SECURITY. Logging only occurs if the
number of packets logged for that particular rule does
- not exceed the logamount parameter.
- If no logamount is specified, the
- limit is taken from the sysctl value
- of net.inet.ip.fw.verbose_limit. In
- both cases, a value of zero removes the logging limit.
+ not exceed the optional specified LOG_AMOUNT.
+ If no LOG_AMOUNT is specified, the
+ limit is taken from the value
+ of net.inet.ip.fw.verbose_limit. A
+ value of zero removes the logging limit.
Once the limit is reached, logging can be re-enabled by
clearing the logging counter or the packet counter for
that rule, using ipfw reset
@@ -1873,119 +1893,95 @@ options IPDIVERT # enables NAT
- SELECTION
+ PROTO
- The keywords described in this section are used to
- describe attributes of the packet to be checked when
- determining whether rules match the packet or not. The
- following general-purpose attributes are provided for
- matching, and must be used in this order:
-
- udp | tcp | icmp
-
- Any other protocol names found in
- /etc/protocols can be used. The
- value specified is the protocol to be matched against.
- This is a mandatory keyword.
-
- from src to dst
-
- The from and
- to keywords are used to match against
- IP addresses. Rules must specify
- both source and destination
- parameters. any is a special keyword
- that matches any IP address. me is a
- special keyword that matches any IP address configured
- on an interface in the &os; system to represent the PC
- the firewall is running on. Example usage includes
- from me to any,
- from any to me,
- from 0.0.0.0/0 to any,
- from any to 0.0.0.0/0,
- from 0.0.0.0 to any,
- from any to 0.0.0.0, and
- from me to 0.0.0.0. IP addresses
- are specified in dotted IP address format followed by
- the mask in CIDR notation, or as a single host in dotted
- IP address format. This keyword is a mandatory
- requirement. The net-mgmt/ipcalc
- port may be used to assist the mask calculation.
-
- port number
-
- For protocols which support port numbers, such as
- TCP and UDP, it is
- mandatory to include the port number of the service
- that will be matched. Service names from
- /etc/services may be used instead
- of numeric port values.
-
- in | out
-
- Matches incoming or outgoing packets. It is
- mandatory that one or the other is included as part of
- the rule matching criterion.
-
- via IF
-
- Matches packets going through the interface
- specified by device name. The via
- keyword causes the interface to always be checked as
- part of the match process.
-
- setup
-
- This mandatory keyword identifies the session start
- request for TCP packets.
-
- keep-state
-
- This is a mandatory keyword. Upon a match, the
- firewall will create a dynamic rule, whose default
- behavior is to match bidirectional traffic between
- source and destination IP/port using the same
- protocol.
+ This optional value can be used to specify any
+ protocol name or number found in
+ /etc/protocols.
+
+
+
+
+ SRC
+
+ The from
+ keyword must be followed by the source address or a
+ keyword that represents the source address. An address
+ can be represented by the any,
+ me (any address configured on an
+ interface on this system),
+ me6, (any IPv6
+ address configured on an interface on this system), or
+ table followed by the number of a
+ lookup table which contains a list of addresses. When
+ specifying an IP address, it can be
+ optionally followed by its CIDR mask
+ or subnet mask. For example, 1.2.3.4/25 or
+ 1.2.3.4:255.255.255.128.
+
+
+
+
+ SRC_PORT
+
+ An optional source port can be specified using the
+ port number or name from
+ /etc/services.
+
+
- limit {src-addr | src-port | dst-addr |
- dst-port}
+
+ DST
+
+ The to keyword must be followed
+ by the destination address or a
+ keyword that represents the destination address. The
+ same keywords and addresses described in the SRC section
+ can be used to describe the destination.
+
+
- The firewall will only allow
- N connections with the same
- set of parameters as specified in the rule. One or more
- of source and destination addresses and ports can be
- specified. limit and
- keep-state can not be used on the
- same rule as they provide the same stateful
- function.
+
+ DST_PORT
+
+ An optional destination port can be specified using
+ the port number or name from
+ /etc/services.
- STATEFUL
+ OPTIONS
- The check-state option is used to
- identify where in the IPFW
- ruleset the packet is to be tested against the dynamic
- rules facility. On a match, the packet exits the
- firewall to continue on its way and a new rule is
- dynamically created for the next anticipated packet
- being exchanged during this session. On a no match, the
- packet advances to the next rule in the ruleset for
- testing.
+ Several keywords can follow the source and
+ destination. As the name suggests, OPTIONS are
+ optional. Commonly used options include
+ in or
+ out, which specify the direction of
+ packet flow, icmptypes followed by
+ the type of ICMP message, and
+ keep-state.
+
+ When a keep-state rule is matched, the
+ firewall will create a dynamic rule which
+ matches bidirectional traffic between the
+ source and destination addresses and ports using the same
+ protocol.The dynamic rules facility is vulnerable to resource
depletion from a SYN-flood attack which would open a
huge number of dynamic rules. To counter this type of
attack with IPFW, use
- limit. This keyword limits the
- number of simultaneous sessions by checking that rule's
- source or destinations fields and using the packet's IP
- address in a search of the open dynamic rules, counting
- the number of times this rule and IP address
+ limit. This option limits the
+ number of simultaneous sessions by checking the open dynamic rules, counting
+ the number of times this rule and IP address
combination occurred. If this count is greater than the
value specified by limit, the packet
is discarded.
+
+ Dozens of OPTIONS are available. Refer to
+ &man.ipfw.8; for a description of each available
+ option.
From owner-svn-doc-all@FreeBSD.ORG Wed Feb 26 21:27:53 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id C0CAE385;
Wed, 26 Feb 2014 21:27:53 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 6F2291DA8;
Wed, 26 Feb 2014 21:27:53 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1QLRrKV010962;
Wed, 26 Feb 2014 21:27:53 GMT (envelope-from rodrigc@svn.freebsd.org)
Received: (from rodrigc@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1QLRr2P010961;
Wed, 26 Feb 2014 21:27:53 GMT (envelope-from rodrigc@svn.freebsd.org)
Message-Id: <201402262127.s1QLRr2P010961@svn.freebsd.org>
From: Craig Rodrigues
Date: Wed, 26 Feb 2014 21:27:53 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44078 - head/en_US.ISO8859-1/articles/committers-guide
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 26 Feb 2014 21:27:54 -0000
Author: rodrigc (src committer)
Date: Wed Feb 26 21:27:52 2014
New Revision: 44078
URL: http://svnweb.freebsd.org/changeset/doc/44078
Log:
Add note for setting Kerberos password.
Learned from: peter
Modified:
head/en_US.ISO8859-1/articles/committers-guide/article.xml
Modified: head/en_US.ISO8859-1/articles/committers-guide/article.xml
==============================================================================
--- head/en_US.ISO8859-1/articles/committers-guide/article.xml Wed Feb 26 20:32:11 2014 (r44077)
+++ head/en_US.ISO8859-1/articles/committers-guide/article.xml Wed Feb 26 21:27:52 2014 (r44078)
@@ -305,6 +305,23 @@ You need a Passphrase to protect your se
+
+ Kerberos and LDAP web password for &os; cluster
+ Some of the services in the &os; cluster require a Kerberos password.
+ In the &os; cluster, LDAP is proxying to Kerberos, so this also serves as
+ the LDAP web password.
+ To reset your Kerberos password in the &os; cluster using a random password
+ generator:
+
+ &prompt.user; ssh kpasswd.freebsd.org
+
+ Alternatively, you can set your Kerberos password manually by logging into
+ freefall.FreeBSD.org and
+ running:
+ &prompt.user; kpasswd
+
+
+
Commit Bit Types
From owner-svn-doc-all@FreeBSD.ORG Wed Feb 26 21:53:13 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 93F79C1F;
Wed, 26 Feb 2014 21:53:13 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 7ED91110A;
Wed, 26 Feb 2014 21:53:13 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1QLrD6o023204;
Wed, 26 Feb 2014 21:53:13 GMT (envelope-from dru@svn.freebsd.org)
Received: (from dru@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1QLrDEX023203;
Wed, 26 Feb 2014 21:53:13 GMT (envelope-from dru@svn.freebsd.org)
Message-Id: <201402262153.s1QLrDEX023203@svn.freebsd.org>
From: Dru Lavigne
Date: Wed, 26 Feb 2014 21:53:13 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44079 - head/en_US.ISO8859-1/books/handbook/firewalls
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 26 Feb 2014 21:53:13 -0000
Author: dru
Date: Wed Feb 26 21:53:13 2014
New Revision: 44079
URL: http://svnweb.freebsd.org/changeset/doc/44079
Log:
Move Example Ruleset to under Rule Syntax.
Cleanup the Example Ruleset.
At some point, the ping rules and the incoming HTTP/SSH rules should be tightened.
Sponsored by: iXsystems
Modified:
head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Wed Feb 26 21:27:52 2014 (r44078)
+++ head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Wed Feb 26 21:53:13 2014 (r44079)
@@ -1987,6 +1987,140 @@ options IPDIVERT # enables NAT
+
+ Example Ruleset
+
+ This section demonstrates how to create an example
+ stateful firewall ruleset script named
+ /etc/ipfw.rules. In this example, all
+ connection rules use in or
+ out to clarify the direction. They also
+ use via
+ interface-name to specify
+ the interface the packet is traveling over.
+
+ The firewall script begins by indicating that it is a
+ Bourne shell script and flushes any existing rules. It then
+ creates the cmd variable so that
+ ipfw add does not have to be typed at the
+ beginning of every rule. It also defines the
+ pif variable which represents the name of
+ the interface that is attached to the Internet.
+
+ #!/bin/sh
+# Flush out the list before we begin.
+ipfw -q -f flush
+
+# Set rules command prefix
+cmd="ipfw -q add"
+pif="dc0" # interface name of NIC attached to Internet
+
+ The first two rules allow all traffic on the trusted
+ internal interface and on the loopback interface:
+
+ # Change xl0 to LAN NIC interface name
+$cmd 00005 allow all from any to any via xl0
+
+# No restrictions on Loopback Interface
+$cmd 00010 allow all from any to any via lo0
+
+ The next rule allows the packet through if it matches
+ an existing entry in the dynamic rules table:
+
+ $cmd 00015 check-state
+
+ The next set of rules defines which stateful connections
+ internal systems can create to hosts on the Internet:
+
+ # Allow access to public DNS
+# Replace x.x.x.x with the IP address of a public DNS server
+# and repeat for each DNS server in /etc/resolv.conf
+$cmd 00110 allow tcp from any to x.x.x.x 53 out via $pif setup keep-state
+$cmd 00111 allow udp from any to x.x.x.x 53 out via $pif keep-state
+
+# Allow access to ISP's DHCP server for cable/DSL configurations.
+# Use the first rule and check log for IP address.
+# Then, uncomment the second rule, input the IP address, and delete the first rule
+$cmd 00120 allow log udp from any to any 67 out via $pif keep-state
+#$cmd 00120 allow udp from any to x.x.x.x 67 out via $pif keep-state
+
+# Allow outbound HTTP and HTTPS connections
+$cmd 00200 allow tcp from any to any 80 out via $pif setup keep-state
+$cmd 00220 allow tcp from any to any 443 out via $pif setup keep-state
+
+# Allow outbound email connections
+$cmd 00230 allow tcp from any to any 25 out via $pif setup keep-state
+$cmd 00231 allow tcp from any to any 110 out via $pif setup keep-state
+
+# Allow outbound ping
+$cmd 00250 allow icmp from any to any out via $pif keep-state
+
+# Allow outbound NTP
+$cmd 00260 allow tcp from any to any 37 out via $pif setup keep-state
+
+# Allow outbound SSH
+$cmd 00280 allow tcp from any to any 22 out via $pif setup keep-state
+
+# deny and log all other outbound connections
+$cmd 00299 deny log all from any to any out via $pif
+
+ The next set of rules controls connections from
+ Internet hosts to the internal network. It starts by
+ denying packets typically associated with attacks and then
+ explicitly allows specific types of connections. All the
+ authorized services that originate from the Internet use
+ limit to prevent flooding.
+
+ # Deny all inbound traffic from non-routable reserved address spaces
+$cmd 00300 deny all from 192.168.0.0/16 to any in via $pif #RFC 1918 private IP
+$cmd 00301 deny all from 172.16.0.0/12 to any in via $pif #RFC 1918 private IP
+$cmd 00302 deny all from 10.0.0.0/8 to any in via $pif #RFC 1918 private IP
+$cmd 00303 deny all from 127.0.0.0/8 to any in via $pif #loopback
+$cmd 00304 deny all from 0.0.0.0/8 to any in via $pif #loopback
+$cmd 00305 deny all from 169.254.0.0/16 to any in via $pif #DHCP auto-config
+$cmd 00306 deny all from 192.0.2.0/24 to any in via $pif #reserved for docs
+$cmd 00307 deny all from 204.152.64.0/23 to any in via $pif #Sun cluster interconnect
+$cmd 00308 deny all from 224.0.0.0/3 to any in via $pif #Class D & E multicast
+
+# Deny public pings
+$cmd 00310 deny icmp from any to any in via $pif
+
+# Deny ident
+$cmd 00315 deny tcp from any to any 113 in via $pif
+
+# Deny all Netbios services.
+$cmd 00320 deny tcp from any to any 137 in via $pif
+$cmd 00321 deny tcp from any to any 138 in via $pif
+$cmd 00322 deny tcp from any to any 139 in via $pif
+$cmd 00323 deny tcp from any to any 81 in via $pif
+
+# Deny fragments
+$cmd 00330 deny all from any to any frag in via $pif
+
+# Deny ACK packets that did not match the dynamic rule table
+$cmd 00332 deny tcp from any to any established in via $pif
+
+# Allow traffic from ISP's DHCP server.
+# Replace x.x.x.x with the same IP address used in rule 00120.
+#$cmd 00360 allow udp from any to x.x.x.x 67 in via $pif keep-state
+
+# Allow HTTP connections to internal web server
+$cmd 00400 allow tcp from any to me 80 in via $pif setup limit src-addr 2
+
+# Allow inbound SSH connections
+$cmd 00410 allow tcp from any to me 22 in via $pif setup limit src-addr 2
+
+# Reject and log all other incoming connections
+$cmd 00499 deny log all from any to any in via $pif
+
+ The last rule logs all packets that do not match any of
+ the rules in the
+ ruleset:
+
+ # Everything else is denied and logged
+$cmd 00999 deny log all from any to any
+
+
The IPFW Command
@@ -2155,199 +2289,6 @@ ks="keep-state" # just too lazy t
- An Example Stateful Ruleset
-
- The following sample ruleset is a complete inclusive
- type ruleset. Comment out any
- pass rules for services that are not
- required. To avoid logging undesired messages, add a
- deny rule in the inbound section.
- Change the dc0 in every rule to the
- device name of the interface that connects the system to the
- Internet.
-
- There is a noticeable pattern in the usage of these
- rules.
-
-
-
- All statements that are a request to start a session
- to the Internet use
- keep-state.
-
-
-
- All the authorized services that originate from
- the Internet use limit to prevent
- flooding.
-
-
-
- All rules use in or
- out to clarify direction.
-
-
-
- All rules use via
- interface-name to specify
- the interface the packet is traveling over.
-
-
-
- The following rules go into
- /etc/ipfw.rules:
-
- ################ Start of IPFW rules file ###############################
-# Flush out the list before we begin.
-ipfw -q -f flush
-
-# Set rules command prefix
-cmd="ipfw -q add"
-pif="dc0" # public interface name of NIC
- # facing the public Internet
-
-#################################################################
-# No restrictions on Inside LAN Interface for private network
-# Not needed unless you have LAN.
-# Change xl0 to your LAN NIC interface name
-#################################################################
-#$cmd 00005 allow all from any to any via xl0
-
-#################################################################
-# No restrictions on Loopback Interface
-#################################################################
-$cmd 00010 allow all from any to any via lo0
-
-#################################################################
-# Allow the packet through if it has previous been added to the
-# the "dynamic" rules table by a allow keep-state statement.
-#################################################################
-$cmd 00015 check-state
-
-#################################################################
-# Interface facing Public Internet (Outbound Section)
-# Interrogate session start requests originating from behind the
-# firewall on the private network or from this gateway server
-# destined for the public Internet.
-#################################################################
-
-# Allow out access to my ISP's Domain name server.
-# x.x.x.x must be the IP address of your ISP.s DNS
-# Dup these lines if your ISP has more than one DNS server
-# Get the IP addresses from /etc/resolv.conf file
-$cmd 00110 allow tcp from any to x.x.x.x 53 out via $pif setup keep-state
-$cmd 00111 allow udp from any to x.x.x.x 53 out via $pif keep-state
-
-# Allow out access to my ISP's DHCP server for cable/DSL configurations.
-# This rule is not needed for .user ppp. connection to the public Internet.
-# so you can delete this whole group.
-# Use the following rule and check log for IP address.
-# Then put IP address in commented out rule & delete first rule
-$cmd 00120 allow log udp from any to any 67 out via $pif keep-state
-#$cmd 00120 allow udp from any to x.x.x.x 67 out via $pif keep-state
-
-# Allow out non-secure standard www function
-$cmd 00200 allow tcp from any to any 80 out via $pif setup keep-state
-
-# Allow out secure www function https over TLS SSL
-$cmd 00220 allow tcp from any to any 443 out via $pif setup keep-state
-
-# Allow out send & get email function
-$cmd 00230 allow tcp from any to any 25 out via $pif setup keep-state
-$cmd 00231 allow tcp from any to any 110 out via $pif setup keep-state
-
-# Allow out FBSD (make install & CVSUP) functions
-# Basically give user root "GOD" privileges.
-$cmd 00240 allow tcp from me to any out via $pif setup keep-state uid root
-
-# Allow out ping
-$cmd 00250 allow icmp from any to any out via $pif keep-state
-
-# Allow out Time
-$cmd 00260 allow tcp from any to any 37 out via $pif setup keep-state
-
-# Allow out nntp news (i.e., news groups)
-$cmd 00270 allow tcp from any to any 119 out via $pif setup keep-state
-
-# Allow out secure FTP, Telnet, and SCP
-# This function is using SSH (secure shell)
-$cmd 00280 allow tcp from any to any 22 out via $pif setup keep-state
-
-# Allow out whois
-$cmd 00290 allow tcp from any to any 43 out via $pif setup keep-state
-
-# deny and log everything else that.s trying to get out.
-# This rule enforces the block all by default logic.
-$cmd 00299 deny log all from any to any out via $pif
-
-#################################################################
-# Interface facing Public Internet (Inbound Section)
-# Check packets originating from the public Internet
-# destined for this gateway server or the private network.
-#################################################################
-
-# Deny all inbound traffic from non-routable reserved address spaces
-$cmd 00300 deny all from 192.168.0.0/16 to any in via $pif #RFC 1918 private IP
-$cmd 00301 deny all from 172.16.0.0/12 to any in via $pif #RFC 1918 private IP
-$cmd 00302 deny all from 10.0.0.0/8 to any in via $pif #RFC 1918 private IP
-$cmd 00303 deny all from 127.0.0.0/8 to any in via $pif #loopback
-$cmd 00304 deny all from 0.0.0.0/8 to any in via $pif #loopback
-$cmd 00305 deny all from 169.254.0.0/16 to any in via $pif #DHCP auto-config
-$cmd 00306 deny all from 192.0.2.0/24 to any in via $pif #reserved for docs
-$cmd 00307 deny all from 204.152.64.0/23 to any in via $pif #Sun cluster interconnect
-$cmd 00308 deny all from 224.0.0.0/3 to any in via $pif #Class D & E multicast
-
-# Deny public pings
-$cmd 00310 deny icmp from any to any in via $pif
-
-# Deny ident
-$cmd 00315 deny tcp from any to any 113 in via $pif
-
-# Deny all Netbios service. 137=name, 138=datagram, 139=session
-# Netbios is MS/Windows sharing services.
-# Block MS/Windows hosts2 name server requests 81
-$cmd 00320 deny tcp from any to any 137 in via $pif
-$cmd 00321 deny tcp from any to any 138 in via $pif
-$cmd 00322 deny tcp from any to any 139 in via $pif
-$cmd 00323 deny tcp from any to any 81 in via $pif
-
-# Deny any late arriving packets
-$cmd 00330 deny all from any to any frag in via $pif
-
-# Deny ACK packets that did not match the dynamic rule table
-$cmd 00332 deny tcp from any to any established in via $pif
-
-# Allow traffic in from ISP's DHCP server. This rule must contain
-# the IP address of your ISP.s DHCP server as it.s the only
-# authorized source to send this packet type.
-# Only necessary for cable or DSL configurations.
-# This rule is not needed for .user ppp. type connection to
-# the public Internet. This is the same IP address you captured
-# and used in the outbound section.
-#$cmd 00360 allow udp from any to x.x.x.x 67 in via $pif keep-state
-
-# Allow in standard www function because I have apache server
-$cmd 00400 allow tcp from any to me 80 in via $pif setup limit src-addr 2
-
-# Allow in secure FTP, Telnet, and SCP from public Internet
-$cmd 00410 allow tcp from any to me 22 in via $pif setup limit src-addr 2
-
-# Allow in non-secure Telnet session from public Internet
-# labeled non-secure because ID & PW are passed over public
-# Internet as clear text.
-# Delete this sample group if you do not have telnet server enabled.
-$cmd 00420 allow tcp from any to me 23 in via $pif setup limit src-addr 2
-
-# Reject & Log all incoming connections from the outside
-$cmd 00499 deny log all from any to any in via $pif
-
-# Everything else is denied by default
-# deny and log all packets that fell through to see what they are
-$cmd 00999 deny log all from any to any
-################ End of IPFW rules file ###############################
-
-
- An Example NAT and Stateful
Ruleset
From owner-svn-doc-all@FreeBSD.ORG Wed Feb 26 22:19:05 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 955D670C;
Wed, 26 Feb 2014 22:19:05 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 709C912DA;
Wed, 26 Feb 2014 22:19:05 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1QMJ5Qa033820;
Wed, 26 Feb 2014 22:19:05 GMT (envelope-from dru@svn.freebsd.org)
Received: (from dru@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1QMJ53n033818;
Wed, 26 Feb 2014 22:19:05 GMT (envelope-from dru@svn.freebsd.org)
Message-Id: <201402262219.s1QMJ53n033818@svn.freebsd.org>
From: Dru Lavigne
Date: Wed, 26 Feb 2014 22:19:05 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44080 - in head/en_US.ISO8859-1/books/handbook:
advanced-networking firewalls
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 26 Feb 2014 22:19:05 -0000
Author: dru
Date: Wed Feb 26 22:19:04 2014
New Revision: 44080
URL: http://svnweb.freebsd.org/changeset/doc/44080
Log:
Prep work for merging Advanced Networking NAT section
into IPFW Configuring NAT section.
Move Configuring NAT to after Example Ruleset.
Next commit will start to merge the deleted content
into the NAT section.
Sponsored by: iXsystems
Modified:
head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml
head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml Wed Feb 26 21:53:13 2014 (r44079)
+++ head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml Wed Feb 26 22:19:04 2014 (r44080)
@@ -48,10 +48,6 @@
- How to set up network address translation.
-
-
- How to set up IPv6 on a &os;
machine.
@@ -4740,386 +4736,6 @@ Received 264951 bytes in 0.1 seconds
-
-
- Network Address Translation
-
-
-
-
- Chern
- Lee
-
- Contributed by
-
-
-
-
-
- Overview
-
-
- &man.natd.8;
-
-
- &os;'s Network Address Translation
- (NAT) daemon, &man.natd.8;, accepts
- incoming raw IP packets, changes the
- source to the local machine, and injects these packets back
- into the outgoing IP packet stream. The
- source IP address and port are changed
- such that when data is received back, it is able to determine
- the original location of the data and forward it back to its
- original requester.
-
-
- Internet connection sharing
-
-
- NAT
-
-
- The most common use of NAT is to
- perform what is commonly known as Internet Connection
- Sharing.
-
-
-
- Setup
-
- Due to the diminishing IP address
- space in IPv4 and the increased number of
- users on high-speed consumer lines such as cable or
- DSL, people are increasingly in need of
- an Internet Connection Sharing solution. The ability to
- connect several computers online through one connection and
- IP address makes &man.natd.8; a reasonable
- choice.
-
- Most commonly, a user has a machine connected to a cable
- or DSL line with one IP
- address and wishes to use this one connected computer to
- provide Internet access to several more over a
- LAN.
-
- To do this, the &os; machine connected to the Internet
- must act as a gateway. This gateway machine must have two
- NICs: one connects to the Internet router
- and the other connects to a LAN. All the
- machines on the LAN are connected through
- a hub or switch.
-
-
- There are many ways to get a LAN
- connected to the Internet through a &os; gateway. This
- example will only cover a gateway with at least two
- NICs.
-
-
-
-
-
-
-
-
- _______ __________ ________
- | | | | | |
- | Hub |-----| Client B |-----| Router |----- Internet
- |_______| |__________| |________|
- |
- ____|_____
-| |
-| Client A |
-|__________|
-
-
-
- Network Layout
-
-
-
- A setup like this is commonly used to share an Internet
- connection. One of the LAN machines is
- connected to the Internet and the rest of the machines access
- the Internet through that gateway
- machine.
-
-
-
- Boot Loader Configuration
-
-
- boot loader
- configuration
-
-
- The kernel features for &man.natd.8; are not enabled in
- the GENERIC kernel, but they can be
- loaded at boot time by adding a couple of options to
- /boot/loader.conf:
-
- ipfw_load="YES"
-ipdivert_load="YES"
-
- Additionally, the
- net.inet.ip.fw.default_to_accept tunable
- option should be set to 1:
-
- net.inet.ip.fw.default_to_accept="1"
-
-
- It is a good idea to set this option during the first
- attempts to setup a firewall and NAT
- gateway. This sets the default policy of &man.ipfw.8; to
- be more permissive than the default deny ip from
- any to any, making it slightly more difficult
- to get locked out of the system right after a reboot.
-
-
-
-
- Kernel Configuration
-
-
- kernel
- configuration
-
-
- When modules are not an option or if it is preferable to
- build all the required features into a custom kernel, the
- following options must be in the custom kernel configuration
- file:
-
- options IPFIREWALL
-options IPDIVERT
-
- Additionally, the following may also be suitable:
-
- options IPFIREWALL_DEFAULT_TO_ACCEPT
-options IPFIREWALL_VERBOSE
-
-
-
- System Startup Configuration
-
- To enable firewall and NAT support at
- boot time, the following must be in
- /etc/rc.conf:
-
- gateway_enable="YES"
-firewall_enable="YES"
-firewall_type="OPEN"
-natd_enable="YES"
-natd_interface="fxp0"
-natd_flags=""
-
-
-
- Sets up the machine to act as a gateway. Running
- sysctl net.inet.ip.forwarding=1 would
- have the same effect.
-
-
-
- Enables the firewall rules in
- /etc/rc.firewall at boot.
-
-
-
- This specifies a predefined firewall ruleset that
- allows anything in. See
- /etc/rc.firewall for additional
- types.
-
-
-
- Indicates which interface to forward packets through.
- This is the interface that is connected to the
- Internet.
-
-
-
- Any additional configuration options passed to
- &man.natd.8; on boot.
-
-
-
- These
- /etc/rc.conf options will run
- natd -interface fxp0 at boot. This can
- also be run manually after boot.
-
-
- It is also possible to use a configuration file for
- &man.natd.8; when there are too many options to pass. In
- this case, the configuration file must be defined by adding
- the following line to
- /etc/rc.conf:
-
- natd_flags="-f /etc/natd.conf"
-
- A list of configuration options, one per line, can be
- added to /etc/natd.conf. For
- example:
-
- redirect_port tcp 192.168.0.2:6667 6667
-redirect_port tcp 192.168.0.3:80 80
-
- For more information about this configuration file,
- consult &man.natd.8;.
-
-
- Each machine and interface behind the
- LAN should be assigned
- IP addresses in the private network space,
- as defined by RFC
- 1918, and have a default gateway of the
- &man.natd.8; machine's internal IP
- address.
-
- For example, client A and
- B behind the LAN
- have IP addresses of 192.168.0.2 and 192.168.0.3, while the
- &man.natd.8; machine's LAN interface has an
- IP address of 192.168.0.1. The default
- gateway of clients A and
- B must be set to that of the
- &man.natd.8; machine, 192.168.0.1. The
- &man.natd.8; machine's external Internet interface does not
- require any special modification for &man.natd.8; to
- work.
-
-
-
- Port Redirection
-
- The drawback with &man.natd.8; is that the
- LAN clients are not accessible from the
- Internet. Clients on the LAN can make
- outgoing connections to the world but cannot receive incoming
- ones. This presents a problem if trying to run Internet
- services on one of the LAN client machines.
- A simple way around this is to redirect selected Internet
- ports on the &man.natd.8; machine to a LAN
- client.
-
- For example, an IRC server runs on
- client A and a web server runs on
- client B. For this to work properly,
- connections received on ports 6667 (IRC)
- and 80 (HTTP) must be redirected to the
- respective machines.
-
- The syntax for is as
- follows:
-
- -redirect_port proto targetIP:targetPORT[-targetPORT]
- [aliasIP:]aliasPORT[-aliasPORT]
- [remoteIP[:remotePORT[-remotePORT]]]
-
- In the above example, the argument should be:
-
- -redirect_port tcp 192.168.0.2:6667 6667
- -redirect_port tcp 192.168.0.3:80 80
-
- This redirects the proper TCP ports
- to the LAN client machines.
-
- Port ranges over individual ports can be indicated with
- . For example,
- tcp 192.168.0.2:2000-3000 2000-3000
- would redirect all connections received on ports 2000 to 3000
- to ports 2000 to 3000 on client
- A.
-
- These options can be used when directly running
- &man.natd.8;, placed within the
- natd_flags="" option in
- /etc/rc.conf, or passed via a
- configuration file.
-
- For further configuration options, consult
- &man.natd.8;
-
-
-
- Address Redirection
-
-
- address redirection
-
-
- Address redirection is useful if more than one
- IP address is available. Each
- LAN client can be assigned its own
- external IP address by &man.natd.8;,
- which will then rewrite outgoing packets from the
- LAN clients with the proper external
- IP address and redirects all traffic
- incoming on that particular IP address
- back to the specific LAN client. This is
- also known as static NAT. For example,
- if IP addresses 128.1.1.1, 128.1.1.2, and 128.1.1.3 are available,
- 128.1.1.1 can be
- used as the &man.natd.8; machine's external
- IP address, while 128.1.1.2 and 128.1.1.3 are forwarded back
- to LAN clients A
- and B.
-
- The syntax is as
- follows:
-
- -redirect_address localIP publicIP
-
-
-
-
-
-
- localIP
- The internal IP address of
- the LAN client.
-
-
-
- publicIP
- The external IP address
- corresponding to the LAN
- client.
-
-
-
-
-
- In the example, this argument would read:
-
- -redirect_address 192.168.0.2 128.1.1.2
--redirect_address 192.168.0.3 128.1.1.3
-
- Like , these arguments are
- placed within the natd_flags="" option
- of /etc/rc.conf, or passed via a
- configuration file. With address redirection, there is no
- need for port redirection since all data received on a
- particular IP address is redirected.
-
- The external IP addresses on the
- &man.natd.8; machine must be active and aliased to the
- external interface. Refer to &man.rc.conf.5; for
- details.
-
-
-
IPv6
Modified: head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Wed Feb 26 21:53:13 2014 (r44079)
+++ head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Wed Feb 26 22:19:04 2014 (r44080)
@@ -2120,177 +2120,9 @@ pif="dc0" # interface name of NIC at
# Everything else is denied and logged
$cmd 00999 deny log all from any to any
-
-
- The IPFW Command
-
- ipfw
-
- ipfw can be used to make manual,
- single rule additions or deletions to the active firewall
- while it is running. The problem with using this method is
- that all the changes are lost when the system reboots. It is
- recommended to instead write all the rules in a file and to
- use that file to load the rules at boot time and to replace
- the currently running firewall rules whenever that file
- changes.
-
- ipfw is a useful way to display the
- running firewall rules to the console screen. The
- IPFW accounting facility
- dynamically creates a counter for each rule that counts each
- packet that matches the rule. During the process of testing a
- rule, listing the rule with its counter is one way to
- determine if the rule is functioning as expected.
-
- To list all the running rules in sequence:
-
- &prompt.root; ipfw list
-
- To list all the running rules with a time stamp of when
- the last time the rule was matched:
-
- &prompt.root; ipfw -t list
-
- The next example lists accounting information and the
- packet count for matched rules along with the rules
- themselves. The first column is the rule number, followed by
- the number of matched packets and bytes, followed by the rule
- itself.
-
- &prompt.root; ipfw -a list
-
- To list dynamic rules in addition to static rules:
-
- &prompt.root; ipfw -d list
- To also show the expired dynamic rules:
-
- &prompt.root; ipfw -d -e list
-
- To zero the counters:
-
- &prompt.root; ipfw zero
-
- To zero the counters for just the rule with number
- NUM:
-
- &prompt.root; ipfw zero NUM
-
-
- Logging Firewall Messages
-
-
- IPFW
-
- logging
-
-
- Even with the logging facility enabled,
- IPFW will not generate any rule
- logging on its own. The firewall administrator decides
- which rules in the ruleset will be logged, and adds the
- log keyword to those rules. Normally
- only deny rules are logged. It is customary to duplicate
- the ipfw default deny everything rule with
- the log keyword included as the last rule
- in the ruleset. This way, it is possible to see all the
- packets that did not match any of the rules in the
- ruleset.
-
- Logging is a two edged sword. If one is not careful,
- an over abundance of log data or a DoS attack can fill the
- disk with log files. Log messages are not only written to
- syslogd, but also are displayed
- on the root console screen and soon become annoying.
-
- The IPFIREWALL_VERBOSE_LIMIT=5
- kernel option limits the number of consecutive messages
- sent to &man.syslogd.8;, concerning the packet matching of a
- given rule. When this option is enabled in the kernel, the
- number of consecutive messages concerning a particular rule
- is capped at the number specified. There is nothing to be
- gained from 200 identical log messages. With this option
- set to five,
- five consecutive messages concerning a particular rule
- would be logged to syslogd and
- the remainder identical consecutive messages would be
- counted and posted to syslogd
- with a phrase like the following:
-
- last message repeated 45 times
-
- All logged packets messages are written by default to
- /var/log/security, which is
- defined in /etc/syslog.conf.
-
-
-
- Building a Rule Script
-
- Most experienced IPFW users
- create a file containing the rules and code them in a manner
- compatible with running them as a script. The major benefit
- of doing this is the firewall rules can be refreshed in mass
- without the need of rebooting the system to activate them.
- This method is convenient in testing new rules as the
- procedure can be executed as many times as needed. Being a
- script, symbolic substitution can be used for frequently
- used values to be substituted into multiple rules.
-
- This example script is compatible with the syntax used
- by the &man.sh.1;, &man.csh.1;, and &man.tcsh.1; shells.
- Symbolic substitution fields are prefixed with a dollar sign
- ($). Symbolic fields do not have the $
- prefix. The value to populate the symbolic field must be
- enclosed in double quotes ("").
-
- Start the rules file like this:
-
- ############### start of example ipfw rules script #############
-#
-ipfw -q -f flush # Delete all rules
-# Set defaults
-oif="tun0" # out interface
-odns="192.0.2.11" # ISP's DNS server IP address
-cmd="ipfw -q add " # build rule prefix
-ks="keep-state" # just too lazy to key this each time
-$cmd 00500 check-state
-$cmd 00502 deny all from any to any frag
-$cmd 00501 deny tcp from any to any established
-$cmd 00600 allow tcp from any to any 80 out via $oif setup $ks
-$cmd 00610 allow tcp from any to $odns 53 out via $oif setup $ks
-$cmd 00611 allow udp from any to $odns 53 out via $oif $ks
-################### End of example ipfw rules script ############
-
- The rules are not important as the focus of this example
- is how the symbolic substitution fields are
- populated.
-
- If the above example was in
- /etc/ipfw.rules, the rules could be
- reloaded by the following command:
-
- &prompt.root; sh /etc/ipfw.rules
-
- /etc/ipfw.rules can be located
- anywhere and the file can have any name.
-
- The same thing could be accomplished by running these
- commands by hand:
-
- &prompt.root; ipfw -q -f flush
-&prompt.root; ipfw -q add check-state
-&prompt.root; ipfw -q add deny all from any to any frag
-&prompt.root; ipfw -q add deny tcp from any to any established
-&prompt.root; ipfw -q add allow tcp from any to any 80 out via tun0 setup keep-state
-&prompt.root; ipfw -q add allow tcp from any to 192.0.2.11 53 out via tun0 setup keep-state
-&prompt.root; ipfw -q add 00611 allow udp from any to 192.0.2.11 53 out via tun0 keep-state
-
-
-
- An Example NAT and Stateful
- Ruleset
+
+ Configuring NATNAT
@@ -2599,6 +2431,173 @@ pif="rl0" # public interface name of
# deny and log all packets that fell through to see what they are
$cmd 999 deny log all from any to any
################ End of IPFW rules file ###############################
+
+
+
+ The IPFW Command
+
+ ipfw
+
+ ipfw can be used to make manual,
+ single rule additions or deletions to the active firewall
+ while it is running. The problem with using this method is
+ that all the changes are lost when the system reboots. It is
+ recommended to instead write all the rules in a file and to
+ use that file to load the rules at boot time and to replace
+ the currently running firewall rules whenever that file
+ changes.
+
+ ipfw is a useful way to display the
+ running firewall rules to the console screen. The
+ IPFW accounting facility
+ dynamically creates a counter for each rule that counts each
+ packet that matches the rule. During the process of testing a
+ rule, listing the rule with its counter is one way to
+ determine if the rule is functioning as expected.
+
+ To list all the running rules in sequence:
+
+ &prompt.root; ipfw list
+
+ To list all the running rules with a time stamp of when
+ the last time the rule was matched:
+
+ &prompt.root; ipfw -t list
+
+ The next example lists accounting information and the
+ packet count for matched rules along with the rules
+ themselves. The first column is the rule number, followed by
+ the number of matched packets and bytes, followed by the rule
+ itself.
+
+ &prompt.root; ipfw -a list
+
+ To list dynamic rules in addition to static rules:
+
+ &prompt.root; ipfw -d list
+
+ To also show the expired dynamic rules:
+
+ &prompt.root; ipfw -d -e list
+
+ To zero the counters:
+
+ &prompt.root; ipfw zero
+
+ To zero the counters for just the rule with number
+ NUM:
+
+ &prompt.root; ipfw zero NUM
+
+
+ Logging Firewall Messages
+
+
+ IPFW
+
+ logging
+
+
+ Even with the logging facility enabled,
+ IPFW will not generate any rule
+ logging on its own. The firewall administrator decides
+ which rules in the ruleset will be logged, and adds the
+ log keyword to those rules. Normally
+ only deny rules are logged. It is customary to duplicate
+ the ipfw default deny everything rule with
+ the log keyword included as the last rule
+ in the ruleset. This way, it is possible to see all the
+ packets that did not match any of the rules in the
+ ruleset.
+
+ Logging is a two edged sword. If one is not careful,
+ an over abundance of log data or a DoS attack can fill the
+ disk with log files. Log messages are not only written to
+ syslogd, but also are displayed
+ on the root console screen and soon become annoying.
+
+ The IPFIREWALL_VERBOSE_LIMIT=5
+ kernel option limits the number of consecutive messages
+ sent to &man.syslogd.8;, concerning the packet matching of a
+ given rule. When this option is enabled in the kernel, the
+ number of consecutive messages concerning a particular rule
+ is capped at the number specified. There is nothing to be
+ gained from 200 identical log messages. With this option
+ set to five,
+ five consecutive messages concerning a particular rule
+ would be logged to syslogd and
+ the remainder identical consecutive messages would be
+ counted and posted to syslogd
+ with a phrase like the following:
+
+ last message repeated 45 times
+
+ All logged packets messages are written by default to
+ /var/log/security, which is
+ defined in /etc/syslog.conf.
+
+
+
+ Building a Rule Script
+
+ Most experienced IPFW users
+ create a file containing the rules and code them in a manner
+ compatible with running them as a script. The major benefit
+ of doing this is the firewall rules can be refreshed in mass
+ without the need of rebooting the system to activate them.
+ This method is convenient in testing new rules as the
+ procedure can be executed as many times as needed. Being a
+ script, symbolic substitution can be used for frequently
+ used values to be substituted into multiple rules.
+
+ This example script is compatible with the syntax used
+ by the &man.sh.1;, &man.csh.1;, and &man.tcsh.1; shells.
+ Symbolic substitution fields are prefixed with a dollar sign
+ ($). Symbolic fields do not have the $
+ prefix. The value to populate the symbolic field must be
+ enclosed in double quotes ("").
+
+ Start the rules file like this:
+
+ ############### start of example ipfw rules script #############
+#
+ipfw -q -f flush # Delete all rules
+# Set defaults
+oif="tun0" # out interface
+odns="192.0.2.11" # ISP's DNS server IP address
+cmd="ipfw -q add " # build rule prefix
+ks="keep-state" # just too lazy to key this each time
+$cmd 00500 check-state
+$cmd 00502 deny all from any to any frag
+$cmd 00501 deny tcp from any to any established
+$cmd 00600 allow tcp from any to any 80 out via $oif setup $ks
+$cmd 00610 allow tcp from any to $odns 53 out via $oif setup $ks
+$cmd 00611 allow udp from any to $odns 53 out via $oif $ks
+################### End of example ipfw rules script ############
+
+ The rules are not important as the focus of this example
+ is how the symbolic substitution fields are
+ populated.
+
+ If the above example was in
+ /etc/ipfw.rules, the rules could be
+ reloaded by the following command:
+
+ &prompt.root; sh /etc/ipfw.rules
+
+ /etc/ipfw.rules can be located
+ anywhere and the file can have any name.
+
+ The same thing could be accomplished by running these
+ commands by hand:
+
+ &prompt.root; ipfw -q -f flush
+&prompt.root; ipfw -q add check-state
+&prompt.root; ipfw -q add deny all from any to any frag
+&prompt.root; ipfw -q add deny tcp from any to any established
+&prompt.root; ipfw -q add allow tcp from any to any 80 out via tun0 setup keep-state
+&prompt.root; ipfw -q add allow tcp from any to 192.0.2.11 53 out via tun0 setup keep-state
+&prompt.root; ipfw -q add 00611 allow udp from any to 192.0.2.11 53 out via tun0 keep-state
From owner-svn-doc-all@FreeBSD.ORG Wed Feb 26 23:03:12 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id CCD0841F;
Wed, 26 Feb 2014 23:03:12 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id AD46116F0;
Wed, 26 Feb 2014 23:03:12 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1QN3CcG054705;
Wed, 26 Feb 2014 23:03:12 GMT (envelope-from dru@svn.freebsd.org)
Received: (from dru@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1QN3CW6054704;
Wed, 26 Feb 2014 23:03:12 GMT (envelope-from dru@svn.freebsd.org)
Message-Id: <201402262303.s1QN3CW6054704@svn.freebsd.org>
From: Dru Lavigne
Date: Wed, 26 Feb 2014 23:03:12 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44081 - head/en_US.ISO8859-1/books/handbook/firewalls
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 26 Feb 2014 23:03:12 -0000
Author: dru
Date: Wed Feb 26 23:03:12 2014
New Revision: 44081
URL: http://svnweb.freebsd.org/changeset/doc/44081
Log:
Initial merge of IPFW NAT content.
Tomorrow's commits will review the technical content.
Sponsored by: iXsystems
Modified:
head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Wed Feb 26 22:19:04 2014 (r44080)
+++ head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Wed Feb 26 23:03:12 2014 (r44081)
@@ -1999,6 +1999,18 @@ options IPDIVERT # enables NATinterface-name to specify
the interface the packet is traveling over.
+
+ When first creating or testing a firewall ruleset,
+ consider temporarily setting this tunable:
+
+ net.inet.ip.fw.default_to_accept="1"
+
+ This sets the default policy of &man.ipfw.8; to
+ be more permissive than the default deny ip from
+ any to any, making it slightly more difficult
+ to get locked out of the system right after a reboot.
+
+
The firewall script begins by indicating that it is a
Bourne shell script and flushes any existing rules. It then
creates the cmd variable so that
@@ -2122,31 +2134,86 @@ pif="dc0" # interface name of NIC at
+ Configuring NAT
+
+
+
+ Chern
+ Lee
+
+ Contributed by
+
+
+ NATand IPFW
- There are some additional configuration statements that
- need to be enabled to activate the NAT
- function of IPFW. For a
- customized kernel, the kernel configuration file needs
- option IPDIVERT added to the other
+ &os;'s built-in
+ NAT daemon, &man.natd.8;, works in
+ conjunction with IPFW to provide
+ network address translation. This can be used to provide an
+ Internet Connection Sharing solution so that
+ several internal computers can connect to the Internet using
+ IP address.
+
+ To do this, the &os; machine connected to the Internet
+ must act as a gateway. This gateway machine must have two
+ NICs: one connects to the Internet router
+ and the other connects to a LAN. All the
+ machines on the LAN are connected through
+ a hub or switch.
+
+ Each machine and interface behind the
+ LAN should be assigned
+ IP addresses in the private network space,
+ as defined by RFC
+ 1918, and have a default gateway of the
+ &man.natd.8; machine's internal IP
+ address.
+
+ Some additional configuration is
+ needed in order to activate the NAT
+ function of IPFW. If the system
+ has a custom kernel, the kernel configuration file needs to
+ include option IPDIVERT with the other
IPFIREWALL options.
- In addition to the normal
- IPFW options in
- /etc/rc.conf, the following are
- needed:
-
- natd_enable="YES" # Enable NATD function
-natd_interface="rl0" # interface name of public Internet NIC
+ To enable firewall and NAT support at
+ boot time, the following must be in
+ /etc/rc.conf:
+
+ gateway_enable="YES" # enables the gateway function
+natd_enable="YES" # enables the NAT function
+natd_interface="rl0" # specify interface name of NIC attached to Internet
natd_flags="-dynamic -m" # -m = preserve port numbers if possible
- Utilizing stateful rules with a divert
+
+ It is also possible to use a configuration file for
+ &man.natd.8; when there are too many options to pass. In
+ this case, the configuration file must be defined by adding
+ the following line to
+ /etc/rc.conf:
+
+ natd_flags="-f /etc/natd.conf"
+
+ A list of configuration options, one per line, can be
+ added to /etc/natd.conf. For
+ example:
+
+ redirect_port tcp 192.168.0.2:6667 6667
+redirect_port tcp 192.168.0.3:80 80
+
+ For more information about this configuration file,
+ consult &man.natd.8;.
+
+
+ Utilizing stateful rules with a divert
natd rule complicates the ruleset logic. The
positioning of the check-state, and
divert natd rules in the ruleset is
@@ -2431,7 +2498,131 @@ pif="rl0" # public interface name of
# deny and log all packets that fell through to see what they are
$cmd 999 deny log all from any to any
################ End of IPFW rules file ###############################
-
+
+
+ Port Redirection
+
+ The drawback with &man.natd.8; is that the
+ LAN clients are not accessible from the
+ Internet. Clients on the LAN can make
+ outgoing connections to the world but cannot receive incoming
+ ones. This presents a problem if trying to run Internet
+ services on one of the LAN client machines.
+ A simple way around this is to redirect selected Internet
+ ports on the &man.natd.8; machine to a LAN
+ client.
+
+ For example, an IRC server runs on
+ client A and a web server runs on
+ client B. For this to work properly,
+ connections received on ports 6667 (IRC)
+ and 80 (HTTP) must be redirected to the
+ respective machines.
+
+ The syntax for is as
+ follows:
+
+ -redirect_port proto targetIP:targetPORT[-targetPORT]
+ [aliasIP:]aliasPORT[-aliasPORT]
+ [remoteIP[:remotePORT[-remotePORT]]]
+
+ In the above example, the argument should be:
+
+ -redirect_port tcp 192.168.0.2:6667 6667
+ -redirect_port tcp 192.168.0.3:80 80
+
+ This redirects the proper TCP ports
+ to the LAN client machines.
+
+ Port ranges over individual ports can be indicated with
+ . For example,
+ tcp 192.168.0.2:2000-3000 2000-3000
+ would redirect all connections received on ports 2000 to 3000
+ to ports 2000 to 3000 on client
+ A.
+
+ These options can be used when directly running
+ &man.natd.8;, placed within the
+ natd_flags="" option in
+ /etc/rc.conf, or passed via a
+ configuration file.
+
+ For further configuration options, consult
+ &man.natd.8;
+
+
+
+ Address Redirection
+
+
+ address redirection
+
+
+ Address redirection is useful if more than one
+ IP address is available. Each
+ LAN client can be assigned its own
+ external IP address by &man.natd.8;,
+ which will then rewrite outgoing packets from the
+ LAN clients with the proper external
+ IP address and redirects all traffic
+ incoming on that particular IP address
+ back to the specific LAN client. This is
+ also known as static NAT. For example,
+ if IP addresses 128.1.1.1, 128.1.1.2, and 128.1.1.3 are available,
+ 128.1.1.1 can be
+ used as the &man.natd.8; machine's external
+ IP address, while 128.1.1.2 and 128.1.1.3 are forwarded back
+ to LAN clients A
+ and B.
+
+ The syntax is as
+ follows:
+
+ -redirect_address localIP publicIP
+
+
+
+
+
+
+ localIP
+ The internal IP address of
+ the LAN client.
+
+
+
+ publicIP
+ The external IP address
+ corresponding to the LAN
+ client.
+
+
+
+
+
+ In the example, this argument would read:
+
+ -redirect_address 192.168.0.2 128.1.1.2
+-redirect_address 192.168.0.3 128.1.1.3
+
+ Like , these arguments are
+ placed within the natd_flags="" option
+ of /etc/rc.conf, or passed via a
+ configuration file. With address redirection, there is no
+ need for port redirection since all data received on a
+ particular IP address is redirected.
+
+ The external IP addresses on the
+ &man.natd.8; machine must be active and aliased to the
+ external interface. Refer to &man.rc.conf.5; for
+ details.
+
+
The IPFW Command
From owner-svn-doc-all@FreeBSD.ORG Wed Feb 26 23:14:37 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 54869731;
Wed, 26 Feb 2014 23:14:37 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 3F29E17C1;
Wed, 26 Feb 2014 23:14:37 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1QNEbKO059158;
Wed, 26 Feb 2014 23:14:37 GMT (envelope-from wblock@svn.freebsd.org)
Received: (from wblock@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1QNEbP6059157;
Wed, 26 Feb 2014 23:14:37 GMT (envelope-from wblock@svn.freebsd.org)
Message-Id: <201402262314.s1QNEbP6059157@svn.freebsd.org>
From: Warren Block
Date: Wed, 26 Feb 2014 23:14:37 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44082 -
head/en_US.ISO8859-1/books/fdp-primer/editor-config
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 26 Feb 2014 23:14:37 -0000
Author: wblock
Date: Wed Feb 26 23:14:36 2014
New Revision: 44082
URL: http://svnweb.freebsd.org/changeset/doc/44082
Log:
Fix .nanorc config.
Submitted by: jgh
Modified:
head/en_US.ISO8859-1/books/fdp-primer/editor-config/chapter.xml
Modified: head/en_US.ISO8859-1/books/fdp-primer/editor-config/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/fdp-primer/editor-config/chapter.xml Wed Feb 26 23:03:12 2014 (r44081)
+++ head/en_US.ISO8859-1/books/fdp-primer/editor-config/chapter.xml Wed Feb 26 23:14:36 2014 (r44082)
@@ -94,7 +94,8 @@ augroup END
Add these lines to the new
~/.nanorc.
- # trailing whitespace
+ syntax "xml" "\.([jrs]html?|xml|xslt?)$"
+# trailing whitespace
color ,blue "[[:space:]]+$"
# multiples of eight spaces at the start a line
# (after zero or more tabs) should be a tab
From owner-svn-doc-all@FreeBSD.ORG Wed Feb 26 23:44:34 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 5232DD74;
Wed, 26 Feb 2014 23:44:34 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 39D901A42;
Wed, 26 Feb 2014 23:44:34 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1QNiYVP071932;
Wed, 26 Feb 2014 23:44:34 GMT (envelope-from dru@svn.freebsd.org)
Received: (from dru@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1QNiYqI071931;
Wed, 26 Feb 2014 23:44:34 GMT (envelope-from dru@svn.freebsd.org)
Message-Id: <201402262344.s1QNiYqI071931@svn.freebsd.org>
From: Dru Lavigne
Date: Wed, 26 Feb 2014 23:44:34 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44083 - head/en_US.ISO8859-1/books/handbook/firewalls
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 26 Feb 2014 23:44:34 -0000
Author: dru
Date: Wed Feb 26 23:44:33 2014
New Revision: 44083
URL: http://svnweb.freebsd.org/changeset/doc/44083
Log:
White space fix only. Translators can ignore.
Sponsored by: iXsystems
Modified:
head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Wed Feb 26 23:14:36 2014 (r44082)
+++ head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Wed Feb 26 23:44:33 2014 (r44083)
@@ -1708,40 +1708,39 @@ options IPDIVERT # enables NAT
If firewall_type is set to either
- client or simple,
- modify the default rules found in
- /etc/rc.firewall to fit the
- configuration of the system.
+ client or simple,
+ modify the default rules found in
+ /etc/rc.firewall to fit the
+ configuration of the system.
- Note that the
- filename type is used to load a custom ruleset.
+ Note that the filename type is used to
+ load a custom ruleset.An alternate way to load a custom ruleset is to set the
firewall_script variable to the absolute
- path of an executable script that includes
- IPFW commands. The examples used in this
- section assume that the firewall_script
- is set to /etc/ipfw.rules:
+ path of an executable script that
+ includes IPFW commands. The
+ examples used in this section assume that the
+ firewall_script is set to
+ /etc/ipfw.rules:
- firewall_script="/etc/ipfw.rules"
+ firewall_script="/etc/ipfw.rules"To enable logging, include this line:firewall_logging="YES"
- There is no
- /etc/rc.conf variable to set logging
- limits. To limit the number of times a rule is logged
- per connection attempt, specify the number using this line
- in
- /etc/sysctl.conf:
+ There is no /etc/rc.conf variable to
+ set logging limits. To limit the number of times a rule is
+ logged per connection attempt, specify the number using this
+ line in /etc/sysctl.conf:net.inet.ip.fw.verbose_limit=5
-
+
After saving the needed edits, start the firewall. To
enable logging limits now, also set the
sysctl value specified above:
-
+
&prompt.root; service ipfw start
&prompt.root; sysctl net.inet.ip.fw.verbose_limit=5
@@ -1755,13 +1754,12 @@ options IPDIVERT # enables NATrule processing order
- When a packet enters the IPFW firewall,
- it is compared against the first rule in the ruleset and
- progresses one rule at a time, moving from top to bottom in
- sequence. When the
- packet matches the selection parameters of a rule, the rule's
- action is executed and the search of the ruleset
- terminates for that packet. This is referred to as
+ When a packet enters the IPFW
+ firewall, it is compared against the first rule in the ruleset
+ and progresses one rule at a time, moving from top to bottom
+ in sequence. When the packet matches the selection parameters
+ of a rule, the rule's action is executed and the search of the
+ ruleset terminates for that packet. This is referred to as
first match wins. If the packet does not match
any of the rules, it gets caught by the mandatory
IPFW default rule number 65535,
@@ -1781,19 +1779,20 @@ options IPDIVERT # enables NATWhen creating an
IPFW rule, keywords must be
written in the following order. Some keywords are mandatory
- while other keywords are optional. The words shown in uppercase
- represent a variable and the words shown in lowercase must
- precede the variable that follows it. The # symbol is used
- to mark the start of a comment and may appear at the end of a
- rule or on its own line. Blank lines are ignored.
+ while other keywords are optional. The words shown in
+ uppercase represent a variable and the words shown in
+ lowercase must precede the variable that follows it. The
+ # symbol is used to mark the start of a
+ comment and may appear at the end of a rule or on its own
+ line. Blank lines are ignored.CMD RULE_NUMBER set SET_NUMBER ACTION log
- LOG_AMOUNT PROTO from SRC SRC_PORT to DST DST_PORT
+ LOG_AMOUNT PROTO from SRC SRC_PORT to DST DST_PORT
OPTIONSThis section provides an overview of these keywords and
- their options. It is not an exhaustive list of every possible
- option. Refer to &man.ipfw.8; for a complete description of
+ their options. It is not an exhaustive list of every possible
+ option. Refer to &man.ipfw.8; for a complete description of
the rule syntax that can be used when creating
IPFW rules.
@@ -1812,9 +1811,10 @@ options IPDIVERT # enables NATEach rule is associated with a number in the
range of 1 to
65534. The number is used to
- indicate the order of rule processing. Multiple rules can have the same
- number, in which case they are checked according to
- the order in which they have been added.
+ indicate the order of rule processing. Multiple rules
+ can have the same number, in which case they are checked
+ according to the order in which they have been
+ added.
@@ -1822,13 +1822,12 @@ options IPDIVERT # enables NATSET_NUMBER
Each rule is associated with a set number in the
- range of 0 to
- 31. Sets can be individually
- disabled or enabled, making it possible to quickly add
- or delete a set of rules. If a SET_NUMBER is not
- specified, the rule will be added to set 0.
-
-
+ range of 0 to 31.
+ Sets can be individually disabled or enabled, making it
+ possible to quickly add or delete a set of rules. If a
+ SET_NUMBER is not specified, the rule will be added to
+ set 0.
+
@@ -1840,14 +1839,15 @@ options IPDIVERT # enables NAT
allow | accept | pass |
- permit: these keywords are equivalent and allow packets
- that match the rule.
+ permit: these keywords are equivalent and
+ allow packets that match the rule.
- check-state: checks the packet against the dynamic state table.
- If a match is found, execute the action associated with
- the rule which generated this dynamic rule, otherwise
- move to the next rule. A check-state
- rule does not have selection criterion. If no
+ check-state: checks the
+ packet against the dynamic state table. If a match is
+ found, execute the action associated with the rule which
+ generated this dynamic rule, otherwise move to the next
+ rule. A check-state rule does not
+ have selection criterion. If no
check-state rule is present in the
ruleset, the dynamic rules table is checked at the first
keep-state or
@@ -1857,9 +1857,9 @@ options IPDIVERT # enables NAT
- deny | drop: either word discards
- packets that match this rule.
-
+ deny | drop: either word
+ discards packets that match this rule.
+
Additional actions are available. Refer to
&man.ipfw.8; for details.
@@ -1873,15 +1873,14 @@ options IPDIVERT # enables NATSECURITY. Logging only occurs if the
number of packets logged for that particular rule does
- not exceed the optional specified LOG_AMOUNT.
- If no LOG_AMOUNT is specified, the
- limit is taken from the value
- of net.inet.ip.fw.verbose_limit. A
- value of zero removes the logging limit.
- Once the limit is reached, logging can be re-enabled by
- clearing the logging counter or the packet counter for
- that rule, using ipfw reset
- log.
+ not exceed the optional specified LOG_AMOUNT. If no
+ LOG_AMOUNT is specified, the limit is taken from the
+ value of
+ net.inet.ip.fw.verbose_limit. A
+ value of zero removes the logging limit. Once the limit
+ is reached, logging can be re-enabled by clearing the
+ logging counter or the packet counter for that rule,
+ using ipfw reset log.Logging is done after all other packet matching
@@ -1898,25 +1897,25 @@ options IPDIVERT # enables NATThis optional value can be used to specify any
protocol name or number found in
/etc/protocols.
-
-
+
+
SRC
- The from
- keyword must be followed by the source address or a
- keyword that represents the source address. An address
- can be represented by the any,
- me (any address configured on an
- interface on this system),
+ The from keyword must be followed
+ by the source address or a keyword that represents the
+ source address. An address can be represented by the
+ any, me (any
+ address configured on an interface on this system),
me6, (any IPv6
address configured on an interface on this system), or
table followed by the number of a
lookup table which contains a list of addresses. When
specifying an IP address, it can be
optionally followed by its CIDR mask
- or subnet mask. For example, 1.2.3.4/25 or
+ or subnet mask. For example,
+ 1.2.3.4/25 or
1.2.3.4:255.255.255.128.
@@ -1934,10 +1933,10 @@ options IPDIVERT # enables NATDST
The to keyword must be followed
- by the destination address or a
- keyword that represents the destination address. The
- same keywords and addresses described in the SRC section
- can be used to describe the destination.
+ by the destination address or a keyword that represents
+ the destination address. The same keywords and
+ addresses described in the SRC section can be used to
+ describe the destination.
@@ -1956,28 +1955,29 @@ options IPDIVERT # enables NATSeveral keywords can follow the source and
destination. As the name suggests, OPTIONS are
optional. Commonly used options include
- in or
- out, which specify the direction of
- packet flow, icmptypes followed by
- the type of ICMP message, and
+ in or out, which
+ specify the direction of packet flow,
+ icmptypes followed by the type of
+ ICMP message, and
keep-state.
- When a keep-state rule is matched, the
- firewall will create a dynamic rule which
- matches bidirectional traffic between the
- source and destination addresses and ports using the same
+ When a keep-state rule is
+ matched, the firewall will create a dynamic rule which
+ matches bidirectional traffic between the source and
+ destination addresses and ports using the same
protocol.The dynamic rules facility is vulnerable to resource
depletion from a SYN-flood attack which would open a
huge number of dynamic rules. To counter this type of
attack with IPFW, use
- limit. This option limits the
- number of simultaneous sessions by checking the open dynamic rules, counting
- the number of times this rule and IP address
- combination occurred. If this count is greater than the
- value specified by limit, the packet
- is discarded.
+ limit. This option limits the number
+ of simultaneous sessions by checking the open dynamic
+ rules, counting the number of times this rule and
+ IP address combination occurred. If
+ this count is greater than the value specified by
+ limit, the packet is
+ discarded.Dozens of OPTIONS are available. Refer to
&man.ipfw.8; for a description of each available
@@ -1988,38 +1988,38 @@ options IPDIVERT # enables NAT
- Example Ruleset
+ Example Ruleset
- This section demonstrates how to create an example
- stateful firewall ruleset script named
- /etc/ipfw.rules. In this example, all
- connection rules use in or
- out to clarify the direction. They also
- use via
- interface-name to specify
- the interface the packet is traveling over.
-
-
- When first creating or testing a firewall ruleset,
- consider temporarily setting this tunable:
-
- net.inet.ip.fw.default_to_accept="1"
-
- This sets the default policy of &man.ipfw.8; to
- be more permissive than the default deny ip from
- any to any, making it slightly more difficult
- to get locked out of the system right after a reboot.
+ This section demonstrates how to create an example
+ stateful firewall ruleset script named
+ /etc/ipfw.rules. In this example, all
+ connection rules use in or
+ out to clarify the direction. They also
+ use via
+ interface-name to specify
+ the interface the packet is traveling over.
+
+
+ When first creating or testing a firewall ruleset,
+ consider temporarily setting this tunable:
+
+ net.inet.ip.fw.default_to_accept="1"
+
+ This sets the default policy of &man.ipfw.8; to be more
+ permissive than the default deny ip from any to
+ any, making it slightly more difficult to get
+ locked out of the system right after a reboot.
- The firewall script begins by indicating that it is a
- Bourne shell script and flushes any existing rules. It then
- creates the cmd variable so that
- ipfw add does not have to be typed at the
- beginning of every rule. It also defines the
- pif variable which represents the name of
- the interface that is attached to the Internet.
+ The firewall script begins by indicating that it is a
+ Bourne shell script and flushes any existing rules. It then
+ creates the cmd variable so that
+ ipfw add does not have to be typed at the
+ beginning of every rule. It also defines the
+ pif variable which represents the name of
+ the interface that is attached to the Internet.
- #!/bin/sh
+ #!/bin/sh
# Flush out the list before we begin.
ipfw -q -f flush
@@ -2027,24 +2027,24 @@ ipfw -q -f flush
cmd="ipfw -q add"
pif="dc0" # interface name of NIC attached to Internet
- The first two rules allow all traffic on the trusted
- internal interface and on the loopback interface:
+ The first two rules allow all traffic on the trusted
+ internal interface and on the loopback interface:
- # Change xl0 to LAN NIC interface name
+ # Change xl0 to LAN NIC interface name
$cmd 00005 allow all from any to any via xl0
# No restrictions on Loopback Interface
$cmd 00010 allow all from any to any via lo0
- The next rule allows the packet through if it matches
- an existing entry in the dynamic rules table:
+ The next rule allows the packet through if it matches an
+ existing entry in the dynamic rules table:
- $cmd 00015 check-state
+ $cmd 00015 check-state
- The next set of rules defines which stateful connections
- internal systems can create to hosts on the Internet:
+ The next set of rules defines which stateful connections
+ internal systems can create to hosts on the Internet:
- # Allow access to public DNS
+ # Allow access to public DNS
# Replace x.x.x.x with the IP address of a public DNS server
# and repeat for each DNS server in /etc/resolv.conf
$cmd 00110 allow tcp from any to x.x.x.x 53 out via $pif setup keep-state
@@ -2076,14 +2076,14 @@ pif="dc0" # interface name of NIC at
# deny and log all other outbound connections
$cmd 00299 deny log all from any to any out via $pif
- The next set of rules controls connections from
- Internet hosts to the internal network. It starts by
- denying packets typically associated with attacks and then
- explicitly allows specific types of connections. All the
- authorized services that originate from the Internet use
- limit to prevent flooding.
+ The next set of rules controls connections from Internet
+ hosts to the internal network. It starts by denying packets
+ typically associated with attacks and then explicitly allows
+ specific types of connections. All the authorized services
+ that originate from the Internet use limit
+ to prevent flooding.
- # Deny all inbound traffic from non-routable reserved address spaces
+ # Deny all inbound traffic from non-routable reserved address spaces
$cmd 00300 deny all from 192.168.0.0/16 to any in via $pif #RFC 1918 private IP
$cmd 00301 deny all from 172.16.0.0/12 to any in via $pif #RFC 1918 private IP
$cmd 00302 deny all from 10.0.0.0/8 to any in via $pif #RFC 1918 private IP
@@ -2125,50 +2125,49 @@ pif="dc0" # interface name of NIC at
# Reject and log all other incoming connections
$cmd 00499 deny log all from any to any in via $pif
- The last rule logs all packets that do not match any of
- the rules in the
- ruleset:
+ The last rule logs all packets that do not match any of
+ the rules in the ruleset:
- # Everything else is denied and logged
+ # Everything else is denied and logged
$cmd 00999 deny log all from any to any
-
+
-
-
+
+ Configuring NAT
-
-
- Chern
- Lee
-
- Contributed by
-
-
-
-
- NAT
+
+
+ Chern
+ Lee
+
+ Contributed by
+
+
+
+
+ NAT
- and IPFW
-
+ and IPFW
+
- &os;'s built-in
- NAT daemon, &man.natd.8;, works in
- conjunction with IPFW to provide
- network address translation. This can be used to provide an
- Internet Connection Sharing solution so that
- several internal computers can connect to the Internet using
- IP address.
+ &os;'s built-in NAT daemon,
+ &man.natd.8;, works in conjunction with
+ IPFW to provide network address
+ translation. This can be used to provide an Internet
+ Connection Sharing solution so that several internal computers
+ can connect to the Internet using IP
+ address.
- To do this, the &os; machine connected to the Internet
+ To do this, the &os; machine connected to the Internet
must act as a gateway. This gateway machine must have two
NICs: one connects to the Internet router
and the other connects to a LAN. All the
machines on the LAN are connected through
a hub or switch.
- Each machine and interface behind the
+ Each machine and interface behind the
LAN should be assigned
IP addresses in the private network space,
as defined by IP
address.
- Some additional configuration is
- needed in order to activate the NAT
- function of IPFW. If the system
- has a custom kernel, the kernel configuration file needs to
- include option IPDIVERT with the other
- IPFIREWALL options.
-
- To enable firewall and NAT support at
- boot time, the following must be in
- /etc/rc.conf:
+ Some additional configuration is needed in order to
+ activate the NAT function of
+ IPFW. If the system has a custom
+ kernel, the kernel configuration file needs to include
+ option IPDIVERT with the other
+ IPFIREWALL options.
+
+ To enable firewall and NAT support at
+ boot time, the following must be in
+ /etc/rc.conf:
- gateway_enable="YES" # enables the gateway function
+ gateway_enable="YES" # enables the gateway function
natd_enable="YES" # enables the NAT function
natd_interface="rl0" # specify interface name of NIC attached to Internet
natd_flags="-dynamic -m" # -m = preserve port numbers if possible
@@ -2213,87 +2212,87 @@ redirect_port tcp 192.168.0.3:80 80
- Utilizing stateful rules with a divert
- natd rule complicates the ruleset logic. The
- positioning of the check-state, and
- divert natd rules in the ruleset is
- critical and a new action type is used, called
- skipto. When using
- skipto, it is mandatory that each rule is
- numbered, so that the skipto rule knows
- which rule to jump to.
-
- The following is an uncommented example of a ruleset
- which explains the sequence of the packet flow.
-
- The processing flow starts with the first rule from the
- top of the ruleset and progresses one rule at a time until
- the end is reached or the packet matches and the packet is
- released out of the firewall. Take note of the location of
- rule numbers 100 101, 450, 500, and 510. These rules
- control the translation of the outbound and inbound packets
- so that their entries in the dynamic keep-state table always
- register the private LAN IP address. All the allow and deny
- rules specify the direction of the packet and the interface.
- All start outbound session requests will
- skipto rule 500 to undergo NAT.
-
- Consider a web browser which initializes a new HTTP
- session over port 80. When the first outbound packet enters
- the firewall, it does not match rule 100 because it is
- headed out rather than in. It passes rule 101 because this
- is the first packet, and it has not been posted to the
- dynamic keep-state table yet. The packet finally matches
- rule 125 as it is outbound through the NIC facing the
- Internet and has a source IP address as a private LAN IP
- address. On matching this rule, two actions take place.
- keep-state adds this rule to the dynamic
- keep-state rules table and the specified action is executed
- and posted as part of the info in the dynamic table. In
- this case, the action is skipto rule 500.
- Rule 500 NATs the packet IP address and
- sends it out to the Internet. This packet makes its way to
- the destination web server, where a response packet is
- generated and sent back. This new packet enters the top of
- the ruleset. It matches rule 100 and has it destination IP
- address mapped back to the corresponding LAN IP address. It
- then is processed by the check-state
- rule, is found in the table as an existing session, and is
- released to the LAN. It goes to the LAN system that sent it
- and a new packet is sent requesting another segment of the
- data from the remote server. This time it matches the
- check-state rule, its outbound entry is
- found, and the associated action,
- skipto 500, is executed. The packet
- jumps to rule 500, gets NATed, and is
- released to the Internet.
-
- On the inbound side, everything coming in that is part
- of an existing session is automatically handled by the
- check-state rule and the properly placed
- divert natd rules. The ruleset only has
- to deny bad packets and allow only authorized services.
- Consider a web server running on the firewall where web
- requests from the Internet should have access to the local
- web site. An inbound start request packet will match rule
- 100 and its IP address will be mapped to the LAN IP address
- of the firewall. The packet is then matched against all the
- nasty things that need to be checked and finally matches
- rule 425 where two actions occur. The packet rule is posted
- to the dynamic keep-state table but this time, any new
- session requests originating from that source IP address are
- limited to 2. This defends against DoS attacks against the
- service running on the specified port number. The action is
- allow, so the packet is released to the
- LAN. The packet generated as a response is recognized by the
- check-state as belonging to an existing
- session. It is then sent to rule 500 for
- NATing and released to the outbound
- interface.
+ Utilizing stateful rules with a divert
+ natd rule complicates the ruleset logic. The
+ positioning of the check-state, and
+ divert natd rules in the ruleset is
+ critical and a new action type is used, called
+ skipto. When using
+ skipto, it is mandatory that each rule is
+ numbered, so that the skipto rule knows
+ which rule to jump to.
+
+ The following is an uncommented example of a ruleset
+ which explains the sequence of the packet flow.
+
+ The processing flow starts with the first rule from the
+ top of the ruleset and progresses one rule at a time until
+ the end is reached or the packet matches and the packet is
+ released out of the firewall. Take note of the location of
+ rule numbers 100 101, 450, 500, and 510. These rules
+ control the translation of the outbound and inbound packets
+ so that their entries in the dynamic keep-state table always
+ register the private LAN IP address. All the allow and deny
+ rules specify the direction of the packet and the interface.
+ All start outbound session requests will
+ skipto rule 500 to undergo NAT.
+
+ Consider a web browser which initializes a new HTTP
+ session over port 80. When the first outbound packet enters
+ the firewall, it does not match rule 100 because it is
+ headed out rather than in. It passes rule 101 because this
+ is the first packet, and it has not been posted to the
+ dynamic keep-state table yet. The packet finally matches
+ rule 125 as it is outbound through the NIC facing the
+ Internet and has a source IP address as a private LAN IP
+ address. On matching this rule, two actions take place.
+ keep-state adds this rule to the dynamic
+ keep-state rules table and the specified action is executed
+ and posted as part of the info in the dynamic table. In
+ this case, the action is skipto rule 500.
+ Rule 500 NATs the packet IP address and
+ sends it out to the Internet. This packet makes its way to
+ the destination web server, where a response packet is
+ generated and sent back. This new packet enters the top of
+ the ruleset. It matches rule 100 and has it destination IP
+ address mapped back to the corresponding LAN IP address. It
+ then is processed by the check-state
+ rule, is found in the table as an existing session, and is
+ released to the LAN. It goes to the LAN system that sent it
+ and a new packet is sent requesting another segment of the
+ data from the remote server. This time it matches the
+ check-state rule, its outbound entry is
+ found, and the associated action,
+ skipto 500, is executed. The packet
+ jumps to rule 500, gets NATed, and is
+ released to the Internet.
+
+ On the inbound side, everything coming in that is part of
+ an existing session is automatically handled by the
+ check-state rule and the properly placed
+ divert natd rules. The ruleset only has
+ to deny bad packets and allow only authorized services.
+ Consider a web server running on the firewall where web
+ requests from the Internet should have access to the local
+ web site. An inbound start request packet will match rule
+ 100 and its IP address will be mapped to the LAN IP address
+ of the firewall. The packet is then matched against all the
+ nasty things that need to be checked and finally matches
+ rule 425 where two actions occur. The packet rule is posted
+ to the dynamic keep-state table but this time, any new
+ session requests originating from that source IP address are
+ limited to 2. This defends against DoS attacks against the
+ service running on the specified port number. The action is
+ allow, so the packet is released to the
+ LAN. The packet generated as a response is recognized by the
+ check-state as belonging to an existing
+ session. It is then sent to rule 500 for
+ NATing and released to the outbound
+ interface.
- Example Ruleset #1:
+ Example Ruleset #1:
- #!/bin/sh
+ #!/bin/sh
cmd="ipfw -q add"
skip="skipto 500"
pif=rl0
@@ -2340,13 +2339,13 @@ ipfw -q -f flush
######################## end of rules ##################
- The next example is functionally equivalent, but uses
- descriptive comments to help the inexperienced IPFW rule
- writer to better understand what the rules are doing.
+ The next example is functionally equivalent, but uses
+ descriptive comments to help the inexperienced IPFW rule
+ writer to better understand what the rules are doing.
- Example Ruleset #2:
+ Example Ruleset #2:
- #!/bin/sh
+ #!/bin/sh
################ Start of IPFW rules file ###############################
# Flush out the list before we begin.
ipfw -q -f flush
@@ -2499,130 +2498,132 @@ pif="rl0" # public interface name of
$cmd 999 deny log all from any to any
################ End of IPFW rules file ###############################
-
- Port Redirection
+
+ Port Redirection
- The drawback with &man.natd.8; is that the
- LAN clients are not accessible from the
- Internet. Clients on the LAN can make
- outgoing connections to the world but cannot receive incoming
- ones. This presents a problem if trying to run Internet
- services on one of the LAN client machines.
- A simple way around this is to redirect selected Internet
- ports on the &man.natd.8; machine to a LAN
- client.
-
- For example, an IRC server runs on
- client A and a web server runs on
- client B. For this to work properly,
- connections received on ports 6667 (IRC)
- and 80 (HTTP) must be redirected to the
- respective machines.
+ The drawback with &man.natd.8; is that the
+ LAN clients are not accessible from the
+ Internet. Clients on the LAN can make
+ outgoing connections to the world but cannot receive
+ incoming ones. This presents a problem if trying to run
+ Internet services on one of the LAN
+ client machines. A simple way around this is to redirect
+ selected Internet ports on the &man.natd.8; machine to a
+ LAN client.
+
+ For example, an IRC server runs on
+ client A and a web server runs on
+ client B. For this to work
+ properly, connections received on ports 6667
+ (IRC) and 80 (HTTP)
+ must be redirected to the respective machines.
- The syntax for is as
- follows:
+ The syntax for is as
+ follows:
- -redirect_port proto targetIP:targetPORT[-targetPORT]
+ -redirect_port proto targetIP:targetPORT[-targetPORT]
[aliasIP:]aliasPORT[-aliasPORT]
[remoteIP[:remotePORT[-remotePORT]]]
- In the above example, the argument should be:
+ In the above example, the argument should be:
- -redirect_port tcp 192.168.0.2:6667 6667
+ -redirect_port tcp 192.168.0.2:6667 6667
-redirect_port tcp 192.168.0.3:80 80
- This redirects the proper TCP ports
- to the LAN client machines.
+ This redirects the proper TCP ports
+ to the LAN client machines.
- Port ranges over individual ports can be indicated with
- . For example,
- tcp 192.168.0.2:2000-3000 2000-3000
- would redirect all connections received on ports 2000 to 3000
- to ports 2000 to 3000 on client
- A.
-
- These options can be used when directly running
- &man.natd.8;, placed within the
- natd_flags="" option in
- /etc/rc.conf, or passed via a
- configuration file.
-
- For further configuration options, consult
- &man.natd.8;
-
+ Port ranges over individual ports can be indicated with
+ . For example,
+ tcp 192.168.0.2:2000-3000
+ 2000-3000 would redirect all connections
+ received on ports 2000 to 3000 to ports 2000 to 3000 on
+ client A.
+
+ These options can be used when directly running
+ &man.natd.8;, placed within the
+ natd_flags="" option in
+ /etc/rc.conf, or passed via a
+ configuration file.
-
- Address Redirection
+ For further configuration options, consult
+ &man.natd.8;
+
-
- address redirection
-
+
+ Address Redirection
- Address redirection is useful if more than one
- IP address is available. Each
- LAN client can be assigned its own
- external IP address by &man.natd.8;,
- which will then rewrite outgoing packets from the
- LAN clients with the proper external
- IP address and redirects all traffic
- incoming on that particular IP address
- back to the specific LAN client. This is
- also known as static NAT. For example,
- if IP addresses 128.1.1.1, 128.1.1.2, and 128.1.1.3 are available,
- 128.1.1.1 can be
- used as the &man.natd.8; machine's external
- IP address, while 128.1.1.2 and 128.1.1.3 are forwarded back
- to LAN clients A
- and B.
-
- The syntax is as
- follows:
-
- -redirect_address localIP publicIP
-
-
-
-
-
-
- localIP
- The internal IP address of
- the LAN client.
-
-
-
- publicIP
- The external IP address
- corresponding to the LAN
- client.
-
-
-
-
+
+ address redirection
+
- In the example, this argument would read:
+ Address redirection is useful if more than one
+ IP address is available. Each
+ LAN client can be assigned its own
+ external IP address by &man.natd.8;,
+ which will then rewrite outgoing packets from the
+ LAN clients with the proper external
+ IP address and redirects all traffic
+ incoming on that particular IP address
+ back to the specific LAN client. This is
+ also known as static NAT. For example,
+ if IP addresses 128.1.1.1, 128.1.1.2, and 128.1.1.3 are available,
+ 128.1.1.1 can be
+ used as the &man.natd.8; machine's external
+ IP address, while 128.1.1.2 and 128.1.1.3 are forwarded
+ back to LAN clients
+ A and
+ B.
+
+ The syntax is as
+ follows:
+
+ -redirect_address localIP publicIP
+
+
+
+
+
+
+ localIP
+ The internal IP address of
+ the LAN client.
+
+
+
+ publicIP
+ The external IP address
+ corresponding to the LAN
+ client.
+
+
+
+
- -redirect_address 192.168.0.2 128.1.1.2
+ In the example, this argument would read:
+
+ -redirect_address 192.168.0.2 128.1.1.2
-redirect_address 192.168.0.3 128.1.1.3
- Like , these arguments are
- placed within the natd_flags="" option
- of /etc/rc.conf, or passed via a
- configuration file. With address redirection, there is no
- need for port redirection since all data received on a
- particular IP address is redirected.
-
- The external IP addresses on the
- &man.natd.8; machine must be active and aliased to the
- external interface. Refer to &man.rc.conf.5; for
- details.
-
-
+ Like , these arguments
+ are placed within the natd_flags=""
+ option of /etc/rc.conf, or passed via a
+ configuration file. With address redirection, there is no
+ need for port redirection since all data received on a
+ particular IP address is
+ redirected.
+
+ The external IP addresses on the
+ &man.natd.8; machine must be active and aliased to the
+ external interface. Refer to &man.rc.conf.5; for
+ details.
+
+
The IPFW Command
From owner-svn-doc-all@FreeBSD.ORG Thu Feb 27 16:40:11 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 9F57EE20;
Thu, 27 Feb 2014 16:40:11 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 8BCC119C5;
Thu, 27 Feb 2014 16:40:11 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1RGeBi7053135;
Thu, 27 Feb 2014 16:40:11 GMT (envelope-from mat@svn.freebsd.org)
Received: (from mat@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1RGeBGd053134;
Thu, 27 Feb 2014 16:40:11 GMT (envelope-from mat@svn.freebsd.org)
Message-Id: <201402271640.s1RGeBGd053134@svn.freebsd.org>
From: Mathieu Arnold
Date: Thu, 27 Feb 2014 16:40:11 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44085 -
head/en_US.ISO8859-1/books/porters-handbook/makefiles
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Thu, 27 Feb 2014 16:40:11 -0000
Author: mat (ports committer)
Date: Thu Feb 27 16:40:11 2014
New Revision: 44085
URL: http://svnweb.freebsd.org/changeset/doc/44085
Log:
Document the new %%NO_OPT%% plist sub.
Sponsored by: Absolight
Modified:
head/en_US.ISO8859-1/books/porters-handbook/makefiles/chapter.xml
Modified: head/en_US.ISO8859-1/books/porters-handbook/makefiles/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/porters-handbook/makefiles/chapter.xml Wed Feb 26 23:49:37 2014 (r44084)
+++ head/en_US.ISO8859-1/books/porters-handbook/makefiles/chapter.xml Thu Feb 27 16:40:11 2014 (r44085)
@@ -3645,9 +3645,9 @@ OPTIONS_SUB= yes
.include <bsd.port.options.mk>
.if ${PORT_OPTIONS:MOPT1}
-PLIST_SUB+= OPT1=""
+PLIST_SUB+= OPT1="" NO_OPT1="@comment "
.else
-PLIST_SUB+= OPT1="@comment "
+PLIST_SUB+= OPT1="@comment " NO_OPT1=""
.endif
If X_CONFIGURE_ENABLE is set then
From owner-svn-doc-all@FreeBSD.ORG Thu Feb 27 16:55:09 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id A37C458F;
Thu, 27 Feb 2014 16:55:09 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 8FD471B6C;
Thu, 27 Feb 2014 16:55:09 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1RGt9iC061071;
Thu, 27 Feb 2014 16:55:09 GMT (envelope-from dru@svn.freebsd.org)
Received: (from dru@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1RGt9me061070;
Thu, 27 Feb 2014 16:55:09 GMT (envelope-from dru@svn.freebsd.org)
Message-Id: <201402271655.s1RGt9me061070@svn.freebsd.org>
From: Dru Lavigne
Date: Thu, 27 Feb 2014 16:55:09 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44086 - head/en_US.ISO8859-1/books/handbook/firewalls
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Thu, 27 Feb 2014 16:55:09 -0000
Author: dru
Date: Thu Feb 27 16:55:09 2014
New Revision: 44086
URL: http://svnweb.freebsd.org/changeset/doc/44086
Log:
Fix some grammos.
Submitted by: bjk
Sponsored by: iXsystems
Modified:
head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Thu Feb 27 16:40:11 2014 (r44085)
+++ head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Thu Feb 27 16:55:09 2014 (r44086)
@@ -1808,11 +1808,11 @@ options IPDIVERT # enables NAT
RULE_NUMBER
- Each rule is associated with a number in the
- range of 1 to
+ Each rule is associated with a number from
+ 1 to
65534. The number is used to
indicate the order of rule processing. Multiple rules
- can have the same number, in which case they are checked
+ can have the same number, in which case they are applied
according to the order in which they have been
added.
@@ -1821,8 +1821,8 @@ options IPDIVERT # enables NAT
SET_NUMBER
- Each rule is associated with a set number in the
- range of 0 to 31.
+ Each rule is associated with a set number from
+ 0 to 31.
Sets can be individually disabled or enabled, making it
possible to quickly add or delete a set of rules. If a
SET_NUMBER is not specified, the rule will be added to
@@ -1854,11 +1854,11 @@ options IPDIVERT # enables NATlimit rule.count: updates counters for
- all packets that match rule. The search continues with
+ all packets that match the rule. The search continues with
the next rule.deny | drop: either word
- discards packets that match this rule.
+ silently discards packets that match this rule.Additional actions are available. Refer to
&man.ipfw.8; for details.
@@ -1873,7 +1873,7 @@ options IPDIVERT # enables NATSECURITY. Logging only occurs if the
number of packets logged for that particular rule does
- not exceed the optional specified LOG_AMOUNT. If no
+ not exceed a specified LOG_AMOUNT. If no
LOG_AMOUNT is specified, the limit is taken from the
value of
net.inet.ip.fw.verbose_limit. A
@@ -1905,7 +1905,7 @@ options IPDIVERT # enables NAT
The from keyword must be followed
by the source address or a keyword that represents the
- source address. An address can be represented by the
+ source address. An address can be represented by
any, me (any
address configured on an interface on this system),
me6, (any IPv6
From owner-svn-doc-all@FreeBSD.ORG Thu Feb 27 16:56:08 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 29BEE6BB;
Thu, 27 Feb 2014 16:56:08 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 160391B99;
Thu, 27 Feb 2014 16:56:08 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1RGu79h061261;
Thu, 27 Feb 2014 16:56:07 GMT (envelope-from dru@svn.freebsd.org)
Received: (from dru@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1RGu7ts061260;
Thu, 27 Feb 2014 16:56:07 GMT (envelope-from dru@svn.freebsd.org)
Message-Id: <201402271656.s1RGu7ts061260@svn.freebsd.org>
From: Dru Lavigne
Date: Thu, 27 Feb 2014 16:56:07 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44087 - head/en_US.ISO8859-1/books/handbook/firewalls
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Thu, 27 Feb 2014 16:56:08 -0000
Author: dru
Date: Thu Feb 27 16:56:07 2014
New Revision: 44087
URL: http://svnweb.freebsd.org/changeset/doc/44087
Log:
Remove extra space. Translators can ignore.
Submitted by: bjk
Sponsored by: iXsystems
Modified:
head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Thu Feb 27 16:55:09 2014 (r44086)
+++ head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Thu Feb 27 16:56:07 2014 (r44087)
@@ -1792,7 +1792,7 @@ options IPDIVERT # enables NATThis section provides an overview of these keywords and
their options. It is not an exhaustive list of every possible
- option. Refer to &man.ipfw.8; for a complete description of
+ option. Refer to &man.ipfw.8; for a complete description of
the rule syntax that can be used when creating
IPFW rules.
From owner-svn-doc-all@FreeBSD.ORG Thu Feb 27 18:05:03 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id BBFE43A9;
Thu, 27 Feb 2014 18:05:03 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id A79A313A7;
Thu, 27 Feb 2014 18:05:03 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1RI53Qt092762;
Thu, 27 Feb 2014 18:05:03 GMT (envelope-from dru@svn.freebsd.org)
Received: (from dru@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1RI53uQ092761;
Thu, 27 Feb 2014 18:05:03 GMT (envelope-from dru@svn.freebsd.org)
Message-Id: <201402271805.s1RI53uQ092761@svn.freebsd.org>
From: Dru Lavigne
Date: Thu, 27 Feb 2014 18:05:03 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44088 - head/en_US.ISO8859-1/books/handbook/firewalls
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Thu, 27 Feb 2014 18:05:03 -0000
Author: dru
Date: Thu Feb 27 18:05:03 2014
New Revision: 44088
URL: http://svnweb.freebsd.org/changeset/doc/44088
Log:
Start to clarify the NAT ruleset by comparing it to the
previous example.
The next commit will finish describing the rule modifications
and what to watch out for so that NAT works.
Sponsored by: iXsystems
Modified:
head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Thu Feb 27 16:56:07 2014 (r44087)
+++ head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Thu Feb 27 18:05:03 2014 (r44088)
@@ -2039,7 +2039,7 @@ pif="dc0" # interface name of NIC at
The next rule allows the packet through if it matches an
existing entry in the dynamic rules table:
- $cmd 00015 check-state
+ $cmd 00101 check-stateThe next set of rules defines which stateful connections
internal systems can create to hosts on the Internet:
@@ -2157,52 +2157,45 @@ pif="dc0" # interface name of NIC at
IPFW to provide network address
translation. This can be used to provide an Internet
Connection Sharing solution so that several internal computers
- can connect to the Internet using IP
+ can connect to the Internet using a single IP
address.To do this, the &os; machine connected to the Internet
- must act as a gateway. This gateway machine must have two
- NICs: one connects to the Internet router
- and the other connects to a LAN. All the
- machines on the LAN are connected through
- a hub or switch.
-
- Each machine and interface behind the
- LAN should be assigned
- IP addresses in the private network space,
+ must act as a gateway. This system must have two
+ NICs, where one is connected to the Internet
+ and the other is connected to the internal LAN. All the
+ machines connected to the LAN should be assigned
+ an IP addresses in the private network space,
as defined by RFC
- 1918, and have a default gateway of the
- &man.natd.8; machine's internal IP
+ 1918, and have their default gateway set to the
+ &man.natd.8; system's internal IP
address.Some additional configuration is needed in order to
activate the NAT function of
IPFW. If the system has a custom
kernel, the kernel configuration file needs to include
- option IPDIVERT with the other
+ option IPDIVERT along with the other
IPFIREWALL options.
- To enable firewall and NAT support at
+ To enable NAT support at
boot time, the following must be in
/etc/rc.conf:
- gateway_enable="YES" # enables the gateway function
-natd_enable="YES" # enables the NAT function
-natd_interface="rl0" # specify interface name of NIC attached to Internet
-natd_flags="-dynamic -m" # -m = preserve port numbers if possible
+ gateway_enable="YES" # enables the gateway
+natd_enable="YES" # enables NAT
+natd_interface="rl0" # specify interface name of NIC attached to Internet
+natd_flags="-dynamic -m" # -m = preserve port numbers; additional options are listed in &man.natd.8;
- It is also possible to use a configuration file for
- &man.natd.8; when there are too many options to pass. In
- this case, the configuration file must be defined by adding
- the following line to
- /etc/rc.conf:
+ It is also possible to specify a configuration file which
+ contains the options to pass to &man.natd.8;:natd_flags="-f /etc/natd.conf"
- A list of configuration options, one per line, can be
- added to /etc/natd.conf. For
+ The specified file must contain a list of configuration
+ options, one per line. For
example:redirect_port tcp 192.168.0.2:6667 6667
@@ -2212,18 +2205,50 @@ redirect_port tcp 192.168.0.3:80 80
- Utilizing stateful rules with a divert
- natd rule complicates the ruleset logic. The
- positioning of the check-state, and
- divert natd rules in the ruleset is
- critical and a new action type is used, called
- skipto. When using
- skipto, it is mandatory that each rule is
- numbered, so that the skipto rule knows
+ Next, add the NAT rules to the firewall
+ ruleset. When the rulest contains stateful rules, the
+ positioning of the NAT rules is
+ critical and the skipto action is used.
+ The
+ skipto action requires a rule number
+ so that it knows
which rule to jump to.
- The following is an uncommented example of a ruleset
- which explains the sequence of the packet flow.
+ The following example builds upon the firewall ruleset
+ shown in the previous section. It adds some additional
+ entries and modifies some existing rules in order to configure
+ the firewall for NAT. It starts by
+ adding some additional variables which represent the rule
+ number to skip to, the keep-state option,
+ and a list of TCP ports which will be
+ used to reduce the number of rules:
+
+ #!/bin/sh
+cmd="ipfw -q add"
+skip="skipto 500"
+pif=rl0
+ks="keep-state"
+good_tcpo="22,25,37,43,53,80,443,110,119"
+
+ipfw -q -f flush
+
+ The NAT rule is inserted
+ after the two rules which allow all
+ traffic on the trusted internal interface and on the loopback
+ interface and before the
+ check-state rule. It is important that the
+ rule number selected for the NAT rule, in
+ this example 100, is higher than the first
+ two rules and lower than the check-state
+ rule:
+
+ $cmd 005 allow all from any to any via xl0 # exclude LAN traffic
+$cmd 010 allow all from any to any via lo0 # exclude loopback traffic
+
+# NAT any inbound packets
+$cmd 100 divert natd ip from any to any in via $pif
+# Allow the packet through if it has an existing entry in the dynamic rules table
+$cmd 101 check-stateThe processing flow starts with the first rule from the
top of the ruleset and progresses one rule at a time until
@@ -2290,24 +2315,7 @@ redirect_port tcp 192.168.0.3:80 80NATing and released to the outbound
interface.
- Example Ruleset #1:
-
- #!/bin/sh
-cmd="ipfw -q add"
-skip="skipto 500"
-pif=rl0
-ks="keep-state"
-good_tcpo="22,25,37,43,53,80,443,110,119"
-
-ipfw -q -f flush
-
-$cmd 002 allow all from any to any via xl0 # exclude LAN traffic
-$cmd 003 allow all from any to any via lo0 # exclude loopback traffic
-
-$cmd 100 divert natd ip from any to any in via $pif
-$cmd 101 check-state
-
-# Authorized outbound packets
+# Authorized outbound packets
$cmd 120 $skip udp from any to xx.168.240.2 53 out via $pif $ks
$cmd 121 $skip udp from any to xx.168.240.5 53 out via $pif $ks
$cmd 125 $skip tcp from any to any $good_tcpo out via $pif setup $ks
@@ -2335,168 +2343,7 @@ ipfw -q -f flush
# This is skipto location for outbound stateful rules
$cmd 500 divert natd ip from any to any out via $pif
-$cmd 510 allow ip from any to any
-
-######################## end of rules ##################
-
- The next example is functionally equivalent, but uses
- descriptive comments to help the inexperienced IPFW rule
- writer to better understand what the rules are doing.
-
- Example Ruleset #2:
-
- #!/bin/sh
-################ Start of IPFW rules file ###############################
-# Flush out the list before we begin.
-ipfw -q -f flush
-
-# Set rules command prefix
-cmd="ipfw -q add"
-skip="skipto 800"
-pif="rl0" # public interface name of NIC
- # facing the public Internet
-
-#################################################################
-# No restrictions on Inside LAN Interface for private network
-# Change xl0 to your LAN NIC interface name
-#################################################################
-$cmd 005 allow all from any to any via xl0
-
-#################################################################
-# No restrictions on Loopback Interface
-#################################################################
-$cmd 010 allow all from any to any via lo0
-
-#################################################################
-# check if packet is inbound and nat address if it is
-#################################################################
-$cmd 014 divert natd ip from any to any in via $pif
-
-#################################################################
-# Allow the packet through if it has previous been added to the
-# the "dynamic" rules table by a allow keep-state statement.
-#################################################################
-$cmd 015 check-state
-
-#################################################################
-# Interface facing Public Internet (Outbound Section)
-# Check session start requests originating from behind the
-# firewall on the private network or from this gateway server
-# destined for the public Internet.
-#################################################################
-
-# Allow out access to my ISP's Domain name server.
-# x.x.x.x must be the IP address of your ISP's DNS
-# Dup these lines if your ISP has more than one DNS server
-# Get the IP addresses from /etc/resolv.conf file
-$cmd 020 $skip tcp from any to x.x.x.x 53 out via $pif setup keep-state
-
-
-# Allow out access to my ISP's DHCP server for cable/DSL configurations.
-$cmd 030 $skip udp from any to x.x.x.x 67 out via $pif keep-state
-
-# Allow out non-secure standard www function
-$cmd 040 $skip tcp from any to any 80 out via $pif setup keep-state
-
-# Allow out secure www function https over TLS SSL
-$cmd 050 $skip tcp from any to any 443 out via $pif setup keep-state
-
-# Allow out send & get email function
-$cmd 060 $skip tcp from any to any 25 out via $pif setup keep-state
-$cmd 061 $skip tcp from any to any 110 out via $pif setup keep-state
-
-# Allow out FreeBSD (make install & CVSUP) functions
-# Basically give user root "GOD" privileges.
-$cmd 070 $skip tcp from me to any out via $pif setup keep-state uid root
-
-# Allow out ping
-$cmd 080 $skip icmp from any to any out via $pif keep-state
-
-# Allow out Time
-$cmd 090 $skip tcp from any to any 37 out via $pif setup keep-state
-
-# Allow out nntp news (i.e., news groups)
-$cmd 100 $skip tcp from any to any 119 out via $pif setup keep-state
-
-# Allow out secure FTP, Telnet, and SCP
-# This function is using SSH (secure shell)
-$cmd 110 $skip tcp from any to any 22 out via $pif setup keep-state
-
-# Allow out whois
-$cmd 120 $skip tcp from any to any 43 out via $pif setup keep-state
-
-# Allow ntp time server
-$cmd 130 $skip udp from any to any 123 out via $pif keep-state
-
-#################################################################
-# Interface facing Public Internet (Inbound Section)
-# Check packets originating from the public Internet
-# destined for this gateway server or the private network.
-#################################################################
-
-# Deny all inbound traffic from non-routable reserved address spaces
-$cmd 300 deny all from 192.168.0.0/16 to any in via $pif #RFC 1918 private IP
-$cmd 301 deny all from 172.16.0.0/12 to any in via $pif #RFC 1918 private IP
-$cmd 302 deny all from 10.0.0.0/8 to any in via $pif #RFC 1918 private IP
-$cmd 303 deny all from 127.0.0.0/8 to any in via $pif #loopback
-$cmd 304 deny all from 0.0.0.0/8 to any in via $pif #loopback
-$cmd 305 deny all from 169.254.0.0/16 to any in via $pif #DHCP auto-config
-$cmd 306 deny all from 192.0.2.0/24 to any in via $pif #reserved for docs
-$cmd 307 deny all from 204.152.64.0/23 to any in via $pif #Sun cluster
-$cmd 308 deny all from 224.0.0.0/3 to any in via $pif #Class D & E multicast
-
-# Deny ident
-$cmd 315 deny tcp from any to any 113 in via $pif
-
-# Deny all Netbios service. 137=name, 138=datagram, 139=session
-# Netbios is MS/Windows sharing services.
-# Block MS/Windows hosts2 name server requests 81
-$cmd 320 deny tcp from any to any 137 in via $pif
-$cmd 321 deny tcp from any to any 138 in via $pif
-$cmd 322 deny tcp from any to any 139 in via $pif
-$cmd 323 deny tcp from any to any 81 in via $pif
-
-# Deny any late arriving packets
-$cmd 330 deny all from any to any frag in via $pif
-
-# Deny ACK packets that did not match the dynamic rule table
-$cmd 332 deny tcp from any to any established in via $pif
-
-# Allow traffic in from ISP's DHCP server. This rule must contain
-# the IP address of your ISP's DHCP server as it is the only
-# authorized source to send this packet type.
-# Only necessary for cable or DSL configurations.
-# This rule is not needed for 'user ppp' type connection to
-# the public Internet. This is the same IP address you captured
-# and used in the outbound section.
-$cmd 360 allow udp from x.x.x.x to any 68 in via $pif keep-state
-
-# Allow in standard www function because I have Apache server
-$cmd 370 allow tcp from any to me 80 in via $pif setup limit src-addr 2
-
-# Allow in secure FTP, Telnet, and SCP from public Internet
-$cmd 380 allow tcp from any to me 22 in via $pif setup limit src-addr 2
-
-# Allow in non-secure Telnet session from public Internet
-# labeled non-secure because ID & PW are passed over public
-# Internet as clear text.
-# Delete this sample group if you do not have telnet server enabled.
-$cmd 390 allow tcp from any to me 23 in via $pif setup limit src-addr 2
-
-# Reject & Log all unauthorized incoming connections from the public Internet
-$cmd 400 deny log all from any to any in via $pif
-
-# Reject & Log all unauthorized out going connections to the public Internet
-$cmd 450 deny log all from any to any out via $pif
-
-# This is skipto location for outbound stateful rules
-$cmd 800 divert natd ip from any to any out via $pif
-$cmd 801 allow ip from any to any
-
-# Everything else is denied by default
-# deny and log all packets that fell through to see what they are
-$cmd 999 deny log all from any to any
-################ End of IPFW rules file ###############################
+$cmd 510 allow ip from any to anyPort Redirection
From owner-svn-doc-all@FreeBSD.ORG Thu Feb 27 18:32:13 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 6DA1AD56;
Thu, 27 Feb 2014 18:32:13 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 4E6B716D2;
Thu, 27 Feb 2014 18:32:13 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1RIWDh7006319;
Thu, 27 Feb 2014 18:32:13 GMT (envelope-from mat@svn.freebsd.org)
Received: (from mat@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1RIWDDL006318;
Thu, 27 Feb 2014 18:32:13 GMT (envelope-from mat@svn.freebsd.org)
Message-Id: <201402271832.s1RIWDDL006318@svn.freebsd.org>
From: Mathieu Arnold
Date: Thu, 27 Feb 2014 18:32:13 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44089 -
head/en_US.ISO8859-1/books/porters-handbook/makefiles
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Thu, 27 Feb 2014 18:32:13 -0000
Author: mat (ports committer)
Date: Thu Feb 27 18:32:12 2014
New Revision: 44089
URL: http://svnweb.freebsd.org/changeset/doc/44089
Log:
Split up the Options Helpers section into subsections.
Sponsored by: Absolight
Modified:
head/en_US.ISO8859-1/books/porters-handbook/makefiles/chapter.xml
Modified: head/en_US.ISO8859-1/books/porters-handbook/makefiles/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/porters-handbook/makefiles/chapter.xml Thu Feb 27 18:05:03 2014 (r44088)
+++ head/en_US.ISO8859-1/books/porters-handbook/makefiles/chapter.xml Thu Feb 27 18:32:12 2014 (r44089)
@@ -3630,6 +3630,9 @@ CONFIGURE_ARGS+= --disable-foo
There are some macros to help simplify conditional values
which differ based on the options set.
+
+ OPTIONS_SUB
+
If OPTIONS_SUB is set to
yes then each of the options added to
OPTIONS_DEFINE will be added to
@@ -3649,6 +3652,10 @@ PLIST_SUB+= OPT1="" NO_OPT1="@comment "
.else
PLIST_SUB+= OPT1="@comment " NO_OPT1=""
.endif
+
+
+
+ X_CONFIGURE_ENABLEIf X_CONFIGURE_ENABLE is set then
--enable-${X_CONFIGURE_ENABLE} or
@@ -3670,6 +3677,10 @@ CONFIGURE_ARGS+= --enable-test
.else
CONFIGURE_ARGS+= --disable-test
.endif
+
+
+
+ X_CONFIGURE_WITHIf X_CONFIGURE_WITH is set then
--with-${X_CONFIGURE_WITH} or
@@ -3691,6 +3702,10 @@ CONFIGURE_ARGS+= --with-test
.else
CONFIGURE_ARGS+= --without-test
.endif
+
+
+
+ X_CONFIGURE_ONIf X_CONFIGURE_ON is set then its
value will be appended to CONFIGURE_ARGS
@@ -3709,6 +3724,10 @@ OPT1_CONFIGURE_ON= --add-test
+
+
+
+ X_CONFIGURE_OFFIf X_CONFIGURE_OFF is set then its
value will be appended to CONFIGURE_ARGS
@@ -3727,6 +3746,10 @@ OPT1_CONFIGURE_OFF= --no-test
+
+
+
+ X_CMAKE_ONIf X_CMAKE_ON is set then its value
will be appended to CMAKE_ARGS depending on
@@ -3745,6 +3768,10 @@ OPT1_CMAKE_ON= -DTEST:BOOL=true
+
+
+
+ X_CMAKE_OFFIf X_CMAKE_OFF is set then its value
will be appended to CMAKE_ARGS depending on
@@ -3763,6 +3790,10 @@ OPT1_CMAKE_OFF= -DTEST:BOOL=false
+
+
+
+ Generic Variables ReplacementFor any of the following variables:
@@ -3840,6 +3871,9 @@ CMAKE_ARGS+= -DTEST:BOOL=false
+
+ X_ABOVEVARIABLE
+
If X_ABOVEVARIABLE is defined then
its value will be appended to
ABOVEVARIABLE depending on the status of
@@ -3859,6 +3893,10 @@ OPT1_CFLAGS= -DTEST
USES+= gmake
CFLAGS+= -DTEST
.endif
+
+
+
+ X_ABOVEVARIABLE_OFFIf X_ABOVEVARIABLE_OFF is set then a
flag ABOVEVARIABLE will be automatically
@@ -3878,6 +3916,12 @@ OPT1_USES_OFF=gmake
USES+= gmake
.endif
+
+
+
+
+ Dependencies
+
For any of the following dependency type:
@@ -3910,6 +3954,9 @@ USES+= gmake
+
+ X_ABOVEVARIABLE
+
If X_ABOVEVARIABLE is defined then
its value will be appended to
ABOVEVARIABLE depending on the status
@@ -3928,6 +3975,11 @@ OPT1_LIB_DEPENDS= liba.so:${PORTSDIR}/de
LIB_DEPENDS+= liba.so:${PORTSDIR}/devel/a
.endif
+
+
+
+ X_ABOVEVARIABLE_OFF
+
If X_ABOVEVARIABLE_OFF is set then a
dependency of type ABOVEVARIABLE will be
added when option X is not selected. For
@@ -3945,6 +3997,8 @@ OPT1_LIB_DEPENDS_OFF= liba.so:${PORTSDIR
. if ! ${PORT_OPTIONS:MOPT1}
LIB_DEPENDS+= liba.so:${PORTSDIR}/devel/a
.endif
+
+
From owner-svn-doc-all@FreeBSD.ORG Thu Feb 27 18:33:41 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 358E8E80;
Thu, 27 Feb 2014 18:33:41 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 1601D16E8;
Thu, 27 Feb 2014 18:33:41 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1RIXe8m006594;
Thu, 27 Feb 2014 18:33:40 GMT (envelope-from mat@svn.freebsd.org)
Received: (from mat@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1RIXeXr006593;
Thu, 27 Feb 2014 18:33:40 GMT (envelope-from mat@svn.freebsd.org)
Message-Id: <201402271833.s1RIXeXr006593@svn.freebsd.org>
From: Mathieu Arnold
Date: Thu, 27 Feb 2014 18:33:40 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44090 -
head/en_US.ISO8859-1/books/porters-handbook/makefiles
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Thu, 27 Feb 2014 18:33:41 -0000
Author: mat (ports committer)
Date: Thu Feb 27 18:33:40 2014
New Revision: 44090
URL: http://svnweb.freebsd.org/changeset/doc/44090
Log:
Move the Dependencies section before the Generic Variables one.
Sponsored by: Absolight
Modified:
head/en_US.ISO8859-1/books/porters-handbook/makefiles/chapter.xml
Modified: head/en_US.ISO8859-1/books/porters-handbook/makefiles/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/porters-handbook/makefiles/chapter.xml Thu Feb 27 18:32:12 2014 (r44089)
+++ head/en_US.ISO8859-1/books/porters-handbook/makefiles/chapter.xml Thu Feb 27 18:33:40 2014 (r44090)
@@ -3793,6 +3793,87 @@ CMAKE_ARGS+= -DTEST:BOOL=false
+ Dependencies
+
+ For any of the following dependency type:
+
+
+
+ PKG_DEPENDS
+
+
+
+ EXTRACT_DEPENDS
+
+
+
+ PATCH_DEPENDS
+
+
+
+ FETCH_DEPENDS
+
+
+
+ BUILD_DEPENDS
+
+
+
+ LIB_DEPENDS
+
+
+
+ RUN_DEPENDS
+
+
+
+
+ X_ABOVEVARIABLE
+
+ If X_ABOVEVARIABLE is defined then
+ its value will be appended to
+ ABOVEVARIABLE depending on the status
+ of the option X, for example:
+
+ OPTIONS_DEFINE= OPT1
+OPT1_LIB_DEPENDS= liba.so:${PORTSDIR}/devel/a
+
+ is equivalent to:
+
+ OPTIONS_DEFINE= OPT1
+
+.include <bsd.port.options.mk>
+
+.if ${PORT_OPTIONS:MOPT1}
+LIB_DEPENDS+= liba.so:${PORTSDIR}/devel/a
+.endif
+
+
+
+
+ X_ABOVEVARIABLE_OFF
+
+ If X_ABOVEVARIABLE_OFF is set then a
+ dependency of type ABOVEVARIABLE will be
+ added when option X is not selected. For
+ example:
+
+ OPTIONS_DEFINE= OPT1
+OPT1_LIB_DEPENDS_OFF= liba.so:${PORTSDIR}/devel/a
+
+ is equivalent to:
+
+ OPTIONS_DEFINE= OPT1
+
+.include <bsd.port.options.mk>
+
+. if ! ${PORT_OPTIONS:MOPT1}
+LIB_DEPENDS+= liba.so:${PORTSDIR}/devel/a
+.endif
+
+
+
+ Generic Variables ReplacementFor any of the following variables:
@@ -3918,87 +3999,6 @@ USES+= gmake
-
-
- Dependencies
-
- For any of the following dependency type:
-
-
-
- PKG_DEPENDS
-
-
-
- EXTRACT_DEPENDS
-
-
-
- PATCH_DEPENDS
-
-
-
- FETCH_DEPENDS
-
-
-
- BUILD_DEPENDS
-
-
-
- LIB_DEPENDS
-
-
-
- RUN_DEPENDS
-
-
-
-
- X_ABOVEVARIABLE
-
- If X_ABOVEVARIABLE is defined then
- its value will be appended to
- ABOVEVARIABLE depending on the status
- of the option X, for example:
-
- OPTIONS_DEFINE= OPT1
-OPT1_LIB_DEPENDS= liba.so:${PORTSDIR}/devel/a
-
- is equivalent to:
-
- OPTIONS_DEFINE= OPT1
-
-.include <bsd.port.options.mk>
-
-.if ${PORT_OPTIONS:MOPT1}
-LIB_DEPENDS+= liba.so:${PORTSDIR}/devel/a
-.endif
-
-
-
-
- X_ABOVEVARIABLE_OFF
-
- If X_ABOVEVARIABLE_OFF is set then a
- dependency of type ABOVEVARIABLE will be
- added when option X is not selected. For
- example:
-
- OPTIONS_DEFINE= OPT1
-OPT1_LIB_DEPENDS_OFF= liba.so:${PORTSDIR}/devel/a
-
- is equivalent to:
-
- OPTIONS_DEFINE= OPT1
-
-.include <bsd.port.options.mk>
-
-. if ! ${PORT_OPTIONS:MOPT1}
-LIB_DEPENDS+= liba.so:${PORTSDIR}/devel/a
-.endif
-
-
From owner-svn-doc-all@FreeBSD.ORG Thu Feb 27 18:40:43 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 4C072FB2;
Thu, 27 Feb 2014 18:40:43 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 37C721790;
Thu, 27 Feb 2014 18:40:43 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1RIehnq008465;
Thu, 27 Feb 2014 18:40:43 GMT (envelope-from mat@svn.freebsd.org)
Received: (from mat@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1RIehqm008464;
Thu, 27 Feb 2014 18:40:43 GMT (envelope-from mat@svn.freebsd.org)
Message-Id: <201402271840.s1RIehqm008464@svn.freebsd.org>
From: Mathieu Arnold
Date: Thu, 27 Feb 2014 18:40:43 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44091 -
head/en_US.ISO8859-1/books/porters-handbook/makefiles
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Thu, 27 Feb 2014 18:40:43 -0000
Author: mat (ports committer)
Date: Thu Feb 27 18:40:42 2014
New Revision: 44091
URL: http://svnweb.freebsd.org/changeset/doc/44091
Log:
Fix white space from previous two commits. Translators can ignore.
Sponsored by: Absolight
Modified:
head/en_US.ISO8859-1/books/porters-handbook/makefiles/chapter.xml
Modified: head/en_US.ISO8859-1/books/porters-handbook/makefiles/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/porters-handbook/makefiles/chapter.xml Thu Feb 27 18:33:40 2014 (r44090)
+++ head/en_US.ISO8859-1/books/porters-handbook/makefiles/chapter.xml Thu Feb 27 18:40:42 2014 (r44091)
@@ -3633,17 +3633,17 @@ CONFIGURE_ARGS+= --disable-foo
OPTIONS_SUB
- If OPTIONS_SUB is set to
- yes then each of the options added to
- OPTIONS_DEFINE will be added to
- PLIST_SUB, for example:
+ If OPTIONS_SUB is set to
+ yes then each of the options added to
+ OPTIONS_DEFINE will be added to
+ PLIST_SUB, for example:
- OPTIONS_DEFINE= OPT1
+ OPTIONS_DEFINE= OPT1
OPTIONS_SUB= yes
- is equivalent to:
+ is equivalent to:
- OPTIONS_DEFINE= OPT1
+ OPTIONS_DEFINE= OPT1
.include <bsd.port.options.mk>
@@ -3657,18 +3657,18 @@ PLIST_SUB+= OPT1="@comment " NO_OPT1=""
X_CONFIGURE_ENABLE
- If X_CONFIGURE_ENABLE is set then
- --enable-${X_CONFIGURE_ENABLE} or
- --disable-${X_CONFIGURE_ENABLE} will be
- added to CONFIGURE_ARGS depending on the
- value of the optionX, for example:
+ If X_CONFIGURE_ENABLE is set then
+ --enable-${X_CONFIGURE_ENABLE} or
+ --disable-${X_CONFIGURE_ENABLE} will be
+ added to CONFIGURE_ARGS depending on the
+ value of the optionX, for example:
- OPTIONS_DEFINE= OPT1
+ OPTIONS_DEFINE= OPT1
OPT1_CONFIGURE_ENABLE= test
- is equivalent to:
+ is equivalent to:
- OPTIONS_DEFINE= OPT1
+ OPTIONS_DEFINE= OPT1
.include <bsd.port.options.mk>
@@ -3682,18 +3682,19 @@ CONFIGURE_ARGS+= --disable-test
X_CONFIGURE_WITH
- If X_CONFIGURE_WITH is set then
- --with-${X_CONFIGURE_WITH} or
- --without-${X_CONFIGURE_WITH} will be added
- to CONFIGURE_ARGS depending on the status
- of the option X, for example:
+ If X_CONFIGURE_WITH is set then
+ --with-${X_CONFIGURE_WITH} or
+ --without-${X_CONFIGURE_WITH} will be
+ added to CONFIGURE_ARGS depending on the
+ status of the option X, for
+ example:
- OPTIONS_DEFINE= OPT1
+ OPTIONS_DEFINE= OPT1
OPT1_CONFIGURE_WITH= test
- is equivalent to:
+ is equivalent to:
- OPTIONS_DEFINE= OPT1
+ OPTIONS_DEFINE= OPT1
.include <bsd.port.options.mk>
@@ -3707,17 +3708,17 @@ CONFIGURE_ARGS+= --without-test
X_CONFIGURE_ON
- If X_CONFIGURE_ON is set then its
- value will be appended to CONFIGURE_ARGS
- depending on the status of the option X,
- for example:
+ If X_CONFIGURE_ON is set then its
+ value will be appended to CONFIGURE_ARGS
+ depending on the status of the option X,
+ for example:
- OPTIONS_DEFINE= OPT1
+ OPTIONS_DEFINE= OPT1
OPT1_CONFIGURE_ON= --add-test
- is equivalent to:
+ is equivalent to:
- OPTIONS_DEFINE= OPT1
+ OPTIONS_DEFINE= OPT1
.include <bsd.port.options.mk>
@@ -3729,17 +3730,17 @@ CONFIGURE_ARGS+= --add-test
X_CONFIGURE_OFF
- If X_CONFIGURE_OFF is set then its
- value will be appended to CONFIGURE_ARGS
- depending on the status of the option X,
- for example:
+ If X_CONFIGURE_OFF is set then its
+ value will be appended to CONFIGURE_ARGS
+ depending on the status of the option X,
+ for example:
- OPTIONS_DEFINE= OPT1
+ OPTIONS_DEFINE= OPT1
OPT1_CONFIGURE_OFF= --no-test
- is equivalent to:
+ is equivalent to:
- OPTIONS_DEFINE= OPT1
+ OPTIONS_DEFINE= OPT1
.include <bsd.port.options.mk>
@@ -3751,17 +3752,17 @@ CONFIGURE_ARGS+= --no-test
X_CMAKE_ON
- If X_CMAKE_ON is set then its value
- will be appended to CMAKE_ARGS depending on
- the status of the option X, for
- example:
+ If X_CMAKE_ON is set then its value
+ will be appended to CMAKE_ARGS depending
+ on the status of the option X, for
+ example:
- OPTIONS_DEFINE= OPT1
+ OPTIONS_DEFINE= OPT1
OPT1_CMAKE_ON= -DTEST:BOOL=true
- is equivalent to:
+ is equivalent to:
- OPTIONS_DEFINE= OPT1
+ OPTIONS_DEFINE= OPT1
.include <bsd.port.options.mk>
@@ -3773,17 +3774,17 @@ CMAKE_ARGS+= -DTEST:BOOL=true
X_CMAKE_OFF
- If X_CMAKE_OFF is set then its value
- will be appended to CMAKE_ARGS depending on
- the status of the option X, for
- example:
+ If X_CMAKE_OFF is set then its value
+ will be appended to CMAKE_ARGS depending
+ on the status of the option X, for
+ example:
- OPTIONS_DEFINE= OPT1
+ OPTIONS_DEFINE= OPT1
OPT1_CMAKE_OFF= -DTEST:BOOL=false
- is equivalent to:
+ is equivalent to:
- OPTIONS_DEFINE= OPT1
+ OPTIONS_DEFINE= OPT1
.include <bsd.port.options.mk>
@@ -3795,52 +3796,52 @@ CMAKE_ARGS+= -DTEST:BOOL=false
Dependencies
- For any of the following dependency type:
-
-
-
- PKG_DEPENDS
-
-
-
- EXTRACT_DEPENDS
-
-
-
- PATCH_DEPENDS
-
-
-
- FETCH_DEPENDS
-
-
-
- BUILD_DEPENDS
-
-
-
- LIB_DEPENDS
-
+ For any of the following dependency type:
-
- RUN_DEPENDS
-
-
+
+
+ PKG_DEPENDS
+
+
+
+ EXTRACT_DEPENDS
+
+
+
+ PATCH_DEPENDS
+
+
+
+ FETCH_DEPENDS
+
+
+
+ BUILD_DEPENDS
+
+
+
+ LIB_DEPENDS
+
+
+
+ RUN_DEPENDS
+
+
-
- X_ABOVEVARIABLE
+
+ X_ABOVEVARIABLE
- If X_ABOVEVARIABLE is defined then
- its value will be appended to
- ABOVEVARIABLE depending on the status
- of the option X, for example:
+ If X_ABOVEVARIABLE is defined then
+ its value will be appended to
+ ABOVEVARIABLE depending on the status
+ of the option X, for example:
- OPTIONS_DEFINE= OPT1
+ OPTIONS_DEFINE= OPT1
OPT1_LIB_DEPENDS= liba.so:${PORTSDIR}/devel/a
- is equivalent to:
+ is equivalent to:
- OPTIONS_DEFINE= OPT1
+ OPTIONS_DEFINE= OPT1
.include <bsd.port.options.mk>
@@ -3853,17 +3854,17 @@ LIB_DEPENDS+= liba.so:${PORTSDIR}/devel/
X_ABOVEVARIABLE_OFF
- If X_ABOVEVARIABLE_OFF is set then a
- dependency of type ABOVEVARIABLE will be
- added when option X is not selected. For
- example:
+ If X_ABOVEVARIABLE_OFF is set then
+ a dependency of type ABOVEVARIABLE will
+ be added when option X is not selected.
+ For example:
- OPTIONS_DEFINE= OPT1
+ OPTIONS_DEFINE= OPT1
OPT1_LIB_DEPENDS_OFF= liba.so:${PORTSDIR}/devel/a
- is equivalent to:
+ is equivalent to:
- OPTIONS_DEFINE= OPT1
+ OPTIONS_DEFINE= OPT1
.include <bsd.port.options.mk>
@@ -3876,97 +3877,97 @@ LIB_DEPENDS+= liba.so:${PORTSDIR}/devel/
Generic Variables Replacement
- For any of the following variables:
+ For any of the following variables:
-
-
- ALL_TARGET
-
-
-
- CATEGORIES
-
-
-
- CFLAGS
-
-
-
- CPPFLAGS
-
-
-
- CXXFLAGS
-
-
-
- CONFIGURE_ENV
-
-
-
- DISTFILES
-
-
-
- EXTRA_PATCHES
-
-
-
- INSTALL_TARGET
-
-
-
- LDFLAGS
-
-
-
- MAKE_ARGS
-
-
-
- MAKE_ENV
-
-
-
- PATCH_SITES
-
-
-
- PATCHFILES
-
-
-
- PLIST_FILES
-
-
-
- PLIST_DIRS
-
-
-
- PLIST_DIRSTRY
-
-
-
- USES
-
-
+
+
+ ALL_TARGET
+
+
+
+ CATEGORIES
+
+
+
+ CFLAGS
+
+
+
+ CPPFLAGS
+
+
+
+ CXXFLAGS
+
+
+
+ CONFIGURE_ENV
+
+
+
+ DISTFILES
+
+
+
+ EXTRA_PATCHES
+
+
+
+ INSTALL_TARGET
+
+
+
+ LDFLAGS
+
+
+
+ MAKE_ARGS
+
+
+
+ MAKE_ENV
+
+
+
+ PATCH_SITES
+
+
+
+ PATCHFILES
+
+
+
+ PLIST_FILES
+
+
+
+ PLIST_DIRS
+
+
+
+ PLIST_DIRSTRY
+
+
+
+ USES
+
+ X_ABOVEVARIABLE
- If X_ABOVEVARIABLE is defined then
- its value will be appended to
- ABOVEVARIABLE depending on the status of
- the option X, for example:
+ If X_ABOVEVARIABLE is defined then
+ its value will be appended to
+ ABOVEVARIABLE depending on the status
+ of the option X, for example:
- OPTIONS_DEFINE= OPT1
+ OPTIONS_DEFINE= OPT1
OPT1_USES= gmake
OPT1_CFLAGS= -DTEST
- is equivalent to:
+ is equivalent to:
- OPTIONS_DEFINE= OPT1
+ OPTIONS_DEFINE= OPT1
.include <bsd.port.options.mk>
@@ -3979,17 +3980,17 @@ CFLAGS+= -DTEST
X_ABOVEVARIABLE_OFF
- If X_ABOVEVARIABLE_OFF is set then a
- flag ABOVEVARIABLE will be automatically
- set when option X is not selected. For
- example:
+ If X_ABOVEVARIABLE_OFF is set then
+ a flag ABOVEVARIABLE will be
+ automatically set when option X is not
+ selected. For example:
- OPTIONS_DEFINE= OPT1
+ OPTIONS_DEFINE= OPT1
OPT1_USES_OFF=gmake
- is equivalent to:
+ is equivalent to:
- OPTIONS_DEFINE= OPT1
+ OPTIONS_DEFINE= OPT1
.include <bsd.port.options.mk>
From owner-svn-doc-all@FreeBSD.ORG Fri Feb 28 19:20:49 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 4CAB2539;
Fri, 28 Feb 2014 19:20:49 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 2F4F91CA9;
Fri, 28 Feb 2014 19:20:49 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s1SJKm0d040323;
Fri, 28 Feb 2014 19:20:48 GMT (envelope-from gjb@svn.freebsd.org)
Received: (from gjb@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s1SJKm6B040322;
Fri, 28 Feb 2014 19:20:48 GMT (envelope-from gjb@svn.freebsd.org)
Message-Id: <201402281920.s1SJKm6B040322@svn.freebsd.org>
From: Glen Barber
Date: Fri, 28 Feb 2014 19:20:48 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44092 - head/en_US.ISO8859-1/htdocs
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Fri, 28 Feb 2014 19:20:49 -0000
Author: gjb
Date: Fri Feb 28 19:20:48 2014
New Revision: 44092
URL: http://svnweb.freebsd.org/changeset/doc/44092
Log:
Add a redirection page for Google Summer of Code.
Sponsored by: The FreeBSD Foundation
Added:
head/en_US.ISO8859-1/htdocs/gsoc.html (contents, props changed)
Added: head/en_US.ISO8859-1/htdocs/gsoc.html
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ head/en_US.ISO8859-1/htdocs/gsoc.html Fri Feb 28 19:20:48 2014 (r44092)
@@ -0,0 +1,278 @@
+
+
+
+
+ Google Summer of Code
+
+
+
+
+
+
+
+
From owner-svn-doc-all@FreeBSD.ORG Mon Mar 3 13:40:20 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id E844A35B;
Mon, 3 Mar 2014 13:40:20 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id D10D1ABB;
Mon, 3 Mar 2014 13:40:20 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s23DeKGN029493;
Mon, 3 Mar 2014 13:40:20 GMT (envelope-from gjb@svn.freebsd.org)
Received: (from gjb@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s23DeKDx029492;
Mon, 3 Mar 2014 13:40:20 GMT (envelope-from gjb@svn.freebsd.org)
Message-Id: <201403031340.s23DeKDx029492@svn.freebsd.org>
From: Glen Barber
Date: Mon, 3 Mar 2014 13:40:20 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44107 - head/en_US.ISO8859-1/htdocs/releases/10.0R
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Mon, 03 Mar 2014 13:40:21 -0000
Author: gjb
Date: Mon Mar 3 13:40:20 2014
New Revision: 44107
URL: http://svnweb.freebsd.org/changeset/doc/44107
Log:
Fix two missing links.
Submitted by: brueffer
Sponsored by: The FreeBSD Foundation
Modified:
head/en_US.ISO8859-1/htdocs/releases/10.0R/installation.html
Modified: head/en_US.ISO8859-1/htdocs/releases/10.0R/installation.html
==============================================================================
--- head/en_US.ISO8859-1/htdocs/releases/10.0R/installation.html Mon Mar 3 12:20:40 2014 (r44106)
+++ head/en_US.ISO8859-1/htdocs/releases/10.0R/installation.html Mon Mar 3 13:40:20 2014 (r44107)
@@ -1,5 +1,5 @@
-FreeBSD 10.0-RELEASE Installation Instructions
FreeBSD 10.0-RELEASE Installation Instructions
The FreeBSD Project
Copyright 2014 The FreeBSD Documentation Project
FreeBSD is a registered trademark of
+
FreeBSD 10.0-RELEASE Installation Instructions
FreeBSD 10.0-RELEASE Installation Instructions
The FreeBSD Project
Copyright 2014 The FreeBSD Documentation Project
FreeBSD is a registered trademark of
the FreeBSD Foundation.
Intel, Celeron, EtherExpress, i386,
i486, Itanium, Pentium, and Xeon are trademarks or registered
trademarks of Intel Corporation or its subsidiaries in the United
@@ -22,12 +22,12 @@
screenshots.
The FreeBSD Webmaster Team is responsible for keeping the main FreeBSD web
+
The FreeBSD Webmaster Team is appointed by &os; Documentation Engineering Team,
+ and responsible for keeping the main FreeBSD web
sites up and running. This means web server configuration, CGI scripts,
fulltext and mailing list search. Anything web related, technical stuff
belongs to the scope of the Webmaster Team, excluding bugs in the
Modified: head/en_US.ISO8859-1/htdocs/internal/doceng.xml
==============================================================================
--- head/en_US.ISO8859-1/htdocs/internal/doceng.xml Mon Mar 3 18:49:52 2014 (r44111)
+++ head/en_US.ISO8859-1/htdocs/internal/doceng.xml Tue Mar 4 01:43:32 2014 (r44112)
@@ -53,6 +53,10 @@
committer) changes that introduce broken links, cause the Web
site build to break, or otherwise degrade the accessibility of
the FreeBSD Web site and documentation.
+
+
To appoint and oversee a &os; Webmaster Team that carries out
+ daily maintenance of the Project web servers in collaboration
+ with other teams.
It is specifically noted here that doceng@ is not a conflict
From owner-svn-doc-all@FreeBSD.ORG Tue Mar 4 12:57:52 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id B919C521;
Tue, 4 Mar 2014 12:57:52 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id A5401FF4;
Tue, 4 Mar 2014 12:57:52 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s24CvqaO006979;
Tue, 4 Mar 2014 12:57:52 GMT (envelope-from wblock@svn.freebsd.org)
Received: (from wblock@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s24CvqwM006978;
Tue, 4 Mar 2014 12:57:52 GMT (envelope-from wblock@svn.freebsd.org)
Message-Id: <201403041257.s24CvqwM006978@svn.freebsd.org>
From: Warren Block
Date: Tue, 4 Mar 2014 12:57:52 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44113 -
head/en_US.ISO8859-1/books/fdp-primer/docbook-markup
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Tue, 04 Mar 2014 12:57:52 -0000
Author: wblock
Date: Tue Mar 4 12:57:52 2014
New Revision: 44113
URL: http://svnweb.freebsd.org/changeset/doc/44113
Log:
Fix the example usage of an article link.
Modified:
head/en_US.ISO8859-1/books/fdp-primer/docbook-markup/chapter.xml
Modified: head/en_US.ISO8859-1/books/fdp-primer/docbook-markup/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/fdp-primer/docbook-markup/chapter.xml Tue Mar 4 01:43:32 2014 (r44112)
+++ head/en_US.ISO8859-1/books/fdp-primer/docbook-markup/chapter.xml Tue Mar 4 12:57:52 2014 (r44113)
@@ -273,7 +273,7 @@
&url.articles.committers-guide;&url.articles.committers-guide;Usage: A link to the <link
- xlink:href="&url.articles.committers-guide;"Committer's
+ xlink:href="&url.articles.committers-guide;">Committer's
Guide</link>
article.
From owner-svn-doc-all@FreeBSD.ORG Tue Mar 4 15:54:27 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 3DBF194D;
Tue, 4 Mar 2014 15:54:27 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 2A6966BE;
Tue, 4 Mar 2014 15:54:27 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s24FsR8r080043;
Tue, 4 Mar 2014 15:54:27 GMT (envelope-from gjb@svn.freebsd.org)
Received: (from gjb@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s24FsRHB080042;
Tue, 4 Mar 2014 15:54:27 GMT (envelope-from gjb@svn.freebsd.org)
Message-Id: <201403041554.s24FsRHB080042@svn.freebsd.org>
From: Glen Barber
Date: Tue, 4 Mar 2014 15:54:27 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44114 - head/en_US.ISO8859-1/htdocs/internal
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Tue, 04 Mar 2014 15:54:27 -0000
Author: gjb
Date: Tue Mar 4 15:54:26 2014
New Revision: 44114
URL: http://svnweb.freebsd.org/changeset/doc/44114
Log:
The machines.html page is far from a complete list, so reword its
reference to indicate that it is a list of general-access machines
instead.
Sponsored by: The FreeBSD Foundation
Modified:
head/en_US.ISO8859-1/htdocs/internal/about.xml
Modified: head/en_US.ISO8859-1/htdocs/internal/about.xml
==============================================================================
--- head/en_US.ISO8859-1/htdocs/internal/about.xml Tue Mar 4 12:57:52 2014 (r44113)
+++ head/en_US.ISO8859-1/htdocs/internal/about.xml Tue Mar 4 15:54:26 2014 (r44114)
@@ -33,7 +33,7 @@
href="../donations/donors.html">contributors to the FreeBSD project.
-
A complete list of all host names in the FreeBSD.org domain
+
A list of general-access machines in the FreeBSD.org domain
is available at the The FreeBSD.org Network
page.
From owner-svn-doc-all@FreeBSD.ORG Tue Mar 4 16:02:41 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id E59D5B8E;
Tue, 4 Mar 2014 16:02:41 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id D23CE7CB;
Tue, 4 Mar 2014 16:02:41 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s24G2fWK084036;
Tue, 4 Mar 2014 16:02:41 GMT (envelope-from gjb@svn.freebsd.org)
Received: (from gjb@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s24G2fcY084035;
Tue, 4 Mar 2014 16:02:41 GMT (envelope-from gjb@svn.freebsd.org)
Message-Id: <201403041602.s24G2fcY084035@svn.freebsd.org>
From: Glen Barber
Date: Tue, 4 Mar 2014 16:02:41 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44115 - head/en_US.ISO8859-1/htdocs/internal
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Tue, 04 Mar 2014 16:02:42 -0000
Author: gjb
Date: Tue Mar 4 16:02:41 2014
New Revision: 44115
URL: http://svnweb.freebsd.org/changeset/doc/44115
Log:
Mention Bytemark, ISC, NYI as hardware/network providers.
Sponsored by: The FreeBSD Foundation
Modified:
head/en_US.ISO8859-1/htdocs/internal/about.xml
Modified: head/en_US.ISO8859-1/htdocs/internal/about.xml
==============================================================================
--- head/en_US.ISO8859-1/htdocs/internal/about.xml Tue Mar 4 15:54:26 2014 (r44114)
+++ head/en_US.ISO8859-1/htdocs/internal/about.xml Tue Mar 4 16:02:41 2014 (r44115)
@@ -29,6 +29,9 @@
Naturally, these systems all run FreeBSD. The hardware and network
connection have been generously provided by BSDi, Bytemark Hosting, Internet Systems Consortium, New York Internet, Yahoo!, and other contributors to the FreeBSD project.
From owner-svn-doc-all@FreeBSD.ORG Tue Mar 4 17:02:37 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 5F122E62;
Tue, 4 Mar 2014 17:02:37 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 2D11FD4C;
Tue, 4 Mar 2014 17:02:37 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s24H2bYm008695;
Tue, 4 Mar 2014 17:02:37 GMT (envelope-from gjb@svn.freebsd.org)
Received: (from gjb@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s24H2bWS008694;
Tue, 4 Mar 2014 17:02:37 GMT (envelope-from gjb@svn.freebsd.org)
Message-Id: <201403041702.s24H2bWS008694@svn.freebsd.org>
From: Glen Barber
Date: Tue, 4 Mar 2014 17:02:36 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44116 - head/en_US.ISO8859-1/htdocs/internal
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Tue, 04 Mar 2014 17:02:37 -0000
Author: gjb
Date: Tue Mar 4 17:02:36 2014
New Revision: 44116
URL: http://svnweb.freebsd.org/changeset/doc/44116
Log:
Dereference ipv6gw.
Sponsored by: The FreeBSD Foundation
Modified:
head/en_US.ISO8859-1/htdocs/internal/machines.xml
Modified: head/en_US.ISO8859-1/htdocs/internal/machines.xml
==============================================================================
--- head/en_US.ISO8859-1/htdocs/internal/machines.xml Tue Mar 4 16:02:41 2014 (r44115)
+++ head/en_US.ISO8859-1/htdocs/internal/machines.xml Tue Mar 4 17:02:36 2014 (r44116)
@@ -144,11 +144,6 @@ this file.
-
ipv6gw
-
IPv6 tunnel router (peer is at ISC).
-
-
-
mx1
Inbound Mail services.
From owner-svn-doc-all@FreeBSD.ORG Tue Mar 4 19:18:10 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 44A3B6E2;
Tue, 4 Mar 2014 19:18:10 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 25099C56;
Tue, 4 Mar 2014 19:18:10 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s24JIAaB065850;
Tue, 4 Mar 2014 19:18:10 GMT (envelope-from pgj@svn.freebsd.org)
Received: (from pgj@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s24JI9Fl065849;
Tue, 4 Mar 2014 19:18:09 GMT (envelope-from pgj@svn.freebsd.org)
Message-Id: <201403041918.s24JI9Fl065849@svn.freebsd.org>
From: Gabor Pali
Date: Tue, 4 Mar 2014 19:18:09 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44117 - head/en_US.ISO8859-1/htdocs/news/status
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Tue, 04 Mar 2014 19:18:10 -0000
Author: pgj
Date: Tue Mar 4 19:18:09 2014
New Revision: 44117
URL: http://svnweb.freebsd.org/changeset/doc/44117
Log:
- Update documentation on how to prepare the quarterly status reports
Modified:
head/en_US.ISO8859-1/htdocs/news/status/README
Modified: head/en_US.ISO8859-1/htdocs/news/status/README
==============================================================================
--- head/en_US.ISO8859-1/htdocs/news/status/README Tue Mar 4 17:02:36 2014 (r44116)
+++ head/en_US.ISO8859-1/htdocs/news/status/README Tue Mar 4 19:18:09 2014 (r44117)
@@ -11,17 +11,25 @@ Compiling status reports - best practice
writing. Make sure to keep them up to date with regard to categories
to pick from and place them prominently in the CFR - otherwise people
submit plain text reports and you have to format them yourself.
+ - Reporting howto is at: http://www.freebsd.org/news/status/howto.html.
+ It contains a great deal of useful hints for the submitters on how
+ to write good reports. But it also helps to forward all the completed
+ reports to developers for reference, and point to the latest report
+ in the CFR.
2) In the past we usually had to extend the deadline by a week in order to
get everybody to report. Starting early with kind reminders seems to
- help ;)
+ help ;) Ideally, reminders should be sent at least one month before the
+ deadline. But it is worthwhile the keep sending reminders two weeks
+ before the deadline and on the day of the deadline.
3) The following groups should be definitely approached for a report on
their recent activities:
- core@, portmgr@, doceng@, secteam@, re@, postmaster@, clusteradm@,
devsummit@ (team reports).
- FreeBSD Foundation (emaste@), participants of Foundation-sponsored
- projects.
+ projects, deb@ (Deb Goodkin) can also do a report for the Foundation
+ itself.
- Various conference organizers, depending on the season:
- BSDCan (info@bsdcan.org) May (April-June)
- EuroBSDcon (foundation@eurobsdcon.org) Sept-Oct (October-December)
@@ -35,10 +43,19 @@ Compiling status reports - best practice
if at all possible.
4) Building the report:
- - Accumulate the received reports in a single .xml file and use tidy(1) to
- get them well-formatted. Usually s without a description are missing
- the closing "/>" which is the cause for most of the errors you will
- encounter. Sometimes other closing tags are missing.
+ - Fold the reports into a work-in-progress draft as they are coming in (see
+ point 5) for putting the report together). Commit the result and hook the
+ draft into the build, so you can (almost) immediately provide the
+ submitters a preview of their entries. This is also a good excuse to do
+ a acknowledgement on the receipt.
+ - While the report draft is kept updated, other doc-committers (wblock,
+ pluknet, and bjk, for example) may review the individual entries and
+ propose fixes.
+ - As mentioned above, the received reports should be in a single .xml file,
+ where tidy(1) may be used to get them well-formatted. Usually s
+ without a description are missing the closing "/>" which is the cause for
+ most of the errors you will encounter. Sometimes other closing tags are
+ missing.
- Invoking tidy with the following options seems to cause the fewest
problems: tidy -xml -i -wrap 74 -latin1 -preserve
- Some special characters still break with that - noticed when sos@
@@ -54,13 +71,8 @@ Compiling status reports - best practice
some item
Some more blabla ...
- - Review and commit the reports immediately as they are coming in. Hook the
- resulting XML to the build for the first time but do not link to it from
- anywhere. This gives time for other committers to review and suggest
- minor changes.
-5) After a couple of iterations of the above, wrap the whole thing in a
- report template:
+5) Wrapping the whole thing in a report template:
- Categories are subject to change obviously. They come out in the order
+ - Categories are subject to change obviously. They come out in the order
as stated in the report. After another round of tidy(1) try to balance
the categories. Put things where they belong best, retire categories
that don't fill up, etc. Adding it to your local build and looking at
the html helps. Make sure you have an up-to-date doc tree.
+ - theraven may be poked for composing a nice introduction for the reports.
+ But should be usually the last step in the process; a good introduction
+ can be only written once the report is considered finished.
+
6) Sending it out:
- - Explicitly mail all the submitters (in BCC:) with the link pointing to
- the HTML version of the prepared report so they could check their
- entries before publication. It is wise to set an exact deadline for
- this, in order to avoid late comments.
- After a few days, collate and commit the changes. Also update the
next due date in status.xml and link to the new report.
- Add a news entry to head/share/xml/news.xml. Template:
@@ -167,8 +179,8 @@ Report//EN"
- Extract a text version with the command
lynx -dump -nolist report.html > report.txt and prettify it.
- - Send out To: hackers, CC: current, stable. New email to: announce@.
- This needs to be approved, so find someone who can do that before you
- start.
+ - Send out To: hackers, CC: current, stable, BCC: developers. New email
+ to: announce@. This last one needs to be approved, so find someone
+ (mail postmaster) who can do that before you start.
7) Repeat.
From owner-svn-doc-all@FreeBSD.ORG Tue Mar 4 19:25:23 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 2F7379D8;
Tue, 4 Mar 2014 19:25:23 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 1D470D36;
Tue, 4 Mar 2014 19:25:23 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s24JPMko069536;
Tue, 4 Mar 2014 19:25:22 GMT (envelope-from pgj@svn.freebsd.org)
Received: (from pgj@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s24JPMGA069535;
Tue, 4 Mar 2014 19:25:22 GMT (envelope-from pgj@svn.freebsd.org)
Message-Id: <201403041925.s24JPMGA069535@svn.freebsd.org>
From: Gabor Pali
Date: Tue, 4 Mar 2014 19:25:22 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44118 - head/en_US.ISO8859-1/htdocs/news/status
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Tue, 04 Mar 2014 19:25:23 -0000
Author: pgj
Date: Tue Mar 4 19:25:22 2014
New Revision: 44118
URL: http://svnweb.freebsd.org/changeset/doc/44118
Log:
- Include a paragraph on project sponsors in the quarterly status reports
Modified:
head/en_US.ISO8859-1/htdocs/news/status/howto.xml
Modified: head/en_US.ISO8859-1/htdocs/news/status/howto.xml
==============================================================================
--- head/en_US.ISO8859-1/htdocs/news/status/howto.xml Tue Mar 4 19:18:09 2014 (r44117)
+++ head/en_US.ISO8859-1/htdocs/news/status/howto.xml Tue Mar 4 19:25:22 2014 (r44118)
@@ -84,6 +84,18 @@ Yoyodyne's range Frobnicator of network
be ready for wider use, for testing, for deployment in production,
and so on)?
+
Sponsorship
+
+
Do not forget about your sponsors.
+
+
If you or your project has received sponsorship, a scholarship from
+ somebody or you have been already working as a contractor or an
+ employee for a company, please include it. Sponsors always
+ certainly appreciate if you thank them for their funding, but it is
+ also beneficial for them to show that they are actively supporting
+ the Project this way. Last, but not least, this helps &os; to learn
+ more about its important consumers.
+
Open Items
If help is needed, make this explicit!
From owner-svn-doc-all@FreeBSD.ORG Tue Mar 4 19:52:53 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 7D2F17E4;
Tue, 4 Mar 2014 19:52:53 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 50161FEC;
Tue, 4 Mar 2014 19:52:53 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s24JqruS081729;
Tue, 4 Mar 2014 19:52:53 GMT (envelope-from pgj@svn.freebsd.org)
Received: (from pgj@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s24JqrhM081728;
Tue, 4 Mar 2014 19:52:53 GMT (envelope-from pgj@svn.freebsd.org)
Message-Id: <201403041952.s24JqrhM081728@svn.freebsd.org>
From: Gabor Pali
Date: Tue, 4 Mar 2014 19:52:53 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44119 - head/en_US.ISO8859-1/htdocs/cgi
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Tue, 04 Mar 2014 19:52:53 -0000
Author: pgj
Date: Tue Mar 4 19:52:52 2014
New Revision: 44119
URL: http://svnweb.freebsd.org/changeset/doc/44119
Log:
- Attempt to implement support for the sponsor tag in the quarterly status
report generator
Assisted by: gjb
Modified:
head/en_US.ISO8859-1/htdocs/cgi/monthly.cgi
Modified: head/en_US.ISO8859-1/htdocs/cgi/monthly.cgi
==============================================================================
--- head/en_US.ISO8859-1/htdocs/cgi/monthly.cgi Tue Mar 4 19:25:22 2014 (r44118)
+++ head/en_US.ISO8859-1/htdocs/cgi/monthly.cgi Tue Mar 4 19:52:52 2014 (r44119)
@@ -11,6 +11,7 @@ my $debug = param("debug") || "";
my $NumDevelopers = 3;
my $NumLinks = 4;
+my $NumSponsors = 2;
my $NumTasks = 5;
my @messages;
@@ -118,6 +119,16 @@ if ($Submit)
}
}
+ my @sponsors;
+ foreach my $Num (1..$NumSponsors)
+ {
+ my $sponsor = param("Sponsor$Num") || "";
+ push(@hidden, hidden("Sponsor$Num"));
+
+ next unless $sponsor;
+ push(@sponsors, xml(2, "sponsor", "", xmltext(3, $sponsor)));
+ }
+
my @tasks;
foreach my $Num (1..$NumTasks)
{
@@ -149,6 +160,8 @@ if ($Submit)
xml(1, "body",
xml(2, "p", "", xmltext(3, @info))),
"\n",
+ @sponsors,
+ "\n",
xml(1, "help", "", @tasks),
);
my $contents = join('', @contents);
@@ -180,6 +193,13 @@ foreach my $Num (1..$NumLinks)
td(textfield(-name => "Desc$Num", -size => 20))));
}
+my @SponsorTable;
+foreach my $Num (1..$NumSponsors)
+{
+ push(@SponsorTable,
+ TR(td(textarea(-name => "Sponsor$Num", -rows => 1, -cols => 60))));
+}
+
my @TaskTable;
foreach my $Num (1..$NumTasks)
{
@@ -227,6 +247,13 @@ print
-rows => 7,
-cols => 60)),
+ h3("Sponsors (optional):"),
+ blockquote(table({"BORDER" => 0,
+ "COLS" => 1,
+ "NOSAVE" => 1},
+ TR(td("Name")),
+ @SponsorTable)),
+
h3("Open tasks (optional):"),
blockquote(table({"BORDER" => 0,
"COLS" => 5,
From owner-svn-doc-all@FreeBSD.ORG Tue Mar 4 20:10:55 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id C1862F23;
Tue, 4 Mar 2014 20:10:55 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id AD40E236;
Tue, 4 Mar 2014 20:10:55 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s24KAtKY088794;
Tue, 4 Mar 2014 20:10:55 GMT (envelope-from dru@svn.freebsd.org)
Received: (from dru@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s24KAtZi088793;
Tue, 4 Mar 2014 20:10:55 GMT (envelope-from dru@svn.freebsd.org)
Message-Id: <201403042010.s24KAtZi088793@svn.freebsd.org>
From: Dru Lavigne
Date: Tue, 4 Mar 2014 20:10:55 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44120 - head/en_US.ISO8859-1/books/handbook/firewalls
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Tue, 04 Mar 2014 20:10:55 -0000
Author: dru
Date: Tue Mar 4 20:10:55 2014
New Revision: 44120
URL: http://svnweb.freebsd.org/changeset/doc/44120
Log:
Section on IPFW NAT now reads better.
Unfortunately, it is outdated as of 7.x.
Will need to review EXAMPLES in ipfw(8) and address PR121952.
Will hold off rest of commits to this chapter until someone gets
a chance to do so.
Sponsored by: iXsystems
Modified:
head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Tue Mar 4 19:52:52 2014 (r44119)
+++ head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Tue Mar 4 20:10:55 2014 (r44120)
@@ -2163,12 +2163,12 @@ pif="dc0" # interface name of NIC at
To do this, the &os; machine connected to the Internet
must act as a gateway. This system must have two
NICs, where one is connected to the Internet
- and the other is connected to the internal LAN. All the
- machines connected to the LAN should be assigned
- an IP addresses in the private network space,
+ and the other is connected to the internal LAN. Each
+ machine connected to the LAN should be assigned
+ an IP address in the private network space,
as defined by RFC
- 1918, and have their default gateway set to the
+ 1918, and have the default gateway set to the
&man.natd.8; system's internal IP
address.
@@ -2177,7 +2177,7 @@ pif="dc0" # interface name of NIC at
IPFW. If the system has a custom
kernel, the kernel configuration file needs to include
option IPDIVERT along with the other
- IPFIREWALL options.
+ IPFIREWALL options described in .
To enable NAT support at
boot time, the following must be in
@@ -2224,127 +2224,100 @@ redirect_port tcp 192.168.0.3:80 80
#!/bin/sh
+ipfw -q -f flush
cmd="ipfw -q add"
skip="skipto 500"
-pif=rl0
+pif=dc0
ks="keep-state"
-good_tcpo="22,25,37,43,53,80,443,110,119"
+good_tcpo="22,25,37,53,80,443,110"
-ipfw -q -f flush
-
- The NAT rule is inserted
+ The inbound NAT rule is inserted
after the two rules which allow all
traffic on the trusted internal interface and on the loopback
interface and before the
check-state rule. It is important that the
- rule number selected for the NAT rule, in
+ rule number selected for this NAT rule, in
this example 100, is higher than the first
two rules and lower than the check-state
rule:$cmd 005 allow all from any to any via xl0 # exclude LAN traffic
$cmd 010 allow all from any to any via lo0 # exclude loopback traffic
-
-# NAT any inbound packets
-$cmd 100 divert natd ip from any to any in via $pif
+$cmd 100 divert natd ip from any to any in via $pif # NAT any inbound packets
# Allow the packet through if it has an existing entry in the dynamic rules table
$cmd 101 check-state
- The processing flow starts with the first rule from the
- top of the ruleset and progresses one rule at a time until
- the end is reached or the packet matches and the packet is
- released out of the firewall. Take note of the location of
- rule numbers 100 101, 450, 500, and 510. These rules
- control the translation of the outbound and inbound packets
- so that their entries in the dynamic keep-state table always
- register the private LAN IP address. All the allow and deny
- rules specify the direction of the packet and the interface.
- All start outbound session requests will
- skipto rule 500 to undergo NAT.
+ The outbound rules are modified to replace the
+ allow action with the
+ $skip variable, indicating that rule
+ processing will continue at rule 500. The
+ seven tcp rules have been replaced by rule
+ 125 as the
+ $good_tcpo variable contains the
+ seven allowed outbound ports.
+
+ # Authorized outbound packets
+$cmd 120 $skip udp from any to x.x.x.x 53 out via $pif $ks
+$cmd 121 $skip udp from any to x.x.x.x 67 out via $pif $ks
+$cmd 125 $skip tcp from any to any $good_tcpo out via $pif setup $ks
+$cmd 130 $skip icmp from any to any out via $pif $ks
- Consider a web browser which initializes a new HTTP
+ The inbound rules remain the same, except for the very
+ last rule which removes the via $pif in
+ order to catch both inbound and outbound rules. The
+ NAT rule must follow this last outbound
+ rule, must have a higher number than that last rule, and the
+ rule number must be referenced by the
+ skipto action. In this ruleset,
+ rule number 500 diverts all
+ packets which match the outbound rules to &man.natd.8; for
+ NAT processing. The next rule allows any
+ packet which has undergone NAT processing
+ to pass.
+
+ $cmd 499 deny log all from any to any
+$cmd 500 divert natd ip from any to any out via $pif # skipto location for outbound stateful rules
+$cmd 510 allow ip from any to any
+
+ In this example, rules 100,
+ 101, 125,
+ 500, and 510
+ control the address translation of the outbound and inbound packets
+ so that the entries in the dynamic state table always
+ register the private LAN
+ IP address.
+
+ Consider an internal web browser which initializes a new outbound HTTP
session over port 80. When the first outbound packet enters
- the firewall, it does not match rule 100 because it is
- headed out rather than in. It passes rule 101 because this
- is the first packet, and it has not been posted to the
- dynamic keep-state table yet. The packet finally matches
- rule 125 as it is outbound through the NIC facing the
- Internet and has a source IP address as a private LAN IP
- address. On matching this rule, two actions take place.
- keep-state adds this rule to the dynamic
- keep-state rules table and the specified action is executed
- and posted as part of the info in the dynamic table. In
- this case, the action is skipto rule 500.
- Rule 500 NATs the packet IP address and
- sends it out to the Internet. This packet makes its way to
+ the firewall, it does not match rule 100 because it is
+ headed out rather than in. It passes rule 101 because this
+ is the first packet and it has not been posted to the
+ dynamic state table yet. The packet finally matches
+ rule 125 as it is outbound on an allowed port
+ and has a source IP address from the internal LAN.
+ On matching this rule, two actions take place.
+ First, the keep-state action adds an entry to the dynamic
+ state table and the specified action, skipto rule 500, is executed.
+ Next, the packet undergoes NAT and
+ is sent out to the Internet. This packet makes its way to
the destination web server, where a response packet is
generated and sent back. This new packet enters the top of
- the ruleset. It matches rule 100 and has it destination IP
- address mapped back to the corresponding LAN IP address. It
+ the ruleset. It matches rule 100 and has it destination IP
+ address mapped back to the original internal address. It
then is processed by the check-state
rule, is found in the table as an existing session, and is
- released to the LAN. It goes to the LAN system that sent it
- and a new packet is sent requesting another segment of the
- data from the remote server. This time it matches the
- check-state rule, its outbound entry is
- found, and the associated action,
- skipto 500, is executed. The packet
- jumps to rule 500, gets NATed, and is
- released to the Internet.
-
- On the inbound side, everything coming in that is part of
- an existing session is automatically handled by the
- check-state rule and the properly placed
- divert natd rules. The ruleset only has
+ released to the LAN.
+
+ On the inbound side, the ruleset has
to deny bad packets and allow only authorized services.
- Consider a web server running on the firewall where web
- requests from the Internet should have access to the local
- web site. An inbound start request packet will match rule
- 100 and its IP address will be mapped to the LAN IP address
- of the firewall. The packet is then matched against all the
- nasty things that need to be checked and finally matches
- rule 425 where two actions occur. The packet rule is posted
- to the dynamic keep-state table but this time, any new
- session requests originating from that source IP address are
- limited to 2. This defends against DoS attacks against the
- service running on the specified port number. The action is
- allow, so the packet is released to the
- LAN. The packet generated as a response is recognized by the
- check-state as belonging to an existing
- session. It is then sent to rule 500 for
- NATing and released to the outbound
+ A packet which matches an inbound rule
+ is posted
+ to the dynamic state table and the packet is released to the
+ LAN. The packet generated as a response is recognized by the
+ check-state rule as belonging to an existing
+ session. It is then sent to rule 500 to undergo
+ NAT before being released to the outbound
interface.
-
-# Authorized outbound packets
-$cmd 120 $skip udp from any to xx.168.240.2 53 out via $pif $ks
-$cmd 121 $skip udp from any to xx.168.240.5 53 out via $pif $ks
-$cmd 125 $skip tcp from any to any $good_tcpo out via $pif setup $ks
-$cmd 130 $skip icmp from any to any out via $pif $ks
-$cmd 135 $skip udp from any to any 123 out via $pif $ks
-
-
-# Deny all inbound traffic from non-routable reserved address spaces
-$cmd 300 deny all from 192.168.0.0/16 to any in via $pif #RFC 1918 private IP
-$cmd 301 deny all from 172.16.0.0/12 to any in via $pif #RFC 1918 private IP
-$cmd 302 deny all from 10.0.0.0/8 to any in via $pif #RFC 1918 private IP
-$cmd 303 deny all from 127.0.0.0/8 to any in via $pif #loopback
-$cmd 304 deny all from 0.0.0.0/8 to any in via $pif #loopback
-$cmd 305 deny all from 169.254.0.0/16 to any in via $pif #DHCP auto-config
-$cmd 306 deny all from 192.0.2.0/24 to any in via $pif #reserved for docs
-$cmd 307 deny all from 204.152.64.0/23 to any in via $pif #Sun cluster
-$cmd 308 deny all from 224.0.0.0/3 to any in via $pif #Class D & E multicast
-
-# Authorized inbound packets
-$cmd 400 allow udp from xx.70.207.54 to any 68 in $ks
-$cmd 420 allow tcp from any to me 80 in via $pif setup limit src-addr 1
-
-
-$cmd 450 deny log ip from any to any
-
-# This is skipto location for outbound stateful rules
-$cmd 500 divert natd ip from any to any out via $pif
-$cmd 510 allow ip from any to any
-
Port Redirection
From owner-svn-doc-all@FreeBSD.ORG Tue Mar 4 20:28:29 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id DBEBD7C7;
Tue, 4 Mar 2014 20:28:29 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id C909E645;
Tue, 4 Mar 2014 20:28:29 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s24KSTbE095212;
Tue, 4 Mar 2014 20:28:29 GMT (envelope-from pgj@svn.freebsd.org)
Received: (from pgj@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s24KSTmi095211;
Tue, 4 Mar 2014 20:28:29 GMT (envelope-from pgj@svn.freebsd.org)
Message-Id: <201403042028.s24KSTmi095211@svn.freebsd.org>
From: Gabor Pali
Date: Tue, 4 Mar 2014 20:28:29 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44121 - head/en_US.ISO8859-1/htdocs/cgi
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Tue, 04 Mar 2014 20:28:29 -0000
Author: pgj
Date: Tue Mar 4 20:28:29 2014
New Revision: 44121
URL: http://svnweb.freebsd.org/changeset/doc/44121
Log:
- Improve formatting when generating sponsor entries
Modified:
head/en_US.ISO8859-1/htdocs/cgi/monthly.cgi
Modified: head/en_US.ISO8859-1/htdocs/cgi/monthly.cgi
==============================================================================
--- head/en_US.ISO8859-1/htdocs/cgi/monthly.cgi Tue Mar 4 20:10:55 2014 (r44120)
+++ head/en_US.ISO8859-1/htdocs/cgi/monthly.cgi Tue Mar 4 20:28:29 2014 (r44121)
@@ -126,7 +126,12 @@ if ($Submit)
push(@hidden, hidden("Sponsor$Num"));
next unless $sponsor;
- push(@sponsors, xml(2, "sponsor", "", xmltext(3, $sponsor)));
+ push(@sponsors, xml(1, "sponsor", "", xmltext(2, $sponsor)));
+ }
+
+ if (@sponsors)
+ {
+ push(@sponsors, "\n");
}
my @tasks;
@@ -161,7 +166,6 @@ if ($Submit)
xml(2, "p", "", xmltext(3, @info))),
"\n",
@sponsors,
- "\n",
xml(1, "help", "", @tasks),
);
my $contents = join('', @contents);
From owner-svn-doc-all@FreeBSD.ORG Tue Mar 4 20:54:37 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 9463A533;
Tue, 4 Mar 2014 20:54:37 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 802959A6;
Tue, 4 Mar 2014 20:54:37 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s24KsbME007369;
Tue, 4 Mar 2014 20:54:37 GMT (envelope-from dru@svn.freebsd.org)
Received: (from dru@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s24Ksbrt007368;
Tue, 4 Mar 2014 20:54:37 GMT (envelope-from dru@svn.freebsd.org)
Message-Id: <201403042054.s24Ksbrt007368@svn.freebsd.org>
From: Dru Lavigne
Date: Tue, 4 Mar 2014 20:54:37 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44122 -
head/en_US.ISO8859-1/books/handbook/advanced-networking
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Tue, 04 Mar 2014 20:54:37 -0000
Author: dru
Date: Tue Mar 4 20:54:36 2014
New Revision: 44122
URL: http://svnweb.freebsd.org/changeset/doc/44122
Log:
Initial prep work to merge Diskless Booting and PXE chapters as
much of their content overlaps.
The next few commits will merge the content into a readable flow.
Sponsored by: iXsystems.
Modified:
head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml Tue Mar 4 20:28:29 2014 (r44121)
+++ head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml Tue Mar 4 20:54:36 2014 (r44122)
@@ -37,14 +37,7 @@
- How to set up network booting on a diskless
- machine.
-
-
-
- How to set up network PXE booting
- with an
- NFS root file system.
+ How to set up network PXE booting.
@@ -3833,7 +3826,7 @@ ifconfig_lagg0="laggp
- Diskless Operation
+ Diskless Operation with PXE
@@ -4005,9 +3998,6 @@ ifconfig_lagg0="laggp
- Setup Instructions
-
- Configuration Using ISC
DHCP
@@ -4101,10 +4091,11 @@ subnet 192.168.4.0 netmask 255.255.255.0
same as the TFTP one.
-
+
-
- Booting with PXE
+
+ Configuring the TFTP and
+ NFS ServersBy default, &man.pxeboot.8; loads the kernel via
NFS. It can be compiled to use
@@ -4124,11 +4115,6 @@ subnet 192.168.4.0 netmask 255.255.255.0
select the Boot from network option in
the BIOS setup or type a function key
during system initialization.
-
-
-
- Configuring the TFTP and
- NFS ServersTFTP
@@ -4213,10 +4199,10 @@ subnet 192.168.4.0 netmask 255.255.255.0
&prompt.root; service mountd restart
-
+
-
- Building a Diskless Kernel
+
+ Preparing the Root File Systemdiskless operation
@@ -4252,10 +4238,6 @@ options BOOTP_NFSROOT # NFS mount r
, and copy it to the place
specified in
/usr/local/etc/dhcpd.conf.
-
-
-
- Preparing the Root File Systemroot file system
@@ -4267,11 +4249,8 @@ options BOOTP_NFSROOT # NFS mount r
root-path in
/usr/local/etc/dhcpd.conf.
-
- Using make world to Populate
- Root
-
- This method is quick and will install a complete
+ Using make world to populate
+ root is quick and will install a complete
virgin system, not just the root file system, into
DESTDIR. Execute the following
script:
@@ -4288,18 +4267,14 @@ cd /usr/src/etc; make distribution/etc/fstab placed into
DESTDIR according to the system's
requirements.
-
-
+
-
+ Configuring SwapIf needed, a swap file located on the server can be
accessed via NFS.
-
- NFS Swap
-
The kernel does not support enabling
NFS swap at boot time. Swap must be
enabled by the startup scripts, by mounting a writable
@@ -4312,30 +4287,21 @@ cd /usr/src/etc; make distribution/etc/rc.conf:swapfile=/path/to/swapfile
-
-
+
-
+ Miscellaneous Issues
-
- Running with a Read-only
- /usr
-
diskless operation/usr read-onlyIf the diskless workstation is configured to run
- &xorg;, adjust the
+ &xorg; and is running with a read-only /usr, adjust the
XDM configuration file as it
puts the error log on /usr by
default.
-
-
-
- Using a Non-&os; ServerWhen the server for the root file system is not
running &os;, create the root file system on a &os;
@@ -4349,12 +4315,9 @@ cd /usr/src/etc; make distribution
-
-
-
-
+ PXE Booting with an NFS Root File
System
@@ -4398,6 +4361,7 @@ cd /usr/src/etc; make distribution for more information about the
&os; booting process.
+ Setting Up the &man.chroot.8; Environment for the
From owner-svn-doc-all@FreeBSD.ORG Tue Mar 4 22:40:58 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 4A96FAB4;
Tue, 4 Mar 2014 22:40:58 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 3569467F;
Tue, 4 Mar 2014 22:40:58 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s24MewtA051546;
Tue, 4 Mar 2014 22:40:58 GMT (envelope-from dru@svn.freebsd.org)
Received: (from dru@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s24MewvZ051545;
Tue, 4 Mar 2014 22:40:58 GMT (envelope-from dru@svn.freebsd.org)
Message-Id: <201403042240.s24MewvZ051545@svn.freebsd.org>
From: Dru Lavigne
Date: Tue, 4 Mar 2014 22:40:58 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44123 -
head/en_US.ISO8859-1/books/handbook/advanced-networking
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Tue, 04 Mar 2014 22:40:58 -0000
Author: dru
Date: Tue Mar 4 22:40:57 2014
New Revision: 44123
URL: http://svnweb.freebsd.org/changeset/doc/44123
Log:
Start to merge content.
Many more commits needed to get this into a logical flow.
Sponsored by: iXsystems
Modified:
head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml Tue Mar 4 20:54:36 2014 (r44122)
+++ head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml Tue Mar 4 22:40:57 2014 (r44123)
@@ -3862,24 +3862,34 @@ ifconfig_lagg0="laggp
is relatively easy to set up because all the necessary elements
are readily available:
+
+ The &intel; Preboot eXecution Environment
(PXE) can be used to load the kernel over
the network. It provides a form of smart boot
ROM built into some networking cards or
motherboards. See &man.pxeboot.8; for more details.
+
+ A sample script
(/usr/share/examples/diskless/clone_root)
eases the creation and maintenance of the workstation's root
file system on the server. The script will probably require
a little customization.
+
+ Standard system startup files exist in
/etc to detect and support a diskless
system startup.
+
+ Swapping, if needed, can be done either to an
NFS file or to a local disk.
+
+There are many ways to set up diskless workstations. Many
elements are involved, and most can be customized to suit local
@@ -3893,12 +3903,16 @@ ifconfig_lagg0="laggp
The diskless workstations use a shared, read-only
/ and
/usr.
+
+ The root file system is a copy of a standard &os; root,
with some configuration files overridden by ones specific to
diskless operation or, possibly, to the workstation they
belong to.
+
+ The parts of the root which have to be writable are
overlaid with &man.md.4; file systems. Any changes will be
lost when the system reboots.
@@ -3914,28 +3928,8 @@ ifconfig_lagg0="laggp
Background Information
- Setting up diskless workstations is both relatively
- straightforward and prone to errors. These are sometimes
- difficult to diagnose for a number of reasons. For
- example:
-
-
-
- Compile time options may determine different behaviors
- at runtime.
-
-
-
- Error messages are often cryptic or totally
- absent.
-
-
-
- In this context, having some knowledge of the background
- mechanisms involved is useful to solve the problems that may
- arise.
-
- Several operations need to be performed for a successful
+ When setting up diskless workstations, several operations
+ need to be performed for a successful
bootstrap:
@@ -3950,9 +3944,7 @@ ifconfig_lagg0="laggp
configure a system to use only BOOTP
and &man.bootpd.8; is included in the base &os;
system.
-
- DHCP has a number of advantages
over BOOTP such as nicer configuration
files and support for PXE. This
@@ -3964,16 +3956,13 @@ ifconfig_lagg0="laggp
- The machine needs to transfer one or several programs
- to local memory. Either TFTP or
- NFS are used. The choice between
- TFTP and NFS is a
- compile time option in several places. A common source of
- error is to specify filenames for the wrong protocol.
- TFTP typically transfers all files from
- a single directory on the server and expects filenames
- relative to this directory. NFS needs
- absolute file paths.
+ The machine needs to boot the loader using
+ TFTP.
+
+
+
+ The root filesystem needs to be loaded using
+ NFS.
@@ -3997,15 +3986,21 @@ ifconfig_lagg0="laggp
Refer to &man.diskless.8; for more information.
-
- Configuration Using ISC
- DHCP
+
+ Configuring the ISC
+ DHCP ServerDHCPdiskless operation
+ PXE requires a TFTP
+ and a DHCP server to be set up. The
+ DHCP server does not need to be the same
+ machine as the TFTP server, but it needs
+ to be accessible in the network.
+
The ISC DHCP server can
answer both BOOTP and
DHCP requests.
@@ -4013,56 +4008,62 @@ ifconfig_lagg0="laggp
ISC DHCP is not part of the
base system. Install the
net/isc-dhcp42-server port or
- package.
+ package, following the instructions documented at . Make sure that
+ /etc/rc.conf and
+ /usr/local/etc/dhcpd.conf are
+ correctly configured..
Once ISC DHCP is installed,
edit its configuration file,
- /usr/local/etc/dhcpd.conf. Here
- follows a commented example for PXE host
- corbieres:
-
- default-lease-time 600;
-max-lease-time 7200;
-authoritative;
-
-option domain-name "example.com";
-option domain-name-servers 192.168.4.1;
-option routers 192.168.4.1;
-
-subnet 192.168.4.0 netmask 255.255.255.0 {
- use-host-decl-names on;
- option subnet-mask 255.255.255.0;
- option broadcast-address 192.168.4.255;
-
- host corbieres {
- hardware ethernet 00:02:b3:27:62:df;
- fixed-address corbieres.example.com;
- next-server 192.168.4.4;
- filename "pxeboot";
- option root-path "192.168.4.4:/data/misc/diskless";
- }
+ /usr/local/etc/dhcpd.conf. Configure
+ the next-server,
+ filename, and
+ option root-path settings to specify
+ the TFTP server IP
+ address, the path to /boot/pxeboot
+ in TFTP, and the path to the
+ NFS root file system. Here is a sample
+ dhcpd.conf setup:
+
+ subnet 192.168.0.0 netmask 255.255.255.0 {
+ range 192.168.0.2 192.168.0.3 ;
+ option subnet-mask 255.255.255.0 ;
+ option routers 192.168.0.1 ;
+ option broadcast-address 192.168.0.255 ;
+ option domain-name-servers 192.168.35.35, 192.168.35.36 ;
+ option domain-name "example.com";
+
+ # IP address of TFTP server
+ next-server 192.168.0.1 ;
+
+ # path of boot loader obtained
+ # via tftp
+ filename "FreeBSD/install/boot/pxeboot" ;
+
+ # pxeboot boot loader will try to NFS mount this directory for root FS
+ option root-path "192.168.0.1:/b/tftpboot/FreeBSD/install/" ;
+
}
-
-
+
- The next-server directive
designates the TFTP or
NFS server to use for loading
&man.loader.8; or the kernel file. The default is to
use the same host as the DHCP
server.
-
- The filename directive defines
the file that PXE will load for the
next execution step. It must be specified according
@@ -4078,9 +4079,7 @@ subnet 192.168.4.0 netmask 255.255.255.0
GENERIC kernel, it is possible to
use PXE to boot from a remote
CD-ROM.
-
- The root-path option defines
the path to the root file system, in usual
NFS notation. When using
@@ -4089,27 +4088,40 @@ subnet 192.168.4.0 netmask 255.255.255.0
BOOTP kernel option is not enabled.
The NFS server will then be the
same as the TFTP one.
-
-
- Configuring the TFTP and
- NFS Servers
+ Configuring the
+ NFS Server
- By default, &man.pxeboot.8; loads the kernel via
- NFS. It can be compiled to use
- TFTP instead by specifying the
- LOADER_TFTP_SUPPORT option in
- /etc/make.conf. See the comments in
- /usr/share/examples/etc/make.conf for
- instructions.
-
- There are two other make.conf
- options which may be useful for setting up a serial console
- diskless machine:
- BOOT_PXELDR_PROBE_KEYBOARD, and
- BOOT_PXELDR_ALWAYS_SERIAL.
+ Enable
+ NFS and export the appropriate file
+ system on the NFS server.
+
+ Add this line to
+ /etc/rc.conf:
+
+ nfs_server_enable="YES"
+
+ Export the file system where the diskless root
+ directory is located by adding the following to
+ /etc/exports. Adjust the
+ mount point and replace
+ corbieres with the names of the diskless
+ workstations:
+
+ /data/misc -alldirs -ro margaux corbieres
+
+ Tell &man.mountd.8; to reread its configuration
+ file. If NFS is enabled in
+ /etc/rc.conf, it is recommended
+ to reboot instead.
+
+ &prompt.root; service mountd restart
+
+
+
+ Configuring the TFTP ServerTo use PXE when the machine starts,
select the Boot from network option in
@@ -4125,9 +4137,7 @@ subnet 192.168.4.0 netmask 255.255.255.0
diskless operation
- If PXE is configured to use
- TFTP, enable &man.tftpd.8; on the file
- server:
+ To enable &man.tftpd.8;, perform the following steps:
@@ -4166,40 +4176,7 @@ subnet 192.168.4.0 netmask 255.255.255.0
anywhere on the server. Make sure that the location is
set in both /etc/inetd.conf and
/usr/local/etc/dhcpd.conf.
-
- Enable
- NFS and export the appropriate file
- system on the NFS server.
-
-
-
- Add this line to
- /etc/rc.conf:
-
- nfs_server_enable="YES"
-
-
-
- Export the file system where the diskless root
- directory is located by adding the following to
- /etc/exports. Adjust the
- mount point and replace
- corbieres with the names of the diskless
- workstations:
-
- /data/misc -alldirs -ro margaux corbieres
-
-
-
- Tell &man.mountd.8; to reread its configuration
- file. If NFS is enabled in
- /etc/rc.conf, it is recommended
- to reboot instead.
-
- &prompt.root; service mountd restart
-
-
-
+ Preparing the Root File System
@@ -4520,59 +4497,6 @@ myhost.example.com:/b/tftpboot/FreeBSD/i
them.
-
- Setting up the DHCP Server
-
- PXE requires a TFTP
- and a DHCP server to be set up. The
- DHCP server does not need to be the same
- machine as the TFTP server, but it needs
- to be accessible in the network.
-
-
-
- Install the DHCP server by
- following the instructions documented at . Make sure that
- /etc/rc.conf and
- /usr/local/etc/dhcpd.conf are
- correctly configured.
-
-
-
- In /usr/local/etc/dhcpd.conf,
- configure the next-server,
- filename, and
- option root-path settings to specify
- the TFTP server IP
- address, the path to /boot/pxeboot
- in TFTP, and the path to the
- NFS root file system. Here is a sample
- dhcpd.conf setup:
-
- subnet 192.168.0.0 netmask 255.255.255.0 {
- range 192.168.0.2 192.168.0.3 ;
- option subnet-mask 255.255.255.0 ;
- option routers 192.168.0.1 ;
- option broadcast-address 192.168.0.255 ;
- option domain-name-servers 192.168.35.35, 192.168.35.36 ;
- option domain-name "example.com";
-
- # IP address of TFTP server
- next-server 192.168.0.1 ;
-
- # path of boot loader obtained
- # via tftp
- filename "FreeBSD/install/boot/pxeboot" ;
-
- # pxeboot boot loader will try to NFS mount this directory for root FS
- option root-path "192.168.0.1:/b/tftpboot/FreeBSD/install/" ;
-
-}
-
-
-
-
Configuring the PXE Client and
Debugging Connection Problems
From owner-svn-doc-all@FreeBSD.ORG Tue Mar 4 22:45:38 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id A25FABB4;
Tue, 4 Mar 2014 22:45:38 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 8237F76F;
Tue, 4 Mar 2014 22:45:38 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s24Mjc1O052484;
Tue, 4 Mar 2014 22:45:38 GMT (envelope-from gjb@svn.freebsd.org)
Received: (from gjb@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s24MjbkH052480;
Tue, 4 Mar 2014 22:45:37 GMT (envelope-from gjb@svn.freebsd.org)
Message-Id: <201403042245.s24MjbkH052480@svn.freebsd.org>
From: Glen Barber
Date: Tue, 4 Mar 2014 22:45:37 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44124 - head/en_US.ISO8859-1/htdocs/releases/9.3R
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Tue, 04 Mar 2014 22:45:38 -0000
Author: gjb
Date: Tue Mar 4 22:45:37 2014
New Revision: 44124
URL: http://svnweb.freebsd.org/changeset/doc/44124
Log:
Add the schedule for 9.3-RELEASE.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
Added:
head/en_US.ISO8859-1/htdocs/releases/9.3R/
head/en_US.ISO8859-1/htdocs/releases/9.3R/Makefile
- copied, changed from r44122, head/en_US.ISO8859-1/htdocs/releases/9.2R/Makefile
head/en_US.ISO8859-1/htdocs/releases/9.3R/docbook.css
- copied unchanged from r44122, head/en_US.ISO8859-1/htdocs/releases/9.2R/docbook.css
head/en_US.ISO8859-1/htdocs/releases/9.3R/schedule.xml
- copied, changed from r44122, head/en_US.ISO8859-1/htdocs/releases/9.2R/schedule.xml
Copied and modified: head/en_US.ISO8859-1/htdocs/releases/9.3R/Makefile (from r44122, head/en_US.ISO8859-1/htdocs/releases/9.2R/Makefile)
==============================================================================
--- head/en_US.ISO8859-1/htdocs/releases/9.2R/Makefile Tue Mar 4 20:54:36 2014 (r44122, copy source)
+++ head/en_US.ISO8859-1/htdocs/releases/9.3R/Makefile Tue Mar 4 22:45:37 2014 (r44124)
@@ -7,14 +7,8 @@
.include "../Makefile.inc"
.endif
-DOCS= announce.xml \
- relnotes.xml \
- schedule.xml
+DOCS= schedule.xml
-DATA= docbook.css \
- errata.html \
- hardware.html \
- installation.html \
- readme.html
+DATA= docbook.css
.include "${DOC_PREFIX}/share/mk/web.site.mk"
Copied: head/en_US.ISO8859-1/htdocs/releases/9.3R/docbook.css (from r44122, head/en_US.ISO8859-1/htdocs/releases/9.2R/docbook.css)
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ head/en_US.ISO8859-1/htdocs/releases/9.3R/docbook.css Tue Mar 4 22:45:37 2014 (r44124, copy of r44122, head/en_US.ISO8859-1/htdocs/releases/9.2R/docbook.css)
@@ -0,0 +1,208 @@
+/*
+ * Copyright (c) 2001, 2003, 2010 The FreeBSD Documentation Project
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ * notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ *
+ * $FreeBSD$
+ */
+
+BODY ADDRESS {
+ line-height: 1.3;
+ margin: .6em 0;
+}
+
+BODY BLOCKQUOTE {
+ margin-top: .75em;
+ line-height: 1.5;
+ margin-bottom: .75em;
+}
+
+HTML BODY {
+ margin: 1em 8% 1em 10%;
+ line-height: 1.2;
+}
+
+.LEGALNOTICE {
+ font-size: small;
+ font-variant: small-caps;
+}
+
+BODY DIV {
+ margin: 0;
+}
+
+DL {
+ margin: .8em 0;
+ line-height: 1.2;
+}
+
+BODY FORM {
+ margin: .6em 0;
+}
+
+H1, H2, H3, H4, H5, H6,
+DIV.EXAMPLE P B,
+.QUESTION,
+DIV.TABLE P B,
+DIV.PROCEDURE P B {
+ color: #990000;
+}
+
+BODY H1, BODY H2, BODY H3, BODY H4, BODY H5, BODY H6 {
+ line-height: 1.3;
+ margin-left: 0;
+}
+
+BODY H1, BODY H2 {
+ margin: .8em 0 0 -4%;
+}
+
+BODY H3, BODY H4 {
+ margin: .8em 0 0 -3%;
+}
+
+BODY H5 {
+ margin: .8em 0 0 -2%;
+}
+
+BODY H6 {
+ margin: .8em 0 0 -1%;
+}
+
+BODY HR {
+ margin: .6em;
+ border-width: 0 0 1px 0;
+ border-style: solid;
+ border-color: #cecece;
+}
+
+BODY IMG.NAVHEADER {
+ margin: 0 0 0 -4%;
+}
+
+OL {
+ margin: 0 0 0 5%;
+ line-height: 1.2;
+}
+
+BODY PRE {
+ margin: .75em 0;
+ line-height: 1.0;
+ font-family: monospace;
+}
+
+BODY TD, BODY TH {
+ line-height: 1.2;
+}
+
+UL, BODY DIR, BODY MENU {
+ margin: 0 0 0 5%;
+ line-height: 1.2;
+}
+
+HTML {
+ margin: 0;
+ padding: 0;
+}
+
+BODY P B.APPLICATION {
+ color: #000000;
+}
+
+.FILENAME {
+ color: #007a00;
+}
+
+.GUIMENU, .GUIMENUITEM, .GUISUBMENU,
+.GUILABEL, .INTERFACE,
+.SHORTCUT, .SHORTCUT .KEYCAP {
+ font-weight: bold;
+}
+
+.GUIBUTTON {
+ background-color: #CFCFCF;
+ padding: 2px;
+}
+
+.ACCEL {
+ background-color: #F0F0F0;
+ text-decoration: underline;
+}
+
+.SCREEN {
+ padding: 1ex;
+}
+
+.PROGRAMLISTING {
+ padding: 1ex;
+ background-color: #eee;
+ border: 1px solid #ccc;
+}
+
+@media screen { /* hide from IE3 */
+ a[href]:hover { background: #ffa }
+}
+
+BLOCKQUOTE.NOTE {
+ color: #222;
+ background: #eee;
+ border: 1px solid #ccc;
+ padding: 0.4em 0.4em;
+ width: 85%;
+}
+
+BLOCKQUOTE.TIP {
+ color: #004F00;
+ background: #d8ecd6;
+ border: 1px solid green;
+ padding: 0.2em 2em;
+ width: 85%;
+}
+
+BLOCKQUOTE.IMPORTANT {
+ font-style:italic;
+ border: 1px solid #a00;
+ border-left: 12px solid #c00;
+ padding: 0.1em 1em;
+}
+
+BLOCKQUOTE.WARNING {
+ color: #9F1313;
+ background: #f8e8e8;
+ border: 1px solid #e59595;
+ padding: 0.2em 2em;
+ width: 85%;
+}
+
+.EXAMPLE {
+ background: #fefde6;
+ border: 1px solid #f1bb16;
+ margin: 1em 0;
+ padding: 0.2em 2em;
+ width: 90%;
+}
+
+.INFORMALTABLE TABLE.CALSTABLE TR TD {
+ padding-left: 1em;
+ padding-right: 1em;
+}
Copied and modified: head/en_US.ISO8859-1/htdocs/releases/9.3R/schedule.xml (from r44122, head/en_US.ISO8859-1/htdocs/releases/9.2R/schedule.xml)
==============================================================================
--- head/en_US.ISO8859-1/htdocs/releases/9.2R/schedule.xml Tue Mar 4 20:54:36 2014 (r44122, copy source)
+++ head/en_US.ISO8859-1/htdocs/releases/9.3R/schedule.xml Tue Mar 4 22:45:37 2014 (r44124)
@@ -2,9 +2,9 @@
-
+
-
+
]>
@@ -44,23 +44,23 @@
Initial release schedule announcement
-
-
23 June 2013
+
4 March 2014
Release Engineers send announcement email to developers with a
rough schedule.
Release schedule reminder
-
1 July 2013
-
4 July 2013
+
4 April 2014
+
-
Release Engineers send reminder announcement e-mail to developers
with updated schedule.
Code slush begins
-
6 July 2013
-
6 July 2013
+
9 May 2014
+
-
Release Engineers announce that all further commits to the
&local.branch.stable; branch will not require explicit approval,
however new features should be avoided.
@@ -68,8 +68,8 @@
Code freeze begins
-
12 July 2013
-
12 July 2013
+
23 May 2014
+
-
Release Engineers announce that all further commits to the
&local.branch.stable; branch will require explicit approval.
Certain blanket approvals will be granted for narrow areas of
@@ -78,74 +78,65 @@
BETA1 builds begin
-
19 July 2013
-
19 July 2013
+
30 May 2014
+
-
First beta test snapshot.
BETA2 builds begin
-
26 July 2013
-
26 July 2013
+
6 June 2014
+
-
Second beta test snapshot.
&local.branch.releng; branch
-
1 August 2013
-
3 August 2013
+
20 June 2014
+
-
Subversion branch created; future release engineering
proceeds on this branch.
RC1 builds begin
-
2 August 2013
-
3 August 2013
+
20 June 2014
+
-
First release candidate.
RC2 builds begin
-
9 August 2013
-
15 August 2013
+
27 June 2014
+
-
Second release candidate.
RC3 builds begin
-
16 August 2013
-
24 August 2013
+
4 July 2014
+
-
Third release candidate.
-
RC4 builds begin
-
31 August 2013
-
11 September 2013
-
Fourth release candidate.
-
-
-
RELEASE builds begin
-
23 August 2013
- 6 September 2013
-
26 September 2013
-
9.2-RELEASE built.
+
11 July 2014
+
-
+
&local.rel;-RELEASE built.
RELEASE announcement
-
31 August 2013
- 14 September 2013
-
30 September 2013
-
9.2-RELEASE press release.
+
16 July 2014
+
-
+
&local.rel;-RELEASE press release.
Turn over to the secteam
-
-
15 October 2013
+
-
&local.branch.releng; branch is handed over to the FreeBSD
Security Officer Team in one or two weeks after the
announcement.
@@ -154,14 +145,14 @@
Additional Information
From owner-svn-doc-all@FreeBSD.ORG Tue Mar 4 22:46:08 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 85475C18;
Tue, 4 Mar 2014 22:46:08 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 71976774;
Tue, 4 Mar 2014 22:46:08 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s24Mk8Fb052585;
Tue, 4 Mar 2014 22:46:08 GMT (envelope-from gjb@svn.freebsd.org)
Received: (from gjb@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s24Mk8wa052584;
Tue, 4 Mar 2014 22:46:08 GMT (envelope-from gjb@svn.freebsd.org)
Message-Id: <201403042246.s24Mk8wa052584@svn.freebsd.org>
From: Glen Barber
Date: Tue, 4 Mar 2014 22:46:08 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44125 - head/en_US.ISO8859-1/htdocs/releases
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Tue, 04 Mar 2014 22:46:08 -0000
Author: gjb
Date: Tue Mar 4 22:46:07 2014
New Revision: 44125
URL: http://svnweb.freebsd.org/changeset/doc/44125
Log:
Connect 9.3R to the build.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
Modified:
head/en_US.ISO8859-1/htdocs/releases/Makefile
Modified: head/en_US.ISO8859-1/htdocs/releases/Makefile
==============================================================================
--- head/en_US.ISO8859-1/htdocs/releases/Makefile Tue Mar 4 22:45:37 2014 (r44124)
+++ head/en_US.ISO8859-1/htdocs/releases/Makefile Tue Mar 4 22:46:07 2014 (r44125)
@@ -17,7 +17,7 @@ SUBDIR+= 5.0R 5.1R 5.2R 5.2.1R 5.3R 5.4R
SUBDIR+= 6.0R 6.1R 6.2R 6.3R 6.4R
SUBDIR+= 7.0R 7.1R 7.2R 7.3R 7.4R
SUBDIR+= 8.0R 8.1R 8.2R 8.3R 8.4R
-SUBDIR+= 9.0R 9.1R 9.2R
+SUBDIR+= 9.0R 9.1R 9.2R 9.3R
SUBDIR+= 10.0R
.if defined(NEW_BUILD)
From owner-svn-doc-all@FreeBSD.ORG Wed Mar 5 02:29:00 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 55058D46;
Wed, 5 Mar 2014 02:29:00 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 42A0EE64;
Wed, 5 Mar 2014 02:29:00 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s252T0Pb044875;
Wed, 5 Mar 2014 02:29:00 GMT (envelope-from wblock@svn.freebsd.org)
Received: (from wblock@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s252T0OD044874;
Wed, 5 Mar 2014 02:29:00 GMT (envelope-from wblock@svn.freebsd.org)
Message-Id: <201403050229.s252T0OD044874@svn.freebsd.org>
From: Warren Block
Date: Wed, 5 Mar 2014 02:29:00 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44126 - head/share/misc
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 05 Mar 2014 02:29:00 -0000
Author: wblock
Date: Wed Mar 5 02:28:59 2014
New Revision: 44126
URL: http://svnweb.freebsd.org/changeset/doc/44126
Log:
Remove line-height settings for lines in screen and programlisting
elements which were hiding underlines in text.
Submitted by: James Riggs
Modified:
head/share/misc/docbook.css
Modified: head/share/misc/docbook.css
==============================================================================
--- head/share/misc/docbook.css Tue Mar 4 22:46:07 2014 (r44125)
+++ head/share/misc/docbook.css Wed Mar 5 02:28:59 2014 (r44126)
@@ -274,7 +274,6 @@ html {
border-color: #EEB985;
border-width: 0 0 0 24px;
border-radius: 6px;
- line-height: 1.1;
counter-reset: code;
}
@@ -287,7 +286,6 @@ html {
border-color: #BABABA;
border-width: 0 0 0 24px;
border-radius: 6px;
- line-height: 1.1;
counter-reset: code;
}
From owner-svn-doc-all@FreeBSD.ORG Wed Mar 5 09:20:55 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 2C46D3B7;
Wed, 5 Mar 2014 09:20:55 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id F3BF6EF1;
Wed, 5 Mar 2014 09:20:54 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s259KsBl011361;
Wed, 5 Mar 2014 09:20:54 GMT (envelope-from ryusuke@svn.freebsd.org)
Received: (from ryusuke@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s259KsMI011358;
Wed, 5 Mar 2014 09:20:54 GMT (envelope-from ryusuke@svn.freebsd.org)
Message-Id: <201403050920.s259KsMI011358@svn.freebsd.org>
From: Ryusuke SUZUKI
Date: Wed, 5 Mar 2014 09:20:54 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44127 - head/ja_JP.eucJP/htdocs/internal
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 05 Mar 2014 09:20:55 -0000
Author: ryusuke
Date: Wed Mar 5 09:20:54 2014
New Revision: 44127
URL: http://svnweb.freebsd.org/changeset/doc/44127
Log:
- Merge the following from the English version:
r43462 -> r44116 head/ja_JP.eucJP/htdocs/internal/machines.xml
Modified:
head/ja_JP.eucJP/htdocs/internal/about.xml
head/ja_JP.eucJP/htdocs/internal/machines.xml
Modified: head/ja_JP.eucJP/htdocs/internal/about.xml
==============================================================================
--- head/ja_JP.eucJP/htdocs/internal/about.xml Wed Mar 5 02:28:59 2014 (r44126)
+++ head/ja_JP.eucJP/htdocs/internal/about.xml Wed Mar 5 09:20:54 2014 (r44127)
@@ -1,11 +1,11 @@
]>
-
+
@@ -31,12 +31,15 @@
From owner-svn-doc-all@FreeBSD.ORG Wed Mar 5 14:23:31 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 77986F61;
Wed, 5 Mar 2014 14:23:31 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 62ECBE3C;
Wed, 5 Mar 2014 14:23:31 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s25ENVVi037807;
Wed, 5 Mar 2014 14:23:31 GMT (envelope-from wblock@svn.freebsd.org)
Received: (from wblock@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s25ENVoa037806;
Wed, 5 Mar 2014 14:23:31 GMT (envelope-from wblock@svn.freebsd.org)
Message-Id: <201403051423.s25ENVoa037806@svn.freebsd.org>
From: Warren Block
Date: Wed, 5 Mar 2014 14:23:31 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44128 - head/en_US.ISO8859-1/books/handbook/audit
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 05 Mar 2014 14:23:31 -0000
Author: wblock
Date: Wed Mar 5 14:23:30 2014
New Revision: 44128
URL: http://svnweb.freebsd.org/changeset/doc/44128
Log:
Remove extraneous word.
PR: docs/187279
Submitted by: Vladimir Romanov
Modified:
head/en_US.ISO8859-1/books/handbook/audit/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/audit/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/audit/chapter.xml Wed Mar 5 09:20:54 2014 (r44127)
+++ head/en_US.ISO8859-1/books/handbook/audit/chapter.xml Wed Mar 5 14:23:30 2014 (r44128)
@@ -589,7 +589,7 @@ trailer,133
This audit represents a successful
execve call, in which the command
finger doug has been run. The arguments
- token contains both the processed command line presented by
+ token contains the processed command line presented by
the shell to the kernel. The path token
holds the path to the executable as looked up by the kernel.
The attribute token describes the binary,
From owner-svn-doc-all@FreeBSD.ORG Wed Mar 5 15:23:52 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 5BB08534;
Wed, 5 Mar 2014 15:23:52 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 2CE28803;
Wed, 5 Mar 2014 15:23:52 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s25FNqUs061666;
Wed, 5 Mar 2014 15:23:52 GMT (envelope-from mat@svn.freebsd.org)
Received: (from mat@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s25FNqRh061665;
Wed, 5 Mar 2014 15:23:52 GMT (envelope-from mat@svn.freebsd.org)
Message-Id: <201403051523.s25FNqRh061665@svn.freebsd.org>
From: Mathieu Arnold
Date: Wed, 5 Mar 2014 15:23:52 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44129 -
head/en_US.ISO8859-1/books/porters-handbook/slow-porting
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 05 Mar 2014 15:23:52 -0000
Author: mat (ports committer)
Date: Wed Mar 5 15:23:51 2014
New Revision: 44129
URL: http://svnweb.freebsd.org/changeset/doc/44129
Log:
Update the slow-porting chapter.
Sponsored by: Absolight
Modified:
head/en_US.ISO8859-1/books/porters-handbook/slow-porting/chapter.xml
Modified: head/en_US.ISO8859-1/books/porters-handbook/slow-porting/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/porters-handbook/slow-porting/chapter.xml Wed Mar 5 14:23:30 2014 (r44128)
+++ head/en_US.ISO8859-1/books/porters-handbook/slow-porting/chapter.xml Wed Mar 5 15:23:51 2014 (r44129)
@@ -100,9 +100,18 @@
+ The package target is run.
+ This creates a package using the files from the temporary
+ directory created during the
+ stage target and the port's
+ pkg-plist.
+
+
+ The install target is run.
- This copies the files listed in the port's pkg-plist to the
- host system.
+ This install the package created during the
+ package target into the host
+ system.
@@ -255,133 +264,153 @@
&prompt.user; cp filefile.orig
- Patches are saved into files named
- patch-* where *
- indicates the pathname of the file that is patched, such as
- patch-Imakefile or
- patch-src-config.h.
-
- After the file has been modified, &man.diff.1; is used to
- record the differences between the original and the modified
- version. causes &man.diff.1; to produce
- unified diffs, the preferred form.
-
- &prompt.user; diff -u file.orig file > patch-pathname-file
-
- When generating patches for new, added files,
- is added to tell &man.diff.1; to treat the
- non-existent original file as if it existed but was
- empty:
-
- &prompt.user; diff -u -N newfile.orig newfile > patch-pathname-newfile
-
- Patch files are stored in PATCHDIR
- (usually files/, from
- where they will be automatically applied. All patches must be
- relative to WRKSRC (generally the directory
- the port's tarball unpacks itself into, that being where the
- build is done). To make fixes and upgrades easier, avoid having
- more than one patch fix the same file (that is,
- patch-file and
- patch-file2 both changing
- WRKSRC/foobar.c). Note that if the path of
- a patched file contains an underscore (_)
- character, the patch needs to have two underscores instead in
- its name. For example, to patch a file named
- src/freeglut_joystick.c, the corresponding
- patch should be named
- patch-src-freeglut__joystick.c.
-
- Please only use characters
- [-+._a-zA-Z0-9] for naming patches. Do not
- use any other characters besides them. Do not name patches like
- patch-aa or patch-ab,
- always mention the path and file name in patch names.
-
- There is an alternate, easier method for creating patches to
- existing files. The first steps are the same, make a copy of
- the unmodified file with an .orig
- extension, then make modifications. Then use
- make makepatch to write updated patch files
- to the files directory of the port.
-
- Do not put RCS strings in patches.
- Subversion will mangle them when we
- put the files into the ports tree, and when we check them out
- again, they will come out different and the patch will fail.
- RCS strings are surrounded by dollar
- ($) signs, and typically start with
- $Id or
- $RCS.
-
- Using the recurse () option to
- &man.diff.1; to generate patches is fine, but please look at the
- resulting patches to make sure there is no unnecessary junk in
- there. In particular, diffs between two backup files,
- Makefiles when the port uses
- Imake or GNU configure,
- etc., are unnecessary and should be deleted. If it was
- necessary to edit configure.in and run
- autoconf to regenerate
- configure, do not take the diffs of
- configure (it often grows to a few thousand
- lines!). Instead, define
- USE_AUTOTOOLS=autoconf:261 and take the diffs
- of configure.in.
-
- Try to minimize the amount of non-functional whitespace
- changes in patches. It is common in the Open Source world for
- projects to share large amounts of a code base, but obey
- different style and indenting rules. When taking a working
- piece of functionality from one project to fix similar areas in
- another, please be careful: the resulting line patch may be full
- of non-functional changes. It not only increases the size of
- the Subversion repository but makes
- it hard to find out what exactly caused the problem and what was
- changed at all.
-
- If a file must be deleted, do it in the
- post-extract target rather than as
- part of the patch.
-
- Simple replacements can be performed directly from the port
- Makefile using the in-place mode of
- &man.sed.1;. This is useful when changes use the value of a
- variable:
+
+ Automatic Patch Generation
+
+ When all the files have been modified, use make
+ makepatch from the port directory to write updated
+ patch files to the files directory of the
+ port.
+
+
+
+
+ Manual Patch Generation
+
+ Patches are saved into files named
+ patch-* where
+ * indicates the pathname of the
+ file that is patched, such as
+ patch-Imakefile or
+ patch-src-config.h.
+
+ After the file has been modified, &man.diff.1; is used to
+ record the differences between the original and the modified
+ version. causes &man.diff.1; to produce
+ unified diffs, the preferred form.
+
+ &prompt.user; diff -u file.orig file > patch-pathname-file
+
+ When generating patches for new, added files,
+ is added to tell &man.diff.1; to treat the
+ non-existent original file as if it existed but was
+ empty:
+
+ &prompt.user; diff -u -N newfile.orig newfile > patch-pathname-newfile
+
+ Patch files are stored in PATCHDIR
+ (usually files/, from
+ where they will be automatically applied. All patches must be
+ relative to WRKSRC (generally the directory
+ the port's tarball unpacks itself into, that being where the
+ build is done). To make fixes and upgrades easier, avoid
+ having more than one patch fix the same file (that is,
+ patch-file and
+ patch-file2 both changing
+ WRKSRC/foobar.c). Note that in the path
+ of a patched file the / are to be replaced
+ with two underscores __. For example, to
+ patch a file named
+ src/freeglut_joystick.c, the
+ corresponding patch should be named
+ patch-src__freeglut_joystick.c.
+
+ Please only use characters
+ [-+._a-zA-Z0-9] for naming patches. Do not
+ use any other characters besides them. Do not name patches
+ like patch-aa or
+ patch-ab, always mention the path and
+ file name in patch names.
+
+ Do not put RCS strings in patches.
+ Subversion will mangle them when we
+ put the files into the ports tree, and when we check them out
+ again, they will come out different and the patch will fail.
+ RCS strings are surrounded by dollar
+ ($) signs, and typically start with
+ $Id or
+ $RCS.
+
+ Using the recurse () option to
+ &man.diff.1; to generate patches is fine, but please look at
+ the resulting patches to make sure there is no unnecessary
+ junk in there. In particular, diffs between two backup files,
+ Makefiles when the port uses
+ Imake or GNU configure,
+ etc., are unnecessary and should be deleted. If it was
+ necessary to edit configure.in and run
+ autoconf to regenerate
+ configure, do not take the diffs of
+ configure (it often grows to a few thousand
+ lines!). Instead, define
+ USE_AUTOTOOLS=autoconf:261 and take the
+ diffs of configure.in.
+
+
+
+
+ General Rules for Patching
+
+ Try to minimize the amount of non-functional whitespace
+ changes in patches. It is common in the Open Source world for
+ projects to share large amounts of a code base, but obey
+ different style and indenting rules. When taking a working
+ piece of functionality from one project to fix similar areas
+ in another, please be careful: the resulting line patch may be
+ full of non-functional changes. It not only increases the
+ size of the Subversion repository
+ but makes it hard to find out what exactly caused the problem
+ and what was changed at all.
+
+ If a file must be deleted, do it in the
+ post-extract target rather than as
+ part of the patch.
+
+
+
+
+ Simple Automatic Replacements
+
+ Simple replacements can be performed directly from the
+ port Makefile using the in-place mode of
+ &man.sed.1;. This is useful when changes use the value of a
+ variable:
- post-patch:
+ post-patch:
@${REINPLACE_CMD} -e 's|for Linux|for FreeBSD|g' ${WRKSRC}/README
- Quite often, software being ported uses the CR/LF convention
- in source files. This may cause problems with further patching,
- compiler warnings, or script execution (like
- /bin/sh^M not found.) To quickly convert all
- files from CR/LF to just LF, add this entry to the port
- Makefile:
+ Quite often, software being ported uses the CR/LF
+ convention in source files. This may cause problems with
+ further patching, compiler warnings, or script execution (like
+ /bin/sh^M not found.) To quickly convert
+ all files from CR/LF to just LF, add this entry to the port
+ Makefile:
- USES= dos2unix
+ USES= dos2unix
- A list of specific files to convert can be given:
+ A list of specific files to convert can be given:
- USES= dos2unix
+ USES= dos2unix
DOS2UNIX_FILES= util.c util.h
- Use DOS2UNIX_REGEX to convert a group of
- files across subdirectories. Its argument is a
- &man.find.1;-compatible regular expression. More on the format
- is in &man.re.format.7;. This option is useful for converting
- all files of a given extension. For example, convert all source
- code files, leaving binary files intact:
+ Use DOS2UNIX_REGEX to convert a group
+ of files across subdirectories. Its argument is a
+ &man.find.1;-compatible regular expression. More on the
+ format is in &man.re.format.7;. This option is useful for
+ converting all files of a given extension. For example,
+ convert all source code files, leaving binary files
+ intact:
- USES= dos2unix
+ USES= dos2unix
DOS2UNIX_REGEX= .*\.([ch]|cpp)
- A similar option is DOS2UNIX_GLOB, which
- invokes find for each element listed in
- it.
+ A similar option is DOS2UNIX_GLOB,
+ which invokes find for each element listed
+ in it.
- USES= dos2unix
+ USES= dos2unix
DOS2UNIX_GLOB= *.c *.cpp *.h
+
From owner-svn-doc-all@FreeBSD.ORG Wed Mar 5 15:50:09 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id AE369D31;
Wed, 5 Mar 2014 15:50:09 +0000 (UTC)
Received: from prod2.absolight.net (mx3.absolight.net
[IPv6:2a01:678:2:100::25])
(using TLSv1 with cipher ADH-CAMELLIA256-SHA (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 6BD91A29;
Wed, 5 Mar 2014 15:50:09 +0000 (UTC)
Received: from prod2.absolight.net (localhost [127.0.0.1])
by prod2.absolight.net (Postfix) with ESMTP id DD7EFBDC56;
Wed, 5 Mar 2014 16:50:07 +0100 (CET)
Received: from gw.in.absolight.net (gw-ecl.in.absolight.net [79.143.241.69])
(using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
(Client CN "gw.in.absolight.net",
Issuer "CA Cert Signing Authority" (not verified))
by prod2.absolight.net (Postfix) with ESMTPSA id BC712BDC5A;
Wed, 5 Mar 2014 16:50:07 +0100 (CET)
Received: from ogg.in.absolight.net (ogg.in.absolight.net [79.143.241.239])
by gw.in.absolight.net (Postfix) with ESMTP id E7ADB6127;
Wed, 5 Mar 2014 16:50:06 +0100 (CET)
Received: from localhost (localhost [127.0.0.1])
by ogg.in.absolight.net (Postfix) with ESMTP id 84A5B69D458C;
Wed, 5 Mar 2014 16:50:06 +0100 (CET)
Date: Wed, 05 Mar 2014 16:50:06 +0100
From: Mathieu Arnold
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: Re: svn commit: r44129 -
head/en_US.ISO8859-1/books/porters-handbook/slow-porting
Message-ID:
In-Reply-To: <201403051523.s25FNqRh061665@svn.freebsd.org>
References: <201403051523.s25FNqRh061665@svn.freebsd.org>
X-Mailer: Mulberry/4.0.8 (Mac OS X)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 05 Mar 2014 15:50:09 -0000
+--On 5 mars 2014 15:23:52 +0000 Mathieu Arnold wrote:
| Author: mat (ports committer)
| Date: Wed Mar 5 15:23:51 2014
| New Revision: 44129
| URL: http://svnweb.freebsd.org/changeset/doc/44129
|
| Log:
| Update the slow-porting chapter.
Ah, I'm really sorry, I meant for it to be a two parter, quite a few of it
is whitespace change, I splitted the sect1 about patching into four sect2.
--
Mathieu Arnold
From owner-svn-doc-all@FreeBSD.ORG Wed Mar 5 15:30:24 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id C192A706;
Wed, 5 Mar 2014 15:30:24 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id AC370854;
Wed, 5 Mar 2014 15:30:24 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s25FUOjr062441;
Wed, 5 Mar 2014 15:30:24 GMT (envelope-from remko@svn.freebsd.org)
Received: (from remko@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s25FUOSn062440;
Wed, 5 Mar 2014 15:30:24 GMT (envelope-from remko@svn.freebsd.org)
Message-Id: <201403051530.s25FUOSn062440@svn.freebsd.org>
From: Remko Lodder
Date: Wed, 5 Mar 2014 15:30:24 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-translations@freebsd.org
Subject: svn commit: r44130 -
translations/nl_NL.ISO8859-1/books/handbook/basics
X-SVN-Group: doc-translations
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-Mailman-Approved-At: Wed, 05 Mar 2014 16:13:11 +0000
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 05 Mar 2014 15:30:24 -0000
Author: remko
Date: Wed Mar 5 15:30:24 2014
New Revision: 44130
URL: http://svnweb.freebsd.org/changeset/doc/44130
Log:
Import my latest work for the last two days.
Do note that this is not complete and thus
will not build.
Facilitated by: Snow B.V.
Modified:
translations/nl_NL.ISO8859-1/books/handbook/basics/chapter.xml
Modified: translations/nl_NL.ISO8859-1/books/handbook/basics/chapter.xml
==============================================================================
--- translations/nl_NL.ISO8859-1/books/handbook/basics/chapter.xml Wed Mar 5 15:23:51 2014 (r44129)
+++ translations/nl_NL.ISO8859-1/books/handbook/basics/chapter.xml Wed Mar 5 15:30:24 2014 (r44130)
@@ -500,6 +500,826 @@ console none
+
+ Wijzigingstijd wachtwoord
+
+
+ Standaard vervallen wachtwoorden niet. Dit kan
+ wel ingesteld worden per gebruiker, waardoor een of
+ meerdere gebruikers na het verlopen van een vooraf
+ bepaalde tijd, de gebruiker wordt gedwongen om het
+ wachtwoord te veranderen.
+
+
+
+
+ Account vervaldatum
+
+
+ Standaard laat &os; geen accounts na verloop van
+ tijd vervallen. Wanneer er accounts gemaakt worden
+ welke een korte levensduur kennen zoals een student
+ op een school, kan de vervaldatum worden ingesteld met
+ &man.pw.8;. Nadat de vervaldatum verstreken is kan er
+ niet meer worden ingelogd maar blijven de directories
+ en bestanden onder het account beschikbaar.
+
+
+
+
+ Volledige naam van de gebruiker
+
+
+ De gebruikersnaam identificeert de gebruiker uniek
+ binnen &os;, maar dit is niet per definitie ook de
+ daadwerkelijke volledige naam van de gebruiker. Net
+ als bij commentaar kan deze informatie spaties,
+ hoofdletters en meer dan 8 karakters bevatten.
+
+
+
+
+ Home directory
+
+
+ De home directory is het volledige pad naar een
+ directory op het systeem. Dit is het startpunt van
+ een gebruiker wanneer deze aanlogt. Een standaard
+ conventie is dat deze geplaatst worden in
+ /home/gebruikersnaam of in
+ /usr/home/gebruikersnaam. Elke
+ gebruiker bewaard zijn eigen bestanden en directories
+ in de eigen home directory.
+
+
+
+
+ Shell van de gebruiker
+
+
+ De shell levert de standaard werkomgeving op voor
+ een gebruiker wanneer deze interactie heeft met het
+ systeem. Er zijn veel verschillende soorten shells en
+ ervaren gebruikers hebben allen hun eigen voorkeuren
+ welke terug kunnen komen in de account
+ instellingen.
+
+
+
+
+
+
+ Het superuser account
+
+
+ accounts
+ superuser (root)
+
+
+ Het superuser account, vaak genoemd
+ root, wordt
+ gebruikt om het systeem te managen zonder limitatie
+ van privileges. Om deze reden wordt het dagelijks gebruik
+ van dit account zoals het versturen en ophalen van e-mail,
+ algemeen gebruik van het systeem en programmeren
+ afgeraden.
+
+ De superuser, in tegenstellig tot andere accounts, kan
+ opereren zonder limitaties en bij misbruik van dit account
+ kan dat leiden tot spectaculaire problemen.
+ Gebruikeraccounts zijn niet in staat om het systeem per
+ ongeluk stuk te maken, dus het wordt aangeraden om in te
+ loggen als gewone gebruiker en alleen superuser te worden
+ als dat nodig is.
+
+ Controleer alle op te voeren commando's als de superuser
+ dubbel of zelfs driedubbel, omdat een extra spatie of
+ ontbrekend karakter kan leiden tot permanente
+ databeschadigingen.
+
+ Er zijn een aantal manieren om superuser privileges te
+ verkrijgen. Ondanks dat men in zou kunnen loggen als
+ root wordt dit
+ sterk afgeraden.
+
+ In plaats daarvan kan &man.su.1; gebruikt worden om
+ superuser te worden. Als - gebruikt
+ wordt als argument voor dit commando zal de gebruiker ook
+ de superuser omgeving geladen krijgen. De gebruiker die dit
+ commando wilt gebruiken moet in de
+ wheel groep
+ vermeld staan anders zal dit commando falen. De
+ gebruiker moet ook op de hoogte zijn van het wachtwoord
+ voor het root
+ account.
+
+ In dit voorbeeld wordt de gebruiker alleen superuser
+ zodat make install gestart kan worden,
+ omdat deze stap superuser rechten nodig heeft. Zodra het
+ commando uitgevoerd is typt de gebruiker
+ exit om het superuser account te
+ verlaten en terug te keren naar de reguliere privileges
+ behorende bij het gebruikers account.
+
+
+ Installeren van een programma als superuser
+
+ &prompt.user; configure
+&prompt.user; make
+&prompt.user; su -
+Password:
+&prompt.root; make install
+&prompt.root; exit
+&prompt.user;
+
+
+ Het ingebouwde &man.su.1; framework werkt prima voor
+ een enkel systeem of kleine netwerken met een systeem
+ beheerder. Een alternatief is het installeren van de
+ security/sudo package of port. Deze
+ software kan activiteiten logging doen en stelt de
+ administrator in staat om te configureren welke gebruikers
+ welke commando's kunnen starten als de superuser.
+
+
+
+
+ Accounts beheren
+
+
+ accounts
+ aanpassen
+
+
+ &os; levert een variateit aan verschillende commando's
+ waarmee gebruikeraccounts beheerd kunnen worden. De meest
+ voorkomende commando's worden samengevat in:
+ gevolgd door een
+ aantal voorbeelden voor het gebruik hiervan. Zie de
+ handleiding van elk commando voor meer details en
+ gebruikersvoorbeelden.
+
+
+ Tools om gebruikeraccounts te beheren
+
+
+
+
+
+
+
+ Commando
+ Samenvatting
+
+
+
+
+ &man.adduser.8;
+ De aangeraden CLI tool om nieuwe gebruikers
+ toe te voegen.
+
+
+
+ &man.rmuser.8;
+ De aangeraden CLI tool om gebruikers te
+ verwijderen.
+
+
+
+ &man.chpass.1;
+ Een flexibele tool om de gebruikersdatabase
+ aan te passen.
+
+
+
+ &man.passwd.1;
+ De aangeraden CLI tool om gebruikers wachtwoorden
+ aan te passen.
+
+
+
+ &man.pw.8;
+ Een krachtige en flexibele tool om alle aspecten
+ van een gebruikersaccount aan te passen.
+
+
+
+
+
+
+ adduser
+
+
+ accounts
+ toevoegen
+
+
+
+ adduser
+
+
+
+ /usr/share/skel
+
+
+
+ skeleton directory
+
+
+ De aangeraden applicatie om nieuwe gebruikers toe te
+ voegen is &man.adduser.8;. Wanneer er een nieuwe gebruiker
+ wordt toegevoegd, past deze applicatie automatisch
+ /etc/passwd en
+ /etc/group aan. De applicatie maakt
+ ook meteen de home directorie aan voor de nieuwe gebruiker,
+ kopieert de standaard configuratie bestanden uit
+ /usr/share/skel en kan optioneel de
+ nieuwe gebruiker een email sturen met daarin een welkomst
+ boodschap. Deze applicatie moet gestart worden als de
+ superuser.
+
+ De &man.adduser.8; applicatie is interactief en loopt
+ door een aantal stappen heen om een nieuw account aan te
+ kunnen maken. Zoals te zien is in
+ moet ofwel de
+ gegevens worden opgevoerd, of op Enter
+ worden gedrukt om de standaard waarden te accepteren,
+ welke getoond wordt in vierkante haken. In dit voorbeeld
+ wordt de gebruiker uitgenodigd voor de
+ wheel groep,
+ welke de gebruiker in staat stelt om superuser te worden
+ door middel van &man.su.1;. Zodra dit afgerond is zal
+ de applicatie vragen of er nog een nieuwe gebruiker
+ aangemaakt moet worden of dat het programma gestopt kan
+ worden.
+
+
+ Het toevoegen van een gebruiker op &os;
+
+ &prompt.root; adduser
+Username: jru
+Full name: J. Random User
+Uid (Leave empty for default):
+Login group [jru]:
+Login group is jru. Invite jru into other groups? []: wheel
+Login class [default]:
+Shell (sh csh tcsh zsh nologin) [sh]: zsh
+Home directory [/home/jru]:
+Home directory permissions (Leave empty for default):
+Use password-based authentication? [yes]:
+Use an empty password? (yes/no) [no]:
+Use a random password? (yes/no) [no]:
+Enter password:
+Enter password again:
+Lock out the account after creation? [no]:
+Username : jru
+Password : ****
+Full Name : J. Random User
+Uid : 1001
+Class :
+Groups : jru wheel
+Home : /home/jru
+Shell : /usr/local/bin/zsh
+Locked : no
+OK? (yes/no): yes
+adduser: INFO: Successfully added (jru) to the user database.
+Add another user? (yes/no): no
+Goodbye!
+&prompt.root;
+
+
+
+ Omdat het wachtwoord niet getoond wordt tijdens
+ het invoeren is het aangeraden om deze zorgvuldig op
+ te voeren tijdens het aanmaken van het gebruikers
+ account.
+
+
+
+
+ rmuser
+
+
+ rmuser
+
+
+
+ accounts
+ verwijderen
+
+
+ Om een gebruiker geheel van het systeem te verwijderen
+ moet de applicatie &man.rmuser.8; worden gestart als de
+ superuser. Dit commando voert de volgende stappen
+ uit:
+
+
+
+ Verwijderd de &man.crontab.1; van de gebruiker, mits
+ deze bestaat.
+
+
+
+ Verwijderd alle &man.at.1; opdrachten die toebehoren
+ aan de gebruiker.
+
+
+
+ Stopt alle processen die eigendom zijn van de
+ gebruiker.
+
+
+
+ Verwijdert de gebruiker uit het lokale wachtwoord
+ database bestand.
+
+
+
+ Verwijderd de home directorie van de gebruiker, mits
+ deze eigendom is van de gebruiker.
+
+
+
+ Verwijderd de binnengekomen emails van de gebruiker
+ uit /var/mail.
+
+
+
+ Verwijderd alle bestanden van de gebruiker uit de
+ tijdelijke bestandsopslag directories zoals
+ /tmp.
+
+
+
+ Als laatste wordt de gebruikersnaam verwijderd uit
+ alle groepen waarin de gebruikersnaam voorkomt. Dit
+ gebeurd in het /etc/group bestand.
+ Als de groep daarmee leeg raakt en dezelfde naam heeft
+ als de gebruikersnaam wordt deze verwijderd. Dit vult
+ de per gebruiker unieke groepen aan vanuit
+ &man.adduser.8;
+
+
+
+ &man.rmuser.8; kan niet worden gebruikt om het superuser
+ account te verwijderen, omdat dat nagenoeg altijd tot
+ gigantische problemen zal leiden.
+
+ Standaard wordt de interactieve modus gebruikt zoals te
+ zien is in het volgende voorbeeld:
+
+
+ Interactief accounts verwijderen met
+ rmuser
+
+ &prompt.root; rmuser jru
+Matching password entry:
+jru:*:1001:1001::0:0:J. Random User:/home/jru:/usr/local/bin/zsh
+Is this the entry you wish to remove? y
+Remove user's home directory (/home/jru)? y
+Removing user (jru): mailspool home passwd.
+&prompt.root;
+
+
+
+
+ chpass
+
+
+ chpass
+
+
+ Elke gebruiker kan gebruik maken van de applicatie
+ &man.chpass.1; om de standaard shell en persoonlijke
+ informatie die gekoppeld is aan het account aan te
+ passen. De superuser kan deze applicatie gebruiken om
+ additionele account informatie aan te passen voor
+ elke gebruiker.
+
+ Als de applicatie opgestart wordt zonder argumenten,
+ naast een eventuele gebruikersnaam zal &man.chpass.1; een
+ editor tonen met daarin de gebruikers informatie. Zodra
+ de gebruiker de editor afsluit zal de nieuwe informatie
+ worden opgeslagen in de gebruikers database.
+
+
+ De applicatie zal bij het afsluiten vragen om het
+ wachtwoord van de gebruiker, tenzij de applicatie gestart
+ was als de superuser.
+
+
+ In heeft
+ de superuser het volgende getypt:
+ chpass jru en bekijkt nu de velden die
+ aangepast kunnen worden voor deze gebruiker. Als
+ jru dit commando
+ start zullen alleen de laatste zes velden worden getoond en
+ beschikbaar voor bewerken, dit wordt getoond in
+ .
+
+
+ Gebruik maken van &man.chpass.1; als de
+ superuser
+
+ #Changing user database information for jru.
+Login: jru
+Password: *
+Uid [#]: 1001
+Gid [# or name]: 1001
+Change [month day year]:
+Expire [month day year]:
+Class:
+Home directory: /home/jru
+Shell: /usr/local/bin/zsh
+Full Name: J. Random User
+Office Location:
+Office Phone:
+Home Phone:
+Other information:
+
+
+
+ Gebruik maken van &man.chpass.1; als gewone
+ gebruiker
+
+ #Changing user database information for jru.
+Shell: /usr/local/bin/zsh
+Full Name: J. Random User
+Office Location:
+Office Phone:
+Home Phone:
+Other information:
+
+
+
+ &man.chfn.1; en &man.chsh.1; zijn links naar
+ naar &man.chpass.1; net als &man.ypchpass.1;,
+ &man.ypchfn.1; en &man.ypchsh.1;. Omdat
+ NIS ondersteuning impliciet
+ is, is het specificeren van yp
+ voor het command niet nodig. Hoe NIS geconfigureerd
+ moet worden wordt uitgelegd in
+ .
+
+
+
+
+ passwd
+
+
+ passwd
+
+
+
+ accounts
+ wachtwoord wijzigen
+
+
+ Elke gebruiker kan gemakkelijk zijn wachtwoord
+ wijzigen door middel van &man.passwd.1;. Om te
+ voorkomen dat er per ongeluk of ongeauthoriseerde
+ wijzigingen plaatsvinden zal dit commando eerst
+ vragen om het huidige wachtwoord van de gebruiker
+ voor er een nieuw wachtwoord ingesteld kan worden:
+
+
+ Wijzigen van het wachtwoord
+
+ &prompt.user; passwd
+Changing local password for jru.
+Old password:
+New password:
+Retype new password:
+passwd: updating the database...
+passwd: done
+
+
+ De superuser kan het wachtwoord van elke gebruiker
+ instellen door de gebruikersnaam te specificeren met het
+ startenv an &man.passwd.1;. Wanneer deze applicatie wordt
+ gestart als de superuser zal er niet
+ worden gevraagd om het huidige wachtwoord. Dit geeft de
+ mogelijkheid om het wachtwoord te veranderen als de
+ gebruiker het wachtwoord niet meer weet.
+
+
+ Het wijzigen van het wachtwoord van een andere
+ gebruiker door de superuser
+
+ &prompt.root; passwd jru
+Changing local password for jru.
+New password:
+Retype new password:
+passwd: updating the database...
+passwd: done
+
+
+
+ Net als met &man.chpasswd.1;, is &man.yppasswd.1;
+ een link naar &man.passwd.1;, dus NIS
+ werkt met beide commando's.
+
+
+
+
+ pw
+
+
+ pw
+
+
+ &man.pw.8; is een CLI applicatie om gebruikers
+ en groepen aan te maken, te verwijderen, aan te passen
+ en te tonen. De applicatie fungeert als een front end
+ voor de systeem gebruikers en groepen bestanden.
+ &man.pw.8; heeft een erg krachtige set van command line
+ opties die het uitermate geschikt maken voor gebruik in
+ shell scripts, echter nieuwe gebruikers kunnen deze
+ applicatie lastiger vinden dan de andere commando's welke
+ gepresenteerd zijn in deze sectie.
+
+
+
+
+ Gebruikers limiteren
+
+
+ gebruikers limiteren
+
+
+
+ accounts
+ limiteren
+
+
+ &os; levert een administrator een aantal manieren om
+ de hoeveelheid systeem bronnen te limiteren voor individueel
+ gebruik. Deze limitaties worden besproken in twee delen:
+ disk quotas en andere bron limitaties.
+
+
+ quotas
+
+
+
+ gebruikers limiteren
+ quotas
+
+
+
+ disk quotas
+
+
+ Disk quotas limiteren de hoeveelheid disk ruimte welke
+ beschikbaar is voor gebruikers en leveren een snelle manier
+ om dit gebruik te controleren zonder dat dit elke keer
+ berekend moet worden. Quotas worden behandeld in
+ .
+
+ De andere bron limitaties bevatten manieren om de
+ hoeveelheid CPU, memory en andere bronnen die een gebruiker
+ mag verbruiken. Deze worden gedefinieerd door middel van de
+ login klassen en hieronder behandeld.
+
+
+ /etc/login.conf
+
+
+ Login klassen worden gedefinieerd in
+ /etc/login.conf en in detail beschreven
+ in &man.login.conf.5;. Elk gebruikers account wordt
+ toegewezen aan een login klasse, default
+ wordt standaard gebruikt. Elke login klasse heeft een set
+ van login mogelijkheden geassocieerd. Een login mogelijkheid
+ is een name=value paar waar
+ name een welbekende identificatie
+ is en value een willekeurige string
+ welke zoals benodigd wordt verwerkt naar aanleiding van de
+ name. Het opzetten van login
+ klasses en mogelijkheden is vrij recht-toe recht-aan en
+ beschreven in &man.login.conf.5;.
+
+
+ &os; leest meestal niet direct het
+ /etc/login.conf bestand maar in plaats
+ daarvan de /etc/login.conf.db
+ database welke snellere opzoek mogelijkheden biedt. Zodra
+ het /etc/login.conf bestand wordt
+ bewerkt moet het /etc/login.conf.db
+ bestand worden bijgewerkt door middel van het volgende
+ commando:
+
+ &prompt.root; cap_mkdb /etc/login.conf
+
+
+ Bron limitaties verschillen van de standaard login
+ mogelijkheden op twee manieren. Als eerste is er voor elke
+ limitatie een soft en een harde limiet. Een soft limiet kan
+ worden ingesteld door de gebruiker of een applicatie, maar kan
+ niet hoger worden ingesteld dan de harde limiet. De harde
+ limitatie kan verlaagd worden door een gebruiker, maar kan
+ alleen verhoogd worden door de superuser. Als tweede is
+ het zo dat bron limitaties gelden per proces voor een
+ specifieke gebruiker en niet voor de gebruiker in zijn
+ geheel. Deze verschillen zijn aanwezig door de verschillende
+ manieren van het gebruik van limitaties, dit is geen
+ implementatie beperking van het login mogelijkheden
+ framework.,
+
+ Hieronder staan de meest voorkomende bron limitaties. De
+ rest van de limitaties tezamen met andere login mogelijkheden
+ kunnen worden teruggevonden in &man.login.conf.5;.
+
+
+
+ coredumpsize
+
+
+ De limitatie over de groote van een coredump bestand
+
+ coredumpsize
+
+ gegenereerd door een programmais ondergeschikt aan andere
+ limitaties
+
+ gebruikers limiteren
+ coredumpsize
+
+ over de disk ruimte, zoals filesize
+ of disk quotas. Deze limiet wordt vaak als een minder
+ zware methode om de disk consumptie te controleren.
+ Omdat gebruikers niet zelf een coredump genereren en
+ deze meestal niet verwijderen, kan deze instelling
+ voorkomen dat de disk ruimte voor de gebruiker op is
+ als er een grote applicatie gestart wordt en deze
+ crashed.
+
+
+
+
+
+ cputime
+
+ De maximale hoeveelheid CPU
+
+ cputime
+
+
+
+ gebruikers limiteren
+ cputime
+
+ tijd een proces van een gebruiker mag consumeren.
+ Processen die dit overtreden worden door de kernel
+ gestopt.
+
+
+ Dit is een limitatie op de CPU
+ tijd die geconsumeerd wordt,
+ niet als percentage van de CPU zoals getoond in
+ sommige velden van &man.top.1; en &man.ps.1;.
+
+
+
+
+
+
+ filesize
+
+ De maximale grootte van een bestand welke
+
+ filesize
+
+
+
+ gebruikers limiteren
+ filesize
+
+ eigendom is van de gebruiker. In tegenstelling tot
+ disk quotas, geldt
+ deze limiet per individueel bestand en niet voor alle
+ bestanden welke eigendom zijn van een gebruiker.
+
+
+
+
+
+ maxproc
+
+ De maximale hoeveelheid processen
+
+ maxproc
+
+
+
+ gebruikers limiteren
+ maxproc
+
+ welke een gebruiker kan hebben draaien. Dit is
+ inclusief voor en achtergrond processen. Dit
+ limiet mag niet groter zijn dan de systeem limiet
+ gespecificeerd door de kern.maxproc
+ &man.sysctl.8;. Als deze limiet te klein is kan dat
+ de productiviteit van de gebruiker beperken omdat het
+ vaak zo is dat een gebruiker meermalen is ingelogd of
+ door uitvoer door middel van pipelines. Sommige
+ processen zoals het compileren van een groot programma
+ kunnen veel processen opstarten.
+
+
+
+
+ memorylocked
+
+
+ De maximale hoeveelheid geheugen
+
+ memorylocked
+
+
+
+ gebruikers limiteren
+ memorylocked
+
+ dat een proces kan vragen om in het hoofdgeheugen
+ gelocked te worden door gebruik te maken van
+ &man.mlock.2;. Sommige systeem kritische programma's
+ zoals &man.amd.8;, locken zichzelf in het geheugen
+ zodat als de machine begint te swappen, ze niet
+ meehelpen aan het stuk maken van de disk.
+
+
+
+
+ memoryuse
+
+
+ De maximale hoeveelheid geheugen
+
+ memoryuse
+
+
+
+ gebruikers limiteren
+ memoryuse
+
+ dat een proces mag consumeren op elk willekeurig moment.
+ Dit bevat zowel het standaard geheugen als het gebruik
+ van swap. Dit is geen vangnet voor het allesomvattend
+ beperken van het geheugen, maar het is een goed
+ begin.
+
+
+
+
+ openfiles
+
+
+ De maximale hoeveelheid bestanden welke een proces
+ geopend kan hebben
+
+ openfiles
+
+
+
+ gebruikers limiteren
+ openfiles
+ .
+ In &os; worden bestanden gebruikt om sockets en IPC
+ kanalen te beschrijven, deze waarde mag dus niet te laag
+ worden ingesteld. De systeem-wijde limitatie hiervoor
+ wordt gedefinieerd door de
+ kern.maxfiles &man.sysctl.8;.
+
+
+
+
+ sbsize
+
+
+ De maximale hoeveelheid netwerk geheugen ofwel
+ mbufs
+
+ sbsize
+
+
+
+ gebruikers limiteren
+ sbsize
+
+ die een gebruiker mag verbruiken. Dit kan in zijn
+ algemeenheid gebruikt worden om de hoeveeheid
+ netwerk communicatie te limiteren.
+
+
+
+
+ stacksize
+ XXXX RL: 1247
+
+
+
From owner-svn-doc-all@FreeBSD.ORG Wed Mar 5 16:29:38 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 10B50A9C;
Wed, 5 Mar 2014 16:29:38 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id F00E4DF7;
Wed, 5 Mar 2014 16:29:37 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s25GTbJR086642;
Wed, 5 Mar 2014 16:29:37 GMT (envelope-from dru@svn.freebsd.org)
Received: (from dru@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s25GTb8T086641;
Wed, 5 Mar 2014 16:29:37 GMT (envelope-from dru@svn.freebsd.org)
Message-Id: <201403051629.s25GTb8T086641@svn.freebsd.org>
From: Dru Lavigne
Date: Wed, 5 Mar 2014 16:29:37 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44131 -
head/en_US.ISO8859-1/books/handbook/advanced-networking
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 05 Mar 2014 16:29:38 -0000
Author: dru
Date: Wed Mar 5 16:29:37 2014
New Revision: 44131
URL: http://svnweb.freebsd.org/changeset/doc/44131
Log:
Last merge shuffle in prep for technical review.
Next few commits will clarify the info and check the order
in which it is presented.
Sponsored by: iXsystems
Modified:
head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml Wed Mar 5 15:30:24 2014 (r44130)
+++ head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml Wed Mar 5 16:29:37 2014 (r44131)
@@ -3891,6 +3891,11 @@ ifconfig_lagg0="laggp
+ To use PXE when the machine starts,
+ select the Boot from network option in
+ the BIOS setup or type a function key
+ during system initialization.
+
There are many ways to set up diskless workstations. Many
elements are involved, and most can be customized to suit local
taste. The following will describe variations on the setup of a
@@ -3983,9 +3988,200 @@ ifconfig_lagg0="laggp
+ Place tftpboot
+ anywhere on the server. Make sure that the location is
+ set in both /etc/inetd.conf and
+ /usr/local/etc/dhcpd.conf.
+
Refer to &man.diskless.8; for more information.
+
+
+ Setting Up the &man.chroot.8; Environment for the
+ NFS Root File System
+
+
+
+
+ Craig
+ Rodrigues
+
+
+ rodrigc@FreeBSD.org
+
+ Written by
+
+
+
+
+ The &intel; Preboot eXecution Environment
+ (PXE) allows booting the operating system
+ over the network. PXE support is usually
+ provided in the BIOS where it can be enabled
+ in the BIOS settings which enable booting
+ from the network. A fully functioning
+ PXE setup also requires properly configured
+ DHCP and TFTP
+ servers.
+
+ When the host computer boots, it receives information over
+ DHCP about where to obtain the initial boot
+ loader via TFTP. After the host computer
+ receives this information, it downloads the boot loader via
+ TFTP and then executes the boot loader.
+ This is documented in section 2.2.1 of the Preboot
+ Execution Environment (PXE)
+ Specification. In &os;, the boot loader retrieved
+ during the PXE process is
+ /boot/pxeboot. After
+ /boot/pxeboot executes, the &os; kernel is
+ loaded and the rest of the &os; bootup sequence proceeds.
+ Refer to for more information about the
+ &os; booting process.
+
+
+
+ Choose a directory which will have a &os;
+ installation which will be NFS
+ mountable. For example, a directory such as
+ /b/tftpboot/FreeBSD/install can be
+ used.
+
+ &prompt.root; export NFSROOTDIR=/b/tftpboot/FreeBSD/install
+&prompt.root; mkdir -p ${NFSROOTDIR}
+
+
+
+ Enable the NFS server by adding this line to
+ /etc/rc.conf
+
+ nfs_server_enable="YES"
+
+
+
+
+ Export the diskless root directory via NFS by
+ adding the following to
+ /etc/exports:
+
+ /b -ro -alldirs
+
+
+
+ Restart the NFS server:
+
+ &prompt.root; service nfsd restart
+
+
+
+ Enable &man.inetd.8; by adding the following line to
+ /etc/rc.conf:
+
+ inetd_enable="YES"
+
+
+
+ Add the following line to
+ /etc/inetd.conf:
+
+ tftp dgram udp wait root /usr/libexec/tftpd tftpd -l -s /b/tftpboot
+
+
+ Some
+ PXE versions require the
+ TCP version of
+ TFTP. In this case, add a second
+ line, replacing dgram udp with
+ stream tcp.
+
+
+
+
+
+ Restart &man.inetd.8;:
+
+ &prompt.root; service inetd restart
+
+
+
+ Rebuild the &os; kernel and userland ():
+
+ &prompt.root; cd /usr/src
+&prompt.root; make buildworld
+&prompt.root; make buildkernel
+
+
+
+ Install &os; into the directory mounted over
+ NFS:
+
+ &prompt.root; make installworld DESTDIR=${NFSROOTDIR}
+&prompt.root; make installkernel DESTDIR=${NFSROOTDIR}
+&prompt.root; make distribution DESTDIR=${NFSROOTDIR}
+
+
+
+ Test that the TFTP server works
+ and can download the boot loader which will be obtained
+ via PXE:
+
+ &prompt.root; tftp localhost
+tftp> get FreeBSD/install/boot/pxeboot
+Received 264951 bytes in 0.1 seconds
+
+
+
+ Edit ${NFSROOTDIR}/etc/fstab and
+ create an entry to mount the root file system over
+ NFS:
+
+ # Device Mountpoint FSType Options Dump Pass
+myhost.example.com:/b/tftpboot/FreeBSD/install / nfs ro 0 0
+
+ Replace myhost.example.com
+ with the hostname or IP address of the
+ NFS server. In this example, the root
+ file system is mounted read-only in order to prevent
+ NFS clients from potentially deleting
+ the contents of the root file system.
+
+
+
+ Set the root password in the &man.chroot.8;
+ environment:
+
+ &prompt.root; chroot ${NFSROOTDIR}
+&prompt.root; passwd
+
+ This sets the root password for client machines which
+ are PXE booting.
+
+
+
+ Enable &man.ssh.1; root logins for client machines
+ which are PXE booting by editing
+ ${NFSROOTDIR}/etc/ssh/sshd_config
+ and enabling PermitRootLogin. This
+ option is documented in &man.sshd.config.5;.
+
+
+
+ Perform other customizations of the &man.chroot.8;
+ environment in ${NFSROOTDIR}. These customizations could
+ include things like adding packages with &man.pkg.add.1;,
+ editing the password file with &man.vipw.8;, or editing
+ &man.amd.conf.5; maps for automounting. For
+ example:
+
+ &prompt.root; chroot ${NFSROOTDIR}
+&prompt.root; pkg_add -r bash
+
+
+
+
Configuring the ISC
DHCP Server
@@ -4091,94 +4287,6 @@ ifconfig_lagg0="laggp
- Configuring the
- NFS Server
-
- Enable
- NFS and export the appropriate file
- system on the NFS server.
-
- Add this line to
- /etc/rc.conf:
-
- nfs_server_enable="YES"
-
- Export the file system where the diskless root
- directory is located by adding the following to
- /etc/exports. Adjust the
- mount point and replace
- corbieres with the names of the diskless
- workstations:
-
- /data/misc -alldirs -ro margaux corbieres
-
- Tell &man.mountd.8; to reread its configuration
- file. If NFS is enabled in
- /etc/rc.conf, it is recommended
- to reboot instead.
-
- &prompt.root; service mountd restart
-
-
-
- Configuring the TFTP Server
-
- To use PXE when the machine starts,
- select the Boot from network option in
- the BIOS setup or type a function key
- during system initialization.
-
-
- TFTP
- diskless operation
-
-
- NFS
- diskless operation
-
-
- To enable &man.tftpd.8;, perform the following steps:
-
-
-
- Create a directory from which &man.tftpd.8; will
- serve the files, such as
- /tftpboot.
-
-
-
- Add this line to
- /etc/inetd.conf:
-
- tftp dgram udp wait root /usr/libexec/tftpd tftpd -l -s /tftpboot
-
-
- Some
- PXE versions require the
- TCP version of
- TFTP. In this case, add a second
- line, replacing dgram udp with
- stream tcp.
-
-
-
-
- Tell &man.inetd.8; to reread its configuration file.
- Add to
- /etc/rc.conf in order for this
- command to execute correctly:
-
- &prompt.root; service inetd restart
-
-
-
- Place tftpboot
- anywhere on the server. Make sure that the location is
- set in both /etc/inetd.conf and
- /usr/local/etc/dhcpd.conf.
-
-
- Preparing the Root File System
@@ -4294,183 +4402,6 @@ cd /usr/src/etc; make distribution
-
-
- PXE Booting with an NFS Root File
- System
-
-
-
-
- Craig
- Rodrigues
-
-
- rodrigc@FreeBSD.org
-
- Written by
-
-
-
-
- The &intel; Preboot eXecution Environment
- (PXE) allows booting the operating system
- over the network. PXE support is usually
- provided in the BIOS where it can be enabled
- in the BIOS settings which enable booting
- from the network. A fully functioning
- PXE setup also requires properly configured
- DHCP and TFTP
- servers.
-
- When the host computer boots, it receives information over
- DHCP about where to obtain the initial boot
- loader via TFTP. After the host computer
- receives this information, it downloads the boot loader via
- TFTP and then executes the boot loader.
- This is documented in section 2.2.1 of the Preboot
- Execution Environment (PXE)
- Specification. In &os;, the boot loader retrieved
- during the PXE process is
- /boot/pxeboot. After
- /boot/pxeboot executes, the &os; kernel is
- loaded and the rest of the &os; bootup sequence proceeds.
- Refer to for more information about the
- &os; booting process.
-
-
-
- Setting Up the &man.chroot.8; Environment for the
- NFS Root File System
-
-
-
- Choose a directory which will have a &os;
- installation which will be NFS
- mountable. For example, a directory such as
- /b/tftpboot/FreeBSD/install can be
- used.
-
- &prompt.root; export NFSROOTDIR=/b/tftpboot/FreeBSD/install
-&prompt.root; mkdir -p ${NFSROOTDIR}
-
-
-
- Enable the NFS server by following
- the instructions in .
-
-
-
- Export the directory via NFS by
- adding the following to
- /etc/exports:
-
- /b -ro -alldirs
-
-
-
- Restart the NFS server:
-
- &prompt.root; service nfsd restart
-
-
-
- Enable &man.inetd.8; by following the steps outlined
- in .
-
-
-
- Add the following line to
- /etc/inetd.conf:
-
- tftp dgram udp wait root /usr/libexec/tftpd tftpd -l -s /b/tftpboot
-
-
-
- Restart &man.inetd.8;:
-
- &prompt.root; service inetd restart
-
-
-
- Rebuild the &os; kernel and userland ():
-
- &prompt.root; cd /usr/src
-&prompt.root; make buildworld
-&prompt.root; make buildkernel
-
-
-
- Install &os; into the directory mounted over
- NFS:
-
- &prompt.root; make installworld DESTDIR=${NFSROOTDIR}
-&prompt.root; make installkernel DESTDIR=${NFSROOTDIR}
-&prompt.root; make distribution DESTDIR=${NFSROOTDIR}
-
-
-
- Test that the TFTP server works
- and can download the boot loader which will be obtained
- via PXE:
-
- &prompt.root; tftp localhost
-tftp> get FreeBSD/install/boot/pxeboot
-Received 264951 bytes in 0.1 seconds
-
-
-
- Edit ${NFSROOTDIR}/etc/fstab and
- create an entry to mount the root file system over
- NFS:
-
- # Device Mountpoint FSType Options Dump Pass
-myhost.example.com:/b/tftpboot/FreeBSD/install / nfs ro 0 0
-
- Replace myhost.example.com
- with the hostname or IP address of the
- NFS server. In this example, the root
- file system is mounted read-only in order to prevent
- NFS clients from potentially deleting
- the contents of the root file system.
-
-
-
- Set the root password in the &man.chroot.8;
- environment:
-
- &prompt.root; chroot ${NFSROOTDIR}
-&prompt.root; passwd
-
- This sets the root password for client machines which
- are PXE booting.
-
-
-
- Enable &man.ssh.1; root logins for client machines
- which are PXE booting by editing
- ${NFSROOTDIR}/etc/ssh/sshd_config
- and enabling PermitRootLogin. This
- option is documented in &man.sshd.config.5;.
-
-
-
- Perform other customizations of the &man.chroot.8;
- environment in ${NFSROOTDIR}. These customizations could
- include things like adding packages with &man.pkg.add.1;,
- editing the password file with &man.vipw.8;, or editing
- &man.amd.conf.5; maps for automounting. For
- example:
-
- &prompt.root; chroot ${NFSROOTDIR}
-&prompt.root; pkg_add -r bash
-
-
-
-
Configuring Memory File Systems Used by
/etc/rc.initdiskless
From owner-svn-doc-all@FreeBSD.ORG Wed Mar 5 17:26:02 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id C7874D2B;
Wed, 5 Mar 2014 17:26:02 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id A77F73B0;
Wed, 5 Mar 2014 17:26:02 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s25HQ2O0010891;
Wed, 5 Mar 2014 17:26:02 GMT (envelope-from dru@svn.freebsd.org)
Received: (from dru@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s25HQ2nJ010890;
Wed, 5 Mar 2014 17:26:02 GMT (envelope-from dru@svn.freebsd.org)
Message-Id: <201403051726.s25HQ2nJ010890@svn.freebsd.org>
From: Dru Lavigne
Date: Wed, 5 Mar 2014 17:26:02 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44132 -
head/en_US.ISO8859-1/books/handbook/advanced-networking
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 05 Mar 2014 17:26:02 -0000
Author: dru
Date: Wed Mar 5 17:26:02 2014
New Revision: 44132
URL: http://svnweb.freebsd.org/changeset/doc/44132
Log:
Clarify introduction.
Sponsored by: iXsystems
Modified:
head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml Wed Mar 5 16:29:37 2014 (r44131)
+++ head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml Wed Mar 5 17:26:02 2014 (r44132)
@@ -3855,146 +3855,62 @@ ifconfig_lagg0="laggp
diskless operation
- A &os; machine can boot over the network and operate
- without a local disk, using file systems mounted from an
- NFS server. No system modification is
- necessary, beyond standard configuration files. Such a system
- is relatively easy to set up because all the necessary elements
- are readily available:
-
-
- The &intel; Preboot eXecution Environment
- (PXE) can be used to load the kernel over
- the network. It provides a form of smart boot
- ROM built into some networking cards or
- motherboards. See &man.pxeboot.8; for more details.
-
-
-
- A sample script
- (/usr/share/examples/diskless/clone_root)
- eases the creation and maintenance of the workstation's root
- file system on the server. The script will probably require
- a little customization.
-
-
-
- Standard system startup files exist in
- /etc to detect and support a diskless
- system startup.
-
-
-
- Swapping, if needed, can be done either to an
- NFS file or to a local disk.
-
-
-
- To use PXE when the machine starts,
- select the Boot from network option in
- the BIOS setup or type a function key
- during system initialization.
-
- There are many ways to set up diskless workstations. Many
- elements are involved, and most can be customized to suit local
- taste. The following will describe variations on the setup of a
- complete system, emphasizing simplicity and compatibility with
- the standard &os; startup scripts. The system described has
- the following characteristics:
-
-
-
- The diskless workstations use a shared, read-only
- / and
- /usr.
-
-
-
- The root file system is a copy of a standard &os; root,
- with some configuration files overridden by ones specific to
- diskless operation or, possibly, to the workstation they
- belong to.
-
-
-
- The parts of the root which have to be writable are
- overlaid with &man.md.4; file systems. Any changes will be
- lost when the system reboots.
-
-
-
-
- As described, this system is insecure. It should live in
- a protected area of a network and be untrusted by other
- hosts.
-
-
-
- Background Information
+ (PXE) allows an operating system to boot
+ over the network. For example, a &os; system can boot over the network and operate
+ without a local disk, using file systems mounted from an
+ NFS server. PXE support is usually
+ available in the BIOS. To use
+ PXE when the machine starts,
+ select the Boot from network option in
+ the BIOS setup or type a function key
+ during system initialization.
- When setting up diskless workstations, several operations
- need to be performed for a successful
- bootstrap:
+ In order to provide the files needed for an operating system
+ to boot over the network, a
+ PXE setup also requires properly configured
+ DHCP, TFTP, and NFS
+ servers, where:
- The machine needs to obtain initial parameters such as
- its IP address, executable filename,
- server name, and root path. This is done using the
- DHCP or BOOTP
- protocols. DHCP is a compatible
- extension of BOOTP, and uses the same
- port numbers and basic packet format. It is possible to
- configure a system to use only BOOTP
- and &man.bootpd.8; is included in the base &os;
- system.
-
- DHCP has a number of advantages
- over BOOTP such as nicer configuration
- files and support for PXE. This
- section describes mainly a DHCP
- configuration, with equivalent examples using
- &man.bootpd.8; when possible. The sample configuration
- uses ISC DHCP which is
- available in the Ports Collection.
-
+ Initial parameters, such as an
+ IP address, executable boot filename and location,
+ server name, and root path are obtained from the
+ DHCP server.
+
- The machine needs to boot the loader using
+ The operating system loader file is booted using
TFTP.
- The root filesystem needs to be loaded using
+ The file systems are loaded using
NFS.
-
-
- The possible intermediate bootstrap programs and the
- kernel need to be initialized and executed.
- PXE loads &man.pxeboot.8;, which is
- a modified version of the &os; third stage loader,
- &man.loader.8;. The third stage loader will obtain most
- parameters necessary to system startup and leave them
- in the kernel environment before transferring control.
- It is possible to use a GENERIC
- kernel in this case.
-
-
-
- Finally, the machine needs to access its file systems
- using NFS.
-
- Place tftpboot
- anywhere on the server. Make sure that the location is
- set in both /etc/inetd.conf and
- /usr/local/etc/dhcpd.conf.
+ When a computer PXE boots, it receives information over
+ DHCP about where to obtain the initial boot
+ loader file. After the host computer
+ receives this information, it downloads the boot loader via
+ TFTP and then executes the boot loader.
+ In &os;, the boot loader file is
+ /boot/pxeboot. After
+ /boot/pxeboot executes, the &os; kernel is
+ loaded and the rest of the &os; bootup sequence proceeds, as described in
+ .
- Refer to &man.diskless.8; for more information.
-
+ This section describes how to configure these services
+ on a &os; system so that other systems can
+ PXE boot into &os;. Refer to &man.diskless.8; for more information.
+
+
+ As described, the system providing these services is insecure. It should live in
+ a protected area of a network and be untrusted by other
+ hosts.
+
@@ -4015,32 +3931,6 @@ ifconfig_lagg0="laggp
- The &intel; Preboot eXecution Environment
- (PXE) allows booting the operating system
- over the network. PXE support is usually
- provided in the BIOS where it can be enabled
- in the BIOS settings which enable booting
- from the network. A fully functioning
- PXE setup also requires properly configured
- DHCP and TFTP
- servers.
-
- When the host computer boots, it receives information over
- DHCP about where to obtain the initial boot
- loader via TFTP. After the host computer
- receives this information, it downloads the boot loader via
- TFTP and then executes the boot loader.
- This is documented in section 2.2.1 of the Preboot
- Execution Environment (PXE)
- Specification. In &os;, the boot loader retrieved
- during the PXE process is
- /boot/pxeboot. After
- /boot/pxeboot executes, the &os; kernel is
- loaded and the rest of the &os; bootup sequence proceeds.
- Refer to for more information about the
- &os; booting process.
-
Choose a directory which will have a &os;
@@ -4051,6 +3941,11 @@ ifconfig_lagg0="laggp
&prompt.root; export NFSROOTDIR=/b/tftpboot/FreeBSD/install
&prompt.root; mkdir -p ${NFSROOTDIR}
+
+ Place tftpboot
+ anywhere on the server. Make sure that the location is
+ set in both /etc/inetd.conf and
+ /usr/local/etc/dhcpd.conf.
From owner-svn-doc-all@FreeBSD.ORG Wed Mar 5 18:10:33 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 652F1AAE;
Wed, 5 Mar 2014 18:10:33 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id F3305A8E;
Wed, 5 Mar 2014 18:10:32 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s25IAWjs028447;
Wed, 5 Mar 2014 18:10:32 GMT (envelope-from gabor@svn.freebsd.org)
Received: (from gabor@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s25IAWmI028446;
Wed, 5 Mar 2014 18:10:32 GMT (envelope-from gabor@svn.freebsd.org)
Message-Id: <201403051810.s25IAWmI028446@svn.freebsd.org>
From: Gabor Kovesdan
Date: Wed, 5 Mar 2014 18:10:32 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44133 - head/share/xml
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 05 Mar 2014 18:10:33 -0000
Author: gabor
Date: Wed Mar 5 18:10:32 2014
New Revision: 44133
URL: http://svnweb.freebsd.org/changeset/doc/44133
Log:
- Rewrite text wrapping for HTML line numbering so that empty lines
are not lost
Reported by: wblock
Modified:
head/share/xml/freebsd-xhtml-common.xsl
Modified: head/share/xml/freebsd-xhtml-common.xsl
==============================================================================
--- head/share/xml/freebsd-xhtml-common.xsl Wed Mar 5 17:26:02 2014 (r44132)
+++ head/share/xml/freebsd-xhtml-common.xsl Wed Mar 5 18:10:32 2014 (r44133)
@@ -298,9 +298,27 @@
-
-
-
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Configuring the PXE Client and
From owner-svn-doc-all@FreeBSD.ORG Wed Mar 5 18:57:16 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 576D6251;
Wed, 5 Mar 2014 18:57:16 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 37899E8A;
Wed, 5 Mar 2014 18:57:16 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s25IvGDS048985;
Wed, 5 Mar 2014 18:57:16 GMT (envelope-from dru@svn.freebsd.org)
Received: (from dru@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s25IvGeB048984;
Wed, 5 Mar 2014 18:57:16 GMT (envelope-from dru@svn.freebsd.org)
Message-Id: <201403051857.s25IvGeB048984@svn.freebsd.org>
From: Dru Lavigne
Date: Wed, 5 Mar 2014 18:57:16 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44135 -
head/en_US.ISO8859-1/books/handbook/advanced-networking
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 05 Mar 2014 18:57:16 -0000
Author: dru
Date: Wed Mar 5 18:57:15 2014
New Revision: 44135
URL: http://svnweb.freebsd.org/changeset/doc/44135
Log:
Editorial pass through Configuring DHCP section.
Sponsored by: iXsystems
Modified:
head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml Wed Mar 5 18:27:36 2014 (r44134)
+++ head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml Wed Mar 5 18:57:15 2014 (r44135)
@@ -4098,36 +4098,23 @@ Received 264951 bytes in 0.1 secondsdiskless operation
- PXE requires a TFTP
- and a DHCP server to be set up. The
+ The
DHCP server does not need to be the same
- machine as the TFTP server, but it needs
+ machine as the TFTP and NFS server, but it needs
to be accessible in the network.
- The ISC DHCP server can
- answer both BOOTP and
- DHCP requests.
-
- ISC DHCP is not part of the
- base system. Install the
+ DHCP is not part of the &os;
+ base system but can be installed using the
net/isc-dhcp42-server port or
- package, following the instructions documented at . Make sure that
- /etc/rc.conf and
- /usr/local/etc/dhcpd.conf are
- correctly configured..
+ package.
- Once ISC DHCP is installed,
- edit its configuration file,
+ Once installed,
+ edit the configuration file,
/usr/local/etc/dhcpd.conf. Configure
the next-server,
filename, and
- option root-path settings to specify
- the TFTP server IP
- address, the path to /boot/pxeboot
- in TFTP, and the path to the
- NFS root file system. Here is a sample
- dhcpd.conf setup:
+ root-path settings as seen in this
+ example:subnet 192.168.0.0 netmask 255.255.255.0 {
range 192.168.0.2 192.168.0.3 ;
@@ -4138,14 +4125,13 @@ Received 264951 bytes in 0.1 seconds192.168.0.1 ;
- # path of boot loader obtained
- # via tftp
- filename "FreeBSD/install/boot/pxeboot" ;
+ # path of boot loader obtained via tftp
+ filename "FreeBSD/install/boot/pxeboot" ;
# pxeboot boot loader will try to NFS mount this directory for root FS
- option root-path "192.168.0.1:/b/tftpboot/FreeBSD/install/" ;
+ option root-path "192.168.0.1:/b/tftpboot/FreeBSD/install/" ;
}
@@ -4160,37 +4146,29 @@ Received 264951 bytes in 0.1 secondshost declarations.
-->
- The next-server directive
- designates the TFTP or
- NFS server to use for loading
- &man.loader.8; or the kernel file. The default is to
- use the same host as the DHCP
+ The next-server directive is used
+ to specify the IP address of the
+ TFTP
server.The filename directive defines
- the file that PXE will load for the
- next execution step. It must be specified according
- to the transfer method used.
- PXE uses TFTP,
- which is why a relative filename is used here. Also,
- PXE loads
- pxeboot, not the kernel. There are
- other interesting possibilities, like loading
- pxeboot from a &os; CD-ROM
- /boot directory.
- Since &man.pxeboot.8; can load a
- GENERIC kernel, it is possible to
- use PXE to boot from a remote
- CD-ROM.
+ the path to /boot/pxeboot. A
+ relative filename is used, meaning that
+ /b/tftpboot is not included in the
+ path.The root-path option defines
- the path to the root file system, in usual
- NFS notation. When using
- PXE, it is possible to leave off the
- host's IP address as long as the
- BOOTP kernel option is not enabled.
- The NFS server will then be the
- same as the TFTP one.
+ the path to the NFS root file system.
+
+ Once the edits are saved, enable
+ NFS at boot time by adding the
+ following line to /etc/rc.conf:
+
+ dhcpd_enable="YES"
+
+ Then, start the DHCP service:
+
+ &prompt.root; service isc-dhcpd start
- Configuring the PXE Client and
- Debugging Connection Problems
+ Debugging PXE Problems
+ Once all of the services are configured and started,
+ PXE clients should be able to
+ automatically load &os; over the network. If a particular
+ client is unable to connect,
+ when that client machine boots up, enter the
+ BIOS configuration menu and confirm
+ that it is set to boot from the network.
+
+ This section describes some troubleshooting tips
+ for isolating the source of the configuration problem should no
+ clients be able to PXE boot.
+
- When the client machine boots up, enter the
- BIOS configuration menu. Configure the
- BIOS to boot from the network. If all
- previous configuration steps are correct, everything
- should "just work".
-
-
- Use the net/wireshark package or
port to debug the network traffic involved during the
- PXE booting process, as illustrated
- in the diagram below. In , an example
- configuration is shown where the DHCP,
- TFTP, and NFS
- servers are on the same machine. However, these
- servers can be on separate machines.
+ PXE booting process, which is illustrated
+ in the diagram below.
From owner-svn-doc-all@FreeBSD.ORG Wed Mar 5 19:33:39 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id A65413C3;
Wed, 5 Mar 2014 19:33:39 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 935B42F0;
Wed, 5 Mar 2014 19:33:39 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s25JXd2r065271;
Wed, 5 Mar 2014 19:33:39 GMT (envelope-from dim@svn.freebsd.org)
Received: (from dim@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s25JXdSh065270;
Wed, 5 Mar 2014 19:33:39 GMT (envelope-from dim@svn.freebsd.org)
Message-Id: <201403051933.s25JXdSh065270@svn.freebsd.org>
From: Dimitry Andric
Date: Wed, 5 Mar 2014 19:33:39 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44137 - head/en_US.ISO8859-1/books/porters-handbook
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 05 Mar 2014 19:33:39 -0000
Author: dim (src committer)
Date: Wed Mar 5 19:33:39 2014
New Revision: 44137
URL: http://svnweb.freebsd.org/changeset/doc/44137
Log:
Document __FreeBSD_version values 902507 and 1000703.
Modified:
head/en_US.ISO8859-1/books/porters-handbook/versions.xml
Modified: head/en_US.ISO8859-1/books/porters-handbook/versions.xml
==============================================================================
--- head/en_US.ISO8859-1/books/porters-handbook/versions.xml Wed Mar 5 19:27:42 2014 (r44136)
+++ head/en_US.ISO8859-1/books/porters-handbook/versions.xml Wed Mar 5 19:33:39 2014 (r44137)
@@ -4347,6 +4347,13 @@ it was never committed:
+ 902507
+ March 5, 2014
+ 9-STABLE after upgrade of libc++ to 3.4 release
+ (rev 262801).
+
+
+1000000September 26, 201110.0-CURRENT.
@@ -4914,6 +4921,13 @@ it was never committed:
+ 1000703
+ March 5, 2014
+ 10-STABLE after upgrade of libc++ to 3.4 release
+ (rev 262801).
+
+
+1100000October 10, 201311.0-CURRENT
From owner-svn-doc-all@FreeBSD.ORG Wed Mar 5 20:11:16 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id BB94F614;
Wed, 5 Mar 2014 20:11:16 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id A68EC913;
Wed, 5 Mar 2014 20:11:16 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s25KBGTU081019;
Wed, 5 Mar 2014 20:11:16 GMT (envelope-from dru@svn.freebsd.org)
Received: (from dru@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s25KBGSW081018;
Wed, 5 Mar 2014 20:11:16 GMT (envelope-from dru@svn.freebsd.org)
Message-Id: <201403052011.s25KBGSW081018@svn.freebsd.org>
From: Dru Lavigne
Date: Wed, 5 Mar 2014 20:11:16 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44138 -
head/en_US.ISO8859-1/books/handbook/advanced-networking
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 05 Mar 2014 20:11:16 -0000
Author: dru
Date: Wed Mar 5 20:11:16 2014
New Revision: 44138
URL: http://svnweb.freebsd.org/changeset/doc/44138
Log:
White space fix only. Translators can ignore.
Sponsored by: iXsystems
Modified:
head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml Wed Mar 5 19:33:39 2014 (r44137)
+++ head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml Wed Mar 5 20:11:16 2014 (r44138)
@@ -37,7 +37,8 @@
- How to set up network PXE booting.
+ How to set up network PXE
+ booting.
@@ -3856,60 +3857,61 @@ ifconfig_lagg0="laggp
The &intel; Preboot eXecution Environment
- (PXE) allows an operating system to boot
- over the network. For example, a &os; system can boot over the network and operate
- without a local disk, using file systems mounted from an
- NFS server. PXE support is usually
- available in the BIOS. To use
- PXE when the machine starts,
- select the Boot from network option in
- the BIOS setup or type a function key
- during system initialization.
+ (PXE) allows an operating system to boot over
+ the network. For example, a &os; system can boot over the
+ network and operate without a local disk, using file systems
+ mounted from an NFS server.
+ PXE support is usually available in the
+ BIOS. To use PXE when the
+ machine starts, select the Boot from network
+ option in the BIOS setup or type a function
+ key during system initialization.
In order to provide the files needed for an operating system
- to boot over the network, a
- PXE setup also requires properly configured
- DHCP, TFTP, and NFS
- servers, where:
+ to boot over the network, a PXE setup also
+ requires properly configured DHCP,
+ TFTP, and NFS servers,
+ where:
-
-
- Initial parameters, such as an
- IP address, executable boot filename and location,
- server name, and root path are obtained from the
- DHCP server.
-
+
+
+ Initial parameters, such as an IP
+ address, executable boot filename and location, server name,
+ and root path are obtained from the
+ DHCP server.
+
-
- The operating system loader file is booted using
- TFTP.
-
+
+ The operating system loader file is booted using
+ TFTP.
+
-
- The file systems are loaded using
- NFS.
-
-
+
+ The file systems are loaded using
+ NFS.
+
+
- When a computer PXE boots, it receives information over
- DHCP about where to obtain the initial boot
- loader file. After the host computer
- receives this information, it downloads the boot loader via
- TFTP and then executes the boot loader.
- In &os;, the boot loader file is
+ When a computer PXE boots, it receives
+ information over DHCP about where to obtain
+ the initial boot loader file. After the host computer receives
+ this information, it downloads the boot loader via
+ TFTP and then executes the boot loader. In
+ &os;, the boot loader file is
/boot/pxeboot. After
/boot/pxeboot executes, the &os; kernel is
- loaded and the rest of the &os; bootup sequence proceeds, as described in
- .
+ loaded and the rest of the &os; bootup sequence proceeds, as
+ described in .
- This section describes how to configure these services
- on a &os; system so that other systems can
- PXE boot into &os;. Refer to &man.diskless.8; for more information.
-
-
- As described, the system providing these services is insecure. It should live in
- a protected area of a network and be untrusted by other
- hosts.
+ This section describes how to configure these services on a
+ &os; system so that other systems can PXE
+ boot into &os;. Refer to &man.diskless.8; for more
+ information.
+
+
+ As described, the system providing these services is
+ insecure. It should live in a protected area of a network and
+ be untrusted by other hosts.
@@ -3930,35 +3932,37 @@ ifconfig_lagg0="laggp
- The steps shown in this section configure the built-in
- NFS and TFTP servers. The
- next section demonstrates how to install and configure the
- DHCP server. In this example, the
- directory which will contain the files used by PXE users is
- /b/tftpboot/FreeBSD/install. It is
- important that this directory exists and that the same directory
- name is set in both /etc/inetd.conf and
- /usr/local/etc/dhcpd.conf.
+ The steps shown in this section configure the built-in
+ NFS and TFTP servers.
+ The next section demonstrates how to install and configure the
+ DHCP server. In this example, the
+ directory which will contain the files used by
+ PXE users is
+ /b/tftpboot/FreeBSD/install. It is
+ important that this directory exists and that the same
+ directory name is set in both
+ /etc/inetd.conf and
+ /usr/local/etc/dhcpd.conf.
- Create the root directory which will contain a &os; installation
- to be NFS mounted:
+ Create the root directory which will contain a &os;
+ installation to be NFS mounted:&prompt.root; export NFSROOTDIR=/b/tftpboot/FreeBSD/install
&prompt.root; mkdir -p ${NFSROOTDIR}
- Enable the NFS server by adding this line to
- /etc/rc.conf:
-
+ Enable the NFS server by adding
+ this line to /etc/rc.conf:
+
nfs_server_enable="YES"
- Export the diskless root directory via NFS by
- adding the following to
+ Export the diskless root directory via
+ NFS by adding the following to
/etc/exports:/b -ro -alldirs
@@ -3984,14 +3988,13 @@ ifconfig_lagg0="laggp
tftp dgram udp wait root /usr/libexec/tftpd tftpd -l -s /b/tftpboot
-
- Some
- PXE versions require the
- TCP version of
- TFTP. In this case, uncomment the second
- tftp line which contains
- stream tcp.
-
+
+ Some PXE versions require the
+ TCP version of
+ TFTP. In this case, uncomment the
+ second tftp line which contains
+ stream tcp.
+
@@ -4002,7 +4005,8 @@ ifconfig_lagg0="laggp
Rebuild the &os; kernel and userland (refer to for more detailed instructions):
+ linkend="makeworld"/> for more detailed
+ instructions):
&prompt.root; cd /usr/src
&prompt.root; make buildworld
@@ -4019,9 +4023,9 @@ ifconfig_lagg0="laggp
- Test that the TFTP server works
- and can download the boot loader which will be obtained
- via PXE:
+ Test that the TFTP server works and
+ can download the boot loader which will be obtained via
+ PXE:&prompt.root; tftp localhost
tftp> get FreeBSD/install/boot/pxeboot
@@ -4046,26 +4050,28 @@ Received 264951 bytes in 0.1 seconds
Set the root password in the PXE
- environment for client machines which
- are PXE booting :
+ environment for client machines which are
+ PXE booting :
&prompt.root; chroot ${NFSROOTDIR}
&prompt.root; passwd
- If needed, enable &man.ssh.1; root logins for client machines
- which are PXE booting by editing
- ${NFSROOTDIR}/etc/ssh/sshd_config
- and enabling PermitRootLogin. This
- option is documented in &man.sshd.config.5;.
+ If needed, enable &man.ssh.1; root logins for client
+ machines which are PXE booting by
+ editing
+ ${NFSROOTDIR}/etc/ssh/sshd_config and
+ enabling PermitRootLogin. This option
+ is documented in &man.sshd.config.5;.
- Perform any other needed customizations of the PXE
- environment in ${NFSROOTDIR}. These customizations could
- include things like installing packages or
- editing the password file with &man.vipw.8;.
+ Perform any other needed customizations of the
+ PXE environment in
+ ${NFSROOTDIR}. These customizations
+ could include things like installing packages or editing
+ the password file with &man.vipw.8;.
@@ -4091,32 +4097,31 @@ Received 264951 bytes in 0.1 seconds
- Configuring the DHCP Server
+ Configuring the DHCP Server
-
- DHCP
- diskless operation
-
+
+ DHCP
+ diskless operation
+
- The
- DHCP server does not need to be the same
- machine as the TFTP and NFS server, but it needs
- to be accessible in the network.
-
- DHCP is not part of the &os;
- base system but can be installed using the
- net/isc-dhcp42-server port or
- package.
-
- Once installed,
- edit the configuration file,
- /usr/local/etc/dhcpd.conf. Configure
- the next-server,
- filename, and
- root-path settings as seen in this
- example:
+ The DHCP server does not need to be the
+ same machine as the TFTP and
+ NFS server, but it needs to be accessible
+ in the network.
+
+ DHCP is not part of the &os; base
+ system but can be installed using the
+ net/isc-dhcp42-server port or
+ package.
+
+ Once installed, edit the configuration file,
+ /usr/local/etc/dhcpd.conf. Configure
+ the next-server,
+ filename, and
+ root-path settings as seen in this
+ example:
- subnet 192.168.0.0 netmask 255.255.255.0 {
+ subnet 192.168.0.0 netmask 255.255.255.0 {
range 192.168.0.2 192.168.0.3 ;
option subnet-mask 255.255.255.0 ;
option routers 192.168.0.1 ;
@@ -4146,30 +4151,28 @@ Received 264951 bytes in 0.1 secondshost declarations.
-->
- The next-server directive is used
- to specify the IP address of the
- TFTP
- server.
-
- The filename directive defines
- the path to /boot/pxeboot. A
- relative filename is used, meaning that
- /b/tftpboot is not included in the
- path.
-
- The root-path option defines
- the path to the NFS root file system.
-
- Once the edits are saved, enable
- NFS at boot time by adding the
- following line to /etc/rc.conf:
-
- dhcpd_enable="YES"
-
- Then, start the DHCP service:
-
- &prompt.root; service isc-dhcpd start
-
+ The next-server directive is used to
+ specify the IP address of the
+ TFTP server.
+
+ The filename directive defines the path
+ to /boot/pxeboot. A relative filename is
+ used, meaning that /b/tftpboot is not
+ included in the path.
+
+ The root-path option defines the path
+ to the NFS root file system.
+
+ Once the edits are saved, enable NFS at
+ boot time by adding the following line to
+ /etc/rc.conf:
+
+ dhcpd_enable="YES"
+
+ Then, start the DHCP service:
+
+ &prompt.root; service isc-dhcpd start
+ dual homed hosts
@@ -440,10 +463,6 @@ host2.example.com link#1 UC
For this machine to forward packets between the two
interfaces, &os; must be configured as a router, as
demonstrated in the next section.
-
-
-
- Building a Routerrouter
@@ -482,26 +501,6 @@ host2.example.com link#1 UC
sophisticated routing protocols is available with the
net/zebra package or
port.
-
-
-
-
- Setting Up Static Routes
-
-
-
-
- Al
- Hoang
-
- Contributed by
-
-
-
-
-
-
- Manual ConfigurationConsider the following network:
@@ -575,7 +574,6 @@ default 10.0.0.1 UG
on the 192.168.2.0/24
network.
- Persistent Configuration
From owner-svn-doc-all@FreeBSD.ORG Wed Mar 5 22:34:27 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 4E5C8589;
Wed, 5 Mar 2014 22:34:27 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 2E459861;
Wed, 5 Mar 2014 22:34:27 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s25MYRm7040288;
Wed, 5 Mar 2014 22:34:27 GMT (envelope-from dru@svn.freebsd.org)
Received: (from dru@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s25MYRaD040287;
Wed, 5 Mar 2014 22:34:27 GMT (envelope-from dru@svn.freebsd.org)
Message-Id: <201403052234.s25MYRaD040287@svn.freebsd.org>
From: Dru Lavigne
Date: Wed, 5 Mar 2014 22:34:27 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44142 -
head/en_US.ISO8859-1/books/handbook/advanced-networking
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 05 Mar 2014 22:34:27 -0000
Author: dru
Date: Wed Mar 5 22:34:26 2014
New Revision: 44142
URL: http://svnweb.freebsd.org/changeset/doc/44142
Log:
Editorial pass through Routing Basics.
Add name to table.
Sponsored by: iXsystems
Modified:
head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml Wed Mar 5 21:39:21 2014 (r44141)
+++ head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml Wed Mar 5 22:34:26 2014 (r44142)
@@ -132,7 +132,7 @@ Routing tables
Internet:
Destination Gateway Flags Refs Use Netif Expire
-default outside-gw UGSc 37 418 em0
+default outside-gw UGS 37 418 em0
localhost localhost UH 0 181 lo0
test0 0:e0:b5:36:cf:4f UHLW 5 63288 re0 77
10.20.30.255 link#1 UHLW 1 2421
@@ -148,33 +148,37 @@ host2.example.com link#1 UC
default
- The first line specifies the
+ The first route in this table specifies the default
route. When the local system needs to make a connection to a
remote host, it checks the routing table to determine if a
- known path exists. If the remote host falls into a subnet
- that it knows how to reach, the system checks to see if it
- can connect using that interface.
-
- If all known paths fail, the system has one last option:
- the default route. This route is a special
- type of gateway route (usually the only one present in the
- system), and is always marked with a c in
- the flags field. For hosts on a local area network, this
- gateway is set to the system which has a direct connection to
- the Internet.
+ known path exists. If the remote host matches an entry in the
+ table, the system checks to see if it
+ can connect using the interface specified in that entry.
+
+ If the destination does not match an entry, or if all known
+ paths fail, the system uses the entry for the
+ default route. For hosts on a local area network, the
+ Gateway field in the default route is set
+ to the system which has a direct connection to
+ the Internet. When reading this entry, verify that the
+ Flags column indicates that the gateway is
+ usable (UG).
+ The default route for a machine which itself is
+ functioning as the gateway to the outside world will be the
+ gateway machine at the Internet Service Provider
+ (ISP).localhost
- The second line is the localhost route.
- The interface (Netif column) that this
- routing table specifies to use for
- localhost is lo0,
- also known as the loopback device. This says to keep all
- traffic for this destination internal, rather than sending it
+ The second route is the localhost route.
+ The interface specified in the Netif column
+ for localhost is lo0,
+ also known as the loopback device. This indicates that all
+ traffic for this destination should be internal, rather than sending it
out over the network.
@@ -201,8 +205,8 @@ host2.example.com link#1 UC
subnet
- &os; will add subnet routes for the local subnet.
- 10.20.30.255 is the
+ &os; will automatically add subnet routes for the local subnet.
+ In this example, 10.20.30.255 is the
broadcast address for the subnet 10.20.30 and example.com is the domain
@@ -231,7 +235,7 @@ host2.example.com link#1 UC
=> symbol after the
lo0 interface says that an alias has been
set in addition to the loopback address. Such routes only
- show up on the host that supports the alias; all other hosts
+ show up on the host that supports the alias and all other hosts
on the local network will have a
link#1 line for such routes.
@@ -248,177 +252,80 @@ host2.example.com link#1 UC
Various attributes of each route can be seen in
- the Flags column. Below is a short table
- of some of these flags and their meanings:
+ the Flags column.
+ summarizes some of these flags and their meanings:
+
+
+ Commonly Seen Routing Table Flags
-
-
-
+
+
+ Command
+ Purpose
+
+
U
- Up: The route is active.
+ The route is active (up).H
- Host: The route destination is a single
+ The route destination is a single
host.G
- Gateway: Send anything for this destination on to
- this remote system, which will figure out from there
+ Send anything for this destination on to
+ this gateway, which will figure out from there
where to send it.S
- Static: This route was configured manually, not
- automatically generated by the system.
+ This route was statically configured.C
- Clone: Generates a new route based upon this
+ Clones a new route based upon this
route for machines to connect to. This type of route
is normally used for local networks.W
- WasCloned: Indicated a route that was
+ The route was
auto-configured based upon a local area network
- (Clone) route.
+ (clone) route.L
- Link: Route involves references to Ethernet
+ Route involves references to Ethernet (link)
hardware.
-
-
- The default route for a machine which itself is
- functioning as the gateway to the outside world, will be the
- gateway machine at the Internet Service Provider
- (ISP).
-
- This example is a common configuration for a default
- route:
-
-
-
-
-
-
-
-
-[Local2] <--ether--> [Local1] <--PPP--> [ISP-Serv] <--ether--> [T1-GW]
-
-
-
- The hosts Local1 and
- Local2 are on the local network.
- Local1 is connected to an
- ISP using a
- PPP connection. This
- PPP server is connected through a local
- area network to another gateway computer through an external
- interface to the ISP.
-
- The default routes for each machine will be:
-
-
-
-
-
- Host
- Default Gateway
- Interface
-
-
-
-
-
- Local2
- Local1
- Ethernet
-
-
-
- Local1
- T1-GW
- PPP
-
-
-
-
-
- A common question is Why is
- T1-GW configured as the default
- gateway for Local1, rather than the
- ISP server it is connected
- to?.
-
- Since the PPP interface is using an
- address on the ISP's local network for the
- local side of the connection, routes for any other machines on
- the ISP's local network will be
- automatically generated. The system already knows how to
- reach the T1-GW machine, so there is
- no need for the intermediate step of sending traffic to the
- ISP's server.
-
- It is common to use the address X.X.X.1 as the gateway
- address for the local network. So, if the local class C
- address space is 10.20.30 and the
- ISP is using 10.9.9, the default routes
- would be:
-
-
-
-
-
- Host
- Default Route
-
-
-
-
- Local2 (10.20.30.2)
- Local1 (10.20.30.1)
-
-
-
- Local1 (10.20.30.1, 10.9.9.30)
- T1-GW (10.9.9.1)
-
-
-
-
+
- The default route can be easily defined in
- /etc/rc.conf. In this example, on
- Local2, add the following line to
- /etc/rc.conf:
+ On a &os; system, the default route can defined in
+ /etc/rc.conf by specifying the
+ IP address of the default gateway:defaultrouter="10.20.30.1"
- It is also possible to add the route directly using
- &man.route.8;:
+ It is also possible to manually add the route using
+ route:&prompt.root; route add default 10.20.30.1
- For more information on manual manipulation of network
+ Note that manually added routes will not survive a reboot.
+ For more information on manual manipulation of network
routing tables, refer to &man.route.8;.
From owner-svn-doc-all@FreeBSD.ORG Thu Mar 6 02:08:28 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 036346DD;
Thu, 6 Mar 2014 02:08:28 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id E3B2BBDF;
Thu, 6 Mar 2014 02:08:27 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s2628RqQ026166;
Thu, 6 Mar 2014 02:08:27 GMT (envelope-from dru@svn.freebsd.org)
Received: (from dru@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s2628R65026165;
Thu, 6 Mar 2014 02:08:27 GMT (envelope-from dru@svn.freebsd.org)
Message-Id: <201403060208.s2628R65026165@svn.freebsd.org>
From: Dru Lavigne
Date: Thu, 6 Mar 2014 02:08:27 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44143 -
head/en_US.ISO8859-1/books/handbook/advanced-networking
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Thu, 06 Mar 2014 02:08:28 -0000
Author: dru
Date: Thu Mar 6 02:08:27 2014
New Revision: 44143
URL: http://svnweb.freebsd.org/changeset/doc/44143
Log:
Finish editorial pass through Routing chapter.
The section on Multicast needs more content and a working
example.
Sponsored by: iXsystems
Modified:
head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml Wed Mar 5 22:34:26 2014 (r44142)
+++ head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml Thu Mar 6 02:08:27 2014 (r44143)
@@ -349,44 +349,30 @@ host2.example.com link#1 UC
dual homed hosts
- A dual-homed system is a host which resides on two
- different networks.
-
- The dual-homed machine might have two Ethernet cards, each
- having an address on a separate subnet. Alternately, the
- machine can have one Ethernet card and uses &man.ifconfig.8;
- aliasing. The former is used if two physically separate
- Ethernet networks are in use and the latter if there is one
- physical network segment, but two logically separate
- subnets.
-
- Either way, routing tables are set up so that each subnet
- knows that this machine is the defined gateway (inbound route)
- to the other subnet. This configuration, with the machine
- acting as a router between the two subnets, is often used
- to implement packet filtering or firewall security in
- either or both directions.
-
- For this machine to forward packets between the two
- interfaces, &os; must be configured as a router, as
- demonstrated in the next section.
+ A &os; system can be configured as the default gateway, or
+ router, for a network if it is a dual-homed system. A
+ dual-homed system is a host which resides on at least two
+ different networks. Typically, each network is connected to a separate
+ network interface, though IP aliasing can
+ be used to bind multiple addresses, each on a different
+ subnet, to one physical interface.router
- A network router is a system that forwards packets from
- one interface to another. Internet standards and good
+ In order for the system to forward packets between
+ interfaces, &os; must be configured as a router. Internet standards and good
engineering practice prevent the &os; Project from enabling
- this by default in &os;. This feature can be enabled by
- changing the following variable to YES in
- &man.rc.conf.5;:
+ this feature by default, but it can be configured to start at boot
+ by adding this line to
+ /etc/rc.conf:gateway_enable="YES" # Set to YES if this host will be a gateway
- This option will set the &man.sysctl.8; variable
+ To enable routing now, set the &man.sysctl.8; variable
net.inet.ip.forwarding to
- 1. To stop routing, reset this to
+ 1. To stop routing, reset this variable to
0.
@@ -399,15 +385,24 @@ host2.example.com link#1 UC
OSPF
- The new router will need routes to know where to send the
- traffic. If the network is simple enough, static routes can
- be used. &os; comes with the standard BSD routing daemon
- &man.routed.8;, which speaks RIP versions
- 1 and 2, and IRDP. Support for
- BGPv4, OSPFv2, and other
- sophisticated routing protocols is available with the
+ The routing table of a router needs additional routes so
+ it knows how to reach other networks. Routes can be either
+ added manually using
+ static routes or routes can be automatically learned using a routing protocol.
+ Static routes are appropriate for small networks and this
+ section describes how to add a static routing entry for a
+ small network.
+
+
+ For large networks, static routes quickly become
+ unscalable. &os; comes with the standard BSD routing daemon
+ &man.routed.8;, which provides the routing protocols RIP, versions
+ 1 and 2, and IRDP. Support for the
+ BGP and OSPF
+ routing protocols can be installed using the
net/zebra package or
port.
+ Consider the following network:
@@ -449,12 +444,12 @@ host2.example.com link#1 UC
class="ipaddress">10.0.0.1 which allows it to
connect with the outside world.
RouterB is already configured
- properly as it uses 192.168.1.1 as the
+ to use 192.168.1.1 as its default
gateway.
- The routing table on RouterA
- looks something like this:
+ Before adding any static routes, the routing table on RouterA
+ looks like this:&prompt.user; netstat -nr
Routing tables
@@ -467,45 +462,33 @@ default 10.0.0.1 UG
192.168.1.0/24 link#2 UC 0 0 xl1With the current routing table,
- RouterA cannot reach Internal Net
- 2 as it does not have a route for 192.168.2.0/24. The
- following command adds the Internal Net 2 network to
+ RouterA
+ does not have a route to the 192.168.2.0/24 network. The
+ following command adds the Internal Net 2 network to
RouterA's routing table using
192.168.1.2 as
the next hop:&prompt.root; route add -net 192.168.2.0/24 192.168.1.2
- Now RouterA can reach any hosts
+ Now, RouterA can reach any host
on the 192.168.2.0/24
- network.
-
-
- Persistent Configuration
-
- The above example configures a static route on a
- running system. However, the routing information will not
- persist if the &os; system reboots. Persistent static
- routes can be entered in
+ network. However, the routing information will not
+ persist if the &os; system reboots. If a static route needs
+ to be persistent, add it to
/etc/rc.conf:
- # Add Internal Net 2 as a static route
+ # Add Internal Net 2 as a persistent static route
static_routes="internalnet2"
route_internalnet2="-net 192.168.2.0/24 192.168.1.2"The static_routes configuration
variable is a list of strings separated by a space, where
- each string references a route name. This example only
- has one string in static_routes,
- internalnet2. The variable
+ each string references a route name. The variable
route_internalnet2
- contains all of the configuration parameters to
- &man.route.8;. This example is equivalent to the
- command:
-
- &prompt.root; route add -net 192.168.2.0/24 192.168.1.2
+ contains the static route for that route name.Using more than one string in
static_routes creates multiple static
@@ -518,11 +501,10 @@ route_internalnet2="-net 192.168.2.0/24
static_routes="net1 net2"
route_net1="-net 192.168.0.0/24 192.168.0.1"
route_net2="-net 192.168.1.0/24 192.168.1.1"
-
-
- Routing Propagation
+
+ TroubleshootingWhen an address space is assigned to a network, the
service provider configures their routing tables so that all
@@ -537,38 +519,32 @@ route_net2="-net 192.168.1.0/24 192.168.
backbone machine has a copy of a master set of tables, which
direct traffic for a particular network to a specific
backbone carrier, and from there down the chain of service
- providers until it reaches your network.
+ providers until it reaches a particular network.It is the task of the service provider to advertise to
the backbone sites that they are the point of connection, and
thus the path inward, for a site. This is known as route
propagation.
-
-
-
- Troubleshooting&man.traceroute.8;
- Sometimes, there is a problem with routing propagation
+ Sometimes, there is a problem with route propagation
and some sites are unable to connect. Perhaps the most
useful command for trying to figure out where routing is
- breaking down is &man.traceroute.8;. It is useful when
- &man.ping.8; fails.
+ breaking down is traceroute. It is useful when
+ ping fails.
- When using &man.traceroute.8;, include the name of the
+ When using traceroute, include the address of the
remote host to connect to. The output will show the gateway
hosts along the path of the attempt, eventually either
reaching the target host, or terminating because of a lack of
- connection.
-
- For more information, refer to &man.traceroute.8;.
+ connection. For more information, refer to &man.traceroute.8;.
- Multicast Routing
+ Multicast Considerationsmulticast routing
@@ -580,26 +556,29 @@ route_net2="-net 192.168.1.0/24 192.168.
&os; natively supports both multicast applications and
multicast routing. Multicast applications do not require any
- special configuration of &os;; as applications will generally
- run out of the box. Multicast routing requires that support
+ special configuration in order to
+ run on &os;. Support for multicast routing requires that the
+ following option
be compiled into a custom kernel:options MROUTING
- The multicast routing daemon, &man.mrouted.8;, must be
- configured to set up tunnels and DVMRP via
- /etc/mrouted.conf. More details on
- multicast configuration may be found in
- &man.mrouted.8;.
+ The multicast routing daemon,
+ mrouted can be installed
+ using the net/mrouted package or port.
+ This daemon implements
+ the DVMRP multicast routing protocol and is
+ configured by editing /usr/local/etc/mrouted.conf
+ in order to set up the tunnels and DVMRP.
+ The installation of mrouted also installs
+ map-mbone and
+ mrinfo, as well as their associated
+ man pages. Refer to these for configuration examples.
- The &man.mrouted.8; multicast routing daemon implements
- the DVMRP multicast routing protocol,
- which has largely been replaced by &man.pim.4; in many
- multicast installations. &man.mrouted.8; and the related
- &man.map-mbone.8; and &man.mrinfo.8; utilities are available
- in the &os; Ports Collection as
- net/mrouted.
+ DVMRP has largely been replaced by the
+ PIM protocol in many
+ multicast installations. Refer to &man.pim.4; for more information.
From owner-svn-doc-all@FreeBSD.ORG Thu Mar 6 02:34:18 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 716E6CEC;
Thu, 6 Mar 2014 02:34:18 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 5D3F4E09;
Thu, 6 Mar 2014 02:34:18 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s262YIM2037626;
Thu, 6 Mar 2014 02:34:18 GMT (envelope-from dru@svn.freebsd.org)
Received: (from dru@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s262YI1a037625;
Thu, 6 Mar 2014 02:34:18 GMT (envelope-from dru@svn.freebsd.org)
Message-Id: <201403060234.s262YI1a037625@svn.freebsd.org>
From: Dru Lavigne
Date: Thu, 6 Mar 2014 02:34:18 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44144 -
head/en_US.ISO8859-1/books/handbook/advanced-networking
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Thu, 06 Mar 2014 02:34:18 -0000
Author: dru
Date: Thu Mar 6 02:34:17 2014
New Revision: 44144
URL: http://svnweb.freebsd.org/changeset/doc/44144
Log:
White space fix only. Translators can ignore.
Sponsored by: iXsystems
Modified:
head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml Thu Mar 6 02:08:27 2014 (r44143)
+++ head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml Thu Mar 6 02:34:17 2014 (r44144)
@@ -104,20 +104,19 @@
Routing is the mechanism that allows
- a system to find the network path to another system.
- A route is a
- defined pair of addresses which represent the destination and a
+ a system to find the network path to another system. A
+ route is a defined pair of addresses
+ which represent the destination and a
gateway. The route indicates that when trying
- to get to the specified destination, send the packets
- through the specified gateway. There are three
- types of destinations: individual hosts, subnets, and
- default. The default route is
- used if no other routes apply. There are also three
- types of gateways: individual hosts, interfaces, also called
- links, and Ethernet hardware
+ to get to the specified destination, send the packets through
+ the specified gateway. There are three types of destinations:
+ individual hosts, subnets, and default. The
+ default route is used if no other routes apply.
+ There are also three types of gateways: individual hosts,
+ interfaces, also called links, and Ethernet hardware
(MAC) addresses. Known routes are stored in
a routing table.
-
+
This section provides an overview of routing basics. It
then demonstrates how to configure a &os; system as a router and
offers some troubleshooting tips.
@@ -125,7 +124,8 @@
Routing Basics
- To view the routing table of a &os; system, use &man.netstat.1;:
+ To view the routing table of a &os; system, use
+ &man.netstat.1;:&prompt.user; netstat -r
Routing tables
@@ -148,111 +148,120 @@ host2.example.com link#1 UC
default
- The first route in this table specifies the default
- route. When the local system needs to make a connection to a
- remote host, it checks the routing table to determine if a
- known path exists. If the remote host matches an entry in the
- table, the system checks to see if it
- can connect using the interface specified in that entry.
-
- If the destination does not match an entry, or if all known
- paths fail, the system uses the entry for the
- default route. For hosts on a local area network, the
- Gateway field in the default route is set
- to the system which has a direct connection to
- the Internet. When reading this entry, verify that the
- Flags column indicates that the gateway is
- usable (UG).
-
- The default route for a machine which itself is
- functioning as the gateway to the outside world will be the
- gateway machine at the Internet Service Provider
- (ISP).
-
-
-
-
- localhost
-
- The second route is the localhost route.
- The interface specified in the Netif column
- for localhost is lo0,
- also known as the loopback device. This indicates that all
- traffic for this destination should be internal, rather than sending it
- out over the network.
-
-
+ The first route in this table specifies the
+ default route. When the local system
+ needs to make a connection to a remote host, it checks
+ the routing table to determine if a known path exists.
+ If the remote host matches an entry in the table, the
+ system checks to see if it can connect using the
+ interface specified in that entry.
+
+ If the destination does not match an entry, or if
+ all known paths fail, the system uses the entry for the
+ default route. For hosts on a local area network, the
+ Gateway field in the default route is
+ set to the system which has a direct connection to the
+ Internet. When reading this entry, verify that the
+ Flags column indicates that the
+ gateway is usable (UG).
+
+ The default route for a machine which itself is
+ functioning as the gateway to the outside world will be
+ the gateway machine at the Internet Service Provider
+ (ISP).
+
+
-
- MAC address
-
- The addresses beginning with 0:e0: are MAC
- addresses. &os; will automatically identify any hosts,
- test0 in the example, on the local
- Ethernet and add a route for that host over the Ethernet
- interface, re0. This type of route has a
- timeout, seen in the Expire column, which
- is used if the host does not respond in a specific amount of
- time. When this happens, the route to this host will be
- automatically deleted. These hosts are identified using the
- Routing Information Protocol (RIP), which
- calculates routes to local hosts based upon a shortest path
- determination.
-
-
+
+ localhost
+
+ The second route is the localhost
+ route. The interface specified in the
+ Netif column for
+ localhost is
+ lo0, also known as the loopback
+ device. This indicates that all traffic for this
+ destination should be internal, rather than sending it
+ out over the network.
+
+
-
- subnet
-
- &os; will automatically add subnet routes for the local subnet.
- In this example, 10.20.30.255 is the
- broadcast address for the subnet 10.20.30 and example.com is the domain
- name associated with that subnet. The designation
- link#1 refers to the first Ethernet card in
- the machine.
-
- Local network hosts and local subnets have their routes
- automatically configured by a daemon called &man.routed.8;.
- If it is not running, only routes which are statically defined
- by the administrator will exist.
-
-
+
+ MAC address
+
+ The addresses beginning with 0:e0: are
+ MAC addresses. &os; will
+ automatically identify any hosts,
+ test0 in the example, on the
+ local Ethernet and add a route for that host over the
+ Ethernet interface, re0. This type
+ of route has a timeout, seen in the
+ Expire column, which is used if the
+ host does not respond in a specific amount of time.
+ When this happens, the route to this host will be
+ automatically deleted. These hosts are identified using
+ the Routing Information Protocol
+ (RIP), which calculates routes to
+ local hosts based upon a shortest path
+ determination.
+
+
-
- host
-
- The host1 line refers to the host
- by its Ethernet address. Since it is the sending host, &os;
- knows to use the loopback interface
- (lo0) rather than the Ethernet
- interface.
+
+ subnet
+
+ &os; will automatically add subnet routes for the
+ local subnet. In this example, 10.20.30.255 is the
+ broadcast address for the subnet 10.20.30 and
+ example.com is the
+ domain name associated with that subnet. The
+ designation link#1 refers to the
+ first Ethernet card in the machine.
+
+ Local network hosts and local subnets have their
+ routes automatically configured by a daemon called
+ &man.routed.8;. If it is not running, only routes which
+ are statically defined by the administrator will
+ exist.
+
+
- The two host2 lines represent aliases
- which were created using &man.ifconfig.8;. The
- => symbol after the
- lo0 interface says that an alias has been
- set in addition to the loopback address. Such routes only
- show up on the host that supports the alias and all other hosts
- on the local network will have a
- link#1 line for such routes.
-
-
+
+ host
+
+ The host1 line refers to the host
+ by its Ethernet address. Since it is the sending host,
+ &os; knows to use the loopback interface
+ (lo0) rather than the Ethernet
+ interface.
+
+ The two host2 lines represent
+ aliases which were created using &man.ifconfig.8;. The
+ => symbol after the
+ lo0 interface says that an alias
+ has been set in addition to the loopback address. Such
+ routes only show up on the host that supports the alias
+ and all other hosts on the local network will have a
+ link#1 line for such routes.
+
+
-
- 224
-
- The final line (destination subnet 224) deals with
- multicasting.
-
-
-
+
+ 224
+
+ The final line (destination subnet 224) deals with
+ multicasting.
+
+
+
- Various attributes of each route can be seen in
- the Flags column.
+ Various attributes of each route can be seen in the
+ Flags column.
summarizes some of these flags and their meanings:
@@ -274,15 +283,14 @@ host2.example.com link#1 UC
H
- The route destination is a single
- host.
+ The route destination is a single host.G
- Send anything for this destination on to
- this gateway, which will figure out from there
- where to send it.
+ Send anything for this destination on to this
+ gateway, which will figure out from there where to
+ send it.
@@ -292,16 +300,15 @@ host2.example.com link#1 UC
C
- Clones a new route based upon this
- route for machines to connect to. This type of route
- is normally used for local networks.
+ Clones a new route based upon this route for
+ machines to connect to. This type of route is
+ normally used for local networks.W
- The route was
- auto-configured based upon a local area network
- (clone) route.
+ The route was auto-configured based upon a local
+ area network (clone) route.
@@ -326,7 +333,7 @@ host2.example.com link#1 UC
Note that manually added routes will not survive a reboot.
For more information on manual manipulation of network
- routing tables, refer to &man.route.8;.
+ routing tables, refer to &man.route.8;.
@@ -352,20 +359,20 @@ host2.example.com link#1 UC
A &os; system can be configured as the default gateway, or
router, for a network if it is a dual-homed system. A
dual-homed system is a host which resides on at least two
- different networks. Typically, each network is connected to a separate
- network interface, though IP aliasing can
- be used to bind multiple addresses, each on a different
- subnet, to one physical interface.
+ different networks. Typically, each network is connected to a
+ separate network interface, though IP
+ aliasing can be used to bind multiple addresses, each on a
+ different subnet, to one physical interface.
routerIn order for the system to forward packets between
- interfaces, &os; must be configured as a router. Internet standards and good
- engineering practice prevent the &os; Project from enabling
- this feature by default, but it can be configured to start at boot
- by adding this line to
+ interfaces, &os; must be configured as a router. Internet
+ standards and good engineering practice prevent the &os;
+ Project from enabling this feature by default, but it can be
+ configured to start at boot by adding this line to
/etc/rc.conf:gateway_enable="YES" # Set to YES if this host will be a gateway
@@ -387,31 +394,30 @@ host2.example.com link#1 UC
The routing table of a router needs additional routes so
it knows how to reach other networks. Routes can be either
- added manually using
- static routes or routes can be automatically learned using a routing protocol.
- Static routes are appropriate for small networks and this
- section describes how to add a static routing entry for a
- small network.
+ added manually using static routes or routes can be
+ automatically learned using a routing protocol. Static routes
+ are appropriate for small networks and this section describes
+ how to add a static routing entry for a small network.
-
+ For large networks, static routes quickly become
- unscalable. &os; comes with the standard BSD routing daemon
- &man.routed.8;, which provides the routing protocols RIP, versions
- 1 and 2, and IRDP. Support for the
- BGP and OSPF
- routing protocols can be installed using the
- net/zebra package or
- port.
+ unscalable. &os; comes with the standard
+ BSD routing daemon &man.routed.8;, which
+ provides the routing protocols RIP,
+ versions 1 and 2, and IRDP. Support for
+ the BGP and OSPF
+ routing protocols can be installed using the
+ net/zebra package or port.
- Consider the following network:
+ Consider the following network:
-
-
-
-
+
+
+
+
-
+
INTERNET
| (10.0.0.1/24) Default Router to Internet
@@ -435,23 +441,22 @@ host2.example.com link#1 UC
| 192.168.2.1/24
|
Internal Net 2
-
-
+
+
- In this scenario, RouterA is a
- &os; machine that is acting as a router to the rest of the
- Internet. It has a default route set to 10.0.0.1 which allows it to
- connect with the outside world.
- RouterB is already configured
- to use 192.168.1.1 as its default
- gateway.
+ In this scenario, RouterA is a
+ &os; machine that is acting as a router to the rest of the
+ Internet. It has a default route set to 10.0.0.1 which allows it to
+ connect with the outside world.
+ RouterB is already configured to use
+ 192.168.1.1 as its
+ default gateway.
- Before adding any static routes, the routing table on RouterA
- looks like this:
+ Before adding any static routes, the routing table on
+ RouterA looks like this:
- &prompt.user; netstat -nr
+ &prompt.user; netstat -nr
Routing tables
Internet:
@@ -461,56 +466,55 @@ default 10.0.0.1 UG
10.0.0.0/24 link#1 UC 0 0 xl0
192.168.1.0/24 link#2 UC 0 0 xl1
- With the current routing table,
- RouterA
- does not have a route to the 192.168.2.0/24 network. The
- following command adds the Internal Net 2 network to
- RouterA's routing table using
- 192.168.1.2 as
- the next hop:
-
- &prompt.root; route add -net 192.168.2.0/24 192.168.1.2
-
- Now, RouterA can reach any host
- on the 192.168.2.0/24
- network. However, the routing information will not
- persist if the &os; system reboots. If a static route needs
- to be persistent, add it to
- /etc/rc.conf:
+ With the current routing table,
+ RouterA does not have a route to the
+ 192.168.2.0/24
+ network. The following command adds the Internal Net
+ 2 network to RouterA's
+ routing table using 192.168.1.2 as the next
+ hop:
+
+ &prompt.root; route add -net 192.168.2.0/24 192.168.1.2
+
+ Now, RouterA can reach any host
+ on the 192.168.2.0/24 network.
+ However, the routing information will not persist if the &os;
+ system reboots. If a static route needs to be persistent, add
+ it to /etc/rc.conf:
- # Add Internal Net 2 as a persistent static route
+ # Add Internal Net 2 as a persistent static route
static_routes="internalnet2"
route_internalnet2="-net 192.168.2.0/24 192.168.1.2"
- The static_routes configuration
- variable is a list of strings separated by a space, where
- each string references a route name. The variable
- route_internalnet2
- contains the static route for that route name.
-
- Using more than one string in
- static_routes creates multiple static
- routes. The following shows an example of adding static
- routes for the 192.168.0.0/24 and
- 192.168.1.0/24
- networks:
+ The static_routes configuration
+ variable is a list of strings separated by a space, where
+ each string references a route name. The variable
+ route_internalnet2 contains the static
+ route for that route name.
+
+ Using more than one string in
+ static_routes creates multiple static
+ routes. The following shows an example of adding static
+ routes for the 192.168.0.0/24 and
+ 192.168.1.0/24
+ networks:
- static_routes="net1 net2"
+ static_routes="net1 net2"
route_net1="-net 192.168.0.0/24 192.168.0.1"
route_net2="-net 192.168.1.0/24 192.168.1.1"
-
+ TroubleshootingWhen an address space is assigned to a network, the
service provider configures their routing tables so that all
- traffic for the network will be sent to the link for the
- site. But how do external sites know to send their packets
- to the network's ISP?
+ traffic for the network will be sent to the link for the site.
+ But how do external sites know to send their packets to the
+ network's ISP?
There is a system that keeps track of all assigned
address spaces and defines their point of connection to the
@@ -530,17 +534,18 @@ route_net2="-net 192.168.1.0/24 192.168.
&man.traceroute.8;
- Sometimes, there is a problem with route propagation
- and some sites are unable to connect. Perhaps the most
- useful command for trying to figure out where routing is
- breaking down is traceroute. It is useful when
+ Sometimes, there is a problem with route propagation and
+ some sites are unable to connect. Perhaps the most useful
+ command for trying to figure out where routing is breaking
+ down is traceroute. It is useful when
ping fails.
- When using traceroute, include the address of the
- remote host to connect to. The output will show the gateway
- hosts along the path of the attempt, eventually either
- reaching the target host, or terminating because of a lack of
- connection. For more information, refer to &man.traceroute.8;.
+ When using traceroute, include the
+ address of the remote host to connect to. The output will
+ show the gateway hosts along the path of the attempt,
+ eventually either reaching the target host, or terminating
+ because of a lack of connection. For more information, refer
+ to &man.traceroute.8;.
@@ -556,29 +561,29 @@ route_net2="-net 192.168.1.0/24 192.168.
&os; natively supports both multicast applications and
multicast routing. Multicast applications do not require any
- special configuration in order to
- run on &os;. Support for multicast routing requires that the
- following option
- be compiled into a custom kernel:
+ special configuration in order to run on &os;. Support for
+ multicast routing requires that the following option be
+ compiled into a custom kernel:
options MROUTINGThe multicast routing daemon,
- mrouted can be installed
- using the net/mrouted package or port.
- This daemon implements
- the DVMRP multicast routing protocol and is
- configured by editing /usr/local/etc/mrouted.conf
- in order to set up the tunnels and DVMRP.
- The installation of mrouted also installs
- map-mbone and
+ mrouted can be installed using the
+ net/mrouted package or port. This daemon
+ implements the DVMRP multicast routing
+ protocol and is configured by editing
+ /usr/local/etc/mrouted.conf in order to
+ set up the tunnels and DVMRP. The
+ installation of mrouted also
+ installs map-mbone and
mrinfo, as well as their associated
man pages. Refer to these for configuration examples.
- DVMRP has largely been replaced by the
- PIM protocol in many
- multicast installations. Refer to &man.pim.4; for more information.
+ DVMRP has largely been replaced by
+ the PIM protocol in many multicast
+ installations. Refer to &man.pim.4; for more
+ information.
From owner-svn-doc-all@FreeBSD.ORG Thu Mar 6 13:41:13 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id CEAC2A71;
Thu, 6 Mar 2014 13:41:13 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id BB0E63BB;
Thu, 6 Mar 2014 13:41:13 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s26DfDHs013066;
Thu, 6 Mar 2014 13:41:13 GMT (envelope-from ryusuke@svn.freebsd.org)
Received: (from ryusuke@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s26DfD21013065;
Thu, 6 Mar 2014 13:41:13 GMT (envelope-from ryusuke@svn.freebsd.org)
Message-Id: <201403061341.s26DfD21013065@svn.freebsd.org>
From: Ryusuke SUZUKI
Date: Thu, 6 Mar 2014 13:41:13 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44145 - head/ja_JP.eucJP/books/handbook/cutting-edge
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-Mailman-Approved-At: Thu, 06 Mar 2014 14:35:13 +0000
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Thu, 06 Mar 2014 13:41:14 -0000
Author: ryusuke
Date: Thu Mar 6 13:41:13 2014
New Revision: 44145
URL: http://svnweb.freebsd.org/changeset/doc/44145
Log:
- Merge the following from the English version:
r43782 -> r43794 head/ja_JP.eucJP/books/handbook/cutting-edge/chapter.xml
Modified:
head/ja_JP.eucJP/books/handbook/cutting-edge/chapter.xml
Modified: head/ja_JP.eucJP/books/handbook/cutting-edge/chapter.xml
==============================================================================
--- head/ja_JP.eucJP/books/handbook/cutting-edge/chapter.xml Thu Mar 6 02:34:17 2014 (r44144)
+++ head/ja_JP.eucJP/books/handbook/cutting-edge/chapter.xml Thu Mar 6 13:41:13 2014 (r44145)
@@ -3,7 +3,7 @@
The FreeBSD Documentation Project
The FreeBSD Japanese Documentation Project
- Original revision: r43782
+ Original revision: r43794
$FreeBSD$
-->
&os.stable;、&os.current; などの
&os; のどれか特定のバージョンについて、
ローカルのソースツリーを同期させたら、
- そのソースツリーを使ってシステムを再構築できます。
+ そのソースツリーを使ってシステムを再構築できます。
+ このプロセスは world の再構築と呼ばれます。
-
- バックアップの作成
+ world を再構築する前に、
+ 以下を行ってください。
+
+
+ world の構築前に行う作業
- システムを再構築する前に、
+
+ 重要なデータを他のシステムやリムーバブルメディアにバックアップし、
+ きちんとバックアップが作成されていることを確認したら、
+ 起動可能なインストールメディアを用意してください。
+ システムを再構築する前に、
バックアップを作成することの重要性は、
いくら強調してもし過ぎると言うことはありません。
- システム全体の再構築とは難しい作業ではありませんが、
+ システム全体の再構築は難しい作業ではありませんが、
どんなに注意していたとしても、
ソースツリーそのものに手違いがあった時には、
システムが起動しなくなってしまう状態になることがあるのです。
-
-
- まず、バックアップがきちんと作成されていることを確認して、
- 起動可能インストールメディアを用意してください。
多分、それを使うことはないと思いますが、
- あとで後悔することのないよう、念のため用意しておきましょう。
-
-
-
- メーリングリストに参加する
+ あとで後悔することのないよう、念のため用意しておきましょう!
+
+ メーリングリスト
-
- もともと、&os.stable; と &os.current; のコードブランチは、
- 開発中のものです。
- &os; の作業に貢献してくださっている人達も人間ですから、
- 時にはミスをすることだってあるでしょう。
-
-
- そのような間違いは、
- 単に警告を示す見慣れない診断メッセージをシステムが表示するような、
- まったく害のないものであることもあれば、システムを起動できなくしたり、
- ファイルシステムを破壊してしまうような、
- 恐ろしい結果を招くものかも知れません。
-
- 問題が生じた場合、
- 問題の詳細と、どのようなシステムが影響を受けるかについて書かれた
- 注意 (heads up)
- の記事が適切なメーリングリストに投稿されます。
- そして、その問題が解決されると、
+ 追いかけているブランチに応じて、
+ &a.stable.name; もしくは &a.current.name;
+ の最近のエントリを調べて、
+ 既知の問題や影響を受けるシステムを確認してください。
+ 既知の問題が同期しているバージョンのコードに影響する場合は、
+ その問題が解決されたことを報告する
問題解決 (all clear)
- のアナウンス記事が同様に投稿されます。
-
- &os.stable; や &os.current; ブランチを追随しているユーザで、
- &a.stable; や &a.current; を読まないというのは、
- 自ら災難を招くようなものです。
-
- 訳注:
- これらのメーリングリストは英語でやりとりされているため、
- 日本語での投稿は歓迎されません。英語でのやりとりができない人は、
- FreeBSD 友の会
- の運営しているメーリングリストをあたってみるのがいいでしょう。
-
-
+ のアナウンスが投稿されるまで待ってから、
+ ソースを同期して、ローカルのソースに必要な修正を入れてください。
+
+
+
+ buildworld 前の必要なステップとして、
+ 同期しているバージョンのソースの
+ /usr/src/UPDATING を読んでください。
+ このファイルには潜在的な問題や特定のコマンドを実行する順などの重要な情報が含まれています。
+ 大きなアップグレードでは、
+ installworld の前に特定のファイルの名前を変更したり、削除するといった、
+ 特別なステップが追加で必要となることがあります。
+ ファイルの最後には、
+ 現在推奨されているアップグレードの手順が詳しく正確に説明されています。
+ もし、UPDATING に書かれている手順が、
+ この節に書かれているものと矛盾していたら、
+ UPDATING の手順を採用してください。
+
+
make world は使わないこと
@@ -1558,11 +1554,8 @@ before running "/usr/sbin/freebsd-update
システムを更新する正式な方法
- システムを更新する前に、
- /usr/src/UPDATING を読んでください。
- このファイルには、用意したソースコードで buildworld
- を行う前に必要な手順が書かれています。
- その後、以下の手順を踏んでください。
+ 上で述べた作業を行ったら、
+ 以下の手順を踏んでシステムをアップデートしてください。この節で説明するアップデートのプロセスは、古いコンパイラ、
古いカーネル、古い world、そして古いコンフィグレーションファイルからなる、
@@ -1751,13 +1744,6 @@ before running "/usr/sbin/freebsd-update
メジャーリリースをまたいだアップデートでは、
この方法を用いないと、何らかの問題にぶつかるでしょう。
- 大きなアップグレードにおいては、
- installworld の前に特定のファイルの名前の変更や削除するといった、
- 特別な追加のステップが必要となることがあります。
- /usr/src/UPDATING を注意深く読んでください。
- 特にファイルの最後には、
- 現在推奨されているアップグレードの手順が詳しく正確に説明されています。
-
この手続きは、
開発者たちがある種のミスマッチを完全に避けるために、長い年月をかけて進化してきました。
願わくば、この現在の手順が長い間安定してほしいものです。
@@ -1816,23 +1802,6 @@ before running "/usr/sbin/freebsd-update
- /usr/src/UPDATING を読む
-
- アップデートする前に、
- /usr/src/UPDATING を読んでください。
- このファイルには潜在的な問題や
- 特定のコマンドの順などの重要な情報が含まれています。
- UPDATING がこの節に書かれているものと矛盾している時は
- UPDATING を優先してください。
-
-
- UPDATING を読むということは、
- 適切なメーリングリストを購読する代わりにはなりません。
- 二つの要求は相補的なもので排他的なものではないのです。
-
-
-
- /etc/make.conf の確認
@@ -1990,12 +1959,9 @@ before running "/usr/sbin/freebsd-update
&prompt.root; rm -rf *
-
+ ベースシステムの再構築
-
- 出力メッセージの保存
-
実行される &man.make.1; からの出力は、ファイルに保存すると良いでしょう。
もし、何か障害が発生した場合、エラーメッセージのコピーを
&os; メーリングリストに投稿してください。
@@ -2018,10 +1984,6 @@ Script done, …
出力の保存には、/var/tmp や
root
のホームディレクトリが適しています。
-
-
-
- ベースシステムの構築/usr/src にて、
次のように実行してください。
@@ -2144,10 +2106,6 @@ Script done, …
もし、複数の CPU を備えたマシンで SMP 設定が行なわれたカーネルを
利用しているなら、6 から 10 の間の値を設定し、速度がどれくらい
向上するか確認してみてください。
-
-
-
- システムの構築にかかる時間world の再構築
@@ -2159,7 +2117,6 @@ Script done, …
トリックや近道を使わずに普通に構築した場合、&os.stable;
の構築には 1, 2 時間しかかからないでしょう。
&os.current; の構築は、もう少し時間がかかります。
-
From owner-svn-doc-all@FreeBSD.ORG Thu Mar 6 14:39:49 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id BF5B071C;
Thu, 6 Mar 2014 14:39:49 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id ACB7CCB4;
Thu, 6 Mar 2014 14:39:49 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s26EdnvC037850;
Thu, 6 Mar 2014 14:39:49 GMT (envelope-from dbn@svn.freebsd.org)
Received: (from dbn@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s26EdnpP037849;
Thu, 6 Mar 2014 14:39:49 GMT (envelope-from dbn@svn.freebsd.org)
Message-Id: <201403061439.s26EdnpP037849@svn.freebsd.org>
From: David Naylor
Date: Thu, 6 Mar 2014 14:39:49 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44146 - head/share/pgpkeys
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Thu, 06 Mar 2014 14:39:49 -0000
Author: dbn (ports committer)
Date: Thu Mar 6 14:39:49 2014
New Revision: 44146
URL: http://svnweb.freebsd.org/changeset/doc/44146
Log:
Update my (dbn) key to 4096/RSA, signed by old key.
Modified:
head/share/pgpkeys/dbn.key
Modified: head/share/pgpkeys/dbn.key
==============================================================================
--- head/share/pgpkeys/dbn.key Thu Mar 6 13:41:13 2014 (r44145)
+++ head/share/pgpkeys/dbn.key Thu Mar 6 14:39:49 2014 (r44146)
@@ -1,55 +1,104 @@
-uid David Naylor
-sub 4096g/77FA885C 2008-04-09
+pub 4096R/35C84A0DEC1D97CD 2014-03-06 [expires: 2019-03-05]
+ Key fingerprint = A372 D3E1 D587 2D99 A5FF F243 35C8 4A0D EC1D 97CD
+uid David Naylor (Private)
+sub 4096R/AD63FA8DD6B2DA55 2014-03-06 [expires: 2015-03-06]
+ Key fingerprint = 948E C511 A27F 0302 E799 B53A AD63 FA8D D6B2 DA55
+sub 4096R/88D62359F19D95D0 2014-03-06 [expires: 2015-03-06]
+ Key fingerprint = A198 8E3A 1A14 66C7 ADE2 13F2 88D6 2359 F19D 95D0
+
]]>
From owner-svn-doc-all@FreeBSD.ORG Thu Mar 6 15:02:02 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 4CED52FE;
Thu, 6 Mar 2014 15:02:02 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 3A633F3F;
Thu, 6 Mar 2014 15:02:02 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s26F22KB049382;
Thu, 6 Mar 2014 15:02:02 GMT (envelope-from madpilot@svn.freebsd.org)
Received: (from madpilot@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s26F22Ni049381;
Thu, 6 Mar 2014 15:02:02 GMT (envelope-from madpilot@svn.freebsd.org)
Message-Id: <201403061502.s26F22Ni049381@svn.freebsd.org>
From: Guido Falsi
Date: Thu, 6 Mar 2014 15:02:02 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44147 - head/share/pgpkeys
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Thu, 06 Mar 2014 15:02:02 -0000
Author: madpilot (ports committer)
Date: Thu Mar 6 15:02:01 2014
New Revision: 44147
URL: http://svnweb.freebsd.org/changeset/doc/44147
Log:
Update my key.
Modified:
head/share/pgpkeys/madpilot.key
Modified: head/share/pgpkeys/madpilot.key
==============================================================================
--- head/share/pgpkeys/madpilot.key Thu Mar 6 14:39:49 2014 (r44146)
+++ head/share/pgpkeys/madpilot.key Thu Mar 6 15:02:01 2014 (r44147)
@@ -1,13 +1,16 @@
-uid Guido Falsi
-sub 2048R/1F9772C5 2012-04-12
+uid Guido Falsi
+uid Guido Falsi
+uid Guido Falsi
+uid Guido Falsi
+sub 4096R/CB95603DDCCDB1C8 2014-02-28
+
]]>
From owner-svn-doc-all@FreeBSD.ORG Thu Mar 6 15:03:59 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id CAE5F864;
Thu, 6 Mar 2014 15:03:59 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id A732CF70;
Thu, 6 Mar 2014 15:03:59 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s26F3xh4050016;
Thu, 6 Mar 2014 15:03:59 GMT (envelope-from dbn@svn.freebsd.org)
Received: (from dbn@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s26F3xdO050015;
Thu, 6 Mar 2014 15:03:59 GMT (envelope-from dbn@svn.freebsd.org)
Message-Id: <201403061503.s26F3xdO050015@svn.freebsd.org>
From: David Naylor
Date: Thu, 6 Mar 2014 15:03:59 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44148 - head/share/pgpkeys
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Thu, 06 Mar 2014 15:03:59 -0000
Author: dbn (ports committer)
Date: Thu Mar 6 15:03:59 2014
New Revision: 44148
URL: http://svnweb.freebsd.org/changeset/doc/44148
Log:
Add my "dbn@freebsd.net" UID to my public key.
Modified:
head/share/pgpkeys/dbn.key
Modified: head/share/pgpkeys/dbn.key
==============================================================================
--- head/share/pgpkeys/dbn.key Thu Mar 6 15:02:01 2014 (r44147)
+++ head/share/pgpkeys/dbn.key Thu Mar 6 15:03:59 2014 (r44148)
@@ -6,6 +6,7 @@ sh addkey.sh dbn 35C84A0DEC1D97CD ;
pub 4096R/35C84A0DEC1D97CD 2014-03-06 [expires: 2019-03-05]
Key fingerprint = A372 D3E1 D587 2D99 A5FF F243 35C8 4A0D EC1D 97CD
uid David Naylor (Private)
+uid David Naylor (FreeBSD)
sub 4096R/AD63FA8DD6B2DA55 2014-03-06 [expires: 2015-03-06]
Key fingerprint = 948E C511 A27F 0302 E799 B53A AD63 FA8D D6B2 DA55
sub 4096R/88D62359F19D95D0 2014-03-06 [expires: 2015-03-06]
@@ -39,66 +40,93 @@ FNmY6oD1JE/E8zF97V7Zt2mu3tMG0L94aPUeXuTs
DUiTSkh87YRGf6zJYeHkBNLBBIsHKTm8GWy+HZtEmMvDnyi6/i3HPmljAIXBG/Mb
ztdJ9G0NpQY13QU4khEz+iCvKLWvPTfQajTXwOfcBcN5RGyXKH/DFckxrEqMmdfy
wJ//+H8bmkCiU/s8Gn8sXXMr9A7BjcQroPsqZSB7Gub6UU09D8SRLhXPWci1K7ee
-W67QiEYEEBEKAAYFAlMYhiEACgkQUaaFgP9pFrLqswCdFsKtE+ezHp39/A9G7+vQ
-3eLxQQIAnjkLoCfMDoLHQT19sxxv5orEB1R0uQINBFMYheUBEADNsSWJxzBaNQi6
-PNjFBGJstcsjxtlQCCWaMeK1/5oIJXtnaEeK09wS0OOJ7Tqap6jvuwVjJYKHx2vL
-kWQ6Pb3rXseAv+ZqMTw+Ls9dQBXXNNfezLUw7p+qte8WDi+CTT7/otHpRTzpvo5K
-HV96NY2E49WFIJZgSAvI+fEB85w8E/JDoDMbKA2qiO7J3HB4TSf7cAKFs8/iDmC3
-Gu1ObH1nlL3cWbygUvy2302xVOzBzLqNB+nwtwhSRyjHh77dzAlrl6gwR4X2A6fk
-7JefN+/nWoh1+D7Kzx/Zqwd8fx+mYtR5b5Gz9waJvKunAB+UsgFHKHPROdPIeT2N
-dqZBx6waocz71EUCY7dIWPXu/XyTrT/vKjDBW4yMhh7FdpIdOXc8ORnbAXbRop3n
-ZXWs9QSZim2PYe73GZiRzFM7U1+wQdsYkqYk/DuQ3pAT7avgYVkZb72bK3CLg9Ri
-1u0eOAnKdvrB1VrPdGTy+LmXWora5NRmH54uThfgKHLK3GkyuCpUgjUxMBfY9+RE
-gmHZCiPd6xPRRsoNftHNqwu+uiSjyoiAJYdYE+DZ57PNUTAEn8NBDfnrI8oPkrik
-xxBLT/rzkKPVYhR2tF1UkDdrYenKnSPgmJc7yfC8J19wiDymfLi2wI3XpxgY8iQx
-yAu6+5h9A5FpJxjm47FcYavAUOnK8QARAQABiQSkBBgBCgAPBQJTGIXlAhsCBQkB
-4TOAAokJEDXISg3sHZfNwb0gBBkBCgBmBQJTGIXlXxSAAAAAAC4AKGlzc3Vlci1m
-cHJAbm90YXRpb25zLm9wZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ5NDhFQzUxMUEy
-N0YwMzAyRTc5OUI1M0FBRDYzRkE4REQ2QjJEQTU1AAoJEK1j+o3WstpVbTcP/3Tj
-yQeJY0FbDvdCOZWaEywKh8KmjY6i/H4ipD6Y8bOJBZktWDAh9tYUheg6VXXAp9rB
-nyynPIQxDRNJDn6PKuNr98qVhqY34FY6La/05KrflObCiKx4eU6KQSG3m+CawQIL
-nM5LRZi7XRsSiG2r1HWO7DTq1ZN46P3QGVgeIeBO/f1iBvVcr7EGb+mRS+nU9/1Z
-OVJwt9PIBZsPRhG2Ex0jov/In1kTGtIMXeBbBDdNi8vOcBuXpXIJ2HFkg+q6OkmI
-ojMZhHnXgds9n2CpmlfUas4kDLubHq0SOT9874spin9RcaGzcf5a+yX/GT1lUgCJ
-DLJ/SUig3NjE+9MoyJGM6bk1XDtUXSPdkk4FwwdKG2HDvmndYfaKBGu3ZSsLBbkK
-l4stnxuE0tOC2m0ai6+HJfp9PUOelU2kLSmjx/J6dZkPTR8E4APthGtA1nrTrQ08
-I4sGjxe5/2yPvlyTeHcoFkb0/yvkHln/3WIABQOJC92wDWZPkPrnXVynRT2pYafu
-RmwUV/ML84weTmRBbhd5OTi+75Ko8ZhuWwp7iBDGVF93sJVZX1brHVLxCunMN9Gh
-89nIAy3wwnesfRO98Hp0m1uWoy1ZMnfp0m8RAmY464JReyQAMSpWbfYgt5o1w+lt
-8MJqj+pWJeCtynMaVAIruYHR3QHA1ZIaLvAZlxnZOqMQAKv1NkafZldk/ecJAWnR
-3GEcrJgpjIaAtZbg7uI1FZqw31Lsg7pabL8iXb0Bdl5pchEP/3VDJVA+7vGeedO1
-xn0N1Wqyp1zRaSBnRMPrPXcu4+TFSjojlu9Mc2zhZNLfadRwP0KCML1ufQmcdrRx
-zl+yt1g/A1aS4Y1V1RVCBYybXMxNA07f9fYWf/d8QmjJu6Ifm5yVbWqH/nUu7tll
-d8CMyP5ANNOXZtnoI445jIA2jnqHrjUYv/9ftpejzAT+auTTWzNie+5+msuwh+kK
-qoS1R+Pzv/Nfm8zuYSBozwU2slKwo62Dqv0Wo/rq6iH9gkbFxbQFjsO3Hs/8INuI
-XWDpwd9ifiiMX2EeXGNt1nD47I8duIVopJE3XuvsZoc+NjLuTi2tti4vXDOT+QMA
-YIRKQJTWp720zLHH0zRqK8zIFENnBbHCIys3SeeIt/MaYUiTfR3pKpf8f1487r/F
-7+KFwgasMuQlgzAo9xQx3oCnCP74706T7gFbNyHlBUTJiE4icDYx0AQ4CUOsG4m4
-TEow/OWL7P9ZFC0SnA3qowng64ETgtI1uB2KYCbSXMCM5c/CFu8tKWnh2r10paH1
-4CoAFHlHHYfM8G44UdWLZ7r1JEiJ95T6NTUdYoJojk1mCea7Xvgz36/RWhfwS0mT
-XcPcI3FzCzmBcqKaHRytcWgAuQINBFMYhggBEAC+/9JWUsGsh7rgtm3gClvL2hF1
-Q8AO0pQ8M1R/RYpECNCQQoApakmGE0/H1R3kh8SfIGLshmpSJNe3Ju+9RFVIUFaG
-DF3BIMliKSyMTzudUqzzWWA9Hs5EEtWqwlaeHIJJwCpg4Zb4+LLnB1LrRQ1pBpct
-jaU6eTPY6plszurNxVbcSg2ylVobaySGwBIYiOHBdNVo+dgKmkxNdqG63dNVXV2y
-zl/a5Lfq1i6C4lJ2AhHFbI+f8iqEPPgWvcVGkwYDQLxTDOTFV1zEwVIa/pW65TUu
-E1AbFxN0nwM8syXxaTXpS/ibPBWyPLWF9WnJzntFaDXj2rbKWkojgKmdL0ok/xGZ
-IY46QhY8kv+tn17JbCeSH+CI4ov0b4ciYAb+N/CgcI3Ky97Sr/HPGxnWYzF/7sB7
-Tf8KZ9mTm0vMpxzQ4eOmaWEuPUp6w+hkUwmRxc9BNrrvWYIxwugLPhCvFJU+rFAp
-xzfCGBjgGVOoCt6GKU2VIdftYWdX97lmA7cfY8NDfo5utOCYv0Z1+TqayIqeAmY+
-CKCLTfnFJNkN5W2zB9f72lJLP7m3LfHqBS/t+pqL3NNLHFwbbz9lQQwOeqI+i4w4
-FEUiqp+VhJmvvYSp75e1QnNL0j+hOK725MHfJcPsXfIBTqRV+PiaelqqVXROUo/d
-MMwn2SNiSR1d1nm73wARAQABiQIlBBgBCgAPBQJTGIYIAhsMBQkB4TOAAAoJEDXI
-Sg3sHZfNYCcP/A9imQkd3BDdYRsVZDV13CTIg2NQEbHXyJWk1qp6ycKu7eYkMm6K
-Y/BgXg6dR91Ys1S29K5T6qfFl+KVjYjwGdJUAuT61K8Aop/ag0M/T1k2OJokLOxd
-pFX6gi/Vhdhen0sUWBXVB9MRGcMLXQiZlikdRRG+8iwuGKaJu2LXCD1ZUr7P4S6F
-RuhymLZiSPnigdhfciEtSuKx9vCzi+UDq0XheJTd6mG5lTh2hm0S5YCslHoroWR0
-JTl3KANsqvCfi2RBb6uCe6GkXY5xx8B+weGrNDN5jWGBCKH3IUsBtgAU1MlBggzk
-pwzweN63clHhNIjgJdsqgGLVmaVUoGDDZQrIEiQ/rv4hzvDR7nVKEMspC9Ix1+R4
-MzsHcDe5upmGxOwjsVC/qQrl3dpUtZEnhycYoGSicQFTgEFxbQwVJzXvVJF8ntyu
-+wJLAZq71V7ZORwLVIZObVJgkrBn5Ga8yCuzdqBgBXfhRa+SDFsxX/NpIWpePNPQ
-1qG6OoW9ehyr/JF9fkK4OOcSBFL4BEtf2nqlzVdBCG6myfX37CGTDz/JO6XLrb+g
-a1YmT1wY5acrZ3NuCgx0EGTTW5Brheki/qP/D+SXmTMZnjdK1lll7iTh8CpZSuxB
-N269l2TGuyVMoocVKrGiPzKvb+IB96zjAuV7DLvXdwSoTY/zzF9T/ZFr
-=1G8l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+=am/i
-----END PGP PUBLIC KEY BLOCK-----
]]>
From owner-svn-doc-all@FreeBSD.ORG Thu Mar 6 15:15:32 2014
Return-Path:
Delivered-To: svn-doc-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 306F7736;
Thu, 6 Mar 2014 15:15:32 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 1CD42128;
Thu, 6 Mar 2014 15:15:32 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s26FFVPv055234;
Thu, 6 Mar 2014 15:15:31 GMT (envelope-from gjb@svn.freebsd.org)
Received: (from gjb@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s26FFVtg055233;
Thu, 6 Mar 2014 15:15:31 GMT (envelope-from gjb@svn.freebsd.org)
Message-Id: <201403061515.s26FFVtg055233@svn.freebsd.org>
From: Glen Barber
Date: Thu, 6 Mar 2014 15:15:31 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r44149 - head/en_US.ISO8859-1/htdocs/internal
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-all@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "SVN commit messages for the entire doc trees \(except for "
user" , " projects" , and " translations"
\)"
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Thu, 06 Mar 2014 15:15:32 -0000
Author: gjb
Date: Thu Mar 6 15:15:31 2014
New Revision: 44149
URL: http://svnweb.freebsd.org/changeset/doc/44149
Log:
Remove a very out-of-date paragraph describing www.FreeBSD.org
and hub.FreeBSD.org. With how the infrastructure is set up, it
is probably not reasonable to try to keep these pieces current.
Reword the leading sentence of the next paragraph so it makes
sense with the first paragraph removed.
Sponsored by: The FreeBSD Foundation
Modified:
head/en_US.ISO8859-1/htdocs/internal/about.xml
Modified: head/en_US.ISO8859-1/htdocs/internal/about.xml
==============================================================================
--- head/en_US.ISO8859-1/htdocs/internal/about.xml Thu Mar 6 15:03:59 2014 (r44148)
+++ head/en_US.ISO8859-1/htdocs/internal/about.xml Thu Mar 6 15:15:31 2014 (r44149)
@@ -15,18 +15,9 @@
The Machine
-
The
- machine www.FreeBSD.org is a dual 600MHz Pentium III set
- up with 1024 megabytes of RAM and about 70 gigabytes of disk space.
- The mail processing duties for the domain are handled by
- hub.FreeBSD.org, a quad core 2.2GHz AMD64 system with 3072
- megabytes of RAM and about 400 gigabytes disk space. Inbound mail
- is buffered by mx1.FreeBSD.org and outbound mail relayed via
- mx2.FreeBSD.org, both are dual 3.06 GHz Xeon systems with 1024
- megabytes of RAM and 80 gigabytes of disk.