Changeset 3597eb6
- Timestamp:
- 04/10/2006 06:38:22 PM (18 years ago)
- Branches:
- 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 12.0, 12.1, 6.2, 6.2.0, 6.2.0-rc1, 6.2.0-rc2, 6.3, 6.3-rc1, 6.3-rc2, 6.3-rc3, 7.10, 7.4, 7.5, 7.6, 7.6-blfs, 7.6-systemd, 7.7, 7.8, 7.9, 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, basic, bdubbs/svn, elogind, gnome, kde5-13430, kde5-14269, kde5-14686, kea, ken/TL2024, ken/inkscape-core-mods, ken/tuningfonts, krejzi/svn, lazarus, lxqt, nosym, perl-modules, plabs/newcss, plabs/python-mods, python3.11, qt5new, rahul/power-profiles-daemon, renodr/vulkan-addition, systemd-11177, systemd-13485, trunk, upgradedb, xry111/intltool, xry111/llvm18, xry111/soup3, xry111/test-20220226, xry111/xf86-video-removal
- Children:
- 977061b0
- Parents:
- 0e2aa08
- Location:
- postlfs
- Files:
-
- 30 edited
Legend:
- Unmodified
- Added
- Removed
-
postlfs/config/autofs.xml
r0e2aa08 r3597eb6 79 79 </listitem> 80 80 </itemizedlist> 81 82 <para condition="html" role="usernotes">User Notes: 83 <ulink url="&blfs-wiki;/autofs"/></para> 81 84 82 85 </sect2> -
postlfs/config/compressdoc.xml
r0e2aa08 r3597eb6 521 521 <filename class="directory">/usr/X11R6/man</filename>, etc.). Be sure 522 522 to add these locations to the file <filename>/etc/man_db.conf</filename>, as 523 <envar>MANDATORY_MANPATH</envar> <replaceable> [/path]</replaceable>523 <envar>MANDATORY_MANPATH</envar> <replaceable></path></replaceable> 524 524 lines.</para> 525 525 -
postlfs/config/profile.xml
r0e2aa08 r3597eb6 387 387 </itemizedlist> 388 388 389 <para>Replace <replaceable> [ll]</replaceable> with the two-letter code for389 <para>Replace <replaceable><ll></replaceable> with the two-letter code for 390 390 your language (e.g., <quote>en</quote>) and 391 <replaceable> [CC]</replaceable> with the two-letter code for your country391 <replaceable><CC></replaceable> with the two-letter code for your country 392 392 (e.g., <quote>GB</quote>). Also you may need to specify (and this is actually 393 393 the preferred form) your character encoding (e.g., <quote>iso8859-1</quote>) … … 407 407 <screen role="root"><userinput>cat > /etc/profile.d/i18n.sh << "EOF" 408 408 <literal># Set up i18n variables 409 export LC_ALL=<replaceable> [ll]</replaceable>_<replaceable>[CC]</replaceable>410 export LANG=<replaceable> [ll]</replaceable>_<replaceable>[CC]</replaceable>409 export LC_ALL=<replaceable><ll></replaceable>_<replaceable><CC></replaceable> 410 export LANG=<replaceable><ll></replaceable>_<replaceable><CC></replaceable> 411 411 export G_FILENAME_ENCODING=@locale</literal> 412 412 EOF</userinput></screen> -
postlfs/config/skel.xml
r0e2aa08 r3597eb6 131 131 <systemitem class="username">root</systemitem> user):</para> 132 132 133 <screen role="root"><userinput>useradd -m <replaceable> [newuser]</replaceable></userinput></screen>133 <screen role="root"><userinput>useradd -m <replaceable><newuser></replaceable></userinput></screen> 134 134 135 135 </sect1> -
postlfs/editors/bluefish.xml
r0e2aa08 r3597eb6 74 74 <xref linkend="desktop-file-utils"/> and 75 75 <xref linkend="shared-mime-info"/></para> 76 77 <para condition="html" role="usernotes">User Notes: 78 <ulink url="&blfs-wiki;/bluefish"/></para> 76 79 77 80 </sect2> -
postlfs/editors/ed.xml
r0e2aa08 r3597eb6 70 70 </listitem> 71 71 </itemizedlist> 72 73 <para condition="html" role="usernotes">User Notes: 74 <ulink url="&blfs-wiki;/ed"/></para> 72 75 73 76 </sect2> -
postlfs/editors/emacs.xml
r0e2aa08 r3597eb6 71 71 <!-- <xref linkend="giflib"/></para> --> 72 72 73 <para condition="html" role="usernotes">User Notes: 74 <ulink url="&blfs-wiki;/emacs"/></para> 75 73 76 </sect2> 74 77 -
postlfs/editors/joe.xml
r0e2aa08 r3597eb6 60 60 </itemizedlist> 61 61 62 <para condition="html" role="usernotes">User Notes: 63 <ulink url="&blfs-wiki;/joe"/></para> 64 62 65 </sect2> 63 66 -
postlfs/editors/nano.xml
r0e2aa08 r3597eb6 64 64 <bridgehead renderas="sect4">Optional</bridgehead> 65 65 <para role="optional"><xref linkend="slang"/></para> 66 67 <para condition="html" role="usernotes">User Notes: 68 <ulink url="&blfs-wiki;/nano"/></para> 66 69 67 70 </sect2> -
postlfs/editors/vim.xml
r0e2aa08 r3597eb6 89 89 <xref linkend="ruby"/>, and 90 90 <xref linkend="gpm"/></para> 91 92 <para condition="html" role="usernotes">User Notes: 93 <ulink url="&blfs-wiki;/vim"/></para> 91 94 92 95 </sect2> -
postlfs/filesystems/ext3.xml
r0e2aa08 r3597eb6 32 32 following line.</para> 33 33 34 <screen><literal>/dev/hd<replaceable> [XX]</replaceable> /mnt_point ext3 defaults 1 1</literal></screen>34 <screen><literal>/dev/hd<replaceable><XX></replaceable> /mnt_point ext3 defaults 1 1</literal></screen> 35 35 36 36 <para>In the above line, replace 37 <filename>/dev/hd<replaceable> [XX]</replaceable></filename> by the37 <filename>/dev/hd<replaceable><XX></replaceable></filename> by the 38 38 partition (e.g., <filename>/dev/hda2</filename>), 39 39 <filename class="directory">/mnt_point</filename> by the mount point (e.g., … … 50 50 following command.</para> 51 51 52 <screen role="root"><userinput>tune2fs -j /dev/hd<replaceable> [XX]</replaceable></userinput></screen>52 <screen role="root"><userinput>tune2fs -j /dev/hd<replaceable><XX></replaceable></userinput></screen> 53 53 54 54 <para>Remount the concerned partitions, or simply reboot if you have -
postlfs/filesystems/reiser.xml
r0e2aa08 r3597eb6 58 58 </listitem> 59 59 </itemizedlist> 60 61 <para condition="html" role="usernotes">User Notes: 62 <ulink url="&blfs-wiki;/reiser"/></para> 60 63 61 64 </sect2> -
postlfs/filesystems/xfs.xml
r0e2aa08 r3597eb6 59 59 </itemizedlist> 60 60 61 <para condition="html" role="usernotes">User Notes: 62 <ulink url="&blfs-wiki;/xfs"/></para> 63 61 64 </sect2> 62 65 … … 127 130 xfs_db, xfs_freeze, xfs_growfs, xfs_info, xfs_io, xfs_logprint, 128 131 xfs_mkfile, xfs_ncheck, xfs_repair, and xfs_rtcp</seg> 129 <seg>libhandle. [so,a]</seg>132 <seg>libhandle.{so,a}</seg> 130 133 <seg>/usr/share/doc/xfsprogs</seg> 131 134 </seglistitem> -
postlfs/security/cracklib.xml
r0e2aa08 r3597eb6 107 107 <para role="optional"><xref linkend="python"/></para> 108 108 109 <para condition="html" role="usernotes">User Notes: 110 <ulink url="&blfs-wiki;/cracklib"/></para> 111 109 112 </sect2> 110 113 … … 219 222 <seg>cracklib-check, cracklib-format, cracklib-packer, 220 223 cracklib-unpacker and create-cracklib-dict</seg> 221 <seg>libcrack. [so,a] and optionally, libcrack_heimdal.[so,a]and222 cracklibmodule. [so,a]<application>Python</application> module</seg>224 <seg>libcrack.{so,a} and optionally, libcrack_heimdal.{so,a} and 225 cracklibmodule.{so,a} <application>Python</application> module</seg> 223 226 <seg>/lib/cracklib, /usr/share/dict and /usr/share/cracklib</seg> 224 227 </seglistitem> … … 242 245 243 246 <varlistentry id="libcrack"> 244 <term><filename class='libraryfile'>libcrack. [so,a]</filename></term>247 <term><filename class='libraryfile'>libcrack.{so,a}</filename></term> 245 248 <listitem> 246 249 <para>provides a fast dictionary lookup method for strong 247 250 password enforcement.</para> 248 251 <indexterm zone="cracklib libcrack"> 249 <primary sortas="c-libcrack">libcrack. [so,a]</primary>252 <primary sortas="c-libcrack">libcrack.{so,a}</primary> 250 253 </indexterm> 251 254 </listitem> -
postlfs/security/cyrus-sasl.xml
r0e2aa08 r3597eb6 91 91 <ulink url="http://dmalloc.com/">Dmalloc</ulink></para> 92 92 93 <para condition="html" role="usernotes">User Notes: 94 <ulink url="&blfs-wiki;/cyrus-sasl"/></para> 95 93 96 </sect2> 94 97 … … 202 205 <note> 203 206 <para>You'll need to modify the init script and replace the 204 <option><replaceable> [authmech]</replaceable></option> parameter207 <option><replaceable><authmech></replaceable></option> parameter 205 208 to the <option>-a</option> switch with your desired authentication 206 209 mechanism.</para> -
postlfs/security/firewalling.xml
r0e2aa08 r3597eb6 390 390 <para>If the interface you're connecting to the Internet 391 391 doesn't connect via PPP, you will need to change 392 <replaceable> ppp+</replaceable> to the name of the interface392 <replaceable><ppp+></replaceable> to the name of the interface 393 393 (e.g., <emphasis role="strong">eth1</emphasis>) which you are 394 394 using.</para> -
postlfs/security/gnupg.xml
r0e2aa08 r3597eb6 80 80 <xref linkend="docbook-utils"/>, and <ulink 81 81 url="http://www.oasis-open.org/docbook/tools/dtm/">docbook-to-man</ulink></para> 82 83 <para condition="html" role="usernotes">User Notes: 84 <ulink url="&blfs-wiki;/gnupg"/></para> 82 85 83 86 </sect2> -
postlfs/security/heimdal.xml
r0e2aa08 r3597eb6 105 105 and the KDC server is more than 5 minutes.</para> 106 106 </note> 107 108 <para condition="html" role="usernotes">User Notes: 109 <ulink url="&blfs-wiki;/heimdal"/></para> 107 110 108 111 </sect2> … … 308 311 309 312 [libdefaults] 310 default_realm = <replaceable> [EXAMPLE.COM]</replaceable>313 default_realm = <replaceable><EXAMPLE.COM></replaceable> 311 314 encrypt = true 312 315 313 316 [realms] 314 <replaceable> [EXAMPLE.COM]</replaceable> = {315 kdc = <replaceable> [hostname.example.com]</replaceable>316 admin_server = <replaceable> [hostname.example.com]</replaceable>317 kpasswd_server = <replaceable> [hostname.example.com]</replaceable>317 <replaceable><EXAMPLE.COM></replaceable> = { 318 kdc = <replaceable><hostname.example.com></replaceable> 319 admin_server = <replaceable><hostname.example.com></replaceable> 320 kpasswd_server = <replaceable><hostname.example.com></replaceable> 318 321 } 319 322 320 323 [domain_realm] 321 .<replaceable> [example.com]</replaceable> = <replaceable>[EXAMPLE.COM]</replaceable>324 .<replaceable><example.com></replaceable> = <replaceable><EXAMPLE.COM></replaceable> 322 325 323 326 [logging] … … 331 334 332 335 <para>You will need to substitute your domain and proper hostname 333 for the occurrences of the <replaceable> [hostname]</replaceable>334 and <replaceable> [EXAMPLE.COM]</replaceable> names.</para>336 for the occurrences of the <replaceable><hostname></replaceable> 337 and <replaceable><EXAMPLE.COM></replaceable> names.</para> 335 338 336 339 <para><option>default_realm</option> should be the name of your … … 372 375 statement:</para> 373 376 374 <screen role="root"><userinput>init <replaceable> [EXAMPLE.COM]</replaceable></userinput></screen>377 <screen role="root"><userinput>init <replaceable><EXAMPLE.COM></replaceable></userinput></screen> 375 378 376 379 <para>The database must now be populated with at least one principle … … 379 382 statement:</para> 380 383 381 <screen role="root"><userinput>add <replaceable> [loginname]</replaceable></userinput></screen>384 <screen role="root"><userinput>add <replaceable><loginname></replaceable></userinput></screen> 382 385 383 386 <para>The KDC server and any machine running kerberized 384 387 server daemons must have a host key installed:</para> 385 388 386 <screen role="root"><userinput>add --random-key host/<replaceable> [hostname.example.com]</replaceable></userinput></screen>389 <screen role="root"><userinput>add --random-key host/<replaceable><hostname.example.com></replaceable></userinput></screen> 387 390 388 391 <para>After choosing the defaults when prompted, you will have to 389 392 export the data to a keytab file:</para> 390 393 391 <screen role="root"><userinput>ext host/<replaceable> [hostname.example.com]</replaceable></userinput></screen>394 <screen role="root"><userinput>ext host/<replaceable><hostname.example.com></replaceable></userinput></screen> 392 395 393 396 <para>This should have created two files in … … 402 405 way you created the host principles. Below is an example:</para> 403 406 404 <screen role="root"><userinput>add --random-key ftp/<replaceable> [hostname.example.com]</replaceable></userinput></screen>407 <screen role="root"><userinput>add --random-key ftp/<replaceable><hostname.example.com></replaceable></userinput></screen> 405 408 406 409 <para>(choose the defaults)</para> 407 410 408 <screen role="root"><userinput>ext ftp/<replaceable> [hostname.example.com]</replaceable></userinput></screen>411 <screen role="root"><userinput>ext ftp/<replaceable><hostname.example.com></replaceable></userinput></screen> 409 412 410 413 <para>Exit the <command>kadmin</command> program (use … … 418 421 the following command:</para> 419 422 420 <screen><userinput>kinit <replaceable> [loginname]</replaceable></userinput></screen>423 <screen><userinput>kinit <replaceable><loginname></replaceable></userinput></screen> 421 424 422 425 <para>You will be prompted for the password you created. After you get … … 477 480 unused port number. Add an entry to the <filename>services</filename> 478 481 file similar to the entry below (substitute your chosen port number 479 for <replaceable> [49150]</replaceable>):</para>480 481 <screen><literal>kx <replaceable> [49150]</replaceable>/tcp # Heimdal kerberos X482 kx <replaceable> [49150]</replaceable>/udp # Heimdal kerberos X</literal></screen>482 for <replaceable><49150></replaceable>):</para> 483 484 <screen><literal>kx <replaceable><49150></replaceable>/tcp # Heimdal kerberos X 485 kx <replaceable><49150></replaceable>/udp # Heimdal kerberos X</literal></screen> 483 486 484 487 <para>For additional information consult <ulink … … 508 511 telnet, telnetd, tenletxr, truncate-log, verify_krb5_conf 509 512 and xnlock</seg> 510 <seg>libasn1. [so,a], libeditline.[so,a], libgssapi.[so,a],511 libhdb. [so,a], libkadm5clnt.[so,a], libkadm5srv.[so,a], libkafs.[so,a],512 libkrb5. [so,a], libotp.[so,a], libroken.[so,a], libsl.[so,a]513 and libss. [so,a]</seg>513 <seg>libasn1.{so,a}, libeditline.{so,a}, libgssapi.{so,a}, 514 libhdb.{so,a}, libkadm5clnt.{so,a}, libkadm5srv.{so,a}, libkafs.{so,a}, 515 libkrb5.{so,a}, libotp.{so,a}, libroken.{so,a}, libsl.{so,a} 516 and libss.{so,a}</seg> 514 517 <seg>/etc/heimdal, /usr/include/kadm5, 515 518 /usr/share/doc/heimdal-&heimdal-version; and /var/lib/heimdal</seg> … … 975 978 976 979 <varlistentry id="libasn1"> 977 <term><filename class='libraryfile'>libasn1. [so,a]</filename></term>980 <term><filename class='libraryfile'>libasn1.{so,a}</filename></term> 978 981 <listitem> 979 982 <para>provides the ASN.1 and DER functions to encode and decode 980 983 the Kerberos TGTs.</para> 981 984 <indexterm zone="heimdal libasn1"> 982 <primary sortas="c-libasn1">libasn1. [so,a]</primary>985 <primary sortas="c-libasn1">libasn1.{so,a}</primary> 983 986 </indexterm> 984 987 </listitem> … … 996 999 997 1000 <varlistentry id="libgssapi"> 998 <term><filename class='libraryfile'>libgssapi. [so,a]</filename></term>1001 <term><filename class='libraryfile'>libgssapi.{so,a}</filename></term> 999 1002 <listitem> 1000 1003 <para>contain the Generic Security Service Application Programming … … 1004 1007 portability of applications to different environments.</para> 1005 1008 <indexterm zone="heimdal libgssapi"> 1006 <primary sortas="c-libgssapi">libgssapi. [so,a]</primary>1009 <primary sortas="c-libgssapi">libgssapi.{so,a}</primary> 1007 1010 </indexterm> 1008 1011 </listitem> … … 1010 1013 1011 1014 <varlistentry id="libhdb"> 1012 <term><filename class='libraryfile'>libhdb. [so,a]</filename></term>1015 <term><filename class='libraryfile'>libhdb.{so,a}</filename></term> 1013 1016 <listitem> 1014 1017 <para>is a <application>Heimdal</application> Kerberos 5 1015 1018 authentication/authorization database access library.</para> 1016 1019 <indexterm zone="heimdal libhdb"> 1017 <primary sortas="c-libhdb">libhdb. [so,a]</primary>1020 <primary sortas="c-libhdb">libhdb.{so,a}</primary> 1018 1021 </indexterm> 1019 1022 </listitem> … … 1021 1024 1022 1025 <varlistentry id="libkadm5clnt"> 1023 <term><filename class='libraryfile'>libkadm5clnt. [so,a]</filename></term>1026 <term><filename class='libraryfile'>libkadm5clnt.{so,a}</filename></term> 1024 1027 <listitem> 1025 1028 <para>contains the administrative authentication and password 1026 1029 checking functions required by Kerberos 5 client-side programs.</para> 1027 1030 <indexterm zone="heimdal libkadm5clnt"> 1028 <primary sortas="c-libkadm5clnt">libkadm5clnt. [so,a]</primary>1031 <primary sortas="c-libkadm5clnt">libkadm5clnt.{so,a}</primary> 1029 1032 </indexterm> 1030 1033 </listitem> … … 1032 1035 1033 1036 <varlistentry id="libkadm5srv"> 1034 <term><filename class='libraryfile'>libkadm5srv. [so,a]</filename></term>1037 <term><filename class='libraryfile'>libkadm5srv.{so,a}</filename></term> 1035 1038 <listitem> 1036 1039 <para>contain the administrative authentication and password 1037 1040 checking functions required by Kerberos 5 servers.</para> 1038 1041 <indexterm zone="heimdal libkadm5srv"> 1039 <primary sortas="c-libkadm5srv">libkadm5srv. [so,a]</primary>1042 <primary sortas="c-libkadm5srv">libkadm5srv.{so,a}</primary> 1040 1043 </indexterm> 1041 1044 </listitem> … … 1043 1046 1044 1047 <varlistentry id="libkafs"> 1045 <term><filename class='libraryfile'>libkafs. [so,a]</filename></term>1048 <term><filename class='libraryfile'>libkafs.{so,a}</filename></term> 1046 1049 <listitem> 1047 1050 <para>contains the functions required to authenticated to AFS.</para> 1048 1051 <indexterm zone="heimdal libkafs"> 1049 <primary sortas="c-libkafs">libkafs. [so,a]</primary>1052 <primary sortas="c-libkafs">libkafs.{so,a}</primary> 1050 1053 </indexterm> 1051 1054 </listitem> … … 1053 1056 1054 1057 <varlistentry id="libkrb5"> 1055 <term><filename class='libraryfile'>libkrb5. [so,a]</filename></term>1058 <term><filename class='libraryfile'>libkrb5.{so,a}</filename></term> 1056 1059 <listitem> 1057 1060 <para>is an all-purpose Kerberos 5 library.</para> 1058 1061 <indexterm zone="heimdal libkrb5"> 1059 <primary sortas="c-libkrb5">libkrb5. [so,a]</primary>1062 <primary sortas="c-libkrb5">libkrb5.{so,a}</primary> 1060 1063 </indexterm> 1061 1064 </listitem> … … 1063 1066 1064 1067 <varlistentry id="libotp"> 1065 <term><filename class='libraryfile'>libotp. [so,a]</filename></term>1068 <term><filename class='libraryfile'>libotp.{so,a}</filename></term> 1066 1069 <listitem> 1067 1070 <para>contains the functions required to handle authenticating 1068 1071 one time passwords.</para> 1069 1072 <indexterm zone="heimdal libotp"> 1070 <primary sortas="c-libotp">libotp. [so,a]</primary>1073 <primary sortas="c-libotp">libotp.{so,a}</primary> 1071 1074 </indexterm> 1072 1075 </listitem> … … 1074 1077 1075 1078 <varlistentry id="libroken"> 1076 <term><filename class='libraryfile'>libroken. [so,a]</filename></term>1079 <term><filename class='libraryfile'>libroken.{so,a}</filename></term> 1077 1080 <listitem> 1078 1081 <para>is a library containing Kerberos 5 compatibility 1079 1082 functions.</para> 1080 1083 <indexterm zone="heimdal libroken"> 1081 <primary sortas="c-libroken">libroken. [so,a]</primary>1084 <primary sortas="c-libroken">libroken.{so,a}</primary> 1082 1085 </indexterm> 1083 1086 </listitem> -
postlfs/security/iptables.xml
r0e2aa08 r3597eb6 63 63 </listitem> 64 64 </itemizedlist> 65 66 <para condition="html" role="usernotes">User Notes: 67 <ulink url="&blfs-wiki;/iptables"/></para> 65 68 66 69 </sect2> -
postlfs/security/linux-pam.xml
r0e2aa08 r3597eb6 85 85 <ulink url="http://sourceforge.net/projects/sgmltools-lite/">sgmltools-lite</ulink></para> 86 86 87 <para condition="html" role="usernotes">User Notes: 88 <ulink url="&blfs-wiki;/linux-pam"/></para> 89 87 90 </sect2> 88 91 … … 246 249 <seglistitem> 247 250 <seg>pam_tally</seg> 248 <seg>libpam. [so,a], libpamc.[so,a], and libpam_misc.[so,a]</seg>251 <seg>libpam.{so,a}, libpamc.{so,a}, and libpam_misc.{so,a}</seg> 249 252 <seg>/etc/pam.d, /etc/security, /lib/security and 250 253 /usr/include/security</seg> … … 269 272 270 273 <varlistentry id="libpam"> 271 <term><filename class='libraryfile'>libpam. [so,a]</filename></term>274 <term><filename class='libraryfile'>libpam.{so,a}</filename></term> 272 275 <listitem> 273 276 <para>provides the interfaces between applications and the 274 277 PAM modules.</para> 275 278 <indexterm zone="linux-pam libpam"> 276 <primary sortas="c-libpam">libpam. [so,a]</primary>279 <primary sortas="c-libpam">libpam.{so,a}</primary> 277 280 </indexterm> 278 281 </listitem> -
postlfs/security/mitkrb.xml
r0e2aa08 r3597eb6 78 78 </note> 79 79 80 <para condition="html" role="usernotes">User Notes: 81 <ulink url="&blfs-wiki;/mitkrb"/></para> 82 80 83 </sect2> 81 84 … … 208 211 209 212 [libdefaults] 210 default_realm = <replaceable> [LFS.ORG]</replaceable>213 default_realm = <replaceable><LFS.ORG></replaceable> 211 214 encrypt = true 212 215 213 216 [realms] 214 <replaceable> [LFS.ORG]</replaceable> = {215 kdc = <replaceable> [belgarath.lfs.org]</replaceable>216 admin_server = <replaceable> [belgarath.lfs.org]</replaceable>217 <replaceable><LFS.ORG></replaceable> = { 218 kdc = <replaceable><belgarath.lfs.org></replaceable> 219 admin_server = <replaceable><belgarath.lfs.org></replaceable> 217 220 } 218 221 219 222 [domain_realm] 220 .<replaceable> [lfs.org]</replaceable> = <replaceable>[LFS.ORG]</replaceable>223 .<replaceable><lfs.org></replaceable> = <replaceable><LFS.ORG></replaceable> 221 224 222 225 [logging] … … 229 232 230 233 <para>You will need to substitute your domain and proper hostname 231 for the occurances of the <replaceable> [belgarath]</replaceable> and232 <replaceable> [lfs.org]</replaceable> names.</para>234 for the occurances of the <replaceable><belgarath></replaceable> and 235 <replaceable><lfs.org></replaceable> names.</para> 233 236 234 237 <para><option>default_realm</option> should be the name of your … … 250 253 <para>Create the KDC database:</para> 251 254 252 <screen role="root"><userinput>kdb5_util create -r <replaceable> [LFS.ORG]</replaceable> -s</userinput></screen>255 <screen role="root"><userinput>kdb5_util create -r <replaceable><LFS.ORG></replaceable> -s</userinput></screen> 253 256 254 257 <para>Now you should populate the database with principles … … 258 261 <screen role="root"><userinput>kadmin.local 259 262 <prompt>kadmin:</prompt> add_policy dict-only 260 <prompt>kadmin:</prompt> addprinc -policy dict-only <replaceable> [loginname]</replaceable></userinput></screen>263 <prompt>kadmin:</prompt> addprinc -policy dict-only <replaceable><loginname></replaceable></userinput></screen> 261 264 262 265 <para>The KDC server and any machine running kerberized 263 266 server daemons must have a host key installed:</para> 264 267 265 <screen role='root'><userinput><prompt>kadmin:</prompt> addprinc -randkey host/<replaceable> [belgarath.lfs.org]</replaceable></userinput></screen>268 <screen role='root'><userinput><prompt>kadmin:</prompt> addprinc -randkey host/<replaceable><belgarath.lfs.org></replaceable></userinput></screen> 266 269 267 270 <para>After choosing the defaults when prompted, you will have to 268 271 export the data to a keytab file:</para> 269 272 270 <screen role='root'><userinput><prompt>kadmin:</prompt> ktadd host/<replaceable> [belgarath.lfs.org]</replaceable></userinput></screen>273 <screen role='root'><userinput><prompt>kadmin:</prompt> ktadd host/<replaceable><belgarath.lfs.org></replaceable></userinput></screen> 271 274 272 275 <para>This should have created a file in … … 281 284 way you created the host principles. Below is an example:</para> 282 285 283 <screen role='root'><userinput><prompt>kadmin:</prompt> addprinc -randkey ftp/<replaceable> [belgarath.lfs.org]</replaceable>284 <prompt>kadmin:</prompt> ktadd ftp/<replaceable> [belgarath.lfs.org]</replaceable></userinput></screen>286 <screen role='root'><userinput><prompt>kadmin:</prompt> addprinc -randkey ftp/<replaceable><belgarath.lfs.org></replaceable> 287 <prompt>kadmin:</prompt> ktadd ftp/<replaceable><belgarath.lfs.org></replaceable></userinput></screen> 285 288 286 289 <para>Exit the <command>kadmin</command> program (use … … 293 296 <para>Attempt to get a ticket with the following command:</para> 294 297 295 <screen><userinput>kinit <replaceable> [loginname]</replaceable></userinput></screen>298 <screen><userinput>kinit <replaceable><loginname></replaceable></userinput></screen> 296 299 297 300 <para>You will be prompted for the password you created. After you … … 387 390 rsh, sclient, sim_client, sim_server, sserver, telnet, telnetd, 388 391 uuclient, uuserver, v5passwd, and v5passwdd</seg> 389 <seg>libcom_err. [so,a], libdes425.[so,a], libgssapi.[so,a],390 libgssrpc. [so,a], libkadm5clnt.[so,a], libkadm5srv.[so,a],391 libkdb5. [so,a], libkrb5.[so,a], and libkrb4.[so,a]</seg>392 <seg>libcom_err.{so,a}, libdes425.{so,a}, libgssapi.{so,a}, 393 libgssrpc.{so,a}, libkadm5clnt.{so,a}, libkadm5srv.{so,a}, 394 libkdb5.{so,a}, libkrb5.{so,a}, and libkrb4.{so,a}</seg> 392 395 <seg>/usr/include/kerberosIV and /var/lib/krb5kdc</seg> 393 396 </seglistitem> … … 675 678 676 679 <varlistentry id="libcom_err"> 677 <term><filename class='libraryfile'>libcom_err. [so,a]</filename></term>680 <term><filename class='libraryfile'>libcom_err.{so,a}</filename></term> 678 681 <listitem> 679 682 <para>implements the Kerberos library error code.</para> 680 683 <indexterm zone="mitkrb libcom_err"> 681 <primary sortas="c-libcom_err">libcom_err. [so,a]</primary>684 <primary sortas="c-libcom_err">libcom_err.{so,a}</primary> 682 685 </indexterm> 683 686 </listitem> … … 685 688 686 689 <varlistentry id="libgssapi-mitkrb"> 687 <term><filename class='libraryfile'>libgssapi. [so,a]</filename></term>690 <term><filename class='libraryfile'>libgssapi.{so,a}</filename></term> 688 691 <listitem> 689 692 <para>contain the Generic Security Service Application … … 693 696 portability of applications to different environments.</para> 694 697 <indexterm zone="mitkrb libgssapi"> 695 <primary sortas="c-libgssapi">libgssapi. [so,a]</primary>698 <primary sortas="c-libgssapi">libgssapi.{so,a}</primary> 696 699 </indexterm> 697 700 </listitem> … … 699 702 700 703 <varlistentry id="libkadm5clnt-mitkrb"> 701 <term><filename class='libraryfile'>libkadm5clnt. [so,a]</filename></term>704 <term><filename class='libraryfile'>libkadm5clnt.{so,a}</filename></term> 702 705 <listitem> 703 706 <para>contains the administrative authentication and password 704 707 checking functions required by Kerberos 5 client-side programs.</para> 705 708 <indexterm zone="mitkrb libkadm5clnt"> 706 <primary sortas="c-libkadm5clnt">libkadm5clnt. [so,a]</primary>709 <primary sortas="c-libkadm5clnt">libkadm5clnt.{so,a}</primary> 707 710 </indexterm> 708 711 </listitem> … … 710 713 711 714 <varlistentry id="libkadm5srv-mitkrb"> 712 <term><filename class='libraryfile'>libkadm5srv. [so,a]</filename></term>715 <term><filename class='libraryfile'>libkadm5srv.{so,a}</filename></term> 713 716 <listitem> 714 717 <para>contain the administrative authentication and password 715 718 checking functions required by Kerberos 5 servers.</para> 716 719 <indexterm zone="mitkrb libkadm5srv"> 717 <primary sortas="c-libkadm5srv">libkadm5srv. [so,a]</primary>720 <primary sortas="c-libkadm5srv">libkadm5srv.{so,a}</primary> 718 721 </indexterm> 719 722 </listitem> … … 721 724 722 725 <varlistentry id="libkdb5"> 723 <term><filename class='libraryfile'>libkdb5. [so,a]</filename></term>726 <term><filename class='libraryfile'>libkdb5.{so,a}</filename></term> 724 727 <listitem> 725 728 <para>is a Kerberos 5 authentication/authorization database 726 729 access library.</para> 727 730 <indexterm zone="mitkrb libkdb5"> 728 <primary sortas="c-libkdb5">libkdb5. [so,a]</primary>731 <primary sortas="c-libkdb5">libkdb5.{so,a}</primary> 729 732 </indexterm> 730 733 </listitem> … … 732 735 733 736 <varlistentry id="libkrb5-mitkrb"> 734 <term><filename class='libraryfile'>libkrb5. [so,a]</filename></term>737 <term><filename class='libraryfile'>libkrb5.{so,a}</filename></term> 735 738 <listitem> 736 739 <para>is an all-purpose Kerberos 5 library.</para> 737 740 <indexterm zone="mitkrb libkrb5"> 738 <primary sortas="c-libkrb5">libkrb5. [so,a]</primary>741 <primary sortas="c-libkrb5">libkrb5.{so,a}</primary> 739 742 </indexterm> 740 743 </listitem> -
postlfs/security/nss.xml
r0e2aa08 r3597eb6 92 92 --> 93 93 94 <para condition="html" role="usernotes">User Notes: 95 <ulink url="&blfs-wiki;/nss"/></para> 96 94 97 </sect2> 95 98 … … 124 127 <screen><userinput>bash 125 128 126 export DOMSUF=<replaceable> [validdomain.name]</replaceable> &&129 export DOMSUF=<replaceable><validdomain.name></replaceable> && 127 130 export PATH=$PATH:$WORKINGDIR/mozilla/dist/$NSS_LINUXDIR/bin && 128 131 export TEST_RESULTSDIR=$WORKINGDIR/mozilla/tests_results/security && -
postlfs/security/openssl.xml
r0e2aa08 r3597eb6 158 158 <seglistitem> 159 159 <seg>c_rehash, openssl, and openssl_fips_fingerprint</seg> 160 <seg>libcrypto. [so,a] and libssl.[so,a]</seg>160 <seg>libcrypto.{so,a} and libssl.{so,a}</seg> 161 161 <seg>/etc/ssl and /usr/include/ssl</seg> 162 162 </seglistitem> … … 194 194 195 195 <varlistentry id="libcrypto"> 196 <term><filename class='libraryfile'>libcrypto. [so,a]</filename></term>196 <term><filename class='libraryfile'>libcrypto.{so,a}</filename></term> 197 197 <listitem> 198 198 <para>implements a wide range of cryptographic algorithms used in … … 203 203 and other cryptographic standards.</para> 204 204 <indexterm zone="openssl libcrypto"> 205 <primary sortas="c-libcrypto">libcrypto. [so,a]</primary>205 <primary sortas="c-libcrypto">libcrypto.{so,a}</primary> 206 206 </indexterm> 207 207 </listitem> … … 209 209 210 210 <varlistentry id="libssl"> 211 <term><filename class='libraryfile'>libssl. [so,a]</filename></term>211 <term><filename class='libraryfile'>libssl.{so,a}</filename></term> 212 212 <listitem> 213 213 <para>implements the Secure Sockets Layer (SSL v2/v3) and Transport … … 215 215 on which can be found by running <command>man 3 ssl</command>.</para> 216 216 <indexterm zone="openssl libssl"> 217 <primary sortas="c-libssl">libssl. [so,a]</primary>217 <primary sortas="c-libssl">libssl.{so,a}</primary> 218 218 </indexterm> 219 219 </listitem> -
postlfs/security/shadow.xml
r0e2aa08 r3597eb6 81 81 <para role="required"><xref linkend="linux-pam"/> and/or 82 82 <xref linkend="cracklib"/></para> 83 84 <para condition="html" role="usernotes">User Notes: 85 <ulink url="&blfs-wiki;/shadow"/></para> 83 86 84 87 </sect2> -
postlfs/security/stunnel.xml
r0e2aa08 r3597eb6 72 72 <bridgehead renderas="sect4">Optional</bridgehead> 73 73 <para role="optional"><xref linkend="tcpwrappers"/></para> 74 75 <para condition="html" role="usernotes">User Notes: 76 <ulink url="&blfs-wiki;/stunnel"/></para> 74 77 75 78 </sect2> … … 101 104 102 105 <screen><literal>-----BEGIN RSA PRIVATE KEY----- 103 <replaceable> [many encrypted lines of unencrypted key]</replaceable>106 <replaceable><many encrypted lines of unencrypted key></replaceable> 104 107 -----END RSA PRIVATE KEY----- 105 108 -----BEGIN CERTIFICATE----- 106 <replaceable> [many encrypted lines of certificate]</replaceable>109 <replaceable><many encrypted lines of certificate></replaceable> 107 110 -----END CERTIFICATE-----</literal></screen> 108 111 </note> … … 201 204 configuration file. The format is as follows:</para> 202 205 203 <screen><literal>[<replaceable> [service]</replaceable>]204 accept = <replaceable> [hostname:portnumber]</replaceable>205 connect = <replaceable> [hostname:portnumber]</replaceable></literal></screen>206 <screen><literal>[<replaceable><service></replaceable>] 207 accept = <replaceable><hostname:portnumber></replaceable> 208 connect = <replaceable><hostname:portnumber></replaceable></literal></screen> 206 209 207 210 <para>If you use <application>Stunnel</application> to encrypt a daemon 208 211 started from <command>[x]inetd</command>, you may need to disable that 209 212 daemon in the <filename>/etc/[x]inetd.conf</filename> file and enable a 210 corresponding <replaceable> [service]</replaceable>_stunnel service. You213 corresponding <replaceable><service></replaceable>_stunnel service. You 211 214 may have to add an appropriate entry in <filename>/etc/services</filename> 212 215 as well.</para> … … 264 267 <para> is a program designed to work as an SSL 265 268 encryption wrapper between remote clients and local 266 (<command> [x]inetd</command>-startable) or remote servers.</para>269 (<command>{x}inetd</command>-startable) or remote servers.</para> 267 270 <indexterm zone="stunnel stunnel-prog"> 268 271 <primary sortas="b-stunnel">stunnel</primary> -
postlfs/security/sudo.xml
r0e2aa08 r3597eb6 75 75 --> 76 76 77 <para condition="html" role="usernotes">User Notes: 78 <ulink url="&blfs-wiki;/sudo"/></para> 79 77 80 </sect2> 78 81 -
postlfs/security/tripwire.xml
r0e2aa08 r3597eb6 63 63 <bridgehead renderas="sect4">Optional</bridgehead> 64 64 <para role="optional">MTA (See <xref linkend="server-mail"/>)</para> 65 66 <para condition="html" role="usernotes">User Notes: 67 <ulink url="&blfs-wiki;/tripwire"/></para> 65 68 66 69 </sect2> … … 185 188 <systemitem class='username'>root</systemitem> user, type 186 189 in the following command making the appropriate substitutions for 187 <replaceable> [?]</replaceable>:</para>190 <replaceable><?></replaceable>:</para> 188 191 189 192 <screen role="root"><userinput>tripwire --update -twrfile \ 190 /var/lib/tripwire/report/linux-<replaceable> [???????]</replaceable>-<replaceable>[??????]</replaceable>.twr</userinput></screen>193 /var/lib/tripwire/report/linux-<replaceable><???????></replaceable>-<replaceable><??????></replaceable>.twr</userinput></screen> 191 194 192 195 <para>You will be placed into <application>vim</application> with a copy -
postlfs/shells/ash.xml
r0e2aa08 r3597eb6 72 72 </listitem> 73 73 </itemizedlist> 74 75 <para condition="html" role="usernotes">User Notes: 76 <ulink url="&blfs-wiki;/ash"/></para> 74 77 75 78 </sect2> -
postlfs/shells/tcsh.xml
r0e2aa08 r3597eb6 71 71 </listitem> 72 72 </itemizedlist> 73 74 <para condition="html" role="usernotes">User Notes: 75 <ulink url="&blfs-wiki;/tcsh"/></para> 73 76 74 77 </sect2> -
postlfs/shells/zsh.xml
r0e2aa08 r3597eb6 66 66 <bridgehead renderas="sect4">Optional</bridgehead> 67 67 <para role="optional"><xref linkend="pcre"/></para> 68 69 <para condition="html" role="usernotes">User Notes: 70 <ulink url="&blfs-wiki;/zsh"/></para> 68 71 69 72 </sect2>
Note:
See TracChangeset
for help on using the changeset viewer.