Ignore:
Timestamp:
04/07/2003 09:14:53 PM (21 years ago)
Author:
Larry Lawrence <larry@…>
Branches:
10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 12.0, 12.1, 6.0, 6.1, 6.2, 6.2.0, 6.2.0-rc1, 6.2.0-rc2, 6.3, 6.3-rc1, 6.3-rc2, 6.3-rc3, 7.10, 7.4, 7.5, 7.6, 7.6-blfs, 7.6-systemd, 7.7, 7.8, 7.9, 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, basic, bdubbs/svn, elogind, gnome, kde5-13430, kde5-14269, kde5-14686, kea, ken/TL2024, ken/inkscape-core-mods, ken/tuningfonts, krejzi/svn, lazarus, lxqt, nosym, perl-modules, plabs/newcss, plabs/python-mods, python3.11, qt5new, rahul/power-profiles-daemon, renodr/vulkan-addition, systemd-11177, systemd-13485, trunk, upgradedb, v1_0, v5_0, v5_0-pre1, v5_1, v5_1-pre1, xry111/intltool, xry111/llvm18, xry111/soup3, xry111/test-20220226, xry111/xf86-video-removal
Children:
b77b166f
Parents:
0cfd5d9
Message:

spellcheck pass

git-svn-id: svn://svn.linuxfromscratch.org/BLFS/trunk/BOOK@832 af4574ff-66df-0310-9fd7-8a98e5e911e0

File:
1 edited

Legend:

Unmodified
Added
Removed
  • postlfs/security/firewalling/busybox.xml

    r0cfd5d9 r5628618e  
    55but in this case you want to offer some services to your intranet.
    66Examples of this can be when you want to admin your box from another host
    7 on your intranet or use it as a proxy or a nameserver. Note: Outlining a true
     7on your intranet or use it as a proxy or a name server. Note: Outlining a true
    88concept howto protect a server that offers services on the internet
    99goes far beyond the scope of this document,
     
    4949&nbsp;&nbsp;&nbsp;-j ACCEPT</screen></para></listitem>
    5050
    51 <listitem><para>Your caching-nameserver (e.g., dnscache) does its
     51<listitem><para>Your caching name server (e.g., dnscache) does its
    5252lookups via udp:</para>
    5353<para><screen>iptables -A OUTPUT        -p udp --dport 53                       -j ACCEPT
     
    6666querying an identd on your box for your username for logging.
    6767Although there's really no harm in this, having an identd running is not
    68 recommended because some implementions are known to be vulnerable.</para>
     68recommended because some implementations are known to be vulnerable.</para>
    6969
    7070<para>To avoid these delays you could reject the requests
Note: See TracChangeset for help on using the changeset viewer.