Small fixes in documentation.

This commit is contained in:
Guus Sliepen 2003-10-11 14:42:30 +00:00
parent ffb7327c20
commit e88ea7277a
3 changed files with 12 additions and 10 deletions

View file

@ -246,6 +246,7 @@ Any cipher supported by OpenSSL is recognised.
Furthermore, specifying
.Qq none
will turn off packet encryption.
It is best to use only those ciphers which support CBC mode.
.It Va Compression Li = Ar level Pq 0
This option sets the level of compression used for UDP packets.
Possible values are 0 (off), 1 (fast zlib) and any integer up to 9 (best zlib),
@ -314,7 +315,7 @@ Setting this options also implicitly sets IndirectData.
.Sh SCRIPTS
Apart from reading the server and host configuration files,
tinc can also run scripts at certain moments.
On Windows (not Cygwin), the scripts should have the extension
Under Windows (not Cygwin), the scripts should have the extension
.Pa .bat .
.Bl -tag -width indent
.It Pa @sysconfdir@/tinc/ Ns Ar NETNAME Ns Pa /tinc-up

View file

@ -1,5 +1,5 @@
\input texinfo @c -*-texinfo-*-
@c $Id: tinc.texi,v 1.8.4.45 2003/10/09 21:33:15 guus Exp $
@c $Id: tinc.texi,v 1.8.4.46 2003/10/11 14:42:29 guus Exp $
@c %**start of header
@setfilename tinc.info
@settitle tinc Manual
@ -20,7 +20,7 @@ Copyright @copyright{} 1998-2003 Ivo Timmermans
<ivo@@o2w.nl>, Guus Sliepen <guus@@sliepen.eu.org> and
Wessel Dankers <wsl@@nl.linux.org>.
$Id: tinc.texi,v 1.8.4.45 2003/10/09 21:33:15 guus Exp $
$Id: tinc.texi,v 1.8.4.46 2003/10/11 14:42:29 guus Exp $
Permission is granted to make and distribute verbatim copies of this
manual provided the copyright notice and this permission notice are
@ -47,7 +47,7 @@ Copyright @copyright{} 1998-2003 Ivo Timmermans
<ivo@@o2w.nl>, Guus Sliepen <guus@@sliepen.eu.org> and
Wessel Dankers <wsl@@nl.linux.org>.
$Id: tinc.texi,v 1.8.4.45 2003/10/09 21:33:15 guus Exp $
$Id: tinc.texi,v 1.8.4.46 2003/10/11 14:42:29 guus Exp $
Permission is granted to make and distribute verbatim copies of this
manual provided the copyright notice and this permission notice are
@ -159,7 +159,7 @@ both the receiving and sending end, it has become largely
runtime-configurable---in short, it has become a full-fledged
professional package.
@cindex Traditional VPNs
@cindex traditional VPNs
@cindex scalability
Tinc also allows more than two sites to connect to eachother and form a single VPN.
Traditionally VPNs are created by making tunnels, which only have two endpoints.
@ -1525,6 +1525,7 @@ and look in the syslog to find out what the problems are.
* Runtime options::
* Solving problems::
* Error messages::
* Sending bug reports::
@end menu
@ -2134,7 +2135,7 @@ an attacker) in the beginning of the encrypted stream.
@c ==================================================================
@node Encryption of network packets
@subsection Encryption of network packet
@subsection Encryption of network packets
@cindex encryption
A data packet can only be sent if the encryption key is known to both
@ -2163,7 +2164,7 @@ the MACLength configuration variable.
@c ==================================================================
@node Security issues
@section Security issues
@subsection Security issues
In August 2000, we discovered the existence of a security hole in all versions
of tinc up to and including 1.0pre2. This had to do with the way we exchanged
@ -2306,13 +2307,13 @@ Adding routes to IPv6 subnets:
@menu
* Contact Information::
* Contact information::
* Authors::
@end menu
@c ==================================================================
@node Contact Information
@node Contact information
@section Contact information
@cindex website

View file

@ -130,7 +130,7 @@ Each level inherits all messages of the previous level:
This will log a message indicating
.Nm
has started along with a version number.
It will also any serious error.
It will also log any serious error.
.It 1
This will log all connections that are made with other tinc daemons.
.It 2