Small fixes in documentation.

This commit is contained in:
Guus Sliepen 2003-10-11 14:42:30 +00:00
parent ffb7327c20
commit e88ea7277a
3 changed files with 12 additions and 10 deletions

View file

@ -246,6 +246,7 @@ Any cipher supported by OpenSSL is recognised.
Furthermore, specifying Furthermore, specifying
.Qq none .Qq none
will turn off packet encryption. will turn off packet encryption.
It is best to use only those ciphers which support CBC mode.
.It Va Compression Li = Ar level Pq 0 .It Va Compression Li = Ar level Pq 0
This option sets the level of compression used for UDP packets. This option sets the level of compression used for UDP packets.
Possible values are 0 (off), 1 (fast zlib) and any integer up to 9 (best zlib), Possible values are 0 (off), 1 (fast zlib) and any integer up to 9 (best zlib),
@ -314,7 +315,7 @@ Setting this options also implicitly sets IndirectData.
.Sh SCRIPTS .Sh SCRIPTS
Apart from reading the server and host configuration files, Apart from reading the server and host configuration files,
tinc can also run scripts at certain moments. tinc can also run scripts at certain moments.
On Windows (not Cygwin), the scripts should have the extension Under Windows (not Cygwin), the scripts should have the extension
.Pa .bat . .Pa .bat .
.Bl -tag -width indent .Bl -tag -width indent
.It Pa @sysconfdir@/tinc/ Ns Ar NETNAME Ns Pa /tinc-up .It Pa @sysconfdir@/tinc/ Ns Ar NETNAME Ns Pa /tinc-up

View file

@ -1,5 +1,5 @@
\input texinfo @c -*-texinfo-*- \input texinfo @c -*-texinfo-*-
@c $Id: tinc.texi,v 1.8.4.45 2003/10/09 21:33:15 guus Exp $ @c $Id: tinc.texi,v 1.8.4.46 2003/10/11 14:42:29 guus Exp $
@c %**start of header @c %**start of header
@setfilename tinc.info @setfilename tinc.info
@settitle tinc Manual @settitle tinc Manual
@ -20,7 +20,7 @@ Copyright @copyright{} 1998-2003 Ivo Timmermans
<ivo@@o2w.nl>, Guus Sliepen <guus@@sliepen.eu.org> and <ivo@@o2w.nl>, Guus Sliepen <guus@@sliepen.eu.org> and
Wessel Dankers <wsl@@nl.linux.org>. Wessel Dankers <wsl@@nl.linux.org>.
$Id: tinc.texi,v 1.8.4.45 2003/10/09 21:33:15 guus Exp $ $Id: tinc.texi,v 1.8.4.46 2003/10/11 14:42:29 guus Exp $
Permission is granted to make and distribute verbatim copies of this Permission is granted to make and distribute verbatim copies of this
manual provided the copyright notice and this permission notice are manual provided the copyright notice and this permission notice are
@ -47,7 +47,7 @@ Copyright @copyright{} 1998-2003 Ivo Timmermans
<ivo@@o2w.nl>, Guus Sliepen <guus@@sliepen.eu.org> and <ivo@@o2w.nl>, Guus Sliepen <guus@@sliepen.eu.org> and
Wessel Dankers <wsl@@nl.linux.org>. Wessel Dankers <wsl@@nl.linux.org>.
$Id: tinc.texi,v 1.8.4.45 2003/10/09 21:33:15 guus Exp $ $Id: tinc.texi,v 1.8.4.46 2003/10/11 14:42:29 guus Exp $
Permission is granted to make and distribute verbatim copies of this Permission is granted to make and distribute verbatim copies of this
manual provided the copyright notice and this permission notice are manual provided the copyright notice and this permission notice are
@ -159,7 +159,7 @@ both the receiving and sending end, it has become largely
runtime-configurable---in short, it has become a full-fledged runtime-configurable---in short, it has become a full-fledged
professional package. professional package.
@cindex Traditional VPNs @cindex traditional VPNs
@cindex scalability @cindex scalability
Tinc also allows more than two sites to connect to eachother and form a single VPN. Tinc also allows more than two sites to connect to eachother and form a single VPN.
Traditionally VPNs are created by making tunnels, which only have two endpoints. Traditionally VPNs are created by making tunnels, which only have two endpoints.
@ -1525,6 +1525,7 @@ and look in the syslog to find out what the problems are.
* Runtime options:: * Runtime options::
* Solving problems:: * Solving problems::
* Error messages:: * Error messages::
* Sending bug reports::
@end menu @end menu
@ -2134,7 +2135,7 @@ an attacker) in the beginning of the encrypted stream.
@c ================================================================== @c ==================================================================
@node Encryption of network packets @node Encryption of network packets
@subsection Encryption of network packet @subsection Encryption of network packets
@cindex encryption @cindex encryption
A data packet can only be sent if the encryption key is known to both A data packet can only be sent if the encryption key is known to both
@ -2163,7 +2164,7 @@ the MACLength configuration variable.
@c ================================================================== @c ==================================================================
@node Security issues @node Security issues
@section Security issues @subsection Security issues
In August 2000, we discovered the existence of a security hole in all versions In August 2000, we discovered the existence of a security hole in all versions
of tinc up to and including 1.0pre2. This had to do with the way we exchanged of tinc up to and including 1.0pre2. This had to do with the way we exchanged
@ -2306,13 +2307,13 @@ Adding routes to IPv6 subnets:
@menu @menu
* Contact Information:: * Contact information::
* Authors:: * Authors::
@end menu @end menu
@c ================================================================== @c ==================================================================
@node Contact Information @node Contact information
@section Contact information @section Contact information
@cindex website @cindex website

View file

@ -130,7 +130,7 @@ Each level inherits all messages of the previous level:
This will log a message indicating This will log a message indicating
.Nm .Nm
has started along with a version number. has started along with a version number.
It will also any serious error. It will also log any serious error.
.It 1 .It 1
This will log all connections that are made with other tinc daemons. This will log all connections that are made with other tinc daemons.
.It 2 .It 2