Small fixes in documentation.
This commit is contained in:
parent
ffb7327c20
commit
e88ea7277a
3 changed files with 12 additions and 10 deletions
|
@ -246,6 +246,7 @@ Any cipher supported by OpenSSL is recognised.
|
||||||
Furthermore, specifying
|
Furthermore, specifying
|
||||||
.Qq none
|
.Qq none
|
||||||
will turn off packet encryption.
|
will turn off packet encryption.
|
||||||
|
It is best to use only those ciphers which support CBC mode.
|
||||||
.It Va Compression Li = Ar level Pq 0
|
.It Va Compression Li = Ar level Pq 0
|
||||||
This option sets the level of compression used for UDP packets.
|
This option sets the level of compression used for UDP packets.
|
||||||
Possible values are 0 (off), 1 (fast zlib) and any integer up to 9 (best zlib),
|
Possible values are 0 (off), 1 (fast zlib) and any integer up to 9 (best zlib),
|
||||||
|
@ -314,7 +315,7 @@ Setting this options also implicitly sets IndirectData.
|
||||||
.Sh SCRIPTS
|
.Sh SCRIPTS
|
||||||
Apart from reading the server and host configuration files,
|
Apart from reading the server and host configuration files,
|
||||||
tinc can also run scripts at certain moments.
|
tinc can also run scripts at certain moments.
|
||||||
On Windows (not Cygwin), the scripts should have the extension
|
Under Windows (not Cygwin), the scripts should have the extension
|
||||||
.Pa .bat .
|
.Pa .bat .
|
||||||
.Bl -tag -width indent
|
.Bl -tag -width indent
|
||||||
.It Pa @sysconfdir@/tinc/ Ns Ar NETNAME Ns Pa /tinc-up
|
.It Pa @sysconfdir@/tinc/ Ns Ar NETNAME Ns Pa /tinc-up
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
\input texinfo @c -*-texinfo-*-
|
\input texinfo @c -*-texinfo-*-
|
||||||
@c $Id: tinc.texi,v 1.8.4.45 2003/10/09 21:33:15 guus Exp $
|
@c $Id: tinc.texi,v 1.8.4.46 2003/10/11 14:42:29 guus Exp $
|
||||||
@c %**start of header
|
@c %**start of header
|
||||||
@setfilename tinc.info
|
@setfilename tinc.info
|
||||||
@settitle tinc Manual
|
@settitle tinc Manual
|
||||||
|
@ -20,7 +20,7 @@ Copyright @copyright{} 1998-2003 Ivo Timmermans
|
||||||
<ivo@@o2w.nl>, Guus Sliepen <guus@@sliepen.eu.org> and
|
<ivo@@o2w.nl>, Guus Sliepen <guus@@sliepen.eu.org> and
|
||||||
Wessel Dankers <wsl@@nl.linux.org>.
|
Wessel Dankers <wsl@@nl.linux.org>.
|
||||||
|
|
||||||
$Id: tinc.texi,v 1.8.4.45 2003/10/09 21:33:15 guus Exp $
|
$Id: tinc.texi,v 1.8.4.46 2003/10/11 14:42:29 guus Exp $
|
||||||
|
|
||||||
Permission is granted to make and distribute verbatim copies of this
|
Permission is granted to make and distribute verbatim copies of this
|
||||||
manual provided the copyright notice and this permission notice are
|
manual provided the copyright notice and this permission notice are
|
||||||
|
@ -47,7 +47,7 @@ Copyright @copyright{} 1998-2003 Ivo Timmermans
|
||||||
<ivo@@o2w.nl>, Guus Sliepen <guus@@sliepen.eu.org> and
|
<ivo@@o2w.nl>, Guus Sliepen <guus@@sliepen.eu.org> and
|
||||||
Wessel Dankers <wsl@@nl.linux.org>.
|
Wessel Dankers <wsl@@nl.linux.org>.
|
||||||
|
|
||||||
$Id: tinc.texi,v 1.8.4.45 2003/10/09 21:33:15 guus Exp $
|
$Id: tinc.texi,v 1.8.4.46 2003/10/11 14:42:29 guus Exp $
|
||||||
|
|
||||||
Permission is granted to make and distribute verbatim copies of this
|
Permission is granted to make and distribute verbatim copies of this
|
||||||
manual provided the copyright notice and this permission notice are
|
manual provided the copyright notice and this permission notice are
|
||||||
|
@ -159,7 +159,7 @@ both the receiving and sending end, it has become largely
|
||||||
runtime-configurable---in short, it has become a full-fledged
|
runtime-configurable---in short, it has become a full-fledged
|
||||||
professional package.
|
professional package.
|
||||||
|
|
||||||
@cindex Traditional VPNs
|
@cindex traditional VPNs
|
||||||
@cindex scalability
|
@cindex scalability
|
||||||
Tinc also allows more than two sites to connect to eachother and form a single VPN.
|
Tinc also allows more than two sites to connect to eachother and form a single VPN.
|
||||||
Traditionally VPNs are created by making tunnels, which only have two endpoints.
|
Traditionally VPNs are created by making tunnels, which only have two endpoints.
|
||||||
|
@ -1525,6 +1525,7 @@ and look in the syslog to find out what the problems are.
|
||||||
* Runtime options::
|
* Runtime options::
|
||||||
* Solving problems::
|
* Solving problems::
|
||||||
* Error messages::
|
* Error messages::
|
||||||
|
* Sending bug reports::
|
||||||
@end menu
|
@end menu
|
||||||
|
|
||||||
|
|
||||||
|
@ -2134,7 +2135,7 @@ an attacker) in the beginning of the encrypted stream.
|
||||||
|
|
||||||
@c ==================================================================
|
@c ==================================================================
|
||||||
@node Encryption of network packets
|
@node Encryption of network packets
|
||||||
@subsection Encryption of network packet
|
@subsection Encryption of network packets
|
||||||
@cindex encryption
|
@cindex encryption
|
||||||
|
|
||||||
A data packet can only be sent if the encryption key is known to both
|
A data packet can only be sent if the encryption key is known to both
|
||||||
|
@ -2163,7 +2164,7 @@ the MACLength configuration variable.
|
||||||
|
|
||||||
@c ==================================================================
|
@c ==================================================================
|
||||||
@node Security issues
|
@node Security issues
|
||||||
@section Security issues
|
@subsection Security issues
|
||||||
|
|
||||||
In August 2000, we discovered the existence of a security hole in all versions
|
In August 2000, we discovered the existence of a security hole in all versions
|
||||||
of tinc up to and including 1.0pre2. This had to do with the way we exchanged
|
of tinc up to and including 1.0pre2. This had to do with the way we exchanged
|
||||||
|
@ -2306,13 +2307,13 @@ Adding routes to IPv6 subnets:
|
||||||
|
|
||||||
|
|
||||||
@menu
|
@menu
|
||||||
* Contact Information::
|
* Contact information::
|
||||||
* Authors::
|
* Authors::
|
||||||
@end menu
|
@end menu
|
||||||
|
|
||||||
|
|
||||||
@c ==================================================================
|
@c ==================================================================
|
||||||
@node Contact Information
|
@node Contact information
|
||||||
@section Contact information
|
@section Contact information
|
||||||
|
|
||||||
@cindex website
|
@cindex website
|
||||||
|
|
|
@ -130,7 +130,7 @@ Each level inherits all messages of the previous level:
|
||||||
This will log a message indicating
|
This will log a message indicating
|
||||||
.Nm
|
.Nm
|
||||||
has started along with a version number.
|
has started along with a version number.
|
||||||
It will also any serious error.
|
It will also log any serious error.
|
||||||
.It 1
|
.It 1
|
||||||
This will log all connections that are made with other tinc daemons.
|
This will log all connections that are made with other tinc daemons.
|
||||||
.It 2
|
.It 2
|
||||||
|
|
Loading…
Reference in a new issue