Spelling fixes for etc/
This commit is contained in:
parent
38494eff98
commit
081dc98788
|
@ -3,7 +3,7 @@
|
||||||
#
|
#
|
||||||
# TrustedBSD MAC userland policy configuration file. Kernel modules
|
# TrustedBSD MAC userland policy configuration file. Kernel modules
|
||||||
# export label information, and mac.conf indicates to userland
|
# export label information, and mac.conf indicates to userland
|
||||||
# applications what defaults they should use in the absense of any
|
# applications what defaults they should use in the absence of any
|
||||||
# other user-provided information.
|
# other user-provided information.
|
||||||
#
|
#
|
||||||
|
|
||||||
|
|
|
@ -94,7 +94,7 @@ zone "." { type hint; file "/etc/namedb/named.root"; };
|
||||||
|
|
||||||
As documented at http://dns.icann.org/services/axfr/ these zones:
|
As documented at http://dns.icann.org/services/axfr/ these zones:
|
||||||
"." (the root), ARPA, IN-ADDR.ARPA, IP6.ARPA, and ROOT-SERVERS.NET
|
"." (the root), ARPA, IN-ADDR.ARPA, IP6.ARPA, and ROOT-SERVERS.NET
|
||||||
are availble for AXFR from these servers on IPv4 and IPv6:
|
are available for AXFR from these servers on IPv4 and IPv6:
|
||||||
xfr.lax.dns.icann.org, xfr.cjr.dns.icann.org
|
xfr.lax.dns.icann.org, xfr.cjr.dns.icann.org
|
||||||
*/
|
*/
|
||||||
/*
|
/*
|
||||||
|
|
|
@ -139,7 +139,7 @@ ifconfig_up()
|
||||||
_cfg=0
|
_cfg=0
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# backward compatiblity: $ipv6_ifconfig_IF
|
# backward compatibility: $ipv6_ifconfig_IF
|
||||||
ifconfig_args=`get_if_var $1 ipv6_ifconfig_IF`
|
ifconfig_args=`get_if_var $1 ipv6_ifconfig_IF`
|
||||||
if [ -n "${ifconfig_args}" ]; then
|
if [ -n "${ifconfig_args}" ]; then
|
||||||
warn "\$ipv6_ifconfig_$1 is obsolete." \
|
warn "\$ipv6_ifconfig_$1 is obsolete." \
|
||||||
|
|
|
@ -22,7 +22,7 @@ bgfsck_start ()
|
||||||
background_fsck_delay=0
|
background_fsck_delay=0
|
||||||
fi
|
fi
|
||||||
if [ ${background_fsck_delay} -lt 0 ]; then
|
if [ ${background_fsck_delay} -lt 0 ]; then
|
||||||
echo "Background file system checks delayed indefinitly"
|
echo "Background file system checks delayed indefinitely"
|
||||||
return 0
|
return 0
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
|
|
@ -46,7 +46,7 @@ fi
|
||||||
# client - will try to protect just this machine
|
# client - will try to protect just this machine
|
||||||
# simple - will try to protect a whole network
|
# simple - will try to protect a whole network
|
||||||
# closed - totally disables IP services except via lo0 interface
|
# closed - totally disables IP services except via lo0 interface
|
||||||
# workstation - will try to protect just this machine using statefull
|
# workstation - will try to protect just this machine using stateful
|
||||||
# firewalling. See below for rc.conf variables used
|
# firewalling. See below for rc.conf variables used
|
||||||
# UNKNOWN - disables the loading of firewall rules.
|
# UNKNOWN - disables the loading of firewall rules.
|
||||||
# filename - will load the rules in the given filename (full path required)
|
# filename - will load the rules in the given filename (full path required)
|
||||||
|
@ -105,7 +105,7 @@ setup_ipv6_mandatory () {
|
||||||
${fwcmd} add pass ipv6-icmp from fe80::/10 to fe80::/10
|
${fwcmd} add pass ipv6-icmp from fe80::/10 to fe80::/10
|
||||||
${fwcmd} add pass ipv6-icmp from fe80::/10 to ff02::/16
|
${fwcmd} add pass ipv6-icmp from fe80::/10 to ff02::/16
|
||||||
|
|
||||||
# Allow ICMPv6 destination unreach
|
# Allow ICMPv6 destination unreachable
|
||||||
${fwcmd} add pass ipv6-icmp from any to any icmp6types 1
|
${fwcmd} add pass ipv6-icmp from any to any icmp6types 1
|
||||||
|
|
||||||
# Allow NS/NA/toobig (don't filter it out)
|
# Allow NS/NA/toobig (don't filter it out)
|
||||||
|
@ -437,7 +437,7 @@ case ${firewall_type} in
|
||||||
# default denied packets should be
|
# default denied packets should be
|
||||||
# logged (in /var/log/security).
|
# logged (in /var/log/security).
|
||||||
# firewall_nologports: List of TCP/UDP ports for which
|
# firewall_nologports: List of TCP/UDP ports for which
|
||||||
# denied incomming packets are not
|
# denied incoming packets are not
|
||||||
# logged.
|
# logged.
|
||||||
|
|
||||||
# Allow packets for which a state has been built.
|
# Allow packets for which a state has been built.
|
||||||
|
@ -505,7 +505,7 @@ case ${firewall_type} in
|
||||||
${fwcmd} add deny { tcp or udp } from any to any $i in
|
${fwcmd} add deny { tcp or udp } from any to any $i in
|
||||||
done
|
done
|
||||||
|
|
||||||
# Broadcasts and muticasts
|
# Broadcasts and multicasts
|
||||||
${fwcmd} add deny ip from any to 255.255.255.255
|
${fwcmd} add deny ip from any to 255.255.255.255
|
||||||
${fwcmd} add deny ip from any to 224.0.0.0/24 in # XXX
|
${fwcmd} add deny ip from any to 224.0.0.0/24 in # XXX
|
||||||
|
|
||||||
|
@ -513,7 +513,7 @@ case ${firewall_type} in
|
||||||
${fwcmd} add deny udp from any to any 520 in
|
${fwcmd} add deny udp from any to any 520 in
|
||||||
|
|
||||||
# Noise from webbrowsing.
|
# Noise from webbrowsing.
|
||||||
# The statefull filter is a bit agressive, and will cause some
|
# The stateful filter is a bit aggressive, and will cause some
|
||||||
# connection teardowns to be logged.
|
# connection teardowns to be logged.
|
||||||
${fwcmd} add deny tcp from any 80,443 to any 1024-65535 in
|
${fwcmd} add deny tcp from any 80,443 to any 1024-65535 in
|
||||||
|
|
||||||
|
|
|
@ -46,16 +46,16 @@
|
||||||
# bcast/${ipba} same as above
|
# bcast/${ipba} same as above
|
||||||
# ${class} where ${class} is a list of directories supplied by
|
# ${class} where ${class} is a list of directories supplied by
|
||||||
# bootp/dhcp through the T134 option.
|
# bootp/dhcp through the T134 option.
|
||||||
# ${ipba} and ${class} are typicall used to configure features
|
# ${ipba} and ${class} are typically used to configure features
|
||||||
# for group of diskless clients, or even individual features;
|
# for group of diskless clients, or even individual features;
|
||||||
# ${ip} where ${ip} is the machine's assigned IP address, typically
|
# ${ip} where ${ip} is the machine's assigned IP address, typically
|
||||||
# used to set host-specific features;
|
# used to set host-specific features;
|
||||||
# ip/${ip} same as above
|
# ip/${ip} same as above
|
||||||
#
|
#
|
||||||
# Template directories are scanned in the order they are listed above,
|
# Template directories are scanned in the order they are listed above,
|
||||||
# with each sucessive directory overriding (merged into) the previous one;
|
# with each successive directory overriding (merged into) the previous one;
|
||||||
# non-existing directories are ignored. The subdirectory forms exist to
|
# non-existing directories are ignored. The subdirectory forms exist to
|
||||||
# help keep the top level /conf managable in large installations.
|
# help keep the top level /conf manageable in large installations.
|
||||||
#
|
#
|
||||||
# The existence of a directory /conf/T/M causes this script to create a
|
# The existence of a directory /conf/T/M causes this script to create a
|
||||||
# memory filesystem mounted as /M on the client.
|
# memory filesystem mounted as /M on the client.
|
||||||
|
|
|
@ -1280,7 +1280,7 @@ backup_file()
|
||||||
# Make a symbolic link 'link' to src from basedir. If the
|
# Make a symbolic link 'link' to src from basedir. If the
|
||||||
# directory in which link is to be created does not exist
|
# directory in which link is to be created does not exist
|
||||||
# a warning will be displayed and an error will be returned.
|
# a warning will be displayed and an error will be returned.
|
||||||
# Returns 0 on sucess, 1 otherwise.
|
# Returns 0 on success, 1 otherwise.
|
||||||
#
|
#
|
||||||
make_symlink()
|
make_symlink()
|
||||||
{
|
{
|
||||||
|
|
|
@ -795,7 +795,7 @@ alpes 463/udp
|
||||||
kpasswd5 464/tcp # Kerberos (v5)
|
kpasswd5 464/tcp # Kerberos (v5)
|
||||||
kpasswd5 464/udp # Kerberos (v5)
|
kpasswd5 464/udp # Kerberos (v5)
|
||||||
#PROBLEMS!==============================================================
|
#PROBLEMS!==============================================================
|
||||||
# IANA has offically assigned these two ports as ``kpasswd''
|
# IANA has officially assigned these two ports as ``kpasswd''
|
||||||
#kpasswd 464/tcp # Kerberos (v5)
|
#kpasswd 464/tcp # Kerberos (v5)
|
||||||
#kpasswd 464/udp # Kerberos (v5)
|
#kpasswd 464/udp # Kerberos (v5)
|
||||||
#PROBLEMS!==============================================================
|
#PROBLEMS!==============================================================
|
||||||
|
@ -1275,8 +1275,8 @@ hcp-wismar 686/tcp #Hardware Control Protocol Wismar
|
||||||
hcp-wismar 686/udp #Hardware Control Protocol Wismar
|
hcp-wismar 686/udp #Hardware Control Protocol Wismar
|
||||||
asipregistry 687/tcp
|
asipregistry 687/tcp
|
||||||
asipregistry 687/udp
|
asipregistry 687/udp
|
||||||
realm-rusd 688/tcp #ApplianceWare managment protocol
|
realm-rusd 688/tcp #ApplianceWare management protocol
|
||||||
realm-rusd 688/udp #ApplianceWare managment protocol
|
realm-rusd 688/udp #ApplianceWare management protocol
|
||||||
nmap 689/tcp
|
nmap 689/tcp
|
||||||
nmap 689/udp
|
nmap 689/udp
|
||||||
vatp 690/tcp #Velazquez Application Transfer Protocol
|
vatp 690/tcp #Velazquez Application Transfer Protocol
|
||||||
|
@ -2392,7 +2392,7 @@ xdsxdm 6558/tcp
|
||||||
xdsxdm 6558/udp
|
xdsxdm 6558/udp
|
||||||
sane-port 6566/tcp #Scanner Access Now Easy (SANE) Control Port
|
sane-port 6566/tcp #Scanner Access Now Easy (SANE) Control Port
|
||||||
sane-port 6566/udp #Scanner Access Now Easy (SANE) Control Port
|
sane-port 6566/udp #Scanner Access Now Easy (SANE) Control Port
|
||||||
ircd 6667/tcp #Internet Relay Chat (unoffical)
|
ircd 6667/tcp #Internet Relay Chat (unofficial)
|
||||||
frc-hp 6704/sctp #ForCES HP (High Priority) channel
|
frc-hp 6704/sctp #ForCES HP (High Priority) channel
|
||||||
frc-mp 6705/sctp #ForCES MP (Medium Priority) channel
|
frc-mp 6705/sctp #ForCES MP (Medium Priority) channel
|
||||||
frc-lp 6706/sctp #ForCES LP (Low priority) channel
|
frc-lp 6706/sctp #ForCES LP (Low priority) channel
|
||||||
|
|
Loading…
Reference in New Issue