Skip site navigation (1)Skip section navigation (2)
Date:      Fri,  2 May 2008 17:57:54 +0200
From:      "Gabor PALI" <pgj@FreeBSD.org>
To:        FreeBSD-gnats-submit@FreeBSD.org
Subject:   docs/123332: [patch] Fix <application> Tags for Racoon in Handbook Chapter 14.
Message-ID:  <481b3a04.0d375e0a.1d1b.ffffd72f@mx.google.com>
Resent-Message-ID: <200805021600.m42G08aK085285@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         123332
>Category:       docs
>Synopsis:       [patch] Fix <application> Tags for Racoon in Handbook Chapter 14.
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-doc
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          doc-bug
>Submitter-Id:   current-users
>Arrival-Date:   Fri May 02 16:00:08 UTC 2008
>Closed-Date:
>Last-Modified:
>Originator:     Gabor PALI
>Release:        FreeBSD 6.3-STABLE i386
>Organization:
>Environment:
System: FreeBSD disznohal 6.3-STABLE FreeBSD 6.3-STABLE #4: Fri Apr 4 23:29:43 CEST 2008 dezzy@disznohal:/usr/obj/usr/src/sys/GENERIC_ i386

>Description:
	<application> tags are missing for racoon in the FreeBSD Handbook,
	Chapter 14: Security. I created a patch to fix this.
	
>How-To-Repeat:

>Fix:

--- security.patch.1.diff begins here ---
Index: chapter.sgml
===================================================================
RCS file: /doc/en_US.ISO8859-1/books/handbook/security/chapter.sgml,v
retrieving revision 1.320
diff -u -r1.320 chapter.sgml
--- chapter.sgml	3 Feb 2008 10:26:16 -0000	1.320
+++ chapter.sgml	2 May 2008 15:51:31 -0000
@@ -3640,7 +3640,7 @@
  
        <para>There are a number of choices for daemons to manage
          security associations with FreeBSD.  This article will describe
-         how to use one of these, racoon&nbsp;&mdash; which is available from
+         how to use one of these, <application>racoon</application> &mdash; which is available from
 	 <filename role="package">security/ipsec-tools</filename> in the &os; Ports
 	 collection.</para>
  
@@ -3662,14 +3662,14 @@
          gets) it will not do them much good -- by the time they have cracked
          the key the two daemons have chosen another one.</para>
  
-       <para>The configuration file for racoon is stored in
+       <para>The configuration file for <application>racoon</application> is stored in
          <filename>${PREFIX}/etc/racoon</filename>.  You should find a
          configuration file there, which should not need to be changed
-         too much.  The other component of racoon's configuration,
+         too much.  The other component of <application>racoon</application>'s configuration,
          which you will need to change, is the <quote>pre-shared
          key</quote>.</para>
  
-       <para>The default racoon configuration expects to find this in
+       <para>The default <application>racoon</application> configuration expects to find this in
          the file <filename>${PREFIX}/etc/racoon/psk.txt</filename>.  It is important to note
          that the pre-shared key is <emphasis>not</emphasis> the key that will be used to
          encrypt your traffic across the VPN link, it is simply a token
@@ -3696,9 +3696,9 @@
        <para>That is, the public IP address of the remote end, and the
          same secret key.  <filename>psk.txt</filename> must be mode
          <literal>0600</literal> (i.e., only read/write to
-         <username>root</username>) before racoon will run.</para>
+         <username>root</username>) before <application>racoon</application> will run.</para>
  
-       <para>You must run racoon on both gateway machines.  You will
+       <para>You must run <application>racoon</application> on both gateway machines.  You will
          also need to add some firewall rules to allow the IKE traffic,
          which is carried over UDP to the ISAKMP (Internet Security Association
          Key Management Protocol) port.  Again, this should be fairly early in
@@ -3708,9 +3708,9 @@
 ipfw add 1 allow udp from W.X.Y.Z to A.B.C.D isakmp
        </programlisting>
  
-       <para>Once racoon is running you can try pinging one gateway host
+       <para>Once <application>racoon</application> is running you can try pinging one gateway host
          from the other.  The connection is still not encrypted, but
-         racoon will then set up the security associations between the two
+         <application>racoon</application> will then set up the security associations between the two
          hosts -- this might take a moment, and you may see this as a
          short delay before the ping commands start responding.</para>
  
@@ -3925,7 +3925,7 @@
 
        <para>When they are received by the far end of the VPN they will
          first be decrypted (using the security associations that have
-         been negotiated by racoon).  Then they will enter the
+         been negotiated by <application>racoon</application>).  Then they will enter the
          <devicename>gif</devicename> interface, which will unwrap
          the second layer, until you are left with the innermost
          packet, which can then travel in to the inner network.</para>
--- security.patch.1.diff ends here ---


>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?481b3a04.0d375e0a.1d1b.ffffd72f>