Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 28 Jan 2019 12:37:45 +0000 (UTC)
From:      "Danilo G. Baio" <dbaio@FreeBSD.org>
To:        doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org
Subject:   svn commit: r52785 - head/en_US.ISO8859-1/books/handbook/firewalls
Message-ID:  <201901281237.x0SCbjeX042844@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: dbaio (ports committer)
Date: Mon Jan 28 12:37:45 2019
New Revision: 52785
URL: https://svnweb.freebsd.org/changeset/doc/52785

Log:
  handbook: Improve Firewalls chapter
  
  - Fix some dead links and punctuations
  - pfctl_parser.c was moved to a new location since FreeBSD 10
  - Fix a few service commands
  
  Issues found when translating this chapter to pt_BR.
  
  Reviewed by:	bcr
  Approved by:	doc (bcr)
  Differential Revision:	https://reviews.freebsd.org/D18981

Modified:
  head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml

Modified: head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml	Sun Jan 27 01:50:51 2019	(r52784)
+++ head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml	Mon Jan 28 12:37:45 2019	(r52785)
@@ -173,8 +173,8 @@
       and do a port number lookup to find the purpose of a particular
       port number.</para>
 
-    <para>Check out this link for port numbers used by Trojans <uri
-	xlink:href="http://www.sans.org/security-resources/idfaq/oddports.php">http://www.sans.org/security-resources/idfaq/oddports.php</uri>.</para>;
+    <para>Check out this link for <uri
+	xlink:href="http://web.archive.org/web/20150803024617/http://www.sans.org/security-resources/idfaq/oddports.php">port numbers used by Trojans</uri>.</para>
 
     <para>FTP has two modes:  active mode and passive mode.  The
       difference is in how the data channel is acquired.  Passive
@@ -606,8 +606,8 @@ options         ALTQ_PRIQ       # Priority Queuing (PR
       </variablelist>
 
       <para>More information about the scheduling
-	algorithms and example rulesets are available at <uri
-	  xlink:href="http://www.openbsd.org/faq/pf/queueing.html">http://www.openbsd.org/faq/pf/queueing.html</uri>.</para>;
+	algorithms and example rulesets are available at the <uri
+	  xlink:href="https://web.archive.org/web/20151109213426/http://www.openbsd.org/faq/pf/queueing.html">OpenBSD's web archive</uri>.</para>
     </sect2>
 
     <sect2 xml:id="pf-tutorial">
@@ -831,7 +831,7 @@ pass from { lo0, $localnet } to any keep state</progra
     flags S/SA keep state</programlisting>
 
 	<para>A few other pass rules may be needed.  This one enables
-	  <acronym>SSH</acronym> on the external interface::</para>
+	  <acronym>SSH</acronym> on the external interface:</para>
 
 	<programlisting>pass in inet proto tcp to $ext_if port ssh</programlisting>
 
@@ -1009,7 +1009,7 @@ pass inet proto icmp from any to $ext_if keep state</p
 	<para>If other types of <acronym>ICMP</acronym> packets are
 	  needed, expand <literal>icmp_types</literal> to a list of
 	  those packet types.  Type <command>more
-	    /usr/src/contrib/pf/pfctl/pfctl_parser.c</command> to see
+	    /usr/src/sbin/pfctl/pfctl_parser.c</command> to see
 	  the list of <acronym>ICMP</acronym> message types supported
 	  by <application>PF</application>.  Refer to <link
 	      xlink:href="http://www.iana.org/assignments/icmp-parameters/icmp-parameters.xhtml">http://www.iana.org/assignments/icmp-parameters/icmp-parameters.xhtml</link>;
@@ -1417,7 +1417,7 @@ rdr pass on $ext_if inet proto tcp from !&lt;spamd-whi
 
 	    <para>When finished, reload the ruleset, start
 	      <application>spamd</application> by typing
-	      <command>service start obspamd</command>, and complete
+	      <command>service obspamd start</command>, and complete
 	      the configuration using <command>spamd-setup</command>.
 	      Finally, create a &man.cron.8; job which calls
 	      <command>spamd-setup</command> to update the tables at
@@ -1472,8 +1472,8 @@ rdr pass on $ext_if inet proto tcp from !&lt;spamd-whi
 	  <step>
 	    <para>To complete the greylisting setup:</para>
 
-	    <programlisting>&prompt.root; <userinput>service restart obspamd</userinput>
-&prompt.root; <userinput>service start spamlogd</userinput></programlisting>
+	    <programlisting>&prompt.root; <userinput>service obspamd restart</userinput>
+&prompt.root; <userinput>service obspamlogd start</userinput></programlisting>
 	  </step>
 	</procedure>
 
@@ -2164,7 +2164,7 @@ pif="dc0"     # interface name of NIC attached to Inte
 	<acronym>LAN</acronym> should be assigned an
 	<acronym>IP</acronym> address in the private network space, as
 	defined by <link
-	  xlink:href="ftp://ftp.isi.edu/in-notes/rfc1918.txt">RFC
+	  xlink:href="https://www.ietf.org/rfc/rfc1918.txt">RFC
 	  1918</link>, and have the default gateway set to the
 	&man.natd.8; system's internal <acronym>IP</acronym>
 	address.</para>
@@ -2365,7 +2365,7 @@ good_tcpo="22,25,37,53,80,443,110"</programlisting>
 	  configuration file.</para>
 
 	<para>For further configuration options, consult
-	  &man.natd.8;</para>
+	  &man.natd.8;.</para>
       </sect3>
 
       <sect3>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201901281237.x0SCbjeX042844>