mirror of
https://git.hardenedbsd.org/hardenedbsd/HardenedBSD.git
synced 2024-12-30 15:38:06 +01:00
Markup fixes.
This commit is contained in:
parent
b3e2f7a6d8
commit
bc84aa4ba3
Notes:
svn2git
2020-12-20 02:59:44 +00:00
svn path=/head/; revision=162806
@ -66,8 +66,8 @@ The user name is restricted to whatever
|
||||
.Xr pw 8
|
||||
will accept.
|
||||
Generally this means it
|
||||
may contain only lowercase characters or digits but cannot begin with
|
||||
.Sq Fl
|
||||
may contain only lowercase characters or digits but cannot begin with the
|
||||
.Ql -
|
||||
character.
|
||||
Maximum length
|
||||
is 16 characters.
|
||||
|
@ -133,18 +133,17 @@ the loopback interface.
|
||||
Enables ARP proxying for all hosts on net.
|
||||
.El
|
||||
.Sh DIAGNOSTICS
|
||||
.Em "arp: %x:%x:%x:%x:%x:%x is using my IP address %d.%d.%d.%d!" :
|
||||
.Bl -diag
|
||||
.It "arp: %x:%x:%x:%x:%x:%x is using my IP address %d.%d.%d.%d!"
|
||||
ARP has discovered another host on the local network which responds to
|
||||
mapping requests for its own Internet address with a different Ethernet
|
||||
address, generally indicating that two hosts are attempting to use the
|
||||
same Internet address.
|
||||
.Pp
|
||||
.Em "arp: link address is broadcast for IP address %d.%d.%d.%d!" :
|
||||
.It "arp: link address is broadcast for IP address %d.%d.%d.%d!"
|
||||
ARP requested information for a host, and received an answer indicating
|
||||
that the host's ethernet address is the ethernet broadcast address.
|
||||
This indicates a misconfigured or broken device.
|
||||
.Pp
|
||||
.Em "arp: %d.%d.%d.%d moved from %x:%x:%x:%x:%x:%x to %x:%x:%x:%x:%x:%x on %s" :
|
||||
.It "arp: %d.%d.%d.%d moved from %x:%x:%x:%x:%x:%x to %x:%x:%x:%x:%x:%x on %s"
|
||||
ARP had a cached value for the ethernet address of the referenced host,
|
||||
but received a reply indicating that the host is at a new address.
|
||||
This can happen normally when host hardware addresses change,
|
||||
@ -153,15 +152,13 @@ It can also indicate a problem with proxy ARP.
|
||||
This message can only be issued if the sysctl
|
||||
.Va net.link.ether.inet.log_arp_movements
|
||||
is set to 1, which is the system's default behaviour.
|
||||
.Pp
|
||||
.Em "arpresolve: can't allocate llinfo for %d.%d.%d.%d" :
|
||||
.It "arpresolve: can't allocate llinfo for %d.%d.%d.%d"
|
||||
The route for the referenced host points to a device upon which ARP is
|
||||
required, but ARP was unable to allocate a routing table entry in which
|
||||
to store the host's MAC address.
|
||||
This usually points to a misconfigured routing table.
|
||||
It can also occur if the kernel cannot allocate memory.
|
||||
.Pp
|
||||
.Em "arp: %d.%d.%d.%d is on if0 but got reply from %x:%x:%x:%x:%x:%x on if1" :
|
||||
.It "arp: %d.%d.%d.%d is on if0 but got reply from %x:%x:%x:%x:%x:%x on if1"
|
||||
Physical connections exist to the same logical IP network on both if0 and if1.
|
||||
It can also occur if an entry already exists in the ARP cache for the IP
|
||||
address above, and the cable has been disconnected from if0, then reconnected
|
||||
@ -169,13 +166,13 @@ to if1.
|
||||
This message can only be issued if the sysctl
|
||||
.Va net.link.ether.inet.log_arp_wrong_iface
|
||||
is set to 1, which is the system's default behaviour.
|
||||
.Pp
|
||||
.Em "arp: %x:%x:%x:%x:%x:%x attempts to modify permanent entry for %d.%d.%d.%d on %s" :
|
||||
.It "arp: %x:%x:%x:%x:%x:%x attempts to modify permanent entry for %d.%d.%d.%d on %s"
|
||||
ARP has received an ARP reply that attempts to overwrite a permanent
|
||||
antry in the local ARP table.
|
||||
This error will be only logged, if the sysctl
|
||||
entry in the local ARP table.
|
||||
This error will only be logged if the sysctl
|
||||
.Va net.link.ether.inet.log_arp_permanent_modify
|
||||
is set to 1, which is the system's default behaviour.
|
||||
.El
|
||||
.Sh SEE ALSO
|
||||
.Xr inet 4 ,
|
||||
.Xr route 4 ,
|
||||
|
@ -43,7 +43,7 @@ By default,
|
||||
reads
|
||||
.Xr kldstat 8
|
||||
output from standard input and writes to the
|
||||
.Pa \&.asf
|
||||
.Pa .asf
|
||||
file a list of
|
||||
.Xr gdb 1
|
||||
commands to add symbol files from KLDs in subdirectories of the subdirectory
|
||||
@ -73,7 +73,7 @@ writes to it instead of
|
||||
If
|
||||
.Ar outfile
|
||||
is a single dash
|
||||
.Pq Sq \&- ,
|
||||
.Pq Sq Fl ,
|
||||
the standard output is used.
|
||||
.Sh OPTIONS
|
||||
The following options modify the function of
|
||||
@ -114,7 +114,7 @@ to write or append its output to.
|
||||
If
|
||||
.Ar outfile
|
||||
is a single dash
|
||||
.Pq Sq \&- ,
|
||||
.Pq Sq Fl ,
|
||||
the standard output is used.
|
||||
.It Fl s
|
||||
Do not prepend a (guessed) subdirectory of the module path.
|
||||
|
@ -433,7 +433,7 @@ At this point the binary
|
||||
can be copied onto an install floppy
|
||||
and hard-linked to the names of the component programs.
|
||||
.Pp
|
||||
Note that if the
|
||||
Note that if the
|
||||
.Ic libs_so
|
||||
command had been used, copies of the libraries so named
|
||||
would also need to be copied to the install floppy.
|
||||
@ -460,6 +460,7 @@ The
|
||||
must then be used to get those object files built, or
|
||||
some other arrangements made.
|
||||
.Sh AUTHORS
|
||||
.An -nosplit
|
||||
The
|
||||
.Nm
|
||||
utility was written by
|
||||
@ -468,7 +469,7 @@ utility was written by
|
||||
Copyright (c) 1994 University of Maryland.
|
||||
All Rights Reserved.
|
||||
.Pp
|
||||
The
|
||||
The
|
||||
.Ic libs_so
|
||||
keyword was added in 2005 by
|
||||
.An Adrian Steinmann Aq ast@marabu.ch
|
||||
|
@ -70,7 +70,7 @@
|
||||
statistics
|
||||
.Sh SYNOPSIS
|
||||
.Nm
|
||||
.Op Fl CdhKIoTxz?\&
|
||||
.Op Fl CdhIKoTxz?\&
|
||||
.Op Fl c Ar count
|
||||
.Op Fl M Ar core
|
||||
.Op Fl n Ar devs
|
||||
|
@ -56,7 +56,9 @@ The options are as follows:
|
||||
.It Fl i
|
||||
Output the jail identifier of the newly created jail.
|
||||
.It Fl J Ar jid_file
|
||||
Write a JidFile, like a PidFile, containing jailid, path, hostname, ip and
|
||||
Write a
|
||||
.Ar jid_file
|
||||
file, containing jail identifier, path, hostname, IP and
|
||||
command used to start the jail.
|
||||
.It Fl l
|
||||
Run program in the clean environment.
|
||||
@ -75,9 +77,9 @@ is imported from the current environment.
|
||||
The environment variables from the login class capability database for the
|
||||
target login are also set.
|
||||
.It Fl s Ar securelevel
|
||||
Sets
|
||||
.Va kern.securelevel
|
||||
to the specified value inside the newly created jail.
|
||||
Sets the
|
||||
.Va kern.securelevel
|
||||
sysctl variable to the specified value inside the newly created jail.
|
||||
.It Fl u Ar username
|
||||
The user name from host environment as whom the
|
||||
.Ar command
|
||||
@ -141,7 +143,7 @@ See
|
||||
.Xr devfs 8
|
||||
for information on how to use devfs rules to limit access to entries
|
||||
in the per-jail devfs.
|
||||
A simple devfs ruleset for jails is available as ruleset #4 in
|
||||
A simple devfs ruleset for jails is available as ruleset #4 in
|
||||
.Pa /etc/defaults/devfs.rules .
|
||||
.Pp
|
||||
In many cases this example would put far more in the jail than needed.
|
||||
@ -546,14 +548,14 @@ constraints on
|
||||
.Va kern.securelevel .
|
||||
.El
|
||||
.Pp
|
||||
The read-only
|
||||
The read-only sysctl variable
|
||||
.Va security.jail.jailed
|
||||
variable can be used to determine if a process is running inside a jail (value
|
||||
can be used to determine if a process is running inside a jail (value
|
||||
is one) or not (value is zero).
|
||||
.Pp
|
||||
The
|
||||
.Va security.jail.list
|
||||
MIB entry is read-only and it returns an array of
|
||||
.Va security.jail.list
|
||||
MIB entry is read-only and it returns an array of
|
||||
.Vt "struct xprison"
|
||||
defined in
|
||||
.In sys/jail.h .
|
||||
|
@ -53,6 +53,7 @@ should run.
|
||||
The user name from jailed environment as whom the
|
||||
.Ar command
|
||||
should run.
|
||||
.El
|
||||
.Sh SEE ALSO
|
||||
.Xr jail_attach 2 ,
|
||||
.Xr jail 8 ,
|
||||
|
@ -243,18 +243,15 @@ To switch back to the default keyboard, use this command.
|
||||
.Dl kbdcontrol -k /dev/kbd0
|
||||
.Pp
|
||||
To allow using both the second USB keyboard and the first AT keyboard
|
||||
at the same time on console via
|
||||
at the same time on console via the
|
||||
.Xr kbdmux 4
|
||||
driver use the following sequence of commands.
|
||||
.Pp
|
||||
.Dl kbdcontrol -K < /dev/console
|
||||
.Pp
|
||||
.Dl kbdcontrol -a atkbd0 < /dev/kbdmux0
|
||||
.Pp
|
||||
.Dl kbdcontrol -a ukbd1 < /dev/kbdmux0
|
||||
.Pp
|
||||
.Dl kbdcontrol -k /dev/kbdmux0 < /dev/console
|
||||
.Pp
|
||||
driver, use the following sequence of commands.
|
||||
.Bd -literal -offset indent
|
||||
kbdcontrol -K < /dev/console
|
||||
kbdcontrol -a atkbd0 < /dev/kbdmux0
|
||||
kbdcontrol -a ukbd1 < /dev/kbdmux0
|
||||
kbdcontrol -k /dev/kbdmux0 < /dev/console
|
||||
.Ed
|
||||
.Sh SEE ALSO
|
||||
.Xr kbdmap 1 ,
|
||||
.Xr vidcontrol 1 ,
|
||||
|
@ -133,9 +133,7 @@ is typically set up as a symbolic link to
|
||||
.Nm
|
||||
which is not usually invoked on its own.
|
||||
.Sh EXIT STATUS
|
||||
The
|
||||
.Nm
|
||||
exits 0 on success, and \*[Gt]0 if an error occurs.
|
||||
.Ex -std
|
||||
.Sh DIAGNOSTICS
|
||||
The
|
||||
.Nm
|
||||
|
@ -89,14 +89,17 @@ data to the device so that the user program will see it.
|
||||
.Pp
|
||||
If the mouse daemon receives the signal
|
||||
.Dv SIGHUP ,
|
||||
it will reopen the mouse port and reinitialize itself. Useful if
|
||||
it will reopen the mouse port and reinitialize itself.
|
||||
Useful if
|
||||
the mouse is attached/detached while the system is suspended.
|
||||
.Pp
|
||||
If the mouse daemon receives the signal
|
||||
.Dv SIGUSR1 ,
|
||||
it will stop passing mouse events. Sending the signal
|
||||
.Dv SIGUSR1
|
||||
again will resume passing mouse events. Useful if your typing on a laptop is
|
||||
it will stop passing mouse events.
|
||||
Sending the signal
|
||||
.Dv SIGUSR1
|
||||
again will resume passing mouse events.
|
||||
Useful if your typing on a laptop is
|
||||
interrupted by accidentally touching the mouse pad.
|
||||
.Pp
|
||||
The following options are available:
|
||||
@ -613,11 +616,11 @@ protocol.
|
||||
To test if the selected protocol type is correct for the given mouse,
|
||||
enable the mouse pointer in the current virtual console,
|
||||
.Pp
|
||||
.Dl vidcontrol -m on
|
||||
.Dl "vidcontrol -m on"
|
||||
.Pp
|
||||
start the mouse daemon in the foreground mode,
|
||||
.Pp
|
||||
.Dl moused -f -p Ar _selected_port_ -t Ar _selected_protocol_
|
||||
.Dl "moused -f -p <selected_port> -t <selected_protocol>"
|
||||
.Pp
|
||||
and see if the mouse pointer travels correctly
|
||||
according to the mouse movement.
|
||||
@ -668,7 +671,7 @@ utility
|
||||
UNIX-domain stream socket for X10 MouseRemote events
|
||||
.El
|
||||
.Sh EXAMPLES
|
||||
.Dl moused -p /dev/cuad0 -i type
|
||||
.Dl "moused -p /dev/cuad0 -i type"
|
||||
.Pp
|
||||
Let the
|
||||
.Nm
|
||||
@ -676,9 +679,10 @@ utility determine the protocol type of the mouse at the serial port
|
||||
.Pa /dev/cuad0 .
|
||||
If successful, the command will print the type, otherwise it will say
|
||||
.Dq Li unknown .
|
||||
.Pp
|
||||
.Dl moused -p /dev/cuad0
|
||||
.Dl vidcontrol -m on
|
||||
.Bd -literal -offset indent
|
||||
moused -p /dev/cuad0
|
||||
vidcontrol -m on
|
||||
.Ed
|
||||
.Pp
|
||||
If the
|
||||
.Nm
|
||||
@ -686,9 +690,10 @@ utility is able to identify the protocol type of the mouse at the specified
|
||||
port automatically, you can start the daemon without the
|
||||
.Fl t
|
||||
option and enable the mouse pointer in the text console as above.
|
||||
.Pp
|
||||
.Dl moused -p /dev/mouse -t microsoft
|
||||
.Dl vidcontrol -m on
|
||||
.Bd -literal -offset indent
|
||||
moused -p /dev/mouse -t microsoft
|
||||
vidcontrol -m on
|
||||
.Ed
|
||||
.Pp
|
||||
Start the mouse daemon on the serial port
|
||||
.Pa /dev/mouse .
|
||||
@ -698,27 +703,27 @@ is explicitly specified by the
|
||||
.Fl t
|
||||
option.
|
||||
.Pp
|
||||
.Dl moused -p /dev/mouse -m 1=3 -m 3=1
|
||||
.Dl "moused -p /dev/mouse -m 1=3 -m 3=1"
|
||||
.Pp
|
||||
Assign the physical button 3 (right button) to the logical button 1
|
||||
(logical left) and the physical button 1 (left) to the logical
|
||||
button 3 (logical right).
|
||||
This will effectively swap the left and right buttons.
|
||||
.Pp
|
||||
.Dl moused -p /dev/mouse -t intellimouse -z 4
|
||||
.Dl "moused -p /dev/mouse -t intellimouse -z 4"
|
||||
.Pp
|
||||
Report negative Z axis movement (i.e., mouse wheel) as the button 4 pressed
|
||||
and positive Z axis movement (i.e., mouse wheel) as the button 5 pressed.
|
||||
.Pp
|
||||
If you add
|
||||
.Pp
|
||||
.Dl ALL ALL = NOPASSWD: /usr/bin/killall -USR1 moused
|
||||
.Dl "ALL ALL = NOPASSWD: /usr/bin/killall -USR1 moused"
|
||||
.Pp
|
||||
to your
|
||||
.Pa /usr/local/etc/sudoers
|
||||
file, and bind
|
||||
.Pp
|
||||
.Dl killall -USR1 moused
|
||||
.Dl "killall -USR1 moused"
|
||||
.Pp
|
||||
to a key in your window manager, you can suspend mouse events on your laptop if
|
||||
you keep brushing over the mouse pad while typing.
|
||||
|
@ -28,7 +28,7 @@
|
||||
.\" From: @(#)mtree.8 8.2 (Berkeley) 12/11/93
|
||||
.\" $FreeBSD$
|
||||
.\"
|
||||
.Dd July 03, 2006
|
||||
.Dd July 3, 2006
|
||||
.Dt MTREE 8
|
||||
.Os
|
||||
.Sh NAME
|
||||
|
@ -21,7 +21,7 @@
|
||||
.\" the suitability of this software for any purpose. It is
|
||||
.\" provided "as is" without express or implied warranty.
|
||||
.\"
|
||||
.Dd June 3, 2004
|
||||
.Dd July 21, 2006
|
||||
.Dt NEWSYSLOG.CONF 5
|
||||
.Os
|
||||
.Sh NAME
|
||||
|
File diff suppressed because it is too large
Load Diff
@ -109,7 +109,8 @@ Enable the client to synchronize to broadcast servers.
|
||||
Specify the name and path of the configuration file, default
|
||||
.Pa /etc/ntp.conf .
|
||||
.It Fl d
|
||||
Specify debugging mode. This option may occur more than once,
|
||||
Specify debugging mode.
|
||||
This option may occur more than once,
|
||||
with each occurrence indicating greater detail of display.
|
||||
.It Fl D Ar level
|
||||
Specify debugging level directly.
|
||||
@ -133,7 +134,8 @@ This option can be used with the
|
||||
.Fl q
|
||||
and
|
||||
.Fl x
|
||||
options. See the
|
||||
options.
|
||||
See the
|
||||
.Ic tinker
|
||||
command for other options.
|
||||
.It Fl k Ar keyfile
|
||||
@ -149,7 +151,8 @@ This is the same operation as the
|
||||
.Ic logfile Ar logfile
|
||||
configuration command.
|
||||
.It Fl L
|
||||
Do not listen to virtual IPs. The default is to listen.
|
||||
Do not listen to virtual IPs.
|
||||
The default is to listen.
|
||||
.It Fl m
|
||||
Enable the client to synchronize to multicast servers at the IPv4 multicast
|
||||
group address 224.0.1.1.
|
||||
|
@ -162,12 +162,12 @@ following.
|
||||
.It Ic \&? Ar command_keyword
|
||||
.It Ic help Ar command_keyword
|
||||
A
|
||||
.Ic Ql \&?
|
||||
.Sq Ic \&?
|
||||
will print a list of all the command
|
||||
keywords known to this incarnation of
|
||||
.Nm .
|
||||
A
|
||||
.Ic Ql \&?
|
||||
.Sq Ic \&?
|
||||
followed by a command keyword will print function and usage
|
||||
information about the command.
|
||||
This command is probably a better
|
||||
@ -592,11 +592,13 @@ configuration file commands of
|
||||
.It Cm auth
|
||||
Enables the server to synchronize with unconfigured peers only
|
||||
if the peer has been correctly authenticated using either public key
|
||||
or private key cryptography. The default for this flag is enable.
|
||||
or private key cryptography.
|
||||
The default for this flag is enable.
|
||||
.It Cm bclient
|
||||
Enables the server to listen for a message from a broadcast or
|
||||
multicast server, as in the multicastclient command with
|
||||
default address. The default for this flag is disable.
|
||||
default address.
|
||||
The default for this flag is disable.
|
||||
.It Cm calibrate
|
||||
Enables the calibrate feature for reference clocks.
|
||||
The default for this flag is disable.
|
||||
@ -604,14 +606,16 @@ The default for this flag is disable.
|
||||
Enables the kernel time discipline, if available.
|
||||
The default for this flag is enable if support is available, otherwise disable.
|
||||
.It Cm monitor
|
||||
Enables the monitoring facility. See the
|
||||
Enables the monitoring facility.
|
||||
See the
|
||||
.Xr ntpdc 8 .
|
||||
program and the monlist command or further information.
|
||||
The default for this flag is enable.
|
||||
.It Cm ntp
|
||||
Enables time and frequency discipline.
|
||||
In effect, this switch opens and closes the feedback loop,
|
||||
which is useful for testing. The default for this flag is enable.
|
||||
which is useful for testing.
|
||||
The default for this flag is enable.
|
||||
.It Cm pps
|
||||
Enables the pulse-per-second (PPS) signal when frequency
|
||||
and time is disciplined by the precision time kernel modifications.
|
||||
@ -620,7 +624,8 @@ See the
|
||||
(available as part of the HTML documentation
|
||||
provided in
|
||||
.Pa /usr/share/doc/ntp )
|
||||
page for further information. The default for this flag is disable.
|
||||
page for further information.
|
||||
The default for this flag is disable.
|
||||
.It Cm stats
|
||||
Enables the statistics facility.
|
||||
See the
|
||||
|
@ -148,12 +148,12 @@ These are described following.
|
||||
.It Ic \&? Op Ar command_keyword
|
||||
.It Ic help Op Ar command_keyword
|
||||
A
|
||||
.Ic Ql \&?
|
||||
.Sq Ic \&?
|
||||
by itself will print a list of all the command
|
||||
keywords known to this incarnation of
|
||||
.Nm .
|
||||
A
|
||||
.Ic Ql \&?
|
||||
.Sq Ic \&?
|
||||
followed by a command keyword will print function and usage
|
||||
information about the command.
|
||||
This command is probably a better
|
||||
@ -241,7 +241,8 @@ modified using the command line
|
||||
switch.
|
||||
.It Ic keyid Ar keyid
|
||||
This command specifies the key number to be used to authenticate
|
||||
configuration requests. This must correspond to a key number the server has
|
||||
configuration requests.
|
||||
This must correspond to a key number the server has
|
||||
been configured to use for this purpose.
|
||||
.It Xo Ic ntpversion
|
||||
.Cm 1 |
|
||||
@ -259,7 +260,8 @@ There appear
|
||||
to be no servers left which demand version 1.
|
||||
.It Ic passwd
|
||||
This command prompts for a password (which will not be echoed) which will
|
||||
be used to authenticate configuration requests. The password must
|
||||
be used to authenticate configuration requests.
|
||||
The password must
|
||||
correspond to the key configured for NTP server for this purpose.
|
||||
.It Ic quit
|
||||
Exit
|
||||
@ -281,8 +283,10 @@ a timeout will be twice the timeout value set.
|
||||
.El
|
||||
.Ss Control Message Commands
|
||||
Each association known to an NTP server has a 16 bit integer association
|
||||
identifier. NTP control messages which carry peer variables must identify the
|
||||
peer the values correspond to by including its association ID. An association
|
||||
identifier.
|
||||
NTP control messages which carry peer variables must identify the
|
||||
peer the values correspond to by including its association ID.
|
||||
An association
|
||||
ID of 0 is special, and indicates the variables are system variables, whose
|
||||
names are drawn from a separate name space.
|
||||
.Pp
|
||||
@ -430,7 +434,8 @@ register, in octal, and the current estimated delay,
|
||||
offset and dispersion of the peer, all in milliseconds.
|
||||
The character at the left margin of each line shows the
|
||||
synchronization status of the association and is a valuable
|
||||
diagnostic tool. The encoding and meaning of this character,
|
||||
diagnostic tool.
|
||||
The encoding and meaning of this character,
|
||||
called the tally code, is given later in this page.
|
||||
.It Ic pstatus Ar assocID
|
||||
Sends a read status request to the server for the given
|
||||
@ -466,7 +471,8 @@ system variables, otherwise they are peer variables and the values
|
||||
returned will be those of the corresponding peer.
|
||||
Omitting the
|
||||
variable list will send a request with no data which should induce
|
||||
the server to return a default display. The
|
||||
the server to return a default display.
|
||||
The
|
||||
encoding and meaning of the variables derived from NTPv3 is given in
|
||||
RFC-1305; the encoding and meaning of the additional NTPv4 variables are
|
||||
given later in this page.
|
||||
@ -512,7 +518,8 @@ The peer is a survivor and a candidate for the combining algorithm.
|
||||
.It \&#
|
||||
.Pq selected
|
||||
The peer is a survivor, but not among the first six peers sorted by
|
||||
synchronization distance. If the association is ephemeral, it may be
|
||||
synchronization distance.
|
||||
If the association is ephemeral, it may be
|
||||
demobilized to conserve resources.
|
||||
.It \&*
|
||||
.Pq sys.peer
|
||||
@ -521,7 +528,8 @@ system variables.
|
||||
.It o
|
||||
.Pq pps.peer
|
||||
The peer has been declared the system peer and lends its variables to
|
||||
the system variables. However, the actual system synchronization is derived
|
||||
the system variables.
|
||||
However, the actual system synchronization is derived
|
||||
from a pulse-per-second (PPS) signal, either indirectly via the PPS
|
||||
reference clock driver or directly via kernel interface.
|
||||
.El
|
||||
@ -540,7 +548,8 @@ The
|
||||
and
|
||||
.Cm frequency
|
||||
variables are described in RFC-1305
|
||||
specification. Additional NTPv4 system variables include the following.
|
||||
specification.
|
||||
Additional NTPv4 system variables include the following.
|
||||
.Bl -tag -width indent
|
||||
.It version
|
||||
Everything you might need to know about the software version and generation
|
||||
@ -550,7 +559,8 @@ The processor and kernel identification string.
|
||||
.It system
|
||||
The operating system version and release identifier.
|
||||
.It state
|
||||
The state of the clock discipline state machine. The values are described
|
||||
The state of the clock discipline state machine.
|
||||
The values are described
|
||||
in the architecture briefing on the NTP Project page linked from
|
||||
www.ntp.org.
|
||||
.It peer
|
||||
@ -570,7 +580,8 @@ depending on the particular dance:
|
||||
.Bl -tag -width indent
|
||||
.It flags
|
||||
The current flags word bits and message digest algorithm identifier (NID)
|
||||
in hex format. The high order 16 bits of the four-byte word contain the NID
|
||||
in hex format.
|
||||
The high order 16 bits of the four-byte word contain the NID
|
||||
from the OpenSSL ligrary, while the low-order bits are interpreted as
|
||||
follows:
|
||||
.Bl -tag -width indent
|
||||
@ -593,8 +604,10 @@ function.
|
||||
.It hostkey
|
||||
The NTP filestamp of the host key file.
|
||||
.It cert
|
||||
A list of certificates held by the host. Each entry includes the subject,
|
||||
issuer, flags and NTP filestamp in order. The bits are interpreted as
|
||||
A list of certificates held by the host.
|
||||
Each entry includes the subject,
|
||||
issuer, flags and NTP filestamp in order.
|
||||
The bits are interpreted as
|
||||
follows:
|
||||
.Bl -tag -width indent
|
||||
.It 0x01
|
||||
@ -647,7 +660,8 @@ Additional NTPv4 system variables include
|
||||
the following.
|
||||
.Bl -tag -width indent
|
||||
.It flash
|
||||
The flash code for the most recent packet received. The encoding and
|
||||
The flash code for the most recent packet received.
|
||||
The encoding and
|
||||
meaning of these codes is given later in this page.
|
||||
.It jitter
|
||||
The estimated time error of the peer clock measured as an exponential
|
||||
@ -661,8 +675,10 @@ When the NTPv4 daemon is compiled with the OpenSSL software library, additional
|
||||
peer variables are displayed, including the following:
|
||||
.Bl -tag -width indent
|
||||
.It flags
|
||||
The current flag bits. This word is the server host status word with
|
||||
additional bits used by the Autokey state machine. See the source code for
|
||||
The current flag bits.
|
||||
This word is the server host status word with
|
||||
additional bits used by the Autokey state machine.
|
||||
See the source code for
|
||||
the bit encoding.
|
||||
.It hostname
|
||||
The server host name.
|
||||
@ -680,18 +696,22 @@ The NTP timestamp when the last Autokey key list was generated and signed.
|
||||
The
|
||||
.Cm flash
|
||||
code is a valuable debugging aid displayed in the peer variables
|
||||
list. It shows the results of the original sanity checks defined in the NTP
|
||||
specification RFC-1305 and additional ones added in NTPv4. There are 12 tests
|
||||
list.
|
||||
It shows the results of the original sanity checks defined in the NTP
|
||||
specification RFC-1305 and additional ones added in NTPv4.
|
||||
There are 12 tests
|
||||
designated
|
||||
.Sy TEST1
|
||||
through
|
||||
.Sy TEST12 .
|
||||
The tests are performed in a certain order
|
||||
designed to gain maximum diagnostic information while protecting against
|
||||
accidental or malicious errors. The
|
||||
accidental or malicious errors.
|
||||
The
|
||||
.Sy flash
|
||||
variable is initialized to zero as
|
||||
each packet is received. If after each set of tests one or more bits are set,
|
||||
each packet is received.
|
||||
If after each set of tests one or more bits are set,
|
||||
the packet is discarded.
|
||||
.Pp
|
||||
Tests
|
||||
@ -699,22 +719,27 @@ Tests
|
||||
through
|
||||
.Sy TEST3
|
||||
check the packet timestamps from which the offset and
|
||||
delay are calculated. If any bits are set, the packet is discarded; otherwise,
|
||||
delay are calculated.
|
||||
If any bits are set, the packet is discarded; otherwise,
|
||||
the packet header variables are saved.
|
||||
.Sy TEST4
|
||||
and
|
||||
.Sy TEST5
|
||||
are associated with
|
||||
access control and cryptographic authentication. If any bits are set, the
|
||||
access control and cryptographic authentication.
|
||||
If any bits are set, the
|
||||
packet is discarded immediately with nothing changed.
|
||||
.Pp
|
||||
Tests
|
||||
.Sy TEST6
|
||||
through
|
||||
.Sy TEST8
|
||||
check the health of the server. If any bits are set,
|
||||
check the health of the server.
|
||||
If any bits are set,
|
||||
the packet is discarded; otherwise, the offset and delay relative to the server
|
||||
are calculated and saved. TEST9 checks the health of the association itself. If
|
||||
are calculated and saved.
|
||||
TEST9 checks the health of the association itself.
|
||||
If
|
||||
any bits are set, the packet is discarded; otherwise, the saved variables are
|
||||
passed to the clock filter and mitigation algorithms.
|
||||
.Pp
|
||||
@ -738,35 +763,44 @@ bits for each test are defined as follows.
|
||||
.Bl -tag -width indent
|
||||
.It 0x001
|
||||
.Pq TEST1
|
||||
Duplicate packet. The packet is at best a casual retransmission and at
|
||||
Duplicate packet.
|
||||
The packet is at best a casual retransmission and at
|
||||
worst a malicious replay.
|
||||
.It 0x002
|
||||
.Pq TEST2
|
||||
Bogus packet. The packet is not a reply to a message previously sent. This
|
||||
Bogus packet.
|
||||
The packet is not a reply to a message previously sent.
|
||||
This
|
||||
can happen when the NTP daemon is restarted and before somebody else
|
||||
notices.
|
||||
.It 0x004
|
||||
.Pq TEST3
|
||||
Unsynchronized. One or more timestamp fields are invalid. This normally
|
||||
Unsynchronized.
|
||||
One or more timestamp fields are invalid.
|
||||
This normally
|
||||
happens when the first packet from a peer is received.
|
||||
.It 0x008
|
||||
.Pq TEST4
|
||||
Access is denied. See the
|
||||
Access is denied.
|
||||
See the
|
||||
.Sx Access Control Support
|
||||
section of
|
||||
.Xr ntp.conf 5 .
|
||||
.It 0x010
|
||||
.Pq TEST5
|
||||
Cryptographic authentication fails. See the
|
||||
Cryptographic authentication fails.
|
||||
See the
|
||||
.Sx Authentication Options
|
||||
section of
|
||||
.Xr ntp.conf 5 .
|
||||
.It 0x020
|
||||
.Pq TEST6
|
||||
The server is unsynchronized. Wind up its clock first.
|
||||
The server is unsynchronized.
|
||||
Wind up its clock first.
|
||||
.It 0x040
|
||||
.Pq TEST7
|
||||
The server stratum is at the maximum than 15. It is probably unsynchronized
|
||||
The server stratum is at the maximum than 15.
|
||||
It is probably unsynchronized
|
||||
and its clock needs to be wound up.
|
||||
.It 0x080
|
||||
.Pq TEST8
|
||||
@ -778,21 +812,24 @@ Either the peer delay or dispersion is greater than one second, which is
|
||||
higly unlikely unless the peer is on Mars.
|
||||
.It 0x200
|
||||
.Pq TEST10
|
||||
The autokey protocol has detected an authentication failure. See the
|
||||
The autokey protocol has detected an authentication failure.
|
||||
See the
|
||||
.Sx Authentication Options
|
||||
section of
|
||||
.Xr ntp.conf 5 .
|
||||
.It 0x400
|
||||
.Pq TEST11
|
||||
The autokey protocol has not verified the server or peer is proventic and
|
||||
has valid public key credentials. See the
|
||||
has valid public key credentials.
|
||||
See the
|
||||
.Sx Authentication Options
|
||||
section of
|
||||
.Xr ntp.conf 5 .
|
||||
.It 0x800
|
||||
.Pq TEST12
|
||||
A protocol or configuration error has occurred in the public key algorithms
|
||||
or a possible intrusion event has been detected. See the
|
||||
or a possible intrusion event has been detected.
|
||||
See the
|
||||
.Sx Authentication Options
|
||||
section of
|
||||
.Xr ntp.conf 5 .
|
||||
|
@ -25,7 +25,7 @@
|
||||
.Nd a utility for displaying information on software packages
|
||||
.Sh SYNOPSIS
|
||||
.Nm
|
||||
.Op Fl bcdDEfgGijIkKLmopPqQrRsvVxX
|
||||
.Op Fl bcdDEfgGiIjkKLmopPqQrRsvVxX
|
||||
.Op Fl e Ar package
|
||||
.Op Fl l Ar prefix
|
||||
.Op Fl t Ar template
|
||||
|
@ -145,13 +145,13 @@ is of the form
|
||||
where
|
||||
.Ar hostname
|
||||
does not start with a
|
||||
.Sq \&.
|
||||
.Ql \&.
|
||||
or a
|
||||
.Sq / ,
|
||||
.Ql / ,
|
||||
then
|
||||
.Nm
|
||||
will open a network socket to host
|
||||
.Ar hostname
|
||||
.Ar hostname
|
||||
on port
|
||||
.Ar port .
|
||||
.Pp
|
||||
@ -303,7 +303,8 @@ It is
|
||||
.Sh AUTHORS
|
||||
.An Joseph Koshy Aq jkoshy@FreeBSD.org
|
||||
.Sh BUGS
|
||||
The
|
||||
.Nm
|
||||
cannot yet analyse
|
||||
utility cannot yet analyse
|
||||
.Xr hwpmc 4
|
||||
logs generated by non-native architectures.
|
||||
|
@ -54,7 +54,7 @@ uncompressed ports tree.
|
||||
The following options are supported:
|
||||
.Bl -tag -width "-f conffile"
|
||||
.It Fl d Ar workdir
|
||||
Store working files (e.g. downloaded updates) in
|
||||
Store working files (e.g.\& downloaded updates) in
|
||||
.Ar workdir .
|
||||
(default:
|
||||
.Pa /var/db/portsnap ,
|
||||
@ -72,7 +72,7 @@ command, update INDEX files, but not the rest of the ports tree.
|
||||
Expect a public key with given SHA256 hash.
|
||||
(default: read value from configuration file.)
|
||||
.It Fl l Ar descfile
|
||||
Merge the specified local describes file into the INDEX files being
|
||||
Merge the specified local describes file into the INDEX files being
|
||||
built.
|
||||
The
|
||||
.Ar descfile
|
||||
@ -95,9 +95,9 @@ For
|
||||
.Cm extract
|
||||
command only, operate only on parts of the ports tree starting with
|
||||
.Ar path .
|
||||
(e.g.
|
||||
(e.g.\&
|
||||
.Nm
|
||||
.cm extract
|
||||
.Cm extract
|
||||
.Ar sysutils/port
|
||||
would extract sysutils/portsman, sysutils/portsnap,
|
||||
sysutils/portupgrade, etc.)
|
||||
@ -206,16 +206,16 @@ of files are not needed by any particular client.
|
||||
.Sh PRIVACY NOTICE
|
||||
As an unavoidable part of its operation, a machine running
|
||||
.Nm
|
||||
will make its public IP address and the list of files it fetches
|
||||
will make its public IP address and the list of files it fetches
|
||||
available to the server from which it fetches updates.
|
||||
Using these it may be possible to recognize a machine over an extended
|
||||
period of time, determine when it is updated, and identify which
|
||||
portions of the FreeBSD ports tree, if any, are being ignored using
|
||||
Using these it may be possible to recognize a machine over an extended
|
||||
period of time, determine when it is updated, and identify which
|
||||
portions of the FreeBSD ports tree, if any, are being ignored using
|
||||
"REFUSE" directives in
|
||||
.Pa portsnap.conf .
|
||||
In addition, the FreeBSD release level is transmitted to the server.
|
||||
.Pp
|
||||
Statistical data generated from information collected in this manner
|
||||
Statistical data generated from information collected in this manner
|
||||
may be published, but only in aggregate and after anonymizing the
|
||||
individual systems.
|
||||
.Sh FILES
|
||||
@ -228,9 +228,9 @@ Default location where compressed snapshots are stored.
|
||||
Default location where the ports tree is extracted.
|
||||
.El
|
||||
.Sh SEE ALSO
|
||||
.Xr fetch 1
|
||||
.Xr fetch 3
|
||||
.Xr fetch 1 ,
|
||||
.Xr sha256 1 ,
|
||||
.Xr fetch 3 ,
|
||||
.Xr portsnap.conf 5
|
||||
.Xr sha256 1
|
||||
.Sh AUTHORS
|
||||
.An Colin Percival Aq cperciva@FreeBSD.org
|
||||
|
@ -338,8 +338,9 @@ Selected messages are forwarded to the
|
||||
.Xr syslogd 8
|
||||
program on the named host.
|
||||
If a port number is added after a colon
|
||||
.Pq ':'
|
||||
then that port will be used as the destination port rather than the usual syslog port.
|
||||
.Pq Ql :\&
|
||||
then that port will be used as the destination port
|
||||
rather than the usual syslog port.
|
||||
.It
|
||||
A comma separated list of users.
|
||||
Selected messages are written to those users
|
||||
|
@ -25,7 +25,7 @@
|
||||
.\"
|
||||
.\" $FreeBSD$
|
||||
.\"
|
||||
.Dd February 28, 2004
|
||||
.Dd September 2, 2006
|
||||
.Dt WATCHDOG 8
|
||||
.Os
|
||||
.Sh NAME
|
||||
|
@ -25,7 +25,7 @@
|
||||
.\"
|
||||
.\" $FreeBSD$
|
||||
.\"
|
||||
.Dd June 25, 2003
|
||||
.Dd September 2, 2006
|
||||
.Dt WATCHDOGD 8
|
||||
.Os
|
||||
.Sh NAME
|
||||
|
@ -72,7 +72,8 @@ mode.
|
||||
Debugging mode: 0 = no, 1 = minimal, 2 = verbose, 3 = msg dumps, 4 =
|
||||
excessive.
|
||||
.It Va dump_file
|
||||
Dump file for state information (on SIGUSR1).
|
||||
Dump file for state information (on
|
||||
.Dv SIGUSR1 ) .
|
||||
.It Va ctrl_interface
|
||||
The pathname of the directory in which
|
||||
.Xr hostapd 8
|
||||
@ -185,8 +186,8 @@ seconds.
|
||||
Rekey GTK when any STA that possesses the current GTK is leaving the
|
||||
BSS.
|
||||
.It Va wpa_gmk_rekey
|
||||
Time interval for rekeying GMK (master key used internally to generate GTKs
|
||||
(in seconds).
|
||||
Time interval for rekeying GMK (master key used internally to generate GTKs),
|
||||
in seconds.
|
||||
.El
|
||||
.Sh SEE ALSO
|
||||
.Xr hostapd 8 ,
|
||||
|
@ -51,7 +51,8 @@ utility listens for events generated by an
|
||||
.Xr ndis 4
|
||||
wireless network driver and relays them to
|
||||
.Xr wpa_supplicant 8
|
||||
for possible processing. The three event types that can occur
|
||||
for possible processing.
|
||||
The three event types that can occur
|
||||
are media connect and disconnect events, such as when a wireless
|
||||
interface joins or leaves a network, and media-specific events.
|
||||
In particular,
|
||||
@ -64,12 +65,14 @@ needs in order to properly associate with WPA2-capable access points.
|
||||
The
|
||||
.Nm
|
||||
daemon works by listening for interface information events via
|
||||
a routing socket. When it detects an event that was generated by an
|
||||
a routing socket.
|
||||
When it detects an event that was generated by an
|
||||
.Xr ndis 4
|
||||
interface, it transmits it via UDP packet on the loopback interface,
|
||||
where
|
||||
.Xr wpa_supplicant 8
|
||||
is presumeably listening. The standard
|
||||
is presumeably listening.
|
||||
The standard
|
||||
.Xr wpa_supplicant 8
|
||||
distribution includes its own version of this utility for use with
|
||||
.Tn Windows\[rg] .
|
||||
@ -92,31 +95,35 @@ The
|
||||
daemon supports the following options:
|
||||
.Bl -tag -width indent
|
||||
.It Fl a
|
||||
Process all events. By default,
|
||||
Process all events.
|
||||
By default,
|
||||
.Nm
|
||||
will only process and forward media-specific events, which contain
|
||||
PMKID candidate information, and not bother forwarding connect and
|
||||
disconnect events, since
|
||||
.Xr wpa_supplicant 8
|
||||
normally can determine the current link state on its own. In some
|
||||
normally can determine the current link state on its own.
|
||||
In some
|
||||
cases, the additional connect and disconnect events only confuse it
|
||||
and make the association and authentication process take longer.
|
||||
.It Fl d
|
||||
Run in debug mode. This causes
|
||||
Run in debug mode.
|
||||
This causes
|
||||
.Nm
|
||||
to run in the foreground and generate any output to the standard
|
||||
error instead of using the
|
||||
.Xr syslog 3
|
||||
facility.
|
||||
.It Fl v
|
||||
Run in verbose mode. This causes
|
||||
Run in verbose mode.
|
||||
This causes
|
||||
.Nm
|
||||
to emit notifications when it receives events.
|
||||
.El
|
||||
.Sh SEE ALSO
|
||||
.Xr ndis 4 ,
|
||||
.Xr ndisapi 9 ,
|
||||
.Xr wpa_supplicant 8
|
||||
.Xr wpa_supplicant 8 ,
|
||||
.Xr ndisapi 9
|
||||
.Sh HISTORY
|
||||
The
|
||||
.Nm
|
||||
|
Loading…
Reference in New Issue
Block a user