diff --git a/Manuals/Howto-dialup/Administration.docbook b/Manuals/Howto-dialup/Administration.docbook new file mode 100755 index 0000000..a16f3df --- /dev/null +++ b/Manuals/Howto-dialup/Administration.docbook @@ -0,0 +1,13 @@ + + + Administration + + + + ... + + + + &administration-mail; + + diff --git a/Manuals/Howto-dialup/Administration.ent b/Manuals/Howto-dialup/Administration.ent new file mode 100644 index 0000000..8feac9d --- /dev/null +++ b/Manuals/Howto-dialup/Administration.ent @@ -0,0 +1,2 @@ + + diff --git a/Manuals/Howto-dialup/Administration/Mail.docbook b/Manuals/Howto-dialup/Administration/Mail.docbook new file mode 100644 index 0000000..04b9c1d --- /dev/null +++ b/Manuals/Howto-dialup/Administration/Mail.docbook @@ -0,0 +1,9 @@ + + + Mail Server Administration + + + ... + + + diff --git a/Manuals/Howto-dialup/Commons.ent b/Manuals/Howto-dialup/Commons.ent new file mode 100755 index 0000000..f5bcdd1 --- /dev/null +++ b/Manuals/Howto-dialup/Commons.ent @@ -0,0 +1,23 @@ + + + + + + +&TC; Project"> + + +&TC; Mirrors"> +&TC; Wiki"> + + + + +The CentOS Artwork Repository"> +&TCPI; User's Guide"> diff --git a/Manuals/Howto-dialup/Configurations.docbook b/Manuals/Howto-dialup/Configurations.docbook new file mode 100755 index 0000000..f470587 --- /dev/null +++ b/Manuals/Howto-dialup/Configurations.docbook @@ -0,0 +1,20 @@ + + + Configurations + + + + This part of the book discusses the configuration of specific + infrastructures that may or may not be included inside &TCPI;. + Each configuration described here is oriented to satisfy + specific practical situations in a step-by-step fashion, so it + can be implemented as straightforward as possible. The + packages and documentation references related to each + configuration are also mentioned so you can get deeper on each + topic in case you need so. + + + + &configurations-dialup; + + diff --git a/Manuals/Howto-dialup/Configurations.ent b/Manuals/Howto-dialup/Configurations.ent new file mode 100755 index 0000000..410c988 --- /dev/null +++ b/Manuals/Howto-dialup/Configurations.ent @@ -0,0 +1,7 @@ + + + + + + + diff --git a/Manuals/Howto-dialup/Configurations/Dialup.docbook b/Manuals/Howto-dialup/Configurations/Dialup.docbook new file mode 100644 index 0000000..b336433 --- /dev/null +++ b/Manuals/Howto-dialup/Configurations/Dialup.docbook @@ -0,0 +1,11 @@ + + + IP Through Telephone Line + + &configurations-dialup-intro; + &configurations-dialup-usage; + &configurations-dialup-modem; + &configurations-dialup-server; + &configurations-dialup-client; + + diff --git a/Manuals/Howto-dialup/Configurations/Dialup/client.docbook b/Manuals/Howto-dialup/Configurations/Dialup/client.docbook new file mode 100644 index 0000000..894c293 --- /dev/null +++ b/Manuals/Howto-dialup/Configurations/Dialup/client.docbook @@ -0,0 +1,97 @@ + + + The Client Computer + + + Installing Client Computer + + ... + + + + + Configuring Client Computer + + + ... + + + + Establishing Dial-Up Connection + + + To establish connection from the client computer to the server + computer you should configure the client computer to dial-up + the server computer, using the following information: + + + + ISP Name: server.example.com +ISP Phone: +53043515094 + Username: client.example.com + Password: mail4u + + + + To estabalish a dial-up connection from the client computer to + the server computer, you need to determine the modem location + assigned by the operating system, so you can instruct + applications like system-config-network the + correct device they will to talk to. This configuration + process has been greatly simplified by the + wvdialconf command distributed with the + wvdial + package. To do this, run the following command and pay + attention to the three last lines of its output: + + + wvdialconf /etc/wvdial.conf + + +Scanning your serial ports for a modem. + +ttyS0<*1>: ATQ0 V1 E1 -- failed with 2400 baud, next try: 9600 baud +ttyS0<*1>: ATQ0 V1 E1 -- failed with 9600 baud, next try: 115200 baud +ttyS0<*1>: ATQ0 V1 E1 -- and failed too at 115200, giving up. +Port Scan<*1>: S1 S2 S3 +WvModem<*1>: Cannot get information for serial port. +ttyACM0<*1>: ATQ0 V1 E1 -- OK +ttyACM0<*1>: ATQ0 V1 E1 Z -- OK +ttyACM0<*1>: ATQ0 V1 E1 S0=0 -- OK +ttyACM0<*1>: ATQ0 V1 E1 S0=0 &C1 -- OK +ttyACM0<*1>: ATQ0 V1 E1 S0=0 &C1 &D2 -- OK +ttyACM0<*1>: ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0 -- OK +ttyACM0<*1>: Modem Identifier: ATI -- LT V.90 1.0 MT5634ZBA-USB +Data/Fax Modem (Dual Config) Version 5.18e +ttyACM0<*1>: Speed 4800: AT -- OK +ttyACM0<*1>: Speed 9600: AT -- OK +ttyACM0<*1>: Speed 19200: AT -- OK +ttyACM0<*1>: Speed 38400: AT -- OK +ttyACM0<*1>: Speed 57600: AT -- OK +ttyACM0<*1>: Speed 115200: AT -- OK +ttyACM0<*1>: Speed 230400: AT -- OK +ttyACM0<*1>: Speed 460800: AT -- OK +ttyACM0<*1>: Max speed is 460800; that should be safe. +ttyACM0<*1>: ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0 -- OK + +Found an USB modem on /dev/ttyACM0. +Modem configuration written to /etc/wvdial.conf. +ttyACM0<Info>: Speed 460800; init "ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0" + + + + Now, using this information, configure a Modem connection + using the interface provided by + system-config-network command. Take care of + replacing the /dev/modem device name by + that one found by wvdialconf. At this + point, you can use the button Activate from + system-config-network to establish the + Modem connection you just configured. + + + + + + + diff --git a/Manuals/Howto-dialup/Configurations/Dialup/intro.docbook b/Manuals/Howto-dialup/Configurations/Dialup/intro.docbook new file mode 100644 index 0000000..cad9a6a --- /dev/null +++ b/Manuals/Howto-dialup/Configurations/Dialup/intro.docbook @@ -0,0 +1,24 @@ + + + Introduction + + + This chapter describes two computers configuration, one acting + as server and other as client. The server computer will be + configured to provide internet services and the client to make + use of those internet services provided by the server + computer. The connection medium both client and server + computer use is the telelphone line (i.e., the same medium you + use to realize phone calls). In this configuration, both + client and server computers use special devices named + Modems to transmit data in form of sound across + the telephone line. + + + + The configuration described in this chapter could be a good + choise when the only communication medium you have access to + is a telephone network. + + + diff --git a/Manuals/Howto-dialup/Configurations/Dialup/modem.docbook b/Manuals/Howto-dialup/Configurations/Dialup/modem.docbook new file mode 100644 index 0000000..fcbc030 --- /dev/null +++ b/Manuals/Howto-dialup/Configurations/Dialup/modem.docbook @@ -0,0 +1,68 @@ + + + The Modem Hardware + + + In order to establish a PPP link between two computers using + the telephone line as medium for data transmission, you need + to install (at least) one modem device in each computer. + + + + To install a modem device in computer you need to attach the + modem hardware to the computer and later the telephone line to + the modem hardware. To connect the modem to your computer, you + need to connect the serial or USB cable that comes from the + modem hardware to the appropriate input on your computer. To + connect the modem to the telephone line system, you need to + unplug the cable that connects your telephone device and plug + it on the modem device, specifically in the port reserved for + data transmission. Later, using a similar cable, you could + connect your telephone device to the modem's telephone port, + so you can realize telephone calls when no data transmition + take place. + + + + To be on the safe side, do all the installation with the + computer turned off. Then, when everthing has been put in + place, turn it on. Once the system is up, you can verify the + modem hardware using either the lsusb or + lspci commands. These commands need to be + run with administrative privileges, so probably need to + sudo them or login as root user in order to execute + thme. For example, assuming you are logged in as root user, + and you are using an USB modem like that one we mentioned + before, the output of lsusb command would + look like the following: + + + +Bus 003 Device 001: ID 0000:0000 +Bus 001 Device 001: ID 0000:0000 +Bus 001 Device 002: ID 058f:6366 Alcor Micro Corp. Multi Flash Reader +Bus 002 Device 001: ID 0000:0000 +Bus 005 Device 003: ID 06e0:f104 Multi-Tech Systems, Inc. +MT5634ZBA-USB MultiModemUSB (new firmware) +Bus 005 Device 001: ID 0000:0000 +Bus 005 Device 002: ID 046d:c018 Logitech, Inc. Optical Wheel Mouse +Bus 004 Device 001: ID 0000:0000 + + + + The relevant line here is that mentioning the existence of a + Multi-Tech System, Inc. MT5634ZBA-USB MultiModemUSB (new + firmware) device. If the modem you installed doesn't + appear in this list, it is probably because such hardware is + not supported by &TCD;, yet. + + + + At this point, everything is ready for you to install and + configure the computer either as server (see ) or client (see + ). + + + diff --git a/Manuals/Howto-dialup/Configurations/Dialup/server.docbook b/Manuals/Howto-dialup/Configurations/Dialup/server.docbook new file mode 100644 index 0000000..37042fe --- /dev/null +++ b/Manuals/Howto-dialup/Configurations/Dialup/server.docbook @@ -0,0 +1,789 @@ + + + The Server Computer + + + Installing Server Computer + + + Start with a minimal installation of &TCD;, bootup the + operating system, and login as root user. + + + + Installing Ppp Server + + The ppp server provides the software required to establish and + maintain a PPP link with another system and negociate Internet + Protocol addresses for each end of the link. + + + yum install ppp + + + + + Installing Name Server + + The name server provides the software required to translate + domain names into IP address and IP addresses into domain + names. With this software you can rembember addresses like + instead of + addresses like . There + are other feautres (e.g., mail exchanger resolution, zone + delegation, etc.) provided by this software that aren't used + in the point-to-point configuration we describe in this + chapter. + + yum install bind + + + There is a bind-chroot packages, however, + we aren't using it because SELinux is already enforced on the + &TCD; filesystem and it provides far more security than the + idea of bind-chroot package itself does. + + + + + + Installing Mail Server + + The mail server provides the software required to let you + send/receive mail messages to/from others. The mail server + is splitted in three basic components: The Mail Transfer Agent + (MTA), The Mail Delivery Agent (MDA) and an intermediary + daemon named saslauthd + to handle user authentication. The MTA is the program your + mail client sends mail messages to. The MDA, on the other + hand, is the program your mail client reads mail message + from (i.e., this is the program that let you access your + mailbox). The saslauthd daemon is used by the MDA to + authenticate user's credentials (e.g., the information that + let you access an specific mailbox) and by the MTA to + authenticate users before sending mail to it, however, in the + configuration we are implementing, the MTA doesn't require + that you authenticate to it in order to send mails through + it. The MTA will listen on all network interfaces it is + attached to and will receive mail sent to example.com domain name or + server.example.com host + name). + + + yum install postfix cyrus-{imapd{,-utils},sasl{,-ldap,-md5,-plain}} + + + By default, the sendmail + program is used as mail transfer agent, not postfix. For the + sake of that point-to-point configuration we are implementing, + I decided to use postfix instead as default mail transfer + agent, not sendmail. To effectively achieve this decition, it + is required to use the alternatives + command, as it shown below: + + + alternatives --config mta + + + This command will present you a menu to chose between + available mail transfer agents, so it is there where you + choose to use posfix as default option. Now that you've + changed postfix the default mail transfer agent, you can + saftly remove the sendmail package to avoid unused software + to remain inside the computer. To do this, you can run the + following command: + + + yum remove sendmail + + + In addition to mail server specific packages, we also provide + mailing list support. Mailing lists provide mail addresses + that users registered inside the ISP can write to. When you + sed an mail to a mailing list, your message is distributed to + all members of that list. In order for this to happen, people + registered inside ISP need to subscribe themselves into that + mailing list they want to receive messages from. The + subscription of mailinglist will be available through a secured + web application in the following url: + + + + + + + + + + + yum install mailman + + + + Installing Web Server + + The web server provides the software required to support web + interfaces like those one previously mention to register new + users inside the ISP and subscribe mailing lists. The web + server provided in this configuration will accept requests + both unencrypted and encrypted. + + + yum install httpd mod_ssl crypto-utils + + + In addition to mailing lists support, the web server will + provide access to Subversion. Subvesion provides a way to + manage files through version control. The main purpose of + providing Subversion support here is sharing the version of + &TCAR; I've been working on. + + + yum install subversion mod_dav_svn + + + + + + Installing Directory Server + + + The directory server provides the software required to unify + user information. This server is access by other server + whenever user information is required. You, as end user, can + also use this server from your workstation to retrive a list + of all users registered in the ISP. This list can be retrived + by the web interface the ISP provides, or any application your + workstation provide (e.g., most mail clients provide a way + to configure LDAP servers to build address book from it.). + + + yum openldap-servers python-ldap + + + + + + Configuring Server Computer + + Once all required packages have been installed inside the + server computer, it is time to configure them. This section + describes how to configure the server computer to provide a + public mail system. + + + + Configuring Network Internface + + + /etc/sysconfig/network-scripts/ifcfg-eth0 + + +# Please read /usr/share/doc/initscripts-*/sysconfig.txt +# for the documentation of these parameters. +TYPE=Ethernet +DEVICE=eth0 +HWADDR=00:1c:c0:f0:aa:05 +BOOTPROTO=none +NETMASK=255.255.255.0 +IPADDR=192.168.0.1 +ONBOOT=yes +USERCTL=no +IPV6INIT=no +PEERDNS=yes + + + + + + + + Configuring Ppp Server + + This configuration specifies the way the server computer will + handle incoming dial-up connections. + + + + /etc/ppp/options + + +# Enforce the use of the hostname as the name of the local system for +# authentication purposes (overrides the name option). +usehostname + +# Specify which DNS Servers the incoming Win95 or WinNT Connection +# should use Two Servers can be remotely configured +ms-dns 192.168.0.1 + +# Increase debugging level (same as -d). The debug output is written +# to syslog LOG_LOCAL2. +debug + +# Require the peer to authenticate itself before allowing network +# packets to be sent or received. Please do not disable this setting. +# It is expected to be standard in future releases of pppd. Use the +# call option (see manpage) to disable authentication for specific +# peers. +#auth + +# Use hardware flow control (i.e. RTS/CTS) to control the flow of data +# on the serial port. +crtscts + +# Specifies that pppd should use a UUCP-style lock on the serial +# device to ensure exclusive access to the device. +lock + +# Use the modem control lines. +modem + +# async character map -- 32-bit hex; each bit is a character that +# needs to be escaped for pppd to receive it. 0x00000001 represents +# '\x01', and 0x80000000 represents '\x1f'. To allow pppd to work +# over a rlogin/telnet connection, ou should escape XON (^Q), XOFF +# (^S) and ^]: (The peer should use "escape ff".) +#asyncmap 200a0000 +asyncmap 0 + +# Set the interface netmask to <n>, a 32 bit netmask in "decimal dot" +# notation (e.g. 255.255.255.0). +netmask 255.255.255.0 + +# Don't fork to become a background process (otherwise pppd will do so +# if a serial device is specified). +nodetach + +# Set the assumed name of the remote system for authentication +# purposes to <n>. +remotename client + +# If this option is given, pppd will send an LCP echo-request frame to +# the peer every n seconds. Under Linux, the echo-request is sent when +# no packets have been received from the peer for n seconds. Normally +# the peer should respond to the echo-request by sending an +# echo-reply. This option can be used with the lcp-echo-failure +# option to detect that the peer is no longer connected. +lcp-echo-interval 30 + +# If this option is given, pppd will presume the peer to be dead if n +# LCP echo-requests are sent without receiving a valid LCP echo-reply. +# If this happens, pppd will terminate the connection. Use of this +# option requires a non-zero value for the lcp-echo-interval +# parameter. This option can be used to enable pppd to terminate +# after the physical connection has been broken (e.g., the modem has +# hung up) in situations where no hardware modem control lines are +# available. +lcp-echo-failure 4 + +# Specifies that pppd should disconnect if the link is idle for n +# seconds. +idle 60 + + + + + + /etc/ppp/cha-secrets + /etc/ppp/pap-secrets + + +# client server secret IP addresses + +# Specify the client configuration. This is when this manchine calls +# someone's else machine and tries to establish a point-to-point +# connection. Most of this configuration is handled by the +# `system-config-network' utility. +# +####### redhat-config-network will overwrite this part!!! (begin) ########## +####### redhat-config-network will overwrite this part!!! (end) ############ + +# Specify the server configuration. This is when someone's else +# machine calls this machine trying to establish a point-to-point +# connection. This part of the configuration isn't handled by +# `system-config-network' utility. To prenvent this configuration to +# be lost the next time the `system-config-network' utility be used, +# be sure to have this configuration backed up somewhere so it can be +# resotred in such situations. +# +client server mail4u 192.168.0.2 +server client mail4u 192.168.0.1 + + + + + + + To make the modem respond to calls ... + + + pppd /dev/ttyACM0 + + + + + Configuring Name Server + + + + /etc/named.conf + + +# BIND DNS server 'named' configuration file for the Red Hat BIND +# distribution. This file was initially taken from +# `/usr/share/doc/bind-*/samples/named.conf' file and modified to fit +# this server's needs. +# +# This machine exists to develop The CentOS Project Corporate Identity +# through The CentOS Artwork Repository. Presently, this machine is +# isolated from Internet. However, a modem has been attached[1] and +# configured so people can establish point-to-point connections to +# this machine and download working copies of The CentOS Artwork +# Repository and help me to develop it. +# +# In this configuration there are only two IP addresses involved. The +# one used in this server (192.168.0.1) and another for the client who +# realize the point-to-point connection (192.168.0.2). This server is +# named `server.example.com' and the client `client.example.com' or +# something similar. +# -------------------------------------------------------------------- +# See the BIND Administrator's Reference Manual (ARM) for details, in: +# file:///usr/share/doc/bind-*/arm/Bv9ARM.html +# +# Also see the BIND Configuration GUI: +# /usr/bin/system-config-bind and its manual. +# -------------------------------------------------------------------- + +options { + + # Those options should be used carefully because they disable port + # randomization. + // query-source port 53; + // query-source-v6 port 53; + + # Put files that named is allowed to write in the data/ directory: + directory "/var/named"; // the default + dump-file "data/cache_dump.db"; + statistics-file "data/named_stats.txt"; + memstatistics-file "data/named_mem_stats.txt"; +}; + +logging { + + # If you want to enable debugging, eg. using the 'rndc trace' + # command, named will try to write the 'named.run' file in the + # $directory (/var/named). By default, SELinux policy does not + # allow named to modify the /var/named directory, so put the + # default debug log file in data/ : + channel default_debug { + file "data/named.run" versions 5 size 20m; + severity dynamic; + }; +}; + +# All BIND 9 zones are in a "view", which allow different zones to be +# served to different types of client addresses, and for options to be +# set for groups of zones. By default, if named.conf contains no +# "view" clauses, all zones are in the "default" view, which matches +# all clients. If named.conf contains any "view" clause, then all +# zones MUST be in a view; so it is recommended to start off using +# views to avoid having to restructure your configuration files in the +# future. + +view "internal" { + + # This view will contain zones you want to serve only to + # "internal" clients that connect via your directly attached LAN + # interfaces - "localnets". + match-clients { 192.168.0/24; }; + match-destinations { 192.168.0/24; }; + recursion no; + + # All views must contain the root hints zone. However, since this + # machine is disconnected from Internet it is not possible for it + # to reach root servers. So, this line is commented based that no + # recursion is performed here. + //include "named.rfc1912.zones"; + + # These are your "authoritative" internal zones, and would + # probably also be included in the "localhost_resolver" view + # above: + zone "example.com" IN { + type master; + file "example.com.zone"; + allow-update { none; }; + }; + + zone "0.168.192.in-addr.arpa" IN { + type master; + file "example.com.rr.zone"; + allow-update { none; }; + }; +}; + +# The localhost_resolver is already configured in `/etc/hosts' and set +# as first choise in `/etc/hosts.conf' file. However, if you change +# the order in `/etc/hosts.conf' file to make bind the first choise, +# then you need to include here the localhost_resolver in order to +# resolve localhost (127.0.0.1) address. + +key "rndckey" { + algorithm hmac-md5; + secret "JjsCg0VcCjZILGD8FR9nnw=="; +}; + +controls { + inet 127.0.0.1 port 953 + allow { 127.0.0.1; } keys { "rndckey"; }; +}; + + + + + + /var/named/example.com.zone + + +$ORIGIN example.com. +$TTL 86400 +@ IN SOA example.com. hostmaster.example.com. ( + 2011100404 ; serial (d. adams) + 3H ; refresh + 15M ; retry + 1W ; expiry + 1D ) ; minimum + + IN NS dns.example.com. + IN MX 10 mail.example.com. + +server IN A 192.168.0.1 +client IN A 192.168.0.2 + +dns IN CNAME server +mail IN CNAME server +www IN CNAME server + + + + + + /var/named/example.com.rr.zone + + +$ORIGIN 0.168.192.in-addr.arpa. +$TTL 86400 +@ IN SOA example.com. hostmaster.example.com. ( + 2011100405 ; serial (d. adams) + 3H ; refresh + 15M ; retry + 1W ; expiry + 1D ) ; minimum + + IN NS 192.168.0.1 + +1 IN PTR server.example.com. +2 IN PTR client.example.com. + + + + + + /etc/rndc.conf + + +include "/etc/rndc.key"; +options { + default-key "rndckey"; + default-server 127.0.0.1; + default-port 953; +}; + + + + + + /etc/rndc.key + + +key "rndckey" { + algorithm hmac-md5; + secret "JjsCg0VcCjZILGD8FR9nnw=="; +}; + + + When configuring rndc controls, don't use + the same secret shown in the example above. If you do so, the + secret information will not be a secret anymore (since we + already used it here). Instead, use the + rndc-genconf command to generate a new one, + and be sure it be placed correctly both in + /etc/rndc.conf and + /etc/named.conf configuration files. + + + + + /etc/resolv.conf + + nameserver 192.168.0.1 + + + + /etc/host.conf + + order hosts,bind + + + + + + At this point you can start the named service and realize some + tests to verify the named service is certainly working as + expected. For example, consider the the following two + commands: + + + +[root@server ~]# service named start +Starting named: [ OK ] +[root@server ~]# dig example.com mx + +; <<>> DiG 9.3.6-P1-RedHat-9.3.6-4.P1.el5_4.2 <<>> example.com mx +;; global options: printcmd +;; Got answer: +;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 3540 +;; flags: qr aa rd; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 0 + +;; QUESTION SECTION: +;example.com. IN MX + +;; ANSWER SECTION: +example.com. 86400 IN MX 10 mail.example.com. + +;; AUTHORITY SECTION: +example.com. 86400 IN NS dns.example.com. + +;; Query time: 0 msec +;; SERVER: 192.168.0.1#53(192.168.0.1) +;; WHEN: Wed Oct 5 10:33:24 2011 +;; MSG SIZE rcvd: 67 + + + + If everything is ok, configure the named service to start at + boot time: + + + chkconfig --level 345 named on + + + If something goes wrong, look for named daemon entries inside the + /var/log/messages file to know what is + going on. When you are configuring the name server, it could + result useful to you keeping an always visible terminal, + running the following command on it: + + + grep named /var/log/messages | tail -f - + + + + + Configuring Mail Server (MTA) + + Based on default configuration provided by Postfix RPM inside + &TCD; (release 5.5), look for the following options and leave + the rest as is. + + + + + /etc/postfix/main.cf + + +myhostname = server.example.com +mydomain = example.org +inet_interfaces = $myhostname, localhost +mynetworks = 192.168.0.0/24, 127.0.0.0/8 +mailbox_transport = lmtp:unix:/var/lib/imap/socket/lmtp +local_destination_recipient_limit = 300 +local_destination_concurrency_limit = 5 + + + + + + + + + Configuring Mail Server (MDA) + + + /etc/cyrus.conf + + + Leave it as is. There is nothing to touch here for a small and + basic configuration like that one we are implementing in this + chapter. + + + + + /etc/imapd.conf + + + Leave it as is. There is nothing to touch here for a small and + basic configuration like that one we are implementing in this + chapter. + + + The initial configuration of Cyrus IMAP server is set to use + PLAIN authentication mechanisim (see + option) against saslauthd daemon. This makes the + password information to be vulnerable for man in the middle + attacks. In order to protect the user authentication, you can + use other authentication mechanisms like CRAM-MD5 or + DIGEST-MD5 in the mail client in order to send the password + information encrypted. Another solution would be to create an + encrypted channel for communication between the e-email client + and Cyrus IMAP server by mean of SSL encryption. + + + When you use authentication mechanisms that encrypt user + information before passing them to saslauthd daemon (e.g., + DIGETS-MD5), you are protecting your data in the mail + client before passing it to saslauthd daemon. Therefore, when + the saslauthd daemon + tries to validate the credentials you passed in against PAM, + it fails. At my personal understanding, this happens becase + PAM must receive the user information as it was entered by the + user (i.e., plainly, without any encryption) in order to + realize the verification against the system default + authentication database (e.g., + /etc/passwd, + /etc/shadow), and saslauthd daemon is passing an + encrypted version of the plain user information which + obviously cannot match the hash produced by plain user + information in first place. + + + + One alternative to the situation mentioned above could be to + use PLAIN authentication mechanism over an SSL encrypted + communication or excluding PAM mechanism from saslauthd + daemon, and use LDAP mechanism instead. When LDAP mechanism + is used as default authentication mechanism inside saslauthd + daemon, it is possible for mail clients to send encrypted + passwords to saslauthd daemon. In this configuration, the + password stored in LDAP server must be encrypted using the + same algorithm used to send the encrypted password from mail + client to saslauthd daemon. Therefore, you need to force the + user to use just one authentication mechanism, that one used + to stored encrypted passwords inside the LDAP server. + Otherwise, it would be very difficult to authenticate users + that send passwords encrypted in a way different to that one + stored in the LDAP server. + + + + Another configuration could be to keep mail clients using + PLAIN authentication over an SSL connection against saslauthd + daemon, and saslauthd using a PAM. But this time, PAM would be + configured to extend its default system authentication by + using an LDAP server. This way, it would be possible to + isolate user accound administration and greatly control the + kind of information a user might have. For example, the root + user account would be in the system default authentication, + however all service-specific user information would be in the + LDAP server. This permits us to create a web application that + interact with LDAP server in order to manage service-specific + user information only avoiding any contant with system default + authentication, the place where the root user is stored in. In + this PAM configuration, the first match that fails means that + the whole authentication process fails. + + + + + + /etc/pki/cyrus-imapd/cyrus-imapd.pem + + + This file is a symbolic link to + /etc/pki/tls/certs/cyrus-imapd.pem. This + file contains a self-generated SSL certificate you probably + want to update for setting your host name in the Common + Name field of it. To create this file use the + following command: + + openssl req -new -x509 -nodes -out /etc/pki/tls/certs/cyrus-imapd.pem -keyout /etc/pki/tls/certs/cyrus-imapd.pem -days 365 + + + + + + + To initiate the Cyrus IMAP server, run the following command: + + + service cyrus-imapd start + + + In case something fails, look into the + /var/log/maillog file, specifically those + entries containing imap, pop, + nntp and cyrus strings. It could be + useful if, before initiating Cyrus IMAP server, you open a + terminal and run the following command in it, just to see what + is happening once Cyrus IMAP server is initiated: + + + egrep '(cyrus|imap|pop)' /var/log/maillog | tail -f - + + + Later, to test the STARTTLS negociation, you can + run the following command: + + + imtest -t "" server.example.com + + + To administer mailboxes inside Cyrus Imapd, set a password to + cyrus user (e.g., passwd cyrus), do login + with it, and connect to Cyrus IMAP server using the + cyradm command, as shown below: + + + cyradm --user=cyrus --auth=login localhost + + + + + Configuring Mail Server (SASL) + + ... + + + + + Configuring Web Server + + ... + + + + + Configuring Directory Server + + ... + + + + + + diff --git a/Manuals/Howto-dialup/Configurations/Dialup/usage.docbook b/Manuals/Howto-dialup/Configurations/Dialup/usage.docbook new file mode 100644 index 0000000..62be0b9 --- /dev/null +++ b/Manuals/Howto-dialup/Configurations/Dialup/usage.docbook @@ -0,0 +1,290 @@ + + + Usage Convenctions + + + The infrastructure described in this chapter uses the + client/server model to provide a public mail service through + the telephone line. In this configuration, we (the poeple + building the infrastructure) provide the information you (the + person using the infrastructure) need to know in order to + establish a point-to-point connection from the client computer + to the server computer through the telephone line. + + + The infrastructure described in this chapter is made available + to you free of charge, however, you should know that + maintaining it costs both money and time. For example, for + each hour the server computer is on production there is an + electrical consume that need to be paid every month. + Likewise, each call that you establish from the client + computer to the server computer will cost you money, based on + the location you made the call from and the time you spend + connected. + + + + In this section we discuss usage convenctions we all must be + agree with, in order to achieve a practical and secure + interchange system. + + + + Administering Dial-Up Connections + + + The lifetime of dial-up connections must be limitted based on + the number of users you expect to establish connection and the + kind of services you plan to provide. The mail service + provided by the server computer is conceived as a public + service so anyone with a modem attached to a computer would be + able to have access to it. However, due to hardware + limitations, only 100 users will be allowed to be registered + in the public mail service. Based on this information, the + lifetime of established connections will be of 15 minutes from + the established moment on. Once the connection has been + established, if the link is idle for 1 minute, the server + computer will close the established connection to free the + telephone line. This control can be implemented through the + and options + inside the pppd's configuration + file. + + + + Only registered user profiles will be able to establish connections + to the server computer. This control can be implemented using + the option in the + pppd's configuration file to define a + list of all telephone numbers that are allowed to establish + connection with the server computer, based on the list of + registered user profiles. By default, all telephone numbers + are denied from establishing access with the server computer, + except those ones explicitly set by + option. If the + option is not present in + pppd's configuration file, all + telephone numbers are allowed to establish connection with the + server computer, so be sure to include the + option in + pppd's configuration file if you + want to control who can/cannot establish connection with the + server computer. + + + +##### centos-pppd-config will overwrite this part!!! (begin) ##### +allow-number 12345 +allow-number 21345 +allow-number 34567 +##### centos-pppd-config will overwrite this part!!! (end) ##### + + + + The centos-pppd-admin application + must be considered part of user profile registration process + inside the server computer. The + centos-pppd-admin application would + be used to control the list of allowed telephone numbers + inside the pppd's configuration + file, based on the list of user profiles. The + centos-pppd-admin application + should be executed after any registration/deletion action + against the list of user profiles with root privilages in order to be + able of writing the settings on + pppd's configuration file. + + + + Redialing consecutive connections from the same telephone + number without any dealy between call retries must be avoided + from client computers. This would reduce the possibilities for + other client computers to establish connection with the server + computer. To prevent this issue from happening, it would be + necessary to provide more telephone lines than users + authorized to establish connection with the server computer. + Nevertheless, there is only one telephone line available for + the server computer to use. + + + + + + Administering User Profiles + + + In order for you to use any service provided by the server + computer it is required that you register yourself inside the + server computer creating a user profile. The user profile + provides the user information required by services inside the + server computer (e.g., username, password, e-mail address, + telephone number, etc.). To register new user profiles, you + need to use the web application provided by the server + computer. For example, assuming the domain name of the server + computer is example.com, the web + application would be accessable through the following URL: + . + + + + To reach the web interface, the first thing you need to do is + establishing a dial-up connection to the server computer as + described in . Once the + dial-up connection has been established, you need to open a + web browser (e.g., Firefox) and put the URL mentioned above in + the address space, and press Enter to go. This will present + you a web page with the instructions you need to follow in + order to register your user profile. Other actions like + updating or deleting your own user profile should be also + possible from this web interface. + + + + + The web interface used to manage user profiles inside the + server computer must be presented over an encrypted session in + order to protect all the information passing through. + + + + + Inside the server computer, all related subsystems in need of + user information (e.g., Postix, Cyrus-Imapd and Saslauthd) + retrive user information from one single (LDAP) source. The + web application provided by the server computer manages all + these subsystems' configuration files in order to provide a + pleasant experience for end users. The web interface must be + as simple as possible in order to achieve all administration + tasks in the range of time permitted by the server computer + before it closes the connection established from the client + computer. + + + + More information about the web interface you need to use to + manage your user profile inside the server computer can be + found in . + + + + + + Administering Services + + + The information generated inside the server computer is + isolated from Internet. This way, any information generated + inside the server computer will be available only to people + registered inside the server computer. For example, don't ever + expect to send/receive e-mails to/from Internet e-mail + accounts like Gmail or Yahoo, nor visiting web sites like + Google or Wikipedia either. For + this to happen, it is required an established connection + between the server computer you are establishing connection + through and the Internet network those services are available + in. Without that link, it is not possible to direct your + requests to those sites. + + + + The implementation of services that required persistent + connections (e.g., chats) will not + be considered as a practical offer inside the server computer. + Instead, only asynchronous services (e.g., + e-mail) will be supported. This + restriction is required to reduce the amount of time demanded + by services. For example, consider an environment where you + connect to the server computer for sending/receiving e-mails + messages and then quickly disconnect from it to free the + telephone line for others to use. In this environment, there + is no need for you and other person to be both connected at + the same time to send/receive e-mail messages to/from each + other. The e-mails sent from other person to you will be + available in your mailbox the next time you get connected to + the server computer and use your e-mail client to send/receive + e-mail messages. Likewise, you don't need to be connected to + the server computer in order to write your e-mail messages. + You can write down your messages off-line and then establish + connection once you've finished writing, just to send them + out and receive new messages that could have been probably + sent to you. + + + + Another issue related to e-mail exchange is the protocol used + to receive messages. Presently, there are two popular ways to + do this, one is through IMAP and another through POP3. When + you use IMAP protocol, e-mail messages are retained in the + server computer and aren't downloaded to client computer. + Otherwise, when you use POP3 protocol, e-mail messages are + downloaded to the client computer and removed from server + computer. Based on the resources we have and the kind of link + used by the client computer to connect the server computer, + using POP3 is rather prefered than IMAP. However both are made + available. + + + + Assuming you use IMAP protocol to read your mailbox, be aware + that you need to be connected to the server computer. Once + the connection is lost you won't be able to read your messages + (unless your e-mail client possesses a feature that let you + reading messages off-line). Morover, you run the risk of + getting your mailbox out of space. If your mailbox gets out of + space, new messages sent to you will not be deliver to your + mailbox. Instead, they will be deferred for a period of time + (e.g., about 5 days when using + Postfix defaults) hoping you to + free the space in your mailbox to deliver them. If you don't + free space within this period of time, the deferred e-mails + will be bounced back to their senders and you will never see + them. On the other hand, assuming you are using POP3 protocol + to read your mailbox, you always keep your mailbox free to + receive new e-mails messages and keep them for you until the + next time you establish connection with the server computer + and download them to your client computer using your e-mail + client. + + + + + Administering Disk Space + + + The maximum number of registered user profiles is limited + inside the server computer, based on the maximum disk space + the server computer confines to such purpose. For example, + consider an environment where users can get registered + themselves using a web interface. In this case the web + interface must know how much disk space is available before + proceeding to register new mail accounts inside the server + computer and this way preventing any disk writing when there + isn't enough free space on disk to perform a new user + registration. Considering the server computer has confined + 1GB of disk space to handle the mail service (e.g., mail + queues, mailboxes, etc.) and each user mailbox is 10MB, it + will be possible to provide self-registration through the web + interface for 100 users in total. + + + + Another measure related to save disk space might be to remove + unused user accounts and their related files (e.g., mailboxes) + from the server computer. For example, consider an environment + where user accounts are automatically removed from the server + computer when they don't establish a connection with the + server computer in a period greater than 7 days since the last + valid connection established to the server computer. Once the + user account is removed, it is no longer functional of course, + and the person whom lost the account will need to create a new + one, assuming it want to have access to the mail service + again. + + + + + diff --git a/Manuals/Howto-dialup/Licenses.docbook b/Manuals/Howto-dialup/Licenses.docbook new file mode 100644 index 0000000..dfc86ce --- /dev/null +++ b/Manuals/Howto-dialup/Licenses.docbook @@ -0,0 +1,6 @@ + + Licenses + &licenses-gpl; + &licenses-gfdl; + + diff --git a/Manuals/Howto-dialup/Licenses.ent b/Manuals/Howto-dialup/Licenses.ent new file mode 100644 index 0000000..29e0b56 --- /dev/null +++ b/Manuals/Howto-dialup/Licenses.ent @@ -0,0 +1,3 @@ + + + diff --git a/Manuals/Howto-dialup/Licenses/gfdl.docbook b/Manuals/Howto-dialup/Licenses/gfdl.docbook new file mode 100644 index 0000000..33f6e8c --- /dev/null +++ b/Manuals/Howto-dialup/Licenses/gfdl.docbook @@ -0,0 +1,591 @@ + + + GNU Free Documentation License + + Version 1.2, November 2002 + + Copyright © 2000, 2001, 2002 Free Software Foundation, + Inc. 675 Mass Ave, Cambridge, MA 02139, USA + + Everyone is permitted to copy and distribute verbatim copies + of this license document, but changing it is not allowed. + + + + Preamble + + The purpose of this License is to make a manual, + textbook, or other functional and useful document + free in the sense of freedom: to assure + everyone the effective freedom to copy and redistribute it, + with or without modifying it, either commercially or + noncommercially. Secondarily, this License preserves for the + author and publisher a way to get credit for their work, while + not being considered responsible for modifications made by + others. + + This License is a kind of copyleft, which + means that derivative works of the document must themselves be + free in the same sense. It complements the , which is a copyleft license + designed for free software. + + We have designed this License in order to use it for + manuals for free software, because free software needs free + documentation: a free program should come with manuals + providing the same freedoms that the software does. But this + License is not limited to software manuals; it can be used for + any textual work, regardless of subject matter or whether it + is published as a printed book. We recommend this License + principally for works whose purpose is instruction or + reference. + + + + + + Applicability and definitions + + This License applies to any manual or other work, in any + medium, that contains a notice placed by the copyright holder + saying it can be distributed under the terms of this License. + Such a notice grants a world-wide, royalty-free license, + unlimited in duration, to use that work under the conditions + stated herein. The Document, below, refers to + any such manual or work. Any member of the public is a + licensee, and is addressed as you. You accept + the license if you copy, modify or distribute the work in a + way requiring permission under copyright law. + + A + Modified Version of the Document means any work + containing the Document or a portion of it, either copied + verbatim, or with modifications and/or translated into another + language. + + A + Secondary Section is a named appendix or a + front-matter section of the Document that deals exclusively + with the relationship of the publishers or authors of the + Document to the Document's overall subject (or to related + matters) and contains nothing that could fall directly within + that overall subject. (Thus, if the Document is in part a + textbook of mathematics, a may not explain any mathematics.) The relationship could be + a matter of historical connection with the subject or with + related matters, or of legal, commercial, philosophical, + ethical or political position regarding them. + + The Invariant Sections are certain + whose titles are + designated, as being those of Invariant Sections, in the + notice that says that the Document is released under this + License. If a section does not fit the above definition of + Secondary then it is not allowed to be designated as + Invariant. The Document may contain zero Invariant Sections. + If the Document does not identify any Invariant Section then + there are none. + + The + Cover Texts are certain short passages of text + that are listed, as Front-Cover Texts or Back-Cover Texts, in + the notice that says that the Document is released under this + License. A Front-Cover Text may be at most 5 words, and a + Back-Cover Text may be at most 25 words. + + A + Transparent copy of the Document means a + machine-readable copy, represented in a format whose + specification is available to the general public, that is + suitable for revising the document straightforwardly with + generic text editors or (for images composed of pixels) + generic paint programs or (for drawings) some widely available + drawing editor, and that is suitable for input to text + formatters or for automatic translation to a variety of + formats suitable for input to text formatters. A copy made in + an otherwise file format whose + markup, or absence of markup, has been arranged to thwart or + discourage subsequent modification by readers is not . An image format is not if used for any substantial amount of + text. A copy that is not is called Opaque. + + Examples of suitable formats for copies + include plain ASCII without markup, Texinfo input format, + LaTeX input format, SGML or XML using a publicly available + DTD, and standard-conforming simple HTML, PostScript or PDF + designed for human modification. Examples of transparent + image formats include PNG, XCF and JPG. Opaque formats + include proprietary formats that can be read and edited only + by proprietary word processors, SGML or XML for which the DTD + and/or processing tools are not generally available, and the + machine-generated HTML, PostScript or PDF produced by some + word processors for output purposes only. + + The Title + Page means, for a printed book, the title page itself, + plus such following pages as are needed to hold, legibly, the + material this License requires to appear in the title page. + For works in formats which do not have any title page as such, + Title Page means the text near the most + prominent appearance of the work's title, preceding the + beginning of the body of the text. + + A section Entitled XYZ means a named + subunit of the Document whose title either is precisely XYZ or + contains XYZ in parentheses following text that translates XYZ + in another language. (Here XYZ stands for a specific section + name mentioned below, such as Acknowledgements, + Dedications, Endorsements, or + History.) To Preserve the Title + of such a section when you modify the Document means that it + remains a section Entitled XYZ according to + this definition. + + The Document may include Warranty Disclaimers next to + the notice which states that this License applies to the + Document. These Warranty Disclaimers are considered to be + included by reference in this License, but only as regards + disclaiming warranties: any other implication that these + Warranty Disclaimers may have is void and has no effect on the + meaning of this License. + + + + + + Verbatim copying + + You may copy and distribute the Document in any medium, + either commercially or noncommercially, provided that this + License, the copyright notices, and the license notice saying + this License applies to the Document are reproduced in all + copies, and that you add no other conditions whatsoever to + those of this License. You may not use technical measures to + obstruct or control the reading or further copying of the + copies you make or distribute. However, you may accept + compensation in exchange for copies. If you distribute a + large enough number of copies you must also follow the + conditions in section . + + You may also lend copies, under the same conditions + stated above, and you may publicly display copies. + + + + + + Copying in quantity + + If you publish printed copies (or copies in media that + commonly have printed covers) of the Document, numbering more + than 100, and the Document's license notice requires Cover + Texts, you must enclose the copies in covers that carry, + clearly and legibly, all these : + Front-Cover Texts on the front cover, and Back-Cover Texts on + the back cover. Both covers must also clearly and legibly + identify you as the publisher of these copies. The front + cover must present the full title with all words of the title + equally prominent and visible. You may add other material on + the covers in addition. Copying with changes limited to the + covers, as long as they preserve the title of the Document and + satisfy these conditions, can be treated as verbatim copying + in other respects. + + If the required texts for either cover are too + voluminous to fit legibly, you should put the first ones + listed (as many as fit reasonably) on the actual cover, and + continue the rest onto adjacent pages. + + If you publish or distribute Opaque copies of the + Document numbering more than 100, you must either include a + machine-readable copy along with each Opaque copy, + or state in or with each Opaque copy a computer-network + location from which the general network-using public has + access to download using public-standard network protocols a + complete copy of the Document, free of added + material. If you use the latter option, you must take + reasonably prudent steps, when you begin distribution of + Opaque copies in quantity, to ensure that this + copy will remain thus accessible at the stated location until + at least one year after the last time you distribute an Opaque + copy (directly or through your agents or retailers) of that + edition to the public. + + It is requested, but not required, that you contact the + authors of the Document well before redistributing any large + number of copies, to give them a chance to provide you with an + updated version of the Document. + + + + + + Modifications + + You may copy and distribute a of the Document under the + conditions of sections and above, + provided that you release the under precisely this License, with the filling the role of the + Document, thus licensing distribution and modification of the + to whoever possesses a + copy of it. In addition, you must do these things in the + : + + + + + Use in the (and on + the covers, if any) a title distinct from that of the + Document, and from those of previous versions (which + should, if there were any, be listed in the History + section of the Document). You may use the same title + as a previous version if the original publisher of + that version gives permission. + + + List on the , as + authors, one or more persons or entities responsible + for authorship of the modifications in the , together with at least + five of the principal authors of the Document (all of + its principal authors, if it has fewer than five), + unless they release you from this requirement. + + + + State on the the + name of the publisher of the , as the + publisher. + + + + Preserve all the copyright notices of the + Document. + + + + Add an appropriate copyright notice for your + modifications adjacent to the other copyright + notices. + + + + Include, immediately after the copyright + notices, a license notice giving the public permission + to use the under the terms of this + License, in the form shown in the Addendum + below. + + + + Preserve in that license notice the full lists + of and required + given in the Document's + license notice. + + + + Include an unaltered copy of this License. + + + + Preserve the section Entitled + History, Preserve its Title, and add to + it an item stating at least the title, year, new + authors, and publisher of the as given on the . If there is no section + Entitled History in the Document, create + one stating the title, year, authors, and publisher of + the Document as given on its , then add an item describing the as stated in the previous + sentence. + + + + Preserve the network location, if any, given in + the Document for public access to a copy of the Document, and + likewise the network locations given in the Document + for previous versions it was based on. These may be + placed in the History section. You may + omit a network location for a work that was published + at least four years before the Document itself, or if + the original publisher of the version it refers to + gives permission. + + + + For any section Entitled + Acknowledgements or + Dedications, Preserve the Title of the + section, and preserve in the section all the substance + and tone of each of the contributor acknowledgements + and/or dedications given therein. + + + + Preserve all the of the Document, + unaltered in their text and in their titles. Section + numbers or the equivalent are not considered part of + the section titles. + + + + Delete any section Entitled + Endorsements. Such a section may not + be included in the . + + + + Do not retitle any existing section to be + Entitled Endorsements or to conflict in + title with any . + + + Preserve any Warranty Disclaimers. + + + + + If the includes new + front-matter sections or appendices that qualify as and contain no material copied + from the Document, you may at your option designate some or + all of these sections as invariant. To do this, add their + titles to the list of in the 's license notice. These titles + must be distinct from any other section titles. + + You may add a section Entitled + Endorsements, provided it contains nothing but + endorsements of your by various + parties–for example, statements of peer review or that + the text has been approved by an organization as the + authoritative definition of a standard. + + You may add a passage of up to five words as a + Front-Cover Text, and a passage of up to 25 words as a + Back-Cover Text, to the end of the list of in the . Only one passage of + Front-Cover Text and one of Back-Cover Text may be added by + (or through arrangements made by) any one entity. If the + Document already includes a cover text for the same cover, + previously added by you or by arrangement made by the same + entity you are acting on behalf of, you may not add another; + but you may replace the old one, on explicit permission from + the previous publisher that added the old one. + + The author(s) and publisher(s) of the Document do not by + this License give permission to use their names for publicity + for or to assert or imply endorsement of any . + + + + + + Combining documents + + You may combine the Document with other documents + released under this License, under the terms defined in + section above for + modified versions, provided that you include in the + combination all of the of + all of the original documents, unmodified, and list them all + as of your combined work + in its license notice, and that you preserve all their + Warranty Disclaimers. + + The combined work need only contain one copy of this + License, and multiple identical may be replaced with a single + copy. If there are multiple with the same name but + different contents, make the title of each such section unique + by adding at the end of it, in parentheses, the name of the + original author or publisher of that section if known, or else + a unique number. Make the same adjustment to the section + titles in the list of in + the license notice of the combined work. + + In the combination, you must combine any sections + Entitled History in the various original + documents, forming one section Entitled + History; likewise combine any sections Entitled + Acknowledgements, and any sections Entitled + Dedications. You must delete all sections + Entitled Endorsements. + + + + + + Collection of documents + + You may make a collection consisting of the Document and + other documents released under this License, and replace the + individual copies of this License in the various documents + with a single copy that is included in the collection, + provided that you follow the rules of this License for + verbatim copying of each of the documents in all other + respects. + + You may extract a single document from such a + collection, and distribute it individually under this License, + provided you insert a copy of this License into the extracted + document, and follow this License in all other respects + regarding verbatim copying of that document. + + + + + + Aggregation with independent works + + A compilation of the Document or its derivatives with + other separate and independent documents or works, in or on a + volume of a storage or distribution medium, is called an + aggregate if the copyright resulting from the + compilation is not used to limit the legal rights of the + compilation's users beyond what the individual works permit. + When the Document is included in an aggregate, this License + does not apply to the other works in the aggregate which are + not themselves derivative works of the Document. + + If the Cover Text requirement of section is applicable to these + copies of the Document, then if the Document is less than one + half of the entire aggregate, the Document's may be placed on covers that bracket + the Document within the aggregate, or the electronic + equivalent of covers if the Document is in electronic form. + Otherwise they must appear on printed covers that bracket the + whole aggregate. + + + + + + Translations + + Translation is considered a kind of modification, so you + may distribute translations of the Document under the terms of + section . Replacing + with translations + requires special permission from their copyright holders, but + you may include translations of some or all in addition to the original + versions of these . You + may include a translation of this License, and all the license + notices in the Document, and any Warranty Disclaimers, + provided that you also include the original English version of + this License and the original versions of those notices and + disclaimers. In case of a disagreement between the + translation and the original version of this License or a + notice or disclaimer, the original version will + prevail. + + If a section in the Document is Entitled + Acknowledgements, Dedications, + or History, the requirement (section ) to Preserve its Title + (section ) will + typically require changing the actual title. + + + + + + Termination + + You may not copy, modify, sublicense, or distribute the + Document except as expressly provided for under this License. + Any other attempt to copy, modify, sublicense or distribute + the Document is void, and will automatically terminate your + rights under this License. However, parties who have received + copies, or rights, from you under this License will not have + their licenses terminated so long as such parties remain in + full compliance. + + + + + + Future Revisions of this License + + The Free Software Foundation may publish new, revised + versions of the GNU Free Documentation License from time to + time. Such new versions will be similar in spirit to the + present version, but may differ in detail to address new + problems or concerns. See . + + Each version of the License is given a distinguishing + version number. If the Document specifies that a particular + numbered version of this License or any later + version applies to it, you have the option of + following the terms and conditions either of that specified + version or of any later version that has been published (not + as a draft) by the Free Software Foundation. If the Document + does not specify a version number of this License, you may + choose any version ever published (not as a draft) by the Free + Software Foundation. + + + + + + How to use this License for your documents + + To use this License in a document you have written, + include a copy of the License in the document and put the + following copyright and license notices just after the title + page: + + +Copyright (C) YEAR YOUR NAME. + +Permission is granted to copy, distribute and/or modify this +document under the terms of the GNU Free Documentation License, +Version 1.2 or any later version published by the Free Software +Foundation; with no Invariant Sections, no Front-Cover Texts, and +no Back-Cover Texts. A copy of the license is included in the +section entitled GNU Free Documentation License. + + + If you have , + Front-Cover Texts and Back-Cover Texts, replace the + with...Texts. line with this: + + +with the Invariant Sections being LIST THEIR TITLES, with the +Front-Cover Texts being LIST, and with the Back-Cover Texts being +LIST. + + + If you have + without , or some other + combination of the three, merge those two alternatives to suit + the situation. + + If your document contains nontrivial examples of program + code, we recommend releasing these examples in parallel under + your choice of free software license, such as the GNU General + Public License, to permit their use in free software. + + + + diff --git a/Manuals/Howto-dialup/Licenses/gpl.docbook b/Manuals/Howto-dialup/Licenses/gpl.docbook new file mode 100644 index 0000000..71654af --- /dev/null +++ b/Manuals/Howto-dialup/Licenses/gpl.docbook @@ -0,0 +1,497 @@ + + + GNU General Public License + + Version 2, June 1991 + + Copyright © 1989, 1991 Free Software Foundation, Inc. + 675 Mass Ave, Cambridge, MA 02139, USA + + Everyone is permitted to copy and distribute verbatim copies + of this license document, but changing it is not allowed. + + + + Preamble + + The licenses for most software are designed to take away + your freedom to share and change it. By contrast, the GNU General + Public License is intended to guarantee your freedom to share and + change free software–to make sure the software is free for + all its users. This General Public License applies to most of the + Free Software Foundation's software and to any other program whose + authors commit to using it. (Some other Free Software Foundation + software is covered by the GNU Library General Public License + instead.) You can apply it to your programs, too. + + When we speak of free software, we are referring to freedom, + not price. Our General Public Licenses are designed to make sure + that you have the freedom to distribute copies of free software + (and charge for this service if you wish), that you receive source + code or can get it if you want it, that you can change the + software or use pieces of it in new free programs; and that you + know you can do these things. + + To protect your rights, we need to make restrictions that + forbid anyone to deny you these rights or to ask you to surrender + the rights. These restrictions translate to certain + responsibilities for you if you distribute copies of the software, + or if you modify it. + + For example, if you distribute copies of such a program, + whether gratis or for a fee, you must give the recipients all the + rights that you have. You must make sure that they, too, receive + or can get the source code. And you must show them these terms so + they know their rights. + + We protect your rights with two steps: + + + + copyright the software, and + + + offer you this license which gives you legal + permission to copy, distribute and/or modify the + software. + + + + + Also, for each author's protection and ours, we want to make + certain that everyone understands that there is no warranty for + this free software. If the software is modified by someone else + and passed on, we want its recipients to know that what they have + is not the original, so that any problems introduced by others + will not reflect on the original authors' reputations. + + Finally, any free program is threatened constantly by + software patents. We wish to avoid the danger that redistributors + of a free program will individually obtain patent licenses, in + effect making the program proprietary. To prevent this, we have + made it clear that any patent must be licensed for everyone's free + use or not licensed at all. + + The precise terms and conditions for copying, distribution + and modification follow. + + + + + + Terms and Conditions for Copying, Distribution and Modification + + + + Section 1 + + You may copy and distribute verbatim copies of the + Program's source code as you receive it, in any medium, + provided that you conspicuously and appropriately publish on + each copy an appropriate copyright notice and disclaimer of + warranty; keep intact all the notices that refer to this + License and to the absence of any warranty; and give any other + recipients of the Program a copy of this License along with + the Program. + + You may charge a fee for the physical act of + transferring a copy, and you may at your option offer warranty + protection in exchange for a fee. + + + + + + Section 2 + + You may modify your copy or copies of the Program or + any portion of it, thus forming a work based on the + Program, and copy and distribute such modifications or + work under the terms of above, provided that you also meet all of these + conditions: + + + + You must cause the modified files to carry prominent + notices stating that you changed the files and the date of + any change. + + + You must cause any work that you distribute or + publish, that in whole or in part contains or is derived + from the Program or any part thereof, to be licensed as a + whole at no charge to all third parties under the terms of + this License. + + + If the modified program normally reads commands + interactively when run, you must cause it, when started + running for such interactive use in the most ordinary way, + to print or display an announcement including an + appropriate copyright notice and a notice that there is no + warranty (or else, saying that you provide a warranty) and + that users may redistribute the program under these + conditions, and telling the user how to view a copy of + this License. + + + Exception + + If the Program itself is interactive but does not + normally print such an announcement, your work based + on the Program is not required to print an + announcement. + + + + + + + These requirements apply to the modified work as a whole. + If identifiable sections of that work are not derived from the + Program, and can be reasonably considered independent and separate + works in themselves, then this License, and its terms, do not + apply to those sections when you distribute them as separate + works. But when you distribute the same sections as part of a + whole which is a work based on the Program, the distribution of + the whole must be on the terms of this License, whose permissions + for other licensees extend to the entire whole, and thus to each + and every part regardless of who wrote it. + + Thus, it is not the intent of this section to claim rights + or contest your rights to work written entirely by you; rather, + the intent is to exercise the right to control the distribution of + derivative or collective works based on the Program. + + In addition, mere aggregation of another work not based on + the Program with the Program (or with a work based on the Program) + on a volume of a storage or distribution medium does not bring the + other work under the scope of this License. + + + + + + Section 3 + + You may copy and distribute the Program (or a work + based on it, under ) in + object code or executable form under the terms of and above provided that you also + do one of the following: + + + + + + Accompany it with the complete corresponding + machine-readable source code, which must be + distributed under the terms of and above on a medium + customarily used for software interchange; + or, + + + + + + Accompany it with a written offer, valid for at + least three years, to give any third party, for a + charge no more than your cost of physically + performing source distribution, a complete + machine-readable copy of the corresponding source + code, to be distributed under the terms of and above on a medium + customarily used for software interchange; + or, + + + + + + Accompany it with the information you received as + to the offer to distribute corresponding source + code. (This alternative is allowed only for + noncommercial distribution and only if you + received the program in object code or executable + form with such an offer, in accord with Subsection + b above.) + + + + + + + The source code for a work means the preferred form of the + work for making modifications to it. For an executable work, + complete source code means all the source code for all modules it + contains, plus any associated interface definition files, plus the + scripts used to control compilation and installation of the + executable. However, as a special exception, the source code + distributed need not include anything that is normally distributed + (in either source or binary form) with the major components + (compiler, kernel, and so on) of the operating system on which the + executable runs, unless that component itself accompanies the + executable. + + If distribution of executable or object code is made by + offering access to copy from a designated place, then offering + equivalent access to copy the source code from the same place + counts as distribution of the source code, even though third + parties are not compelled to copy the source along with the object + code. + + + + + + Section 4 + + You may not copy, modify, sublicense, or distribute the + Program except as expressly provided under this License. Any + attempt otherwise to copy, modify, sublicense or distribute the + Program is void, and will automatically terminate your rights + under this License. However, parties who have received copies, or + rights, from you under this License will not have their licenses + terminated so long as such parties remain in full + compliance. + + + + + + Section 5 + + You are not required to accept this License, since you have + not signed it. However, nothing else grants you permission to + modify or distribute the Program or its derivative works. These + actions are prohibited by law if you do not accept this License. + Therefore, by modifying or distributing the Program (or any work + based on the Program), you indicate your acceptance of this + License to do so, and all its terms and conditions for copying, + distributing or modifying the Program or works based on it. + + + + + + Section 6 + + Each time you redistribute the Program (or any work based on + the Program), the recipient automatically receives a license from + the original licensor to copy, distribute or modify the Program + subject to these terms and conditions. You may not impose any + further restrictions on the recipients' exercise of the rights + granted herein. You are not responsible for enforcing compliance + by third parties to this License. + + + + + + Section 7 + + If, as a consequence of a court judgment or allegation of + patent infringement or for any other reason (not limited to patent + issues), conditions are imposed on you (whether by court order, + agreement or otherwise) that contradict the conditions of this + License, they do not excuse you from the conditions of this + License. If you cannot distribute so as to satisfy simultaneously + your obligations under this License and any other pertinent + obligations, then as a consequence you may not distribute the + Program at all. For example, if a patent license would not permit + royalty-free redistribution of the Program by all those who + receive copies directly or indirectly through you, then the only + way you could satisfy both it and this License would be to refrain + entirely from distribution of the Program. + + If any portion of this section is held invalid or + unenforceable under any particular circumstance, the balance of + the section is intended to apply and the section as a whole is + intended to apply in other circumstances. + + It is not the purpose of this section to induce you to + infringe any patents or other property right claims or to contest + validity of any such claims; this section has the sole purpose of + protecting the integrity of the free software distribution system, + which is implemented by public license practices. Many people + have made generous contributions to the wide range of software + distributed through that system in reliance on consistent + application of that system; it is up to the author/donor to decide + if he or she is willing to distribute software through any other + system and a licensee cannot impose that choice. + + This section is intended to make thoroughly clear what is + believed to be a consequence of the rest of this License. + + + + + + Section 8 + + If the distribution and/or use of the Program is restricted + in certain countries either by patents or by copyrighted + interfaces, the original copyright holder who places the Program + under this License may add an explicit geographical distribution + limitation excluding those countries, so that distribution is + permitted only in or among countries not thus excluded. In such + case, this License incorporates the limitation as if written in + the body of this License. + + + + + + Section 9 + + The Free Software Foundation may publish revised and/or new + versions of the General Public License from time to time. Such + new versions will be similar in spirit to the present version, but + may differ in detail to address new problems or concerns. + + Each version is given a distinguishing version number. If + the Program specifies a version number of this License which + applies to it and any later version, you have the + option of following the terms and conditions either of that + version or of any later version published by the Free Software + Foundation. If the Program does not specify a version number of + this License, you may choose any version ever published by the + Free Software Foundation. + + + + + + Section 10 + + If you wish to incorporate parts of the Program into other + free programs whose distribution conditions are different, write + to the author to ask for permission. For software which is + copyrighted by the Free Software Foundation, write to the Free + Software Foundation; we sometimes make exceptions for this. Our + decision will be guided by the two goals of preserving the free + status of all derivatives of our free software and of promoting + the sharing and reuse of software generally. + + + + + + NO WARRANTY + Section 11 + + BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO + WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE + LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT + HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM AS IS WITHOUT + WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT + NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND + FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE + QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE + PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY + SERVICING, REPAIR OR CORRECTION. + + + + + + Section 12 + + IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO + IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY + MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE + LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, + INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR + INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF + DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU + OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY + OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN + ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. + + End of Terms and Conditions. + + + + + + + + How to Apply These Terms to Your New Programs + + If you develop a new program, and you want it to be of + the greatest possible use to the public, the best way to + achieve this is to make it free software which everyone can + redistribute and change under these terms. + + To do so, attach the following notices to the program. + It is safest to attach them to the start of each source file + to most effectively convey the exclusion of warranty; and each + file should have at least the copyright line + and a pointer to where the full notice is found. + + +<one line to give the program's name and a brief idea of what it does.> +Copyright (C) 19yy <name of author> + +This program is free software; you can redistribute it and/or modify +it under the terms of the GNU General Public License as published by +the Free Software Foundation; either version 2 of the License, or +(at your option) any later version. + +This program is distributed in the hope that it will be useful, +but WITHOUT ANY WARRANTY; without even the implied warranty of +MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +GNU General Public License for more details. + +You should have received a copy of the GNU General Public License +along with this program; if not, write to the Free Software +Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. + + + Also add information on how to contact you by electronic + and paper mail. + + If the program is interactive, make it output a short + notice like this when it starts in an interactive mode: + + +Gnomovision version 69, Copyright (C) 19yy name of author +Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. +This is free software, and you are welcome to redistribute it +under certain conditions; type `show c' for details. + + + The hypothetical commands `show w' and `show c' should + show the appropriate parts of the General Public License. Of + course, the commands you use may be called something other + than `show w' and `show c'; they could even be mouse-clicks or + menu items–whatever suits your program. + + You should also get your employer (if you work as a + programmer) or your school, if any, to sign a copyright + disclaimer for the program, if necessary. Here is a + sample; alter the names: + + +Yoyodyne, Inc., hereby disclaims all copyright interest in the program +`Gnomovision' (which makes passes at compilers) written by James Hacker. + +<signature of Ty Coon>, 1 April 1989 +Ty Coon, President of Vice + + + This General Public License does not permit + incorporating your program into proprietary programs. If your + program is a subroutine library, you may consider it more + useful to permit linking proprietary applications with the + library. If this is what you want to do, use the GNU Library + General Public License instead of this License. + + + + diff --git a/Manuals/Howto-dialup/Preface.docbook b/Manuals/Howto-dialup/Preface.docbook new file mode 100755 index 0000000..7eca40b --- /dev/null +++ b/Manuals/Howto-dialup/Preface.docbook @@ -0,0 +1,40 @@ + + + Preface + + + Welcome to &TCPIUG;, the official documentation of &TCPI;. + + + + This book describes how &TCPI; is organized and the guidelines + both users and administrators should follow to make use of it. + If you need to know what the technical and political desitions + behind &TCP; are, this book is definitly for you. + + + + To make the information in this book managable, it has been + organized in the following parts: + + + + + + organizes the licenses mentioned + in this book. + + + + + + This book is oriented to system administrators and assumes you + have a basic understanding of &TCD;. If you need help with + it, go to the Help page inside + &TCWIKI; for or a list of different places you can find help. + + + &preface-overview; + + diff --git a/Manuals/Howto-dialup/Preface.ent b/Manuals/Howto-dialup/Preface.ent new file mode 100755 index 0000000..41f09f0 --- /dev/null +++ b/Manuals/Howto-dialup/Preface.ent @@ -0,0 +1,2 @@ + + diff --git a/Manuals/Howto-dialup/Preface/overview.docbook b/Manuals/Howto-dialup/Preface/overview.docbook new file mode 100755 index 0000000..1ef0ded --- /dev/null +++ b/Manuals/Howto-dialup/Preface/overview.docbook @@ -0,0 +1,9 @@ +
+ + Overview + + + ... + + +
diff --git a/Manuals/Howto-dialup/tcpi-ug.docbook b/Manuals/Howto-dialup/tcpi-ug.docbook new file mode 100755 index 0000000..f2b634b --- /dev/null +++ b/Manuals/Howto-dialup/tcpi-ug.docbook @@ -0,0 +1,80 @@ + + + + + + + +%Commons.ent; +%Preface.ent; +%Administration.ent; +%Configurations.ent; +%Licenses.ent; +]> + + + + + The CentOS Project Infrastructure + User's Guide + + + + Alain + Reguera Delgado + + + + + 2011 + &TCP;. All rights reserved. + + + + + Permission is granted to copy, distribute and/or modify + this document under the terms of the GNU Free + Documentation License, Version 1.2 or any later version + published by the Free Software Foundation; with no + Invariant Sections, no Front-Cover Texts, and no + Back-Cover Texts. A copy of the license is included in + . + + + + + + 1.0 + Today + + Alain + Reguera Delgado + + + + Under development. + + + + + + + + + &preface; + + + &administration; + &configurations; + + + &licenses; + + diff --git a/Manuals/Tcpi-ug/Administration.docbook b/Manuals/Tcpi-ug/Administration.docbook deleted file mode 100755 index a16f3df..0000000 --- a/Manuals/Tcpi-ug/Administration.docbook +++ /dev/null @@ -1,13 +0,0 @@ - - - Administration - - - - ... - - - - &administration-mail; - - diff --git a/Manuals/Tcpi-ug/Administration.ent b/Manuals/Tcpi-ug/Administration.ent deleted file mode 100644 index 8feac9d..0000000 --- a/Manuals/Tcpi-ug/Administration.ent +++ /dev/null @@ -1,2 +0,0 @@ - - diff --git a/Manuals/Tcpi-ug/Administration/Mail.docbook b/Manuals/Tcpi-ug/Administration/Mail.docbook deleted file mode 100644 index 04b9c1d..0000000 --- a/Manuals/Tcpi-ug/Administration/Mail.docbook +++ /dev/null @@ -1,9 +0,0 @@ - - - Mail Server Administration - - - ... - - - diff --git a/Manuals/Tcpi-ug/Commons.ent b/Manuals/Tcpi-ug/Commons.ent deleted file mode 100755 index f5bcdd1..0000000 --- a/Manuals/Tcpi-ug/Commons.ent +++ /dev/null @@ -1,23 +0,0 @@ - - - - - - -&TC; Project"> - - -&TC; Mirrors"> -&TC; Wiki"> - - - - -The CentOS Artwork Repository"> -&TCPI; User's Guide"> diff --git a/Manuals/Tcpi-ug/Configurations.docbook b/Manuals/Tcpi-ug/Configurations.docbook deleted file mode 100755 index f470587..0000000 --- a/Manuals/Tcpi-ug/Configurations.docbook +++ /dev/null @@ -1,20 +0,0 @@ - - - Configurations - - - - This part of the book discusses the configuration of specific - infrastructures that may or may not be included inside &TCPI;. - Each configuration described here is oriented to satisfy - specific practical situations in a step-by-step fashion, so it - can be implemented as straightforward as possible. The - packages and documentation references related to each - configuration are also mentioned so you can get deeper on each - topic in case you need so. - - - - &configurations-dialup; - - diff --git a/Manuals/Tcpi-ug/Configurations.ent b/Manuals/Tcpi-ug/Configurations.ent deleted file mode 100755 index 410c988..0000000 --- a/Manuals/Tcpi-ug/Configurations.ent +++ /dev/null @@ -1,7 +0,0 @@ - - - - - - - diff --git a/Manuals/Tcpi-ug/Configurations/Dialup.docbook b/Manuals/Tcpi-ug/Configurations/Dialup.docbook deleted file mode 100644 index b336433..0000000 --- a/Manuals/Tcpi-ug/Configurations/Dialup.docbook +++ /dev/null @@ -1,11 +0,0 @@ - - - IP Through Telephone Line - - &configurations-dialup-intro; - &configurations-dialup-usage; - &configurations-dialup-modem; - &configurations-dialup-server; - &configurations-dialup-client; - - diff --git a/Manuals/Tcpi-ug/Configurations/Dialup/client.docbook b/Manuals/Tcpi-ug/Configurations/Dialup/client.docbook deleted file mode 100644 index 894c293..0000000 --- a/Manuals/Tcpi-ug/Configurations/Dialup/client.docbook +++ /dev/null @@ -1,97 +0,0 @@ - - - The Client Computer - - - Installing Client Computer - - ... - - - - - Configuring Client Computer - - - ... - - - - Establishing Dial-Up Connection - - - To establish connection from the client computer to the server - computer you should configure the client computer to dial-up - the server computer, using the following information: - - - - ISP Name: server.example.com -ISP Phone: +53043515094 - Username: client.example.com - Password: mail4u - - - - To estabalish a dial-up connection from the client computer to - the server computer, you need to determine the modem location - assigned by the operating system, so you can instruct - applications like system-config-network the - correct device they will to talk to. This configuration - process has been greatly simplified by the - wvdialconf command distributed with the - wvdial - package. To do this, run the following command and pay - attention to the three last lines of its output: - - - wvdialconf /etc/wvdial.conf - - -Scanning your serial ports for a modem. - -ttyS0<*1>: ATQ0 V1 E1 -- failed with 2400 baud, next try: 9600 baud -ttyS0<*1>: ATQ0 V1 E1 -- failed with 9600 baud, next try: 115200 baud -ttyS0<*1>: ATQ0 V1 E1 -- and failed too at 115200, giving up. -Port Scan<*1>: S1 S2 S3 -WvModem<*1>: Cannot get information for serial port. -ttyACM0<*1>: ATQ0 V1 E1 -- OK -ttyACM0<*1>: ATQ0 V1 E1 Z -- OK -ttyACM0<*1>: ATQ0 V1 E1 S0=0 -- OK -ttyACM0<*1>: ATQ0 V1 E1 S0=0 &C1 -- OK -ttyACM0<*1>: ATQ0 V1 E1 S0=0 &C1 &D2 -- OK -ttyACM0<*1>: ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0 -- OK -ttyACM0<*1>: Modem Identifier: ATI -- LT V.90 1.0 MT5634ZBA-USB -Data/Fax Modem (Dual Config) Version 5.18e -ttyACM0<*1>: Speed 4800: AT -- OK -ttyACM0<*1>: Speed 9600: AT -- OK -ttyACM0<*1>: Speed 19200: AT -- OK -ttyACM0<*1>: Speed 38400: AT -- OK -ttyACM0<*1>: Speed 57600: AT -- OK -ttyACM0<*1>: Speed 115200: AT -- OK -ttyACM0<*1>: Speed 230400: AT -- OK -ttyACM0<*1>: Speed 460800: AT -- OK -ttyACM0<*1>: Max speed is 460800; that should be safe. -ttyACM0<*1>: ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0 -- OK - -Found an USB modem on /dev/ttyACM0. -Modem configuration written to /etc/wvdial.conf. -ttyACM0<Info>: Speed 460800; init "ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0" - - - - Now, using this information, configure a Modem connection - using the interface provided by - system-config-network command. Take care of - replacing the /dev/modem device name by - that one found by wvdialconf. At this - point, you can use the button Activate from - system-config-network to establish the - Modem connection you just configured. - - - - - - - diff --git a/Manuals/Tcpi-ug/Configurations/Dialup/intro.docbook b/Manuals/Tcpi-ug/Configurations/Dialup/intro.docbook deleted file mode 100644 index cad9a6a..0000000 --- a/Manuals/Tcpi-ug/Configurations/Dialup/intro.docbook +++ /dev/null @@ -1,24 +0,0 @@ - - - Introduction - - - This chapter describes two computers configuration, one acting - as server and other as client. The server computer will be - configured to provide internet services and the client to make - use of those internet services provided by the server - computer. The connection medium both client and server - computer use is the telelphone line (i.e., the same medium you - use to realize phone calls). In this configuration, both - client and server computers use special devices named - Modems to transmit data in form of sound across - the telephone line. - - - - The configuration described in this chapter could be a good - choise when the only communication medium you have access to - is a telephone network. - - - diff --git a/Manuals/Tcpi-ug/Configurations/Dialup/modem.docbook b/Manuals/Tcpi-ug/Configurations/Dialup/modem.docbook deleted file mode 100644 index fcbc030..0000000 --- a/Manuals/Tcpi-ug/Configurations/Dialup/modem.docbook +++ /dev/null @@ -1,68 +0,0 @@ - - - The Modem Hardware - - - In order to establish a PPP link between two computers using - the telephone line as medium for data transmission, you need - to install (at least) one modem device in each computer. - - - - To install a modem device in computer you need to attach the - modem hardware to the computer and later the telephone line to - the modem hardware. To connect the modem to your computer, you - need to connect the serial or USB cable that comes from the - modem hardware to the appropriate input on your computer. To - connect the modem to the telephone line system, you need to - unplug the cable that connects your telephone device and plug - it on the modem device, specifically in the port reserved for - data transmission. Later, using a similar cable, you could - connect your telephone device to the modem's telephone port, - so you can realize telephone calls when no data transmition - take place. - - - - To be on the safe side, do all the installation with the - computer turned off. Then, when everthing has been put in - place, turn it on. Once the system is up, you can verify the - modem hardware using either the lsusb or - lspci commands. These commands need to be - run with administrative privileges, so probably need to - sudo them or login as root user in order to execute - thme. For example, assuming you are logged in as root user, - and you are using an USB modem like that one we mentioned - before, the output of lsusb command would - look like the following: - - - -Bus 003 Device 001: ID 0000:0000 -Bus 001 Device 001: ID 0000:0000 -Bus 001 Device 002: ID 058f:6366 Alcor Micro Corp. Multi Flash Reader -Bus 002 Device 001: ID 0000:0000 -Bus 005 Device 003: ID 06e0:f104 Multi-Tech Systems, Inc. -MT5634ZBA-USB MultiModemUSB (new firmware) -Bus 005 Device 001: ID 0000:0000 -Bus 005 Device 002: ID 046d:c018 Logitech, Inc. Optical Wheel Mouse -Bus 004 Device 001: ID 0000:0000 - - - - The relevant line here is that mentioning the existence of a - Multi-Tech System, Inc. MT5634ZBA-USB MultiModemUSB (new - firmware) device. If the modem you installed doesn't - appear in this list, it is probably because such hardware is - not supported by &TCD;, yet. - - - - At this point, everything is ready for you to install and - configure the computer either as server (see ) or client (see - ). - - - diff --git a/Manuals/Tcpi-ug/Configurations/Dialup/server.docbook b/Manuals/Tcpi-ug/Configurations/Dialup/server.docbook deleted file mode 100644 index 37042fe..0000000 --- a/Manuals/Tcpi-ug/Configurations/Dialup/server.docbook +++ /dev/null @@ -1,789 +0,0 @@ - - - The Server Computer - - - Installing Server Computer - - - Start with a minimal installation of &TCD;, bootup the - operating system, and login as root user. - - - - Installing Ppp Server - - The ppp server provides the software required to establish and - maintain a PPP link with another system and negociate Internet - Protocol addresses for each end of the link. - - - yum install ppp - - - - - Installing Name Server - - The name server provides the software required to translate - domain names into IP address and IP addresses into domain - names. With this software you can rembember addresses like - instead of - addresses like . There - are other feautres (e.g., mail exchanger resolution, zone - delegation, etc.) provided by this software that aren't used - in the point-to-point configuration we describe in this - chapter. - - yum install bind - - - There is a bind-chroot packages, however, - we aren't using it because SELinux is already enforced on the - &TCD; filesystem and it provides far more security than the - idea of bind-chroot package itself does. - - - - - - Installing Mail Server - - The mail server provides the software required to let you - send/receive mail messages to/from others. The mail server - is splitted in three basic components: The Mail Transfer Agent - (MTA), The Mail Delivery Agent (MDA) and an intermediary - daemon named saslauthd - to handle user authentication. The MTA is the program your - mail client sends mail messages to. The MDA, on the other - hand, is the program your mail client reads mail message - from (i.e., this is the program that let you access your - mailbox). The saslauthd daemon is used by the MDA to - authenticate user's credentials (e.g., the information that - let you access an specific mailbox) and by the MTA to - authenticate users before sending mail to it, however, in the - configuration we are implementing, the MTA doesn't require - that you authenticate to it in order to send mails through - it. The MTA will listen on all network interfaces it is - attached to and will receive mail sent to example.com domain name or - server.example.com host - name). - - - yum install postfix cyrus-{imapd{,-utils},sasl{,-ldap,-md5,-plain}} - - - By default, the sendmail - program is used as mail transfer agent, not postfix. For the - sake of that point-to-point configuration we are implementing, - I decided to use postfix instead as default mail transfer - agent, not sendmail. To effectively achieve this decition, it - is required to use the alternatives - command, as it shown below: - - - alternatives --config mta - - - This command will present you a menu to chose between - available mail transfer agents, so it is there where you - choose to use posfix as default option. Now that you've - changed postfix the default mail transfer agent, you can - saftly remove the sendmail package to avoid unused software - to remain inside the computer. To do this, you can run the - following command: - - - yum remove sendmail - - - In addition to mail server specific packages, we also provide - mailing list support. Mailing lists provide mail addresses - that users registered inside the ISP can write to. When you - sed an mail to a mailing list, your message is distributed to - all members of that list. In order for this to happen, people - registered inside ISP need to subscribe themselves into that - mailing list they want to receive messages from. The - subscription of mailinglist will be available through a secured - web application in the following url: - - - - - - - - - - - yum install mailman - - - - Installing Web Server - - The web server provides the software required to support web - interfaces like those one previously mention to register new - users inside the ISP and subscribe mailing lists. The web - server provided in this configuration will accept requests - both unencrypted and encrypted. - - - yum install httpd mod_ssl crypto-utils - - - In addition to mailing lists support, the web server will - provide access to Subversion. Subvesion provides a way to - manage files through version control. The main purpose of - providing Subversion support here is sharing the version of - &TCAR; I've been working on. - - - yum install subversion mod_dav_svn - - - - - - Installing Directory Server - - - The directory server provides the software required to unify - user information. This server is access by other server - whenever user information is required. You, as end user, can - also use this server from your workstation to retrive a list - of all users registered in the ISP. This list can be retrived - by the web interface the ISP provides, or any application your - workstation provide (e.g., most mail clients provide a way - to configure LDAP servers to build address book from it.). - - - yum openldap-servers python-ldap - - - - - - Configuring Server Computer - - Once all required packages have been installed inside the - server computer, it is time to configure them. This section - describes how to configure the server computer to provide a - public mail system. - - - - Configuring Network Internface - - - /etc/sysconfig/network-scripts/ifcfg-eth0 - - -# Please read /usr/share/doc/initscripts-*/sysconfig.txt -# for the documentation of these parameters. -TYPE=Ethernet -DEVICE=eth0 -HWADDR=00:1c:c0:f0:aa:05 -BOOTPROTO=none -NETMASK=255.255.255.0 -IPADDR=192.168.0.1 -ONBOOT=yes -USERCTL=no -IPV6INIT=no -PEERDNS=yes - - - - - - - - Configuring Ppp Server - - This configuration specifies the way the server computer will - handle incoming dial-up connections. - - - - /etc/ppp/options - - -# Enforce the use of the hostname as the name of the local system for -# authentication purposes (overrides the name option). -usehostname - -# Specify which DNS Servers the incoming Win95 or WinNT Connection -# should use Two Servers can be remotely configured -ms-dns 192.168.0.1 - -# Increase debugging level (same as -d). The debug output is written -# to syslog LOG_LOCAL2. -debug - -# Require the peer to authenticate itself before allowing network -# packets to be sent or received. Please do not disable this setting. -# It is expected to be standard in future releases of pppd. Use the -# call option (see manpage) to disable authentication for specific -# peers. -#auth - -# Use hardware flow control (i.e. RTS/CTS) to control the flow of data -# on the serial port. -crtscts - -# Specifies that pppd should use a UUCP-style lock on the serial -# device to ensure exclusive access to the device. -lock - -# Use the modem control lines. -modem - -# async character map -- 32-bit hex; each bit is a character that -# needs to be escaped for pppd to receive it. 0x00000001 represents -# '\x01', and 0x80000000 represents '\x1f'. To allow pppd to work -# over a rlogin/telnet connection, ou should escape XON (^Q), XOFF -# (^S) and ^]: (The peer should use "escape ff".) -#asyncmap 200a0000 -asyncmap 0 - -# Set the interface netmask to <n>, a 32 bit netmask in "decimal dot" -# notation (e.g. 255.255.255.0). -netmask 255.255.255.0 - -# Don't fork to become a background process (otherwise pppd will do so -# if a serial device is specified). -nodetach - -# Set the assumed name of the remote system for authentication -# purposes to <n>. -remotename client - -# If this option is given, pppd will send an LCP echo-request frame to -# the peer every n seconds. Under Linux, the echo-request is sent when -# no packets have been received from the peer for n seconds. Normally -# the peer should respond to the echo-request by sending an -# echo-reply. This option can be used with the lcp-echo-failure -# option to detect that the peer is no longer connected. -lcp-echo-interval 30 - -# If this option is given, pppd will presume the peer to be dead if n -# LCP echo-requests are sent without receiving a valid LCP echo-reply. -# If this happens, pppd will terminate the connection. Use of this -# option requires a non-zero value for the lcp-echo-interval -# parameter. This option can be used to enable pppd to terminate -# after the physical connection has been broken (e.g., the modem has -# hung up) in situations where no hardware modem control lines are -# available. -lcp-echo-failure 4 - -# Specifies that pppd should disconnect if the link is idle for n -# seconds. -idle 60 - - - - - - /etc/ppp/cha-secrets - /etc/ppp/pap-secrets - - -# client server secret IP addresses - -# Specify the client configuration. This is when this manchine calls -# someone's else machine and tries to establish a point-to-point -# connection. Most of this configuration is handled by the -# `system-config-network' utility. -# -####### redhat-config-network will overwrite this part!!! (begin) ########## -####### redhat-config-network will overwrite this part!!! (end) ############ - -# Specify the server configuration. This is when someone's else -# machine calls this machine trying to establish a point-to-point -# connection. This part of the configuration isn't handled by -# `system-config-network' utility. To prenvent this configuration to -# be lost the next time the `system-config-network' utility be used, -# be sure to have this configuration backed up somewhere so it can be -# resotred in such situations. -# -client server mail4u 192.168.0.2 -server client mail4u 192.168.0.1 - - - - - - - To make the modem respond to calls ... - - - pppd /dev/ttyACM0 - - - - - Configuring Name Server - - - - /etc/named.conf - - -# BIND DNS server 'named' configuration file for the Red Hat BIND -# distribution. This file was initially taken from -# `/usr/share/doc/bind-*/samples/named.conf' file and modified to fit -# this server's needs. -# -# This machine exists to develop The CentOS Project Corporate Identity -# through The CentOS Artwork Repository. Presently, this machine is -# isolated from Internet. However, a modem has been attached[1] and -# configured so people can establish point-to-point connections to -# this machine and download working copies of The CentOS Artwork -# Repository and help me to develop it. -# -# In this configuration there are only two IP addresses involved. The -# one used in this server (192.168.0.1) and another for the client who -# realize the point-to-point connection (192.168.0.2). This server is -# named `server.example.com' and the client `client.example.com' or -# something similar. -# -------------------------------------------------------------------- -# See the BIND Administrator's Reference Manual (ARM) for details, in: -# file:///usr/share/doc/bind-*/arm/Bv9ARM.html -# -# Also see the BIND Configuration GUI: -# /usr/bin/system-config-bind and its manual. -# -------------------------------------------------------------------- - -options { - - # Those options should be used carefully because they disable port - # randomization. - // query-source port 53; - // query-source-v6 port 53; - - # Put files that named is allowed to write in the data/ directory: - directory "/var/named"; // the default - dump-file "data/cache_dump.db"; - statistics-file "data/named_stats.txt"; - memstatistics-file "data/named_mem_stats.txt"; -}; - -logging { - - # If you want to enable debugging, eg. using the 'rndc trace' - # command, named will try to write the 'named.run' file in the - # $directory (/var/named). By default, SELinux policy does not - # allow named to modify the /var/named directory, so put the - # default debug log file in data/ : - channel default_debug { - file "data/named.run" versions 5 size 20m; - severity dynamic; - }; -}; - -# All BIND 9 zones are in a "view", which allow different zones to be -# served to different types of client addresses, and for options to be -# set for groups of zones. By default, if named.conf contains no -# "view" clauses, all zones are in the "default" view, which matches -# all clients. If named.conf contains any "view" clause, then all -# zones MUST be in a view; so it is recommended to start off using -# views to avoid having to restructure your configuration files in the -# future. - -view "internal" { - - # This view will contain zones you want to serve only to - # "internal" clients that connect via your directly attached LAN - # interfaces - "localnets". - match-clients { 192.168.0/24; }; - match-destinations { 192.168.0/24; }; - recursion no; - - # All views must contain the root hints zone. However, since this - # machine is disconnected from Internet it is not possible for it - # to reach root servers. So, this line is commented based that no - # recursion is performed here. - //include "named.rfc1912.zones"; - - # These are your "authoritative" internal zones, and would - # probably also be included in the "localhost_resolver" view - # above: - zone "example.com" IN { - type master; - file "example.com.zone"; - allow-update { none; }; - }; - - zone "0.168.192.in-addr.arpa" IN { - type master; - file "example.com.rr.zone"; - allow-update { none; }; - }; -}; - -# The localhost_resolver is already configured in `/etc/hosts' and set -# as first choise in `/etc/hosts.conf' file. However, if you change -# the order in `/etc/hosts.conf' file to make bind the first choise, -# then you need to include here the localhost_resolver in order to -# resolve localhost (127.0.0.1) address. - -key "rndckey" { - algorithm hmac-md5; - secret "JjsCg0VcCjZILGD8FR9nnw=="; -}; - -controls { - inet 127.0.0.1 port 953 - allow { 127.0.0.1; } keys { "rndckey"; }; -}; - - - - - - /var/named/example.com.zone - - -$ORIGIN example.com. -$TTL 86400 -@ IN SOA example.com. hostmaster.example.com. ( - 2011100404 ; serial (d. adams) - 3H ; refresh - 15M ; retry - 1W ; expiry - 1D ) ; minimum - - IN NS dns.example.com. - IN MX 10 mail.example.com. - -server IN A 192.168.0.1 -client IN A 192.168.0.2 - -dns IN CNAME server -mail IN CNAME server -www IN CNAME server - - - - - - /var/named/example.com.rr.zone - - -$ORIGIN 0.168.192.in-addr.arpa. -$TTL 86400 -@ IN SOA example.com. hostmaster.example.com. ( - 2011100405 ; serial (d. adams) - 3H ; refresh - 15M ; retry - 1W ; expiry - 1D ) ; minimum - - IN NS 192.168.0.1 - -1 IN PTR server.example.com. -2 IN PTR client.example.com. - - - - - - /etc/rndc.conf - - -include "/etc/rndc.key"; -options { - default-key "rndckey"; - default-server 127.0.0.1; - default-port 953; -}; - - - - - - /etc/rndc.key - - -key "rndckey" { - algorithm hmac-md5; - secret "JjsCg0VcCjZILGD8FR9nnw=="; -}; - - - When configuring rndc controls, don't use - the same secret shown in the example above. If you do so, the - secret information will not be a secret anymore (since we - already used it here). Instead, use the - rndc-genconf command to generate a new one, - and be sure it be placed correctly both in - /etc/rndc.conf and - /etc/named.conf configuration files. - - - - - /etc/resolv.conf - - nameserver 192.168.0.1 - - - - /etc/host.conf - - order hosts,bind - - - - - - At this point you can start the named service and realize some - tests to verify the named service is certainly working as - expected. For example, consider the the following two - commands: - - - -[root@server ~]# service named start -Starting named: [ OK ] -[root@server ~]# dig example.com mx - -; <<>> DiG 9.3.6-P1-RedHat-9.3.6-4.P1.el5_4.2 <<>> example.com mx -;; global options: printcmd -;; Got answer: -;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 3540 -;; flags: qr aa rd; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 0 - -;; QUESTION SECTION: -;example.com. IN MX - -;; ANSWER SECTION: -example.com. 86400 IN MX 10 mail.example.com. - -;; AUTHORITY SECTION: -example.com. 86400 IN NS dns.example.com. - -;; Query time: 0 msec -;; SERVER: 192.168.0.1#53(192.168.0.1) -;; WHEN: Wed Oct 5 10:33:24 2011 -;; MSG SIZE rcvd: 67 - - - - If everything is ok, configure the named service to start at - boot time: - - - chkconfig --level 345 named on - - - If something goes wrong, look for named daemon entries inside the - /var/log/messages file to know what is - going on. When you are configuring the name server, it could - result useful to you keeping an always visible terminal, - running the following command on it: - - - grep named /var/log/messages | tail -f - - - - - - Configuring Mail Server (MTA) - - Based on default configuration provided by Postfix RPM inside - &TCD; (release 5.5), look for the following options and leave - the rest as is. - - - - - /etc/postfix/main.cf - - -myhostname = server.example.com -mydomain = example.org -inet_interfaces = $myhostname, localhost -mynetworks = 192.168.0.0/24, 127.0.0.0/8 -mailbox_transport = lmtp:unix:/var/lib/imap/socket/lmtp -local_destination_recipient_limit = 300 -local_destination_concurrency_limit = 5 - - - - - - - - - Configuring Mail Server (MDA) - - - /etc/cyrus.conf - - - Leave it as is. There is nothing to touch here for a small and - basic configuration like that one we are implementing in this - chapter. - - - - - /etc/imapd.conf - - - Leave it as is. There is nothing to touch here for a small and - basic configuration like that one we are implementing in this - chapter. - - - The initial configuration of Cyrus IMAP server is set to use - PLAIN authentication mechanisim (see - option) against saslauthd daemon. This makes the - password information to be vulnerable for man in the middle - attacks. In order to protect the user authentication, you can - use other authentication mechanisms like CRAM-MD5 or - DIGEST-MD5 in the mail client in order to send the password - information encrypted. Another solution would be to create an - encrypted channel for communication between the e-email client - and Cyrus IMAP server by mean of SSL encryption. - - - When you use authentication mechanisms that encrypt user - information before passing them to saslauthd daemon (e.g., - DIGETS-MD5), you are protecting your data in the mail - client before passing it to saslauthd daemon. Therefore, when - the saslauthd daemon - tries to validate the credentials you passed in against PAM, - it fails. At my personal understanding, this happens becase - PAM must receive the user information as it was entered by the - user (i.e., plainly, without any encryption) in order to - realize the verification against the system default - authentication database (e.g., - /etc/passwd, - /etc/shadow), and saslauthd daemon is passing an - encrypted version of the plain user information which - obviously cannot match the hash produced by plain user - information in first place. - - - - One alternative to the situation mentioned above could be to - use PLAIN authentication mechanism over an SSL encrypted - communication or excluding PAM mechanism from saslauthd - daemon, and use LDAP mechanism instead. When LDAP mechanism - is used as default authentication mechanism inside saslauthd - daemon, it is possible for mail clients to send encrypted - passwords to saslauthd daemon. In this configuration, the - password stored in LDAP server must be encrypted using the - same algorithm used to send the encrypted password from mail - client to saslauthd daemon. Therefore, you need to force the - user to use just one authentication mechanism, that one used - to stored encrypted passwords inside the LDAP server. - Otherwise, it would be very difficult to authenticate users - that send passwords encrypted in a way different to that one - stored in the LDAP server. - - - - Another configuration could be to keep mail clients using - PLAIN authentication over an SSL connection against saslauthd - daemon, and saslauthd using a PAM. But this time, PAM would be - configured to extend its default system authentication by - using an LDAP server. This way, it would be possible to - isolate user accound administration and greatly control the - kind of information a user might have. For example, the root - user account would be in the system default authentication, - however all service-specific user information would be in the - LDAP server. This permits us to create a web application that - interact with LDAP server in order to manage service-specific - user information only avoiding any contant with system default - authentication, the place where the root user is stored in. In - this PAM configuration, the first match that fails means that - the whole authentication process fails. - - - - - - /etc/pki/cyrus-imapd/cyrus-imapd.pem - - - This file is a symbolic link to - /etc/pki/tls/certs/cyrus-imapd.pem. This - file contains a self-generated SSL certificate you probably - want to update for setting your host name in the Common - Name field of it. To create this file use the - following command: - - openssl req -new -x509 -nodes -out /etc/pki/tls/certs/cyrus-imapd.pem -keyout /etc/pki/tls/certs/cyrus-imapd.pem -days 365 - - - - - - - To initiate the Cyrus IMAP server, run the following command: - - - service cyrus-imapd start - - - In case something fails, look into the - /var/log/maillog file, specifically those - entries containing imap, pop, - nntp and cyrus strings. It could be - useful if, before initiating Cyrus IMAP server, you open a - terminal and run the following command in it, just to see what - is happening once Cyrus IMAP server is initiated: - - - egrep '(cyrus|imap|pop)' /var/log/maillog | tail -f - - - - Later, to test the STARTTLS negociation, you can - run the following command: - - - imtest -t "" server.example.com - - - To administer mailboxes inside Cyrus Imapd, set a password to - cyrus user (e.g., passwd cyrus), do login - with it, and connect to Cyrus IMAP server using the - cyradm command, as shown below: - - - cyradm --user=cyrus --auth=login localhost - - - - - Configuring Mail Server (SASL) - - ... - - - - - Configuring Web Server - - ... - - - - - Configuring Directory Server - - ... - - - - - - diff --git a/Manuals/Tcpi-ug/Configurations/Dialup/usage.docbook b/Manuals/Tcpi-ug/Configurations/Dialup/usage.docbook deleted file mode 100644 index 62be0b9..0000000 --- a/Manuals/Tcpi-ug/Configurations/Dialup/usage.docbook +++ /dev/null @@ -1,290 +0,0 @@ - - - Usage Convenctions - - - The infrastructure described in this chapter uses the - client/server model to provide a public mail service through - the telephone line. In this configuration, we (the poeple - building the infrastructure) provide the information you (the - person using the infrastructure) need to know in order to - establish a point-to-point connection from the client computer - to the server computer through the telephone line. - - - The infrastructure described in this chapter is made available - to you free of charge, however, you should know that - maintaining it costs both money and time. For example, for - each hour the server computer is on production there is an - electrical consume that need to be paid every month. - Likewise, each call that you establish from the client - computer to the server computer will cost you money, based on - the location you made the call from and the time you spend - connected. - - - - In this section we discuss usage convenctions we all must be - agree with, in order to achieve a practical and secure - interchange system. - - - - Administering Dial-Up Connections - - - The lifetime of dial-up connections must be limitted based on - the number of users you expect to establish connection and the - kind of services you plan to provide. The mail service - provided by the server computer is conceived as a public - service so anyone with a modem attached to a computer would be - able to have access to it. However, due to hardware - limitations, only 100 users will be allowed to be registered - in the public mail service. Based on this information, the - lifetime of established connections will be of 15 minutes from - the established moment on. Once the connection has been - established, if the link is idle for 1 minute, the server - computer will close the established connection to free the - telephone line. This control can be implemented through the - and options - inside the pppd's configuration - file. - - - - Only registered user profiles will be able to establish connections - to the server computer. This control can be implemented using - the option in the - pppd's configuration file to define a - list of all telephone numbers that are allowed to establish - connection with the server computer, based on the list of - registered user profiles. By default, all telephone numbers - are denied from establishing access with the server computer, - except those ones explicitly set by - option. If the - option is not present in - pppd's configuration file, all - telephone numbers are allowed to establish connection with the - server computer, so be sure to include the - option in - pppd's configuration file if you - want to control who can/cannot establish connection with the - server computer. - - - -##### centos-pppd-config will overwrite this part!!! (begin) ##### -allow-number 12345 -allow-number 21345 -allow-number 34567 -##### centos-pppd-config will overwrite this part!!! (end) ##### - - - - The centos-pppd-admin application - must be considered part of user profile registration process - inside the server computer. The - centos-pppd-admin application would - be used to control the list of allowed telephone numbers - inside the pppd's configuration - file, based on the list of user profiles. The - centos-pppd-admin application - should be executed after any registration/deletion action - against the list of user profiles with root privilages in order to be - able of writing the settings on - pppd's configuration file. - - - - Redialing consecutive connections from the same telephone - number without any dealy between call retries must be avoided - from client computers. This would reduce the possibilities for - other client computers to establish connection with the server - computer. To prevent this issue from happening, it would be - necessary to provide more telephone lines than users - authorized to establish connection with the server computer. - Nevertheless, there is only one telephone line available for - the server computer to use. - - - - - - Administering User Profiles - - - In order for you to use any service provided by the server - computer it is required that you register yourself inside the - server computer creating a user profile. The user profile - provides the user information required by services inside the - server computer (e.g., username, password, e-mail address, - telephone number, etc.). To register new user profiles, you - need to use the web application provided by the server - computer. For example, assuming the domain name of the server - computer is example.com, the web - application would be accessable through the following URL: - . - - - - To reach the web interface, the first thing you need to do is - establishing a dial-up connection to the server computer as - described in . Once the - dial-up connection has been established, you need to open a - web browser (e.g., Firefox) and put the URL mentioned above in - the address space, and press Enter to go. This will present - you a web page with the instructions you need to follow in - order to register your user profile. Other actions like - updating or deleting your own user profile should be also - possible from this web interface. - - - - - The web interface used to manage user profiles inside the - server computer must be presented over an encrypted session in - order to protect all the information passing through. - - - - - Inside the server computer, all related subsystems in need of - user information (e.g., Postix, Cyrus-Imapd and Saslauthd) - retrive user information from one single (LDAP) source. The - web application provided by the server computer manages all - these subsystems' configuration files in order to provide a - pleasant experience for end users. The web interface must be - as simple as possible in order to achieve all administration - tasks in the range of time permitted by the server computer - before it closes the connection established from the client - computer. - - - - More information about the web interface you need to use to - manage your user profile inside the server computer can be - found in . - - - - - - Administering Services - - - The information generated inside the server computer is - isolated from Internet. This way, any information generated - inside the server computer will be available only to people - registered inside the server computer. For example, don't ever - expect to send/receive e-mails to/from Internet e-mail - accounts like Gmail or Yahoo, nor visiting web sites like - Google or Wikipedia either. For - this to happen, it is required an established connection - between the server computer you are establishing connection - through and the Internet network those services are available - in. Without that link, it is not possible to direct your - requests to those sites. - - - - The implementation of services that required persistent - connections (e.g., chats) will not - be considered as a practical offer inside the server computer. - Instead, only asynchronous services (e.g., - e-mail) will be supported. This - restriction is required to reduce the amount of time demanded - by services. For example, consider an environment where you - connect to the server computer for sending/receiving e-mails - messages and then quickly disconnect from it to free the - telephone line for others to use. In this environment, there - is no need for you and other person to be both connected at - the same time to send/receive e-mail messages to/from each - other. The e-mails sent from other person to you will be - available in your mailbox the next time you get connected to - the server computer and use your e-mail client to send/receive - e-mail messages. Likewise, you don't need to be connected to - the server computer in order to write your e-mail messages. - You can write down your messages off-line and then establish - connection once you've finished writing, just to send them - out and receive new messages that could have been probably - sent to you. - - - - Another issue related to e-mail exchange is the protocol used - to receive messages. Presently, there are two popular ways to - do this, one is through IMAP and another through POP3. When - you use IMAP protocol, e-mail messages are retained in the - server computer and aren't downloaded to client computer. - Otherwise, when you use POP3 protocol, e-mail messages are - downloaded to the client computer and removed from server - computer. Based on the resources we have and the kind of link - used by the client computer to connect the server computer, - using POP3 is rather prefered than IMAP. However both are made - available. - - - - Assuming you use IMAP protocol to read your mailbox, be aware - that you need to be connected to the server computer. Once - the connection is lost you won't be able to read your messages - (unless your e-mail client possesses a feature that let you - reading messages off-line). Morover, you run the risk of - getting your mailbox out of space. If your mailbox gets out of - space, new messages sent to you will not be deliver to your - mailbox. Instead, they will be deferred for a period of time - (e.g., about 5 days when using - Postfix defaults) hoping you to - free the space in your mailbox to deliver them. If you don't - free space within this period of time, the deferred e-mails - will be bounced back to their senders and you will never see - them. On the other hand, assuming you are using POP3 protocol - to read your mailbox, you always keep your mailbox free to - receive new e-mails messages and keep them for you until the - next time you establish connection with the server computer - and download them to your client computer using your e-mail - client. - - - - - Administering Disk Space - - - The maximum number of registered user profiles is limited - inside the server computer, based on the maximum disk space - the server computer confines to such purpose. For example, - consider an environment where users can get registered - themselves using a web interface. In this case the web - interface must know how much disk space is available before - proceeding to register new mail accounts inside the server - computer and this way preventing any disk writing when there - isn't enough free space on disk to perform a new user - registration. Considering the server computer has confined - 1GB of disk space to handle the mail service (e.g., mail - queues, mailboxes, etc.) and each user mailbox is 10MB, it - will be possible to provide self-registration through the web - interface for 100 users in total. - - - - Another measure related to save disk space might be to remove - unused user accounts and their related files (e.g., mailboxes) - from the server computer. For example, consider an environment - where user accounts are automatically removed from the server - computer when they don't establish a connection with the - server computer in a period greater than 7 days since the last - valid connection established to the server computer. Once the - user account is removed, it is no longer functional of course, - and the person whom lost the account will need to create a new - one, assuming it want to have access to the mail service - again. - - - - - diff --git a/Manuals/Tcpi-ug/Licenses.docbook b/Manuals/Tcpi-ug/Licenses.docbook deleted file mode 100644 index dfc86ce..0000000 --- a/Manuals/Tcpi-ug/Licenses.docbook +++ /dev/null @@ -1,6 +0,0 @@ - - Licenses - &licenses-gpl; - &licenses-gfdl; - - diff --git a/Manuals/Tcpi-ug/Licenses.ent b/Manuals/Tcpi-ug/Licenses.ent deleted file mode 100644 index 29e0b56..0000000 --- a/Manuals/Tcpi-ug/Licenses.ent +++ /dev/null @@ -1,3 +0,0 @@ - - - diff --git a/Manuals/Tcpi-ug/Licenses/gfdl.docbook b/Manuals/Tcpi-ug/Licenses/gfdl.docbook deleted file mode 100644 index 33f6e8c..0000000 --- a/Manuals/Tcpi-ug/Licenses/gfdl.docbook +++ /dev/null @@ -1,591 +0,0 @@ - - - GNU Free Documentation License - - Version 1.2, November 2002 - - Copyright © 2000, 2001, 2002 Free Software Foundation, - Inc. 675 Mass Ave, Cambridge, MA 02139, USA - - Everyone is permitted to copy and distribute verbatim copies - of this license document, but changing it is not allowed. - - - - Preamble - - The purpose of this License is to make a manual, - textbook, or other functional and useful document - free in the sense of freedom: to assure - everyone the effective freedom to copy and redistribute it, - with or without modifying it, either commercially or - noncommercially. Secondarily, this License preserves for the - author and publisher a way to get credit for their work, while - not being considered responsible for modifications made by - others. - - This License is a kind of copyleft, which - means that derivative works of the document must themselves be - free in the same sense. It complements the , which is a copyleft license - designed for free software. - - We have designed this License in order to use it for - manuals for free software, because free software needs free - documentation: a free program should come with manuals - providing the same freedoms that the software does. But this - License is not limited to software manuals; it can be used for - any textual work, regardless of subject matter or whether it - is published as a printed book. We recommend this License - principally for works whose purpose is instruction or - reference. - - - - - - Applicability and definitions - - This License applies to any manual or other work, in any - medium, that contains a notice placed by the copyright holder - saying it can be distributed under the terms of this License. - Such a notice grants a world-wide, royalty-free license, - unlimited in duration, to use that work under the conditions - stated herein. The Document, below, refers to - any such manual or work. Any member of the public is a - licensee, and is addressed as you. You accept - the license if you copy, modify or distribute the work in a - way requiring permission under copyright law. - - A - Modified Version of the Document means any work - containing the Document or a portion of it, either copied - verbatim, or with modifications and/or translated into another - language. - - A - Secondary Section is a named appendix or a - front-matter section of the Document that deals exclusively - with the relationship of the publishers or authors of the - Document to the Document's overall subject (or to related - matters) and contains nothing that could fall directly within - that overall subject. (Thus, if the Document is in part a - textbook of mathematics, a may not explain any mathematics.) The relationship could be - a matter of historical connection with the subject or with - related matters, or of legal, commercial, philosophical, - ethical or political position regarding them. - - The Invariant Sections are certain - whose titles are - designated, as being those of Invariant Sections, in the - notice that says that the Document is released under this - License. If a section does not fit the above definition of - Secondary then it is not allowed to be designated as - Invariant. The Document may contain zero Invariant Sections. - If the Document does not identify any Invariant Section then - there are none. - - The - Cover Texts are certain short passages of text - that are listed, as Front-Cover Texts or Back-Cover Texts, in - the notice that says that the Document is released under this - License. A Front-Cover Text may be at most 5 words, and a - Back-Cover Text may be at most 25 words. - - A - Transparent copy of the Document means a - machine-readable copy, represented in a format whose - specification is available to the general public, that is - suitable for revising the document straightforwardly with - generic text editors or (for images composed of pixels) - generic paint programs or (for drawings) some widely available - drawing editor, and that is suitable for input to text - formatters or for automatic translation to a variety of - formats suitable for input to text formatters. A copy made in - an otherwise file format whose - markup, or absence of markup, has been arranged to thwart or - discourage subsequent modification by readers is not . An image format is not if used for any substantial amount of - text. A copy that is not is called Opaque. - - Examples of suitable formats for copies - include plain ASCII without markup, Texinfo input format, - LaTeX input format, SGML or XML using a publicly available - DTD, and standard-conforming simple HTML, PostScript or PDF - designed for human modification. Examples of transparent - image formats include PNG, XCF and JPG. Opaque formats - include proprietary formats that can be read and edited only - by proprietary word processors, SGML or XML for which the DTD - and/or processing tools are not generally available, and the - machine-generated HTML, PostScript or PDF produced by some - word processors for output purposes only. - - The Title - Page means, for a printed book, the title page itself, - plus such following pages as are needed to hold, legibly, the - material this License requires to appear in the title page. - For works in formats which do not have any title page as such, - Title Page means the text near the most - prominent appearance of the work's title, preceding the - beginning of the body of the text. - - A section Entitled XYZ means a named - subunit of the Document whose title either is precisely XYZ or - contains XYZ in parentheses following text that translates XYZ - in another language. (Here XYZ stands for a specific section - name mentioned below, such as Acknowledgements, - Dedications, Endorsements, or - History.) To Preserve the Title - of such a section when you modify the Document means that it - remains a section Entitled XYZ according to - this definition. - - The Document may include Warranty Disclaimers next to - the notice which states that this License applies to the - Document. These Warranty Disclaimers are considered to be - included by reference in this License, but only as regards - disclaiming warranties: any other implication that these - Warranty Disclaimers may have is void and has no effect on the - meaning of this License. - - - - - - Verbatim copying - - You may copy and distribute the Document in any medium, - either commercially or noncommercially, provided that this - License, the copyright notices, and the license notice saying - this License applies to the Document are reproduced in all - copies, and that you add no other conditions whatsoever to - those of this License. You may not use technical measures to - obstruct or control the reading or further copying of the - copies you make or distribute. However, you may accept - compensation in exchange for copies. If you distribute a - large enough number of copies you must also follow the - conditions in section . - - You may also lend copies, under the same conditions - stated above, and you may publicly display copies. - - - - - - Copying in quantity - - If you publish printed copies (or copies in media that - commonly have printed covers) of the Document, numbering more - than 100, and the Document's license notice requires Cover - Texts, you must enclose the copies in covers that carry, - clearly and legibly, all these : - Front-Cover Texts on the front cover, and Back-Cover Texts on - the back cover. Both covers must also clearly and legibly - identify you as the publisher of these copies. The front - cover must present the full title with all words of the title - equally prominent and visible. You may add other material on - the covers in addition. Copying with changes limited to the - covers, as long as they preserve the title of the Document and - satisfy these conditions, can be treated as verbatim copying - in other respects. - - If the required texts for either cover are too - voluminous to fit legibly, you should put the first ones - listed (as many as fit reasonably) on the actual cover, and - continue the rest onto adjacent pages. - - If you publish or distribute Opaque copies of the - Document numbering more than 100, you must either include a - machine-readable copy along with each Opaque copy, - or state in or with each Opaque copy a computer-network - location from which the general network-using public has - access to download using public-standard network protocols a - complete copy of the Document, free of added - material. If you use the latter option, you must take - reasonably prudent steps, when you begin distribution of - Opaque copies in quantity, to ensure that this - copy will remain thus accessible at the stated location until - at least one year after the last time you distribute an Opaque - copy (directly or through your agents or retailers) of that - edition to the public. - - It is requested, but not required, that you contact the - authors of the Document well before redistributing any large - number of copies, to give them a chance to provide you with an - updated version of the Document. - - - - - - Modifications - - You may copy and distribute a of the Document under the - conditions of sections and above, - provided that you release the under precisely this License, with the filling the role of the - Document, thus licensing distribution and modification of the - to whoever possesses a - copy of it. In addition, you must do these things in the - : - - - - - Use in the (and on - the covers, if any) a title distinct from that of the - Document, and from those of previous versions (which - should, if there were any, be listed in the History - section of the Document). You may use the same title - as a previous version if the original publisher of - that version gives permission. - - - List on the , as - authors, one or more persons or entities responsible - for authorship of the modifications in the , together with at least - five of the principal authors of the Document (all of - its principal authors, if it has fewer than five), - unless they release you from this requirement. - - - - State on the the - name of the publisher of the , as the - publisher. - - - - Preserve all the copyright notices of the - Document. - - - - Add an appropriate copyright notice for your - modifications adjacent to the other copyright - notices. - - - - Include, immediately after the copyright - notices, a license notice giving the public permission - to use the under the terms of this - License, in the form shown in the Addendum - below. - - - - Preserve in that license notice the full lists - of and required - given in the Document's - license notice. - - - - Include an unaltered copy of this License. - - - - Preserve the section Entitled - History, Preserve its Title, and add to - it an item stating at least the title, year, new - authors, and publisher of the as given on the . If there is no section - Entitled History in the Document, create - one stating the title, year, authors, and publisher of - the Document as given on its , then add an item describing the as stated in the previous - sentence. - - - - Preserve the network location, if any, given in - the Document for public access to a copy of the Document, and - likewise the network locations given in the Document - for previous versions it was based on. These may be - placed in the History section. You may - omit a network location for a work that was published - at least four years before the Document itself, or if - the original publisher of the version it refers to - gives permission. - - - - For any section Entitled - Acknowledgements or - Dedications, Preserve the Title of the - section, and preserve in the section all the substance - and tone of each of the contributor acknowledgements - and/or dedications given therein. - - - - Preserve all the of the Document, - unaltered in their text and in their titles. Section - numbers or the equivalent are not considered part of - the section titles. - - - - Delete any section Entitled - Endorsements. Such a section may not - be included in the . - - - - Do not retitle any existing section to be - Entitled Endorsements or to conflict in - title with any . - - - Preserve any Warranty Disclaimers. - - - - - If the includes new - front-matter sections or appendices that qualify as and contain no material copied - from the Document, you may at your option designate some or - all of these sections as invariant. To do this, add their - titles to the list of in the 's license notice. These titles - must be distinct from any other section titles. - - You may add a section Entitled - Endorsements, provided it contains nothing but - endorsements of your by various - parties–for example, statements of peer review or that - the text has been approved by an organization as the - authoritative definition of a standard. - - You may add a passage of up to five words as a - Front-Cover Text, and a passage of up to 25 words as a - Back-Cover Text, to the end of the list of in the . Only one passage of - Front-Cover Text and one of Back-Cover Text may be added by - (or through arrangements made by) any one entity. If the - Document already includes a cover text for the same cover, - previously added by you or by arrangement made by the same - entity you are acting on behalf of, you may not add another; - but you may replace the old one, on explicit permission from - the previous publisher that added the old one. - - The author(s) and publisher(s) of the Document do not by - this License give permission to use their names for publicity - for or to assert or imply endorsement of any . - - - - - - Combining documents - - You may combine the Document with other documents - released under this License, under the terms defined in - section above for - modified versions, provided that you include in the - combination all of the of - all of the original documents, unmodified, and list them all - as of your combined work - in its license notice, and that you preserve all their - Warranty Disclaimers. - - The combined work need only contain one copy of this - License, and multiple identical may be replaced with a single - copy. If there are multiple with the same name but - different contents, make the title of each such section unique - by adding at the end of it, in parentheses, the name of the - original author or publisher of that section if known, or else - a unique number. Make the same adjustment to the section - titles in the list of in - the license notice of the combined work. - - In the combination, you must combine any sections - Entitled History in the various original - documents, forming one section Entitled - History; likewise combine any sections Entitled - Acknowledgements, and any sections Entitled - Dedications. You must delete all sections - Entitled Endorsements. - - - - - - Collection of documents - - You may make a collection consisting of the Document and - other documents released under this License, and replace the - individual copies of this License in the various documents - with a single copy that is included in the collection, - provided that you follow the rules of this License for - verbatim copying of each of the documents in all other - respects. - - You may extract a single document from such a - collection, and distribute it individually under this License, - provided you insert a copy of this License into the extracted - document, and follow this License in all other respects - regarding verbatim copying of that document. - - - - - - Aggregation with independent works - - A compilation of the Document or its derivatives with - other separate and independent documents or works, in or on a - volume of a storage or distribution medium, is called an - aggregate if the copyright resulting from the - compilation is not used to limit the legal rights of the - compilation's users beyond what the individual works permit. - When the Document is included in an aggregate, this License - does not apply to the other works in the aggregate which are - not themselves derivative works of the Document. - - If the Cover Text requirement of section is applicable to these - copies of the Document, then if the Document is less than one - half of the entire aggregate, the Document's may be placed on covers that bracket - the Document within the aggregate, or the electronic - equivalent of covers if the Document is in electronic form. - Otherwise they must appear on printed covers that bracket the - whole aggregate. - - - - - - Translations - - Translation is considered a kind of modification, so you - may distribute translations of the Document under the terms of - section . Replacing - with translations - requires special permission from their copyright holders, but - you may include translations of some or all in addition to the original - versions of these . You - may include a translation of this License, and all the license - notices in the Document, and any Warranty Disclaimers, - provided that you also include the original English version of - this License and the original versions of those notices and - disclaimers. In case of a disagreement between the - translation and the original version of this License or a - notice or disclaimer, the original version will - prevail. - - If a section in the Document is Entitled - Acknowledgements, Dedications, - or History, the requirement (section ) to Preserve its Title - (section ) will - typically require changing the actual title. - - - - - - Termination - - You may not copy, modify, sublicense, or distribute the - Document except as expressly provided for under this License. - Any other attempt to copy, modify, sublicense or distribute - the Document is void, and will automatically terminate your - rights under this License. However, parties who have received - copies, or rights, from you under this License will not have - their licenses terminated so long as such parties remain in - full compliance. - - - - - - Future Revisions of this License - - The Free Software Foundation may publish new, revised - versions of the GNU Free Documentation License from time to - time. Such new versions will be similar in spirit to the - present version, but may differ in detail to address new - problems or concerns. See . - - Each version of the License is given a distinguishing - version number. If the Document specifies that a particular - numbered version of this License or any later - version applies to it, you have the option of - following the terms and conditions either of that specified - version or of any later version that has been published (not - as a draft) by the Free Software Foundation. If the Document - does not specify a version number of this License, you may - choose any version ever published (not as a draft) by the Free - Software Foundation. - - - - - - How to use this License for your documents - - To use this License in a document you have written, - include a copy of the License in the document and put the - following copyright and license notices just after the title - page: - - -Copyright (C) YEAR YOUR NAME. - -Permission is granted to copy, distribute and/or modify this -document under the terms of the GNU Free Documentation License, -Version 1.2 or any later version published by the Free Software -Foundation; with no Invariant Sections, no Front-Cover Texts, and -no Back-Cover Texts. A copy of the license is included in the -section entitled GNU Free Documentation License. - - - If you have , - Front-Cover Texts and Back-Cover Texts, replace the - with...Texts. line with this: - - -with the Invariant Sections being LIST THEIR TITLES, with the -Front-Cover Texts being LIST, and with the Back-Cover Texts being -LIST. - - - If you have - without , or some other - combination of the three, merge those two alternatives to suit - the situation. - - If your document contains nontrivial examples of program - code, we recommend releasing these examples in parallel under - your choice of free software license, such as the GNU General - Public License, to permit their use in free software. - - - - diff --git a/Manuals/Tcpi-ug/Licenses/gpl.docbook b/Manuals/Tcpi-ug/Licenses/gpl.docbook deleted file mode 100644 index 71654af..0000000 --- a/Manuals/Tcpi-ug/Licenses/gpl.docbook +++ /dev/null @@ -1,497 +0,0 @@ - - - GNU General Public License - - Version 2, June 1991 - - Copyright © 1989, 1991 Free Software Foundation, Inc. - 675 Mass Ave, Cambridge, MA 02139, USA - - Everyone is permitted to copy and distribute verbatim copies - of this license document, but changing it is not allowed. - - - - Preamble - - The licenses for most software are designed to take away - your freedom to share and change it. By contrast, the GNU General - Public License is intended to guarantee your freedom to share and - change free software–to make sure the software is free for - all its users. This General Public License applies to most of the - Free Software Foundation's software and to any other program whose - authors commit to using it. (Some other Free Software Foundation - software is covered by the GNU Library General Public License - instead.) You can apply it to your programs, too. - - When we speak of free software, we are referring to freedom, - not price. Our General Public Licenses are designed to make sure - that you have the freedom to distribute copies of free software - (and charge for this service if you wish), that you receive source - code or can get it if you want it, that you can change the - software or use pieces of it in new free programs; and that you - know you can do these things. - - To protect your rights, we need to make restrictions that - forbid anyone to deny you these rights or to ask you to surrender - the rights. These restrictions translate to certain - responsibilities for you if you distribute copies of the software, - or if you modify it. - - For example, if you distribute copies of such a program, - whether gratis or for a fee, you must give the recipients all the - rights that you have. You must make sure that they, too, receive - or can get the source code. And you must show them these terms so - they know their rights. - - We protect your rights with two steps: - - - - copyright the software, and - - - offer you this license which gives you legal - permission to copy, distribute and/or modify the - software. - - - - - Also, for each author's protection and ours, we want to make - certain that everyone understands that there is no warranty for - this free software. If the software is modified by someone else - and passed on, we want its recipients to know that what they have - is not the original, so that any problems introduced by others - will not reflect on the original authors' reputations. - - Finally, any free program is threatened constantly by - software patents. We wish to avoid the danger that redistributors - of a free program will individually obtain patent licenses, in - effect making the program proprietary. To prevent this, we have - made it clear that any patent must be licensed for everyone's free - use or not licensed at all. - - The precise terms and conditions for copying, distribution - and modification follow. - - - - - - Terms and Conditions for Copying, Distribution and Modification - - - - Section 1 - - You may copy and distribute verbatim copies of the - Program's source code as you receive it, in any medium, - provided that you conspicuously and appropriately publish on - each copy an appropriate copyright notice and disclaimer of - warranty; keep intact all the notices that refer to this - License and to the absence of any warranty; and give any other - recipients of the Program a copy of this License along with - the Program. - - You may charge a fee for the physical act of - transferring a copy, and you may at your option offer warranty - protection in exchange for a fee. - - - - - - Section 2 - - You may modify your copy or copies of the Program or - any portion of it, thus forming a work based on the - Program, and copy and distribute such modifications or - work under the terms of above, provided that you also meet all of these - conditions: - - - - You must cause the modified files to carry prominent - notices stating that you changed the files and the date of - any change. - - - You must cause any work that you distribute or - publish, that in whole or in part contains or is derived - from the Program or any part thereof, to be licensed as a - whole at no charge to all third parties under the terms of - this License. - - - If the modified program normally reads commands - interactively when run, you must cause it, when started - running for such interactive use in the most ordinary way, - to print or display an announcement including an - appropriate copyright notice and a notice that there is no - warranty (or else, saying that you provide a warranty) and - that users may redistribute the program under these - conditions, and telling the user how to view a copy of - this License. - - - Exception - - If the Program itself is interactive but does not - normally print such an announcement, your work based - on the Program is not required to print an - announcement. - - - - - - - These requirements apply to the modified work as a whole. - If identifiable sections of that work are not derived from the - Program, and can be reasonably considered independent and separate - works in themselves, then this License, and its terms, do not - apply to those sections when you distribute them as separate - works. But when you distribute the same sections as part of a - whole which is a work based on the Program, the distribution of - the whole must be on the terms of this License, whose permissions - for other licensees extend to the entire whole, and thus to each - and every part regardless of who wrote it. - - Thus, it is not the intent of this section to claim rights - or contest your rights to work written entirely by you; rather, - the intent is to exercise the right to control the distribution of - derivative or collective works based on the Program. - - In addition, mere aggregation of another work not based on - the Program with the Program (or with a work based on the Program) - on a volume of a storage or distribution medium does not bring the - other work under the scope of this License. - - - - - - Section 3 - - You may copy and distribute the Program (or a work - based on it, under ) in - object code or executable form under the terms of and above provided that you also - do one of the following: - - - - - - Accompany it with the complete corresponding - machine-readable source code, which must be - distributed under the terms of and above on a medium - customarily used for software interchange; - or, - - - - - - Accompany it with a written offer, valid for at - least three years, to give any third party, for a - charge no more than your cost of physically - performing source distribution, a complete - machine-readable copy of the corresponding source - code, to be distributed under the terms of and above on a medium - customarily used for software interchange; - or, - - - - - - Accompany it with the information you received as - to the offer to distribute corresponding source - code. (This alternative is allowed only for - noncommercial distribution and only if you - received the program in object code or executable - form with such an offer, in accord with Subsection - b above.) - - - - - - - The source code for a work means the preferred form of the - work for making modifications to it. For an executable work, - complete source code means all the source code for all modules it - contains, plus any associated interface definition files, plus the - scripts used to control compilation and installation of the - executable. However, as a special exception, the source code - distributed need not include anything that is normally distributed - (in either source or binary form) with the major components - (compiler, kernel, and so on) of the operating system on which the - executable runs, unless that component itself accompanies the - executable. - - If distribution of executable or object code is made by - offering access to copy from a designated place, then offering - equivalent access to copy the source code from the same place - counts as distribution of the source code, even though third - parties are not compelled to copy the source along with the object - code. - - - - - - Section 4 - - You may not copy, modify, sublicense, or distribute the - Program except as expressly provided under this License. Any - attempt otherwise to copy, modify, sublicense or distribute the - Program is void, and will automatically terminate your rights - under this License. However, parties who have received copies, or - rights, from you under this License will not have their licenses - terminated so long as such parties remain in full - compliance. - - - - - - Section 5 - - You are not required to accept this License, since you have - not signed it. However, nothing else grants you permission to - modify or distribute the Program or its derivative works. These - actions are prohibited by law if you do not accept this License. - Therefore, by modifying or distributing the Program (or any work - based on the Program), you indicate your acceptance of this - License to do so, and all its terms and conditions for copying, - distributing or modifying the Program or works based on it. - - - - - - Section 6 - - Each time you redistribute the Program (or any work based on - the Program), the recipient automatically receives a license from - the original licensor to copy, distribute or modify the Program - subject to these terms and conditions. You may not impose any - further restrictions on the recipients' exercise of the rights - granted herein. You are not responsible for enforcing compliance - by third parties to this License. - - - - - - Section 7 - - If, as a consequence of a court judgment or allegation of - patent infringement or for any other reason (not limited to patent - issues), conditions are imposed on you (whether by court order, - agreement or otherwise) that contradict the conditions of this - License, they do not excuse you from the conditions of this - License. If you cannot distribute so as to satisfy simultaneously - your obligations under this License and any other pertinent - obligations, then as a consequence you may not distribute the - Program at all. For example, if a patent license would not permit - royalty-free redistribution of the Program by all those who - receive copies directly or indirectly through you, then the only - way you could satisfy both it and this License would be to refrain - entirely from distribution of the Program. - - If any portion of this section is held invalid or - unenforceable under any particular circumstance, the balance of - the section is intended to apply and the section as a whole is - intended to apply in other circumstances. - - It is not the purpose of this section to induce you to - infringe any patents or other property right claims or to contest - validity of any such claims; this section has the sole purpose of - protecting the integrity of the free software distribution system, - which is implemented by public license practices. Many people - have made generous contributions to the wide range of software - distributed through that system in reliance on consistent - application of that system; it is up to the author/donor to decide - if he or she is willing to distribute software through any other - system and a licensee cannot impose that choice. - - This section is intended to make thoroughly clear what is - believed to be a consequence of the rest of this License. - - - - - - Section 8 - - If the distribution and/or use of the Program is restricted - in certain countries either by patents or by copyrighted - interfaces, the original copyright holder who places the Program - under this License may add an explicit geographical distribution - limitation excluding those countries, so that distribution is - permitted only in or among countries not thus excluded. In such - case, this License incorporates the limitation as if written in - the body of this License. - - - - - - Section 9 - - The Free Software Foundation may publish revised and/or new - versions of the General Public License from time to time. Such - new versions will be similar in spirit to the present version, but - may differ in detail to address new problems or concerns. - - Each version is given a distinguishing version number. If - the Program specifies a version number of this License which - applies to it and any later version, you have the - option of following the terms and conditions either of that - version or of any later version published by the Free Software - Foundation. If the Program does not specify a version number of - this License, you may choose any version ever published by the - Free Software Foundation. - - - - - - Section 10 - - If you wish to incorporate parts of the Program into other - free programs whose distribution conditions are different, write - to the author to ask for permission. For software which is - copyrighted by the Free Software Foundation, write to the Free - Software Foundation; we sometimes make exceptions for this. Our - decision will be guided by the two goals of preserving the free - status of all derivatives of our free software and of promoting - the sharing and reuse of software generally. - - - - - - NO WARRANTY - Section 11 - - BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO - WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE - LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT - HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM AS IS WITHOUT - WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT - NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND - FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE - QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE - PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY - SERVICING, REPAIR OR CORRECTION. - - - - - - Section 12 - - IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO - IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY - MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE - LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, - INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR - INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF - DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU - OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY - OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN - ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. - - End of Terms and Conditions. - - - - - - - - How to Apply These Terms to Your New Programs - - If you develop a new program, and you want it to be of - the greatest possible use to the public, the best way to - achieve this is to make it free software which everyone can - redistribute and change under these terms. - - To do so, attach the following notices to the program. - It is safest to attach them to the start of each source file - to most effectively convey the exclusion of warranty; and each - file should have at least the copyright line - and a pointer to where the full notice is found. - - -<one line to give the program's name and a brief idea of what it does.> -Copyright (C) 19yy <name of author> - -This program is free software; you can redistribute it and/or modify -it under the terms of the GNU General Public License as published by -the Free Software Foundation; either version 2 of the License, or -(at your option) any later version. - -This program is distributed in the hope that it will be useful, -but WITHOUT ANY WARRANTY; without even the implied warranty of -MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -GNU General Public License for more details. - -You should have received a copy of the GNU General Public License -along with this program; if not, write to the Free Software -Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. - - - Also add information on how to contact you by electronic - and paper mail. - - If the program is interactive, make it output a short - notice like this when it starts in an interactive mode: - - -Gnomovision version 69, Copyright (C) 19yy name of author -Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. -This is free software, and you are welcome to redistribute it -under certain conditions; type `show c' for details. - - - The hypothetical commands `show w' and `show c' should - show the appropriate parts of the General Public License. Of - course, the commands you use may be called something other - than `show w' and `show c'; they could even be mouse-clicks or - menu items–whatever suits your program. - - You should also get your employer (if you work as a - programmer) or your school, if any, to sign a copyright - disclaimer for the program, if necessary. Here is a - sample; alter the names: - - -Yoyodyne, Inc., hereby disclaims all copyright interest in the program -`Gnomovision' (which makes passes at compilers) written by James Hacker. - -<signature of Ty Coon>, 1 April 1989 -Ty Coon, President of Vice - - - This General Public License does not permit - incorporating your program into proprietary programs. If your - program is a subroutine library, you may consider it more - useful to permit linking proprietary applications with the - library. If this is what you want to do, use the GNU Library - General Public License instead of this License. - - - - diff --git a/Manuals/Tcpi-ug/Preface.docbook b/Manuals/Tcpi-ug/Preface.docbook deleted file mode 100755 index 7eca40b..0000000 --- a/Manuals/Tcpi-ug/Preface.docbook +++ /dev/null @@ -1,40 +0,0 @@ - - - Preface - - - Welcome to &TCPIUG;, the official documentation of &TCPI;. - - - - This book describes how &TCPI; is organized and the guidelines - both users and administrators should follow to make use of it. - If you need to know what the technical and political desitions - behind &TCP; are, this book is definitly for you. - - - - To make the information in this book managable, it has been - organized in the following parts: - - - - - - organizes the licenses mentioned - in this book. - - - - - - This book is oriented to system administrators and assumes you - have a basic understanding of &TCD;. If you need help with - it, go to the Help page inside - &TCWIKI; for or a list of different places you can find help. - - - &preface-overview; - - diff --git a/Manuals/Tcpi-ug/Preface.ent b/Manuals/Tcpi-ug/Preface.ent deleted file mode 100755 index 41f09f0..0000000 --- a/Manuals/Tcpi-ug/Preface.ent +++ /dev/null @@ -1,2 +0,0 @@ - - diff --git a/Manuals/Tcpi-ug/Preface/overview.docbook b/Manuals/Tcpi-ug/Preface/overview.docbook deleted file mode 100755 index 1ef0ded..0000000 --- a/Manuals/Tcpi-ug/Preface/overview.docbook +++ /dev/null @@ -1,9 +0,0 @@ -
- - Overview - - - ... - - -
diff --git a/Manuals/Tcpi-ug/tcpi-ug.docbook b/Manuals/Tcpi-ug/tcpi-ug.docbook deleted file mode 100755 index f2b634b..0000000 --- a/Manuals/Tcpi-ug/tcpi-ug.docbook +++ /dev/null @@ -1,80 +0,0 @@ - - - - - - - -%Commons.ent; -%Preface.ent; -%Administration.ent; -%Configurations.ent; -%Licenses.ent; -]> - - - - - The CentOS Project Infrastructure - User's Guide - - - - Alain - Reguera Delgado - - - - - 2011 - &TCP;. All rights reserved. - - - - - Permission is granted to copy, distribute and/or modify - this document under the terms of the GNU Free - Documentation License, Version 1.2 or any later version - published by the Free Software Foundation; with no - Invariant Sections, no Front-Cover Texts, and no - Back-Cover Texts. A copy of the license is included in - . - - - - - - 1.0 - Today - - Alain - Reguera Delgado - - - - Under development. - - - - - - - - - &preface; - - - &administration; - &configurations; - - - &licenses; - -