diff --git a/Manuals/Howto-dialup/Administration.docbook b/Manuals/Howto-dialup/Administration.docbook
new file mode 100755
index 0000000..a16f3df
--- /dev/null
+++ b/Manuals/Howto-dialup/Administration.docbook
@@ -0,0 +1,13 @@
+
+
+ Administration
+
+
+
+ ...
+
+
+
+ &administration-mail;
+
+
diff --git a/Manuals/Howto-dialup/Administration.ent b/Manuals/Howto-dialup/Administration.ent
new file mode 100644
index 0000000..8feac9d
--- /dev/null
+++ b/Manuals/Howto-dialup/Administration.ent
@@ -0,0 +1,2 @@
+
+
diff --git a/Manuals/Howto-dialup/Administration/Mail.docbook b/Manuals/Howto-dialup/Administration/Mail.docbook
new file mode 100644
index 0000000..04b9c1d
--- /dev/null
+++ b/Manuals/Howto-dialup/Administration/Mail.docbook
@@ -0,0 +1,9 @@
+
+
+ Mail Server Administration
+
+
+ ...
+
+
+
diff --git a/Manuals/Howto-dialup/Commons.ent b/Manuals/Howto-dialup/Commons.ent
new file mode 100755
index 0000000..f5bcdd1
--- /dev/null
+++ b/Manuals/Howto-dialup/Commons.ent
@@ -0,0 +1,23 @@
+
+
+
+
+
+
+&TC; Project">
+
+
+&TC; Mirrors">
+&TC; Wiki">
+
+
+
+
+The CentOS Artwork Repository">
+&TCPI; User's Guide">
diff --git a/Manuals/Howto-dialup/Configurations.docbook b/Manuals/Howto-dialup/Configurations.docbook
new file mode 100755
index 0000000..f470587
--- /dev/null
+++ b/Manuals/Howto-dialup/Configurations.docbook
@@ -0,0 +1,20 @@
+
+
+ Configurations
+
+
+
+ This part of the book discusses the configuration of specific
+ infrastructures that may or may not be included inside &TCPI;.
+ Each configuration described here is oriented to satisfy
+ specific practical situations in a step-by-step fashion, so it
+ can be implemented as straightforward as possible. The
+ packages and documentation references related to each
+ configuration are also mentioned so you can get deeper on each
+ topic in case you need so.
+
+
+
+ &configurations-dialup;
+
+
diff --git a/Manuals/Howto-dialup/Configurations.ent b/Manuals/Howto-dialup/Configurations.ent
new file mode 100755
index 0000000..410c988
--- /dev/null
+++ b/Manuals/Howto-dialup/Configurations.ent
@@ -0,0 +1,7 @@
+
+
+
+
+
+
+
diff --git a/Manuals/Howto-dialup/Configurations/Dialup.docbook b/Manuals/Howto-dialup/Configurations/Dialup.docbook
new file mode 100644
index 0000000..b336433
--- /dev/null
+++ b/Manuals/Howto-dialup/Configurations/Dialup.docbook
@@ -0,0 +1,11 @@
+
+
+ IP Through Telephone Line
+
+ &configurations-dialup-intro;
+ &configurations-dialup-usage;
+ &configurations-dialup-modem;
+ &configurations-dialup-server;
+ &configurations-dialup-client;
+
+
diff --git a/Manuals/Howto-dialup/Configurations/Dialup/client.docbook b/Manuals/Howto-dialup/Configurations/Dialup/client.docbook
new file mode 100644
index 0000000..894c293
--- /dev/null
+++ b/Manuals/Howto-dialup/Configurations/Dialup/client.docbook
@@ -0,0 +1,97 @@
+
+
+ The Client Computer
+
+
+ Installing Client Computer
+
+ ...
+
+
+
+
+ Configuring Client Computer
+
+
+ ...
+
+
+
+ Establishing Dial-Up Connection
+
+
+ To establish connection from the client computer to the server
+ computer you should configure the client computer to dial-up
+ the server computer, using the following information:
+
+
+
+ ISP Name: server.example.com
+ISP Phone: +53043515094
+ Username: client.example.com
+ Password: mail4u
+
+
+
+ To estabalish a dial-up connection from the client computer to
+ the server computer, you need to determine the modem location
+ assigned by the operating system, so you can instruct
+ applications like system-config-network the
+ correct device they will to talk to. This configuration
+ process has been greatly simplified by the
+ wvdialconf command distributed with the
+ wvdial
+ package. To do this, run the following command and pay
+ attention to the three last lines of its output:
+
+
+ wvdialconf /etc/wvdial.conf
+
+
+Scanning your serial ports for a modem.
+
+ttyS0<*1>: ATQ0 V1 E1 -- failed with 2400 baud, next try: 9600 baud
+ttyS0<*1>: ATQ0 V1 E1 -- failed with 9600 baud, next try: 115200 baud
+ttyS0<*1>: ATQ0 V1 E1 -- and failed too at 115200, giving up.
+Port Scan<*1>: S1 S2 S3
+WvModem<*1>: Cannot get information for serial port.
+ttyACM0<*1>: ATQ0 V1 E1 -- OK
+ttyACM0<*1>: ATQ0 V1 E1 Z -- OK
+ttyACM0<*1>: ATQ0 V1 E1 S0=0 -- OK
+ttyACM0<*1>: ATQ0 V1 E1 S0=0 &C1 -- OK
+ttyACM0<*1>: ATQ0 V1 E1 S0=0 &C1 &D2 -- OK
+ttyACM0<*1>: ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0 -- OK
+ttyACM0<*1>: Modem Identifier: ATI -- LT V.90 1.0 MT5634ZBA-USB
+Data/Fax Modem (Dual Config) Version 5.18e
+ttyACM0<*1>: Speed 4800: AT -- OK
+ttyACM0<*1>: Speed 9600: AT -- OK
+ttyACM0<*1>: Speed 19200: AT -- OK
+ttyACM0<*1>: Speed 38400: AT -- OK
+ttyACM0<*1>: Speed 57600: AT -- OK
+ttyACM0<*1>: Speed 115200: AT -- OK
+ttyACM0<*1>: Speed 230400: AT -- OK
+ttyACM0<*1>: Speed 460800: AT -- OK
+ttyACM0<*1>: Max speed is 460800; that should be safe.
+ttyACM0<*1>: ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0 -- OK
+
+Found an USB modem on /dev/ttyACM0.
+Modem configuration written to /etc/wvdial.conf.
+ttyACM0<Info>: Speed 460800; init "ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0"
+
+
+
+ Now, using this information, configure a Modem connection
+ using the interface provided by
+ system-config-network command. Take care of
+ replacing the /dev/modem device name by
+ that one found by wvdialconf. At this
+ point, you can use the button Activate from
+ system-config-network to establish the
+ Modem connection you just configured.
+
+
+
+
+
+
+
diff --git a/Manuals/Howto-dialup/Configurations/Dialup/intro.docbook b/Manuals/Howto-dialup/Configurations/Dialup/intro.docbook
new file mode 100644
index 0000000..cad9a6a
--- /dev/null
+++ b/Manuals/Howto-dialup/Configurations/Dialup/intro.docbook
@@ -0,0 +1,24 @@
+
+
+ Introduction
+
+
+ This chapter describes two computers configuration, one acting
+ as server and other as client. The server computer will be
+ configured to provide internet services and the client to make
+ use of those internet services provided by the server
+ computer. The connection medium both client and server
+ computer use is the telelphone line (i.e., the same medium you
+ use to realize phone calls). In this configuration, both
+ client and server computers use special devices named
+ Modems
to transmit data in form of sound across
+ the telephone line.
+
+
+
+ The configuration described in this chapter could be a good
+ choise when the only communication medium you have access to
+ is a telephone network.
+
+
+
diff --git a/Manuals/Howto-dialup/Configurations/Dialup/modem.docbook b/Manuals/Howto-dialup/Configurations/Dialup/modem.docbook
new file mode 100644
index 0000000..fcbc030
--- /dev/null
+++ b/Manuals/Howto-dialup/Configurations/Dialup/modem.docbook
@@ -0,0 +1,68 @@
+
+
+ The Modem Hardware
+
+
+ In order to establish a PPP link between two computers using
+ the telephone line as medium for data transmission, you need
+ to install (at least) one modem device in each computer.
+
+
+
+ To install a modem device in computer you need to attach the
+ modem hardware to the computer and later the telephone line to
+ the modem hardware. To connect the modem to your computer, you
+ need to connect the serial or USB cable that comes from the
+ modem hardware to the appropriate input on your computer. To
+ connect the modem to the telephone line system, you need to
+ unplug the cable that connects your telephone device and plug
+ it on the modem device, specifically in the port reserved for
+ data transmission. Later, using a similar cable, you could
+ connect your telephone device to the modem's telephone port,
+ so you can realize telephone calls when no data transmition
+ take place.
+
+
+
+ To be on the safe side, do all the installation with the
+ computer turned off. Then, when everthing has been put in
+ place, turn it on. Once the system is up, you can verify the
+ modem hardware using either the lsusb or
+ lspci commands. These commands need to be
+ run with administrative privileges, so probably need to
+ sudo them or login as root user in order to execute
+ thme. For example, assuming you are logged in as root user,
+ and you are using an USB modem like that one we mentioned
+ before, the output of lsusb command would
+ look like the following:
+
+
+
+Bus 003 Device 001: ID 0000:0000
+Bus 001 Device 001: ID 0000:0000
+Bus 001 Device 002: ID 058f:6366 Alcor Micro Corp. Multi Flash Reader
+Bus 002 Device 001: ID 0000:0000
+Bus 005 Device 003: ID 06e0:f104 Multi-Tech Systems, Inc.
+MT5634ZBA-USB MultiModemUSB (new firmware)
+Bus 005 Device 001: ID 0000:0000
+Bus 005 Device 002: ID 046d:c018 Logitech, Inc. Optical Wheel Mouse
+Bus 004 Device 001: ID 0000:0000
+
+
+
+ The relevant line here is that mentioning the existence of a
+ Multi-Tech System, Inc. MT5634ZBA-USB MultiModemUSB (new
+ firmware)
device. If the modem you installed doesn't
+ appear in this list, it is probably because such hardware is
+ not supported by &TCD;, yet.
+
+
+
+ At this point, everything is ready for you to install and
+ configure the computer either as server (see ) or client (see
+ ).
+
+
+
diff --git a/Manuals/Howto-dialup/Configurations/Dialup/server.docbook b/Manuals/Howto-dialup/Configurations/Dialup/server.docbook
new file mode 100644
index 0000000..37042fe
--- /dev/null
+++ b/Manuals/Howto-dialup/Configurations/Dialup/server.docbook
@@ -0,0 +1,789 @@
+
+
+ The Server Computer
+
+
+ Installing Server Computer
+
+
+ Start with a minimal installation of &TCD;, bootup the
+ operating system, and login as root user.
+
+
+
+ Installing Ppp Server
+
+ The ppp server provides the software required to establish and
+ maintain a PPP link with another system and negociate Internet
+ Protocol addresses for each end of the link.
+
+
+ yum install ppp
+
+
+
+
+ Installing Name Server
+
+ The name server provides the software required to translate
+ domain names into IP address and IP addresses into domain
+ names. With this software you can rembember addresses like
+ instead of
+ addresses like . There
+ are other feautres (e.g., mail exchanger resolution, zone
+ delegation, etc.) provided by this software that aren't used
+ in the point-to-point configuration we describe in this
+ chapter.
+
+ yum install bind
+
+
+ There is a bind-chroot packages, however,
+ we aren't using it because SELinux is already enforced on the
+ &TCD; filesystem and it provides far more security than the
+ idea of bind-chroot package itself does.
+
+
+
+
+
+ Installing Mail Server
+
+ The mail server provides the software required to let you
+ send/receive mail messages to/from others. The mail server
+ is splitted in three basic components: The Mail Transfer Agent
+ (MTA), The Mail Delivery Agent (MDA) and an intermediary
+ daemon named saslauthd
+ to handle user authentication. The MTA is the program your
+ mail client sends mail messages to. The MDA, on the other
+ hand, is the program your mail client reads mail message
+ from (i.e., this is the program that let you access your
+ mailbox). The saslauthd daemon is used by the MDA to
+ authenticate user's credentials (e.g., the information that
+ let you access an specific mailbox) and by the MTA to
+ authenticate users before sending mail to it, however, in the
+ configuration we are implementing, the MTA doesn't require
+ that you authenticate to it in order to send mails through
+ it. The MTA will listen on all network interfaces it is
+ attached to and will receive mail sent to example.com domain name or
+ server.example.com host
+ name).
+
+
+ yum install postfix cyrus-{imapd{,-utils},sasl{,-ldap,-md5,-plain}}
+
+
+ By default, the sendmail
+ program is used as mail transfer agent, not postfix. For the
+ sake of that point-to-point configuration we are implementing,
+ I decided to use postfix instead as default mail transfer
+ agent, not sendmail. To effectively achieve this decition, it
+ is required to use the alternatives
+ command, as it shown below:
+
+
+ alternatives --config mta
+
+
+ This command will present you a menu to chose between
+ available mail transfer agents, so it is there where you
+ choose to use posfix as default option. Now that you've
+ changed postfix the default mail transfer agent, you can
+ saftly remove the sendmail package to avoid unused software
+ to remain inside the computer. To do this, you can run the
+ following command:
+
+
+ yum remove sendmail
+
+
+ In addition to mail server specific packages, we also provide
+ mailing list support. Mailing lists provide mail addresses
+ that users registered inside the ISP can write to. When you
+ sed an mail to a mailing list, your message is distributed to
+ all members of that list. In order for this to happen, people
+ registered inside ISP need to subscribe themselves into that
+ mailing list they want to receive messages from. The
+ subscription of mailinglist will be available through a secured
+ web application in the following url:
+
+
+
+
+
+
+
+
+
+
+ yum install mailman
+
+
+
+ Installing Web Server
+
+ The web server provides the software required to support web
+ interfaces like those one previously mention to register new
+ users inside the ISP and subscribe mailing lists. The web
+ server provided in this configuration will accept requests
+ both unencrypted and encrypted.
+
+
+ yum install httpd mod_ssl crypto-utils
+
+
+ In addition to mailing lists support, the web server will
+ provide access to Subversion. Subvesion provides a way to
+ manage files through version control. The main purpose of
+ providing Subversion support here is sharing the version of
+ &TCAR; I've been working on.
+
+
+ yum install subversion mod_dav_svn
+
+
+
+
+
+ Installing Directory Server
+
+
+ The directory server provides the software required to unify
+ user information. This server is access by other server
+ whenever user information is required. You, as end user, can
+ also use this server from your workstation to retrive a list
+ of all users registered in the ISP. This list can be retrived
+ by the web interface the ISP provides, or any application your
+ workstation provide (e.g., most mail clients provide a way
+ to configure LDAP servers to build address book from it.).
+
+
+ yum openldap-servers python-ldap
+
+
+
+
+
+ Configuring Server Computer
+
+ Once all required packages have been installed inside the
+ server computer, it is time to configure them. This section
+ describes how to configure the server computer to provide a
+ public mail system.
+
+
+
+ Configuring Network Internface
+
+
+ /etc/sysconfig/network-scripts/ifcfg-eth0
+
+
+# Please read /usr/share/doc/initscripts-*/sysconfig.txt
+# for the documentation of these parameters.
+TYPE=Ethernet
+DEVICE=eth0
+HWADDR=00:1c:c0:f0:aa:05
+BOOTPROTO=none
+NETMASK=255.255.255.0
+IPADDR=192.168.0.1
+ONBOOT=yes
+USERCTL=no
+IPV6INIT=no
+PEERDNS=yes
+
+
+
+
+
+
+
+ Configuring Ppp Server
+
+ This configuration specifies the way the server computer will
+ handle incoming dial-up connections.
+
+
+
+ /etc/ppp/options
+
+
+# Enforce the use of the hostname as the name of the local system for
+# authentication purposes (overrides the name option).
+usehostname
+
+# Specify which DNS Servers the incoming Win95 or WinNT Connection
+# should use Two Servers can be remotely configured
+ms-dns 192.168.0.1
+
+# Increase debugging level (same as -d). The debug output is written
+# to syslog LOG_LOCAL2.
+debug
+
+# Require the peer to authenticate itself before allowing network
+# packets to be sent or received. Please do not disable this setting.
+# It is expected to be standard in future releases of pppd. Use the
+# call option (see manpage) to disable authentication for specific
+# peers.
+#auth
+
+# Use hardware flow control (i.e. RTS/CTS) to control the flow of data
+# on the serial port.
+crtscts
+
+# Specifies that pppd should use a UUCP-style lock on the serial
+# device to ensure exclusive access to the device.
+lock
+
+# Use the modem control lines.
+modem
+
+# async character map -- 32-bit hex; each bit is a character that
+# needs to be escaped for pppd to receive it. 0x00000001 represents
+# '\x01', and 0x80000000 represents '\x1f'. To allow pppd to work
+# over a rlogin/telnet connection, ou should escape XON (^Q), XOFF
+# (^S) and ^]: (The peer should use "escape ff".)
+#asyncmap 200a0000
+asyncmap 0
+
+# Set the interface netmask to <n>, a 32 bit netmask in "decimal dot"
+# notation (e.g. 255.255.255.0).
+netmask 255.255.255.0
+
+# Don't fork to become a background process (otherwise pppd will do so
+# if a serial device is specified).
+nodetach
+
+# Set the assumed name of the remote system for authentication
+# purposes to <n>.
+remotename client
+
+# If this option is given, pppd will send an LCP echo-request frame to
+# the peer every n seconds. Under Linux, the echo-request is sent when
+# no packets have been received from the peer for n seconds. Normally
+# the peer should respond to the echo-request by sending an
+# echo-reply. This option can be used with the lcp-echo-failure
+# option to detect that the peer is no longer connected.
+lcp-echo-interval 30
+
+# If this option is given, pppd will presume the peer to be dead if n
+# LCP echo-requests are sent without receiving a valid LCP echo-reply.
+# If this happens, pppd will terminate the connection. Use of this
+# option requires a non-zero value for the lcp-echo-interval
+# parameter. This option can be used to enable pppd to terminate
+# after the physical connection has been broken (e.g., the modem has
+# hung up) in situations where no hardware modem control lines are
+# available.
+lcp-echo-failure 4
+
+# Specifies that pppd should disconnect if the link is idle for n
+# seconds.
+idle 60
+
+
+
+
+
+ /etc/ppp/cha-secrets
+ /etc/ppp/pap-secrets
+
+
+# client server secret IP addresses
+
+# Specify the client configuration. This is when this manchine calls
+# someone's else machine and tries to establish a point-to-point
+# connection. Most of this configuration is handled by the
+# `system-config-network' utility.
+#
+####### redhat-config-network will overwrite this part!!! (begin) ##########
+####### redhat-config-network will overwrite this part!!! (end) ############
+
+# Specify the server configuration. This is when someone's else
+# machine calls this machine trying to establish a point-to-point
+# connection. This part of the configuration isn't handled by
+# `system-config-network' utility. To prenvent this configuration to
+# be lost the next time the `system-config-network' utility be used,
+# be sure to have this configuration backed up somewhere so it can be
+# resotred in such situations.
+#
+client server mail4u 192.168.0.2
+server client mail4u 192.168.0.1
+
+
+
+
+
+
+ To make the modem respond to calls ...
+
+
+ pppd /dev/ttyACM0
+
+
+
+
+ Configuring Name Server
+
+
+
+ /etc/named.conf
+
+
+# BIND DNS server 'named' configuration file for the Red Hat BIND
+# distribution. This file was initially taken from
+# `/usr/share/doc/bind-*/samples/named.conf' file and modified to fit
+# this server's needs.
+#
+# This machine exists to develop The CentOS Project Corporate Identity
+# through The CentOS Artwork Repository. Presently, this machine is
+# isolated from Internet. However, a modem has been attached[1] and
+# configured so people can establish point-to-point connections to
+# this machine and download working copies of The CentOS Artwork
+# Repository and help me to develop it.
+#
+# In this configuration there are only two IP addresses involved. The
+# one used in this server (192.168.0.1) and another for the client who
+# realize the point-to-point connection (192.168.0.2). This server is
+# named `server.example.com' and the client `client.example.com' or
+# something similar.
+# --------------------------------------------------------------------
+# See the BIND Administrator's Reference Manual (ARM) for details, in:
+# file:///usr/share/doc/bind-*/arm/Bv9ARM.html
+#
+# Also see the BIND Configuration GUI:
+# /usr/bin/system-config-bind and its manual.
+# --------------------------------------------------------------------
+
+options {
+
+ # Those options should be used carefully because they disable port
+ # randomization.
+ // query-source port 53;
+ // query-source-v6 port 53;
+
+ # Put files that named is allowed to write in the data/ directory:
+ directory "/var/named"; // the default
+ dump-file "data/cache_dump.db";
+ statistics-file "data/named_stats.txt";
+ memstatistics-file "data/named_mem_stats.txt";
+};
+
+logging {
+
+ # If you want to enable debugging, eg. using the 'rndc trace'
+ # command, named will try to write the 'named.run' file in the
+ # $directory (/var/named). By default, SELinux policy does not
+ # allow named to modify the /var/named directory, so put the
+ # default debug log file in data/ :
+ channel default_debug {
+ file "data/named.run" versions 5 size 20m;
+ severity dynamic;
+ };
+};
+
+# All BIND 9 zones are in a "view", which allow different zones to be
+# served to different types of client addresses, and for options to be
+# set for groups of zones. By default, if named.conf contains no
+# "view" clauses, all zones are in the "default" view, which matches
+# all clients. If named.conf contains any "view" clause, then all
+# zones MUST be in a view; so it is recommended to start off using
+# views to avoid having to restructure your configuration files in the
+# future.
+
+view "internal" {
+
+ # This view will contain zones you want to serve only to
+ # "internal" clients that connect via your directly attached LAN
+ # interfaces - "localnets".
+ match-clients { 192.168.0/24; };
+ match-destinations { 192.168.0/24; };
+ recursion no;
+
+ # All views must contain the root hints zone. However, since this
+ # machine is disconnected from Internet it is not possible for it
+ # to reach root servers. So, this line is commented based that no
+ # recursion is performed here.
+ //include "named.rfc1912.zones";
+
+ # These are your "authoritative" internal zones, and would
+ # probably also be included in the "localhost_resolver" view
+ # above:
+ zone "example.com" IN {
+ type master;
+ file "example.com.zone";
+ allow-update { none; };
+ };
+
+ zone "0.168.192.in-addr.arpa" IN {
+ type master;
+ file "example.com.rr.zone";
+ allow-update { none; };
+ };
+};
+
+# The localhost_resolver is already configured in `/etc/hosts' and set
+# as first choise in `/etc/hosts.conf' file. However, if you change
+# the order in `/etc/hosts.conf' file to make bind the first choise,
+# then you need to include here the localhost_resolver in order to
+# resolve localhost (127.0.0.1) address.
+
+key "rndckey" {
+ algorithm hmac-md5;
+ secret "JjsCg0VcCjZILGD8FR9nnw==";
+};
+
+controls {
+ inet 127.0.0.1 port 953
+ allow { 127.0.0.1; } keys { "rndckey"; };
+};
+
+
+
+
+
+ /var/named/example.com.zone
+
+
+$ORIGIN example.com.
+$TTL 86400
+@ IN SOA example.com. hostmaster.example.com. (
+ 2011100404 ; serial (d. adams)
+ 3H ; refresh
+ 15M ; retry
+ 1W ; expiry
+ 1D ) ; minimum
+
+ IN NS dns.example.com.
+ IN MX 10 mail.example.com.
+
+server IN A 192.168.0.1
+client IN A 192.168.0.2
+
+dns IN CNAME server
+mail IN CNAME server
+www IN CNAME server
+
+
+
+
+
+ /var/named/example.com.rr.zone
+
+
+$ORIGIN 0.168.192.in-addr.arpa.
+$TTL 86400
+@ IN SOA example.com. hostmaster.example.com. (
+ 2011100405 ; serial (d. adams)
+ 3H ; refresh
+ 15M ; retry
+ 1W ; expiry
+ 1D ) ; minimum
+
+ IN NS 192.168.0.1
+
+1 IN PTR server.example.com.
+2 IN PTR client.example.com.
+
+
+
+
+
+ /etc/rndc.conf
+
+
+include "/etc/rndc.key";
+options {
+ default-key "rndckey";
+ default-server 127.0.0.1;
+ default-port 953;
+};
+
+
+
+
+
+ /etc/rndc.key
+
+
+key "rndckey" {
+ algorithm hmac-md5;
+ secret "JjsCg0VcCjZILGD8FR9nnw==";
+};
+
+
+ When configuring rndc controls, don't use
+ the same secret shown in the example above. If you do so, the
+ secret information will not be a secret anymore (since we
+ already used it here). Instead, use the
+ rndc-genconf command to generate a new one,
+ and be sure it be placed correctly both in
+ /etc/rndc.conf and
+ /etc/named.conf configuration files.
+
+
+
+
+ /etc/resolv.conf
+
+ nameserver 192.168.0.1
+
+
+
+ /etc/host.conf
+
+ order hosts,bind
+
+
+
+
+
+ At this point you can start the named service and realize some
+ tests to verify the named service is certainly working as
+ expected. For example, consider the the following two
+ commands:
+
+
+
+[root@server ~]# service named start
+Starting named: [ OK ]
+[root@server ~]# dig example.com mx
+
+; <<>> DiG 9.3.6-P1-RedHat-9.3.6-4.P1.el5_4.2 <<>> example.com mx
+;; global options: printcmd
+;; Got answer:
+;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 3540
+;; flags: qr aa rd; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 0
+
+;; QUESTION SECTION:
+;example.com. IN MX
+
+;; ANSWER SECTION:
+example.com. 86400 IN MX 10 mail.example.com.
+
+;; AUTHORITY SECTION:
+example.com. 86400 IN NS dns.example.com.
+
+;; Query time: 0 msec
+;; SERVER: 192.168.0.1#53(192.168.0.1)
+;; WHEN: Wed Oct 5 10:33:24 2011
+;; MSG SIZE rcvd: 67
+
+
+
+ If everything is ok, configure the named service to start at
+ boot time:
+
+
+ chkconfig --level 345 named on
+
+
+ If something goes wrong, look for named daemon entries inside the
+ /var/log/messages file to know what is
+ going on. When you are configuring the name server, it could
+ result useful to you keeping an always visible terminal,
+ running the following command on it:
+
+
+ grep named /var/log/messages | tail -f -
+
+
+
+
+ Configuring Mail Server (MTA)
+
+ Based on default configuration provided by Postfix RPM inside
+ &TCD; (release 5.5), look for the following options and leave
+ the rest as is.
+
+
+
+
+ /etc/postfix/main.cf
+
+
+myhostname = server.example.com
+mydomain = example.org
+inet_interfaces = $myhostname, localhost
+mynetworks = 192.168.0.0/24, 127.0.0.0/8
+mailbox_transport = lmtp:unix:/var/lib/imap/socket/lmtp
+local_destination_recipient_limit = 300
+local_destination_concurrency_limit = 5
+
+
+
+
+
+
+
+
+ Configuring Mail Server (MDA)
+
+
+ /etc/cyrus.conf
+
+
+ Leave it as is. There is nothing to touch here for a small and
+ basic configuration like that one we are implementing in this
+ chapter.
+
+
+
+
+ /etc/imapd.conf
+
+
+ Leave it as is. There is nothing to touch here for a small and
+ basic configuration like that one we are implementing in this
+ chapter.
+
+
+ The initial configuration of Cyrus IMAP server is set to use
+ PLAIN authentication mechanisim (see
+ option) against saslauthd daemon. This makes the
+ password information to be vulnerable for man in the middle
+ attacks. In order to protect the user authentication, you can
+ use other authentication mechanisms like CRAM-MD5 or
+ DIGEST-MD5 in the mail client in order to send the password
+ information encrypted. Another solution would be to create an
+ encrypted channel for communication between the e-email client
+ and Cyrus IMAP server by mean of SSL encryption.
+
+
+ When you use authentication mechanisms that encrypt user
+ information before passing them to saslauthd daemon (e.g.,
+ DIGETS-MD5), you are protecting your data in the mail
+ client before passing it to saslauthd daemon. Therefore, when
+ the saslauthd daemon
+ tries to validate the credentials you passed in against PAM,
+ it fails. At my personal understanding, this happens becase
+ PAM must receive the user information as it was entered by the
+ user (i.e., plainly, without any encryption) in order to
+ realize the verification against the system default
+ authentication database (e.g.,
+ /etc/passwd,
+ /etc/shadow), and saslauthd daemon is passing an
+ encrypted version of the plain user information which
+ obviously cannot match the hash produced by plain user
+ information in first place.
+
+
+
+ One alternative to the situation mentioned above could be to
+ use PLAIN authentication mechanism over an SSL encrypted
+ communication or excluding PAM mechanism from saslauthd
+ daemon, and use LDAP mechanism instead. When LDAP mechanism
+ is used as default authentication mechanism inside saslauthd
+ daemon, it is possible for mail clients to send encrypted
+ passwords to saslauthd daemon. In this configuration, the
+ password stored in LDAP server must be encrypted using the
+ same algorithm used to send the encrypted password from mail
+ client to saslauthd daemon. Therefore, you need to force the
+ user to use just one authentication mechanism, that one used
+ to stored encrypted passwords inside the LDAP server.
+ Otherwise, it would be very difficult to authenticate users
+ that send passwords encrypted in a way different to that one
+ stored in the LDAP server.
+
+
+
+ Another configuration could be to keep mail clients using
+ PLAIN authentication over an SSL connection against saslauthd
+ daemon, and saslauthd using a PAM. But this time, PAM would be
+ configured to extend its default system authentication by
+ using an LDAP server. This way, it would be possible to
+ isolate user accound administration and greatly control the
+ kind of information a user might have. For example, the root
+ user account would be in the system default authentication,
+ however all service-specific user information would be in the
+ LDAP server. This permits us to create a web application that
+ interact with LDAP server in order to manage service-specific
+ user information only avoiding any contant with system default
+ authentication, the place where the root user is stored in. In
+ this PAM configuration, the first match that fails means that
+ the whole authentication process fails.
+
+
+
+
+
+ /etc/pki/cyrus-imapd/cyrus-imapd.pem
+
+
+ This file is a symbolic link to
+ /etc/pki/tls/certs/cyrus-imapd.pem. This
+ file contains a self-generated SSL certificate you probably
+ want to update for setting your host name in the Common
+ Name
field of it. To create this file use the
+ following command:
+
+ openssl req -new -x509 -nodes -out /etc/pki/tls/certs/cyrus-imapd.pem -keyout /etc/pki/tls/certs/cyrus-imapd.pem -days 365
+
+
+
+
+
+
+ To initiate the Cyrus IMAP server, run the following command:
+
+
+ service cyrus-imapd start
+
+
+ In case something fails, look into the
+ /var/log/maillog file, specifically those
+ entries containing imap
, pop
,
+ nntp
and cyrus
strings. It could be
+ useful if, before initiating Cyrus IMAP server, you open a
+ terminal and run the following command in it, just to see what
+ is happening once Cyrus IMAP server is initiated:
+
+
+ egrep '(cyrus|imap|pop)' /var/log/maillog | tail -f -
+
+
+ Later, to test the STARTTLS
negociation, you can
+ run the following command:
+
+
+ imtest -t "" server.example.com
+
+
+ To administer mailboxes inside Cyrus Imapd, set a password to
+ cyrus user (e.g., passwd cyrus), do login
+ with it, and connect to Cyrus IMAP server using the
+ cyradm command, as shown below:
+
+
+ cyradm --user=cyrus --auth=login localhost
+
+
+
+
+ Configuring Mail Server (SASL)
+
+ ...
+
+
+
+
+ Configuring Web Server
+
+ ...
+
+
+
+
+ Configuring Directory Server
+
+ ...
+
+
+
+
+
+
diff --git a/Manuals/Howto-dialup/Configurations/Dialup/usage.docbook b/Manuals/Howto-dialup/Configurations/Dialup/usage.docbook
new file mode 100644
index 0000000..62be0b9
--- /dev/null
+++ b/Manuals/Howto-dialup/Configurations/Dialup/usage.docbook
@@ -0,0 +1,290 @@
+
+
+ Usage Convenctions
+
+
+ The infrastructure described in this chapter uses the
+ client/server model to provide a public mail service through
+ the telephone line. In this configuration, we (the poeple
+ building the infrastructure) provide the information you (the
+ person using the infrastructure) need to know in order to
+ establish a point-to-point connection from the client computer
+ to the server computer through the telephone line.
+
+
+ The infrastructure described in this chapter is made available
+ to you free of charge, however, you should know that
+ maintaining it costs both money and time. For example, for
+ each hour the server computer is on production there is an
+ electrical consume that need to be paid every month.
+ Likewise, each call that you establish from the client
+ computer to the server computer will cost you money, based on
+ the location you made the call from and the time you spend
+ connected.
+
+
+
+ In this section we discuss usage convenctions we all must be
+ agree with, in order to achieve a practical and secure
+ interchange system.
+
+
+
+ Administering Dial-Up Connections
+
+
+ The lifetime of dial-up connections must be limitted based on
+ the number of users you expect to establish connection and the
+ kind of services you plan to provide. The mail service
+ provided by the server computer is conceived as a public
+ service so anyone with a modem attached to a computer would be
+ able to have access to it. However, due to hardware
+ limitations, only 100 users will be allowed to be registered
+ in the public mail service. Based on this information, the
+ lifetime of established connections will be of 15 minutes from
+ the established moment on. Once the connection has been
+ established, if the link is idle for 1 minute, the server
+ computer will close the established connection to free the
+ telephone line. This control can be implemented through the
+ and options
+ inside the pppd's configuration
+ file.
+
+
+
+ Only registered user profiles will be able to establish connections
+ to the server computer. This control can be implemented using
+ the option in the
+ pppd's configuration file to define a
+ list of all telephone numbers that are allowed to establish
+ connection with the server computer, based on the list of
+ registered user profiles. By default, all telephone numbers
+ are denied from establishing access with the server computer,
+ except those ones explicitly set by
+ option. If the
+ option is not present in
+ pppd's configuration file, all
+ telephone numbers are allowed to establish connection with the
+ server computer, so be sure to include the
+ option in
+ pppd's configuration file if you
+ want to control who can/cannot establish connection with the
+ server computer.
+
+
+
+##### centos-pppd-config will overwrite this part!!! (begin) #####
+allow-number 12345
+allow-number 21345
+allow-number 34567
+##### centos-pppd-config will overwrite this part!!! (end) #####
+
+
+
+ The centos-pppd-admin application
+ must be considered part of user profile registration process
+ inside the server computer. The
+ centos-pppd-admin application would
+ be used to control the list of allowed telephone numbers
+ inside the pppd's configuration
+ file, based on the list of user profiles. The
+ centos-pppd-admin application
+ should be executed after any registration/deletion action
+ against the list of user profiles with root privilages in order to be
+ able of writing the settings on
+ pppd's configuration file.
+
+
+
+ Redialing consecutive connections from the same telephone
+ number without any dealy between call retries must be avoided
+ from client computers. This would reduce the possibilities for
+ other client computers to establish connection with the server
+ computer. To prevent this issue from happening, it would be
+ necessary to provide more telephone lines than users
+ authorized to establish connection with the server computer.
+ Nevertheless, there is only one telephone line available for
+ the server computer to use.
+
+
+
+
+
+ Administering User Profiles
+
+
+ In order for you to use any service provided by the server
+ computer it is required that you register yourself inside the
+ server computer creating a user profile. The user profile
+ provides the user information required by services inside the
+ server computer (e.g., username, password, e-mail address,
+ telephone number, etc.). To register new user profiles, you
+ need to use the web application provided by the server
+ computer. For example, assuming the domain name of the server
+ computer is example.com, the web
+ application would be accessable through the following URL:
+ .
+
+
+
+ To reach the web interface, the first thing you need to do is
+ establishing a dial-up connection to the server computer as
+ described in . Once the
+ dial-up connection has been established, you need to open a
+ web browser (e.g., Firefox) and put the URL mentioned above in
+ the address space, and press Enter to go. This will present
+ you a web page with the instructions you need to follow in
+ order to register your user profile. Other actions like
+ updating or deleting your own user profile should be also
+ possible from this web interface.
+
+
+
+
+ The web interface used to manage user profiles inside the
+ server computer must be presented over an encrypted session in
+ order to protect all the information passing through.
+
+
+
+
+ Inside the server computer, all related subsystems in need of
+ user information (e.g., Postix, Cyrus-Imapd and Saslauthd)
+ retrive user information from one single (LDAP) source. The
+ web application provided by the server computer manages all
+ these subsystems' configuration files in order to provide a
+ pleasant experience for end users. The web interface must be
+ as simple as possible in order to achieve all administration
+ tasks in the range of time permitted by the server computer
+ before it closes the connection established from the client
+ computer.
+
+
+
+ More information about the web interface you need to use to
+ manage your user profile inside the server computer can be
+ found in .
+
+
+
+
+
+ Administering Services
+
+
+ The information generated inside the server computer is
+ isolated from Internet. This way, any information generated
+ inside the server computer will be available only to people
+ registered inside the server computer. For example, don't ever
+ expect to send/receive e-mails to/from Internet e-mail
+ accounts like Gmail or Yahoo, nor visiting web sites like
+ Google or Wikipedia either. For
+ this to happen, it is required an established connection
+ between the server computer you are establishing connection
+ through and the Internet network those services are available
+ in. Without that link, it is not possible to direct your
+ requests to those sites.
+
+
+
+ The implementation of services that required persistent
+ connections (e.g., chats) will not
+ be considered as a practical offer inside the server computer.
+ Instead, only asynchronous services (e.g.,
+ e-mail) will be supported. This
+ restriction is required to reduce the amount of time demanded
+ by services. For example, consider an environment where you
+ connect to the server computer for sending/receiving e-mails
+ messages and then quickly disconnect from it to free the
+ telephone line for others to use. In this environment, there
+ is no need for you and other person to be both connected at
+ the same time to send/receive e-mail messages to/from each
+ other. The e-mails sent from other person to you will be
+ available in your mailbox the next time you get connected to
+ the server computer and use your e-mail client to send/receive
+ e-mail messages. Likewise, you don't need to be connected to
+ the server computer in order to write your e-mail messages.
+ You can write down your messages off-line and then establish
+ connection once you've finished writing, just to send them
+ out and receive new messages that could have been probably
+ sent to you.
+
+
+
+ Another issue related to e-mail exchange is the protocol used
+ to receive messages. Presently, there are two popular ways to
+ do this, one is through IMAP and another through POP3. When
+ you use IMAP protocol, e-mail messages are retained in the
+ server computer and aren't downloaded to client computer.
+ Otherwise, when you use POP3 protocol, e-mail messages are
+ downloaded to the client computer and removed from server
+ computer. Based on the resources we have and the kind of link
+ used by the client computer to connect the server computer,
+ using POP3 is rather prefered than IMAP. However both are made
+ available.
+
+
+
+ Assuming you use IMAP protocol to read your mailbox, be aware
+ that you need to be connected to the server computer. Once
+ the connection is lost you won't be able to read your messages
+ (unless your e-mail client possesses a feature that let you
+ reading messages off-line). Morover, you run the risk of
+ getting your mailbox out of space. If your mailbox gets out of
+ space, new messages sent to you will not be deliver to your
+ mailbox. Instead, they will be deferred for a period of time
+ (e.g., about 5 days when using
+ Postfix defaults) hoping you to
+ free the space in your mailbox to deliver them. If you don't
+ free space within this period of time, the deferred e-mails
+ will be bounced back to their senders and you will never see
+ them. On the other hand, assuming you are using POP3 protocol
+ to read your mailbox, you always keep your mailbox free to
+ receive new e-mails messages and keep them for you until the
+ next time you establish connection with the server computer
+ and download them to your client computer using your e-mail
+ client.
+
+
+
+
+ Administering Disk Space
+
+
+ The maximum number of registered user profiles is limited
+ inside the server computer, based on the maximum disk space
+ the server computer confines to such purpose. For example,
+ consider an environment where users can get registered
+ themselves using a web interface. In this case the web
+ interface must know how much disk space is available before
+ proceeding to register new mail accounts inside the server
+ computer and this way preventing any disk writing when there
+ isn't enough free space on disk to perform a new user
+ registration. Considering the server computer has confined
+ 1GB of disk space to handle the mail service (e.g., mail
+ queues, mailboxes, etc.) and each user mailbox is 10MB, it
+ will be possible to provide self-registration through the web
+ interface for 100 users in total.
+
+
+
+ Another measure related to save disk space might be to remove
+ unused user accounts and their related files (e.g., mailboxes)
+ from the server computer. For example, consider an environment
+ where user accounts are automatically removed from the server
+ computer when they don't establish a connection with the
+ server computer in a period greater than 7 days since the last
+ valid connection established to the server computer. Once the
+ user account is removed, it is no longer functional of course,
+ and the person whom lost the account will need to create a new
+ one, assuming it want to have access to the mail service
+ again.
+
+
+
+
+
diff --git a/Manuals/Howto-dialup/Licenses.docbook b/Manuals/Howto-dialup/Licenses.docbook
new file mode 100644
index 0000000..dfc86ce
--- /dev/null
+++ b/Manuals/Howto-dialup/Licenses.docbook
@@ -0,0 +1,6 @@
+
+ Licenses
+ &licenses-gpl;
+ &licenses-gfdl;
+
+
diff --git a/Manuals/Howto-dialup/Licenses.ent b/Manuals/Howto-dialup/Licenses.ent
new file mode 100644
index 0000000..29e0b56
--- /dev/null
+++ b/Manuals/Howto-dialup/Licenses.ent
@@ -0,0 +1,3 @@
+
+
+
diff --git a/Manuals/Howto-dialup/Licenses/gfdl.docbook b/Manuals/Howto-dialup/Licenses/gfdl.docbook
new file mode 100644
index 0000000..33f6e8c
--- /dev/null
+++ b/Manuals/Howto-dialup/Licenses/gfdl.docbook
@@ -0,0 +1,591 @@
+
+
+ GNU Free Documentation License
+
+ Version 1.2, November 2002
+
+ Copyright © 2000, 2001, 2002 Free Software Foundation,
+ Inc. 675 Mass Ave, Cambridge, MA 02139, USA
+
+ Everyone is permitted to copy and distribute verbatim copies
+ of this license document, but changing it is not allowed.
+
+
+
+ Preamble
+
+ The purpose of this License is to make a manual,
+ textbook, or other functional and useful document
+ free
in the sense of freedom: to assure
+ everyone the effective freedom to copy and redistribute it,
+ with or without modifying it, either commercially or
+ noncommercially. Secondarily, this License preserves for the
+ author and publisher a way to get credit for their work, while
+ not being considered responsible for modifications made by
+ others.
+
+ This License is a kind of copyleft
, which
+ means that derivative works of the document must themselves be
+ free in the same sense. It complements the , which is a copyleft license
+ designed for free software.
+
+ We have designed this License in order to use it for
+ manuals for free software, because free software needs free
+ documentation: a free program should come with manuals
+ providing the same freedoms that the software does. But this
+ License is not limited to software manuals; it can be used for
+ any textual work, regardless of subject matter or whether it
+ is published as a printed book. We recommend this License
+ principally for works whose purpose is instruction or
+ reference.
+
+
+
+
+
+ Applicability and definitions
+
+ This License applies to any manual or other work, in any
+ medium, that contains a notice placed by the copyright holder
+ saying it can be distributed under the terms of this License.
+ Such a notice grants a world-wide, royalty-free license,
+ unlimited in duration, to use that work under the conditions
+ stated herein. The Document
, below, refers to
+ any such manual or work. Any member of the public is a
+ licensee, and is addressed as you
. You accept
+ the license if you copy, modify or distribute the work in a
+ way requiring permission under copyright law.
+
+ A
+ Modified Version
of the Document means any work
+ containing the Document or a portion of it, either copied
+ verbatim, or with modifications and/or translated into another
+ language.
+
+ A
+ Secondary Section
is a named appendix or a
+ front-matter section of the Document that deals exclusively
+ with the relationship of the publishers or authors of the
+ Document to the Document's overall subject (or to related
+ matters) and contains nothing that could fall directly within
+ that overall subject. (Thus, if the Document is in part a
+ textbook of mathematics, a may not explain any mathematics.) The relationship could be
+ a matter of historical connection with the subject or with
+ related matters, or of legal, commercial, philosophical,
+ ethical or political position regarding them.
+
+ The Invariant Sections
are certain
+ whose titles are
+ designated, as being those of Invariant Sections, in the
+ notice that says that the Document is released under this
+ License. If a section does not fit the above definition of
+ Secondary then it is not allowed to be designated as
+ Invariant. The Document may contain zero Invariant Sections.
+ If the Document does not identify any Invariant Section then
+ there are none.
+
+ The
+ Cover Texts
are certain short passages of text
+ that are listed, as Front-Cover Texts or Back-Cover Texts, in
+ the notice that says that the Document is released under this
+ License. A Front-Cover Text may be at most 5 words, and a
+ Back-Cover Text may be at most 25 words.
+
+ A
+ Transparent
copy of the Document means a
+ machine-readable copy, represented in a format whose
+ specification is available to the general public, that is
+ suitable for revising the document straightforwardly with
+ generic text editors or (for images composed of pixels)
+ generic paint programs or (for drawings) some widely available
+ drawing editor, and that is suitable for input to text
+ formatters or for automatic translation to a variety of
+ formats suitable for input to text formatters. A copy made in
+ an otherwise file format whose
+ markup, or absence of markup, has been arranged to thwart or
+ discourage subsequent modification by readers is not . An image format is not if used for any substantial amount of
+ text. A copy that is not
is called Opaque
.
+
+ Examples of suitable formats for copies
+ include plain ASCII without markup, Texinfo input format,
+ LaTeX input format, SGML or XML using a publicly available
+ DTD, and standard-conforming simple HTML, PostScript or PDF
+ designed for human modification. Examples of transparent
+ image formats include PNG, XCF and JPG. Opaque formats
+ include proprietary formats that can be read and edited only
+ by proprietary word processors, SGML or XML for which the DTD
+ and/or processing tools are not generally available, and the
+ machine-generated HTML, PostScript or PDF produced by some
+ word processors for output purposes only.
+
+ The Title
+ Page
means, for a printed book, the title page itself,
+ plus such following pages as are needed to hold, legibly, the
+ material this License requires to appear in the title page.
+ For works in formats which do not have any title page as such,
+ Title Page
means the text near the most
+ prominent appearance of the work's title, preceding the
+ beginning of the body of the text.
+
+ A section Entitled XYZ
means a named
+ subunit of the Document whose title either is precisely XYZ or
+ contains XYZ in parentheses following text that translates XYZ
+ in another language. (Here XYZ stands for a specific section
+ name mentioned below, such as Acknowledgements
,
+ Dedications
, Endorsements
, or
+ History
.) To Preserve the Title
+ of such a section when you modify the Document means that it
+ remains a section Entitled XYZ
according to
+ this definition.
+
+ The Document may include Warranty Disclaimers next to
+ the notice which states that this License applies to the
+ Document. These Warranty Disclaimers are considered to be
+ included by reference in this License, but only as regards
+ disclaiming warranties: any other implication that these
+ Warranty Disclaimers may have is void and has no effect on the
+ meaning of this License.
+
+
+
+
+
+ Verbatim copying
+
+ You may copy and distribute the Document in any medium,
+ either commercially or noncommercially, provided that this
+ License, the copyright notices, and the license notice saying
+ this License applies to the Document are reproduced in all
+ copies, and that you add no other conditions whatsoever to
+ those of this License. You may not use technical measures to
+ obstruct or control the reading or further copying of the
+ copies you make or distribute. However, you may accept
+ compensation in exchange for copies. If you distribute a
+ large enough number of copies you must also follow the
+ conditions in section .
+
+ You may also lend copies, under the same conditions
+ stated above, and you may publicly display copies.
+
+
+
+
+
+ Copying in quantity
+
+ If you publish printed copies (or copies in media that
+ commonly have printed covers) of the Document, numbering more
+ than 100, and the Document's license notice requires Cover
+ Texts, you must enclose the copies in covers that carry,
+ clearly and legibly, all these :
+ Front-Cover Texts on the front cover, and Back-Cover Texts on
+ the back cover. Both covers must also clearly and legibly
+ identify you as the publisher of these copies. The front
+ cover must present the full title with all words of the title
+ equally prominent and visible. You may add other material on
+ the covers in addition. Copying with changes limited to the
+ covers, as long as they preserve the title of the Document and
+ satisfy these conditions, can be treated as verbatim copying
+ in other respects.
+
+ If the required texts for either cover are too
+ voluminous to fit legibly, you should put the first ones
+ listed (as many as fit reasonably) on the actual cover, and
+ continue the rest onto adjacent pages.
+
+ If you publish or distribute Opaque copies of the
+ Document numbering more than 100, you must either include a
+ machine-readable copy along with each Opaque copy,
+ or state in or with each Opaque copy a computer-network
+ location from which the general network-using public has
+ access to download using public-standard network protocols a
+ complete copy of the Document, free of added
+ material. If you use the latter option, you must take
+ reasonably prudent steps, when you begin distribution of
+ Opaque copies in quantity, to ensure that this
+ copy will remain thus accessible at the stated location until
+ at least one year after the last time you distribute an Opaque
+ copy (directly or through your agents or retailers) of that
+ edition to the public.
+
+ It is requested, but not required, that you contact the
+ authors of the Document well before redistributing any large
+ number of copies, to give them a chance to provide you with an
+ updated version of the Document.
+
+
+
+
+
+ Modifications
+
+ You may copy and distribute a of the Document under the
+ conditions of sections and above,
+ provided that you release the under precisely this License, with the filling the role of the
+ Document, thus licensing distribution and modification of the
+ to whoever possesses a
+ copy of it. In addition, you must do these things in the
+ :
+
+
+
+
+ Use in the (and on
+ the covers, if any) a title distinct from that of the
+ Document, and from those of previous versions (which
+ should, if there were any, be listed in the History
+ section of the Document). You may use the same title
+ as a previous version if the original publisher of
+ that version gives permission.
+
+
+ List on the , as
+ authors, one or more persons or entities responsible
+ for authorship of the modifications in the , together with at least
+ five of the principal authors of the Document (all of
+ its principal authors, if it has fewer than five),
+ unless they release you from this requirement.
+
+
+
+ State on the the
+ name of the publisher of the , as the
+ publisher.
+
+
+
+ Preserve all the copyright notices of the
+ Document.
+
+
+
+ Add an appropriate copyright notice for your
+ modifications adjacent to the other copyright
+ notices.
+
+
+
+ Include, immediately after the copyright
+ notices, a license notice giving the public permission
+ to use the under the terms of this
+ License, in the form shown in the Addendum
+ below.
+
+
+
+ Preserve in that license notice the full lists
+ of and required
+ given in the Document's
+ license notice.
+
+
+
+ Include an unaltered copy of this License.
+
+
+
+ Preserve the section Entitled
+ History
, Preserve its Title, and add to
+ it an item stating at least the title, year, new
+ authors, and publisher of the as given on the . If there is no section
+ Entitled History
in the Document, create
+ one stating the title, year, authors, and publisher of
+ the Document as given on its , then add an item describing the as stated in the previous
+ sentence.
+
+
+
+ Preserve the network location, if any, given in
+ the Document for public access to a copy of the Document, and
+ likewise the network locations given in the Document
+ for previous versions it was based on. These may be
+ placed in the History
section. You may
+ omit a network location for a work that was published
+ at least four years before the Document itself, or if
+ the original publisher of the version it refers to
+ gives permission.
+
+
+
+ For any section Entitled
+ Acknowledgements
or
+ Dedications
, Preserve the Title of the
+ section, and preserve in the section all the substance
+ and tone of each of the contributor acknowledgements
+ and/or dedications given therein.
+
+
+
+ Preserve all the of the Document,
+ unaltered in their text and in their titles. Section
+ numbers or the equivalent are not considered part of
+ the section titles.
+
+
+
+ Delete any section Entitled
+ Endorsements
. Such a section may not
+ be included in the .
+
+
+
+ Do not retitle any existing section to be
+ Entitled Endorsements
or to conflict in
+ title with any .
+
+
+ Preserve any Warranty Disclaimers.
+
+
+
+
+ If the includes new
+ front-matter sections or appendices that qualify as and contain no material copied
+ from the Document, you may at your option designate some or
+ all of these sections as invariant. To do this, add their
+ titles to the list of in the 's license notice. These titles
+ must be distinct from any other section titles.
+
+ You may add a section Entitled
+ Endorsements
, provided it contains nothing but
+ endorsements of your by various
+ parties–for example, statements of peer review or that
+ the text has been approved by an organization as the
+ authoritative definition of a standard.
+
+ You may add a passage of up to five words as a
+ Front-Cover Text, and a passage of up to 25 words as a
+ Back-Cover Text, to the end of the list of in the . Only one passage of
+ Front-Cover Text and one of Back-Cover Text may be added by
+ (or through arrangements made by) any one entity. If the
+ Document already includes a cover text for the same cover,
+ previously added by you or by arrangement made by the same
+ entity you are acting on behalf of, you may not add another;
+ but you may replace the old one, on explicit permission from
+ the previous publisher that added the old one.
+
+ The author(s) and publisher(s) of the Document do not by
+ this License give permission to use their names for publicity
+ for or to assert or imply endorsement of any .
+
+
+
+
+
+ Combining documents
+
+ You may combine the Document with other documents
+ released under this License, under the terms defined in
+ section above for
+ modified versions, provided that you include in the
+ combination all of the of
+ all of the original documents, unmodified, and list them all
+ as of your combined work
+ in its license notice, and that you preserve all their
+ Warranty Disclaimers.
+
+ The combined work need only contain one copy of this
+ License, and multiple identical may be replaced with a single
+ copy. If there are multiple with the same name but
+ different contents, make the title of each such section unique
+ by adding at the end of it, in parentheses, the name of the
+ original author or publisher of that section if known, or else
+ a unique number. Make the same adjustment to the section
+ titles in the list of in
+ the license notice of the combined work.
+
+ In the combination, you must combine any sections
+ Entitled History
in the various original
+ documents, forming one section Entitled
+ History
; likewise combine any sections Entitled
+ Acknowledgements
, and any sections Entitled
+ Dedications
. You must delete all sections
+ Entitled Endorsements
.
+
+
+
+
+
+ Collection of documents
+
+ You may make a collection consisting of the Document and
+ other documents released under this License, and replace the
+ individual copies of this License in the various documents
+ with a single copy that is included in the collection,
+ provided that you follow the rules of this License for
+ verbatim copying of each of the documents in all other
+ respects.
+
+ You may extract a single document from such a
+ collection, and distribute it individually under this License,
+ provided you insert a copy of this License into the extracted
+ document, and follow this License in all other respects
+ regarding verbatim copying of that document.
+
+
+
+
+
+ Aggregation with independent works
+
+ A compilation of the Document or its derivatives with
+ other separate and independent documents or works, in or on a
+ volume of a storage or distribution medium, is called an
+ aggregate
if the copyright resulting from the
+ compilation is not used to limit the legal rights of the
+ compilation's users beyond what the individual works permit.
+ When the Document is included in an aggregate, this License
+ does not apply to the other works in the aggregate which are
+ not themselves derivative works of the Document.
+
+ If the Cover Text requirement of section is applicable to these
+ copies of the Document, then if the Document is less than one
+ half of the entire aggregate, the Document's may be placed on covers that bracket
+ the Document within the aggregate, or the electronic
+ equivalent of covers if the Document is in electronic form.
+ Otherwise they must appear on printed covers that bracket the
+ whole aggregate.
+
+
+
+
+
+ Translations
+
+ Translation is considered a kind of modification, so you
+ may distribute translations of the Document under the terms of
+ section . Replacing
+ with translations
+ requires special permission from their copyright holders, but
+ you may include translations of some or all in addition to the original
+ versions of these . You
+ may include a translation of this License, and all the license
+ notices in the Document, and any Warranty Disclaimers,
+ provided that you also include the original English version of
+ this License and the original versions of those notices and
+ disclaimers. In case of a disagreement between the
+ translation and the original version of this License or a
+ notice or disclaimer, the original version will
+ prevail.
+
+ If a section in the Document is Entitled
+ Acknowledgements
, Dedications
,
+ or History
, the requirement (section ) to Preserve its Title
+ (section ) will
+ typically require changing the actual title.
+
+
+
+
+
+ Termination
+
+ You may not copy, modify, sublicense, or distribute the
+ Document except as expressly provided for under this License.
+ Any other attempt to copy, modify, sublicense or distribute
+ the Document is void, and will automatically terminate your
+ rights under this License. However, parties who have received
+ copies, or rights, from you under this License will not have
+ their licenses terminated so long as such parties remain in
+ full compliance.
+
+
+
+
+
+ Future Revisions of this License
+
+ The Free Software Foundation may publish new, revised
+ versions of the GNU Free Documentation License from time to
+ time. Such new versions will be similar in spirit to the
+ present version, but may differ in detail to address new
+ problems or concerns. See .
+
+ Each version of the License is given a distinguishing
+ version number. If the Document specifies that a particular
+ numbered version of this License or any later
+ version
applies to it, you have the option of
+ following the terms and conditions either of that specified
+ version or of any later version that has been published (not
+ as a draft) by the Free Software Foundation. If the Document
+ does not specify a version number of this License, you may
+ choose any version ever published (not as a draft) by the Free
+ Software Foundation.
+
+
+
+
+
+ How to use this License for your documents
+
+ To use this License in a document you have written,
+ include a copy of the License in the document and put the
+ following copyright and license notices just after the title
+ page:
+
+
+Copyright (C) YEAR YOUR NAME.
+
+Permission is granted to copy, distribute and/or modify this
+document under the terms of the GNU Free Documentation License,
+Version 1.2 or any later version published by the Free Software
+Foundation; with no Invariant Sections, no Front-Cover Texts, and
+no Back-Cover Texts. A copy of the license is included in the
+section entitled GNU Free Documentation License
.
+
+
+ If you have ,
+ Front-Cover Texts and Back-Cover Texts, replace the
+ with...Texts
. line with this:
+
+
+with the Invariant Sections being LIST THEIR TITLES, with the
+Front-Cover Texts being LIST, and with the Back-Cover Texts being
+LIST.
+
+
+ If you have
+ without , or some other
+ combination of the three, merge those two alternatives to suit
+ the situation.
+
+ If your document contains nontrivial examples of program
+ code, we recommend releasing these examples in parallel under
+ your choice of free software license, such as the GNU General
+ Public License, to permit their use in free software.
+
+
+
+
diff --git a/Manuals/Howto-dialup/Licenses/gpl.docbook b/Manuals/Howto-dialup/Licenses/gpl.docbook
new file mode 100644
index 0000000..71654af
--- /dev/null
+++ b/Manuals/Howto-dialup/Licenses/gpl.docbook
@@ -0,0 +1,497 @@
+
+
+ GNU General Public License
+
+ Version 2, June 1991
+
+ Copyright © 1989, 1991 Free Software Foundation, Inc.
+ 675 Mass Ave, Cambridge, MA 02139, USA
+
+ Everyone is permitted to copy and distribute verbatim copies
+ of this license document, but changing it is not allowed.
+
+
+
+ Preamble
+
+ The licenses for most software are designed to take away
+ your freedom to share and change it. By contrast, the GNU General
+ Public License is intended to guarantee your freedom to share and
+ change free software–to make sure the software is free for
+ all its users. This General Public License applies to most of the
+ Free Software Foundation's software and to any other program whose
+ authors commit to using it. (Some other Free Software Foundation
+ software is covered by the GNU Library General Public License
+ instead.) You can apply it to your programs, too.
+
+ When we speak of free software, we are referring to freedom,
+ not price. Our General Public Licenses are designed to make sure
+ that you have the freedom to distribute copies of free software
+ (and charge for this service if you wish), that you receive source
+ code or can get it if you want it, that you can change the
+ software or use pieces of it in new free programs; and that you
+ know you can do these things.
+
+ To protect your rights, we need to make restrictions that
+ forbid anyone to deny you these rights or to ask you to surrender
+ the rights. These restrictions translate to certain
+ responsibilities for you if you distribute copies of the software,
+ or if you modify it.
+
+ For example, if you distribute copies of such a program,
+ whether gratis or for a fee, you must give the recipients all the
+ rights that you have. You must make sure that they, too, receive
+ or can get the source code. And you must show them these terms so
+ they know their rights.
+
+ We protect your rights with two steps:
+
+
+
+ copyright the software, and
+
+
+ offer you this license which gives you legal
+ permission to copy, distribute and/or modify the
+ software.
+
+
+
+
+ Also, for each author's protection and ours, we want to make
+ certain that everyone understands that there is no warranty for
+ this free software. If the software is modified by someone else
+ and passed on, we want its recipients to know that what they have
+ is not the original, so that any problems introduced by others
+ will not reflect on the original authors' reputations.
+
+ Finally, any free program is threatened constantly by
+ software patents. We wish to avoid the danger that redistributors
+ of a free program will individually obtain patent licenses, in
+ effect making the program proprietary. To prevent this, we have
+ made it clear that any patent must be licensed for everyone's free
+ use or not licensed at all.
+
+ The precise terms and conditions for copying, distribution
+ and modification follow.
+
+
+
+
+
+ Terms and Conditions for Copying, Distribution and Modification
+
+
+
+ Section 1
+
+ You may copy and distribute verbatim copies of the
+ Program's source code as you receive it, in any medium,
+ provided that you conspicuously and appropriately publish on
+ each copy an appropriate copyright notice and disclaimer of
+ warranty; keep intact all the notices that refer to this
+ License and to the absence of any warranty; and give any other
+ recipients of the Program a copy of this License along with
+ the Program.
+
+ You may charge a fee for the physical act of
+ transferring a copy, and you may at your option offer warranty
+ protection in exchange for a fee.
+
+
+
+
+
+ Section 2
+
+ You may modify your copy or copies of the Program or
+ any portion of it, thus forming a work based on the
+ Program, and copy and distribute such modifications or
+ work under the terms of above, provided that you also meet all of these
+ conditions:
+
+
+
+ You must cause the modified files to carry prominent
+ notices stating that you changed the files and the date of
+ any change.
+
+
+ You must cause any work that you distribute or
+ publish, that in whole or in part contains or is derived
+ from the Program or any part thereof, to be licensed as a
+ whole at no charge to all third parties under the terms of
+ this License.
+
+
+ If the modified program normally reads commands
+ interactively when run, you must cause it, when started
+ running for such interactive use in the most ordinary way,
+ to print or display an announcement including an
+ appropriate copyright notice and a notice that there is no
+ warranty (or else, saying that you provide a warranty) and
+ that users may redistribute the program under these
+ conditions, and telling the user how to view a copy of
+ this License.
+
+
+ Exception
+
+ If the Program itself is interactive but does not
+ normally print such an announcement, your work based
+ on the Program is not required to print an
+ announcement.
+
+
+
+
+
+
+ These requirements apply to the modified work as a whole.
+ If identifiable sections of that work are not derived from the
+ Program, and can be reasonably considered independent and separate
+ works in themselves, then this License, and its terms, do not
+ apply to those sections when you distribute them as separate
+ works. But when you distribute the same sections as part of a
+ whole which is a work based on the Program, the distribution of
+ the whole must be on the terms of this License, whose permissions
+ for other licensees extend to the entire whole, and thus to each
+ and every part regardless of who wrote it.
+
+ Thus, it is not the intent of this section to claim rights
+ or contest your rights to work written entirely by you; rather,
+ the intent is to exercise the right to control the distribution of
+ derivative or collective works based on the Program.
+
+ In addition, mere aggregation of another work not based on
+ the Program with the Program (or with a work based on the Program)
+ on a volume of a storage or distribution medium does not bring the
+ other work under the scope of this License.
+
+
+
+
+
+ Section 3
+
+ You may copy and distribute the Program (or a work
+ based on it, under ) in
+ object code or executable form under the terms of and above provided that you also
+ do one of the following:
+
+
+
+
+
+ Accompany it with the complete corresponding
+ machine-readable source code, which must be
+ distributed under the terms of and above on a medium
+ customarily used for software interchange;
+ or,
+
+
+
+
+
+ Accompany it with a written offer, valid for at
+ least three years, to give any third party, for a
+ charge no more than your cost of physically
+ performing source distribution, a complete
+ machine-readable copy of the corresponding source
+ code, to be distributed under the terms of and above on a medium
+ customarily used for software interchange;
+ or,
+
+
+
+
+
+ Accompany it with the information you received as
+ to the offer to distribute corresponding source
+ code. (This alternative is allowed only for
+ noncommercial distribution and only if you
+ received the program in object code or executable
+ form with such an offer, in accord with Subsection
+ b above.)
+
+
+
+
+
+
+ The source code for a work means the preferred form of the
+ work for making modifications to it. For an executable work,
+ complete source code means all the source code for all modules it
+ contains, plus any associated interface definition files, plus the
+ scripts used to control compilation and installation of the
+ executable. However, as a special exception, the source code
+ distributed need not include anything that is normally distributed
+ (in either source or binary form) with the major components
+ (compiler, kernel, and so on) of the operating system on which the
+ executable runs, unless that component itself accompanies the
+ executable.
+
+ If distribution of executable or object code is made by
+ offering access to copy from a designated place, then offering
+ equivalent access to copy the source code from the same place
+ counts as distribution of the source code, even though third
+ parties are not compelled to copy the source along with the object
+ code.
+
+
+
+
+
+ Section 4
+
+ You may not copy, modify, sublicense, or distribute the
+ Program except as expressly provided under this License. Any
+ attempt otherwise to copy, modify, sublicense or distribute the
+ Program is void, and will automatically terminate your rights
+ under this License. However, parties who have received copies, or
+ rights, from you under this License will not have their licenses
+ terminated so long as such parties remain in full
+ compliance.
+
+
+
+
+
+ Section 5
+
+ You are not required to accept this License, since you have
+ not signed it. However, nothing else grants you permission to
+ modify or distribute the Program or its derivative works. These
+ actions are prohibited by law if you do not accept this License.
+ Therefore, by modifying or distributing the Program (or any work
+ based on the Program), you indicate your acceptance of this
+ License to do so, and all its terms and conditions for copying,
+ distributing or modifying the Program or works based on it.
+
+
+
+
+
+ Section 6
+
+ Each time you redistribute the Program (or any work based on
+ the Program), the recipient automatically receives a license from
+ the original licensor to copy, distribute or modify the Program
+ subject to these terms and conditions. You may not impose any
+ further restrictions on the recipients' exercise of the rights
+ granted herein. You are not responsible for enforcing compliance
+ by third parties to this License.
+
+
+
+
+
+ Section 7
+
+ If, as a consequence of a court judgment or allegation of
+ patent infringement or for any other reason (not limited to patent
+ issues), conditions are imposed on you (whether by court order,
+ agreement or otherwise) that contradict the conditions of this
+ License, they do not excuse you from the conditions of this
+ License. If you cannot distribute so as to satisfy simultaneously
+ your obligations under this License and any other pertinent
+ obligations, then as a consequence you may not distribute the
+ Program at all. For example, if a patent license would not permit
+ royalty-free redistribution of the Program by all those who
+ receive copies directly or indirectly through you, then the only
+ way you could satisfy both it and this License would be to refrain
+ entirely from distribution of the Program.
+
+ If any portion of this section is held invalid or
+ unenforceable under any particular circumstance, the balance of
+ the section is intended to apply and the section as a whole is
+ intended to apply in other circumstances.
+
+ It is not the purpose of this section to induce you to
+ infringe any patents or other property right claims or to contest
+ validity of any such claims; this section has the sole purpose of
+ protecting the integrity of the free software distribution system,
+ which is implemented by public license practices. Many people
+ have made generous contributions to the wide range of software
+ distributed through that system in reliance on consistent
+ application of that system; it is up to the author/donor to decide
+ if he or she is willing to distribute software through any other
+ system and a licensee cannot impose that choice.
+
+ This section is intended to make thoroughly clear what is
+ believed to be a consequence of the rest of this License.
+
+
+
+
+
+ Section 8
+
+ If the distribution and/or use of the Program is restricted
+ in certain countries either by patents or by copyrighted
+ interfaces, the original copyright holder who places the Program
+ under this License may add an explicit geographical distribution
+ limitation excluding those countries, so that distribution is
+ permitted only in or among countries not thus excluded. In such
+ case, this License incorporates the limitation as if written in
+ the body of this License.
+
+
+
+
+
+ Section 9
+
+ The Free Software Foundation may publish revised and/or new
+ versions of the General Public License from time to time. Such
+ new versions will be similar in spirit to the present version, but
+ may differ in detail to address new problems or concerns.
+
+ Each version is given a distinguishing version number. If
+ the Program specifies a version number of this License which
+ applies to it and any later version
, you have the
+ option of following the terms and conditions either of that
+ version or of any later version published by the Free Software
+ Foundation. If the Program does not specify a version number of
+ this License, you may choose any version ever published by the
+ Free Software Foundation.
+
+
+
+
+
+ Section 10
+
+ If you wish to incorporate parts of the Program into other
+ free programs whose distribution conditions are different, write
+ to the author to ask for permission. For software which is
+ copyrighted by the Free Software Foundation, write to the Free
+ Software Foundation; we sometimes make exceptions for this. Our
+ decision will be guided by the two goals of preserving the free
+ status of all derivatives of our free software and of promoting
+ the sharing and reuse of software generally.
+
+
+
+
+
+ NO WARRANTY
+ Section 11
+
+ BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO
+ WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE
+ LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
+ HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM AS IS
WITHOUT
+ WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT
+ NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
+ FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE
+ QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
+ PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY
+ SERVICING, REPAIR OR CORRECTION.
+
+
+
+
+
+ Section 12
+
+ IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO
+ IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY
+ MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE
+ LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL,
+ INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR
+ INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
+ DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU
+ OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY
+ OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN
+ ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
+
+ End of Terms and Conditions.
+
+
+
+
+
+
+
+ How to Apply These Terms to Your New Programs
+
+ If you develop a new program, and you want it to be of
+ the greatest possible use to the public, the best way to
+ achieve this is to make it free software which everyone can
+ redistribute and change under these terms.
+
+ To do so, attach the following notices to the program.
+ It is safest to attach them to the start of each source file
+ to most effectively convey the exclusion of warranty; and each
+ file should have at least the copyright
line
+ and a pointer to where the full notice is found.
+
+
+<one line to give the program's name and a brief idea of what it does.>
+Copyright (C) 19yy <name of author>
+
+This program is free software; you can redistribute it and/or modify
+it under the terms of the GNU General Public License as published by
+the Free Software Foundation; either version 2 of the License, or
+(at your option) any later version.
+
+This program is distributed in the hope that it will be useful,
+but WITHOUT ANY WARRANTY; without even the implied warranty of
+MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+GNU General Public License for more details.
+
+You should have received a copy of the GNU General Public License
+along with this program; if not, write to the Free Software
+Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
+
+
+ Also add information on how to contact you by electronic
+ and paper mail.
+
+ If the program is interactive, make it output a short
+ notice like this when it starts in an interactive mode:
+
+
+Gnomovision version 69, Copyright (C) 19yy name of author
+Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
+This is free software, and you are welcome to redistribute it
+under certain conditions; type `show c' for details.
+
+
+ The hypothetical commands `show w' and `show c' should
+ show the appropriate parts of the General Public License. Of
+ course, the commands you use may be called something other
+ than `show w' and `show c'; they could even be mouse-clicks or
+ menu items–whatever suits your program.
+
+ You should also get your employer (if you work as a
+ programmer) or your school, if any, to sign a copyright
+ disclaimer
for the program, if necessary. Here is a
+ sample; alter the names:
+
+
+Yoyodyne, Inc., hereby disclaims all copyright interest in the program
+`Gnomovision' (which makes passes at compilers) written by James Hacker.
+
+<signature of Ty Coon>, 1 April 1989
+Ty Coon, President of Vice
+
+
+ This General Public License does not permit
+ incorporating your program into proprietary programs. If your
+ program is a subroutine library, you may consider it more
+ useful to permit linking proprietary applications with the
+ library. If this is what you want to do, use the GNU Library
+ General Public License instead of this License.
+
+
+
+
diff --git a/Manuals/Howto-dialup/Preface.docbook b/Manuals/Howto-dialup/Preface.docbook
new file mode 100755
index 0000000..7eca40b
--- /dev/null
+++ b/Manuals/Howto-dialup/Preface.docbook
@@ -0,0 +1,40 @@
+
+
+ Preface
+
+
+ Welcome to &TCPIUG;, the official documentation of &TCPI;.
+
+
+
+ This book describes how &TCPI; is organized and the guidelines
+ both users and administrators should follow to make use of it.
+ If you need to know what the technical and political desitions
+ behind &TCP; are, this book is definitly for you.
+
+
+
+ To make the information in this book managable, it has been
+ organized in the following parts:
+
+
+
+
+
+ organizes the licenses mentioned
+ in this book.
+
+
+
+
+
+ This book is oriented to system administrators and assumes you
+ have a basic understanding of &TCD;. If you need help with
+ it, go to the Help page inside
+ &TCWIKI; for or a list of different places you can find help.
+
+
+ &preface-overview;
+
+
diff --git a/Manuals/Howto-dialup/Preface.ent b/Manuals/Howto-dialup/Preface.ent
new file mode 100755
index 0000000..41f09f0
--- /dev/null
+++ b/Manuals/Howto-dialup/Preface.ent
@@ -0,0 +1,2 @@
+
+
diff --git a/Manuals/Howto-dialup/Preface/overview.docbook b/Manuals/Howto-dialup/Preface/overview.docbook
new file mode 100755
index 0000000..1ef0ded
--- /dev/null
+++ b/Manuals/Howto-dialup/Preface/overview.docbook
@@ -0,0 +1,9 @@
+
+
+ Overview
+
+
+ ...
+
+
+
diff --git a/Manuals/Howto-dialup/tcpi-ug.docbook b/Manuals/Howto-dialup/tcpi-ug.docbook
new file mode 100755
index 0000000..f2b634b
--- /dev/null
+++ b/Manuals/Howto-dialup/tcpi-ug.docbook
@@ -0,0 +1,80 @@
+
+
+
+
+
+
+
+%Commons.ent;
+%Preface.ent;
+%Administration.ent;
+%Configurations.ent;
+%Licenses.ent;
+]>
+
+
+
+
+ The CentOS Project Infrastructure
+ User's Guide
+
+
+
+ Alain
+ Reguera Delgado
+
+
+
+
+ 2011
+ &TCP;. All rights reserved.
+
+
+
+
+ Permission is granted to copy, distribute and/or modify
+ this document under the terms of the GNU Free
+ Documentation License, Version 1.2 or any later version
+ published by the Free Software Foundation; with no
+ Invariant Sections, no Front-Cover Texts, and no
+ Back-Cover Texts. A copy of the license is included in
+ .
+
+
+
+
+
+ 1.0
+ Today
+
+ Alain
+ Reguera Delgado
+
+
+
+ Under development.
+
+
+
+
+
+
+
+
+ &preface;
+
+
+ &administration;
+ &configurations;
+
+
+ &licenses;
+
+
diff --git a/Manuals/Tcpi-ug/Administration.docbook b/Manuals/Tcpi-ug/Administration.docbook
deleted file mode 100755
index a16f3df..0000000
--- a/Manuals/Tcpi-ug/Administration.docbook
+++ /dev/null
@@ -1,13 +0,0 @@
-
-
- Administration
-
-
-
- ...
-
-
-
- &administration-mail;
-
-
diff --git a/Manuals/Tcpi-ug/Administration.ent b/Manuals/Tcpi-ug/Administration.ent
deleted file mode 100644
index 8feac9d..0000000
--- a/Manuals/Tcpi-ug/Administration.ent
+++ /dev/null
@@ -1,2 +0,0 @@
-
-
diff --git a/Manuals/Tcpi-ug/Administration/Mail.docbook b/Manuals/Tcpi-ug/Administration/Mail.docbook
deleted file mode 100644
index 04b9c1d..0000000
--- a/Manuals/Tcpi-ug/Administration/Mail.docbook
+++ /dev/null
@@ -1,9 +0,0 @@
-
-
- Mail Server Administration
-
-
- ...
-
-
-
diff --git a/Manuals/Tcpi-ug/Commons.ent b/Manuals/Tcpi-ug/Commons.ent
deleted file mode 100755
index f5bcdd1..0000000
--- a/Manuals/Tcpi-ug/Commons.ent
+++ /dev/null
@@ -1,23 +0,0 @@
-
-
-
-
-
-
-&TC; Project">
-
-
-&TC; Mirrors">
-&TC; Wiki">
-
-
-
-
-The CentOS Artwork Repository">
-&TCPI; User's Guide">
diff --git a/Manuals/Tcpi-ug/Configurations.docbook b/Manuals/Tcpi-ug/Configurations.docbook
deleted file mode 100755
index f470587..0000000
--- a/Manuals/Tcpi-ug/Configurations.docbook
+++ /dev/null
@@ -1,20 +0,0 @@
-
-
- Configurations
-
-
-
- This part of the book discusses the configuration of specific
- infrastructures that may or may not be included inside &TCPI;.
- Each configuration described here is oriented to satisfy
- specific practical situations in a step-by-step fashion, so it
- can be implemented as straightforward as possible. The
- packages and documentation references related to each
- configuration are also mentioned so you can get deeper on each
- topic in case you need so.
-
-
-
- &configurations-dialup;
-
-
diff --git a/Manuals/Tcpi-ug/Configurations.ent b/Manuals/Tcpi-ug/Configurations.ent
deleted file mode 100755
index 410c988..0000000
--- a/Manuals/Tcpi-ug/Configurations.ent
+++ /dev/null
@@ -1,7 +0,0 @@
-
-
-
-
-
-
-
diff --git a/Manuals/Tcpi-ug/Configurations/Dialup.docbook b/Manuals/Tcpi-ug/Configurations/Dialup.docbook
deleted file mode 100644
index b336433..0000000
--- a/Manuals/Tcpi-ug/Configurations/Dialup.docbook
+++ /dev/null
@@ -1,11 +0,0 @@
-
-
- IP Through Telephone Line
-
- &configurations-dialup-intro;
- &configurations-dialup-usage;
- &configurations-dialup-modem;
- &configurations-dialup-server;
- &configurations-dialup-client;
-
-
diff --git a/Manuals/Tcpi-ug/Configurations/Dialup/client.docbook b/Manuals/Tcpi-ug/Configurations/Dialup/client.docbook
deleted file mode 100644
index 894c293..0000000
--- a/Manuals/Tcpi-ug/Configurations/Dialup/client.docbook
+++ /dev/null
@@ -1,97 +0,0 @@
-
-
- The Client Computer
-
-
- Installing Client Computer
-
- ...
-
-
-
-
- Configuring Client Computer
-
-
- ...
-
-
-
- Establishing Dial-Up Connection
-
-
- To establish connection from the client computer to the server
- computer you should configure the client computer to dial-up
- the server computer, using the following information:
-
-
-
- ISP Name: server.example.com
-ISP Phone: +53043515094
- Username: client.example.com
- Password: mail4u
-
-
-
- To estabalish a dial-up connection from the client computer to
- the server computer, you need to determine the modem location
- assigned by the operating system, so you can instruct
- applications like system-config-network the
- correct device they will to talk to. This configuration
- process has been greatly simplified by the
- wvdialconf command distributed with the
- wvdial
- package. To do this, run the following command and pay
- attention to the three last lines of its output:
-
-
- wvdialconf /etc/wvdial.conf
-
-
-Scanning your serial ports for a modem.
-
-ttyS0<*1>: ATQ0 V1 E1 -- failed with 2400 baud, next try: 9600 baud
-ttyS0<*1>: ATQ0 V1 E1 -- failed with 9600 baud, next try: 115200 baud
-ttyS0<*1>: ATQ0 V1 E1 -- and failed too at 115200, giving up.
-Port Scan<*1>: S1 S2 S3
-WvModem<*1>: Cannot get information for serial port.
-ttyACM0<*1>: ATQ0 V1 E1 -- OK
-ttyACM0<*1>: ATQ0 V1 E1 Z -- OK
-ttyACM0<*1>: ATQ0 V1 E1 S0=0 -- OK
-ttyACM0<*1>: ATQ0 V1 E1 S0=0 &C1 -- OK
-ttyACM0<*1>: ATQ0 V1 E1 S0=0 &C1 &D2 -- OK
-ttyACM0<*1>: ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0 -- OK
-ttyACM0<*1>: Modem Identifier: ATI -- LT V.90 1.0 MT5634ZBA-USB
-Data/Fax Modem (Dual Config) Version 5.18e
-ttyACM0<*1>: Speed 4800: AT -- OK
-ttyACM0<*1>: Speed 9600: AT -- OK
-ttyACM0<*1>: Speed 19200: AT -- OK
-ttyACM0<*1>: Speed 38400: AT -- OK
-ttyACM0<*1>: Speed 57600: AT -- OK
-ttyACM0<*1>: Speed 115200: AT -- OK
-ttyACM0<*1>: Speed 230400: AT -- OK
-ttyACM0<*1>: Speed 460800: AT -- OK
-ttyACM0<*1>: Max speed is 460800; that should be safe.
-ttyACM0<*1>: ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0 -- OK
-
-Found an USB modem on /dev/ttyACM0.
-Modem configuration written to /etc/wvdial.conf.
-ttyACM0<Info>: Speed 460800; init "ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0"
-
-
-
- Now, using this information, configure a Modem connection
- using the interface provided by
- system-config-network command. Take care of
- replacing the /dev/modem device name by
- that one found by wvdialconf. At this
- point, you can use the button Activate from
- system-config-network to establish the
- Modem connection you just configured.
-
-
-
-
-
-
-
diff --git a/Manuals/Tcpi-ug/Configurations/Dialup/intro.docbook b/Manuals/Tcpi-ug/Configurations/Dialup/intro.docbook
deleted file mode 100644
index cad9a6a..0000000
--- a/Manuals/Tcpi-ug/Configurations/Dialup/intro.docbook
+++ /dev/null
@@ -1,24 +0,0 @@
-
-
- Introduction
-
-
- This chapter describes two computers configuration, one acting
- as server and other as client. The server computer will be
- configured to provide internet services and the client to make
- use of those internet services provided by the server
- computer. The connection medium both client and server
- computer use is the telelphone line (i.e., the same medium you
- use to realize phone calls). In this configuration, both
- client and server computers use special devices named
- Modems
to transmit data in form of sound across
- the telephone line.
-
-
-
- The configuration described in this chapter could be a good
- choise when the only communication medium you have access to
- is a telephone network.
-
-
-
diff --git a/Manuals/Tcpi-ug/Configurations/Dialup/modem.docbook b/Manuals/Tcpi-ug/Configurations/Dialup/modem.docbook
deleted file mode 100644
index fcbc030..0000000
--- a/Manuals/Tcpi-ug/Configurations/Dialup/modem.docbook
+++ /dev/null
@@ -1,68 +0,0 @@
-
-
- The Modem Hardware
-
-
- In order to establish a PPP link between two computers using
- the telephone line as medium for data transmission, you need
- to install (at least) one modem device in each computer.
-
-
-
- To install a modem device in computer you need to attach the
- modem hardware to the computer and later the telephone line to
- the modem hardware. To connect the modem to your computer, you
- need to connect the serial or USB cable that comes from the
- modem hardware to the appropriate input on your computer. To
- connect the modem to the telephone line system, you need to
- unplug the cable that connects your telephone device and plug
- it on the modem device, specifically in the port reserved for
- data transmission. Later, using a similar cable, you could
- connect your telephone device to the modem's telephone port,
- so you can realize telephone calls when no data transmition
- take place.
-
-
-
- To be on the safe side, do all the installation with the
- computer turned off. Then, when everthing has been put in
- place, turn it on. Once the system is up, you can verify the
- modem hardware using either the lsusb or
- lspci commands. These commands need to be
- run with administrative privileges, so probably need to
- sudo them or login as root user in order to execute
- thme. For example, assuming you are logged in as root user,
- and you are using an USB modem like that one we mentioned
- before, the output of lsusb command would
- look like the following:
-
-
-
-Bus 003 Device 001: ID 0000:0000
-Bus 001 Device 001: ID 0000:0000
-Bus 001 Device 002: ID 058f:6366 Alcor Micro Corp. Multi Flash Reader
-Bus 002 Device 001: ID 0000:0000
-Bus 005 Device 003: ID 06e0:f104 Multi-Tech Systems, Inc.
-MT5634ZBA-USB MultiModemUSB (new firmware)
-Bus 005 Device 001: ID 0000:0000
-Bus 005 Device 002: ID 046d:c018 Logitech, Inc. Optical Wheel Mouse
-Bus 004 Device 001: ID 0000:0000
-
-
-
- The relevant line here is that mentioning the existence of a
- Multi-Tech System, Inc. MT5634ZBA-USB MultiModemUSB (new
- firmware)
device. If the modem you installed doesn't
- appear in this list, it is probably because such hardware is
- not supported by &TCD;, yet.
-
-
-
- At this point, everything is ready for you to install and
- configure the computer either as server (see ) or client (see
- ).
-
-
-
diff --git a/Manuals/Tcpi-ug/Configurations/Dialup/server.docbook b/Manuals/Tcpi-ug/Configurations/Dialup/server.docbook
deleted file mode 100644
index 37042fe..0000000
--- a/Manuals/Tcpi-ug/Configurations/Dialup/server.docbook
+++ /dev/null
@@ -1,789 +0,0 @@
-
-
- The Server Computer
-
-
- Installing Server Computer
-
-
- Start with a minimal installation of &TCD;, bootup the
- operating system, and login as root user.
-
-
-
- Installing Ppp Server
-
- The ppp server provides the software required to establish and
- maintain a PPP link with another system and negociate Internet
- Protocol addresses for each end of the link.
-
-
- yum install ppp
-
-
-
-
- Installing Name Server
-
- The name server provides the software required to translate
- domain names into IP address and IP addresses into domain
- names. With this software you can rembember addresses like
- instead of
- addresses like . There
- are other feautres (e.g., mail exchanger resolution, zone
- delegation, etc.) provided by this software that aren't used
- in the point-to-point configuration we describe in this
- chapter.
-
- yum install bind
-
-
- There is a bind-chroot packages, however,
- we aren't using it because SELinux is already enforced on the
- &TCD; filesystem and it provides far more security than the
- idea of bind-chroot package itself does.
-
-
-
-
-
- Installing Mail Server
-
- The mail server provides the software required to let you
- send/receive mail messages to/from others. The mail server
- is splitted in three basic components: The Mail Transfer Agent
- (MTA), The Mail Delivery Agent (MDA) and an intermediary
- daemon named saslauthd
- to handle user authentication. The MTA is the program your
- mail client sends mail messages to. The MDA, on the other
- hand, is the program your mail client reads mail message
- from (i.e., this is the program that let you access your
- mailbox). The saslauthd daemon is used by the MDA to
- authenticate user's credentials (e.g., the information that
- let you access an specific mailbox) and by the MTA to
- authenticate users before sending mail to it, however, in the
- configuration we are implementing, the MTA doesn't require
- that you authenticate to it in order to send mails through
- it. The MTA will listen on all network interfaces it is
- attached to and will receive mail sent to example.com domain name or
- server.example.com host
- name).
-
-
- yum install postfix cyrus-{imapd{,-utils},sasl{,-ldap,-md5,-plain}}
-
-
- By default, the sendmail
- program is used as mail transfer agent, not postfix. For the
- sake of that point-to-point configuration we are implementing,
- I decided to use postfix instead as default mail transfer
- agent, not sendmail. To effectively achieve this decition, it
- is required to use the alternatives
- command, as it shown below:
-
-
- alternatives --config mta
-
-
- This command will present you a menu to chose between
- available mail transfer agents, so it is there where you
- choose to use posfix as default option. Now that you've
- changed postfix the default mail transfer agent, you can
- saftly remove the sendmail package to avoid unused software
- to remain inside the computer. To do this, you can run the
- following command:
-
-
- yum remove sendmail
-
-
- In addition to mail server specific packages, we also provide
- mailing list support. Mailing lists provide mail addresses
- that users registered inside the ISP can write to. When you
- sed an mail to a mailing list, your message is distributed to
- all members of that list. In order for this to happen, people
- registered inside ISP need to subscribe themselves into that
- mailing list they want to receive messages from. The
- subscription of mailinglist will be available through a secured
- web application in the following url:
-
-
-
-
-
-
-
-
-
-
- yum install mailman
-
-
-
- Installing Web Server
-
- The web server provides the software required to support web
- interfaces like those one previously mention to register new
- users inside the ISP and subscribe mailing lists. The web
- server provided in this configuration will accept requests
- both unencrypted and encrypted.
-
-
- yum install httpd mod_ssl crypto-utils
-
-
- In addition to mailing lists support, the web server will
- provide access to Subversion. Subvesion provides a way to
- manage files through version control. The main purpose of
- providing Subversion support here is sharing the version of
- &TCAR; I've been working on.
-
-
- yum install subversion mod_dav_svn
-
-
-
-
-
- Installing Directory Server
-
-
- The directory server provides the software required to unify
- user information. This server is access by other server
- whenever user information is required. You, as end user, can
- also use this server from your workstation to retrive a list
- of all users registered in the ISP. This list can be retrived
- by the web interface the ISP provides, or any application your
- workstation provide (e.g., most mail clients provide a way
- to configure LDAP servers to build address book from it.).
-
-
- yum openldap-servers python-ldap
-
-
-
-
-
- Configuring Server Computer
-
- Once all required packages have been installed inside the
- server computer, it is time to configure them. This section
- describes how to configure the server computer to provide a
- public mail system.
-
-
-
- Configuring Network Internface
-
-
- /etc/sysconfig/network-scripts/ifcfg-eth0
-
-
-# Please read /usr/share/doc/initscripts-*/sysconfig.txt
-# for the documentation of these parameters.
-TYPE=Ethernet
-DEVICE=eth0
-HWADDR=00:1c:c0:f0:aa:05
-BOOTPROTO=none
-NETMASK=255.255.255.0
-IPADDR=192.168.0.1
-ONBOOT=yes
-USERCTL=no
-IPV6INIT=no
-PEERDNS=yes
-
-
-
-
-
-
-
- Configuring Ppp Server
-
- This configuration specifies the way the server computer will
- handle incoming dial-up connections.
-
-
-
- /etc/ppp/options
-
-
-# Enforce the use of the hostname as the name of the local system for
-# authentication purposes (overrides the name option).
-usehostname
-
-# Specify which DNS Servers the incoming Win95 or WinNT Connection
-# should use Two Servers can be remotely configured
-ms-dns 192.168.0.1
-
-# Increase debugging level (same as -d). The debug output is written
-# to syslog LOG_LOCAL2.
-debug
-
-# Require the peer to authenticate itself before allowing network
-# packets to be sent or received. Please do not disable this setting.
-# It is expected to be standard in future releases of pppd. Use the
-# call option (see manpage) to disable authentication for specific
-# peers.
-#auth
-
-# Use hardware flow control (i.e. RTS/CTS) to control the flow of data
-# on the serial port.
-crtscts
-
-# Specifies that pppd should use a UUCP-style lock on the serial
-# device to ensure exclusive access to the device.
-lock
-
-# Use the modem control lines.
-modem
-
-# async character map -- 32-bit hex; each bit is a character that
-# needs to be escaped for pppd to receive it. 0x00000001 represents
-# '\x01', and 0x80000000 represents '\x1f'. To allow pppd to work
-# over a rlogin/telnet connection, ou should escape XON (^Q), XOFF
-# (^S) and ^]: (The peer should use "escape ff".)
-#asyncmap 200a0000
-asyncmap 0
-
-# Set the interface netmask to <n>, a 32 bit netmask in "decimal dot"
-# notation (e.g. 255.255.255.0).
-netmask 255.255.255.0
-
-# Don't fork to become a background process (otherwise pppd will do so
-# if a serial device is specified).
-nodetach
-
-# Set the assumed name of the remote system for authentication
-# purposes to <n>.
-remotename client
-
-# If this option is given, pppd will send an LCP echo-request frame to
-# the peer every n seconds. Under Linux, the echo-request is sent when
-# no packets have been received from the peer for n seconds. Normally
-# the peer should respond to the echo-request by sending an
-# echo-reply. This option can be used with the lcp-echo-failure
-# option to detect that the peer is no longer connected.
-lcp-echo-interval 30
-
-# If this option is given, pppd will presume the peer to be dead if n
-# LCP echo-requests are sent without receiving a valid LCP echo-reply.
-# If this happens, pppd will terminate the connection. Use of this
-# option requires a non-zero value for the lcp-echo-interval
-# parameter. This option can be used to enable pppd to terminate
-# after the physical connection has been broken (e.g., the modem has
-# hung up) in situations where no hardware modem control lines are
-# available.
-lcp-echo-failure 4
-
-# Specifies that pppd should disconnect if the link is idle for n
-# seconds.
-idle 60
-
-
-
-
-
- /etc/ppp/cha-secrets
- /etc/ppp/pap-secrets
-
-
-# client server secret IP addresses
-
-# Specify the client configuration. This is when this manchine calls
-# someone's else machine and tries to establish a point-to-point
-# connection. Most of this configuration is handled by the
-# `system-config-network' utility.
-#
-####### redhat-config-network will overwrite this part!!! (begin) ##########
-####### redhat-config-network will overwrite this part!!! (end) ############
-
-# Specify the server configuration. This is when someone's else
-# machine calls this machine trying to establish a point-to-point
-# connection. This part of the configuration isn't handled by
-# `system-config-network' utility. To prenvent this configuration to
-# be lost the next time the `system-config-network' utility be used,
-# be sure to have this configuration backed up somewhere so it can be
-# resotred in such situations.
-#
-client server mail4u 192.168.0.2
-server client mail4u 192.168.0.1
-
-
-
-
-
-
- To make the modem respond to calls ...
-
-
- pppd /dev/ttyACM0
-
-
-
-
- Configuring Name Server
-
-
-
- /etc/named.conf
-
-
-# BIND DNS server 'named' configuration file for the Red Hat BIND
-# distribution. This file was initially taken from
-# `/usr/share/doc/bind-*/samples/named.conf' file and modified to fit
-# this server's needs.
-#
-# This machine exists to develop The CentOS Project Corporate Identity
-# through The CentOS Artwork Repository. Presently, this machine is
-# isolated from Internet. However, a modem has been attached[1] and
-# configured so people can establish point-to-point connections to
-# this machine and download working copies of The CentOS Artwork
-# Repository and help me to develop it.
-#
-# In this configuration there are only two IP addresses involved. The
-# one used in this server (192.168.0.1) and another for the client who
-# realize the point-to-point connection (192.168.0.2). This server is
-# named `server.example.com' and the client `client.example.com' or
-# something similar.
-# --------------------------------------------------------------------
-# See the BIND Administrator's Reference Manual (ARM) for details, in:
-# file:///usr/share/doc/bind-*/arm/Bv9ARM.html
-#
-# Also see the BIND Configuration GUI:
-# /usr/bin/system-config-bind and its manual.
-# --------------------------------------------------------------------
-
-options {
-
- # Those options should be used carefully because they disable port
- # randomization.
- // query-source port 53;
- // query-source-v6 port 53;
-
- # Put files that named is allowed to write in the data/ directory:
- directory "/var/named"; // the default
- dump-file "data/cache_dump.db";
- statistics-file "data/named_stats.txt";
- memstatistics-file "data/named_mem_stats.txt";
-};
-
-logging {
-
- # If you want to enable debugging, eg. using the 'rndc trace'
- # command, named will try to write the 'named.run' file in the
- # $directory (/var/named). By default, SELinux policy does not
- # allow named to modify the /var/named directory, so put the
- # default debug log file in data/ :
- channel default_debug {
- file "data/named.run" versions 5 size 20m;
- severity dynamic;
- };
-};
-
-# All BIND 9 zones are in a "view", which allow different zones to be
-# served to different types of client addresses, and for options to be
-# set for groups of zones. By default, if named.conf contains no
-# "view" clauses, all zones are in the "default" view, which matches
-# all clients. If named.conf contains any "view" clause, then all
-# zones MUST be in a view; so it is recommended to start off using
-# views to avoid having to restructure your configuration files in the
-# future.
-
-view "internal" {
-
- # This view will contain zones you want to serve only to
- # "internal" clients that connect via your directly attached LAN
- # interfaces - "localnets".
- match-clients { 192.168.0/24; };
- match-destinations { 192.168.0/24; };
- recursion no;
-
- # All views must contain the root hints zone. However, since this
- # machine is disconnected from Internet it is not possible for it
- # to reach root servers. So, this line is commented based that no
- # recursion is performed here.
- //include "named.rfc1912.zones";
-
- # These are your "authoritative" internal zones, and would
- # probably also be included in the "localhost_resolver" view
- # above:
- zone "example.com" IN {
- type master;
- file "example.com.zone";
- allow-update { none; };
- };
-
- zone "0.168.192.in-addr.arpa" IN {
- type master;
- file "example.com.rr.zone";
- allow-update { none; };
- };
-};
-
-# The localhost_resolver is already configured in `/etc/hosts' and set
-# as first choise in `/etc/hosts.conf' file. However, if you change
-# the order in `/etc/hosts.conf' file to make bind the first choise,
-# then you need to include here the localhost_resolver in order to
-# resolve localhost (127.0.0.1) address.
-
-key "rndckey" {
- algorithm hmac-md5;
- secret "JjsCg0VcCjZILGD8FR9nnw==";
-};
-
-controls {
- inet 127.0.0.1 port 953
- allow { 127.0.0.1; } keys { "rndckey"; };
-};
-
-
-
-
-
- /var/named/example.com.zone
-
-
-$ORIGIN example.com.
-$TTL 86400
-@ IN SOA example.com. hostmaster.example.com. (
- 2011100404 ; serial (d. adams)
- 3H ; refresh
- 15M ; retry
- 1W ; expiry
- 1D ) ; minimum
-
- IN NS dns.example.com.
- IN MX 10 mail.example.com.
-
-server IN A 192.168.0.1
-client IN A 192.168.0.2
-
-dns IN CNAME server
-mail IN CNAME server
-www IN CNAME server
-
-
-
-
-
- /var/named/example.com.rr.zone
-
-
-$ORIGIN 0.168.192.in-addr.arpa.
-$TTL 86400
-@ IN SOA example.com. hostmaster.example.com. (
- 2011100405 ; serial (d. adams)
- 3H ; refresh
- 15M ; retry
- 1W ; expiry
- 1D ) ; minimum
-
- IN NS 192.168.0.1
-
-1 IN PTR server.example.com.
-2 IN PTR client.example.com.
-
-
-
-
-
- /etc/rndc.conf
-
-
-include "/etc/rndc.key";
-options {
- default-key "rndckey";
- default-server 127.0.0.1;
- default-port 953;
-};
-
-
-
-
-
- /etc/rndc.key
-
-
-key "rndckey" {
- algorithm hmac-md5;
- secret "JjsCg0VcCjZILGD8FR9nnw==";
-};
-
-
- When configuring rndc controls, don't use
- the same secret shown in the example above. If you do so, the
- secret information will not be a secret anymore (since we
- already used it here). Instead, use the
- rndc-genconf command to generate a new one,
- and be sure it be placed correctly both in
- /etc/rndc.conf and
- /etc/named.conf configuration files.
-
-
-
-
- /etc/resolv.conf
-
- nameserver 192.168.0.1
-
-
-
- /etc/host.conf
-
- order hosts,bind
-
-
-
-
-
- At this point you can start the named service and realize some
- tests to verify the named service is certainly working as
- expected. For example, consider the the following two
- commands:
-
-
-
-[root@server ~]# service named start
-Starting named: [ OK ]
-[root@server ~]# dig example.com mx
-
-; <<>> DiG 9.3.6-P1-RedHat-9.3.6-4.P1.el5_4.2 <<>> example.com mx
-;; global options: printcmd
-;; Got answer:
-;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 3540
-;; flags: qr aa rd; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 0
-
-;; QUESTION SECTION:
-;example.com. IN MX
-
-;; ANSWER SECTION:
-example.com. 86400 IN MX 10 mail.example.com.
-
-;; AUTHORITY SECTION:
-example.com. 86400 IN NS dns.example.com.
-
-;; Query time: 0 msec
-;; SERVER: 192.168.0.1#53(192.168.0.1)
-;; WHEN: Wed Oct 5 10:33:24 2011
-;; MSG SIZE rcvd: 67
-
-
-
- If everything is ok, configure the named service to start at
- boot time:
-
-
- chkconfig --level 345 named on
-
-
- If something goes wrong, look for named daemon entries inside the
- /var/log/messages file to know what is
- going on. When you are configuring the name server, it could
- result useful to you keeping an always visible terminal,
- running the following command on it:
-
-
- grep named /var/log/messages | tail -f -
-
-
-
-
- Configuring Mail Server (MTA)
-
- Based on default configuration provided by Postfix RPM inside
- &TCD; (release 5.5), look for the following options and leave
- the rest as is.
-
-
-
-
- /etc/postfix/main.cf
-
-
-myhostname = server.example.com
-mydomain = example.org
-inet_interfaces = $myhostname, localhost
-mynetworks = 192.168.0.0/24, 127.0.0.0/8
-mailbox_transport = lmtp:unix:/var/lib/imap/socket/lmtp
-local_destination_recipient_limit = 300
-local_destination_concurrency_limit = 5
-
-
-
-
-
-
-
-
- Configuring Mail Server (MDA)
-
-
- /etc/cyrus.conf
-
-
- Leave it as is. There is nothing to touch here for a small and
- basic configuration like that one we are implementing in this
- chapter.
-
-
-
-
- /etc/imapd.conf
-
-
- Leave it as is. There is nothing to touch here for a small and
- basic configuration like that one we are implementing in this
- chapter.
-
-
- The initial configuration of Cyrus IMAP server is set to use
- PLAIN authentication mechanisim (see
- option) against saslauthd daemon. This makes the
- password information to be vulnerable for man in the middle
- attacks. In order to protect the user authentication, you can
- use other authentication mechanisms like CRAM-MD5 or
- DIGEST-MD5 in the mail client in order to send the password
- information encrypted. Another solution would be to create an
- encrypted channel for communication between the e-email client
- and Cyrus IMAP server by mean of SSL encryption.
-
-
- When you use authentication mechanisms that encrypt user
- information before passing them to saslauthd daemon (e.g.,
- DIGETS-MD5), you are protecting your data in the mail
- client before passing it to saslauthd daemon. Therefore, when
- the saslauthd daemon
- tries to validate the credentials you passed in against PAM,
- it fails. At my personal understanding, this happens becase
- PAM must receive the user information as it was entered by the
- user (i.e., plainly, without any encryption) in order to
- realize the verification against the system default
- authentication database (e.g.,
- /etc/passwd,
- /etc/shadow), and saslauthd daemon is passing an
- encrypted version of the plain user information which
- obviously cannot match the hash produced by plain user
- information in first place.
-
-
-
- One alternative to the situation mentioned above could be to
- use PLAIN authentication mechanism over an SSL encrypted
- communication or excluding PAM mechanism from saslauthd
- daemon, and use LDAP mechanism instead. When LDAP mechanism
- is used as default authentication mechanism inside saslauthd
- daemon, it is possible for mail clients to send encrypted
- passwords to saslauthd daemon. In this configuration, the
- password stored in LDAP server must be encrypted using the
- same algorithm used to send the encrypted password from mail
- client to saslauthd daemon. Therefore, you need to force the
- user to use just one authentication mechanism, that one used
- to stored encrypted passwords inside the LDAP server.
- Otherwise, it would be very difficult to authenticate users
- that send passwords encrypted in a way different to that one
- stored in the LDAP server.
-
-
-
- Another configuration could be to keep mail clients using
- PLAIN authentication over an SSL connection against saslauthd
- daemon, and saslauthd using a PAM. But this time, PAM would be
- configured to extend its default system authentication by
- using an LDAP server. This way, it would be possible to
- isolate user accound administration and greatly control the
- kind of information a user might have. For example, the root
- user account would be in the system default authentication,
- however all service-specific user information would be in the
- LDAP server. This permits us to create a web application that
- interact with LDAP server in order to manage service-specific
- user information only avoiding any contant with system default
- authentication, the place where the root user is stored in. In
- this PAM configuration, the first match that fails means that
- the whole authentication process fails.
-
-
-
-
-
- /etc/pki/cyrus-imapd/cyrus-imapd.pem
-
-
- This file is a symbolic link to
- /etc/pki/tls/certs/cyrus-imapd.pem. This
- file contains a self-generated SSL certificate you probably
- want to update for setting your host name in the Common
- Name
field of it. To create this file use the
- following command:
-
- openssl req -new -x509 -nodes -out /etc/pki/tls/certs/cyrus-imapd.pem -keyout /etc/pki/tls/certs/cyrus-imapd.pem -days 365
-
-
-
-
-
-
- To initiate the Cyrus IMAP server, run the following command:
-
-
- service cyrus-imapd start
-
-
- In case something fails, look into the
- /var/log/maillog file, specifically those
- entries containing imap
, pop
,
- nntp
and cyrus
strings. It could be
- useful if, before initiating Cyrus IMAP server, you open a
- terminal and run the following command in it, just to see what
- is happening once Cyrus IMAP server is initiated:
-
-
- egrep '(cyrus|imap|pop)' /var/log/maillog | tail -f -
-
-
- Later, to test the STARTTLS
negociation, you can
- run the following command:
-
-
- imtest -t "" server.example.com
-
-
- To administer mailboxes inside Cyrus Imapd, set a password to
- cyrus user (e.g., passwd cyrus), do login
- with it, and connect to Cyrus IMAP server using the
- cyradm command, as shown below:
-
-
- cyradm --user=cyrus --auth=login localhost
-
-
-
-
- Configuring Mail Server (SASL)
-
- ...
-
-
-
-
- Configuring Web Server
-
- ...
-
-
-
-
- Configuring Directory Server
-
- ...
-
-
-
-
-
-
diff --git a/Manuals/Tcpi-ug/Configurations/Dialup/usage.docbook b/Manuals/Tcpi-ug/Configurations/Dialup/usage.docbook
deleted file mode 100644
index 62be0b9..0000000
--- a/Manuals/Tcpi-ug/Configurations/Dialup/usage.docbook
+++ /dev/null
@@ -1,290 +0,0 @@
-
-
- Usage Convenctions
-
-
- The infrastructure described in this chapter uses the
- client/server model to provide a public mail service through
- the telephone line. In this configuration, we (the poeple
- building the infrastructure) provide the information you (the
- person using the infrastructure) need to know in order to
- establish a point-to-point connection from the client computer
- to the server computer through the telephone line.
-
-
- The infrastructure described in this chapter is made available
- to you free of charge, however, you should know that
- maintaining it costs both money and time. For example, for
- each hour the server computer is on production there is an
- electrical consume that need to be paid every month.
- Likewise, each call that you establish from the client
- computer to the server computer will cost you money, based on
- the location you made the call from and the time you spend
- connected.
-
-
-
- In this section we discuss usage convenctions we all must be
- agree with, in order to achieve a practical and secure
- interchange system.
-
-
-
- Administering Dial-Up Connections
-
-
- The lifetime of dial-up connections must be limitted based on
- the number of users you expect to establish connection and the
- kind of services you plan to provide. The mail service
- provided by the server computer is conceived as a public
- service so anyone with a modem attached to a computer would be
- able to have access to it. However, due to hardware
- limitations, only 100 users will be allowed to be registered
- in the public mail service. Based on this information, the
- lifetime of established connections will be of 15 minutes from
- the established moment on. Once the connection has been
- established, if the link is idle for 1 minute, the server
- computer will close the established connection to free the
- telephone line. This control can be implemented through the
- and options
- inside the pppd's configuration
- file.
-
-
-
- Only registered user profiles will be able to establish connections
- to the server computer. This control can be implemented using
- the option in the
- pppd's configuration file to define a
- list of all telephone numbers that are allowed to establish
- connection with the server computer, based on the list of
- registered user profiles. By default, all telephone numbers
- are denied from establishing access with the server computer,
- except those ones explicitly set by
- option. If the
- option is not present in
- pppd's configuration file, all
- telephone numbers are allowed to establish connection with the
- server computer, so be sure to include the
- option in
- pppd's configuration file if you
- want to control who can/cannot establish connection with the
- server computer.
-
-
-
-##### centos-pppd-config will overwrite this part!!! (begin) #####
-allow-number 12345
-allow-number 21345
-allow-number 34567
-##### centos-pppd-config will overwrite this part!!! (end) #####
-
-
-
- The centos-pppd-admin application
- must be considered part of user profile registration process
- inside the server computer. The
- centos-pppd-admin application would
- be used to control the list of allowed telephone numbers
- inside the pppd's configuration
- file, based on the list of user profiles. The
- centos-pppd-admin application
- should be executed after any registration/deletion action
- against the list of user profiles with root privilages in order to be
- able of writing the settings on
- pppd's configuration file.
-
-
-
- Redialing consecutive connections from the same telephone
- number without any dealy between call retries must be avoided
- from client computers. This would reduce the possibilities for
- other client computers to establish connection with the server
- computer. To prevent this issue from happening, it would be
- necessary to provide more telephone lines than users
- authorized to establish connection with the server computer.
- Nevertheless, there is only one telephone line available for
- the server computer to use.
-
-
-
-
-
- Administering User Profiles
-
-
- In order for you to use any service provided by the server
- computer it is required that you register yourself inside the
- server computer creating a user profile. The user profile
- provides the user information required by services inside the
- server computer (e.g., username, password, e-mail address,
- telephone number, etc.). To register new user profiles, you
- need to use the web application provided by the server
- computer. For example, assuming the domain name of the server
- computer is example.com, the web
- application would be accessable through the following URL:
- .
-
-
-
- To reach the web interface, the first thing you need to do is
- establishing a dial-up connection to the server computer as
- described in . Once the
- dial-up connection has been established, you need to open a
- web browser (e.g., Firefox) and put the URL mentioned above in
- the address space, and press Enter to go. This will present
- you a web page with the instructions you need to follow in
- order to register your user profile. Other actions like
- updating or deleting your own user profile should be also
- possible from this web interface.
-
-
-
-
- The web interface used to manage user profiles inside the
- server computer must be presented over an encrypted session in
- order to protect all the information passing through.
-
-
-
-
- Inside the server computer, all related subsystems in need of
- user information (e.g., Postix, Cyrus-Imapd and Saslauthd)
- retrive user information from one single (LDAP) source. The
- web application provided by the server computer manages all
- these subsystems' configuration files in order to provide a
- pleasant experience for end users. The web interface must be
- as simple as possible in order to achieve all administration
- tasks in the range of time permitted by the server computer
- before it closes the connection established from the client
- computer.
-
-
-
- More information about the web interface you need to use to
- manage your user profile inside the server computer can be
- found in .
-
-
-
-
-
- Administering Services
-
-
- The information generated inside the server computer is
- isolated from Internet. This way, any information generated
- inside the server computer will be available only to people
- registered inside the server computer. For example, don't ever
- expect to send/receive e-mails to/from Internet e-mail
- accounts like Gmail or Yahoo, nor visiting web sites like
- Google or Wikipedia either. For
- this to happen, it is required an established connection
- between the server computer you are establishing connection
- through and the Internet network those services are available
- in. Without that link, it is not possible to direct your
- requests to those sites.
-
-
-
- The implementation of services that required persistent
- connections (e.g., chats) will not
- be considered as a practical offer inside the server computer.
- Instead, only asynchronous services (e.g.,
- e-mail) will be supported. This
- restriction is required to reduce the amount of time demanded
- by services. For example, consider an environment where you
- connect to the server computer for sending/receiving e-mails
- messages and then quickly disconnect from it to free the
- telephone line for others to use. In this environment, there
- is no need for you and other person to be both connected at
- the same time to send/receive e-mail messages to/from each
- other. The e-mails sent from other person to you will be
- available in your mailbox the next time you get connected to
- the server computer and use your e-mail client to send/receive
- e-mail messages. Likewise, you don't need to be connected to
- the server computer in order to write your e-mail messages.
- You can write down your messages off-line and then establish
- connection once you've finished writing, just to send them
- out and receive new messages that could have been probably
- sent to you.
-
-
-
- Another issue related to e-mail exchange is the protocol used
- to receive messages. Presently, there are two popular ways to
- do this, one is through IMAP and another through POP3. When
- you use IMAP protocol, e-mail messages are retained in the
- server computer and aren't downloaded to client computer.
- Otherwise, when you use POP3 protocol, e-mail messages are
- downloaded to the client computer and removed from server
- computer. Based on the resources we have and the kind of link
- used by the client computer to connect the server computer,
- using POP3 is rather prefered than IMAP. However both are made
- available.
-
-
-
- Assuming you use IMAP protocol to read your mailbox, be aware
- that you need to be connected to the server computer. Once
- the connection is lost you won't be able to read your messages
- (unless your e-mail client possesses a feature that let you
- reading messages off-line). Morover, you run the risk of
- getting your mailbox out of space. If your mailbox gets out of
- space, new messages sent to you will not be deliver to your
- mailbox. Instead, they will be deferred for a period of time
- (e.g., about 5 days when using
- Postfix defaults) hoping you to
- free the space in your mailbox to deliver them. If you don't
- free space within this period of time, the deferred e-mails
- will be bounced back to their senders and you will never see
- them. On the other hand, assuming you are using POP3 protocol
- to read your mailbox, you always keep your mailbox free to
- receive new e-mails messages and keep them for you until the
- next time you establish connection with the server computer
- and download them to your client computer using your e-mail
- client.
-
-
-
-
- Administering Disk Space
-
-
- The maximum number of registered user profiles is limited
- inside the server computer, based on the maximum disk space
- the server computer confines to such purpose. For example,
- consider an environment where users can get registered
- themselves using a web interface. In this case the web
- interface must know how much disk space is available before
- proceeding to register new mail accounts inside the server
- computer and this way preventing any disk writing when there
- isn't enough free space on disk to perform a new user
- registration. Considering the server computer has confined
- 1GB of disk space to handle the mail service (e.g., mail
- queues, mailboxes, etc.) and each user mailbox is 10MB, it
- will be possible to provide self-registration through the web
- interface for 100 users in total.
-
-
-
- Another measure related to save disk space might be to remove
- unused user accounts and their related files (e.g., mailboxes)
- from the server computer. For example, consider an environment
- where user accounts are automatically removed from the server
- computer when they don't establish a connection with the
- server computer in a period greater than 7 days since the last
- valid connection established to the server computer. Once the
- user account is removed, it is no longer functional of course,
- and the person whom lost the account will need to create a new
- one, assuming it want to have access to the mail service
- again.
-
-
-
-
-
diff --git a/Manuals/Tcpi-ug/Licenses.docbook b/Manuals/Tcpi-ug/Licenses.docbook
deleted file mode 100644
index dfc86ce..0000000
--- a/Manuals/Tcpi-ug/Licenses.docbook
+++ /dev/null
@@ -1,6 +0,0 @@
-
- Licenses
- &licenses-gpl;
- &licenses-gfdl;
-
-
diff --git a/Manuals/Tcpi-ug/Licenses.ent b/Manuals/Tcpi-ug/Licenses.ent
deleted file mode 100644
index 29e0b56..0000000
--- a/Manuals/Tcpi-ug/Licenses.ent
+++ /dev/null
@@ -1,3 +0,0 @@
-
-
-
diff --git a/Manuals/Tcpi-ug/Licenses/gfdl.docbook b/Manuals/Tcpi-ug/Licenses/gfdl.docbook
deleted file mode 100644
index 33f6e8c..0000000
--- a/Manuals/Tcpi-ug/Licenses/gfdl.docbook
+++ /dev/null
@@ -1,591 +0,0 @@
-
-
- GNU Free Documentation License
-
- Version 1.2, November 2002
-
- Copyright © 2000, 2001, 2002 Free Software Foundation,
- Inc. 675 Mass Ave, Cambridge, MA 02139, USA
-
- Everyone is permitted to copy and distribute verbatim copies
- of this license document, but changing it is not allowed.
-
-
-
- Preamble
-
- The purpose of this License is to make a manual,
- textbook, or other functional and useful document
- free
in the sense of freedom: to assure
- everyone the effective freedom to copy and redistribute it,
- with or without modifying it, either commercially or
- noncommercially. Secondarily, this License preserves for the
- author and publisher a way to get credit for their work, while
- not being considered responsible for modifications made by
- others.
-
- This License is a kind of copyleft
, which
- means that derivative works of the document must themselves be
- free in the same sense. It complements the , which is a copyleft license
- designed for free software.
-
- We have designed this License in order to use it for
- manuals for free software, because free software needs free
- documentation: a free program should come with manuals
- providing the same freedoms that the software does. But this
- License is not limited to software manuals; it can be used for
- any textual work, regardless of subject matter or whether it
- is published as a printed book. We recommend this License
- principally for works whose purpose is instruction or
- reference.
-
-
-
-
-
- Applicability and definitions
-
- This License applies to any manual or other work, in any
- medium, that contains a notice placed by the copyright holder
- saying it can be distributed under the terms of this License.
- Such a notice grants a world-wide, royalty-free license,
- unlimited in duration, to use that work under the conditions
- stated herein. The Document
, below, refers to
- any such manual or work. Any member of the public is a
- licensee, and is addressed as you
. You accept
- the license if you copy, modify or distribute the work in a
- way requiring permission under copyright law.
-
- A
- Modified Version
of the Document means any work
- containing the Document or a portion of it, either copied
- verbatim, or with modifications and/or translated into another
- language.
-
- A
- Secondary Section
is a named appendix or a
- front-matter section of the Document that deals exclusively
- with the relationship of the publishers or authors of the
- Document to the Document's overall subject (or to related
- matters) and contains nothing that could fall directly within
- that overall subject. (Thus, if the Document is in part a
- textbook of mathematics, a may not explain any mathematics.) The relationship could be
- a matter of historical connection with the subject or with
- related matters, or of legal, commercial, philosophical,
- ethical or political position regarding them.
-
- The Invariant Sections
are certain
- whose titles are
- designated, as being those of Invariant Sections, in the
- notice that says that the Document is released under this
- License. If a section does not fit the above definition of
- Secondary then it is not allowed to be designated as
- Invariant. The Document may contain zero Invariant Sections.
- If the Document does not identify any Invariant Section then
- there are none.
-
- The
- Cover Texts
are certain short passages of text
- that are listed, as Front-Cover Texts or Back-Cover Texts, in
- the notice that says that the Document is released under this
- License. A Front-Cover Text may be at most 5 words, and a
- Back-Cover Text may be at most 25 words.
-
- A
- Transparent
copy of the Document means a
- machine-readable copy, represented in a format whose
- specification is available to the general public, that is
- suitable for revising the document straightforwardly with
- generic text editors or (for images composed of pixels)
- generic paint programs or (for drawings) some widely available
- drawing editor, and that is suitable for input to text
- formatters or for automatic translation to a variety of
- formats suitable for input to text formatters. A copy made in
- an otherwise file format whose
- markup, or absence of markup, has been arranged to thwart or
- discourage subsequent modification by readers is not . An image format is not if used for any substantial amount of
- text. A copy that is not
is called Opaque
.
-
- Examples of suitable formats for copies
- include plain ASCII without markup, Texinfo input format,
- LaTeX input format, SGML or XML using a publicly available
- DTD, and standard-conforming simple HTML, PostScript or PDF
- designed for human modification. Examples of transparent
- image formats include PNG, XCF and JPG. Opaque formats
- include proprietary formats that can be read and edited only
- by proprietary word processors, SGML or XML for which the DTD
- and/or processing tools are not generally available, and the
- machine-generated HTML, PostScript or PDF produced by some
- word processors for output purposes only.
-
- The Title
- Page
means, for a printed book, the title page itself,
- plus such following pages as are needed to hold, legibly, the
- material this License requires to appear in the title page.
- For works in formats which do not have any title page as such,
- Title Page
means the text near the most
- prominent appearance of the work's title, preceding the
- beginning of the body of the text.
-
- A section Entitled XYZ
means a named
- subunit of the Document whose title either is precisely XYZ or
- contains XYZ in parentheses following text that translates XYZ
- in another language. (Here XYZ stands for a specific section
- name mentioned below, such as Acknowledgements
,
- Dedications
, Endorsements
, or
- History
.) To Preserve the Title
- of such a section when you modify the Document means that it
- remains a section Entitled XYZ
according to
- this definition.
-
- The Document may include Warranty Disclaimers next to
- the notice which states that this License applies to the
- Document. These Warranty Disclaimers are considered to be
- included by reference in this License, but only as regards
- disclaiming warranties: any other implication that these
- Warranty Disclaimers may have is void and has no effect on the
- meaning of this License.
-
-
-
-
-
- Verbatim copying
-
- You may copy and distribute the Document in any medium,
- either commercially or noncommercially, provided that this
- License, the copyright notices, and the license notice saying
- this License applies to the Document are reproduced in all
- copies, and that you add no other conditions whatsoever to
- those of this License. You may not use technical measures to
- obstruct or control the reading or further copying of the
- copies you make or distribute. However, you may accept
- compensation in exchange for copies. If you distribute a
- large enough number of copies you must also follow the
- conditions in section .
-
- You may also lend copies, under the same conditions
- stated above, and you may publicly display copies.
-
-
-
-
-
- Copying in quantity
-
- If you publish printed copies (or copies in media that
- commonly have printed covers) of the Document, numbering more
- than 100, and the Document's license notice requires Cover
- Texts, you must enclose the copies in covers that carry,
- clearly and legibly, all these :
- Front-Cover Texts on the front cover, and Back-Cover Texts on
- the back cover. Both covers must also clearly and legibly
- identify you as the publisher of these copies. The front
- cover must present the full title with all words of the title
- equally prominent and visible. You may add other material on
- the covers in addition. Copying with changes limited to the
- covers, as long as they preserve the title of the Document and
- satisfy these conditions, can be treated as verbatim copying
- in other respects.
-
- If the required texts for either cover are too
- voluminous to fit legibly, you should put the first ones
- listed (as many as fit reasonably) on the actual cover, and
- continue the rest onto adjacent pages.
-
- If you publish or distribute Opaque copies of the
- Document numbering more than 100, you must either include a
- machine-readable copy along with each Opaque copy,
- or state in or with each Opaque copy a computer-network
- location from which the general network-using public has
- access to download using public-standard network protocols a
- complete copy of the Document, free of added
- material. If you use the latter option, you must take
- reasonably prudent steps, when you begin distribution of
- Opaque copies in quantity, to ensure that this
- copy will remain thus accessible at the stated location until
- at least one year after the last time you distribute an Opaque
- copy (directly or through your agents or retailers) of that
- edition to the public.
-
- It is requested, but not required, that you contact the
- authors of the Document well before redistributing any large
- number of copies, to give them a chance to provide you with an
- updated version of the Document.
-
-
-
-
-
- Modifications
-
- You may copy and distribute a of the Document under the
- conditions of sections and above,
- provided that you release the under precisely this License, with the filling the role of the
- Document, thus licensing distribution and modification of the
- to whoever possesses a
- copy of it. In addition, you must do these things in the
- :
-
-
-
-
- Use in the (and on
- the covers, if any) a title distinct from that of the
- Document, and from those of previous versions (which
- should, if there were any, be listed in the History
- section of the Document). You may use the same title
- as a previous version if the original publisher of
- that version gives permission.
-
-
- List on the , as
- authors, one or more persons or entities responsible
- for authorship of the modifications in the , together with at least
- five of the principal authors of the Document (all of
- its principal authors, if it has fewer than five),
- unless they release you from this requirement.
-
-
-
- State on the the
- name of the publisher of the , as the
- publisher.
-
-
-
- Preserve all the copyright notices of the
- Document.
-
-
-
- Add an appropriate copyright notice for your
- modifications adjacent to the other copyright
- notices.
-
-
-
- Include, immediately after the copyright
- notices, a license notice giving the public permission
- to use the under the terms of this
- License, in the form shown in the Addendum
- below.
-
-
-
- Preserve in that license notice the full lists
- of and required
- given in the Document's
- license notice.
-
-
-
- Include an unaltered copy of this License.
-
-
-
- Preserve the section Entitled
- History
, Preserve its Title, and add to
- it an item stating at least the title, year, new
- authors, and publisher of the as given on the . If there is no section
- Entitled History
in the Document, create
- one stating the title, year, authors, and publisher of
- the Document as given on its , then add an item describing the as stated in the previous
- sentence.
-
-
-
- Preserve the network location, if any, given in
- the Document for public access to a copy of the Document, and
- likewise the network locations given in the Document
- for previous versions it was based on. These may be
- placed in the History
section. You may
- omit a network location for a work that was published
- at least four years before the Document itself, or if
- the original publisher of the version it refers to
- gives permission.
-
-
-
- For any section Entitled
- Acknowledgements
or
- Dedications
, Preserve the Title of the
- section, and preserve in the section all the substance
- and tone of each of the contributor acknowledgements
- and/or dedications given therein.
-
-
-
- Preserve all the of the Document,
- unaltered in their text and in their titles. Section
- numbers or the equivalent are not considered part of
- the section titles.
-
-
-
- Delete any section Entitled
- Endorsements
. Such a section may not
- be included in the .
-
-
-
- Do not retitle any existing section to be
- Entitled Endorsements
or to conflict in
- title with any .
-
-
- Preserve any Warranty Disclaimers.
-
-
-
-
- If the includes new
- front-matter sections or appendices that qualify as and contain no material copied
- from the Document, you may at your option designate some or
- all of these sections as invariant. To do this, add their
- titles to the list of in the 's license notice. These titles
- must be distinct from any other section titles.
-
- You may add a section Entitled
- Endorsements
, provided it contains nothing but
- endorsements of your by various
- parties–for example, statements of peer review or that
- the text has been approved by an organization as the
- authoritative definition of a standard.
-
- You may add a passage of up to five words as a
- Front-Cover Text, and a passage of up to 25 words as a
- Back-Cover Text, to the end of the list of in the . Only one passage of
- Front-Cover Text and one of Back-Cover Text may be added by
- (or through arrangements made by) any one entity. If the
- Document already includes a cover text for the same cover,
- previously added by you or by arrangement made by the same
- entity you are acting on behalf of, you may not add another;
- but you may replace the old one, on explicit permission from
- the previous publisher that added the old one.
-
- The author(s) and publisher(s) of the Document do not by
- this License give permission to use their names for publicity
- for or to assert or imply endorsement of any .
-
-
-
-
-
- Combining documents
-
- You may combine the Document with other documents
- released under this License, under the terms defined in
- section above for
- modified versions, provided that you include in the
- combination all of the of
- all of the original documents, unmodified, and list them all
- as of your combined work
- in its license notice, and that you preserve all their
- Warranty Disclaimers.
-
- The combined work need only contain one copy of this
- License, and multiple identical may be replaced with a single
- copy. If there are multiple with the same name but
- different contents, make the title of each such section unique
- by adding at the end of it, in parentheses, the name of the
- original author or publisher of that section if known, or else
- a unique number. Make the same adjustment to the section
- titles in the list of in
- the license notice of the combined work.
-
- In the combination, you must combine any sections
- Entitled History
in the various original
- documents, forming one section Entitled
- History
; likewise combine any sections Entitled
- Acknowledgements
, and any sections Entitled
- Dedications
. You must delete all sections
- Entitled Endorsements
.
-
-
-
-
-
- Collection of documents
-
- You may make a collection consisting of the Document and
- other documents released under this License, and replace the
- individual copies of this License in the various documents
- with a single copy that is included in the collection,
- provided that you follow the rules of this License for
- verbatim copying of each of the documents in all other
- respects.
-
- You may extract a single document from such a
- collection, and distribute it individually under this License,
- provided you insert a copy of this License into the extracted
- document, and follow this License in all other respects
- regarding verbatim copying of that document.
-
-
-
-
-
- Aggregation with independent works
-
- A compilation of the Document or its derivatives with
- other separate and independent documents or works, in or on a
- volume of a storage or distribution medium, is called an
- aggregate
if the copyright resulting from the
- compilation is not used to limit the legal rights of the
- compilation's users beyond what the individual works permit.
- When the Document is included in an aggregate, this License
- does not apply to the other works in the aggregate which are
- not themselves derivative works of the Document.
-
- If the Cover Text requirement of section is applicable to these
- copies of the Document, then if the Document is less than one
- half of the entire aggregate, the Document's may be placed on covers that bracket
- the Document within the aggregate, or the electronic
- equivalent of covers if the Document is in electronic form.
- Otherwise they must appear on printed covers that bracket the
- whole aggregate.
-
-
-
-
-
- Translations
-
- Translation is considered a kind of modification, so you
- may distribute translations of the Document under the terms of
- section . Replacing
- with translations
- requires special permission from their copyright holders, but
- you may include translations of some or all in addition to the original
- versions of these . You
- may include a translation of this License, and all the license
- notices in the Document, and any Warranty Disclaimers,
- provided that you also include the original English version of
- this License and the original versions of those notices and
- disclaimers. In case of a disagreement between the
- translation and the original version of this License or a
- notice or disclaimer, the original version will
- prevail.
-
- If a section in the Document is Entitled
- Acknowledgements
, Dedications
,
- or History
, the requirement (section ) to Preserve its Title
- (section ) will
- typically require changing the actual title.
-
-
-
-
-
- Termination
-
- You may not copy, modify, sublicense, or distribute the
- Document except as expressly provided for under this License.
- Any other attempt to copy, modify, sublicense or distribute
- the Document is void, and will automatically terminate your
- rights under this License. However, parties who have received
- copies, or rights, from you under this License will not have
- their licenses terminated so long as such parties remain in
- full compliance.
-
-
-
-
-
- Future Revisions of this License
-
- The Free Software Foundation may publish new, revised
- versions of the GNU Free Documentation License from time to
- time. Such new versions will be similar in spirit to the
- present version, but may differ in detail to address new
- problems or concerns. See .
-
- Each version of the License is given a distinguishing
- version number. If the Document specifies that a particular
- numbered version of this License or any later
- version
applies to it, you have the option of
- following the terms and conditions either of that specified
- version or of any later version that has been published (not
- as a draft) by the Free Software Foundation. If the Document
- does not specify a version number of this License, you may
- choose any version ever published (not as a draft) by the Free
- Software Foundation.
-
-
-
-
-
- How to use this License for your documents
-
- To use this License in a document you have written,
- include a copy of the License in the document and put the
- following copyright and license notices just after the title
- page:
-
-
-Copyright (C) YEAR YOUR NAME.
-
-Permission is granted to copy, distribute and/or modify this
-document under the terms of the GNU Free Documentation License,
-Version 1.2 or any later version published by the Free Software
-Foundation; with no Invariant Sections, no Front-Cover Texts, and
-no Back-Cover Texts. A copy of the license is included in the
-section entitled GNU Free Documentation License
.
-
-
- If you have ,
- Front-Cover Texts and Back-Cover Texts, replace the
- with...Texts
. line with this:
-
-
-with the Invariant Sections being LIST THEIR TITLES, with the
-Front-Cover Texts being LIST, and with the Back-Cover Texts being
-LIST.
-
-
- If you have
- without , or some other
- combination of the three, merge those two alternatives to suit
- the situation.
-
- If your document contains nontrivial examples of program
- code, we recommend releasing these examples in parallel under
- your choice of free software license, such as the GNU General
- Public License, to permit their use in free software.
-
-
-
-
diff --git a/Manuals/Tcpi-ug/Licenses/gpl.docbook b/Manuals/Tcpi-ug/Licenses/gpl.docbook
deleted file mode 100644
index 71654af..0000000
--- a/Manuals/Tcpi-ug/Licenses/gpl.docbook
+++ /dev/null
@@ -1,497 +0,0 @@
-
-
- GNU General Public License
-
- Version 2, June 1991
-
- Copyright © 1989, 1991 Free Software Foundation, Inc.
- 675 Mass Ave, Cambridge, MA 02139, USA
-
- Everyone is permitted to copy and distribute verbatim copies
- of this license document, but changing it is not allowed.
-
-
-
- Preamble
-
- The licenses for most software are designed to take away
- your freedom to share and change it. By contrast, the GNU General
- Public License is intended to guarantee your freedom to share and
- change free software–to make sure the software is free for
- all its users. This General Public License applies to most of the
- Free Software Foundation's software and to any other program whose
- authors commit to using it. (Some other Free Software Foundation
- software is covered by the GNU Library General Public License
- instead.) You can apply it to your programs, too.
-
- When we speak of free software, we are referring to freedom,
- not price. Our General Public Licenses are designed to make sure
- that you have the freedom to distribute copies of free software
- (and charge for this service if you wish), that you receive source
- code or can get it if you want it, that you can change the
- software or use pieces of it in new free programs; and that you
- know you can do these things.
-
- To protect your rights, we need to make restrictions that
- forbid anyone to deny you these rights or to ask you to surrender
- the rights. These restrictions translate to certain
- responsibilities for you if you distribute copies of the software,
- or if you modify it.
-
- For example, if you distribute copies of such a program,
- whether gratis or for a fee, you must give the recipients all the
- rights that you have. You must make sure that they, too, receive
- or can get the source code. And you must show them these terms so
- they know their rights.
-
- We protect your rights with two steps:
-
-
-
- copyright the software, and
-
-
- offer you this license which gives you legal
- permission to copy, distribute and/or modify the
- software.
-
-
-
-
- Also, for each author's protection and ours, we want to make
- certain that everyone understands that there is no warranty for
- this free software. If the software is modified by someone else
- and passed on, we want its recipients to know that what they have
- is not the original, so that any problems introduced by others
- will not reflect on the original authors' reputations.
-
- Finally, any free program is threatened constantly by
- software patents. We wish to avoid the danger that redistributors
- of a free program will individually obtain patent licenses, in
- effect making the program proprietary. To prevent this, we have
- made it clear that any patent must be licensed for everyone's free
- use or not licensed at all.
-
- The precise terms and conditions for copying, distribution
- and modification follow.
-
-
-
-
-
- Terms and Conditions for Copying, Distribution and Modification
-
-
-
- Section 1
-
- You may copy and distribute verbatim copies of the
- Program's source code as you receive it, in any medium,
- provided that you conspicuously and appropriately publish on
- each copy an appropriate copyright notice and disclaimer of
- warranty; keep intact all the notices that refer to this
- License and to the absence of any warranty; and give any other
- recipients of the Program a copy of this License along with
- the Program.
-
- You may charge a fee for the physical act of
- transferring a copy, and you may at your option offer warranty
- protection in exchange for a fee.
-
-
-
-
-
- Section 2
-
- You may modify your copy or copies of the Program or
- any portion of it, thus forming a work based on the
- Program, and copy and distribute such modifications or
- work under the terms of above, provided that you also meet all of these
- conditions:
-
-
-
- You must cause the modified files to carry prominent
- notices stating that you changed the files and the date of
- any change.
-
-
- You must cause any work that you distribute or
- publish, that in whole or in part contains or is derived
- from the Program or any part thereof, to be licensed as a
- whole at no charge to all third parties under the terms of
- this License.
-
-
- If the modified program normally reads commands
- interactively when run, you must cause it, when started
- running for such interactive use in the most ordinary way,
- to print or display an announcement including an
- appropriate copyright notice and a notice that there is no
- warranty (or else, saying that you provide a warranty) and
- that users may redistribute the program under these
- conditions, and telling the user how to view a copy of
- this License.
-
-
- Exception
-
- If the Program itself is interactive but does not
- normally print such an announcement, your work based
- on the Program is not required to print an
- announcement.
-
-
-
-
-
-
- These requirements apply to the modified work as a whole.
- If identifiable sections of that work are not derived from the
- Program, and can be reasonably considered independent and separate
- works in themselves, then this License, and its terms, do not
- apply to those sections when you distribute them as separate
- works. But when you distribute the same sections as part of a
- whole which is a work based on the Program, the distribution of
- the whole must be on the terms of this License, whose permissions
- for other licensees extend to the entire whole, and thus to each
- and every part regardless of who wrote it.
-
- Thus, it is not the intent of this section to claim rights
- or contest your rights to work written entirely by you; rather,
- the intent is to exercise the right to control the distribution of
- derivative or collective works based on the Program.
-
- In addition, mere aggregation of another work not based on
- the Program with the Program (or with a work based on the Program)
- on a volume of a storage or distribution medium does not bring the
- other work under the scope of this License.
-
-
-
-
-
- Section 3
-
- You may copy and distribute the Program (or a work
- based on it, under ) in
- object code or executable form under the terms of and above provided that you also
- do one of the following:
-
-
-
-
-
- Accompany it with the complete corresponding
- machine-readable source code, which must be
- distributed under the terms of and above on a medium
- customarily used for software interchange;
- or,
-
-
-
-
-
- Accompany it with a written offer, valid for at
- least three years, to give any third party, for a
- charge no more than your cost of physically
- performing source distribution, a complete
- machine-readable copy of the corresponding source
- code, to be distributed under the terms of and above on a medium
- customarily used for software interchange;
- or,
-
-
-
-
-
- Accompany it with the information you received as
- to the offer to distribute corresponding source
- code. (This alternative is allowed only for
- noncommercial distribution and only if you
- received the program in object code or executable
- form with such an offer, in accord with Subsection
- b above.)
-
-
-
-
-
-
- The source code for a work means the preferred form of the
- work for making modifications to it. For an executable work,
- complete source code means all the source code for all modules it
- contains, plus any associated interface definition files, plus the
- scripts used to control compilation and installation of the
- executable. However, as a special exception, the source code
- distributed need not include anything that is normally distributed
- (in either source or binary form) with the major components
- (compiler, kernel, and so on) of the operating system on which the
- executable runs, unless that component itself accompanies the
- executable.
-
- If distribution of executable or object code is made by
- offering access to copy from a designated place, then offering
- equivalent access to copy the source code from the same place
- counts as distribution of the source code, even though third
- parties are not compelled to copy the source along with the object
- code.
-
-
-
-
-
- Section 4
-
- You may not copy, modify, sublicense, or distribute the
- Program except as expressly provided under this License. Any
- attempt otherwise to copy, modify, sublicense or distribute the
- Program is void, and will automatically terminate your rights
- under this License. However, parties who have received copies, or
- rights, from you under this License will not have their licenses
- terminated so long as such parties remain in full
- compliance.
-
-
-
-
-
- Section 5
-
- You are not required to accept this License, since you have
- not signed it. However, nothing else grants you permission to
- modify or distribute the Program or its derivative works. These
- actions are prohibited by law if you do not accept this License.
- Therefore, by modifying or distributing the Program (or any work
- based on the Program), you indicate your acceptance of this
- License to do so, and all its terms and conditions for copying,
- distributing or modifying the Program or works based on it.
-
-
-
-
-
- Section 6
-
- Each time you redistribute the Program (or any work based on
- the Program), the recipient automatically receives a license from
- the original licensor to copy, distribute or modify the Program
- subject to these terms and conditions. You may not impose any
- further restrictions on the recipients' exercise of the rights
- granted herein. You are not responsible for enforcing compliance
- by third parties to this License.
-
-
-
-
-
- Section 7
-
- If, as a consequence of a court judgment or allegation of
- patent infringement or for any other reason (not limited to patent
- issues), conditions are imposed on you (whether by court order,
- agreement or otherwise) that contradict the conditions of this
- License, they do not excuse you from the conditions of this
- License. If you cannot distribute so as to satisfy simultaneously
- your obligations under this License and any other pertinent
- obligations, then as a consequence you may not distribute the
- Program at all. For example, if a patent license would not permit
- royalty-free redistribution of the Program by all those who
- receive copies directly or indirectly through you, then the only
- way you could satisfy both it and this License would be to refrain
- entirely from distribution of the Program.
-
- If any portion of this section is held invalid or
- unenforceable under any particular circumstance, the balance of
- the section is intended to apply and the section as a whole is
- intended to apply in other circumstances.
-
- It is not the purpose of this section to induce you to
- infringe any patents or other property right claims or to contest
- validity of any such claims; this section has the sole purpose of
- protecting the integrity of the free software distribution system,
- which is implemented by public license practices. Many people
- have made generous contributions to the wide range of software
- distributed through that system in reliance on consistent
- application of that system; it is up to the author/donor to decide
- if he or she is willing to distribute software through any other
- system and a licensee cannot impose that choice.
-
- This section is intended to make thoroughly clear what is
- believed to be a consequence of the rest of this License.
-
-
-
-
-
- Section 8
-
- If the distribution and/or use of the Program is restricted
- in certain countries either by patents or by copyrighted
- interfaces, the original copyright holder who places the Program
- under this License may add an explicit geographical distribution
- limitation excluding those countries, so that distribution is
- permitted only in or among countries not thus excluded. In such
- case, this License incorporates the limitation as if written in
- the body of this License.
-
-
-
-
-
- Section 9
-
- The Free Software Foundation may publish revised and/or new
- versions of the General Public License from time to time. Such
- new versions will be similar in spirit to the present version, but
- may differ in detail to address new problems or concerns.
-
- Each version is given a distinguishing version number. If
- the Program specifies a version number of this License which
- applies to it and any later version
, you have the
- option of following the terms and conditions either of that
- version or of any later version published by the Free Software
- Foundation. If the Program does not specify a version number of
- this License, you may choose any version ever published by the
- Free Software Foundation.
-
-
-
-
-
- Section 10
-
- If you wish to incorporate parts of the Program into other
- free programs whose distribution conditions are different, write
- to the author to ask for permission. For software which is
- copyrighted by the Free Software Foundation, write to the Free
- Software Foundation; we sometimes make exceptions for this. Our
- decision will be guided by the two goals of preserving the free
- status of all derivatives of our free software and of promoting
- the sharing and reuse of software generally.
-
-
-
-
-
- NO WARRANTY
- Section 11
-
- BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO
- WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE
- LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
- HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM AS IS
WITHOUT
- WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT
- NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
- FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE
- QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
- PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY
- SERVICING, REPAIR OR CORRECTION.
-
-
-
-
-
- Section 12
-
- IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO
- IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY
- MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE
- LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL,
- INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR
- INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
- DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU
- OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY
- OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN
- ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
-
- End of Terms and Conditions.
-
-
-
-
-
-
-
- How to Apply These Terms to Your New Programs
-
- If you develop a new program, and you want it to be of
- the greatest possible use to the public, the best way to
- achieve this is to make it free software which everyone can
- redistribute and change under these terms.
-
- To do so, attach the following notices to the program.
- It is safest to attach them to the start of each source file
- to most effectively convey the exclusion of warranty; and each
- file should have at least the copyright
line
- and a pointer to where the full notice is found.
-
-
-<one line to give the program's name and a brief idea of what it does.>
-Copyright (C) 19yy <name of author>
-
-This program is free software; you can redistribute it and/or modify
-it under the terms of the GNU General Public License as published by
-the Free Software Foundation; either version 2 of the License, or
-(at your option) any later version.
-
-This program is distributed in the hope that it will be useful,
-but WITHOUT ANY WARRANTY; without even the implied warranty of
-MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-GNU General Public License for more details.
-
-You should have received a copy of the GNU General Public License
-along with this program; if not, write to the Free Software
-Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
-
-
- Also add information on how to contact you by electronic
- and paper mail.
-
- If the program is interactive, make it output a short
- notice like this when it starts in an interactive mode:
-
-
-Gnomovision version 69, Copyright (C) 19yy name of author
-Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
-This is free software, and you are welcome to redistribute it
-under certain conditions; type `show c' for details.
-
-
- The hypothetical commands `show w' and `show c' should
- show the appropriate parts of the General Public License. Of
- course, the commands you use may be called something other
- than `show w' and `show c'; they could even be mouse-clicks or
- menu items–whatever suits your program.
-
- You should also get your employer (if you work as a
- programmer) or your school, if any, to sign a copyright
- disclaimer
for the program, if necessary. Here is a
- sample; alter the names:
-
-
-Yoyodyne, Inc., hereby disclaims all copyright interest in the program
-`Gnomovision' (which makes passes at compilers) written by James Hacker.
-
-<signature of Ty Coon>, 1 April 1989
-Ty Coon, President of Vice
-
-
- This General Public License does not permit
- incorporating your program into proprietary programs. If your
- program is a subroutine library, you may consider it more
- useful to permit linking proprietary applications with the
- library. If this is what you want to do, use the GNU Library
- General Public License instead of this License.
-
-
-
-
diff --git a/Manuals/Tcpi-ug/Preface.docbook b/Manuals/Tcpi-ug/Preface.docbook
deleted file mode 100755
index 7eca40b..0000000
--- a/Manuals/Tcpi-ug/Preface.docbook
+++ /dev/null
@@ -1,40 +0,0 @@
-
-
- Preface
-
-
- Welcome to &TCPIUG;, the official documentation of &TCPI;.
-
-
-
- This book describes how &TCPI; is organized and the guidelines
- both users and administrators should follow to make use of it.
- If you need to know what the technical and political desitions
- behind &TCP; are, this book is definitly for you.
-
-
-
- To make the information in this book managable, it has been
- organized in the following parts:
-
-
-
-
-
- organizes the licenses mentioned
- in this book.
-
-
-
-
-
- This book is oriented to system administrators and assumes you
- have a basic understanding of &TCD;. If you need help with
- it, go to the Help page inside
- &TCWIKI; for or a list of different places you can find help.
-
-
- &preface-overview;
-
-
diff --git a/Manuals/Tcpi-ug/Preface.ent b/Manuals/Tcpi-ug/Preface.ent
deleted file mode 100755
index 41f09f0..0000000
--- a/Manuals/Tcpi-ug/Preface.ent
+++ /dev/null
@@ -1,2 +0,0 @@
-
-
diff --git a/Manuals/Tcpi-ug/Preface/overview.docbook b/Manuals/Tcpi-ug/Preface/overview.docbook
deleted file mode 100755
index 1ef0ded..0000000
--- a/Manuals/Tcpi-ug/Preface/overview.docbook
+++ /dev/null
@@ -1,9 +0,0 @@
-
-
- Overview
-
-
- ...
-
-
-
diff --git a/Manuals/Tcpi-ug/tcpi-ug.docbook b/Manuals/Tcpi-ug/tcpi-ug.docbook
deleted file mode 100755
index f2b634b..0000000
--- a/Manuals/Tcpi-ug/tcpi-ug.docbook
+++ /dev/null
@@ -1,80 +0,0 @@
-
-
-
-
-
-
-
-%Commons.ent;
-%Preface.ent;
-%Administration.ent;
-%Configurations.ent;
-%Licenses.ent;
-]>
-
-
-
-
- The CentOS Project Infrastructure
- User's Guide
-
-
-
- Alain
- Reguera Delgado
-
-
-
-
- 2011
- &TCP;. All rights reserved.
-
-
-
-
- Permission is granted to copy, distribute and/or modify
- this document under the terms of the GNU Free
- Documentation License, Version 1.2 or any later version
- published by the Free Software Foundation; with no
- Invariant Sections, no Front-Cover Texts, and no
- Back-Cover Texts. A copy of the license is included in
- .
-
-
-
-
-
- 1.0
- Today
-
- Alain
- Reguera Delgado
-
-
-
- Under development.
-
-
-
-
-
-
-
-
- &preface;
-
-
- &administration;
- &configurations;
-
-
- &licenses;
-
-