Update cpio instructions for LSB compliance; update firewalling instructions to make scripts executable

git-svn-id: svn://svn.linuxfromscratch.org/BLFS/trunk/BOOK@4582 af4574ff-66df-0310-9fd7-8a98e5e911e0
This commit is contained in:
Bruce Dubbs 2005-06-12 18:06:48 +00:00
parent 47793d9a27
commit 49625cbc14
3 changed files with 21 additions and 2 deletions

View File

@ -66,8 +66,11 @@
./configure CPIO_MT_PROG=mt --prefix=/usr \
--bindir=/bin --libexecdir=/tmp \
--with-rmt=/usr/sbin/rmt &&
echo "#define HAVE_SETLOCALE 1" >> config.h &&
make</userinput></screen>
<para>To test the results, issue: <command>make check</command>.</para>
<para>Now, as the <systemitem class="username">root</systemitem> user:</para>
<screen role="root"><userinput>make install</userinput></screen>
@ -95,6 +98,10 @@ make</userinput></screen>
building the <command>rmt</command> program as it is already installed by the
<application>tar</application> package in LFS.</para>
<para><command>echo "#define HAVE_SETLOCALE 1" >> config.h</command>:
This command fixes a build problem to ensure proper LSB functionality.</para>
</sect2>
<sect2 role="content">

View File

@ -24,6 +24,16 @@
<itemizedlist>
<listitem>
<para>June 12th, 2005 [bdubbs]: Added instruction to make rc.iptables
executable in firewalling section.</para>
</listitem>
<listitem>
<para>June 12th, 2005 [bdubbs]: Updated cpio instructions to ensure LSB
testsuites pass internationalization tests.</para>
</listitem>
<listitem>
<para>June 12th, 2005 [djensen]: Updated to Links-2.1pre17. Added
SDL to optional dependencies. Separated user and root

View File

@ -250,7 +250,8 @@ iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
iptables -A INPUT -j LOG --log-prefix "FIREWALL:INPUT "
# End $rc_base/rc.iptables</literal>
EOF</userinput></screen>
EOF
chmod 700 /etc/rc.d/rc.iptables</userinput></screen>
<para>This script is quite simple, it drops all traffic coming
in into your computer that wasn't initiated from your box, but
@ -375,7 +376,8 @@ iptables -A OUTPUT -j LOG --log-prefix "FIREWALL:OUTPUT "
# Enable IP Forwarding
echo 1 &gt; /proc/sys/net/ipv4/ip_forward</literal>
EOF</userinput></screen>
EOF
chmod 700 /etc/rc.d/rc.iptables</userinput></screen>
<para>With this script your intranet should be reasonably secure
against external attacks. No one should be able to setup a new