mirror of
https://github.com/Zeckmathederg/glfs.git
synced 2025-01-24 06:52:14 +08:00
Update cpio instructions for LSB compliance; update firewalling instructions to make scripts executable
git-svn-id: svn://svn.linuxfromscratch.org/BLFS/trunk/BOOK@4582 af4574ff-66df-0310-9fd7-8a98e5e911e0
This commit is contained in:
parent
47793d9a27
commit
49625cbc14
@ -66,8 +66,11 @@
|
||||
./configure CPIO_MT_PROG=mt --prefix=/usr \
|
||||
--bindir=/bin --libexecdir=/tmp \
|
||||
--with-rmt=/usr/sbin/rmt &&
|
||||
echo "#define HAVE_SETLOCALE 1" >> config.h &&
|
||||
make</userinput></screen>
|
||||
|
||||
<para>To test the results, issue: <command>make check</command>.</para>
|
||||
|
||||
<para>Now, as the <systemitem class="username">root</systemitem> user:</para>
|
||||
|
||||
<screen role="root"><userinput>make install</userinput></screen>
|
||||
@ -95,6 +98,10 @@ make</userinput></screen>
|
||||
building the <command>rmt</command> program as it is already installed by the
|
||||
<application>tar</application> package in LFS.</para>
|
||||
|
||||
<para><command>echo "#define HAVE_SETLOCALE 1" >> config.h</command>:
|
||||
This command fixes a build problem to ensure proper LSB functionality.</para>
|
||||
|
||||
|
||||
</sect2>
|
||||
|
||||
<sect2 role="content">
|
||||
|
@ -24,6 +24,16 @@
|
||||
|
||||
<itemizedlist>
|
||||
|
||||
<listitem>
|
||||
<para>June 12th, 2005 [bdubbs]: Added instruction to make rc.iptables
|
||||
executable in firewalling section.</para>
|
||||
</listitem>
|
||||
|
||||
<listitem>
|
||||
<para>June 12th, 2005 [bdubbs]: Updated cpio instructions to ensure LSB
|
||||
testsuites pass internationalization tests.</para>
|
||||
</listitem>
|
||||
|
||||
<listitem>
|
||||
<para>June 12th, 2005 [djensen]: Updated to Links-2.1pre17. Added
|
||||
SDL to optional dependencies. Separated user and root
|
||||
|
@ -250,7 +250,8 @@ iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
|
||||
iptables -A INPUT -j LOG --log-prefix "FIREWALL:INPUT "
|
||||
|
||||
# End $rc_base/rc.iptables</literal>
|
||||
EOF</userinput></screen>
|
||||
EOF
|
||||
chmod 700 /etc/rc.d/rc.iptables</userinput></screen>
|
||||
|
||||
<para>This script is quite simple, it drops all traffic coming
|
||||
in into your computer that wasn't initiated from your box, but
|
||||
@ -375,7 +376,8 @@ iptables -A OUTPUT -j LOG --log-prefix "FIREWALL:OUTPUT "
|
||||
|
||||
# Enable IP Forwarding
|
||||
echo 1 > /proc/sys/net/ipv4/ip_forward</literal>
|
||||
EOF</userinput></screen>
|
||||
EOF
|
||||
chmod 700 /etc/rc.d/rc.iptables</userinput></screen>
|
||||
|
||||
<para>With this script your intranet should be reasonably secure
|
||||
against external attacks. No one should be able to setup a new
|
||||
|
Loading…
Reference in New Issue
Block a user