diff --git a/LDP/users/Peter-Bieringer/Linux+IPv6-HOWTO.de.html b/LDP/users/Peter-Bieringer/Linux+IPv6-HOWTO.de.html index f926d6c7..10d6e104 100644 --- a/LDP/users/Peter-Bieringer/Linux+IPv6-HOWTO.de.html +++ b/LDP/users/Peter-Bieringer/Linux+IPv6-HOWTO.de.html @@ -4,7 +4,6 @@ >Linux IPv6 HOWTO (de)Version 0.66wip.de.12013-05-132014-05-02Geändert durch: PB
9.2. Bestehende Tunnel anzeigen
10.1. Anzeigen von existierenden Tunnels
10.2. Konfiguration eines Punkt-zu-Punkt Tunnels
10.3. Löschen von Punkt-zu-Punkt-Tunnels
11.1. Zugriff auf das /proc-Dateisystem
14.1. Server Socket-Anbindung
15.1. Red Hat Linux und “Klone”
15.2. SuSE Linux
16.1. Stateless Auto-Konfiguration (out-of-the-box)
16.2. Stateless Auto-Konfiguration unter Verwendung des Router Advertisement Daemon (radvd)
16.3. Dynamic Host Configuration Protocol v6 (DHCPv6)
17.1. Allgemeines
18.2. Vorbereitung
18.3. Verwendung
Network Address Translation (NAT) mit netfilter6
18.5. Firewall-Setup mit nftables
19.1. Sicherheit des Knoten
19.2. Zugangsbeschränkungen
20.1. Nutzungsarten von Verschlüsselung und Authentifizierung
20.2. Unterstützung im Kernel (ESP und AH)
20.3. Automatischer Schlüssel-Austausch (IKE)
20.4. Anmerkungen:
21.1. General
21.2. Linux QoS mit “tc”
23.2. Andere Programmiersprachen
25.4. IPv6 Infrastruktur
26. Versions-Überblick / Danksagung / Zum Schluss
26.3. Zum Schluss
1.1.1. Copyright

Verfasst von und urheberrechtlich geschützt durch Peter Bieringer © 2001-2013.

Verfasst von und urheberrechtlich geschützt durch Peter Bieringer © 2001-2014.

Deutsche Übersetzung:

Verfasst von und urheberrechtlich geschützt durch Georg Käfer © 2002-2003, weitergeführt von Peter Bieringer © 2004-2013.

Verfasst von und urheberrechtlich geschützt durch Georg Käfer © 2002-2003, weitergeführt von Peter Bieringer © 2004-2014.

Dieses Linux IPv6 HOWTO ist ein Handbuch zur Anwendung und Konfiguration von IPv6 auf Linux-Systemen.

Copyright © 2001-2013 Peter Bieringer +>Copyright © 2001-2014 Peter Bieringer Deutsche Übersetzung Copyright © 2002-2003 Georg Käfer, weitergeführt von Peter Bieringer © 2004-2013.

Diese Dokumentation ist freie Software; Sie können diese unter den Bedingungen der GNU General Public License, wie von der Free Software Foundation publiziert, entweder unter Version 2 oder optional jede höhere Version redistribuieren und/oder modifizieren.

Ein entfernter Tunnel-Endpunkt muss dazu in der Lage sein, ihr IPv6 Präfix bis zu Ihrem lokalen Tunnel-Endpunkt zu routen (wobei meistens manuelle Konfiguration notwendig wird).

Statische Tunnelprovider:


9.1.2. Automatische Tunnel


9.1.3.1. Erstellen eines 6to4 Präfixes


9.1.3.2. 6to4 Tunnel zum Upstream


9.1.3.3. 6to4 Tunnel zum Downstream


9.1.3.4. Möglicher 6to4 Verkehr


9.1.4. UDP gekapselte IPv6 Tunnels


9.1.4.1. Teredo Tunnel


9.1.4.2. AYIYA Tunnel

SixXS has also IPv6-in-UDP-in-IPv4 (5072/udp) capability, for using it, the AYIYA mode must be enabled.

bietet auch einen IPv6-in-UDP-in-IPv4 (5072/udp) Tunnel an, zur Nutzung muss der Modus AYIYA aktiviert werden.


9.1.4.3. gogo6 Tunnel

gogo6 has also IPv6-in-UDP-in-IPv4 (3653/udp) capability, for using it, the v6udpv4 mode must be enabled.

bietet auch einen IPv6-in-UDP-in-IPv4 (3653/udp) Tunnel an, zur Nutzung muss der Modus v6udpv4 aktiviert werden.


9.2. Bestehende Tunnel anzeigen

9.2.1. Verwendung von "ip"


9.2.2. Verwendung von "route"


9.3.1. Einen Punkt-zu-Punkt Tunnel hinzufügen

9.3.1.1. Verwendung von "ip"


9.3.1.2. Verwendung von "ifconfig" und "route" (nicht empfehlenswert)


9.3.1.3. Verwendung allein von "route"


9.3.2. Punkt-zu-Punkt Tunnel entfernen


9.3.2.1. Verwendung von "ip"


9.3.2.2. Verwendung von "ifconfig" und "route" (nicht empfehlenswert, da unbequem)


9.3.2.3. Verwendung von "route"


9.3.3. Nummerierte Punkt-zu-Punkt Tunnel


9.4.1. 6to4 Tunnel hinzufügen


9.4.1.1. Verwendung von "ip" und einem dedizierten Tunnel-Device


9.4.1.2. Verwendung von "ifconfig" und "route" sowie einem generischen Tunnel-Device "sit0" (nicht empfehlenswert)


9.4.2. 6to4 Tunnel entfernen

9.4.2.1. Verwendung von "ip" und einem dedizierten Tunnel-Device


9.4.2.2. Verwendung von "ifconfig" und "route" sowie einem generischen Tunnel-Device "sit0" (nicht empfehlenswert)


10.1. Anzeigen von existierenden Tunnels


10.2. Konfiguration eines Punkt-zu-Punkt Tunnels


10.3. Löschen von Punkt-zu-Punkt-Tunnels


11.1. Zugriff auf das /proc-Dateisystem

11.1.1. Verwendung von "cat" und "echo"


11.1.1.1. Wert anzeigen


11.1.1.2. Wert einstellen


11.1.2. Verwendung von "sysctl"


11.1.2.1. Wert anzeigen


11.1.2.2. Wert einstellen


11.1.2.3. Sonstiges


11.1.3. Werte im /proc-Dateisystem

11.2.1. conf/default/*


11.2.2. conf/all/*


11.2.2.1. conf/all/forwarding


11.2.3. conf/interface/*


11.2.3.1. accept_ra


11.2.3.2. accept_redirects


11.2.3.3. autoconf


11.2.3.4. dad_transmits


11.2.3.5. forwarding


11.2.3.6. hop_limit


11.2.3.7. mtu


11.2.3.8. router_solicitation_delay


11.2.3.9. router_solicitation_interval


11.2.3.10. router_solicitations


11.2.4. neigh/default/*


11.2.4.1. gc_thresh1


11.2.4.2. gc_thresh2


11.2.4.3. gc_thresh3


11.2.4.4. gc_interval


11.2.5. neigh/interface/*


11.2.5.1. anycast_delay


11.2.5.2. gc_stale_time


11.2.5.3. proxy_qlen


11.2.5.4. unres_qlen


11.2.5.5. app_solicit


11.2.5.6. locktime


11.2.5.7. retrans_time


11.2.5.8. base_reachable_time


11.2.5.9. mcast_solicit


11.2.5.10. ucast_solicit


11.2.5.11. delay_first_probe_time


11.2.5.12. proxy_delay


11.2.6. route/*


11.2.6.1. flush


11.2.6.2. gc_interval


11.2.6.3. gc_thresh


11.2.6.4. mtu_expires


11.2.6.5. gc_elasticity


11.2.6.6. gc_min_interval


11.2.6.7. gc_timeout


11.2.6.8. min_adv_mss


11.2.6.9. max_size


11.3.1. ip_*

11.3.1.1. ip_local_port_range


11.3.2. tcp_*


11.3.3. icmp_*


11.3.4. Sonstige Einträge


11.4.1. if_inet6


11.4.2. ipv6_route


11.4.3. sockstat6


11.4.4. tcp6


11.4.5. udp6


11.4.6. igmp6


11.4.7. raw6


11.4.8. ip6_flowlabel


11.4.9. rt6_stats


11.4.10. snmp6


11.4.11. ip6_tables_names

14.1. Server Socket-Anbindung

14.1.1. Überprüfung der Server Socket-Anbindung mit “netstat”


14.2.1. Router-Erkennung

14.2.1.1. Router Advertisement


14.2.1.2. Router Anfrage


14.2.2. Neighbor-Erkennung

14.2.2.1. Neighbor discovery solicitation zur Entdeckung doppelter Adressen


14.2.2.2. Neighbor discovery solicitation zur Host oder Gateway-Suche


15.1. Red Hat Linux und “Klone”


15.1.1. Test der IPv6-Unterstützung bei Netzwerk-Konfigurations-Scripts


15.1.2. Kurze Anleitung zum aktivieren von IPv6 bei RHL 7.1, 7.2, 7.3, ...


15.2. SuSE Linux


15.2.1. SuSE Linux 7.3


15.2.2. SuSE Linux 8.0


18.3.2.3. Hinzufügen einer Log-Regel zum Input-Filter mit Optionen


18.3.2.4. Hinzufügen einer Drop-Regel zum Input-Filter


18.3.2.5. Löschen einer Regel mit Hilfe der Regelnummer


18.3.2.6. Aktiviere die Auswertung des Verbindungsstatus (connection tracking)


18.3.2.7. ICMPv6 erlauben


18.3.2.8. Rate-limiting


18.3.2.9. Eingehende SSH-Verbindung erlauben


18.3.2.10. Getunnelten IPv6-in-IPv4 Datenverkehr erlauben


18.3.2.11. Schutz gegen eingehende TCP-Verbindungs-Anfragen


18.3.2.12. Schutz gegen eingehende UDP-Verbindungs-Anfragen


18.3.3. Anwendungsbeispiele


18.5. Firewall-Setup mit nftables

Mit nftables wurde die Unterstützung einer Tabelle names “inet” eingeführt in welcher Regeln für IPv4/IPv6 gleichzeitig gelten


18.5.1. Präparation zur Nutzung von nftables

Installieren einer Linux-Distribution, welche die Unterstützung für nftables bereits eingebaut hat. Beim Schreiben dieses Absatzes (Mai 2014) war mindestens Fedora Rawhide (Vorläufer der Version 21) mit entsprechendem Support und nftables version 0.2.0 versehen.


18.5.2. Basis-nftables Konfiguration

Laden der Kernel-Module

# modprobe nf_tables
+# modprobe nf_tables_ipv4
+# modprobe nf_tables_ipv6
+# modprobe nf_tables_inet 

Erzeugen der Filter-Tabellen

# nft add table ip   filter
+# nft add table ip6  filter
+# nft add table inet filter 

Erzeugen einer input chain in jeder Filter-Tabelle

# nft add chain ip   filter input { type filter hook input priority 1 \; }
+# nft add chain ip6  filter input { type filter hook input priority 1 \; } 
+# nft add chain inet filter input { type filter hook input priority 0 \; }

18.5.3. Einfache Filter-Policy mit nftables

18.5.3.1. Konfiguration

Erlauben von Paketen, die zu existierenden Einträgen in der Connection-Tracking-Tabelle gehören

# nft add rule inet filter input ct state established,related counter accept 

Erlauben von IPv4 und IPv6 ICMP echo-request (aka ping)

# nft add rule ip filter input icmp type { echo-request } counter accept 
+# nft add rule ip6 filter input icmpv6 type echo-request counter accept 

Erlauben einiger wichtiger IPv6 ICMP Pakete, ohne Zähler, dafür mit Hop-Limit-Prüfung (erhöht die Sicherheit)

# nft add rule ip6 filter input icmpv6 type { nd-neighbor-solicit, nd-router-advert, nd-neighbor-advert } ip6 hoplimit 1 accept # nft add rule ip6 filter input icmpv6 type { nd-neighbor-solicit, nd-router-advert, nd-neighbor-advert } ip6 hoplimit 255 accept

Erlauben von eingehenden SSH-Verbindungen für IPv4 und IPv6 unter Nutzung der IP-Version unabhängigen Tabelle “inet”

# nft add rule inet filter input tcp dport 22 ct state new tcp flags \& \(syn \| ack\) == syn counter accept

18.5.3.2. Ergebnis

Tabelle für IPv4 Filter

# nft list table ip filter
+table ip filter {
+	chain input {
+		 type filter hook input priority 1;
+		 icmp type { echo-request} counter packets 0 bytes 0 accept
+	}
+}

Tabelle für IPv6 Filter

# nft list table ip6 filter
+table ip6 filter {
+	chain input {
+		 type filter hook input priority 1;
+		 icmpv6 type echo-request counter packets 0 bytes 0 accept
+		 ip6 hoplimit 1 icmpv6 type { nd-neighbor-advert, nd-neighbor-solicit, nd-router-advert} accept
+		 ip6 hoplimit 255 icmpv6 type { nd-neighbor-advert, nd-neighbor-solicit, nd-router-advert} accept
+	}
+}

Tabelle für IP unabhängigen Filter

# nft list table inet filter
+table inet filter {
+	chain input {
+		 type filter hook input priority 0;
+		 ct state established,related counter packets 44 bytes 2288 accept
+		 tcp dport ssh ct state new tcp flags & (syn | ack) == syn counter packets 0 bytes 0 accept
+	}
+} 

19.1. Sicherheit des Knoten


19.2. Zugangsbeschränkungen


19.3.1. Rechtsfragen


19.3.2. Sicherheitsüberwachung mit IPv6 fähigen netcat


19.3.3. Sicherheitsüberwachung mit IPv6 fähigen NMap


19.3.4. Sicherheitsüberprüfung IPv6 fähigen strobe


19.3.5. Sicherheitsüberprüfung mit Online-Werkzeugen


19.3.6. Überprüfungsergebnisse


20.1. Nutzungsarten von Verschlüsselung und Authentifizierung


20.1.1. Transport-Modus


20.1.2. Tunnel-Modus


20.2. Unterstützung im Kernel (ESP und AH)

20.2.1. Unterstützung im vanilla Linux Kernel 2.4.x


20.2.2. Unterstützung im vanilla Linux kernel 2.6.x


20.3. Automatischer Schlüssel-Austausch (IKE)


20.3.1. IKE-Daemon “racoon”


20.3.1.1. Manipulation der IPsec SA/SP Datenbank mit dem Werkzeug “setkey”


20.3.1.2. Konfiguration des IKE-Daemon “racoon”


20.3.1.3. IPsec mit IKE-Daemon “racoon” starten


20.3.2. IKE-Daemon “pluto”


20.3.2.1. Konfiguration des IKE-Daemon “pluto”


20.3.2.2. IPsec mit IKE daemon “pluto” starten


20.4. Anmerkungen:


21.1. General


21.2. Linux QoS mit “tc”


21.2.1. Beispiel für eine Warteschlange mit konstanter Bitrate


21.2.1.1. Root qdisc Definition


21.2.1.2. QoS class Definition


21.2.1.3. QoS filter Definition


21.2.1.4. Testen der Filterdefinition mit iperf


22.1.1. Auf IPv6 Adressen hören


22.1.1.1. BIND named konfigurieren, damit er auf IPv6 Adressen antwortet


22.1.1.2. BIND named konfigurieren, damit er auf IPv6 Adressen nicht antwortet


22.1.2. Access Control Lists (ACL) mit IPv6 Unterstützung


22.1.3. Anfragen mit festen IPv6 Adressen senden


22.1.4. Pro Zone definierte feste IPv6 Adressen


22.1.4.1. Transfer source Adresse


22.1.4.2. Notify source Adresse


22.1.5. IPv6 DNS zone files Beispiele


22.1.6. IPv6 bezogene DNS-Daten bereitstellen


22.1.6.1. Aktuell beste Praxis


22.1.7. IPv6 Verbindung überprüfen


22.1.7.1. IPv6 Verbindung durch ACL abgelehnt


22.1.7.2. Erfolgreiche IPv6 Verbindung


22.3.1. Auf IPv6 Adressen hören


22.3.1.1. Virtueller Host mit IPv6 Adresse


22.3.1.2. Virtueller Host mit IPv4 und IPv6 Adresse


22.3.1.3. Zusätzliche Anmerkungen


22.4.1. radvd konfigurieren

22.4.1.1. Einfache Konfiguration


22.4.1.2. Spezielle 6to4 Konfiguration


22.4.2. Fehlersuche


22.5.1. Konfiguration des DHCPv6-Servers (dhcp6s)

22.5.1.1. Einfache Konfiguration


22.5.2. Konfiguration des DHCPv6-Client (dhcp6s)

22.5.2.1. Einfache Konfiguration


22.5.3. Benutzung

22.5.3.1. dhcp6s


22.5.3.2. dhcp6c


22.5.4. Fehlersuche

22.5.4.1. dhcp6s


22.5.4.2. dhcp6c


22.6.1. Konfiguration des ISC DHCP Server für IPv6 (dhcpd)


22.6.1.1. Einfache Configuration


22.6.2. Benutzung

22.6.2.1. dhcpd


22.7.1. Konfiguration des Dibbler DHCP server für IPv6

22.7.1.1. Einfache Konfuration


22.7.2. Benutzung

22.7.2.1. dibbler-server


22.8.1. Filter-Funktionalität


22.8.2. Welches Programm benützt tcp_wrapper


22.8.3. Anwendung


22.8.3.1. Beispiel für /etc/hosts.allow


22.8.3.2. Beispiel für /etc/hosts.deny


22.8.4. Protokollierung


22.8.4.1. Abgelehnte Verbindung


22.8.4.2. Akzeptierte Verbindung

22.9.1. Auf IPv6-Adressen lauschen

22.10.1. Auf IPv6-Adressen lauschen


23.2. Andere Programmiersprachen

23.2.1. JAVA


23.2.2. Perl

25.1.1. Gedruckte Bücher (Englisch)

25.1.1.1. Cisco


25.1.1.2. Allgemein


25.1.2. Artikel, eBooks, Online Rezensionen


25.1.4. Sonstiges


25.2.1. 2004


25.3.2. Neueste Nachrichten und URLs zu anderen Dokumenten


25.3.3. Protokoll-Informationen

25.3.3.1. IPv6 bezogene Request For Comments (RFCs)


25.3.3.2. Aktuelle Entwürfe diverser Arbeitsgruppen


25.3.3.3. Sonstige


25.3.4. Weitere Informationen


25.3.4.1. Linux Informationen


25.3.4.2. Informationen zu Linux-Distributionen


25.3.4.3. Allgemeine Informationen

  • A Tale of Two Wireless Technology Trends: Processor Development Outsourcing and IPv6Yankee Group - 4/1/2002 - 12 Seiten - ID: YANL768881

    statista - The Statistics Portal

  • The World Atlas of the Internet: Americas; IDATE - 2/1/2002 - 242 Seiten - ID: IDT803907. Folgende Länder werden behandelt: Zentralamerika, Nordamerika,Südamerika; Listenpreis: $ 3,500.00; Exzerpt: Panorama of Internet access markets across the globe. Market assessment and forecasts up to 2006 for 34 countries: market structure: main ISPs and market shares; number of subscribers, of ISPs.

  • Early Interest Rising for IPv6 von IDC (Autor); Listenpreis: $1,500.00; Edition: e-book (Acrobat Reader); Hrsg.: IDC; ISBN B000065T8E; (1. March 2002)

    Market Research


  • 25.3.5. Sortiert nach Ländern

    25.6.1. Test-Werkzeuge


    25.6.2. Informationsbeschaffung


    25.6.3. IPv6 Looking Glasses


    25.6.4. Hilfsapplikationen


    Kapitel 26. Versions-Überblick / Danksagung / Zum Schluss


    26.1.1. Ausgabe 0.x

    26.1.1.1. Englische Sprachversion (Peter Bieringer's Original)


    26.1.1.2. Deutsche Sprachversion


    26.2.2. Sonstiger Dank...

    26.2.2.1. Verwaltung des Dokuments


    26.3. Zum Schluss

    0.66wip.de.1 2013-11-12 0.66wip.de.1 2014-05-02 PB \end_layout @@ -247,7 +256,7 @@ Copyright \end_layout \begin_layout Standard -Verfasst von und urheberrechtlich geschützt durch Peter Bieringer © 2001-2013. +Verfasst von und urheberrechtlich geschützt durch Peter Bieringer © 2001-2014. \begin_inset Newline newline \end_inset @@ -260,7 +269,7 @@ Deutsche Übersetzung: \begin_layout Standard Verfasst von und urheberrechtlich geschützt durch Georg Käfer © 2002-2003, - weitergeführt von Peter Bieringer © 2004-2013. + weitergeführt von Peter Bieringer © 2004-2014. \end_layout \begin_layout Subsection @@ -290,7 +299,7 @@ Dieses Linux IPv6 HOWTO ist ein Handbuch zur Anwendung und Konfiguration \end_layout \begin_layout Standard -Copyright © 2001-2013 Peter Bieringer +Copyright © 2001-2014 Peter Bieringer \begin_inset Newline newline \end_inset @@ -10980,8 +10989,22 @@ reference "IPv6-security-auditing" \begin_layout Standard \lang english -Kernels ab Version 2.6.20 unterstützen den IPv6-Verbindungsstatus (connection - tracking) vollständig. +Kernels ab Version 2.6.20 (Februar 2007) unterstützen den IPv6-Verbindungsstatus + (connection tracking) vollständig. +\end_layout + +\begin_layout Standard + +\lang english +Kernels ab Version 3.9.0 (April 2013) unterstützen NAT für IPv6 in Verbindung + mit ip6tables >= 1.4.18 +\end_layout + +\begin_layout Standard + +\lang english +Kernels ab Version 3.13 (April 2014) unterstützen ein neues Framework namens: + nftables \end_layout \begin_layout Subsection @@ -12707,6 +12730,355 @@ Ein dedizierter Port kann zu einem internen System weitergeleitet werden, nation [fec0::1234]:80 \end_layout +\begin_layout Section + +\lang english +Firewall-Setup mit nftables +\end_layout + +\begin_layout Standard + +\lang english +Mit nftables wurde die Unterstützung einer Tabelle names +\begin_inset Quotes sld +\end_inset + +inet +\begin_inset Quotes srd +\end_inset + + eingeführt in welcher Regeln für IPv4/IPv6 gleichzeitig gelten +\end_layout + +\begin_layout Subsection + +\lang english +Präparation zur Nutzung von nftables +\end_layout + +\begin_layout Standard + +\lang english +Installieren einer Linux-Distribution, welche die Unterstützung für nftables + bereits eingebaut hat. + Beim Schreiben dieses Absatzes (Mai 2014) war mindestens Fedora Rawhide + (Vorläufer der Version 21) mit entsprechendem Support und nftables version + 0.2.0 versehen. +\end_layout + +\begin_layout Subsection + +\lang english +Basis-nftables Konfiguration +\end_layout + +\begin_layout Standard + +\lang english +Laden der Kernel-Module +\end_layout + +\begin_layout Code + +# modprobe nf_tables +\end_layout + +\begin_layout Code + +# modprobe nf_tables_ipv4 +\end_layout + +\begin_layout Code + +# modprobe nf_tables_ipv6 +\end_layout + +\begin_layout Code + +# modprobe nf_tables_inet +\end_layout + +\begin_layout Standard + +\lang english +Erzeugen der Filter-Tabellen +\end_layout + +\begin_layout Code + +# nft add table ip filter +\end_layout + +\begin_layout Code + +# nft add table ip6 filter +\end_layout + +\begin_layout Code + +# nft add table inet filter +\end_layout + +\begin_layout Standard + +\lang english +Erzeugen einer input chain in jeder Filter-Tabelle +\end_layout + +\begin_layout Code + +# nft add chain ip filter input { type filter hook input priority 1 +\backslash +; } +\end_layout + +\begin_layout Code + +# nft add chain ip6 filter input { type filter hook input priority 1 +\backslash +; } +\end_layout + +\begin_layout Code + +# nft add chain inet filter input { type filter hook input priority 0 +\backslash +; } +\end_layout + +\begin_layout Subsection + +\lang english +Einfache Filter-Policy mit nftables +\end_layout + +\begin_layout Subsubsection + +\lang english +Konfiguration +\end_layout + +\begin_layout Standard + +\lang english +Erlauben von Paketen, die zu existierenden Einträgen in der Connection-Tracking- +Tabelle gehören +\end_layout + +\begin_layout Code + +# nft add rule inet filter input ct state established,related counter accept + +\end_layout + +\begin_layout Standard + +\lang english +Erlauben von IPv4 und IPv6 ICMP echo-request (aka ping) +\end_layout + +\begin_layout Code + +# nft add rule ip filter input icmp type { echo-request } counter accept + +\end_layout + +\begin_layout Code + +# nft add rule ip6 filter input icmpv6 type echo-request counter accept + +\end_layout + +\begin_layout Standard + +\lang english +Erlauben einiger wichtiger IPv6 ICMP Pakete, ohne Zähler, dafür mit Hop-Limit-Pr +üfung (erhöht die Sicherheit) +\end_layout + +\begin_layout Code + +# nft add rule ip6 filter input icmpv6 type { nd-neighbor-solicit, nd-router-adv +ert, nd-neighbor-advert } ip6 hoplimit 1 accept # nft add rule ip6 filter + input icmpv6 type { nd-neighbor-solicit, nd-router-advert, nd-neighbor-advert + } ip6 hoplimit 255 accept +\end_layout + +\begin_layout Standard + +\lang english +Erlauben von eingehenden SSH-Verbindungen für IPv4 und IPv6 unter Nutzung + der IP-Version unabhängigen Tabelle +\begin_inset Quotes sld +\end_inset + +inet +\begin_inset Quotes srd +\end_inset + + +\end_layout + +\begin_layout Code + +# nft add rule inet filter input tcp dport 22 ct state new tcp flags +\backslash +& +\backslash +(syn +\backslash +| ack +\backslash +) == syn counter accept +\end_layout + +\begin_layout Subsubsection + +\lang english +Ergebnis +\end_layout + +\begin_layout Standard + +\lang english +Tabelle für IPv4 Filter +\end_layout + +\begin_layout Code + +# nft list table ip filter +\end_layout + +\begin_layout Code + +table ip filter { +\end_layout + +\begin_layout Code + + chain input { +\end_layout + +\begin_layout Code + + type filter hook input priority 1; +\end_layout + +\begin_layout Code + + icmp type { echo-request} counter packets 0 bytes 0 accept +\end_layout + +\begin_layout Code + + } +\end_layout + +\begin_layout Code + +} +\end_layout + +\begin_layout Standard + +\lang english +Tabelle für IPv6 Filter +\end_layout + +\begin_layout Code + +# nft list table ip6 filter +\end_layout + +\begin_layout Code + +table ip6 filter { +\end_layout + +\begin_layout Code + + chain input { +\end_layout + +\begin_layout Code + + type filter hook input priority 1; +\end_layout + +\begin_layout Code + + icmpv6 type echo-request counter packets 0 bytes 0 accept +\end_layout + +\begin_layout Code + + ip6 hoplimit 1 icmpv6 type { nd-neighbor-advert, nd-neighbor-solicit, + nd-router-advert} accept +\end_layout + +\begin_layout Code + + ip6 hoplimit 255 icmpv6 type { nd-neighbor-advert, nd-neighbor-solicit, + nd-router-advert} accept +\end_layout + +\begin_layout Code + + } +\end_layout + +\begin_layout Code + +} +\end_layout + +\begin_layout Standard + +\lang english +Tabelle für IP unabhängigen Filter +\end_layout + +\begin_layout Code + +# nft list table inet filter +\end_layout + +\begin_layout Code + +table inet filter { +\end_layout + +\begin_layout Code + + chain input { +\end_layout + +\begin_layout Code + + type filter hook input priority 0; +\end_layout + +\begin_layout Code + + ct state established,related counter packets 44 bytes 2288 accept +\end_layout + +\begin_layout Code + + tcp dport ssh ct state new tcp flags & (syn | ack) == syn counter packets + 0 bytes 0 accept +\end_layout + +\begin_layout Code + + } +\end_layout + +\begin_layout Code + +} +\end_layout + \begin_layout Chapter \begin_inset CommandInset label LatexCommand label @@ -20858,7 +21230,7 @@ Die größten Mailinglisten sind in folgender Tabelle zusammengefasst: \begin_layout Standard \begin_inset Tabular - + diff --git a/LDP/users/Peter-Bieringer/Linux+IPv6-HOWTO.de.pdf b/LDP/users/Peter-Bieringer/Linux+IPv6-HOWTO.de.pdf index c5a52258..c3317d3b 100644 Binary files a/LDP/users/Peter-Bieringer/Linux+IPv6-HOWTO.de.pdf and b/LDP/users/Peter-Bieringer/Linux+IPv6-HOWTO.de.pdf differ diff --git a/LDP/users/Peter-Bieringer/Linux+IPv6-HOWTO.de.sgml b/LDP/users/Peter-Bieringer/Linux+IPv6-HOWTO.de.sgml index e703b660..442f6407 100644 --- a/LDP/users/Peter-Bieringer/Linux+IPv6-HOWTO.de.sgml +++ b/LDP/users/Peter-Bieringer/Linux+IPv6-HOWTO.de.sgml @@ -7,14 +7,14 @@ ]> - Linux IPv6 HOWTO (de) PeterBieringer

    pb at bieringer dot de
    - 0.66wip.de.1 2013-11-12 PB + 0.66wip.de.1 2014-05-02 PB 0.65.de.1 2009-12-13 PB 0.64.de.1 2009-06-11 PB 0.61.de.1 2007-10-06 PB @@ -26,16 +26,16 @@ <!-- anchor id="general-copright" -->Copyright, Lizenz und anderes Copyright -Verfasst von und urheberrechtlich geschützt durch Peter Bieringer © 2001-2013. +Verfasst von und urheberrechtlich geschützt durch Peter Bieringer © 2001-2014. Deutsche Übersetzung: -Verfasst von und urheberrechtlich geschützt durch Georg Käfer © 2002-2003, weitergeführt von Peter Bieringer © 2004-2013. +Verfasst von und urheberrechtlich geschützt durch Georg Käfer © 2002-2003, weitergeführt von Peter Bieringer © 2004-2014. Lizenz Dieses Linux IPv6 HOWTO wird unter der GNU GPL Version 2 herausgegeben: Dieses Linux IPv6 HOWTO ist ein Handbuch zur Anwendung und Konfiguration von IPv6 auf Linux-Systemen. -Copyright © 2001-2013 Peter Bieringer +Copyright © 2001-2014 Peter Bieringer Deutsche Übersetzung Copyright © 2002-2003 Georg Käfer, weitergeführt von Peter Bieringer © 2004-2013. Diese Dokumentation ist freie Software; Sie können diese unter den Bedingungen der GNU General Public License, wie von der Free Software Foundation publiziert, entweder unter Version 2 oder optional jede höhere Version redistribuieren und/oder modifizieren. @@ -1624,7 +1624,9 @@ In Version 8.x wurde das Konfigurations-Setup bei SuSE komplett abgeändert.Von Haus aus unterstützt wird die IPv6-Firewall-Funktionalität im Kernel erst ab Version 2.4+. In älteren 2.2+ Versionen können sie nur mit Protocol 41 das generelle Tunnel von IPv6-in-IPv4-Paketen filtern. Achtung: Es gibt keine Garantie, dass die beschriebenen Regeln und Beispiele ihr System auch wirklich schützen können! Beobachten Sie nach der Installation ihr Regelset, siehe Abschnitt . -Kernels ab Version 2.6.20 unterstützen den IPv6-Verbindungsstatus (connection tracking) vollständig. +Kernels ab Version 2.6.20 (Februar 2007) unterstützen den IPv6-Verbindungsstatus (connection tracking) vollständig. +Kernels ab Version 3.9.0 (April 2013) unterstützen NAT für IPv6 in Verbindung mit ip6tables >= 1.4.18 +Kernels ab Version 3.13 (April 2014) unterstützen ein neues Framework namens: nftables Weitere Informationen Netfilter projectmaillist archive of netfilter usersmaillist archive of netfilter developersUnofficial status informations @@ -1972,7 +1974,68 @@ Chain intOUT (1 references) IPv6 Port Weiterleitung Ein dedizierter Port kann zu einem internen System weitergeleitet werden, z.B. +]]> +Firewall-Setup mit nftables +Mit nftables wurde die Unterstützung einer Tabelle names “inet” eingeführt in welcher Regeln für IPv4/IPv6 gleichzeitig gelten +Präparation zur Nutzung von nftables +Installieren einer Linux-Distribution, welche die Unterstützung für nftables bereits eingebaut hat. Beim Schreiben dieses Absatzes (Mai 2014) war mindestens Fedora Rawhide (Vorläufer der Version 21) mit entsprechendem Support und nftables version 0.2.0 versehen. +Basis-nftables Konfiguration +Laden der Kernel-Module +Erzeugen der Filter-Tabellen +Erzeugen einer input chain in jeder Filter-Tabelle + +Einfache Filter-Policy mit nftables + +Konfiguration +Erlauben von Paketen, die zu existierenden Einträgen in der Connection-Tracking-Tabelle gehören +Erlauben von IPv4 und IPv6 ICMP echo-request (aka ping) +Erlauben einiger wichtiger IPv6 ICMP Pakete, ohne Zähler, dafür mit Hop-Limit-Prüfung (erhöht die Sicherheit) +Erlauben von eingehenden SSH-Verbindungen für IPv4 und IPv6 unter Nutzung der IP-Version unabhängigen Tabelle “inet” + +Ergebnis +Tabelle für IPv4 Filter +Tabelle für IPv6 Filter +Tabelle für IP unabhängigen Filter + <!-- anchor id="chapter-security" -->Sicherheit Sicherheit des Knoten diff --git a/LDP/users/Peter-Bieringer/Linux+IPv6-HOWTO.html b/LDP/users/Peter-Bieringer/Linux+IPv6-HOWTO.html index 8da91c19..2485dfef 100644 --- a/LDP/users/Peter-Bieringer/Linux+IPv6-HOWTO.html +++ b/LDP/users/Peter-Bieringer/Linux+IPv6-HOWTO.html @@ -4,8 +4,6 @@ >Linux IPv6 HOWTO (en)Revision 0.66wip
    2014-05-02
    9.2. Displaying existing tunnels
    10.1. Displaying existing tunnels
    10.2. Setup of point-to-point tunnel
    10.3. Removing point-to-point tunnels
    11.1. How to access the /proc-filesystem
    14.1. Server socket binding
    15.1. Red Hat Linux and “clones”
    15.2. SuSE Linux
    16.1. Stateless auto-configuration out-of-the-box
    16.2. Stateless auto-configuration using Router Advertisement Daemon (radvd)
    16.3. Dynamic Host Configuration Protocol v6 (DHCPv6)
    17.1. Common information
    18.2. Preparation
    18.3. UsageUsage of ip6tables
    18.4. Network Address Translation (NAT) using netfilter6
    18.5. Firewalling using nftables
    19.1. Node security
    19.2. Access limitations
    20.1. Modes of using encryption and authentication
    20.2. Support in kernel (ESP and AH)
    20.3. Automatic key exchange (IKE)
    20.4. Additional informations:
    21.1. General
    21.2. Linux QoS using “tc”
    23.2. Other programming languages
    25.4. IPv6 Infrastructure
    26. Revision history / Credits / The End
    26.3. The End
    1.1.1. Copyright

    Written and Copyright (C) 2001-2013 by Peter Bieringer

    Written and Copyright (C) 2001-2014 by Peter Bieringer

    The Linux IPv6 HOWTO, a guide how to configure and use IPv6 on Linux systems.

    Copyright © 2001-2013 Peter Bieringer

    Copyright © 2001-2014 Peter Bieringer

    This documentation is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version.

    A foreign tunnel endpoint which is capable to route your IPv6 prefix to your local tunnel endpoint (mostly remote manual configuration required)

    Tunnel provider for static point-to-point tunneling:


    9.1.2. Automatically tunneling


    9.1.3.1. Generation of 6to4 prefix


    9.1.3.2. 6to4 upstream tunneling


    9.1.3.3. 6to4 downstream tunneling


    9.1.3.4. Possible 6to4 traffic


    9.1.4. UDP encapsulated IPv6 tunneling


    9.1.4.1. Teredo Tunnel


    9.1.4.2. AYIYA Tunnel


    9.1.4.3. gogo6 Tunnel


    9.2. Displaying existing tunnels

    9.2.1. Using "ip"


    9.2.2. Using "route"


    9.3.1. Add point-to-point tunnels

    9.3.1.1. Using "ip"


    9.3.1.2. Using "ifconfig" and "route" (deprecated)


    9.3.1.3. Using "route" only


    9.3.2. Removing point-to-point tunnels


    9.3.2.1. Using "ip"


    9.3.2.2. Using "ifconfig" and "route" (deprecated because not very funny)


    9.3.2.3. Using "route"


    9.3.3. Numbered point-to-point tunnels


    9.4.1. Add a 6to4 tunnel


    9.4.1.1. Using "ip" and a dedicated tunnel device


    9.4.1.2. Using "ifconfig" and "route" and generic tunnel device “sit0” (deprecated)


    9.4.2. Remove a 6to4 tunnel

    9.4.2.1. Using "ip" and a dedicated tunnel device


    9.4.2.2. Using “ifconfig” and “route” and generic tunnel device “sit0” (deprecated)


    10.1. Displaying existing tunnels


    10.2. Setup of point-to-point tunnel


    10.3. Removing point-to-point tunnels


    11.1. How to access the /proc-filesystem

    11.1.1. Using “cat” and “echo”


    11.1.1.1. Retrieving a value


    11.1.1.2. Setting a value


    11.1.2. Using “sysctl”


    11.1.2.1. Retrieving a value


    11.1.2.2. Setting a value


    11.1.2.3. Additionals


    11.1.3. Values found in /proc-filesystems

    11.2.1. conf/default/*


    11.2.2. conf/all/*


    11.2.2.1. conf/all/forwarding


    11.2.3. conf/interface/*


    11.2.3.1. accept_ra


    11.2.3.2. accept_redirects


    11.2.3.3. autoconf


    11.2.3.4. dad_transmits


    11.2.3.5. forwarding


    11.2.3.6. hop_limit


    11.2.3.7. mtu


    11.2.3.8. router_solicitation_delay


    11.2.3.9. router_solicitation_interval


    11.2.3.10. router_solicitations


    11.2.4. neigh/default/*


    11.2.4.1. gc_thresh1


    11.2.4.2. gc_thresh2


    11.2.4.3. gc_thresh3


    11.2.4.4. gc_interval


    11.2.5. neigh/interface/*


    11.2.5.1. anycast_delay


    11.2.5.2. gc_stale_time


    11.2.5.3. proxy_qlen


    11.2.5.4. unres_qlen


    11.2.5.5. app_solicit


    11.2.5.6. locktime


    11.2.5.7. retrans_time


    11.2.5.8. base_reachable_time


    11.2.5.9. mcast_solicit


    11.2.5.10. ucast_solicit


    11.2.5.11. delay_first_probe_time


    11.2.5.12. proxy_delay


    11.2.6. route/*


    11.2.6.1. flush


    11.2.6.2. gc_interval


    11.2.6.3. gc_thresh


    11.2.6.4. mtu_expires


    11.2.6.5. gc_elasticity


    11.2.6.6. gc_min_interval


    11.2.6.7. gc_timeout


    11.2.6.8. min_adv_mss


    11.2.6.9. max_size


    11.3.1. ip_*

    2013-05-13Revised by: PB

    14.2.1.2. Router solicitation


    14.2.2. Neighbor discovery

    14.2.2.1. Neighbor discovery solicitation for duplicate address detection


    14.2.2.2. Neighbor discovery solicitation for looking for host or gateway


    15.1. Red Hat Linux and “clones”


    15.1.1. Test for IPv6 support of network configuration scripts


    15.1.2. Short hint for enabling IPv6 on current RHL 7.1, 7.2, 7.3, ...


    15.2. SuSE Linux


    15.2.1. SuSE Linux 7.3


    15.2.2. SuSE Linux 8.0


    18.3.2.3. Insert a log rule at the input filter with options


    18.3.2.4. Insert a drop rule at the input filter


    18.3.2.5. Delete a rule by number


    18.3.2.6. Enable connection tracking


    18.3.2.7. Allow ICMPv6


    18.3.2.8. Rate-limiting


    18.3.2.9. Allow incoming SSH


    18.3.2.10. Enable tunneled IPv6-in-IPv4


    18.3.2.11. Protection against incoming TCP connection requests


    18.3.2.12. Protection against incoming UDP connection requests


    18.3.3. Examples


    18.5. Firewalling using nftables

    nftables adds support for a IPv4/IPv6 aware table named “inet”, here only one rule matches both protocols


    18.5.1. Preparation for nftables usage

    Install a Linux distribution which has nftables support already included. At time of writing (May 2014) at least Fedora Rawhide (upcoming version 21) has support in conjunction with nftables version 0.2.0.


    18.5.2. Basic nftables configuration

    Load kernel modules

    # modprobe nf_tables
    +# modprobe nf_tables_ipv4
    +# modprobe nf_tables_ipv6
    +# modprobe nf_tables_inet 

    Create filter tables

    # nft add table ip   filter
    +# nft add table ip6  filter
    +# nft add table inet filter 

    Create input chain in each filter table

    # nft add chain ip   filter input { type filter hook input priority 1 \; }
    +# nft add chain ip6  filter input { type filter hook input priority 1 \; } 
    +# nft add chain inet filter input { type filter hook input priority 0 \; }

    18.5.3. Simple filter policy with nftables

    18.5.3.1. Configuration

    Allow packets which are related to existing connection tracking entries

    # nft add rule inet filter input ct state established,related counter accept 

    Allow IPv4 and IPv6 ICMP echo-request (aka ping)

    # nft add rule ip filter input icmp type { echo-request } counter accept 
    +# nft add rule ip6 filter input icmpv6 type echo-request counter accept 

    Allow some important IPv6 ICMP traffic, without counter, but checking hop-limit for security

    # nft add rule ip6 filter input icmpv6 type { nd-neighbor-solicit, nd-router-advert, nd-neighbor-advert } ip6 hoplimit 1 accept # nft add rule ip6 filter input icmpv6 type { nd-neighbor-solicit, nd-router-advert, nd-neighbor-advert } ip6 hoplimit 255 accept

    Allow incoming SSH for IPv4 and IPv6, using therefore the IP version aware table “inet”

    # nft add rule inet filter input tcp dport 22 ct state new tcp flags \& \(syn \| ack\) == syn counter accept

    18.5.3.2. Result

    Table for IPv4 filter

    # nft list table ip filter
    +table ip filter {
    +	chain input {
    +		 type filter hook input priority 1;
    +		 icmp type { echo-request} counter packets 0 bytes 0 accept
    +	}
    +}

    Table for IPv6 filter

    # nft list table ip6 filter
    +table ip6 filter {
    +	chain input {
    +		 type filter hook input priority 1;
    +		 icmpv6 type echo-request counter packets 0 bytes 0 accept
    +		 ip6 hoplimit 1 icmpv6 type { nd-neighbor-advert, nd-neighbor-solicit, nd-router-advert} accept
    +		 ip6 hoplimit 255 icmpv6 type { nd-neighbor-advert, nd-neighbor-solicit, nd-router-advert} accept
    +	}
    +}

    Table for IP version aware filter

    # nft list table inet filter
    +table inet filter {
    +	chain input {
    +		 type filter hook input priority 0;
    +		 ct state established,related counter packets 44 bytes 2288 accept
    +		 tcp dport ssh ct state new tcp flags & (syn | ack) == syn counter packets 0 bytes 0 accept
    +	}
    +} 

    19.1. Node security


    19.2. Access limitations


    19.3.1. Legal issues


    19.3.2. Security auditing using IPv6-enabled netcat


    19.3.3. Security auditing using IPv6-enabled nmap


    19.3.4. Security auditing using IPv6-enabled strobe


    19.3.5. Security auditing using online tools


    19.3.6. Audit results


    20.1. Modes of using encryption and authentication


    20.1.1. Transport mode


    20.1.2. Tunnel mode


    20.2. Support in kernel (ESP and AH)

    20.2.1. Support in vanilla Linux kernel 2.4.x


    20.2.2. Support in vanilla Linux kernel 2.6.x


    20.3. Automatic key exchange (IKE)


    20.3.1. IKE daemon “racoon”


    20.3.1.1. Manipulation of the IPsec SA/SP database with the tool “setkey”


    20.3.1.2. Configuration of the IKE daemon “racoon”


    20.3.1.3. Running IPsec with IKE daemon “racoon”


    20.3.2. IKE daemon “pluto”


    20.3.2.1. Configuration of the IKE daemon “pluto”


    20.3.2.2. Running IPsec with IKE daemon “pluto”


    20.4. Additional informations:


    21.1. General


    21.2. Linux QoS using “tc”


    21.2.1. Example for a constant bitrate queuing


    21.2.1.1. Root qdisc definition


    21.2.1.2. QoS class definition


    21.2.1.3. QoS filter definition


    21.2.1.4. Testing filter definitions using iperf


    22.1.1. Listening on IPv6 addresses


    22.1.1.1. Enable BIND named for listening on IPv6 address


    22.1.1.2. Disable BIND named for listening on IPv6 address


    22.1.2. IPv6 enabled Access Control Lists (ACL)


    22.1.3. Sending queries with dedicated IPv6 address


    22.1.4. Per zone defined dedicated IPv6 addresses


    22.1.4.1. Transfer source address


    22.1.4.2. Notify source address


    22.1.5. IPv6 DNS zone files examples


    22.1.6. Serving IPv6 related DNS data


    22.1.6.1. Current best practice


    22.1.7. Checking IPv6-enabled connect


    22.1.7.1. IPv6 connect, but denied by ACL


    22.1.7.2. Successful IPv6 connect


    22.3.1. Listening on IPv6 addresses


    22.3.1.1. Virtual host listen on an IPv6 address only


    22.3.1.2. Virtual host listen on an IPv6 and on an IPv4 address


    22.3.1.3. Additional notes


    22.4.1. Configuring radvd

    22.4.1.1. Simple configuration


    22.4.1.2. Special 6to4 configuration


    22.4.2. Debugging


    22.5.1. Configuration of the DHCPv6 server (dhcp6s)

    22.5.1.1. Simple configuration


    22.5.2. Configuration of the DHCPv6 client (dhcp6c)

    22.5.2.1. Simple configuration


    22.5.3. Usage

    22.5.3.1. dhcpv6_server


    22.5.3.2. dhcpv6_client


    22.5.4. Debugging

    22.5.4.1. dhcpv6_server


    22.5.4.2. dhcpv6_client


    22.6.1. Configuration of the ISC DHCP server for IPv6 (dhcpd)


    22.6.1.1. Simple configuration


    22.6.2. Usage

    22.6.2.1. dhcpd


    22.7.1. Configuration of the Dibbler DHCP server for IPv6

    22.7.1.1. Simple configuration


    22.7.2. Usage

    22.7.2.1. dibbler-server


    22.8.1. Filtering capabilities


    22.8.2. Which program uses tcp_wrapper


    22.8.3. Usage


    22.8.3.1. Example for /etc/hosts.allow


    22.8.3.2. Example for /etc/hosts.deny


    22.8.4. Logging


    22.8.4.1. Refused connection


    22.8.4.2. Permitted connection

    22.9.1. Listening on IPv6 addresses

    22.10.1. Listening on IPv6 addresses


    23.1.1. Address Structures


    23.1.1.1. IPv4 sockaddr_in


    23.1.1.2. IPv6 sockaddr_in6


    23.1.1.3. Generic Addresses


    23.1.2. Lookup Functions


    23.1.3. Quirks Encountered


    23.1.3.1. IPv4 Mapped Addresses


    23.1.3.2. Cannot Specify the Scope Identifier in /etc/hosts


    23.1.3.3. Client & Server Residing on the Same Machine


    23.1.4. Putting It All Together (A Client-Server Programming Example)

    Porting applications to IPv6 HowTo. For the record, the source code presented here is original, developed from scratch, and any similarity between it and any other publicly available 'daytime' example is purely coincidental.]. The source code presented in this section was developed and tested on a RedHat Linux release using the 2.6 kernel (2.6.9 to be specific). Readers may use the source code freely, so long as proper credit is attributed; but of course the standard disclaimer must be given first:


    23.1.4.1. 'Daytime' Server Code


    23.1.4.2. 'Daytime' TCP Client Code


    23.1.4.3. 'Daytime' UDP Client Code


    23.2. Other programming languages

    23.2.1. JAVA


    23.2.2. Perl

    25.1.1. Printed Books (English)

    25.1.1.1. Cisco


    25.1.1.2. General


    25.1.2. Articles, eBooks, Online Reviews (mixed)


    25.1.4. Others


    25.2.1. 2004


    25.3.2. Latest news and URLs to other documents


    25.3.3. Protocol references

    25.3.3.1. IPv6-related Request For Comments (RFCs)


    25.3.3.2. Current drafts of working groups


    25.3.3.3. Others


    25.3.4. More information


    25.3.4.1. Linux related


    25.3.4.2. Linux related per distribution


    25.3.4.3. General

  • A Tale of Two Wireless Technology Trends: Processor Development Outsourcing and IPv6Yankee Group - 4/1/2002 - 12 Pages - ID: YANL768881

    statista - The Statistics Portal

  • The World Atlas of the Internet: Americas; IDATE - 2/1/2002 - 242 PAges - ID: IDT803907. Countries covered: Central America, North America, South America; List: Price: $ 3,500.00; excerpt: Panorama of Internet access markets across the globe. Market assessment and forecasts up to 2006 for 34 countries: market structure: main ISPs and market shares; number of subscribers, of ISPs.

  • Early Interest Rising for IPv6 by IDC (Author); List Price: $1,500.00; Edition: e-book (Acrobat Reader); Publisher: IDC; ISBN B000065T8E; (March 1, 2002)

    Market Research


  • 25.3.5. By countries

    25.6.1. Testing tools


    25.6.2. Information retrievement


    25.6.3. IPv6 Looking Glasses


    25.6.4. Helper applications


    Chapter 26. Revision history / Credits / The End


    26.1.1. Releases 0.x

    0.66

    2010-04-20/PB: extend QoS section with examples, 20130513/PB: add IPv6 NAT hints, 20130521/PB: review dhcpd, 20131019/bie: general review

    2010-04-20/PB: extend QoS section with examples, 20130513/PB: add IPv6 NAT hints, 20130521/PB: review dhcpd, 20131019/bie: general review, 20140502/bie: add hints for nftables

    0.65

    26.2.2. Other credits

    26.2.2.1. Document technique related


    26.3. The End

    0.66wip 2013-11-12 0.66wip 2014-05-02 PB \end_layout @@ -255,7 +264,7 @@ Copyright \end_layout \begin_layout Standard -Written and Copyright (C) 2001-2013 by Peter Bieringer +Written and Copyright (C) 2001-2014 by Peter Bieringer \end_layout \begin_layout Subsection @@ -288,7 +297,7 @@ Copyright \lang ngerman © \lang english - 2001-2013 Peter Bieringer + 2001-2014 Peter Bieringer \begin_inset Newline newline \end_inset @@ -10174,8 +10183,17 @@ reference "IPv6-security-auditing" \end_layout \begin_layout Standard -Since kernel version 2.6.20 IPv6 connection tracking is fully working (and - does not break IPv4 NAT anymore like versions before) +Since kernel version 2.6.20 (February 2007) IPv6 connection tracking is fully + working (and does not break IPv4 NAT anymore like versions before) +\end_layout + +\begin_layout Standard +Since kernel version 3.9.0 (April 2013) NAT for IPv6 is supported with ip6tables + >= 1.4.18 +\end_layout + +\begin_layout Standard +Since kernel version 3.13 (April 2014) new framework introduced named: nftables \end_layout \begin_layout Subsection @@ -10560,7 +10578,7 @@ Perhaps it's necessary to create a softlink for iptables libraries where \end_layout \begin_layout Section -Usage +Usage of ip6tables \end_layout \begin_layout Subsection @@ -11624,6 +11642,277 @@ A dedicated specified port can be forwarded to an internal system, e.g. nation [fec0::1234]:80 \end_layout +\begin_layout Section +Firewalling using nftables +\end_layout + +\begin_layout Standard +nftables adds support for a IPv4/IPv6 aware table named +\begin_inset Quotes sld +\end_inset + +inet +\begin_inset Quotes srd +\end_inset + +, here only one rule matches both protocols +\end_layout + +\begin_layout Subsection +Preparation for nftables usage +\end_layout + +\begin_layout Standard +Install a Linux distribution which has nftables support already included. + At time of writing (May 2014) at least Fedora Rawhide (upcoming version + 21) has support in conjunction with nftables version 0.2.0. +\end_layout + +\begin_layout Subsection +Basic nftables configuration +\end_layout + +\begin_layout Standard +Load kernel modules +\end_layout + +\begin_layout Code +# modprobe nf_tables +\end_layout + +\begin_layout Code +# modprobe nf_tables_ipv4 +\end_layout + +\begin_layout Code +# modprobe nf_tables_ipv6 +\end_layout + +\begin_layout Code +# modprobe nf_tables_inet +\end_layout + +\begin_layout Standard +Create filter tables +\end_layout + +\begin_layout Code +# nft add table ip filter +\end_layout + +\begin_layout Code +# nft add table ip6 filter +\end_layout + +\begin_layout Code +# nft add table inet filter +\end_layout + +\begin_layout Standard +Create input chain in each filter table +\end_layout + +\begin_layout Code +# nft add chain ip filter input { type filter hook input priority 1 +\backslash +; } +\end_layout + +\begin_layout Code +# nft add chain ip6 filter input { type filter hook input priority 1 +\backslash +; } +\end_layout + +\begin_layout Code +# nft add chain inet filter input { type filter hook input priority 0 +\backslash +; } +\end_layout + +\begin_layout Subsection +Simple filter policy with nftables +\end_layout + +\begin_layout Subsubsection +Configuration +\end_layout + +\begin_layout Standard +Allow packets which are related to existing connection tracking entries +\end_layout + +\begin_layout Code +# nft add rule inet filter input ct state established,related counter accept + +\end_layout + +\begin_layout Standard +Allow IPv4 and IPv6 ICMP echo-request (aka ping) +\end_layout + +\begin_layout Code +# nft add rule ip filter input icmp type { echo-request } counter accept + +\end_layout + +\begin_layout Code +# nft add rule ip6 filter input icmpv6 type echo-request counter accept + +\end_layout + +\begin_layout Standard +Allow some important IPv6 ICMP traffic, without counter, but checking hop-limit + for security +\end_layout + +\begin_layout Code +# nft add rule ip6 filter input icmpv6 type { nd-neighbor-solicit, nd-router-adv +ert, nd-neighbor-advert } ip6 hoplimit 1 accept # nft add rule ip6 filter + input icmpv6 type { nd-neighbor-solicit, nd-router-advert, nd-neighbor-advert + } ip6 hoplimit 255 accept +\end_layout + +\begin_layout Standard +Allow incoming SSH for IPv4 and IPv6, using therefore the IP version aware + table +\begin_inset Quotes sld +\end_inset + +inet +\begin_inset Quotes srd +\end_inset + + +\end_layout + +\begin_layout Code +# nft add rule inet filter input tcp dport 22 ct state new tcp flags +\backslash +& +\backslash +(syn +\backslash +| ack +\backslash +) == syn counter accept +\end_layout + +\begin_layout Subsubsection +Result +\end_layout + +\begin_layout Standard +Table for IPv4 filter +\end_layout + +\begin_layout Code +# nft list table ip filter +\end_layout + +\begin_layout Code +table ip filter { +\end_layout + +\begin_layout Code + chain input { +\end_layout + +\begin_layout Code + type filter hook input priority 1; +\end_layout + +\begin_layout Code + icmp type { echo-request} counter packets 0 bytes 0 accept +\end_layout + +\begin_layout Code + } +\end_layout + +\begin_layout Code +} +\end_layout + +\begin_layout Standard +Table for IPv6 filter +\end_layout + +\begin_layout Code +# nft list table ip6 filter +\end_layout + +\begin_layout Code +table ip6 filter { +\end_layout + +\begin_layout Code + chain input { +\end_layout + +\begin_layout Code + type filter hook input priority 1; +\end_layout + +\begin_layout Code + icmpv6 type echo-request counter packets 0 bytes 0 accept +\end_layout + +\begin_layout Code + ip6 hoplimit 1 icmpv6 type { nd-neighbor-advert, nd-neighbor-solicit, + nd-router-advert} accept +\end_layout + +\begin_layout Code + ip6 hoplimit 255 icmpv6 type { nd-neighbor-advert, nd-neighbor-solicit, + nd-router-advert} accept +\end_layout + +\begin_layout Code + } +\end_layout + +\begin_layout Code +} +\end_layout + +\begin_layout Standard +Table for IP version aware filter +\end_layout + +\begin_layout Code +# nft list table inet filter +\end_layout + +\begin_layout Code +table inet filter { +\end_layout + +\begin_layout Code + chain input { +\end_layout + +\begin_layout Code + type filter hook input priority 0; +\end_layout + +\begin_layout Code + ct state established,related counter packets 44 bytes 2288 accept +\end_layout + +\begin_layout Code + tcp dport ssh ct state new tcp flags & (syn | ack) == syn counter packets + 0 bytes 0 accept +\end_layout + +\begin_layout Code + } +\end_layout + +\begin_layout Code +} +\end_layout + \begin_layout Chapter \begin_inset CommandInset label LatexCommand label @@ -27849,7 +28138,7 @@ Major Mailinglists are listed in following table: \begin_layout Standard \begin_inset Tabular - + @@ -28825,7 +29114,8 @@ Releases 0.x \begin_layout Description 0.66 2010-04-20/PB: extend QoS section with examples, 20130513/PB: add IPv6 - NAT hints, 20130521/PB: review dhcpd, 20131019/bie: general review + NAT hints, 20130521/PB: review dhcpd, 20131019/bie: general review, 20140502/bi +e: add hints for nftables \end_layout \begin_layout Description diff --git a/LDP/users/Peter-Bieringer/Linux+IPv6-HOWTO.pdf b/LDP/users/Peter-Bieringer/Linux+IPv6-HOWTO.pdf index d72edd5a..511ae16f 100644 Binary files a/LDP/users/Peter-Bieringer/Linux+IPv6-HOWTO.pdf and b/LDP/users/Peter-Bieringer/Linux+IPv6-HOWTO.pdf differ diff --git a/LDP/users/Peter-Bieringer/Linux+IPv6-HOWTO.sgml b/LDP/users/Peter-Bieringer/Linux+IPv6-HOWTO.sgml index 126cdc0c..1bed3dca 100644 --- a/LDP/users/Peter-Bieringer/Linux+IPv6-HOWTO.sgml +++ b/LDP/users/Peter-Bieringer/Linux+IPv6-HOWTO.sgml @@ -6,14 +6,14 @@ ]> - Linux IPv6 HOWTO (en) PeterBieringer

    pb at bieringer dot de
    - 0.66wip 2013-11-12 PB + 0.66wip 2014-05-02 PB 0.65 2009-12-13 PB 0.64 2009-06-11 PB 0.60 2007-05-31 PB @@ -26,13 +26,13 @@ <!-- anchor id="general-copright" -->Copyright, license and others Copyright -Written and Copyright (C) 2001-2013 by Peter Bieringer +Written and Copyright (C) 2001-2014 by Peter Bieringer License This Linux IPv6 HOWTO is published under GNU GPL version 2: The Linux IPv6 HOWTO, a guide how to configure and use IPv6 on Linux systems. -Copyright © 2001-2013 Peter Bieringer +Copyright © 2001-2014 Peter Bieringer This documentation is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. @@ -1631,7 +1631,9 @@ In versions 8.x they completly change their configuration setup. Native IPv6 firewalling is only supported in kernel versions 2.4+. In older 2.2- you can only filter IPv6-in-IPv4 by protocol 41. Attention: no warranty that described rules or examples can really protect your system! Audit your ruleset after installation, see for more. -Since kernel version 2.6.20 IPv6 connection tracking is fully working (and does not break IPv4 NAT anymore like versions before) +Since kernel version 2.6.20 (February 2007) IPv6 connection tracking is fully working (and does not break IPv4 NAT anymore like versions before) +Since kernel version 3.9.0 (April 2013) NAT for IPv6 is supported with ip6tables >= 1.4.18 +Since kernel version 3.13 (April 2014) new framework introduced named: nftables More information Netfilter projectmaillist archive of netfilter usersmaillist archive of netfilter developersUnofficial status informations @@ -1710,7 +1712,7 @@ Extensions found: IPv6:owner IPv6:limit IPv6:mac IPv6:multiport ]]>Perhaps it's necessary to create a softlink for iptables libraries where iptables looks for them -Usage +Usage of ip6tables Check for support Load module, if so compiled @@ -1979,7 +1981,68 @@ Chain intOUT (1 references) IPv6 Port Forwarding A dedicated specified port can be forwarded to an internal system, e.g. +]]> +Firewalling using nftables +nftables adds support for a IPv4/IPv6 aware table named “inet”, here only one rule matches both protocols +Preparation for nftables usage +Install a Linux distribution which has nftables support already included. At time of writing (May 2014) at least Fedora Rawhide (upcoming version 21) has support in conjunction with nftables version 0.2.0. +Basic nftables configuration +Load kernel modules +Create filter tables +Create input chain in each filter table + +Simple filter policy with nftables + +Configuration +Allow packets which are related to existing connection tracking entries +Allow IPv4 and IPv6 ICMP echo-request (aka ping) +Allow some important IPv6 ICMP traffic, without counter, but checking hop-limit for security +Allow incoming SSH for IPv4 and IPv6, using therefore the IP version aware table “inet” + +Result +Table for IPv4 filter +Table for IPv6 filter +Table for IP version aware filter + <!-- anchor id="chapter-security" -->Security Node security @@ -5033,7 +5096,7 @@ Publisher: MarketResearch.com; ISBN B00006334Y; (November 1, 2001) Versions x.y.z are work-in-progress and published as LyX and SGML file on CVS. Because Deep Space 6 mirrors these SGML files and generate independend from TLDP public versions, this versions will show up there and also on its mirrors. Releases 0.x -0.662010-04-20/PB: extend QoS section with examples, 20130513/PB: add IPv6 NAT hints, 20130521/PB: review dhcpd, 20131019/bie: general review0.652009-12-13/PB: minor fixes0.642009-06-11/PB: extend DHCP server examples (ISC DHCP, Dibbler)0.632009-02-14/PB: Fix FSF address, major update on 4in6 tunnels, add new section for address resolving, add some URLs, remove broken URLs0.622008-11-09/PB: Adjust URL to Turkish howto, add some HIP related URLs, remove broken URLs0.61.12007-11-11/PB: fix broken description of shortcut BIND0.612007-10-06/PB: fix broken URLs to TLDP-CVS, minor URL update.0.60.22007-10-03/PB: fix description of sysctl/autoconf (credits to Francois-Xavier Le Bail)0.60.12007-06-16/PB: speling fixes (credits to Larry W. Burton)0.602007-05-29/PB: import major contribution to Programming using C-API written by John Wenker, minor fixes0.522007-05-23/PB: update firewalling chapter, improve document for proper SGML validation, minor bugfixes0.512006-11-08/PB: remove broken URLs, add a new book (credits to Bryan Vukich)0.50.22006-10-25/PB: fix typo in dhcp6 section (credits to Michele Ferritto)0.50.12006-09-23/PB: add some URLs0.502006-08-24/PB: check RFC URLs, fix URL to Chinese translation, finalize for publishing0.49.52006-08-23/PB: fix/remove broken URLs0.49.42006-08-21/PB: some review, update and enhancement of the content, replace old 6bone example addresses with the current defined ones.0.49.32006-08-20/PB: fix bug in maillist entries, 'mobility' is now a separate chapter0.49.22006-08-20/PB: update and cleanup of maillist entries0.49.12006-06-13/PB: major update of mobility section (contributed by Benjamin Thery)0.492005-10-03/PB: add configuration hints for DHCPv6, major broken URL cleanup (credits to Necdet Yucel)0.48.12005-01-15/PB: minor fixes0.482005-01-11/PB: grammar check and minor review of IPv6 IPsec section0.47.12005-01-01/PB: add information and examples about IPv6 IPsec, add some URLs0.472004-08-30/PB: add some notes about proftpd, vsftpd and other daemons, add some URLs, minor fixes, update status of Spanish translation0.46.42004-07-19/PB: minor fixes0.46.32004-06-23/PB: add note about started Greek translation, replace Taiwanese with Chinese for related translation0.46.22004-05-22/PB: minor fixes0.46.12004-04-18/PB: minor fixes0.462004-03-04/PB: announce Italian translation, add information about DHCPv6, minor updates0.45.12004-01-12/PB: add note about the official example address space0.452004-01-11/PB: minor fixes, add/fix some URLs, some extensions0.44.22003-10-30/PB: fix some copy&paste text bugs0.44.12003-10-19/PB: add note about start of Italian translation0.442003-08-15/PB: fix URLs, add hint on tcp_wrappers (about broken notation in some versions) and Apache20.43.42003-07-26/PB: fix URL, add archive URL for maillist users at ipv6.org, add some ds6 URLs0.43.32003-06-19/PB: fix typos0.43.22003-06-11/PB: fix URL0.43.12003-06-07/PB: fix some URLs, fix credits, add some notes at IPsec0.432003-06-05/PB: add some notes about configuration in SuSE Linux, add URL of French translation0.422003-05-09/PB: minor fixes, announce French translation0.41.42003-05-02/PB: Remove a broken URL, update some others.0.41.32003-04-23/PB: Minor fixes, remove a broken URL, fix URL to Taiwanese translation0.41.22003-04-13/PB: Fix some typos, add a note about a French translation is in progress0.41.12003-03-31/PB: Remove a broken URL, fix another0.412003-03-22/PB: Add URL of German translation0.40.22003-02-27/PB: Fix a misaddressed URL0.40.12003-02-12/PB: Add Debian-Linux-Configuration, add a minor note on translations0.402003-02-10/PB: Announcing available German version0.39.22003-02-10/GK: Minor syntax and spelling fixes0.39.12003-01-09/PB: fix an URL (draft adopted to an RFC)0.392003-01-13/PB: fix a bug (forgotten 'link” on “ip link set” (credits to Yaniv Kaul)0.38.12003-01-09/PB: a minor fix0.382003-01-06/PB: minor fixes0.37.12003-01-05/PB: minor updates0.372002-12-31/GK: 270 new links added (searched in 1232 SearchEngines) in existing and 53 new (sub)sections0.36.12002-12-20/PB: Minor fixes0.362002-12-16/PB: Check of and fix broken links (credits to Georg Käfer), some spelling fixes0.352002-12-11/PB: Some fixes and extensions0.34.12002-11-25/PB: Some fixes (e.g. broken linuxdoc URLs)0.342002-11-19/PB: Add information about German translation (work in progress), some fixes, create a small shortcut explanation list, extend “used terms” and add two German books0.332002-11-18/PB: Fix broken RFC-URLs, add parameter ttl on 6to4 tunnel setup example0.322002-11-03/PB: Add information about Taiwanese translation0.31.12002-10-06/PB: Add another maillist0.312002-09-29/PB: Extend information in proc-filesystem entries0.302002-09-27/PB: Add some maillists0.292002-09-18/PB: Update statement about nmap (triggered by Fyodor)0.28.12002-09-16/PB: Add note about ping6 to multicast addresses, add some labels0.282002-08-17/PB: Fix broken LDP/CVS links, add info about Polish translation, add URL of the IPv6 Address Oracle0.272002-08-10/PB: Some minor updates0.26.22002-07-15/PB: Add information neighbor discovery, split of firewalling (got some updates) and security into extra chapters0.26.12002-07-13/PB: Update nmap/IPv6 information0.262002-07-13/PB: Fill /proc-filesystem chapter, update DNS information about depricated A6/DNAME, change P-t-P tunnel setup to use of “ip” only0.25.22002-07-11/PB: Minor spelling fixes0.25.12002-06-23/PB: Minor spelling and other fixes0.252002-05-16/PB: Cosmetic fix for 2^128, thanks to José Abílio Oliveira Matos for help with LyX0.242002-05-02/PB: Add entries in URL list, minor spelling fixes0.232002-03-27/PB: Add entries in URL list and at maillists, add a label and minor information about IPv6 on RHL0.222002-03-04/PB: Add info about 6to4 support in kernel series 2.2.x and add an entry in URL list and at maillists0.212002-02-26/PB: Migrate next grammar checks submitted by John Ronan 0.20.42002-02-21/PB: Migrate more grammar checks submitted by John Ronan, add some additional hints at DNS section 0.20.32002-02-12/PB: Migrate a minor grammar check patch submitted by John Ronan0.20.22002-02-05/PB: Add mipl to maillist table0.20.12002-01-31/PB: Add a hint how to generate 6to4 addresses0.202002-01-30/PB: Add a hint about default route problem, some minor updates0.19.22002-01-29/PB: Add many new URLs0.19.12002-01-27/PB: Add some forgotten URLs0.192002-01-25/PB: Add two German books, fix quote entinities in exported SGML code0.18.22002-01-23/PB: Add a FAQ on the program chapter0.18.12002-01-23/PB: Move “the end” to the end, add USAGI to maillists0.182002-01-22/PB: Fix bugs in explanation of multicast address types0.17.22002-01-22/PB: Cosmetic fix double existing text in history (at 0.16), move all credits to the end of the document0.17.12002-01-20/PB: Add a reference, fix URL text in online-test-tools0.172002-01-19/PB: Add some forgotten information and URLs about global IPv6 addresses0.162002-01-19/PB: Minor fixes, remove “bold” and “emphasize” formats on code lines, fix “too long unwrapped code lines” using selfmade utility, extend list of URLs.0.152002-01-15/PB: Fix bug in addresstype/anycast, move content related credits to end of document0.142002-01-14/PB: Minor review at all, new chapter “debugging”, review “addresses”, spell checking, grammar checking (from beginning to 3.4.1) by Martin Krafft, add tcpdump examples, copy firewalling/netfilter6 from IPv6+Linux-HowTo, minor enhancements0.132002-01-05/PB: Add example BIND9/host, move revision history to end of document, minor extensions0.122002-01-03/PB: Merge review of David Ranch0.112002-01-02/PB: Spell checking and merge review of Pekka Savola0.102002-01-02/PB: First public release of chapter 1 +0.662010-04-20/PB: extend QoS section with examples, 20130513/PB: add IPv6 NAT hints, 20130521/PB: review dhcpd, 20131019/bie: general review, 20140502/bie: add hints for nftables0.652009-12-13/PB: minor fixes0.642009-06-11/PB: extend DHCP server examples (ISC DHCP, Dibbler)0.632009-02-14/PB: Fix FSF address, major update on 4in6 tunnels, add new section for address resolving, add some URLs, remove broken URLs0.622008-11-09/PB: Adjust URL to Turkish howto, add some HIP related URLs, remove broken URLs0.61.12007-11-11/PB: fix broken description of shortcut BIND0.612007-10-06/PB: fix broken URLs to TLDP-CVS, minor URL update.0.60.22007-10-03/PB: fix description of sysctl/autoconf (credits to Francois-Xavier Le Bail)0.60.12007-06-16/PB: speling fixes (credits to Larry W. Burton)0.602007-05-29/PB: import major contribution to Programming using C-API written by John Wenker, minor fixes0.522007-05-23/PB: update firewalling chapter, improve document for proper SGML validation, minor bugfixes0.512006-11-08/PB: remove broken URLs, add a new book (credits to Bryan Vukich)0.50.22006-10-25/PB: fix typo in dhcp6 section (credits to Michele Ferritto)0.50.12006-09-23/PB: add some URLs0.502006-08-24/PB: check RFC URLs, fix URL to Chinese translation, finalize for publishing0.49.52006-08-23/PB: fix/remove broken URLs0.49.42006-08-21/PB: some review, update and enhancement of the content, replace old 6bone example addresses with the current defined ones.0.49.32006-08-20/PB: fix bug in maillist entries, 'mobility' is now a separate chapter0.49.22006-08-20/PB: update and cleanup of maillist entries0.49.12006-06-13/PB: major update of mobility section (contributed by Benjamin Thery)0.492005-10-03/PB: add configuration hints for DHCPv6, major broken URL cleanup (credits to Necdet Yucel)0.48.12005-01-15/PB: minor fixes0.482005-01-11/PB: grammar check and minor review of IPv6 IPsec section0.47.12005-01-01/PB: add information and examples about IPv6 IPsec, add some URLs0.472004-08-30/PB: add some notes about proftpd, vsftpd and other daemons, add some URLs, minor fixes, update status of Spanish translation0.46.42004-07-19/PB: minor fixes0.46.32004-06-23/PB: add note about started Greek translation, replace Taiwanese with Chinese for related translation0.46.22004-05-22/PB: minor fixes0.46.12004-04-18/PB: minor fixes0.462004-03-04/PB: announce Italian translation, add information about DHCPv6, minor updates0.45.12004-01-12/PB: add note about the official example address space0.452004-01-11/PB: minor fixes, add/fix some URLs, some extensions0.44.22003-10-30/PB: fix some copy&paste text bugs0.44.12003-10-19/PB: add note about start of Italian translation0.442003-08-15/PB: fix URLs, add hint on tcp_wrappers (about broken notation in some versions) and Apache20.43.42003-07-26/PB: fix URL, add archive URL for maillist users at ipv6.org, add some ds6 URLs0.43.32003-06-19/PB: fix typos0.43.22003-06-11/PB: fix URL0.43.12003-06-07/PB: fix some URLs, fix credits, add some notes at IPsec0.432003-06-05/PB: add some notes about configuration in SuSE Linux, add URL of French translation0.422003-05-09/PB: minor fixes, announce French translation0.41.42003-05-02/PB: Remove a broken URL, update some others.0.41.32003-04-23/PB: Minor fixes, remove a broken URL, fix URL to Taiwanese translation0.41.22003-04-13/PB: Fix some typos, add a note about a French translation is in progress0.41.12003-03-31/PB: Remove a broken URL, fix another0.412003-03-22/PB: Add URL of German translation0.40.22003-02-27/PB: Fix a misaddressed URL0.40.12003-02-12/PB: Add Debian-Linux-Configuration, add a minor note on translations0.402003-02-10/PB: Announcing available German version0.39.22003-02-10/GK: Minor syntax and spelling fixes0.39.12003-01-09/PB: fix an URL (draft adopted to an RFC)0.392003-01-13/PB: fix a bug (forgotten 'link” on “ip link set” (credits to Yaniv Kaul)0.38.12003-01-09/PB: a minor fix0.382003-01-06/PB: minor fixes0.37.12003-01-05/PB: minor updates0.372002-12-31/GK: 270 new links added (searched in 1232 SearchEngines) in existing and 53 new (sub)sections0.36.12002-12-20/PB: Minor fixes0.362002-12-16/PB: Check of and fix broken links (credits to Georg Käfer), some spelling fixes0.352002-12-11/PB: Some fixes and extensions0.34.12002-11-25/PB: Some fixes (e.g. broken linuxdoc URLs)0.342002-11-19/PB: Add information about German translation (work in progress), some fixes, create a small shortcut explanation list, extend “used terms” and add two German books0.332002-11-18/PB: Fix broken RFC-URLs, add parameter ttl on 6to4 tunnel setup example0.322002-11-03/PB: Add information about Taiwanese translation0.31.12002-10-06/PB: Add another maillist0.312002-09-29/PB: Extend information in proc-filesystem entries0.302002-09-27/PB: Add some maillists0.292002-09-18/PB: Update statement about nmap (triggered by Fyodor)0.28.12002-09-16/PB: Add note about ping6 to multicast addresses, add some labels0.282002-08-17/PB: Fix broken LDP/CVS links, add info about Polish translation, add URL of the IPv6 Address Oracle0.272002-08-10/PB: Some minor updates0.26.22002-07-15/PB: Add information neighbor discovery, split of firewalling (got some updates) and security into extra chapters0.26.12002-07-13/PB: Update nmap/IPv6 information0.262002-07-13/PB: Fill /proc-filesystem chapter, update DNS information about depricated A6/DNAME, change P-t-P tunnel setup to use of “ip” only0.25.22002-07-11/PB: Minor spelling fixes0.25.12002-06-23/PB: Minor spelling and other fixes0.252002-05-16/PB: Cosmetic fix for 2^128, thanks to José Abílio Oliveira Matos for help with LyX0.242002-05-02/PB: Add entries in URL list, minor spelling fixes0.232002-03-27/PB: Add entries in URL list and at maillists, add a label and minor information about IPv6 on RHL0.222002-03-04/PB: Add info about 6to4 support in kernel series 2.2.x and add an entry in URL list and at maillists0.212002-02-26/PB: Migrate next grammar checks submitted by John Ronan 0.20.42002-02-21/PB: Migrate more grammar checks submitted by John Ronan, add some additional hints at DNS section 0.20.32002-02-12/PB: Migrate a minor grammar check patch submitted by John Ronan0.20.22002-02-05/PB: Add mipl to maillist table0.20.12002-01-31/PB: Add a hint how to generate 6to4 addresses0.202002-01-30/PB: Add a hint about default route problem, some minor updates0.19.22002-01-29/PB: Add many new URLs0.19.12002-01-27/PB: Add some forgotten URLs0.192002-01-25/PB: Add two German books, fix quote entinities in exported SGML code0.18.22002-01-23/PB: Add a FAQ on the program chapter0.18.12002-01-23/PB: Move “the end” to the end, add USAGI to maillists0.182002-01-22/PB: Fix bugs in explanation of multicast address types0.17.22002-01-22/PB: Cosmetic fix double existing text in history (at 0.16), move all credits to the end of the document0.17.12002-01-20/PB: Add a reference, fix URL text in online-test-tools0.172002-01-19/PB: Add some forgotten information and URLs about global IPv6 addresses0.162002-01-19/PB: Minor fixes, remove “bold” and “emphasize” formats on code lines, fix “too long unwrapped code lines” using selfmade utility, extend list of URLs.0.152002-01-15/PB: Fix bug in addresstype/anycast, move content related credits to end of document0.142002-01-14/PB: Minor review at all, new chapter “debugging”, review “addresses”, spell checking, grammar checking (from beginning to 3.4.1) by Martin Krafft, add tcpdump examples, copy firewalling/netfilter6 from IPv6+Linux-HowTo, minor enhancements0.132002-01-05/PB: Add example BIND9/host, move revision history to end of document, minor extensions0.122002-01-03/PB: Merge review of David Ranch0.112002-01-02/PB: Spell checking and merge review of Pekka Savola0.102002-01-02/PB: First public release of chapter 1 <!-- anchor id="credits" -->Credits The quickest way to be added to this nice list is to send bug fixes, corrections, and/or updates to me ;-). If you want to do a major review, you can use the native LyX file (see original source) and send diffs against it, because diffs against SGML don't help too much. diff --git a/LDP/users/Peter-Bieringer/generate-en-de.sh b/LDP/users/Peter-Bieringer/generate-en-de.sh index bb138a0a..7d0d8dfd 100755 --- a/LDP/users/Peter-Bieringer/generate-en-de.sh +++ b/LDP/users/Peter-Bieringer/generate-en-de.sh @@ -5,7 +5,7 @@ list="Linux+IPv6-HOWTO.sgml Linux+IPv6-HOWTO.de.sgml" for lyx in $list; do - ./generate.sh $lyx + ./generate.sh $lyx $* done echo -en "\a" diff --git a/LDP/users/Peter-Bieringer/generate.sh b/LDP/users/Peter-Bieringer/generate.sh index 32b2f027..fb4d6174 100755 --- a/LDP/users/Peter-Bieringer/generate.sh +++ b/LDP/users/Peter-Bieringer/generate.sh @@ -197,9 +197,9 @@ create_html_multipage() { } create_html_singlepage() { - echo "INFO : Create HTML singlepage '$file_html'" + echo "INFO : Create HTML singlepage '$file_html' from '$file_input'" [ $loglevel -ge 7 ] && set -x - $JADE -t sgml -i html -V nochunks -d "${file_ldpdsl}#html" -o $file_html $file_input >/dev/null + $JADE -t sgml -i html -V nochunks -d "${file_ldpdsl}#html" $file_input >$file_html local retval=$? [ $loglevel -ge 7 ] && set +x