svn commit: r43765 - head/en_US.ISO8859-1/articles/linux-users

Dru Lavigne dru at FreeBSD.org
Tue Feb 4 17:15:34 UTC 2014


Author: dru
Date: Tue Feb  4 17:15:33 2014
New Revision: 43765
URL: http://svnweb.freebsd.org/changeset/doc/43765

Log:
  First pass through next 1/3 of this article.
  
  Sponsored by: iXsystems

Modified:
  head/en_US.ISO8859-1/articles/linux-users/article.xml

Modified: head/en_US.ISO8859-1/articles/linux-users/article.xml
==============================================================================
--- head/en_US.ISO8859-1/articles/linux-users/article.xml	Tue Feb  4 16:45:39 2014	(r43764)
+++ head/en_US.ISO8859-1/articles/linux-users/article.xml	Tue Feb  4 17:15:33 2014	(r43765)
@@ -48,7 +48,7 @@
   </sect1>
 
   <sect1 xml:id="shells">
-    <title>Shells: No Bash?</title>
+    <title>Default Shell</title>
 
     <para>&linux; users are often surprised to find that
       <application>Bash</application> is not the default shell in &os;.
@@ -160,13 +160,13 @@
   </sect1>
 
   <sect1 xml:id="startup">
-    <title>System Startup: Where are the run-levels?</title>
+    <title>System Startup</title>
 
-    <para>&linux; uses the SysV init system, whereas &os; uses the
-      traditional BSD-style &man.init.8;.  Under the BSD-style &man.init.8;
-      there are no run-levels and no <filename>/etc/inittab</filename>,
-      instead startup is controlled by the &man.rc.8; utility.  The
-      <filename>/etc/rc</filename> script reads
+    <para>Many &linux; distributions use the SysV init system, whereas &os; uses the
+      traditional BSD-style &man.init.8;.  Under the BSD-style &man.init.8;,
+      there are no run-levels and <filename>/etc/inittab</filename> does not exist.
+      Instead, startup is controlled by &man.rc.8; scripts.  At system boot,
+      <filename>/etc/rc</filename> reads
       <filename>/etc/defaults/rc.conf</filename> and
       <filename>/etc/rc.conf</filename> to determine which services are to be
       started.  The specified services are then started by running the
@@ -176,73 +176,63 @@
       the scripts located in <filename>/etc/init.d/</filename> on &linux;
       systems.</para>
 
-    <sidebar>
-      <para><emphasis>Why are there two locations for service initialization
-	scripts?</emphasis>  The scripts found in
+      <para>The scripts found in
 	<filename>/etc/rc.d/</filename> are for applications that are part of
-	the <quote>base</quote> system.  (&man.cron.8;, &man.sshd.8;,
-	&man.syslog.3;, and others.)  The scripts in
+	the <quote>base</quote> system, such as &man.cron.8;, &man.sshd.8;, and
+	&man.syslog.3;.  The scripts in
 	<filename>/usr/local/etc/rc.d/</filename> are for user-installed
-	applications such as <application>Apache</application>,
-	<application>Squid</application>, etc.</para>
+	applications such as <application>Apache</application> and
+	<application>Squid</application>.</para>
 
-      <para><emphasis>What is the difference between the <quote>base</quote>
-	system and user-installed applications?</emphasis>  FreeBSD is
-	developed as a complete operating system.  In other words, the
-	kernel, system libraries, and userland utilities (such as &man.ls.1;,
-	&man.cat.1;, &man.cp.1;, etc.) are developed and released together as
-	one.  This is what is referred to as the <quote>base</quote> system.
-	The user-installed applications are applications that are not part of
-	the <quote>base</quote> system, such as
-	<application>Apache</application>, <application>X11</application>,
-	<application>Mozilla Firefox</application>, etc.  These
-	user-installed applications are generally installed using &os;'s <link xlink:href="article.html#SOFTWARE">Packages and Ports Collection</link>.
+      <para>Since &os; is
+	developed as a complete operating system,
+	user-installed applications are not considered to be part of
+	the <quote>base</quote> system.
+	User-installed applications are generally installed using <link
+	  xlink:href="&url.base;/doc/en_US.ISO8859-1/books/handbook/ports-using.html">Packages or Ports</link>.
 	In order to keep them separate from the <quote>base</quote> system,
-	user-installed applications are normally installed under
-	<filename>/usr/local/</filename>.  Therefore the user-installed
+	user-installed applications are installed under
+	<filename>/usr/local/</filename>.  Therefore, user-installed
 	binaries reside in <filename>/usr/local/bin/</filename>,
 	configuration files are in <filename>/usr/local/etc/</filename>,
 	and so on.</para>
-    </sidebar>
 
-    <para>Services are enabled by specifying
-      <literal>ServiceName_enable="YES"</literal> in
-      <filename>/etc/rc.conf</filename> (&man.rc.conf.5;).  Take a look at
-      <filename>/etc/defaults/rc.conf</filename> for the system defaults,
+    <para>Services are enabled by adding an entry for the service in
+      <filename>/etc/rc.conf</filename> .  The system defaults are found in
+      <filename>/etc/defaults/rc.conf</filename> and
       these default settings are overridden by settings in
-      <filename>/etc/rc.conf</filename>.  Also, when installing additional
-      applications be sure to review the documentation to determine how to
+      <filename>/etc/rc.conf</filename>.  Refer to &man.rc.conf.5; for
+      more information about the available entries.  When installing additional
+      applications, review the application's install message to determine how to
       enable any associated services.</para>
 
-    <para>The following snippet from <filename>/etc/rc.conf</filename> enables
-      &man.sshd.8; and <application>Apache 2.2</application>.  It also
-      specifies that <application>Apache</application> should be started
-      with SSL.</para>
+    <para>The following entries in <filename>/etc/rc.conf</filename> enable
+      &man.sshd.8;, enable <application>Apache 2.4</application>, and
+      specify that <application>Apache</application> should be started
+      with <acronym>SSL</acronym>.</para>
 
     <programlisting># enable SSHD
 sshd_enable="YES"
 # enable Apache with SSL
-apache22_enable="YES"
-apache22_flags="-DSSL"</programlisting>
+apache24_enable="YES"
+apache24_flags="-DSSL"</programlisting>
 
     <para>Once a service has been enabled in <filename>/etc/rc.conf</filename>,
-      the service can be started from the command line (without rebooting the
-      system):</para>
+      it can be started without rebooting the
+      system:</para>
 
-    <screen>&prompt.root; <userinput>/etc/rc.d/sshd start</userinput></screen>
+    <screen>&prompt.root; <userinput>service sshd start</userinput>
+ &prompt.root; <userinput>service apache24 start</userinput></screen>
 
-    <para>If a service has not been enabled it can be started from the
-      command line using <option>forcestart</option>:</para>
+    <para>If a service has not been enabled, it can be started from the
+      command line using <option>onestart</option>:</para>
 
-    <screen>&prompt.root; <userinput>/etc/rc.d/sshd forcestart</userinput></screen>
+    <screen>&prompt.root; <userinput>service sshd onestart</userinput></screen>
   </sect1>
 
   <sect1 xml:id="network">
     <title>Network configuration</title>
 
-    <sect2 xml:id="interfaces">
-      <title>Network Interfaces</title>
-
       <para>Instead of a generic <emphasis>ethX</emphasis> identifier that
 	&linux; uses to identify a network interface, &os; uses the driver
 	name followed by a number as the identifier.  The following output
@@ -262,75 +252,67 @@ em1: flags=8843<UP,BROADCAST,RUNNING,
         ether 00:50:56:a7:03:2b
         media: Ethernet autoselect (1000baseTX <full-duplex>)
         status: active</screen>
-    </sect2>
 
-    <sect2 xml:id="ipaddress">
-      <title>IP Configuration</title>
-
-      <para>An IP address can be assigned to an interface using
-	&man.ifconfig.8;.  However, to remain persistent across reboots the
-	IP configuration must be included in
+      <para>An <acronym>IP</acronym> address can be assigned to an interface using
+	&man.ifconfig.8;.  To remain persistent across reboots, the
+	<acronym>IP</acronym> configuration must be included in
 	<filename>/etc/rc.conf</filename>.  The following example
-	specifies the hostname, IP address, and default gateway:</para>
+	specifies the hostname, <acronym>IP</acronym> address, and default gateway:</para>
 
       <programlisting>hostname="server1.example.com"
-ifconfig_em0="inet 10.10.10.100  netmask 255.255.255.0"
+ifconfig_em0="inet 10.10.10.100 netmask 255.255.255.0"
 defaultrouter="10.10.10.1"</programlisting>
 
-      <para>Use the following to configure an interface for DHCP:</para>
+      <para>Use the following to instead configure an interface for <acronym>DHCP</acronym>:</para>
 
       <programlisting>hostname="server1.example.com"
 ifconfig_em0="DHCP"</programlisting>
-
-    </sect2>
   </sect1>
 
   <sect1 xml:id="firewall">
     <title>Firewall</title>
 
-    <para>Like <application>IPTABLES</application> in &linux;, &os; also offers
-      a kernel level firewall; actually &os; offers three firewalls:</para>
+    <para>&os; does not use  &linux; <application>IPTABLES</application> for its firewall.  Instead, &os; offers
+      a choice of three kernel level firewalls:</para>
 
     <itemizedlist>
-      <listitem><simpara><link xlink:href="&url.base;/doc/en_US.ISO8859-1/books/handbook/firewalls-ipfw.html">IPFIREWALL</link></simpara></listitem>
-      <listitem><simpara><link xlink:href="&url.base;/doc/en_US.ISO8859-1/books/handbook/firewalls-ipf.html">IPFILTER</link></simpara></listitem>
       <listitem><simpara><link xlink:href="&url.base;/doc/en_US.ISO8859-1/books/handbook/firewalls-pf.html">PF</link></simpara></listitem>
+      <listitem><simpara><link xlink:href="&url.base;/doc/en_US.ISO8859-1/books/handbook/firewalls-ipf.html">IPFILTER</link></simpara></listitem>
+      <listitem><simpara><link xlink:href="&url.base;/doc/en_US.ISO8859-1/books/handbook/firewalls-ipfw.html">IPFW</link></simpara></listitem>
     </itemizedlist>
 
-    <para><application>IPFIREWALL</application> or
-      <application>IPFW</application> (the command to manage an
-      <application>IPFW</application> ruleset is &man.ipfw.8;) is the
-      firewall developed and maintained by the &os; developers.
-      <application>IPFW</application> can be paired with &man.dummynet.4; to
-      provide traffic shaping capabilities and simulate different types of
-      network connections.</para>
+    <para><application>PF</application> is
+      developed by the OpenBSD project and ported to &os;.  <application>PF</application> was
+      created as a replacement for <application>IPFILTER</application> and
+      its syntax is similar to that of
+      <application>IPFILTER</application>.  <application>PF</application> can
+      be paired with &man.altq.4; to provide <acronym>QoS</acronym> features.</para>
 
-    <para>Sample <application>IPFW</application> rule to allow
-      <application>SSH</application> in:</para>
+     <para>This sample <application>PF</application> entry allows inbound
+       <application>SSH</application>:</para>
 
-    <programlisting>ipfw add allow tcp from any to me 22 in via $ext_if</programlisting>
+     <programlisting>pass in on $ext_if inet proto tcp from any to ($ext_if) port 22</programlisting>
 
-    <para><application>IPFILTER</application> is the firewall application
-      developed by Darren Reed.  It is not specific to &os;, and has been
+     <para><application>IPFILTER</application> is the firewall application
+      developed by Darren Reed.  It is not specific to &os; and has been
       ported to several operating systems including NetBSD, OpenBSD, SunOS,
       HP/UX, and Solaris.</para>
 
-    <para>Sample <application>IPFILTER</application> command to allow
-      <application>SSH</application> in:</para>
+    <para>The <application>IPFILTER</application> syntax to allow inbound
+      <application>SSH</application> is:</para>
 
     <programlisting>pass in on $ext_if proto tcp from any to any port = 22</programlisting>
+ 
+    <para><application>IPFW</application> is the
+      firewall developed and maintained by &os;.
+      It can be paired with &man.dummynet.4; to
+      provide traffic shaping capabilities and simulate different types of
+      network connections.</para>
 
-    <para>The last firewall application, <application>PF</application>, is
-      developed by the OpenBSD project.  <application>PF</application> was
-      created as a replacement for <application>IPFILTER</application>.  As
-      such, the <application>PF</application> syntax is very similar to that of
-      <application>IPFILTER</application>.  <application>PF</application> can
-      be paired with &man.altq.4; to provide QoS features.</para>
-
-     <para>Sample <application>PF</application> command to allow
-       <application>SSH</application> in:</para>
+    <para>The <application>IPFW</application> syntax to allow inbound
+      <application>SSH</application> would be:</para>
 
-     <programlisting>pass in on $ext_if inet proto tcp from any to ($ext_if) port 22</programlisting>
+    <programlisting>ipfw add allow tcp from any to me 22 in via $ext_if</programlisting>
   </sect1>
 
   <sect1 xml:id="updates">


More information about the svn-doc-all mailing list