Author: randy
Date: 2006-10-05 07:12:36 -0600 (Thu, 05 Oct 2006)
New Revision: 6330
Modified:
trunk/BOOK/introduction/welcome/changelog.xml
trunk/BOOK/server/major/samba3.xml
Log:
Changed the TCP ports used by tunneled SWAT in the Samba instructions from 901
and 902 to 904 and 905 so that there is no conflict with the IANA database
Modified: trunk/BOOK/introduction/welcome/changelog.xml
===================================================================
--- trunk/BOOK/introduction/welcome/changelog.xml 2006-10-05 12:51:08 UTC
(rev 6329)
+++ trunk/BOOK/introduction/welcome/changelog.xml 2006-10-05 13:12:36 UTC
(rev 6330)
@@ -45,6 +45,11 @@
<para>October 5th, 2006</para>
<itemizedlist>
<listitem>
+ <para>[randy] - Changed the TCP ports used by tunneled SWAT in the
+ Samba instructions from 901 and 902 to 904 and 905 so that there is
+ no conflict with the IANA database.</para>
+ </listitem>
+ <listitem>
<para>[randy] - Updated to cairo-1.2.4.</para>
</listitem>
</itemizedlist>
Modified: trunk/BOOK/server/major/samba3.xml
===================================================================
--- trunk/BOOK/server/major/samba3.xml 2006-10-05 12:51:08 UTC (rev 6329)
+++ trunk/BOOK/server/major/samba3.xml 2006-10-05 13:12:36 UTC (rev 6330)
@@ -482,8 +482,8 @@
<filename>/etc/services</filename> with the following commands issued
as the <systemitem class="username">root</systemitem> user:</para>
-<screen role="root"><userinput>echo "swat 901/tcp" >>
/etc/services &&
-echo "swat_tunnel 902/tcp" >> /etc/services</userinput></screen>
+<screen role="root"><userinput>echo "swat 904/tcp" >>
/etc/services &&
+echo "swat_tunnel 905/tcp" >> /etc/services</userinput></screen>
<para>If <command>inetd</command> is used, the following command will
add the swat_tunnel entry to <filename>/etc/inetd.conf</filename> (as
@@ -506,7 +506,7 @@
service swat_tunnel
{
- port = 902
+ port = 905
socket_type = stream
wait = no
only_from = 127.0.0.1
@@ -535,8 +535,8 @@
<screen role="root"><userinput>cat >> /etc/stunnel/stunnel.conf <<
"EOF"
<literal>[swat]
-accept = 901
-connect = 902
+accept = 904
+connect = 905
TIMEOUTclose = 1</literal>
EOF</userinput></screen>
@@ -547,7 +547,7 @@
<screen role="root"><userinput>/etc/rc.d/init.d/stunnel
restart</userinput></screen>
<para>SWAT can be launched by pointing your web browser to
- <uri>https://<replaceable><CA_DN_field></replaceable>:901</uri>.
+ <uri>https://<replaceable><CA_DN_field></replaceable>:904</uri>.
Substitute the hostname listed in the DN field of the CA certificate
used with <application>Stunnel</application> for
<replaceable><CA_DN_field></replaceable>.</para>
@@ -569,7 +569,7 @@
following command issued as the
<systemitem class='username'>root</systemitem> user:</para>
-<screen role='root'><userinput>echo "swat 901/tcp" >>
/etc/services</userinput></screen>
+<screen role='root'><userinput>echo "swat 904/tcp" >>
/etc/services</userinput></screen>
<para>If <command>inetd</command> is used, the following command
issued as the <systemitem class='username'>root</systemitem> user will
@@ -590,7 +590,7 @@
service swat
{
- port = 901
+ port = 904
socket_type = stream
wait = no
only_from = 127.0.0.1
@@ -606,7 +606,7 @@
new <filename>/etc/xinetd.d/swat</filename> file.</para>
<para>SWAT can be launched by pointing your web browser to
- http://localhost:901.</para>
+ http://localhost:904.</para>
</sect4>
--
http://linuxfromscratch.org/mailman/listinfo/blfs-book
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page