r6330 - in trunk/BOOK: introduction/welcome server/major

randy at linuxfromscratch.org randy at linuxfromscratch.org
Thu Oct 5 06:12:37 PDT 2006


Author: randy
Date: 2006-10-05 07:12:36 -0600 (Thu, 05 Oct 2006)
New Revision: 6330

Modified:
   trunk/BOOK/introduction/welcome/changelog.xml
   trunk/BOOK/server/major/samba3.xml
Log:
Changed the TCP ports used by tunneled SWAT in the Samba instructions from 901 and 902 to 904 and 905 so that there is no conflict with the IANA database

Modified: trunk/BOOK/introduction/welcome/changelog.xml
===================================================================
--- trunk/BOOK/introduction/welcome/changelog.xml	2006-10-05 12:51:08 UTC (rev 6329)
+++ trunk/BOOK/introduction/welcome/changelog.xml	2006-10-05 13:12:36 UTC (rev 6330)
@@ -45,6 +45,11 @@
       <para>October 5th, 2006</para>
       <itemizedlist>
         <listitem>
+          <para>[randy] - Changed the TCP ports used by tunneled SWAT in the
+          Samba instructions from 901 and 902 to 904 and 905 so that there is
+          no conflict with the IANA database.</para>
+        </listitem>
+        <listitem>
           <para>[randy] - Updated to cairo-1.2.4.</para>
         </listitem>
       </itemizedlist>

Modified: trunk/BOOK/server/major/samba3.xml
===================================================================
--- trunk/BOOK/server/major/samba3.xml	2006-10-05 12:51:08 UTC (rev 6329)
+++ trunk/BOOK/server/major/samba3.xml	2006-10-05 13:12:36 UTC (rev 6330)
@@ -482,8 +482,8 @@
         <filename>/etc/services</filename> with the following commands issued
         as the <systemitem class="username">root</systemitem> user:</para>
 
-<screen role="root"><userinput>echo "swat            901/tcp" >> /etc/services &&
-echo "swat_tunnel     902/tcp" >> /etc/services</userinput></screen>
+<screen role="root"><userinput>echo "swat            904/tcp" >> /etc/services &&
+echo "swat_tunnel     905/tcp" >> /etc/services</userinput></screen>
 
         <para>If <command>inetd</command> is used, the following command will
         add the swat_tunnel entry to <filename>/etc/inetd.conf</filename> (as
@@ -506,7 +506,7 @@
 
 service swat_tunnel
 {
-    port            = 902
+    port            = 905
     socket_type     = stream
     wait            = no
     only_from       = 127.0.0.1
@@ -535,8 +535,8 @@
 
 <screen role="root"><userinput>cat >> /etc/stunnel/stunnel.conf << "EOF"
 <literal>[swat]
-accept  = 901
-connect = 902
+accept  = 904
+connect = 905
 TIMEOUTclose = 1</literal>
 
 EOF</userinput></screen>
@@ -547,7 +547,7 @@
 <screen role="root"><userinput>/etc/rc.d/init.d/stunnel restart</userinput></screen>
 
       <para>SWAT can be launched by pointing your web browser to
-      <uri>https://<replaceable><CA_DN_field></replaceable>:901</uri>.
+      <uri>https://<replaceable><CA_DN_field></replaceable>:904</uri>.
       Substitute the hostname listed in the DN field of the CA certificate
       used with <application>Stunnel</application> for
       <replaceable><CA_DN_field></replaceable>.</para>
@@ -569,7 +569,7 @@
         following command issued as the
         <systemitem class='username'>root</systemitem> user:</para>
 
-<screen role='root'><userinput>echo "swat            901/tcp" >> /etc/services</userinput></screen>
+<screen role='root'><userinput>echo "swat            904/tcp" >> /etc/services</userinput></screen>
 
         <para>If <command>inetd</command> is used, the following command
         issued as the <systemitem class='username'>root</systemitem> user will
@@ -590,7 +590,7 @@
 
 service swat
 {
-    port            = 901
+    port            = 904
     socket_type     = stream
     wait            = no
     only_from       = 127.0.0.1
@@ -606,7 +606,7 @@
         new <filename>/etc/xinetd.d/swat</filename> file.</para>
 
         <para>SWAT can be launched by pointing your web browser to
-        http://localhost:901.</para>
+        http://localhost:904.</para>
 
       </sect4>
 




More information about the blfs-book mailing list