Subject: misc/22712: Grammatical fixes for stf.4
To: None <gnats-bugs@gnats.NetBSD.org>
From: None <jason@lucid.net.au>
List: netbsd-bugs
Date: 09/07/2003 15:15:10
>Number: 22712
>Category: misc
>Synopsis: Grammatical fixes for stf.4
>Confidential: no
>Severity: non-critical
>Priority: low
>Responsible: misc-bug-people
>State: open
>Class: doc-bug
>Submitter-Id: net
>Arrival-Date: Sun Sep 07 15:16:00 UTC 2003
>Closed-Date:
>Last-Modified:
>Originator: Jason Lingohr
>Release: N/A
>Organization:
>Environment:
N/A
>Description:
Several English/grammatical errors exist in stf.4.
>How-To-Repeat:
N/A
>Fix:
Index: stf.4
===================================================================
RCS file: /cvsroot/src/share/man/man4/stf.4,v
retrieving revision 1.17
diff -u -r1.17 stf.4
--- stf.4 2002/11/17 19:34:52 1.17
+++ stf.4 2003/09/07 14:34:08
@@ -51,41 +51,41 @@
and
.Cm destroy
subcommands. Only one
-.Nm stf
+.Nm
interface may be created.
.Pp
-For ordinary nodes in 6to4 site, you do not need
+For ordinary nodes in 6to4 sites, you do not need a
.Nm
interface.
The
.Nm
-interface is necessary for site border router
+interface is only necessary on the site border router
.Po
-called
+called the
.Dq 6to4 router
in the specification
.Pc .
.Pp
-Due to the way 6to4 protocol is specified,
+Due to the way the 6to4 protocol is specified,
.Nm
-interface requires certain configuration to work properly.
-Single
-.Pq no more than 1
-valid 6to4 address needs to be configured to the interface.
+interfaces require certain configuration to work properly.
+A single
+.Pq no more than one
+valid 6to4 address needs to be configured on the interface.
.Dq A valid 6to4 address
is an address which has the following properties.
If any of the following properties are not satisfied,
.Nm stf
-raises runtime error on packet transmission.
+raises a runtime error on packet transmission.
Read the specification for more details.
.Bl -bullet
.It
matches
-.Li 2002:xxyy:zzuu::/48
+.Li 2002:xxyy:zzuu::/48,
where
.Li xxyy:zzuu
-is a hexadecimal notation of an IPv4 address for the node.
-IPv4 address can be taken from any of interfaces your node has.
+is the hexadecimal notation of an IPv4 address for the node.
+The IPv4 address used can be taken from any interface your node has.
Since the specification forbids the use of IPv4 private address,
the address needs to be a global IPv4 address.
.It
@@ -100,79 +100,80 @@
the prefix length for the IPv6 interface address needs to be 16 so that
the node would consider any 6to4 destination as
.Dq on-link .
-If you would like to restrict 6to4 peers to be inside certain IPv4 prefix,
-you may want to configure IPv6 prefix length as
+If you would like to restrict 6to4 peers to be inside a certain IPv4 prefix,
+you may want to configure the IPv6 prefix length to be
.Dq 16 + IPv4 prefix length .
+The
.Nm
-interface will check the IPv4 source address on packets,
+interface will check the IPv4 source address on packets
if the IPv6 prefix length is larger than 16.
.Pp
.Nm
-can be configured to be ECN friendly.
+can be configured to be ECN (Explicit Congestion Notification) friendly.
This can be configured by
.Dv IFF_LINK1 .
See
.Xr gif 4
for details.
.Pp
-Please note that 6to4 specification is written as
+Please note that the 6to4 specification is written as an
.Dq accept tunnelled packet from everyone
tunnelling device.
-By enabling
+By enabling the
.Nm
device, you are making it much easier for malicious parties to inject
-fabricated IPv6 packet to your node.
-Also, malicious party can inject an IPv6 packet with fabricated source address
-to make your node generate improper tunnelled packet.
-Administrators must take caution when enabling the interface.
-To prevent possible attacks,
+fabricated IPv6 packets to your node.
+Also, malicious parties can inject IPv6 packets with fabricated source addresses
+to make your node generate improper tunnelled packets.
+Administrators must be cautious when enabling the interface.
+To prevent possible attacks, the
.Nm
-interface filters out the following packets.
-Note that the checks are no way complete:
+interface filters out the following packets (note that the checks are
+in no way complete):
.Bl -bullet
.It
-Packets with IPv4 unspecified address as outer IPv4 source/destination
+Packets with IPv4 unspecified addresses as outer IPv4 source/destination
.Pq Li 0.0.0.0/8
.It
-Packets with loopback address as outer IPv4 source/destination
+Packets with the loopback address as outer IPv4 source/destination
.Pq Li 127.0.0.0/8
.It
-Packets with IPv4 multicast address as outer IPv4 source/destination
+Packets with IPv4 multicast addresses as outer IPv4 source/destination
.Pq Li 224.0.0.0/4
.It
-Packets with limited broadcast address as outer IPv4 source/destination
+Packets with limited broadcast addresses as outer IPv4 source/destination
.Pq Li 255.0.0.0/8
.It
-Packets with private address as outer IPv4 source/destination
+Packets with private addresses as outer IPv4 source/destination
.Pq Li 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16
.It
-Packets with IPv4 link-local address as outer IPv4 source/destination
+Packets with IPv4 link-local addresses as outer IPv4 source/destination
.Pq Li 169.254.0.0/16
.It
-Packets with subnet broadcast address as outer IPv4 source/destination.
+Packets with subnet broadcast addresses as outer IPv4 source/destination.
The check is made against subnet broadcast addresses for
all of the directly connected subnets.
.It
-Packets that does not pass ingress filtering.
-Outer IPv4 source address must meet the IPv4 topology on the routing table.
-Ingress filter can be turned off by
+Packets that do not pass ingress filtering.
+Outer IPv4 source addresses must meet the IPv4 topology on the routing table.
+Ingress filtering can be turned off by
.Dv IFF_LINK2
bit.
.It
The same set of rules are applied against the IPv4 address embedded into
-inner IPv6 address, if the IPv6 address matches 6to4 prefix.
+the inner IPv6 address, if the IPv6 address matches the 6to4 prefix.
.It
-Packets with site-local or link-local unicast address as
+Packets with site-local or link-local unicast addresses as
inner IPv6 source/destination
.It
-Packets with node-local or link-local multicast address as
+Packets with node-local or link-local multicast addresses as
inner IPv6 source/destination
.El
.Pp
It is recommended to filter/audit
-incoming IPv4 packet with IP protocol number 41, as necessary.
+incoming IPv4 packets with IP protocol number 41, as necessary.
It is also recommended to filter/audit encapsulated IPv6 packets as well.
-You may also want to run normal ingress filter against inner IPv6 address
+You may also want to run normal ingress filtering against inner IPv6 addresses
to avoid spoofing.
.Pp
By setting the
@@ -180,27 +181,27 @@
flag on the
.Nm
interface, it is possible to disable the input path,
-making the direct attacks from the outside impossible.
-Note, however, there are other security risks exist.
+making direct attacks from the outside impossible.
+Note, however, that other security risks exist.
If you wish to use the configuration,
-you must not advertise your 6to4 address to others.
+you must not advertise your 6to4 addresses to others.
.\"
.Sh EXAMPLES
Note that
.Li 8504:0506
is equal to
.Li 133.4.5.6 ,
-written in hexadecimals.
+written in hexadecimal.
.Bd -literal
# ifconfig ne0 inet 133.4.5.6 netmask 0xffffff00
# ifconfig stf0 create inet6 2002:8504:0506:0000:a00:5aff:fe38:6f86 \\
prefixlen 16 alias
.Ed
.Pp
-The following configuration accepts packets from IPv4 source
+The following configuration accepts packets from IPv4 source address
.Li 9.1.0.0/16
only.
-It emits 6to4 packet only for IPv6 destination 2002:0901::/32
+It emits 6to4 packets only for IPv6 destination 2002:0901::/32
.Pq IPv4 destination will match Li 9.1.0.0/16 .
.Bd -literal
# ifconfig ne0 inet 9.1.2.3 netmask 0xffff0000
@@ -220,7 +221,7 @@
.Pq less security drawbacks .
Be careful not to advertise your 6to4 prefix to others
.Pq Li 2002:8504:0506::/48 ,
-and not to use your 6to4 prefix as a source.
+and not to use your 6to4 prefix as a source address.
.Bd -literal
# ifconfig ne0 inet 133.4.5.6 netmask 0xffffff00
# ifconfig stf0 create inet6 2002:8504:0506:0000:a00:5aff:fe38:6f86 \\
@@ -262,9 +263,9 @@
and no more than one IPv6 interface address is allowed for an
.Nm
interface.
-It is to avoid source address selection conflicts
-between IPv6 layer and IPv4 layer,
-and to cope with ingress filtering rule on the other side.
+This is to avoid source address selection conflicts
+between the IPv6 layer and the IPv4 layer,
+and to cope with ingress filtering rules on the other side.
This is a feature to make
.Nm
work right for all occasions.
>Release-Note:
>Audit-Trail:
>Unformatted: