2004-04-29 16:47:59 +04:00
|
|
|
.\" $NetBSD: tcp.4,v 1.19 2004/04/29 12:47:59 wiz Exp $
|
Initial commit of a port of the FreeBSD implementation of RFC 2385
(MD5 signatures for TCP, as used with BGP). Credit for original
FreeBSD code goes to Bruce M. Simpson, with FreeBSD sponsorship
credited to sentex.net. Shortening of the setsockopt() name
attributed to Vincent Jardin.
This commit is a minimal, working version of the FreeBSD code, as
MFC'ed to FreeBSD-4. It has received minimal testing with a ttcp
modified to set the TCP-MD5 option; BMS's additions to tcpdump-current
(tcpdump -M) confirm that the MD5 signatures are correct. Committed
as-is for further testing between a NetBSD BGP speaker (e.g., quagga)
and industry-standard BGP speakers (e.g., Cisco, Juniper).
NOTE: This version has two potential flaws. First, I do see any code
that verifies recieved TCP-MD5 signatures. Second, the TCP-MD5
options are internally padded and assumed to be 32-bit aligned. A more
space-efficient scheme is to pack all TCP options densely (and
possibly unaligned) into the TCP header ; then do one final padding to
a 4-byte boundary. Pre-existing comments note that accounting for
TCP-option space when we add SACK is yet to be done. For now, I'm
punting on that; we can solve it properly, in a way that will handle
SACK blocks, as a separate exercise.
In case a pullup to NetBSD-2 is requested, this adds sys/netipsec/xform_tcp.c
,and modifies:
sys/net/pfkeyv2.h,v 1.15
sys/netinet/files.netinet,v 1.5
sys/netinet/ip.h,v 1.25
sys/netinet/tcp.h,v 1.15
sys/netinet/tcp_input.c,v 1.200
sys/netinet/tcp_output.c,v 1.109
sys/netinet/tcp_subr.c,v 1.165
sys/netinet/tcp_usrreq.c,v 1.89
sys/netinet/tcp_var.h,v 1.109
sys/netipsec/files.netipsec,v 1.3
sys/netipsec/ipsec.c,v 1.11
sys/netipsec/ipsec.h,v 1.7
sys/netipsec/key.c,v 1.11
share/man/man4/tcp.4,v 1.16
lib/libipsec/pfkey.c,v 1.20
lib/libipsec/pfkey_dump.c,v 1.17
lib/libipsec/policy_token.l,v 1.8
sbin/setkey/parse.y,v 1.14
sbin/setkey/setkey.8,v 1.27
sbin/setkey/token.l,v 1.15
Note that the preceding two revisions to tcp.4 will be
required to cleanly apply this diff.
2004-04-26 02:25:03 +04:00
|
|
|
.\" $FreeBSD: tcp.4,v 1.11.2.16 2004/02/16 22:21:47 bms Exp $
|
1994-11-30 19:22:03 +03:00
|
|
|
.\"
|
|
|
|
.\" Copyright (c) 1983, 1991, 1993
|
|
|
|
.\" The Regents of the University of California. All rights reserved.
|
1993-03-21 12:45:37 +03:00
|
|
|
.\"
|
|
|
|
.\" Redistribution and use in source and binary forms, with or without
|
|
|
|
.\" modification, are permitted provided that the following conditions
|
|
|
|
.\" are met:
|
|
|
|
.\" 1. Redistributions of source code must retain the above copyright
|
|
|
|
.\" notice, this list of conditions and the following disclaimer.
|
|
|
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
.\" notice, this list of conditions and the following disclaimer in the
|
|
|
|
.\" documentation and/or other materials provided with the distribution.
|
2003-08-07 14:30:41 +04:00
|
|
|
.\" 3. Neither the name of the University nor the names of its contributors
|
1993-03-21 12:45:37 +03:00
|
|
|
.\" may be used to endorse or promote products derived from this software
|
|
|
|
.\" without specific prior written permission.
|
|
|
|
.\"
|
|
|
|
.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
.\" SUCH DAMAGE.
|
|
|
|
.\"
|
1994-11-30 19:22:03 +03:00
|
|
|
.\" @(#)tcp.4 8.1 (Berkeley) 6/5/93
|
1993-03-21 12:45:37 +03:00
|
|
|
.\"
|
2004-04-25 06:48:10 +04:00
|
|
|
.Dd April 25, 2004
|
1993-03-21 12:45:37 +03:00
|
|
|
.Dt TCP 4
|
1999-03-16 04:19:14 +03:00
|
|
|
.Os
|
1993-03-21 12:45:37 +03:00
|
|
|
.Sh NAME
|
|
|
|
.Nm tcp
|
|
|
|
.Nd Internet Transmission Control Protocol
|
|
|
|
.Sh SYNOPSIS
|
2003-04-16 17:34:34 +04:00
|
|
|
.In sys/socket.h
|
|
|
|
.In netinet/in.h
|
1993-03-21 12:45:37 +03:00
|
|
|
.Ft int
|
|
|
|
.Fn socket AF_INET SOCK_STREAM 0
|
2000-05-22 06:01:34 +04:00
|
|
|
.Ft int
|
|
|
|
.Fn socket AF_INET6 SOCK_STREAM 0
|
1993-03-21 12:45:37 +03:00
|
|
|
.Sh DESCRIPTION
|
|
|
|
The
|
|
|
|
.Tn TCP
|
1998-04-30 12:50:03 +04:00
|
|
|
provides reliable, flow-controlled, two-way transmission of data.
|
|
|
|
It is a byte-stream protocol used to support the
|
1993-03-21 12:45:37 +03:00
|
|
|
.Dv SOCK_STREAM
|
1998-04-30 12:50:03 +04:00
|
|
|
abstraction.
|
|
|
|
.Tn TCP
|
|
|
|
uses the standard Internet address format and, in addition, provides
|
|
|
|
a per-host collection of
|
1993-03-21 12:45:37 +03:00
|
|
|
.Dq port addresses .
|
1998-04-30 12:50:03 +04:00
|
|
|
Thus, each address is composed of an Internet address specifying
|
|
|
|
the host and network, with a specific
|
1993-03-21 12:45:37 +03:00
|
|
|
.Tn TCP
|
|
|
|
port on the host identifying the peer entity.
|
|
|
|
.Pp
|
2003-02-05 01:38:15 +03:00
|
|
|
Sockets using
|
1998-04-30 12:50:03 +04:00
|
|
|
.Tn TCP
|
|
|
|
are either
|
1993-03-21 12:45:37 +03:00
|
|
|
.Dq active
|
|
|
|
or
|
|
|
|
.Dq passive .
|
|
|
|
Active sockets initiate connections to passive
|
1998-04-30 12:50:03 +04:00
|
|
|
sockets.
|
|
|
|
By default
|
1993-03-21 12:45:37 +03:00
|
|
|
.Tn TCP
|
1998-04-30 12:50:03 +04:00
|
|
|
sockets are created active; to create a passive socket the
|
1993-03-21 12:45:37 +03:00
|
|
|
.Xr listen 2
|
|
|
|
system call must be used
|
|
|
|
after binding the socket with the
|
|
|
|
.Xr bind 2
|
1998-04-30 12:50:03 +04:00
|
|
|
system call.
|
|
|
|
Only passive sockets may use the
|
1993-03-21 12:45:37 +03:00
|
|
|
.Xr accept 2
|
1998-04-30 12:50:03 +04:00
|
|
|
call to accept incoming connections.
|
|
|
|
Only active sockets may use the
|
1993-03-21 12:45:37 +03:00
|
|
|
.Xr connect 2
|
|
|
|
call to initiate connections.
|
|
|
|
.Pp
|
|
|
|
Passive sockets may
|
|
|
|
.Dq underspecify
|
1998-04-30 12:50:03 +04:00
|
|
|
their location to match incoming connection requests from multiple networks.
|
|
|
|
This technique, termed
|
1993-03-21 12:45:37 +03:00
|
|
|
.Dq wildcard addressing ,
|
|
|
|
allows a single
|
|
|
|
server to provide service to clients on multiple networks.
|
|
|
|
To create a socket which listens on all networks, the Internet
|
|
|
|
address
|
|
|
|
.Dv INADDR_ANY
|
1998-04-30 12:50:03 +04:00
|
|
|
must be bound.
|
|
|
|
The
|
1993-03-21 12:45:37 +03:00
|
|
|
.Tn TCP
|
1998-04-30 12:50:03 +04:00
|
|
|
port may still be specified at this time; if the port is not
|
|
|
|
specified the system will assign one.
|
1993-03-21 12:45:37 +03:00
|
|
|
Once a connection has been established the socket's address is
|
1998-04-30 12:50:03 +04:00
|
|
|
fixed by the peer entity's location.
|
|
|
|
The address assigned the socket is the address associated with the
|
|
|
|
network interface through which packets are being transmitted and received.
|
|
|
|
Normally this address corresponds to the peer entity's network.
|
1993-03-21 12:45:37 +03:00
|
|
|
.Pp
|
|
|
|
.Tn TCP
|
2004-04-25 06:48:10 +04:00
|
|
|
supports a number of socket options which can be set with
|
1993-03-21 12:45:37 +03:00
|
|
|
.Xr setsockopt 2
|
|
|
|
and tested with
|
2004-04-25 06:13:37 +04:00
|
|
|
.Xr getsockopt 2 :
|
|
|
|
.Bl -tag -width TCP_MD5SIGx
|
|
|
|
.It Dv TCP_NODELAY
|
1993-03-21 12:45:37 +03:00
|
|
|
Under most circumstances,
|
|
|
|
.Tn TCP
|
|
|
|
sends data when it is presented;
|
|
|
|
when outstanding data has not yet been acknowledged, it gathers
|
|
|
|
small amounts of output to be sent in a single packet once
|
|
|
|
an acknowledgement is received.
|
|
|
|
For a small number of clients, such as window systems
|
|
|
|
that send a stream of mouse events which receive no replies,
|
|
|
|
this packetization may cause significant delays.
|
|
|
|
Therefore,
|
|
|
|
.Tn TCP
|
|
|
|
provides a boolean option,
|
|
|
|
.Dv TCP_NODELAY
|
|
|
|
(from
|
|
|
|
.Aq Pa netinet/tcp.h ,
|
|
|
|
to defeat this algorithm.
|
2004-04-25 06:13:37 +04:00
|
|
|
.It Dv TCP_MAXSEG
|
2004-04-29 16:44:46 +04:00
|
|
|
By default, a sender- and receiver-TCP
|
2004-04-25 06:13:37 +04:00
|
|
|
will negotiate among themselves to determine the maximum segment size
|
2004-04-25 06:48:10 +04:00
|
|
|
to be used for each connection.
|
|
|
|
The
|
2004-04-25 06:13:37 +04:00
|
|
|
.Dv TCP_MAXSEG
|
|
|
|
option allows the user to determine the result of this negotiation,
|
|
|
|
and to reduce it if desired.
|
Initial commit of a port of the FreeBSD implementation of RFC 2385
(MD5 signatures for TCP, as used with BGP). Credit for original
FreeBSD code goes to Bruce M. Simpson, with FreeBSD sponsorship
credited to sentex.net. Shortening of the setsockopt() name
attributed to Vincent Jardin.
This commit is a minimal, working version of the FreeBSD code, as
MFC'ed to FreeBSD-4. It has received minimal testing with a ttcp
modified to set the TCP-MD5 option; BMS's additions to tcpdump-current
(tcpdump -M) confirm that the MD5 signatures are correct. Committed
as-is for further testing between a NetBSD BGP speaker (e.g., quagga)
and industry-standard BGP speakers (e.g., Cisco, Juniper).
NOTE: This version has two potential flaws. First, I do see any code
that verifies recieved TCP-MD5 signatures. Second, the TCP-MD5
options are internally padded and assumed to be 32-bit aligned. A more
space-efficient scheme is to pack all TCP options densely (and
possibly unaligned) into the TCP header ; then do one final padding to
a 4-byte boundary. Pre-existing comments note that accounting for
TCP-option space when we add SACK is yet to be done. For now, I'm
punting on that; we can solve it properly, in a way that will handle
SACK blocks, as a separate exercise.
In case a pullup to NetBSD-2 is requested, this adds sys/netipsec/xform_tcp.c
,and modifies:
sys/net/pfkeyv2.h,v 1.15
sys/netinet/files.netinet,v 1.5
sys/netinet/ip.h,v 1.25
sys/netinet/tcp.h,v 1.15
sys/netinet/tcp_input.c,v 1.200
sys/netinet/tcp_output.c,v 1.109
sys/netinet/tcp_subr.c,v 1.165
sys/netinet/tcp_usrreq.c,v 1.89
sys/netinet/tcp_var.h,v 1.109
sys/netipsec/files.netipsec,v 1.3
sys/netipsec/ipsec.c,v 1.11
sys/netipsec/ipsec.h,v 1.7
sys/netipsec/key.c,v 1.11
share/man/man4/tcp.4,v 1.16
lib/libipsec/pfkey.c,v 1.20
lib/libipsec/pfkey_dump.c,v 1.17
lib/libipsec/policy_token.l,v 1.8
sbin/setkey/parse.y,v 1.14
sbin/setkey/setkey.8,v 1.27
sbin/setkey/token.l,v 1.15
Note that the preceding two revisions to tcp.4 will be
required to cleanly apply this diff.
2004-04-26 02:25:03 +04:00
|
|
|
.It Dv TCP_MD5SIG
|
|
|
|
This option enables the use of MD5 digests (also known as TCP-MD5)
|
|
|
|
on writes to the specified socket.
|
|
|
|
In the current release, only outgoing traffic is digested;
|
|
|
|
digests on incoming traffic are not verified.
|
|
|
|
The current default behavior for the system is to respond to a system
|
|
|
|
advertising this option with TCP-MD5; this may change.
|
|
|
|
.Pp
|
2004-04-29 16:44:46 +04:00
|
|
|
One common use for this in a
|
2004-04-29 16:47:59 +04:00
|
|
|
.Nx
|
2004-04-29 16:44:46 +04:00
|
|
|
router deployment is to enable
|
Initial commit of a port of the FreeBSD implementation of RFC 2385
(MD5 signatures for TCP, as used with BGP). Credit for original
FreeBSD code goes to Bruce M. Simpson, with FreeBSD sponsorship
credited to sentex.net. Shortening of the setsockopt() name
attributed to Vincent Jardin.
This commit is a minimal, working version of the FreeBSD code, as
MFC'ed to FreeBSD-4. It has received minimal testing with a ttcp
modified to set the TCP-MD5 option; BMS's additions to tcpdump-current
(tcpdump -M) confirm that the MD5 signatures are correct. Committed
as-is for further testing between a NetBSD BGP speaker (e.g., quagga)
and industry-standard BGP speakers (e.g., Cisco, Juniper).
NOTE: This version has two potential flaws. First, I do see any code
that verifies recieved TCP-MD5 signatures. Second, the TCP-MD5
options are internally padded and assumed to be 32-bit aligned. A more
space-efficient scheme is to pack all TCP options densely (and
possibly unaligned) into the TCP header ; then do one final padding to
a 4-byte boundary. Pre-existing comments note that accounting for
TCP-option space when we add SACK is yet to be done. For now, I'm
punting on that; we can solve it properly, in a way that will handle
SACK blocks, as a separate exercise.
In case a pullup to NetBSD-2 is requested, this adds sys/netipsec/xform_tcp.c
,and modifies:
sys/net/pfkeyv2.h,v 1.15
sys/netinet/files.netinet,v 1.5
sys/netinet/ip.h,v 1.25
sys/netinet/tcp.h,v 1.15
sys/netinet/tcp_input.c,v 1.200
sys/netinet/tcp_output.c,v 1.109
sys/netinet/tcp_subr.c,v 1.165
sys/netinet/tcp_usrreq.c,v 1.89
sys/netinet/tcp_var.h,v 1.109
sys/netipsec/files.netipsec,v 1.3
sys/netipsec/ipsec.c,v 1.11
sys/netipsec/ipsec.h,v 1.7
sys/netipsec/key.c,v 1.11
share/man/man4/tcp.4,v 1.16
lib/libipsec/pfkey.c,v 1.20
lib/libipsec/pfkey_dump.c,v 1.17
lib/libipsec/policy_token.l,v 1.8
sbin/setkey/parse.y,v 1.14
sbin/setkey/setkey.8,v 1.27
sbin/setkey/token.l,v 1.15
Note that the preceding two revisions to tcp.4 will be
required to cleanly apply this diff.
2004-04-26 02:25:03 +04:00
|
|
|
based routers to interwork with Cisco equipment at peering points.
|
|
|
|
Support for this feature conforms to RFC 2385.
|
|
|
|
Only IPv4 (AF_INET) sessions are supported.
|
|
|
|
.Pp
|
|
|
|
In order for this option to function correctly, it is necessary for the
|
|
|
|
administrator to add a tcp-md5 key entry to the system's security
|
|
|
|
associations database (SADB) using the
|
|
|
|
.Xr setkey 8
|
|
|
|
utility.
|
|
|
|
This entry must have an SPI of 0x1000 and can therefore only be specified
|
|
|
|
on a per-host basis at this time.
|
|
|
|
.Pp
|
|
|
|
If an SADB entry cannot be found for the destination, the outgoing traffic
|
|
|
|
will have an invalid digest option prepended, and the following error message
|
|
|
|
will be visible on the system console:
|
|
|
|
.Em "tcp_signature_compute: SADB lookup failed for %d.%d.%d.%d" .
|
2004-04-25 06:13:37 +04:00
|
|
|
.El
|
|
|
|
.Pp
|
1993-03-21 12:45:37 +03:00
|
|
|
The option level for the
|
1998-04-30 12:50:03 +04:00
|
|
|
.Xr setsockopt 2
|
1993-03-21 12:45:37 +03:00
|
|
|
call is the protocol number for
|
|
|
|
.Tn TCP ,
|
|
|
|
available from
|
|
|
|
.Xr getprotobyname 3 .
|
2004-04-25 06:13:37 +04:00
|
|
|
.Pp
|
2002-07-18 07:22:11 +04:00
|
|
|
In the historical
|
2002-07-18 07:20:51 +04:00
|
|
|
.Bx
|
|
|
|
.Tn TCP
|
|
|
|
implementation, if the
|
|
|
|
.Dv TCP_NODELAY
|
|
|
|
option was set on a passive socket, the sockets returned by
|
|
|
|
.Xr accept 2
|
|
|
|
erroneously did not have the
|
|
|
|
.Dv TCP_NODELAY
|
|
|
|
option set; the behavior was corrected to inherit
|
|
|
|
.Dv TCP_NODELAY
|
|
|
|
in
|
|
|
|
.Nx 1.6 .
|
1993-03-21 12:45:37 +03:00
|
|
|
.Pp
|
|
|
|
Options at the
|
|
|
|
.Tn IP
|
1998-04-30 12:50:03 +04:00
|
|
|
network level may be used with
|
1993-03-21 12:45:37 +03:00
|
|
|
.Tn TCP ;
|
|
|
|
see
|
2000-05-22 06:01:34 +04:00
|
|
|
.Xr ip 4
|
|
|
|
or
|
|
|
|
.Xr ip6 4 .
|
1993-03-21 12:45:37 +03:00
|
|
|
Incoming connection requests that are source-routed are noted,
|
|
|
|
and the reverse source route is used in responding.
|
2003-11-23 10:25:11 +03:00
|
|
|
.Pp
|
|
|
|
There are many adjustable parameters that control various aspects
|
|
|
|
of the
|
|
|
|
.Nx
|
|
|
|
TCP behavior; these parameters are documented in
|
|
|
|
.Xr sysctl 3 ,
|
|
|
|
and they include:
|
|
|
|
.Bl -bullet -compact
|
|
|
|
.It
|
|
|
|
RFC 1323 extensions for high performance
|
|
|
|
.It
|
|
|
|
Send/receive buffer sizes
|
|
|
|
.It
|
|
|
|
Default maximum segment size (MSS)
|
|
|
|
.It
|
|
|
|
SYN cache parameters
|
|
|
|
.It
|
|
|
|
Initial window size
|
|
|
|
.It
|
|
|
|
Hughes/Touch/Heidemann Congestion Window Monitoring algorithm
|
|
|
|
.It
|
|
|
|
Keepalive parameters
|
|
|
|
.It
|
|
|
|
newReno algorithm for congestion control
|
|
|
|
.It
|
|
|
|
Logging of connection refusals
|
|
|
|
.It
|
|
|
|
RST packet rate limits
|
|
|
|
.El
|
1993-03-21 12:45:37 +03:00
|
|
|
.Sh DIAGNOSTICS
|
|
|
|
A socket operation may fail with one of the following errors returned:
|
|
|
|
.Bl -tag -width [EADDRNOTAVAIL]
|
|
|
|
.It Bq Er EISCONN
|
|
|
|
when trying to establish a connection on a socket which
|
|
|
|
already has one;
|
|
|
|
.It Bq Er ENOBUFS
|
|
|
|
when the system runs out of memory for
|
|
|
|
an internal data structure;
|
|
|
|
.It Bq Er ETIMEDOUT
|
|
|
|
when a connection was dropped
|
|
|
|
due to excessive retransmissions;
|
|
|
|
.It Bq Er ECONNRESET
|
|
|
|
when the remote peer
|
|
|
|
forces the connection to be closed;
|
|
|
|
.It Bq Er ECONNREFUSED
|
|
|
|
when the remote
|
|
|
|
peer actively refuses connection establishment (usually because
|
|
|
|
no process is listening to the port);
|
|
|
|
.It Bq Er EADDRINUSE
|
|
|
|
when an attempt
|
|
|
|
is made to create a socket with a port which has already been
|
|
|
|
allocated;
|
|
|
|
.It Bq Er EADDRNOTAVAIL
|
1998-04-30 12:50:03 +04:00
|
|
|
when an attempt is made to create a
|
1993-03-21 12:45:37 +03:00
|
|
|
socket with a network address for which no network interface
|
|
|
|
exists.
|
|
|
|
.El
|
|
|
|
.Sh SEE ALSO
|
|
|
|
.Xr getsockopt 2 ,
|
|
|
|
.Xr socket 2 ,
|
2003-11-23 10:25:11 +03:00
|
|
|
.Xr sysctl 3 ,
|
1993-03-21 12:45:37 +03:00
|
|
|
.Xr inet 4 ,
|
2000-05-22 06:01:34 +04:00
|
|
|
.Xr inet6 4 ,
|
2001-09-22 20:36:21 +04:00
|
|
|
.Xr intro 4 ,
|
2000-05-22 06:01:34 +04:00
|
|
|
.Xr ip 4 ,
|
|
|
|
.Xr ip6 4
|
1998-04-30 12:50:03 +04:00
|
|
|
.Rs
|
|
|
|
.%R RFC
|
|
|
|
.%N 793
|
|
|
|
.%D September 1981
|
|
|
|
.%T "Transmission Control Protocol"
|
|
|
|
.Re
|
|
|
|
.Rs
|
|
|
|
.%R RFC
|
|
|
|
.%N 1122
|
|
|
|
.%D October 1989
|
|
|
|
.%T "Requirements for Internet Hosts -- Communication Layers"
|
|
|
|
.Re
|
1993-03-21 12:45:37 +03:00
|
|
|
.Sh HISTORY
|
|
|
|
The
|
|
|
|
.Nm
|
|
|
|
protocol stack appeared in
|
|
|
|
.Bx 4.2 .
|