and "pass-filter" and "inbound" and "outbound" qualifiers in the filter
expression, use new "active-filter-in", "active-filter-out", "pass-filter-in",
and "pass-filter-out" without these qualifiers.
This is necessary due to the horrible, awful way "inbound" and "outbound"
were specified for the filter programs when a packet was passed through them.
Basically, the "address" byte in the serial PPP header was overwritten with
a value to indicate the direction. However, the "address" byte doesn't even
exist on PPP headers for all other PPP encaps! So, this old method worked
only for serial encaps, and corrupted packets for all others (PPPoE, ATM, etc.)
Currently an invalid entry will cause any subsequent entries to fail
if hostlookups take take several seconds (This can happen with DNS).
Now we can more easily detect this situation.
Also, fix the same core dump in the case where there are no `_build' lines.
These should probably both emit a warning, so the user knows what happened.
DoS attacks (e.g. looping packets between two echo ports).
This should "fix" PR bin/2455.
Could please anyone with an appropriate "hacker tools" check this?
once we determined the rigth protocol to use, recall get_nfs_version()
so that the last RPC call was a successfull one. Otherwise with a SunOS 4.1.4
server (which doesn't accept TCP mounts) UDP mounts would fail.
.Sh "SEE ALSO"
to:
.Sh SEE ALSO
The doc macros check for the latter (actually just for 'SEE' as the first
argument to .Sh) to set the section header SEE ALSO flag, which modifies
some behaviour (e.g. references done with .Rs/.Re).
It require "_crunch" section in /etc/man.conf to re-compress the compressed man pages.
It handle symbolic links, but at this time no hard links.
config files are stolen from man with few changes to support "_crunch" section.
catman.8 miss the "full moon" joke, I can't remember it, if you can pleas add it :-)