UWVFP(FP0؋F&O F&G&G < ʋЋƋ$6&~&6&F&9EtL2p P3PF&EĞ&(6&>p t*6&>v t
T F&EF  ,6&> ~F  vFĞ&^&9~ Ì~ڹ- F*Ftz8ftF^&8Gui~ tF^&8GuWF+F;F| F9Fu~ tF@t8F^&8Gt,F+F;F~<.6&> t0^&GĞ&v&@F[FF,6&9~2F^&8GuFuӋvzvĞ&7X06&?&& DPĞ&& & 	26&>| u46&z  66& ^&Gȋƻ[ ؎86&>&I86&&a~ t;F*PĞ&& & 	46&z  F*Pv:6&&ud26&>| u46&z  Ğ&& & 	<6&6&6`	 P,>6&F&Ht8PP
|FPPh
P :6&6&6P
|FPPh
P *6&>v t	 B l PP ]	@6&6&6`Ğ&& & 	pP 	B6&R&TĞ&7FD6&FF6& fĞ&7FtH6&&J6&H6&J6& f% = ؎L6&FD6&FF6& ^_]ːU VN6&6 &6rP
N6&6 &6"P
vPrPh
P"Ph
FPrPXX@uNFP"PXX@uQN6&6 &6"P
P6&6(&6&"Ph
FP"PXX@u FV9Vv r9Fv ~ } 	~[s  PrPCu Ɔr  PrPVj36d6brP
udp P~QPVj3FPF- P86&6&6VPR6& [ RPFV-  RP,6&V2^]U WV+PP(FVN6&6 &6FP
N6&6 &64P
PFPh
P4Ph
FP4PXX@uQN6&6 &64P
P6&6(&6&4Ph
FP4PXX@u3FV9Vw1r9Fs*FVFV06&X& & 	FVFVFVPPFPCu  P6d6bVh4p P~QPVh43,602&9?~Dv3ɉNރ,.&Gt&u&g[GĞ0&9?ЋvFP[ Ğ0&/P86&6&6VWV2FPFPR^_]ːUTWVN6&6 &6FP
PFPh
PFPVt)FPV Qp Q~RQxWV^_]ːU"WVFP(FP0V< &m&EFT6&F&M FF&EF  ~,6&F 86&& ؉V$6&FN9Nu ~ t	F&u|v&DF&8Gtl&G
*Fta&G:F
tF&D8FuJF&G9F
tF&D8Fu0Fw&F;FF&@t +~9~~~[A9N~a~} +FFf~@~F 39N 86&&> ؉V~؃~ tFw&uZFw&*FtJF&F
t	F&8Eu4Fw&F
t	F&8EuFw&FF;F}F[A9N~V~ t} ^_]ːear all searchU WVPVt5P 6	u$FPVVP
VP ƆV PVPh
FPVPXXt$VPP(P P~W PVuP(P P P-PVP26	
FVu$VP0P(P PvvW PvV;t2VPLP(Pvv Pvvt$VPwP(P PF
 3RT&7&GLX"3NP&&G&<pt#pPWP(P PĞN&&WVF ~> MVv~~؎ZX& &+ǋV& &PIuvĞN&F&7&GĞR&&&GÌ V&$3&	&> 
&
&	ߎ&&3&OF&&&ʋH(3JL&&G*3&&F&ʋFPQ"@F ĞJ&&?~G~ VvN~& &+ǋV& &PAĞJ&&9ڋ~v*3&F&7&GĞJ&&@&GF,3&>
&
M.3&& ^_]ː&u0U.WV4Z9&  3\9&6^9&"`9&b9&r
d9&bf9&dh9&fj9&h+ɉNNvvZ 	RP"PrQP
V^V۹ ^VNV l9&>n u-n9&X&B&@	"P|	3brQPt~
 PvvPt!2PP ]	p9&tN 릐2PP ]	p9&u,
QP2PP ]	p9&u0~+PP(FV P+PP(ȋ+FV~9&&SQvvvVr	FV~9&&d 3SQRPFVd RPvvFVvvRP< RPSQRPvv⚺RPFމVTSQvvމFډVܚT< 3SQvvF։VؚFV؋Nڋ^+SQF҉VԚT+FVRPvvvvvvZ 	RPn9&X&r&p	N ~9&pr9^F&? tt9&>v t^&? t;^9&>" u\9&>6 u`9&> tPvv^&? tMt9&>v tA P Pv9&68&66`  Px9&GPv9&68&66 t ظ[ .ظ&&،F&Gt1&9}&Gع&;z
~36&z
F&9G|&Fu
&> tF&Gu
&
t~ u
&> tF&Gt
&
u PvvPt}pr9^F&? tMt9&>v tA P Pv9&68&66`  Px9&JPv9&68&66+PP(FVz9&>| u|9&z  ,
QP|%^&? tMt9&>v tA P Pv9&68&66`  Px9&GPv9&68&66 Pvv P n9&X&F&D	 Pvv Pr9&>p tMt9&>v tA P Pv9&68&66`  Px9&GPv9&68&66 ^_]UWV P3Z9& P
QP9+& &
~u19&9>"t2PP ]	p9&u
|]	u9& 9&F|#[ n9&&@t9&  2P
P ]	=tz9&>| u|9&z  r9&>p tt9&>v tT 9&>" t2PP ]	p9&tt 3P t 9&N&Ltsd P 	FV|]	t6~vv` 	u!d P 	FV]	|]	u͚]	3P9&6N&6L tmpP 	FVRP` 	tP~|]	t@2P
P ]	=t*	vv` 	t	3b2PP ]	p9&t;3PN ^9&>" u\9&>6 u`9&> t N ( ^_]ːU WV9
&? |%[ &/9&&~ڹ- Ğ
&? } ^9&>" t5~ t/F*Pn9&X&N&L	F*P3~9&& t1B*PWn9&X&R&P	
B*PFF;r`9&? u\9&>6 t?Ğ
&? |5~ t/F*Pn9&X&V&T	F*PO9&&uĞ&? u\9&>6 u^9&>" u n9&X&Z&X	9&6&6`	 P,9&6&6P
Ğ
&? |FPPh
 P  PP ]	n9&X&^&\	9&6&6`pP 	9&R&T3^9&"\9&6Ğ&^_]ːU욀"P9&6&6n9&X&&	9&6&6`嚖t9&>v t9&63P]	9&>L tr9&>d u.]	v]UVvu3,ȋƙ+T؋ʙùd P 	^]ːUWV~9&B&DF&9Eu	&9U
u&E
&Eu
9&& 9&6&6KP
KP"KF^F  9& & u ~N؋W&9Du&9T
tGGu 9&&Vu VV&? u$~9&> t3"PvW ~^FFG&< u^&7"PvW_9&6&6KP
KP"K^9&F&9t&9&> uF&5"PDvP
K^_]ːUt9&>v ur9&>p u3P,9&@P"PrQP
 P Q9&6&6` rQP9&6&6Z 9&@P9&6
"PrQP
 P P9&6&6` rQP9&6&6Z  9&bFt'P9&6&6"PrQP$9&6&6#PrQP P Q9&6&6` #P9&6&6Z  P P9&6&6` rQP9&6&6Z 3P9&6^ 	]ːt9&>v t&r9&>p t  P9&6&6 ːU.WV~FL^ }dǹ[ FԻ9^֌F&&GtFLBƌ@V~ t	F& ^&^&GtFF&C~ t
FF& ^&^&GtFF&D~ t
FF& ~ t$^&^&G@tFF&FFF& ^&^&GtFF&H~ t
FF& ^&^&GtFF&K~ t
FF& ^&^&GtyFF&L~ ti^&^&GF|@P+#+FP0#PFP
FڌҋȎڋ6? t!vNG^F&= uv~~ t$^&^&GtFF&MFF& ^&^&GtFF&N~ t
FF& ^&^&GtFF&S~ t
FF& ^&^&G tFF&R~ t
FF& ~ t^~&=&At
FF&XF& FL^_]ÐUt9&>v u r9&>p u 9&> u3P9&6+RP9&@P5#PrQP
 P Q9&6&6` rQP9&6&6Z 
 P P9&6&6` vv9&6&6Z T ]U WV3Pz9`b&? }Tt9&>v uEWĞ`&@PXn9\^&&f&ddP P P9XZ&w&7` dPĞX&w&7Z  PĞ`&7؋F&? tTPVĞ\&&j&hdP PPĞX&w&7` dPĞX&w&7Z 9TV&G&u9&w&7dP
A#PdPh
 PJ#PdP26	
Vu FPV QQNQFWV~ u vrĞT&w&7dP
M#PdPh
3PdQNQ* 6	
uqvFP; PdPFP* 6	
t@2 P PĞX&w&7` Ğ\&&n&lĞX&w&7Z T ^_]R$bCLS U.WV4 ع 4&
  &QP(4+&,&*&(&0&.p4^F&9t&4&9vtotice and authorship remains intact.
&? u - ~ٹ ~ t%FFF  4&F~FF  FP	RP4&6 &6 
PrQPrQPBFP	RP
PrQPrQPBF~js)+FFFFFF4^ތF&4&>v% 4^ڌF&4&>x^&4&
4&9s4&>  t^&3PN։VRQ QD~ u 
QP P	tuHtpHtHHtMcuW^&^&ub 4&h4&d4&X&&	뤚u
^&^&u2봎4&h 3P4&T 4&h t
F҉NԐ3^&9?~14&t&4	QPFuG^&9?ҚHu HuGHtvHu }W4&t
 ;E2PP ]	4&u)FP P	3Pvvָ P4&u^&^&t 4&d4&h4&X&&	u^&^&t밐62PP ]	4&u_4&> tPFP P	3Pvvָ P"2PP ]	4&uFFP Q	F  4&^&? tp4&>v td4&6&6
PrQP
 P P4&6&6` rQP4&6&6Z T 4&h 3PO
QP P	4&^&? tp4&>v td4&6&6
PrQP
 P P4&6&6` rQP4&6&6Z T 4&T4&h  
QP P	4&^&? tp4&>v td4&6&6
PrQP
 P P4&6&6` rQP4&6&6Z T 3P 5&	 5&b4&d5&f4&h Pvvָ Pf3Pvvָ PQ^_]WV+ 




&&r
&&6&"&&
& ع ^_ːUVXP 	FVRP` 	uuv2PP ]	4&tY	uP2PP ]	 tFF&
t*<t&P]		vv` 	t '2PP ]	:]	
 P	]	3^]ːU(WVb5&? u]v
vFVFtHt#HuHuHu )F  396F~(D Pv
vWd
uF;6F|ۋ~F
&} t=&u&uvvPbPF
&u/PFP
2vvbP
F
&u&u8PFPFǇF  Ğ&7bPEPPTPPVus5&&tZFǇF bP
Ğ&7bPWPPfPPVFu-~ uyP4&X&>&<	UFPVFPbPh
bPP<uX9Ft!bP4&X&B&@	FDF^FFV
~ ~ t+v
vZ 	RP4&X&F&D	PB>F uy396F~%D Pv
vWd
t
F;6F|96F/~ u=v
vZ 	RP4&X&J&H~F
&} t=&u&uvviPbPF
&uyPFP
2vvbP
F
&u&uPFPF? t5&6&6bP
FPbPh
  F;6F}rFFFFDFDFF+ƉF~vF^ ^F^FFFNuFbPBu$9FubP4&X&N&L?~ u bP4&X&R&P	 5&&u Ğ&7PPbPPbPRPD5&&t-Ğ&7PPbPbPB3^_]U($
5^ތF&? u 5^ڌF&G&u t66` 	u d P 	5&bFtP^&w&7PNFP^&w&7PNFPFPNFPXXuDNFPB^&74&X&&	5&z  ^&7]39&RzLxL9&9ptI9&9vt> PP9&6&6` #P9&6&6Z T #P|	]	9&$PP ]	 Pu 9&X&N&L	3n9&>p tJ9&>v t> PP9&6&6` #P9&6&6Z T $P|	 PV39&RzLxL9&9ptH9&9vt= PP9&6&6` &$P9&6&6Z T 
H$P|	:]	9&$PP ]	3PNtz9&>p tK9&>v t? PP9&6&6` S$P9&6&6Z T u$P|	3P u4^ːUWV9&
&
VȋڀFV$PSQ
$PvW
QPr9&QPZ 	RP$P	9&QPZ 	RPvW'3FF9&9~Q~9&9>t,$PvvPVZ 	RPvvG9&9>~$PvW89^F+&G&9Ft
QP:'~ uZzL0QP:~9^&G&t- P&w&7vv<
^&G SvW%$PvW~ t)9&>^ u9&>` t$6$1$+9&t$PvW9&u$PvW$PvW9&>بt+&~ u:&#Ft &ِFt vt
 &6بt$`~ t6 t$PvW t$PvWƨt3$" t$ t$
ƨt$PvW9&t~ t9&>z u$PvW$PvW$PvWw$PvWh9&>ju9&X&&$ډFVRP9&69&6$P P%PvvvvvW%PvW9&6&69&6&6 :&6&6#%PvvvvvWB:&6&6:&6&6:&6&60%PvvvvvW=%PvWD:&&&(0T|RPE%PvvvvvWvW"9&$PP ]	F  pP 	FVv~vvO%PvV
vV"PvVj!	F P Q\%QJ]	 PvV"PvVJ]	 PvvvJ]	F  ~ ~;~v^^ ؋Ǌ*3QǊ*&3ZF;v|։~v]	v_%PvV
 PvV"PvVJ]	FF= v P 	FVvv` 	t 2PP ]	
:&uvv` 	t|]	u	t 	3P(	-* ui%PvV
vV2ui6`#6^#vVFuN6p#6n#vvFt  ~9&X&&e%PFPWƋFv 2PP ]	9&X& & V\2PP ]	
:&u9&X& & ˎ9&X&&k%PFPVǋFvW	3^_]UWVF ǆP  Ɔ{ ǆ8o%:ǆ<w%>ǆ@~%BǆD%FǆH%J+NL9&
&
vx~prt89
+&G&n9&9ptH9&9vt= PP9&6&6` %P9&6&6Z T 
%P|	T:& P 	FVpP 	FV+FF{{<vv~ uZ6`#6^#%P~V P~V"P~VJ]	net/hosts. Why is this
 done? Because Fred's Linux/PRO distribution of Linux keeps all
 machine-specific configuration files in /conf. And because this is
 the way he does it, we may as well too. In general it makes things
 easier to locate. If you want to keep all of your net files in 
 /etc, that's fine, but you'll have to put them there by hand.

 Make a backup of everything in /etc before you unpack net-base. 
 Then unpack it from / (the root directory):

  # cd /
  # zcat net-base.tar.z | tar xvvofp -

 Also, unpack net-std.tar.z, which contains the network clients and
 daemons (e.g., telnet and telnetd). Unpack it from / as well:

  # cd /
  # zcat net-std.tar.z | tar xvvofp -


 If you wish to use tin (a newsreader), or DIG (the DARPA Internet
 Groper), unpack the net-ext package from /:

  # cd /
  # zcat net-ext.tar.z | tar xvvofp -

 Now unpack the fixed versions of rlogin/telnetd from the files:

  # cd /tmp
  # gzip -dc ftpd.tar.z | tar xvf -
  # gzip -dc telnet-rlogin.tar.z | tar xvf -

  you will then need to copy the binaries to where the old
  version currently live.
  
 Finally, unpack the net-032 package, which contains the sources
 for the TCP/IP setup programs (ifconfig, arp, route, etc.) and the
 configuration files. This is unpacked into /usr/src/net-032.

  # mkdir /usr/src/net-032
  # cd /usr/src/net-032
  # zcat net-032.tar.gz | tar xvvofp -
  # make install

 ** Important information for Shadow Password users **
 If you are using the SLS distribution, then replace any blank
 passwords in /etc/passwd with :x: instead of ::.
 Otherwise rshd/rlogind will let anyone become these user ids.
        This is an SLS setup bug and will, by default allow anyone remote
 access to your machine, with root priveledges!

2.2 Putting things in the right place.

 With the standard NET-2 distribution, all of the configuration files
 are in /conf/net, with links in /etc. For example, /etc/hosts
 is a link to /conf/net/hosts. However, if you are using a 
 standard pre-packaged distribution of Linux such as SLS, /conf/net
 probably isn't used... that is, /etc/hosts is just /etc/hosts.
 So, when I say "/conf/net/hosts", I mean "/etc/hosts", and vice
 versa.

 Just keep in mind that the TCP/IP software only looks in /etc and
 /usr/etc for configuration files. Therefore, it makes sense to
 keep all of your files in /etc and /usr/etc as they should be.
 HOWEVER, Fred has decided to put the files in /conf/net with LINKS
 in /etc. Either way, it doesn't matter. When we say "/etc/hosts",
 it doesn't matter if /etc/hosts is an actual file or a link to
 /conf/net/hosts.

 If you just unpacked NET-2 above (i.e. you don't already have the
 files from installing SLS), then you don't have the configuration
 files in /conf/net (you only have the symlinks in /etc). 
 The easiest way to get the configuration files in /conf/net is
 to copy them from the net-032 distribution:

  # mkdir -p /conf/net
  # chown -R root.root /conf; chmod -R 755 /conf
  # cp /usr/src/net-032/etc/* /conf/net

 You should make sure that all of the symlinks to /conf/net in /etc
 can be resolved (that is, try to "more" or "cat" each file, make
 sure you don't get any errors). Also note that some files will
 be duplicated: for example, /etc/inetd.conf is a symlink to 
 /usr/etc/inetd.conf. However, from the cp command above you also
 have a /conf/net/inetd.conf, which can be deleted (remember that
 all of the programs still look in /etc, not /conf. So whatever is
 in /etc is the file which is actually being used).


2.3 Creating the device interfaces.

 In previous versions it was necessary to create a number of
 device files for the NET-2 code. This is no longer the case.

 If you have any of the following files created you should delete
 them:

 rm /dev/net /dev/unix /dev/inet
 rm /dev/ip /dev/icmp /dev/tcp /dev/udp
 rm /dev/wd0 /dev/wd1 /dev/wd2 /dev/wd3
 rm /dev/ec0 /dev/ec1 /dev/ec2 /dev/ec3
 rm /dev/ne0 /dev/ne1 /dev/ne2 /dev/ne3

 should clean them all.

 However, the arp program does need /dev/arp, so:

 mknod -m 600 /dev/arp c 16 1

 will create it ok. If you already have it, check that it looks
 the same.

3. Building the Kernel.
 
 You're now ready to build the new 0.99.pl14 kernel with the NET-2
 code enabled. 

3.1 Configuring the NET-2 kernel code.

        A 'make config' will take you through configuring the kernel
        Select the drivers you desire by answering 'yes' when prompted.

 Note, you will be prompted for "Network Device Support?", but
 the label after it might suggest that this is for Ethernet only,
 this is not the case, and you must answer 'yes' to this, even if
 you only desire the slip or plip drivers to be configured.
 You will be asked later about each of the ethernet drivers,
 slip and plip in turn.

 The Ethernet HOWTO also contains much useful information for
 configuring Ethernet devices in the kernel.

3.2 Building the kernel.

 You can now build the kernel as you normally would (see the file
 /usr/src/linux/README if you've never done this before). Essentially
 this entails editing /usr/src/linux/Makefile to set root device and
 default display mode. (*Note: keyboard is now handled by loadable
 keymaps as of 0.99.pl10; grab the file keytable.tar.z from your 
 nearest Linux ftp site). 

        Finally do 'make dep' and 'make'. You now have a new 0.99.14 kernel
        with NET-2 set up. I wouldn't reboot it quite yet as we still have
        to configure the NET-2 programs before it will work correctly.

4. Configuring NET-2 TCP/IP.

 The final step is to modify the various setup files to get NET-2
 working. After this is ready you can boot your new kernel and 
 go happily netting (if all goes well).

 In this section I'll describe each of the major TCP/IP setup files,
 what they do, and what you need to do to configure them. 

 If you're using SLIP, see section 5.0 on configuring SLIP. The
 discussion below is for Ethernet connections only. SLIP users
 should FIRST read all of section 4.0 and then apply the changes
 discussed in section 5.0.

4.1 Before you begin.

 Before you can configure NET-2 TCP/IP, you need to find out
 the following information about your network setup. Your network
 admins can tell you most of these things.
 
 * IP address: this is the unique machine address in dotted-decimal
   format. An example is 128.253.153.54. Your network admins will 
   provide you with this number. 
   
   If you're only configuring loopback mode (i.e. no SLIP, no ethernet 
   card, just TCP/IP connections to your own machine---called 
   "loopback") then your IP address is 127.0.0.1.

 * Your network mask ('netmask'). For performance reasons, it is
   desirable to limit the number of hosts on any particular segment
   of a network. If you have a large number of addresses allocated
   to you, you might break those addresses up into large chunks,
   and create subnetworks, and then allow each individual network
   segment be a subnetwork of the whole network. The network mask
   is a pattern of bits, which when overlayed onto an address on your
   network, will tell you which subnet that address lives on. This is
   very important for routing, and if you find, for example, that you
   can happily talk to people outside your network, but not to some
   people within your network, there is a good chance that you have
   an incorrect mask specified.

   Your network administrators will have chosen the netmask when the
   network was designed, and therefore they should be able to supply
   you with the correct mask to use. Most networks are class C
   subnetworks which use 255.255.255.0 as their netmask. Other Class B
   networks use 255.255.0.0. The NET-2 code will automatically select
   a mask that assumes no subnetting as a default if you do not specify
   a mask.

   The masks chosen by default are as follows:

   For addresses with the first byte:
   1-127  255.0.0.0  (Class A)
   128-191 255.255.0.0  (Class B)
   192+  255.255.255.0  (Class C+)

   If one of these doesn't work, try the other. If this
   doesn't work, ask your local net guru for help.

   This applies equally well to the loopback port. Since the
   loopback ports address is always 127.0.0.1, the netmask for
   this port is always 255.0.0.0. You can either specify this
   explicitly or rely on the default mask.

 * Your network address. This is your IP address masked with the netmask.
   For example, if your netmask is 255.255.255.0, and your IP address
   is 128.253.154.32, your network number (IP addr AND netmask) is 
   128.253.154.0. With a netmask of 255.255.0.0, 
   this would be 128.253.0.0. 

   If you're only using loopback, you don't have a net address.

 * Your broadcast address. This is your IP address masked with the
   netmask, and then possibly ORed with the subnetmask inverted.
   Such that for a Class C network, with netmask 255.255.255.0,
   your broadcast address will be your network address (calculated
   above) ORed with 0.0.0.255.
ies, and kernel
 installed, so there's no reason to get the following files.
 Note: they may not be in the places specified in this HOWTO.

 If you DO have the NET-2 software already, skip to section 3 on
 configuration. If you do NOT have the NET-2 software, follow the
 directions below.

 The current kernel version is found in
 nic.funet.fi:/pub/OS/Linux/PEOPLE/Linus/linux-0.99.14.tar.gz. 
 This is a gzipped tar file; .gz is the new extension used by gzip.
 If you have the old version of gzip, "zcat foo.gz | tar xvf -" works.

 The current libraries (libc-4.4.4), can be found in 
 sunsite.unc.edu:/pub/Linux/GCC/image-4.4.4.tar.z. (You'll probably 
 want to install the include files in inc-4.4.4.tar.z as well! See the 
 READMEs there for details.) You'll need at least ver 4.4.2 to use
 NET-2, as there were problems with earlier versions that affected
 routing and netmasks.

 The current NET-2 configuration file distribution is in

 sunacm.swan.ac.uk:
 /pub/misc/Linux/Networking/Programs/System/net032/net-0.32.tar.gz

 This package includes network configuration programs such as
 ifconfig, route, netstat etc.

 The TCP/IP application binaries and setup files are found in:

 tsx-11.mit.edu:/pub/linux/packages/net/net-2/binaries/net-base.tar.z
       "          "    "      "      "    "      "    /net-std.tar.z
       "          "    "      "      "    "      "    /net-ext.tar.z

 As some of the internals of the networking code have changed, you will
 also need to get and install the files that are in the:

 tsx-11.mit.edu:/pub/linux/packages/net/new-net-2

 directory, as they correct some problems you will experience if you
 opt _not_ to get and install them :)

 If you use shadowed password (Most SLS users do), then you may find
 that the standard network programs do not support them. There used
 to be a specially modified package of binaries about, but these were
 intended as a short term fix, and have been removed. Recent work on
 the standard libraries will mean that as of version 4.5.8 of libc,
 the shadow password handling will no longer need to be in the
 application, and will be handled externally. At the time of writing
 libc.4.5.8 has just been released. If you use shadowed passwords
 you will most certainly want a copy of this.

2.1 Unpacking the software.

 You don't need to unpack any of the following if you already have all
 of the NET-2 software installed.
 
 First, unpack the kernel sources in /usr/src. This will put all
 of the kernel sources under /usr/src/linux (the usual place).

  # cd /usr/src
  # zcat linux-0.99.14.tar.z | tar xvf -

 Next, unpack the libraries. 
 (The following is a summary, please read the detailed instructions
 that come with the libraries for complete installation details)

  # cd /
  # zcat image-4.4.4.tar.z | tar xvf -

 Now, make the links to the new libraries in /lib. BE VERY CAREFUL
 that you do not delete the previous links. Do everything in
 one step, as so:

  # ln -sf /lib/libc.so.4.4.4 /lib/libc.so.4
  # ln -sf /lib/libm.so.4.4.4 /lib/libm.so.4

 Next, unpack the net-base package, which contains the basic
 utils and configuration files in /etc. Note that net-base makes
 symlinks in /etc for all of your TCP/IP configuration files to /conf.

 Therefore, BE WARNED: Before you unpack the following tar files,
 make a backup of your files in /etc. Unpacking net-base will overwrite
 many of the files in /etc with symbolic links to other places.
 For example, /etc/hosts is a symlink to /conf/il, cron, etc. as well as the NET-2 daemons (such as inetd).
 They are analogous to the MS-DOS autoexec.bat file, and "rc" might
 stand for "runtime commands". For NET-2 the rc files are found in
 /etc/rc.d. It doesn't really matter where you keep them, as long as
 init can find them. (We'll go into this later). 

 First things first. The file /etc/rc.d/rc.inet1 configures the basic
 TCP/IP interface to your machine, using two programs: /etc/ifconfig
 and /etc/route.

 /etc/ifconfig is used for configuring interface with the parameters
 that they require to function, such as IP addresses, network masks,
 broadcast addresses and the like.

 /etc/route is used to create entries in a table (the routing table)
 that the networking code will look in, to determine where to send
 datagrams that it wishes to transmit.

 Note that in the previous NET-1 code, the name of the interface
 configuration program was "config". However, the "standard" for UNIX
 system TCP/IP configuration is to use ifconfig and route, and this has
 been implemented with NET-2.
 
 THEREFORE: Be sure NOT to use /etc/config in your rc files. "config"
 will not work with NET-2, and if you try and use it you will see
 messages mentioning "old-style ioctl", and it wont work. You should
 only run rc.inet1 and rc.inet2 at boot time (or rc.net after you have
 converted it).

 NOTE: The standard SLS "rc" file file calls "/etc/rc.net" instead
 of "/etc/rc.d/rc.inet1" and "/etc/rc.d/rc.inet2". The SLS rc.net
 file can be treated as just the rc.inet1 and rc.inet2 files in
 one file. So when you see rc.inet1, and rc.inet2 below, just add the
 same commands into /etc/rc.net, and you will achieve the same result.
 It is important that the commands in rc.inet1 be run first, so make
 sure those commands are at the top of the file.

 Below you're going to edit rc.inet1 to use the correct ifconfig and
 route commands for your machine. But first, you need to know the
 information about your network setup in section 4.1, above.

4.2.1 Editing rc.inet1

 Edit the file /etc/rc.d/rc.inet1. This file uses the "ifconfig" and
 "route" commands to configure your network interface at boot time.
 SLS Users: Remember that SLS uses just rc.net, and these command
 should be called first, so put them at the top of the file.

 You may need to do some heavy surgery on this file to get it to look
 right; it may be easier to delete it and start from scratch. Given
 the information above, a possible rc.inet1 for a machine that has
 a single ethernet interface should look like:


#!/bin/sh
# Portion of /etc/rc.d/rc.inet1 to configure the loopback interface

HOSTNAME=`hostname`

# Attach the loopback device. 
/etc/ifconfig lo 127.0.0.1 # uses default netmask 255.0.0.0
/etc/route add 127.0.0.1 # a route to point to the loopback device
# End Loopback Definition

# Portion of /etc/rc.d/rc.inet1 to configure an ethernet interface

# IF YOU HAVE AN ETHERNET CONNECTION, use these lines below to configure the 
# eth0 interface. If you're only using loopback or SLIP, don't include the
# rest of the lines in this file.

# Edit for your setup.
IPADDR="128.253.154.32"  # REPLACE with YOUR IP address!
NETMASK="255.255.255.0"  # REPLACE with YOUR netmask!
NETWORK="128.253.154.0"  # REPLACE with YOUR network address!
    # Note: NETWORK MUST be in
    #       /etc/networks
BROADCAST="128.253.154.255" # REPLACE with YOUR broadcast address, if you
    # have one. If not, leave blank and edit below.
GATEWAY="128.253.154.1"  # REPLACE with YOUR gateway address!

/etc/ifconfig eth0 ${IPADDR} netmask ${NETMASK} broadcast ${BROADCAST}
# If you don't have a broadcast address, change the above line to just:
# /etc/ifconfig eth0 ${IPADDR} netmask ${NETMASK} 

/etc/route add ${NETWORK}   # MUST HAVE AN ENTRY IN
      # /etc/networks !!!

/etc/route add default gw ${GATEWAY} metric 1 # Only necessary if your
      # network has an Internet
      # connection.
# End of Ethernet Configuration


 This is a basic rc.inet1 to run the ifconfig and route commands
 needed to set up a basic TCP/IP connection. Edit this for your setup.
 If you do not have an ethernet interface, and either have a standalone
 workstation (no network connection at all), or you use SLIP, then
 you need only the two lines that refer to the loopback interface "lo"
 as noted.

 To ensure that this will be run at boot time, make sure that you
 include the command:

  /bin/sh /etc/rc.d/rc.inet1

 in your /etc/rc, or in your /etc/inittab (if you're running the
 sysvinit package). In general, make sure that rc.inet1 is run
 BEFORE rc.inet2 at boot time. You may wish to run rc.inet1 and
 rc.inet2 from /etc/rc or /etc/rc.local. Or you can run them from
 /etc/inittab. Either way is fine, but don't run one without the other.


4.2.2 Editing rc.inet2

 Having run rc.inet1, you now your interfaces configured with addresses,
 and a routing table with enough information to get you started. You'll
 now want to do something with them.

 The rc.inet2 script is also run at boot time, AFTER rc.inet1.
 It starts up various TCP/IP daemons such as inetd, portmapper, 
 and so on. Remember that SLS uses just rc.net, thus, the following
 should appear at the bottom of the file.

 Now would be a really good time for you to read Olafs Network
 Administrators Guide. It will help you decide what you need to
 put in this file, and what you don't need to put in this file.

 But Briefly:
 'inetd' is a program that sits in the background and manages
 internet connection requests and the like. It is smart enough
 that you don't need to leave a while bunch of servers running
 even when there is nothing connected to them. When it sees an
 incoming request for a particular service, eg telnet or ftp, it
 will check the /etc/services file, and find what server program
 needs to be run to manage the request, will start it, and hand
 the connection over to it. Imagine it as a master server for you
 internet servers.

 'syslogd' is a daemon (server that runs in the background) that
 handles all system logging. It accepts messages generated for it,
 will distribute them according to the specifications in
 /etc/syslogd.conf. For example, certain types of messages you will
 want to send to the console and also to log to a file, while others
 will need only be logged, while others yet again, will only need
 to go to the console. syslogd allows you to specify what messages
 you want to send where.

 For a more complete and detailed description of how all the networking
 bits and pieces fit together, please get Olaf Networking Guide as
 described in section 0.3 (Related Documentation).


 You will probably want to comment out most of this file, especially
 if you're not planning on using NFS (Network File System). You 
 MUST leave the stanza to run inetd and syslogd uncommented. Note
 that if you DON'T uncomment everything but inetd and syslogd, 
 you may run into network problems at first. The best bet is to 
 comment all of these things out, get yourself on the network, and
 then worry about configuring the rest of the clients in rc.inet2.

 If you're not going to be using NFS, you can comment out the lines
 to run: ugidd, mountd, nfsd, pcnfsd, and bwnfsd.

 You can comment out the stanza to run "umail" unless you have that 
 package. In general, most of the things found in rc.inet2 are "sold 
 separately". I recommend starting only inetd and syslog at first
 until you get everything going.

 The following is a copy taken from Fred's net-032 distribution.
 Please check the "NET" declaration, as some distributions might
 keep the network daemons in another directory.

 Each of the stanzas basically says: "If the filename xxxxxx exists,
 and it is an ordinary file (not a directory, pipe, etc.) then
 execute the following commands".


#! /bin/sh
#
# rc.inet2 This shell script boots up the entire INET system.
#  Note, that when this script is used to also fire
#  up any important remote NFS disks (like the /usr
#  distribution), care must be taken to actually
#  have all the needed binaries online _now_ ...
#
# Version: @(#)/etc/rc.d/rc.inet2 2.18 05/27/93
#
# Author: Fred N. van Kempen, <waltje@uwalt.nl.mugnet.org>
#

# Constants.
NET="/usr/etc"
IN_SERV="lpd"
LPSPOOL="/var/spool/lpd"

# At this point, we are ready to talk to The World...
echo -e "\nMounting remote file systems ..."
/bin/mount -t nfs -v  # This may be our /usr runtime!!!

echo -e "\nStarting Network daemons ..."
# Start the SYSLOG daemon.  This has to be the first server.
# This is a MUST HAVE, so leave it in.
echo -n "INET: "
if [ -f ${NET}/syslogd ]
then
 echo -n "syslogd "
 ${NET}/syslogd
fi

# Start the SUN RPC Portmapper.
if [ -f ${NET}/rpc.portmap ]
then
 echo -n "portmap "
 ${NET}/rpc.portmap
fi

# Start the INET SuperServer
# This is a MUST HAVE, so leave it in.
if [ -f ${NET}/inetd ]
then
 echo -n "inetd "
 ${NET}/inetd
else
 echo "no INETD found.  INET cancelled!"
 exit 1
fi

# Start the NAMED/BIND name server.
if [ ! -f ${NET}/named ]
then
 echo -n "named "
 ${NET}/named
fi

# Start the ROUTEd server.
if [ -f ${NET}/routed ]
then
   echo -n "routed "
   ${NET}/routed -q #-g -s
fi

# Start the RWHO server.
if [ -f ${NET}/rwhod ]
then
 echo -n "rwhod "
 ${NET}/rwhod -t -s
fi

# Start the U-MAIL SMTP server.
if [ -f XXX/usr/lib/umail/umail ]
then
 echo -n "umail "
 /usr/lib/umail/umail -d7 -bd </dev/null >/dev/null 2>&1 &
fi

# Start the various INET servers.
for server in ${IN_SERV}
do
 if [ -f ${NET}/${server} ]
 then
  echo -n "${server} "
  ${NET}/${server}
 fi
done

# Start the various SUN RPC servers.
if [ -f ${NET}/rpc.portmap ]
then
 if [ -f ${NET}/rpc.ugidd ]
 then
  echo -n "ugidd "
  ${NET}/rpc.ugidd -d
 fi
 if [ -f ${NET}/rpc.mountd ]
 then
  echo -n "mountd "
  ${NET}/rpc.mountd
 fi
 if [ -f ${NET}/rpc.nfsd ]
 then
  echo -n "nfsd "
  ${NET}/rpc.nfsd
 fi

 # Fire up the PC-NFS daemon(s).
 if [ -f ${NET}/rpc.pcnfsd ]
 then
  echo -n "pcnfsd "
  ${NET}/rpc.pcnfsd ${LPSPOOL}
 fi
 if [ -f ${NET}/rpc.bwnfsd ]
 then
  echo -n "bwnfsd "
  ${NET}/rpc.bwnfsd ${LPSPOOL}
 fi

fi
echo network daemons started.
# Done!

4.2.2.1 "To named or not to named... that is the question."

 "I dub thee ... "
 Named is the nameserver daemon that runs under TCP/IP. It allows
 your machine to serve the name lookup requests of other machines...
 that is, if a machine wants to find the IP address for 
 "goober.norelco.com", and you have this machine's IP address in your
 named database, then you can service the request and tell other
 machines what goober's address is. 

 Under older implementations of Linux TCP/IP, to create aliases for
 machine names (even for your own machine), you were required to run 
 named on your Linux box to store name->IP address translations. The
 problem with this is that named is generally difficult to setup and
 maintain. To solve this problem, a program called "hostcvt.build"
 was made available on Linux systems to translate your /etc/hosts file
 (see section 4.3) into named database files. However, even with
 this problem out of the way, running named on your system will cause
 some amount of CPU load and network traffic. 

 The bottom line is this: You DO NOT need to run named on your 
 Linux system. The SLS instructions will probably tell you to run
 hostcvt.build to set up named. This is simply unnecessary, UNLESS
 you want to make your Linux system a nameserver for some reason.
 Now, instead of putting hostnames into the named database, you can
 simply include them in the file /etc/hosts (section 4.3). When
 looking up names, your Linux system will first look in /etc/hosts
 and then ask the nameserver out on the net (if you have one).

 The only reason you may want to run named would be if:
   a) You're setting up a network of machines, and need a nameserver
      for one of them (and don't have a nameserver out on the net
      elsewhere);
   b) Your network admins want you to run your Linux system as a
      nameserver for some reason; or,
   c) You have a slow SLIP connection, and want to run a small
      cache-only nameserver on your Linux machine so that you don't
      have to go out on the phone line every time a name lookup
      occurs. (If you are only going to lookup a small number of
      machine names, and you know what they are, you can put their 
      addresses in /etc/hosts instead.) Generally name lookup isn't
      that slow, and should work fine over most SLIP connections.
   d) You want to run a nameserver for fun and excitement.

 In general, you DO NOT need to run named: this means that you
 can comment it out from rc.inet2, and you don't have to run
 hostcvt.build. If you want to alias machines, for example you want
 to refer to "loomer.vpizza.com" just as "loomer", you can add an
 alias in /etc/hosts instead. There is no reason to run named unless
 you truly want a full nameserver on your machine. If you already
 have a nameserver (most machines on the Internet do, and your net
 admins will tell you its address), don't bother running named.

 If you're only using loopback, you can run named and set your
 nameserver address to 127.0.0.1, but that's pointless. (No pun
 intended.) You don't need a nameserver at all if you use only
 loopback; the only hostname you know is your own, and it's in
 /etc/hosts (see section 4.3, below).

 Have I mentioned Olafs Network Administration Guide as described
 in section 0.3 (Related Documentation) yet ??

4.3 /etc/hosts

 /etc/hosts contains a list of IP addresses and the hostnames they 
 map to. In this way, you can refer to other machines on the network
 by name, as well as by IP address. Using a nameserver (see section 4.1)
 also allows you to do the name->IP address translation automatically.
 (Running named allows you to run your own nameserver on your Linux
 box. See section 4.2.2.1 above.)

 This file needs to contain at least an entry for 127.0.0.1 with 
 the name "localhost". If you're not only using loopback, you need
 to contain an antry for your IP address, with your full hostname
 (such as loomer.vpizza.com).  You may also wish to include entries 
 for your gateway and network addresses. 

 For example, if "loomer.vpizza.com" has the IP address 
 "128.253.154.32", my /etc/hosts file would look like:

 # /etc/hosts: List of hostnames and IP addresses
 127.0.0.1   localhost
 128.253.154.32   loomer.vpizza.com loomer
 # end of hosts

 Once again, edit this for your own needs. If you're only using 
 loopback, the only line in /etc/hosts should be for 127.0.0.1, with
 both "localhost" and your hostname after it.
 
 Note that in the second line, above, there are two names for 
 128.253.154.32: "loomer.vpizza.com" and just "loomer". The first name 
 is the full hostname of the machine. The second is an alias---it 
 allows me to just use "rlogin loomer" without having to type in the 
 entire name.

4.3.1 Important note regarding /etc/hosts from NET-032.

 If you using the hosts file that came with NET-032, then:
 The line "%%IP%% %%HOST%% %%ALIAS%%" needs to be deleted from 
 this file! This is a "tag" line used by Fred's experimental net
 config scripts. Matt Welsh is now writing a new set of scripts which
 don't use these lines. In any of these files, you see curious lines
 with entries such as "%%NAME%%", these lines MUST be deleted. If you
 don't delete them, you may have lots of strange errors and overflowing
 syslog files.

4.4 /etc/networks

 The /etc/networks file lists the names and addresses of your own,
 and other, networks. It is used by the route command, and allows
 you to specify a network by name, should you so desire.

 NOTE: Every network you wish to add a route to using the 'route'
 command MUST have an entry in /etc/networks

 Its format is similar to that of the /etc/hosts file, (Sec 4.3)
 and an example one might look like:

#
# /etc/networks: list all networks that you wish to add route commands
#                for in here
#
default  0.0.0.0  # default route    - mandatory
loopnet  127.0.0.0 # loopback network - mandatory
mynet  128.253.154.0 # Example network CHANGE to YOURS
#
# end of networks

 
4.5 /etc/host.conf

 The system has some library functions called the resolver library.
 This file specifies how your system will lookup host names. It should
 contain the two lines:

  order hosts,bind
  multi on

 These two lines tell the resolve libraries to first check the 
 /etc/hosts file for any names to lookup, and then ask the nameserver
 (if one is present). The "multi" entry allows you to have multiple
 IP addresses for a given machine name in /etc/hosts.

 This file comes from the implementation of the resolv+ bind 
 library for Linux. You can find further documentation in the
 resolv+(8) man page (if you have the man page available).

 If you don't, they are available from:
        Site:           src.doc.ic.ac.uk [146.169.2.1]
        Directory:      /computing/comms/tcpip/nameserver/resolv+
        File:           resolv+2.1.1.tar.Z

 This file contains resolv+.8, which is the man page for the
 resolver library.

4.6 /etc/resolv.conf

 This file actually configures the system name resolver.
 This file contains two types of entries: The addresses of your
 nameservers (if any), and the name of your domain (if you have one).
 If you're running your own nameserver (i.e., you're running named
 on your Linux machine: see section 4.2.2.1), then the address of
 your nameserver is just 127.0.0.1 (the loopback address).

 Your domain name is your fully-qualified hostname (if you're a
 registered machine on the Internet, for example), with the hostname
 chopped off. That is, if your full hostname is loomer.vpizza.com,
 your domain name is just "vpizza.com", without the hostname ("loomer").

 For example, if your machine is goober.norelco.com, and has a
 nameserver at the address 128.253.154.5, your /etc/resolv.conf would 
 look like:

  domain norelco.com
  nameserver 127.253.154.5

 You can specify more than one nameserver. Each one
 must have a "nameserver" line of its own in resolv.conf.

 If you're only using loopback, you don't need a nameserver.

4.7 /etc/HOSTNAME

 This is a new file; it contains the full hostname of your machine 
 (with the domain name). It is used by the 'hostname' command, to
 saveyou having to supply the hostname as an argument. For example,
 the machine above would have the file /etc/HOSTNAME:

  goober.norelco.com

 That's all.

4.8 /etc/rc.local

 Change the line in /etc/rc.local (or /etc/rc, depending on your
 setup) which sets your system's hostname, to

  /bin/hostname -S

 (You have a new hostname in /bin.) This sets your hostname from
 the name found in /etc/HOSTNAME. If you don't like this (personally
 I don't), just do:
  /bin/hostname -S <your-hostname>

 For example,
  /bin/hostname -S loomer.vpizza.com

 It IS important that you give a full hostname (with domain name)
 in /etc/HOSTNAME. This allows the hostname command to set the
 host AND domainname in one shot. 

 IMPORTANT: The hostname found in /etc/HOSTNAME *must* be a valid
 hostname. This means that it must be found in /etc/hosts (or that
 your nameserver must be able to resolve it, but you should put it
 in /etc/hosts in case your nameserver is down).

4.9 Other files.

 There are of course many other files in /etc which you may need to
 dabble with later on. Instead of going into them here, I'm going to
 provide the bare minimum to get you on the net. More information will
 be provided in later versions of the NET-2 HOWTO.

 Once you have all of the files set up, and everything in the 
 right place, you should be able to reboot your new kernel and
 net away to your heart's content. However, I strongly suggest
 that you keep a bootable copy of your old kernel and even possibly
 a "recovery disk" (say, the SLS a1 disk, or HJLu's single disk
 boot disk) in case you hosed your /etc/rc files, for example,
 and can't login when you boot. 


5. Configuring SLIP.

 SLIP (Serial Line Internet Protocol) allows you to use TCP/IP 
 over a serial line, be that a phone line, with a dialup modem, or
 a leased asynchronous line of some sort. Of course, to use SLIP you'll
 need access to a dial-in SLIP server in your area. Many universities
 and businesses provide SLIP access all over the world.

 SLIP uses the serial ports on your machine to carry IP datagrams.
 To do this is must take control of the serial device. Slip devices
 are named 'sl0', 'sl1' etc, how do these correspond to your serial
 devices ? The networking code uses what is called an IOCTL (I/O
 control) call to change the serial devices into slip devices. There
 are two programs supplied that can do this, they are 'dip' and
 'slattach'.

 'dip' (Dialup IP) is a smart program that is able to set the speed
 of the serial device, command your modem to dial the remote end of
 the link, automatically log you into the remote machine, search for
 messages sent to you and extract information from them such as your
 IP address, and perform the IOCTL to change the serial device over
 to a slip device.

 'slattach' on the other hand does very little other than set the
 serial device speed and perform the IOCTL to convert it to a slip
 device.

 When do you use which ? You would use dip when your link to the
 machine that is your slip server is a dialup modem, or some other
 temporary link. You would use 'slattach' when you have a leased
 line, perhaps a cable, between two machines, and there is no special
 action needed to get the link working. See section 5.4 for more
 information.
 
 Configuring SLIP is much like configuring an Ethernet interface
 (please read section 4.0 above). However, there are a few key
 differences.

 First of all, slip links are unlike an Ethernet network in that
 there are only ever two hosts on the network, one at each end.
 Unlike an ethernet that is available for use as soon as you are
 cabled, with slip, depending on the type of link you have, you
 may have to command your modem to establish the connection to
 the remote modem. Dialing in and connecting to your SLIP server is 
 usually done at boot time, usually by a program called "dip" 
 (found in the "dip" subdir of the net-032 package). "Dip" not only 
 dials and logs you into the SLIP server, but it also initiates the 
 SLIP connection and runs the appropriate ifconfig and route commands 
 to initialize the device. Therefore, the only lines needed in 
 /etc/rc.d/rc.inet1 are the few commands to initilize the loopback 
 connection at the top (see section 4.2.1 above).

 If you're not using DIP, you may indeed have to edit rc.inet1 for
 your SLIP parameters.

 Also, there are two types of SLIP servers: Dynamic IP address
 servers and static IP address servers. Dynamic servers allocate
 a new, different IP address to you every time you dialin and
 initiate a connection. Static servers give you the same address
 every time. Almost every SLIP server will also prompt you for
 a username and password when dialing in: DIP can handle logging
 you in automatically.

 Essentially, configuring a SLIP connection is just like configuring
 for loopback or ethernet. The main differences are discussed below.
 Read section 4.0 above for information on configuring your TCP/IP
 files, and apply the changes below.

5.1 Static SLIP server connections using a dialup line.

 If you have a static-allocation server (same IP address every time),
 then you may want to put entries for your hostname and IP address
 (since you know what your IP address is!) in /etc/hosts. You should
 also configure the other files listed in section 4.0: rc.inet2, 
 host.conf, resolv.conf, /etc/HOSTNAME, and rc.local). Remember that
 when configuring rc.inet1, you don't need to run the ifconfig and
 route commands other than the two for the loopback interface (if
 you're using DIP to dial your connection).

 In general, your gateway is the IP address of your SLIP server.
 Because DIP handles the configuration of the route, you probably
 don't need to know this, but in some cases you might have to run the
 appropriate ifconfig or route commands in /etc/rc.d/rc.inet1 to
 get it to work correctly. Instead of using "eth0" as your interface 
 name, SLIP connections use "sl0".  Keep in mind that you can't
 ifconfig sl0 until you have dialed the connection and connected to
 the SLIP server.

 Also, you may need to use the "pointopoint" argument to ifconfig if
 DIP does not do it correctly. For example, if your SLIP server's 
 address is 44.136.8.5, and your IP address is 128.253.154.32, you may 
 need to run the command 

  # /etc/ifconfig sl0 128.253.154.32 pointopoint 44.136.8.5

 See the man pages for ifconfig in the net-032 package.

5.2 Static SLIP server connections using a leased line or cable.

 If you have a leased line, or cable to your slip server, then you
 do not need to worry with the hassle of causing your modem to
 dial and establish the connection. In this situation the 'slattach'
 program is the best solution for configuring your SLIP link.

 I can think of no better way of describing the process than by
 illustration. In your rc.inet1 file you would have something similar
 to the following:

# Portion of /etc/rc.d/rc.inet1 for leased line static slip connection
#!/bin/sh
IPADDR="128.253.154.32"         # REPLACE with YOUR IP address!
REMADDR="128.253.154.33" # REPLACE with YOUR OTHER SLIP servers address!

slattach -p cslip -s 19200 /dev/ttyS0
/etc/ifconfig sl0 $IPADDR pointopoint $REMADDR up
/etc/route add default gw $REMADDR

# End

 slattach allocates the first unallocated slip device to the serial
 device specified. slattach starts with 'sl0'. Therefore the first
 slattach command attaches slip device 'sl0' to the serial device
 specified, 'sl1' the next time etc.

 Note also that the first parameter that slattach accepts is one to
 specify the protocol. At present the only working values are
 'slip', and 'cslip'. 'cslip' is compressed slip, it is the same
 slip, except that the datagrams headers have been compressed to
 reduce overhead on the link. On good clean links this is recommended.
 In future protocols such as PPP, and KISS (for Amateur Radio use)
 will be offered.

 After you have 'slattached' the interface, you can now configure
 it with ifconfig as you would an ethernet interface, but since
 there is only one other machine that you can talk to directly via
 the link you do not need to worry about netmasks and the like.
 Normally you would point your default route to the slip interface,
 as it is your connection to every other machine. The pointopoint
 parameter should automatically add a route to the machine at the
 other end of the link. Its primary function is to tell your machine
 that there are no other hosts on that network interface.

 If you have more than one slip interface then you will have routing
 considerations to make. You will have to decide what routes to
 add, and those decisions can only be made on the basis of the
 actual layout of your network connections.

5.3 Dynamic SLIP server connections using a dialup line.

 If your SLIP server allocates a new IP address to you every time
 you dialin, you don't know your IP address at all, so you can't
 include an entry in /etc/hosts for your machine. (If you want, you 
 can place your hostname in /etc/hosts with the address 127.0.0.1). 

 Most dynamic SLIP servers tell you your IP address when you initiate 
 the connection. For example, it may print a string such as, "Your IP 
 address is 128.253.154.10. Server address is 128.253.154.1." DIP will 
 need to know these numbers when it configures the connection. See 
 section 5.3 below on using DIP.

 If you use DIP, it does all of the work of configuring the 
 connection when you dialin, so rc.inet1 only needs the two lines
 to configure the loopback address (see section 4.2.1 above). 
 Also, see section 5.1 above. You need to configure all of
 the files listed in section 4.0. Your gateway address (should you
 need to know it) will be the address of the SLIP server. Also,
 you may need to run ifconfig on sl0 using the SLIP server's address
 as the "pointopoint" argument (see section 5.1 above). However, if 
 you use DIP, it should be able to do all of the ifconfig and route 
 commands for you.

 One good way to figure out how to configure SLIP on your machine is
 to find someone else who uses the SLIP server (it can be on a PC,
 Mac, UNIX box, whatever) and find out what numbers they use. 


5.4 Using DIP.

 DIP can simplify the process of dialing into the SLIP server, logging
 in, starting the connection, and configuring the sl0 device with
 the appropriate ifconfig and route commands. 

 Essentially, to use DIP you'll write a "chat script" which is 
 basically a list of commands to send to DIP along with commands for
 logging in, starting the connection, and so on. See "sample.dip"
 in the net-032 package for an explanation. DIP is quite a powerful
 program, with many options. Instead of going into all of them here
 you should look at the READMEs and the sample files from tsx-11 and
 the net-032 distribution.

 You may notice that the sample.dip script assumes that you're using
 a static SLIP server, so you know what your IP address is beforehand.
 For dynamic SLIP servers, the newer version of dip include a command
 you can use to automatically read and configure your interface
 with the address printed by your server. The following sample was
 contributed by Paul Mossip, and is probably a good starting point
 for you:


#
# Connection script for SLIP to knoware.nl.mugnet.org
#

  # Fetch the IP address of our target host.
main:

  # Set the desired serial port and speed.
  port /dev/cua0
  speed 38400

  # Reset the modem and terminal line.
  reset

  # Prepare for dialing.
  send ATZ1\r
  wait OK 4
  if $errlvl != 0 goto error
  dial 666-0999    ## Change to your servers number!
  if $errlvl != 0 goto error
  wait CONNECT 60
  if $errlvl != 0 goto error

  # We are connected.  Login to the system.
login:
  sleep 3
  send \r\n\r\n
  wait gracelands> 20   ## Change to your servers prompt
  if $errlvl != 0 goto error
  send login\n
  wait name: 10    ## Wait username: prompt
  if $errlvl != 0 goto erro
  send elvisp\n    ## Change to your own!
  wait ord: 10    ## Wait password prompt
  if $errlvl != 0 goto error
  send alive\n    ## Change to your own!
  wait gracelands> 10
  if $errlvl != 0 goto error
  send slip\n    ## Change to suit your server
  wait SLIP 30    ### Wait for SLIP prompt
  if $errlvl != 0 goto error
  get $local remote 10   ## Assumes the server sends your IP..
  if $errlvl != 0 goto error  ## address as soon as you enter slip.
  get $remote gracelands  ## slip server address from /etc/hosts
done:
  print CONNECTED to $remote with address $rmtip we are $local
  default
  mode SLIP
  goto exit
error:
  print SLIP to $host failed.
exit:
#
# End dip script


 The example above will automatically point your default route via your
 slip link, if this is not what you want, you might have an ethernet
 connection that should be your default route, then remove the 'default'
 command.

 The above example is fairly robust. Please refer to the 'dip' man
 page for more information.

 It should be simple to modify the code for DIP in the file attach.c
 to run the route and ifconfig commands that work for you automatically.

5.5 Configuring your Linux Machine as a SLIP Server.

 Note: Some of the information below came from the dip man pages,
 where in fact how to run Linux as a slip server is briefly documented.

 To configure Linux as a slip server, you need to create Special
 slip accounts for users, where dip (in slave mode) is used as the
 login shell. Fred suggests that he has a convention of having all
 of his Slip accounts begin with a capital 'S', eg "Sfredm".

 Because the login program won't accept arguments to the login shell,
 you will need to create a small program that looks like the following:

/* dip-i.c - from a mail message of Karl kkeyte@esoc.bitnet */
int main()
{
   execlp("dip", "dip", "-i", (char *) 0);
}

 Compile it with: 'gcc -O dip-i.c -o dip-i'

 Give it permissions 555. I recommend calling it /usr/bin/dip-i as
 shown below.

 A sample /etc/passwd entry for a Slip user looks like:

 Sfredm:ij/SMxiTlGVCo:1004:10:UUNET:/tmp:/usr/bin/dip-i
  ^^         ^^        ^^  ^^   ^^    ^^   ^^
   |          |         |   |    |     |    \__ shell program running
          |          |         |   |    |     |         dip -i as login shell
   |          |         |   |    |     \_______ Home directory
   |          |         |   |    \_____________ User Full Name
   |          |         |   \__________________ User Group ID
   |          |         \______________________ User ID
   |          \________________________________ Encrypted User Password
   \___________________________________________ Slip User Login Name


 After the user logs in, the login(1) program, if it finds and
 verifies the user ok, will execute the shell program 'dip-i' which
 will execute dip command in input mode (-i). Dip now scans the
 /etc/net/diphosts file for an entry for the given user name.
 Therefore, each slip user must also have an entry in
 /etc/net/diphosts.


5.6 /etc/net/diphosts

 /etc/net/diphosts is used by dip to lookup preset configurations for
 remote hosts. These remote hosts might be users dialing-into your
 linux machine, or they might be for machines that you dial into
 wUWVFP(FP0؋F&O F&G&G < ʋЋƋ$6&~&6&F&9EtL2p P3PF&EĞ&(6&>p t*6&>v t
T F&EF  ,6&> ~F  vFĞ&^&9~ Ì~ڹ- F*Ftz8ftF^&8Gui~ tF^&8GuWF+F;F| F9Fu~ tF@t8F^&8Gt,F+F;F~<.6&> t0^&GĞ&v&@F[FF,6&9~2F^&8GuFuӋvzvĞ&7X06&?&& DPĞ&& & 	26&>| u46&z  66& ^&Gȋƻ[ ؎86&>&I86&&a~ t;F*PĞ&& & 	46&z  F*Pv:6&&ud26&>| u46&z  Ğ&& & 	<6&6&6`	 P,>6&F&Ht8PP
|FPPh
P :6&6&6P
|FPPh
P *6&>v t	 B l PP ]	@6&6&6`Ğ&& & 	pP 	B6&R&TĞ&7FD6&FF6& fĞ&7FtH6&&J6&H6&J6& f% = ؎L6&FD6&FF6& ^_]ːU VN6&6 &6rP
N6&6 &6"P
vPrPh
P"Ph
FPrPXX@uNFP"PXX@uQN6&6 &6"P
P6&6(&6&"Ph
FP"PXX@u FV9Vv r9Fv ~ } 	~[s  PrPCu Ɔr  PrPVj36d6brP
udp P~QPVj3FPF- P86&6&6VPR6& [ RPFV-  RP,6&V2^]U WV+PP(FVN6&6 &6FP
N6&6 &64P
PFPh
P4Ph
FP4PXX@uQN6&6 &64P
P6&6(&6&4Ph
FP4PXX@u3FV9Vw1r9Fs*FVFV06&X& & 	FVFVFVPPFPCu  P6d6bVh4p P~QPVh43,602&9?~Dv3ɉNރ,.&Gt&u&g[GĞ0&9?ЋvFP[ Ğ0&/P86&6&6VWV2FPFPR^_]ːUTWVN6&6 &6FP
PFPh
PFPVt)FPV Qp Q~RQxWV^_]ːU"WVFP(FP0V< &m&EFT6&F&M FF&EF  ~,6&F 86&& ؉V$6&FN9Nu ~ t	F&u|v&DF&8Gtl&G
*Fta&G:F
tF&D8FuJF&G9F
tF&D8Fu0Fw&F;FF&@t +~9~~~[A9N~a~} +FFf~@~F 39N 86&&> ؉V~؃~ tFw&uZFw&*FtJF&F
t	F&8Eu4Fw&F
t	F&8EuFw&FF;F}F[A9N~V~ t} ^_]ːear all searchU WVPVt5P 6	u$FPVVP
VP ƆV PVPh
FPVPXXt$VPP(P P~W PVuP(P P P-PVP26	
FVu$VP0P(P PvvW PvV;t2VPLP(Pvv Pvvt$VPwP(P PF
 3RT&7&GLX"3NP&&G&<pt#pPWP(P PĞN&&WVF ~> MVv~~؎ZX& &+ǋV& &PIuvĞN&F&7&GĞR&&&GÌ V&$3&	&> 
&
&	ߎ&&3&OF&&&ʋH(3JL&&G*3&&F&ʋFPQ"@F ĞJ&&?~G~ VvN~& &+ǋV& &PAĞJ&&9ڋ~v*3&F&7&GĞJ&&@&GF,3&>
&
M.3&& ^_]ː&u0U.WV4Z9&  3\9&6^9&"`9&b9&r
d9&bf9&dh9&fj9&h+ɉNNvvZ 	RP"PrQP
V^V۹ ^VNV l9&>n u-n9&X&B&@	"P|	3brQPt~
 PvvPt!2PP ]	p9&tN 릐2PP ]	p9&u,
QP2PP ]	p9&u0~+PP(FV P+PP(ȋ+FV~9&&SQvvvVr	FV~9&&d 3SQRPFVd RPvvFVvvRP< RPSQRPvv⚺RPFމVTSQvvމFډVܚT< 3SQvvF։VؚFV؋Nڋ^+SQF҉VԚT+FVRPvvvvvvZ 	RPn9&X&r&p	N ~9&pr9^F&? tt9&>v t^&? t;^9&>" u\9&>6 u`9&> tPvv^&? tMt9&>v tA P Pv9&68&66`  Px9&GPv9&68&66 t ظ[ .ظ&&،F&Gt1&9}&Gع&;z
~36&z
F&9G|&Fu
&> tF&Gu
&
t~ u
&> tF&Gt
&
u PvvPt}pr9^F&? tMt9&>v tA P Pv9&68&66`  Px9&JPv9&68&66+PP(FVz9&>| u|9&z  ,
QP|%^&? tMt9&>v tA P Pv9&68&66`  Px9&GPv9&68&66 Pvv P n9&X&F&D	 Pvv Pr9&>p tMt9&>v tA P Pv9&68&66`  Px9&GPv9&68&66 ^_]UWV P3Z9& P
QP9+& &
~u19&9>"t2PP ]	p9&u
|]	u9& 9&F|#[ n9&&@t9&  2P
P ]	=tz9&>| u|9&z  r9&>p tt9&>v tT 9&>" t2PP ]	p9&tt 3P t 9&N&Ltsd P 	FV|]	t6~vv` 	u!d P 	FV]	|]	u͚]	3P9&6N&6L tmpP 	FVRP` 	tP~|]	t@2P
P ]	=t*	vv` 	t	3b2PP ]	p9&t;3PN ^9&>" u\9&>6 u`9&> t N ( ^_]ːU WV9
&? |%[ &/9&&~ڹ- Ğ
&? } ^9&>" t5~ t/F*Pn9&X&N&L	F*P3~9&& t1B*PWn9&X&R&P	
B*PFF;r`9&? u\9&>6 t?Ğ
&? |5~ t/F*Pn9&X&V&T	F*PO9&&uĞ&? u\9&>6 u^9&>" u n9&X&Z&X	9&6&6`	 P,9&6&6P
Ğ
&? |FPPh
 P  PP ]	n9&X&^&\	9&6&6`pP 	9&R&T3^9&"\9&6Ğ&^_]ːU욀"P9&6&6n9&X&&	9&6&6`嚖t9&>v t9&63P]	9&>L tr9&>d u.]	v]UVvu3,ȋƙ+T؋ʙùd P 	^]ːUWV~9&B&DF&9Eu	&9U
u&E
&Eu
9&& 9&6&6KP
KP"KF^F  9& & u ~N؋W&9Du&9T
tGGu 9&&Vu VV&? u$~9&> t3"PvW ~^FFG&< u^&7"PvW_9&6&6KP
KP"K^9&F&9t&9&> uF&5"PDvP
K^_]ːUt9&>v ur9&>p u3P,9&@P"PrQP
 P Q9&6&6` rQP9&6&6Z 9&@P9&6
"PrQP
 P P9&6&6` rQP9&6&6Z  9&bFt'P9&6&6"PrQP$9&6&6#PrQP P Q9&6&6` #P9&6&6Z  P P9&6&6` rQP9&6&6Z 3P9&6^ 	]ːt9&>v t&r9&>p t  P9&6&6 ːU.WV~FL^ }dǹ[ FԻ9^֌F&&GtFLBƌ@V~ t	F& ^&^&GtFF&C~ t
FF& ^&^&GtFF&D~ t
FF& ~ t$^&^&G@tFF&FFF& ^&^&GtFF&H~ t
FF& ^&^&GtFF&K~ t
FF& ^&^&GtyFF&L~ ti^&^&GF|@P+#+FP0#PFP
FڌҋȎڋ6? t!vNG^F&= uv~~ t$^&^&GtFF&MFF& ^&^&GtFF&N~ t
FF& ^&^&GtFF&S~ t
FF& ^&^&G tFF&R~ t
FF& ~ t^~&=&At
FF&XF& FL^_]ÐUt9&>v u r9&>p u 9&> u3P9&6+RP9&@P5#PrQP
 P Q9&6&6` rQP9&6&6Z 
 P P9&6&6` vv9&6&6Z T ]U WV3Pz9`b&? }Tt9&>v uEWĞ`&@PXn9\^&&f&ddP P P9XZ&w&7` dPĞX&w&7Z  PĞ`&7؋F&? tTPVĞ\&&j&hdP PPĞX&w&7` dPĞX&w&7Z 9TV&G&u9&w&7dP
A#PdPh
 PJ#PdP26	
Vu FPV QQNQFWV~ u vrĞT&w&7dP
M#PdPh
3PdQNQ* 6	
uqvFP; PdPFP* 6	
t@2 P PĞX&w&7` Ğ\&&n&lĞX&w&7Z T ^_]R$bCLS U.WV4 ع 4&
  &QP(4+&,&*&(&0&.p4^F&9t&4&9vtotice and authorship remains intact.
&? u - ~ٹ ~ t%FFF  4&F~FF  FP	RP4&6 &6 
PrQPrQPBFP	RP
PrQPrQPBF~js)+FFFFFF4^ތF&4&>v% 4^ڌF&4&>x^&4&
4&9s4&>  t^&3PN։VRQ QD~ u 
QP P	tuHtpHtHHtMcuW^&^&ub 4&h4&d4&X&&	뤚u
^&^&u2봎4&h 3P4&T 4&h t
F҉NԐ3^&9?~14&t&4	QPFuG^&9?ҚHu HuGHtvHu }W4&t
 ;E2PP ]	4&u)FP P	3Pvvָ P4&u^&^&t 4&d4&h4&X&&	u^&^&t밐62PP ]	4&u_4&> tPFP P	3Pvvָ P"2PP ]	4&uFFP Q	F  4&^&? tp4&>v td4&6&6
PrQP
 P P4&6&6` rQP4&6&6Z T 4&h 3PO
QP P	4&^&? tp4&>v td4&6&6
PrQP
 P P4&6&6` rQP4&6&6Z T 4&T4&h  
QP P	4&^&? tp4&>v td4&6&6
PrQP
 P P4&6&6` rQP4&6&6Z T 3P 5&	 5&b4&d5&f4&h Pvvָ Pf3Pvvָ PQ^_]WV+ 




&&r
&&6&"&&
& ع ^_ːUVXP 	FVRP` 	uuv2PP ]	4&tY	uP2PP ]	 tFF&
t*<t&P]		vv` 	t '2PP ]	:]	
 P	]	3^]ːU(WVb5&? u]v
vFVFtHt#HuHuHu )F  396F~(D Pv
vWd
uF;6F|ۋ~F
&} t=&u&uvvPbPF
&u/PFP
2vvbP
F
&u&u8PFPFǇF  Ğ&7bPEPPTPPVus5&&tZFǇF bP
Ğ&7bPWPPfPPVFu-~ uyP4&X&>&<	UFPVFPbPh
bPP<uX9Ft!bP4&X&B&@	FDF^FFV
~ ~ t+v
vZ 	RP4&X&F&D	PB>F uy396F~%D Pv
vWd
t
F;6F|96F/~ u=v
vZ 	RP4&X&J&H~F
&} t=&u&uvviPbPF
&uyPFP
2vvbP
F
&u&uPFPF? t5&6&6bP
FPbPh
  F;6F}rFFFFDFDFF+ƉF~vF^ ^F^FFFNuFbPBu$9FubP4&X&N&L?~ u bP4&X&R&P	 5&&u Ğ&7PPbPPbPRPD5&&t-Ğ&7PPbPbPB3^_]U($
5^ތF&? u 5^ڌF&G&u t66` 	u d P 	5&bFtP^&w&7PNFP^&w&7PNFPFPNFPXXuDNFPB^&74&X&&	5&z  ^&7]39&RzLxL9&9ptI9&9vt> PP9&6&6` #P9&6&6Z T #P|	]	9&$PP ]	 Pu 9&X&N&L	3n9&>p tJ9&>v t> PP9&6&6` #P9&6&6Z T $P|	 PV39&RzLxL9&9ptH9&9vt= PP9&6&6` &$P9&6&6Z T 
H$P|	:]	9&$PP ]	3PNtz9&>p tK9&>v t? PP9&6&6` S$P9&6&6Z T u$P|	3P u4^ːUWV9&
&
VȋڀFV$PSQ
$PvW
QPr9&QPZ 	RP$P	9&QPZ 	RPvW'3FF9&9~Q~9&9>t,$PvvPVZ 	RPvvG9&9>~$PvW89^F+&G&9Ft
QP:'~ uZzL0QP:~9^&G&t- P&w&7vv<
^&G SvW%$PvW~ t)9&>^ u9&>` t$6$1$+9&t$PvW9&u$PvW$PvW9&>بt+&~ u:&#Ft &ِFt vt
 &6بt$`~ t6 t$PvW t$PvWƨt3$" t$ t$
ƨt$PvW9&t~ t9&>z u$PvW$PvW$PvWw$PvWh9&>ju9&X&&$ډFVRP9&69&6$P P%PvvvvvW%PvW9&6&69&6&6 :&6&6#%PvvvvvWB:&6&6:&6&6:&6&60%PvvvvvW=%PvWD:&&&(0T|RPE%PvvvvvWvW"9&$PP ]	F  pP 	FVv~vvO%PvV
vV"PvVj!	F P Q\%QJ]	 PvV"PvVJ]	 PvvvJ]	F  ~ ~;~v^^ ؋Ǌ*3QǊ*&3ZF;v|։~v]	v_%PvV
 PvV"PvVJ]	FF= v P 	FVvv` 	t 2PP ]	
:&uvv` 	t|]	u	t 	3P(	-* ui%PvV
vV2ui6`#6^#vVFuN6p#6n#vvFt  ~9&X&&e%PFPWƋFv 2PP ]	9&X& & V\2PP ]	
:&u9&X& & ˎ9&X&&k%PFPVǋFvW	3^_]UWVF ǆP  Ɔ{ ǆ8o%:ǆ<w%>ǆ@~%BǆD%FǆH%J+NL9&
&
vx~prt89
+&G&n9&9ptH9&9vt= PP9&6&6` %P9&6&6Z T 
%P|	T:& P 	FVpP 	FV+FF{{<vv~ uZ6`#6^#%P~V P~V"P~VJ]	ow you to NFS export the Novell network drives. It has caveats in that it will not perform as well as directly mounting the Novell fileserver, that it requires another machine, and that it will generate roughly twice as much network traffic, but it will work.  Stan's Own Server (NFS server).         spdcc.com:pub/sos/soss.zoo         spdcc.com:pub/sos/sossexe.zoo  A version "couple of bugs fixed: IP numbers and subdirectories  with extensions)" is available from:         hilbert.wharton.upenn.edu:/pub/tcpip/soss.zip QUESTION: Files get corrupted when using NFS over wider area networks           or SLIP, why ? How do I stop it ? ANSWER: Certain vendors (Sun primarily) shipped many machines running NFS without UDP checksums. Great on ethernet, suicide otherwise. UDP checksums can be enabled on most file servers. Linux has it enabled by default from pl13 onwards - but both ends need to have it enabled... QUESTION: Why are my NFS files all read only ? ANSWER: The Linux NFS server defaults to read only. RTFM the 'exports' and nfsd manual pages. With non Linux servers you may also need to alter /etc/exports  QUESTION: I mount from a linux nfs server and while ls works I can't           read or write files. How do I fix this ?  ANSWER: You must mount a Linux filestore with rsize=1024,wsize=1024 (or 2048 if you really want - 1024 is a better choice). QUESTION: I mount from a linux nfs server with a blocksize of between           3500-4000 and it crashes the Linux box regularly, why ? ANSWER: This is a known problem that is being worked on, refer to previous question. Don't you hate answers like that ? :) QUESTION: Can Linux do NFS over TCP ? ANSWER: No. To do this would require someone to spend the time to update the rpc code to add rpc stream record marking. It should work then. QUESTION: Why do I get loads of strange errors trying to mount a           machine from a Linux box.  ANSWER: This is possibly related to a restriction imposed by older NFS servers. Make sure your users are in 8 groups or less. QUESTION: Why are my Linux NFS clients very slow when writing to Sun           & BSD systems ? ANSWER: NFS writes are normally synchronous, meaning that all file- -system changes occur in the order they transmitted, this means that if before NFS will allow you to write any more data, any previous write must have already completed, (you can disable this if you don't mind risking losing data). Worse still, BSD derived kernels, this includes Sun systems, tend to be unable to work in small blocks. Thus when you write 4K of data from a Linux box in the 1K packets it uses, BSD does this:  read 4K page  alter 1K  write 4K back to physical disk  read 4K page  alter 1K  write 4K page back to physical disk  etc..  Better systems don't have this problem. The Linux client is however quite slow anyway. QUESTION: I've heard NFS is not secure is this true ? ANSWER: Yes, totally. Running NFS in an uncontrolled environment is rather like leaving your front door open, painting 'On holiday' on your house and posting maps to every known criminal... In a fairly secure environment or when you can recover data from stupid misuse its pretty much OK. The worst someone can easily do is alter all the files on an NFS mounted disk, and/or crash the machine. So long as you don't mount your system files writable you should be mostly safe. QUESTION: I occasionally mount from lots of different places, do I have           to mount them all each time I boot ? ANSWER: No you can use the automounter to mount disks as you access         them. QUESTION: How do I stop things hanging when a server goes down ? ANSWER: There are three main NFS behaviours:  soft: Your NFS client will report an error to the process        concerned if an NFS server doesn't answer after a few        retries. Most software handles this well - but not all.   hard: Your NFS client will try forever unless killed off.        Operations will be restarted when the NFS server        recovers or reboots.   hard,intr: As hard but ^C will also stop the NFS retrying. In        a few cases, notably nfs mounted /usr/spool/mail disks,        this doesn't help as the shell will be ignoring ^C when        it checks you have mail. If you intend to leave your machine unattended, then choosing the 'soft' option is probably best, because while it might cause some problems to an application running, it won't halt your whole machine if a server that it is attached to goes down. If your machine will always have a human operator available, then the 'hard,intr' option might be best. The hard option would be best suited to you if you can afford to wait, and don't want the process writing to the server interrupted at all. QUESTION: Can I use two slip interfaces ? ANSWER: Yes. If you have, for example, three machines which you would like to interconnect, then you most certainly could use two slip interfaces on one machine and connect each of the other machines to it. Simply configure the second interface as you did the first. NOTE that the second interface will require a different IP address to the first. You may need to play with the routing a bit to get it to do what you want, but it should work.10. Known bugs. There are several known bugs with the NET-2 software. Note that these may or may not be fixed with a newer version of the NET-2 code; therefore, I leave them here.   The bugs here are for NET-2d, found in kernels 0.99.pl10, pl11,  and pl12, and pl13, and pl14. NET-2e (currently in Beta), when released, may or may not have fixed these bugs.  * Bug with route guessing code. If you ifconfig the "lo"   interface before the "eth0" interface in rc.inet1, whenever you   add a route, it will be added to "lo" instead of "eth0".    (Simply use the "route" command by itself; it will display all   of your routes. If your "default" route, which should be out   on the ethernet, is for device "lo" instead of "eth0", then you're   seeing this bug.)       This is just a problem with the route guessing code. Several   things can fix it: 1) ifconfig/route on "eth0" before "lo" in   rc.inet1; or, 2) Set your netmask to 255.0.0.0 (which is reported   to work, but I can't guarantee it). This should be fixed in NET-2e. * Missing IP packet fragmentation. Packet fragmentation allows the   various protocol layers to "chop up" packets into smaller packets   if the MTU (maximum tranfer unit) of one network differs from   another. NET-2e should contain packet fragmentation/defragmentation   code, but NET-2d currently does not.   This now only applies to kernel earlier than pl14+, as it is now   supported. * Weak NFS support. There have been a number of success stories with   NFS under Linux, however, not all of the support is there. For   one thing, the current NFS buffer size is much smaller, and    therefore much slower, than other implementations of NFS.11. Copyright Message. (We're not ogres, nor are we silly). The NET-2-HOWTO is copyright by Terry Dawson and Matt Welsh. A verbatim copy of this document may be reproduced and distributed in any medium, physical or electronic without permission of the authors. Translations are similarly permitted without express permission if such translations include a notice stating who performed the translation, and that it is a translation. Commercial redistribution is allowed and encouraged, however, the authors would like to be notified of any such distributions.  Short quotes may be used without prior consent by the authors. Derivative works and partial distributions of the NET-2-HOWTO must include either a verbatim copy of this file, or make a verbatim copy of this file available. If the latter is the case, a pointer to the verbatim copy must be stated at a clearly visible place. In short, we wish to promote dissemination of this information through as many channels as possible. However, we wish to retain copyright on this HOWTO document, and would like to be notified of any plans to redistribute it. Further we desire that ALL information provided in this HOWTO be disseminated. If you have any questions relating to the conditions of this copyright, please contact Matt Welsh, the Linux HOWTO coordinator, at: mdw@sunsite.unc.edu, or +1 607 256 7372.12. Miscellaneous. I'm sure that I've missed something. This NET-2 HOWTO was thrown  together with the help of Matt Welsh, and Jeff Uphoff. Other major contributors have been Alan Cox, Fred van Kempen, and others just like yourself. Hopefully it will help you, and others out there, get networking under Linux.  Future plans for the NET-2 HOWTO include a section on setting up your own Linux LAN (with SLIP and/or Ethernet), adventures in routing, and the use of netstat and other network administration under Linux. For now, the information here should be more than  enough. :)  If you have questions about setting up NET-2, feel free to mail me, or  if you have any corrections, additions, or errata for this NET-2 HOWTO,  send me any and all changes (cdiffs are nice, but I'm flexible).  Of course, thanks to Fred, Linus, Ross, Phil, Paul, Don, Alan, Matt, and everyone else who helped to develop the NET-2 code and work on previous versions of TCP/IP for Linux and the NET-FAQ. Finally, Linux has a complete implementation of TCP/IP. It may not be for everyone yet. But for those who have an itch they want to scratch, happy hacking, here it is. Cheers, Terry Dawson, (terryd@extro.ucc.su.oz.au)13. Change History. Changes from 1.8: correction to broadcast address calculation, thanks Andr'as Salamon tcp/ip tutorials added thanks to Gilbert Callaghan These annotations at the suggestion of Andy Burgess Shadow password section updated - thanks Rick Sladkey added Slip Server section - thanks Fred added /etc/net/diphosts section - thanks Fred enhanced the netmask description a little Revamped for 0.99.14 Added Index Changes from 1.9: Added change history. Corrected Archive header now that I understand what it is there for   Thanks to _everyone_ who helped me understand :) Ammended loopback route details - thanks Jeffrey A. Kintscher. First attempt at enlarging the configuration section to cope with   different networks and different distributions thanks   Eric Christensen. Reinstated /dev/arp as a required device. Oops. Finally added resolv+(8) man page reference. Tried to clean the slip section a bit. Added leased line/cable slip link config using slattach. Corrected a minor PLIP stoopidity I inflicted that fortunately noone   appears to have noticed. Ammended Slip Server config to run a script in lieu of 'dip -i' Fixed numerous tyops and mizpellinks (When will I not ?)