82f34a7ab5
r11 includes most patches. + gcc -shared to build object module.
32 lines
2.2 KiB
Plaintext
32 lines
2.2 KiB
Plaintext
# $OpenBSD: patch-socks5-conf-5,v 1.2 2000/11/02 17:39:47 espie Exp $
|
|
|
|
--- man/man5/socks5.conf.5.orig Tue Dec 1 17:55:52 1998
|
|
+++ man/man5/socks5.conf.5 Thu Nov 2 16:29:44 2000
|
|
@@ -78,7 +78,7 @@ The socks5 daemon authenicates clients t
|
|
.PP
|
|
When the configuration file does not contain \fB auth\fP lines, any authentication works. Omitting auth lines is the same as specifying an \fIauthpattern\fP containing -, any authentication. If \fBauth\fP lines are used, clients not matching will be refused.
|
|
.PP
|
|
-When the socks5 daemon does not require authentication, it receives no user information unless socks5 configuration requires ident responses. Use the SOCKS5_DEMAND_IDENT environment variable to require ident responses. See socks5(1) for a complete description of socks5 environment variables.
|
|
+When the socks5 daemon does not require authentication, it receives no user information unless socks5 configuration requires ident responses. Use the SOCKS5_DEMAND_IDENT environment variable to require ident responses. See socks5(8) for a complete description of socks5 environment variables.
|
|
|
|
To ensure that the socks5 daemon receives usernames from the client, and to allow socks4 clients to use the server, set the \fIauthpattern\fP order to n,u. With socks5 clients, the socks daemon chooses Username/Password authentication before no authentication.
|
|
.PP
|
|
@@ -129,7 +129,7 @@ set \fIvariable\fP \fIvalue\fP
|
|
set
|
|
Identifies entries that initialize environment variables for internal use.
|
|
.P
|
|
-Refer to the socks5(1) ENVIRONMENT section for complete details about socks5 environment variables and values.
|
|
+Refer to the socks5(8) ENVIRONMENT section for complete details about socks5 environment variables and values.
|
|
.PP
|
|
.SH PROXY ENTRIES
|
|
Proxy entries describe the addresses clients can only reach through other SOCKS servers and identify how the daemon contacts the host. The daemon contacts the host directly when the configuration file does not contain an entry for that host.
|
|
@@ -402,7 +402,7 @@ server to hide their attack of other sys
|
|
or destination host.
|
|
.PP
|
|
.SH SEE ALSO
|
|
-socks5(1), libsocks5.conf(5), sockd4_to_5.pl(1)
|
|
+socks5(8), libsocks5.conf(5), sockd4_to_5.pl(1)
|
|
.PP
|
|
.SH AUTHORS
|
|
NWSL SOCKS5 Development Team
|