Nethserver Documentation Versión 7 Final

Total Page:16

File Type:pdf, Size:1020Kb

Nethserver Documentation Versión 7 Final NethServer Documentation Versión 7 Final Nethesis 22 de septiembre de 2021 Release notes 1. Notas de lanzamiento 7 3 1.1. Major changes on 2020-11-26......................................3 1.2. Major changes on 2020-05-05......................................4 1.3. Major changes on 2019-10-07......................................5 1.4. Major changes on 2018-12-17......................................5 1.5. Major changes on 2018-06-11......................................6 1.6. Major changes on 2017-10-26......................................6 1.7. Major changes on 2017-07-31......................................7 1.8. Major changes on 2017-01-30......................................7 1.9. Deprecated features and packages....................................8 1.10. Actualizando NethServer 6 a NethServer 7...............................9 2. Tipos de instalación 11 2.1. Requerimientos mínimos......................................... 11 2.2. Tipos de instalación........................................... 11 2.3. Instalación desde ISO.......................................... 12 2.4. Instalar en CentOS............................................ 15 2.5. Próximos pasos.............................................. 15 3. Accessing the Server Manager 17 3.1. Login................................................... 17 3.2. Hints................................................... 17 3.3. Change the current password....................................... 18 3.4. Logout.................................................. 18 4. Subscription 19 4.1. Registering the system.......................................... 19 4.2. Removing a subscription......................................... 20 5. Base system 21 5.1. Network................................................. 22 5.2. Services.................................................. 25 5.3. Certificates................................................ 25 5.4. Storage.................................................. 26 5.5. Trusted networks............................................. 26 5.6. SSH.................................................... 26 5.7. Disk analyzer............................................... 27 I 5.8. Settings.................................................. 27 5.9. Logs................................................... 29 6. Applications 31 6.1. Shortcuts................................................. 31 6.2. Removing applications.......................................... 31 7. Authentication 33 7.1. Role delegation.............................................. 33 7.2. Two-factor authentication (2FA)..................................... 34 8. Centro de software 37 8.1. Applications installation......................................... 37 8.2. Actualizaciones de software....................................... 37 9. Usuarios y grupos 41 9.1. Proveedores de cuentas.......................................... 41 9.2. Usuarios................................................. 46 9.3. Grupos.................................................. 47 9.4. Cuenta de administrador......................................... 47 9.5. Gestión de contraseñas.......................................... 47 9.6. Import and delete accounts from plain-text files............................. 49 10. DNS 53 10.1. Hosts................................................... 53 10.2. Alias................................................... 54 10.3. Domain redirection............................................ 54 11. Servidor DHCP y PXE 55 11.1. Configuración DHCP........................................... 55 11.2. Reserva IP del host............................................ 56 11.3. Arranque desde la configuración de red................................. 56 12. Política de TLS 59 12.1. Policy 2020-05-10............................................ 59 12.2. Policy 2018-10-01............................................ 59 12.3. Policy 2018-06-21............................................ 60 12.4. Política 2018-03-30........................................... 60 12.5. Política de subida predeterminada.................................... 61 13. Copia de seguridad 63 13.1. Settings.................................................. 63 13.2. Selective restore of files......................................... 65 14. Web server 67 14.1. Web server dashboard.......................................... 67 14.2. Settings.................................................. 68 14.3. Virtual hosts............................................... 68 14.4. Reverse proxy.............................................. 69 14.5. FTP server................................................ 71 15. Correo electrónico 73 15.1. Dominios................................................. 74 15.2. Filtro................................................... 75 15.3. Mailboxes................................................ 78 15.4. Addresses................................................. 80 II 15.5. Connectors................................................ 81 15.6. Synchronization............................................. 81 15.7. Queue................................................... 82 15.8. Relay................................................... 82 15.9. Settings.................................................. 84 15.10.Logs................................................... 84 15.11.Configuración del cliente......................................... 85 15.12.Kerberos-based authentication...................................... 86 16. Webmail 87 16.1. Plugins.................................................. 87 16.2. Acceso.................................................. 88 16.3. Quitar................................................... 88 17. Carpetas compartidas 89 17.1. Requirements............................................... 89 17.2. Authorizations.............................................. 90 17.3. Network access.............................................. 90 17.4. Network recycle bin........................................... 90 17.5. Hide a shared folder........................................... 91 17.6. Home share................................................ 91 17.7. Change resource permissions from Windows clients.......................... 91 17.8. Administrative access.......................................... 92 17.9. Auditing................................................. 92 18. Nextcloud 93 18.1. Instalación................................................ 93 18.2. Configuration............................................... 94 19. Team chat (Mattermost) 97 19.1. Configuration............................................... 97 19.2. Authentication.............................................. 98 20. Chat 99 20.1. Configuration............................................... 99 20.2. Administradores............................................. 100 20.3. Clients.................................................. 100 21. Antivirus 103 22. Firewall 105 22.1. Apply and revert............................................. 105 22.2. Política.................................................. 106 22.3. Settings.................................................. 106 22.4. Reglas.................................................. 107 22.5. WAN................................................... 109 22.6. Reenviar puerto.............................................. 110 22.7. SNAT 1:1................................................. 112 22.8. Conformación del tráfico......................................... 112 22.9. Objetos del cortafuego.......................................... 113 22.10.Connections............................................... 114 23. Proxy web 115 23.1. Authenticated mode........................................... 115 23.2. Configuración del cliente......................................... 116 III 23.3. Proxy SSL................................................ 116 23.4. Bypass.................................................. 116 23.5. Priority and divert rules......................................... 117 23.6. Content filter............................................... 117 23.7. Reporte.................................................. 118 23.8. Cache................................................... 118 23.9. Puertos seguros.............................................. 119 23.10.Logs................................................... 119 24. Fail2ban 121 24.1. Configuration............................................... 121 24.2. Unban IP................................................. 122 24.3. Command line tools........................................... 122 25. VPN 125 25.1. OpenVPN................................................ 125 25.2. IPsec................................................... 128 26. IPS (Suricata) 129 26.1. Rule categories.............................................. 129 26.2. Bypass.................................................. 132 26.3. EveBox.................................................. 132 27. Threat shield 133 27.1. Configuration............................................... 133 27.2. Incident response............................................. 134 27.3. Statistics................................................. 134 27.4. Geo-blocking............................................... 134 28. Monitor de ancho de banda 137 28.1. Dashboard................................................ 137 28.2. Settings.................................................. 138 28.3. Logs................................................... 138 29. Punto de Acceso (Dedalo) 139 29.1. Como
Recommended publications
  • Deliverable D8.4 Final Report on Sustainability and Exploitation
    07-07-2020 Deliverable D8.4 Final Report on Sustainability and Exploitation Deliverable D8.4 Contractual Date: 31-05-2020 Actual Date: 07-07-2020 Grant Agreement No.: 732049 – Up2U Work Package: WP8 Task Item: Task 8.1. Nature of Deliverable: R (Report) Dissemination Level: PU (Public) Lead Partner: GWDG Authors: Faraz Fatemi Moghaddam (GWDG), Philipp Wieder (GWDG), Aytaj Badirova (GWDG), Erik Kikkenborg (GÉANT), Gyöngyi Horváth (GÉANT), Casper Dreef (GÉANT), Andrea Corleto (GARR), Eleonora Napolitano (GARR), Gabriella Paolini (GARR), Krzysztof Kurowski (PSNC), Raimundas Tuminauskas (PSNC), Michal Zimniewicz (PSNC), Nelson Dias (FCT|FCCN), Antonio Vieira Castro (ISEP), Mary Grammatikou (NTUA), Dimitris Pantazatos (NTUA), Barbara Tóth (KIFÜ), Csilla Gödri (KIFÜ), Gytis Cibulskis (KTU), Jack Barokas (TAU), Ingrid Barth (TAU), Eli Shmueli (IUCC), Nadav Kavalerchik (IUCC), Orit Baruth (IUCC), Domingo Docampo (UVigo), Iván Otero (UVigo), Vicente Goyanes (TELTEK), Xoan Vidal (TELTEK), Stefano Lariccia (UROMA), Marco Montanari (UROMA), Nadia Sansone (UROMA), Giovanni Toffoli (UROMA), Allan Third (OU) © GÉANT Association on behalf of the Up2U project. The innovation action leading to these results has received funding from the European Union’s Horizon 2020 research and innovation programme under Grant Agreement No. 732049 – Up2U. Table of Contents Executive Summary 1 1 Introduction 2 2 Business Models – Exploitation Activities 3 2.1 Up2U Tools for NRENs and Schools 4 2.1.1 The Centralised Model 5 2.1.2 openUp2U 5 2.1.3 The National Model 6 2.2
    [Show full text]
  • Open Source Web Chat Application
    Open Source Web Chat Application Is Wood always contractive and subarcuate when carps some bowel very lithographically and lastly? Frederik is run-of-the-mill and hull decorously while epicritic Neel solarizing and pencil. Prerecorded and muskiest Westley never bulges immutably when Dwane behooving his rubricians. Ui makes podium so that apply moderation, open source chat web application helps you can set up your use mesh does not have access to create your industry use them Mumble them a quality, open cell, low latency, high male voice chat application. Move copyright the chat applications around it opens, public and hubot friendly people. Simon on web application which take this open source? Empathy lets you automatic reconnecting using a network manager. This servlet removes the blanket request. Looking up an app or software developmet company? Mumble by a dark open concept low latency high cold voice chat application Mumble into the first VoIP application to reproduce true low latency voice communication. Firebase support chat applications which means bring people. AJAX Chat Softaculous. For chat application on frequent questions and open source web chat software that offers a live chats depending upon opening up. And chat applications are forced into shareable and all chats. Delta Chat The messenger. By your continued use of local site offer accept all use. Enough can dip your toes in swamp water. But as chat application services and video chats at the source code and past conversations. Do some reasons that fits their screen activity on a friend request is available in a message. Web-based development tools Conversational logs Integrate with common knowledge sources RESTful APIs Pandorabots Pros Open source platform so you.
    [Show full text]
  • Deploying Red Hat Openshift Container Platform 3.6 on Microsoft Azure
    Reference Architectures 2017 Deploying Red Hat OpenShift Container Platform 3.6 on Microsoft Azure Last Updated: 2018-01-12 Reference Architectures 2017 Deploying Red Hat OpenShift Container Platform 3.6 on Microsoft Azure Glenn West Ryan Cook Eduardo Minguez [email protected] Legal Notice Copyright © 2018 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/ . In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js ® is an official trademark of Joyent. Red Hat Software Collections is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
    [Show full text]
  • (BRENT DENNING) SHAPING the NEW NORMAL.Pdf
    How can technology help the “New Normal” ARE YOU SET UP FOR REMOTE WORKING? Cloud Computing is an Enabler for Remote Working of Chief Technology Officers say cloud computing had the most measurable 74% impact in their businesses in 2017 - (Forbes) WHAT IS DRIVING COMPANIES TO THE CLOUD*? 42% - Desktop Virtualization - Access to data anywhere 38% - Disaster recovery capabilities 37% - Enabling better business flexibility 36% - Reducing support burdon on IT staff * Study by Sysgroup 2019 TECHNOLOGY PILLARS SUPPORTING REMOTE WORKING What Technology Platforms Do You Need to Consider Adopting Visibility to Communications Collaboration & Operating Systems Sharing work Accounting Systems Communications Collaboration (Xero, Quickbooks etc) (ZOOM, Google Hangout, MS (GDrive, MS Teams) teams, Webex, Whatsapp, ERP (SAP, Oracle) Messenger, Viber, Telegram, Shared Drive (Box, Dropbox, CRM (Salesforce, Hubspot, Zoho) Mattermost, Wechat) We Transfer) Payroll Software (Salarium, Square) Payment systems (Paypal, Square) Recruitment/HR (Trello, Workday) WHAT CAN YOU ACHIEVE WITH TECHNOLOGY AND REMOTE WORKING ? PRODUCTIVITY* 13% improvement in Productivity* - When working in a nominated shift RECRUITMENT** 9 out 10 Filipino workers would prefer to work organisations with flexible workplace arrangements. * Stanford University Nicholas Bloom Journals of Economics CTrip - China, 16,000 employees ** IWG Workplace Survey, 2019 IS THERE ANY NEED TO WORRY ABOUT REMOTE WORKING? EMPLOYEES EMPLOYERS ● Productivity ? ● Collaboration ? ● Communication ? ● Reduced visibility/
    [Show full text]
  • Online Tools Zur Zusammenarbeit Für Homeoffice Zeiten Und Darüber Hinaus
    Online Tools zur Zusammenarbeit für Homeoffice Zeiten und darüber hinaus INHALT 1. Projektmanagement-Tools zur Organisation und Koordination 2. Kommunikation / Messaging 3. Datenablage 4. Telefon- und Videokonferenzen 5. Kollaborative Text- und Tabellenbearbeitung 6. Übergeordnete Plattformen 7. Weiterführende Links Die Informationen zu den verschiedenen Anwendungen wurde zusammengestellt von der AKS Gemeinwohl. Für die Inhalte externer Links wird keine Haftung übernommen. Stand: 31.03.2020. 1. Projektmanagement-Tools zur Organisation und Koordination factro 1. Funktion: Factro ist ein Projektmanagement-Tool, das als Alternative zu Asana präsentiert wird. Man kann Aufgaben mit entsprechenden Deadlines einzelnen Teammitgliedern zuordnen sowie über eine Kommentarfunktion bestimmte Punkte erläutern, Fragen stellen etc. Die Grundstruktur basiert, ebenso wie bei Trello und Asana, auf dem Kanban Prinzip. 2. Datenschutz und Server: Der große Vorteil von Factro ist, dass dessen Server in Deutschland (Frank- furt/Main) stehen. Die Software wurde von dem Bochumer Unternehmen Schuchert Management- beratung entwickelt, das vor allem mittelständische Unternehmen berät. Zudem arbeitet factro nur mit Anbietern aus Deutschland und der EU zusammen. Es wird großen Wert auf Datenschutz gelegt. Es werden zwar Cookies von Google Analystics verwendet, wobei die damit erhobenen Daten wieder auf US-Servern gespeichert werden, allerdings kann man diese Cookies ausschalten. Factro gibt einem insgesamt ausführliche Möglichkeiten, über die Nutzung seiner Daten selbst zu entscheiden. 3. Zugänglichkeit: Die Basic-Version ist kostenfrei und kann von bis zu zehn Mitgliedern benutzt werden. Für kleine Teams mit einigermaßen übersichtlichen Arbeitsabläufen ist dies völlig ausreichend. Die erste Bezahlstufe liegt bei 7,99€ pro Monat. Das Interface ist sehr zugänglich, einfache Funktionen sind schnell anwendbar. 4. Fazit: Factro ist eine gute, wenn auch kommerzielle Alternative zu Asana oder Trello.
    [Show full text]
  • 9 Caching Proxy Server
    webXaccelerator: Owner's Guide by Luis Soltero, Ph.D., MCS Revision 1.06 February 10, 2010 (v1.2.3.10-RELEASE) Copyright © 2010 Global Marine Networks, LLC Table of Contents 1 Quick Start..............................................................................................................................................5 2 Introduction.............................................................................................................................................8 3 Initial Installation and Configuration......................................................................................................9 3.1 Connections.....................................................................................................................................9 3.2 Power-up..........................................................................................................................................9 3.3 Power-down...................................................................................................................................10 3.4 Web Administrator........................................................................................................................10 3.5 LAN Setup.....................................................................................................................................10 3.6 WAN Setup....................................................................................................................................11 3.7 WAN2 (Backup WAN) Setup........................................................................................................13
    [Show full text]
  • Enterprise Desktop at Home with Freeipa and GNOME
    Enterprise desktop at home with FreeIPA and GNOME Alexander Bokovoy ([email protected]) January 30th, 2016 FOSDEM’16 Enterprise? Enterprise desktop at home with FreeIPA and GNOME 2 * almost local office network is not managed by a company’s IT department Enterprise desktop at home with FreeIPA and GNOME 3 * almost company services’ hosting is cloudy there is no one cloud to rule them all Enterprise desktop at home with FreeIPA and GNOME 4 I Home-bound identity to access local resources I Cloud-based (social networking) identities I Free Software hats to wear I Certificates and smart cards to present myself legally I Private data to protect and share * almost I have FEW identities: I A corporate identity for services sign-on I want them to be usable at the same time Enterprise desktop at home with FreeIPA and GNOME 5 I Cloud-based (social networking) identities I Free Software hats to wear I Certificates and smart cards to present myself legally I Private data to protect and share * almost I have FEW identities: I A corporate identity for services sign-on I Home-bound identity to access local resources I want them to be usable at the same time Enterprise desktop at home with FreeIPA and GNOME 6 I Free Software hats to wear I Certificates and smart cards to present myself legally I Private data to protect and share * almost I have FEW identities: I A corporate identity for services sign-on I Home-bound identity to access local resources I Cloud-based (social networking) identities I want them to be usable at the same time Enterprise desktop
    [Show full text]
  • OARC35 Software Report Jerry Lundström Apr 16, 2021
    OARC35 Software Report Jerry Lundström Apr 16, 2021 Table of Contents 1 Funded Projects.................................................................................................................................2 1.1 RPKI Origin Validation Visibility..............................................................................................2 1.2 dnsperf - DNS-over-HTTPS......................................................................................................3 2 Highlights..........................................................................................................................................4 2.1 Mattermost OARC Software channel........................................................................................4 2.2 New major dnscap release.........................................................................................................4 2.3 New features in dumdumd.........................................................................................................5 2.4 DSC Grafana example dashboards update.................................................................................5 3 Software Updates...............................................................................................................................5 3.1 dsc..............................................................................................................................................5 3.2 dsc-datatool................................................................................................................................6
    [Show full text]
  • National Security Agency | Cybersecurity Information Selecting
    National Security Agency | Cybersecurity Information Selecting and Safely Using Collaboration Services for Telework - UPDATE Summary During a global pandemic or other crisis contingency scenarios, many United States Government (USG) personnel must operate from home while continuing to perform critical national functions and support continuity of government services. With limited access to government furnished equipment (GFE) such as laptops and secure smartphones, the use of (not typically approved) commercial collaboration services on personal devices for limited government official use becomes necessary and unavoidable. We define collaboration services as those capabilities that allow the workforce to communicate via internet-enabled text, voice, and video, and can include the sharing of files and other mission content. Collaboration can occur between two people or widened to include a large group to support mission needs. This document provides a snapshot of best practices and criteria based on capabilities available at the time of publication and was coordinated with the Department of Homeland Security (DHS), which has released similar guidance: “Cybersecurity Recommendations for Federal Agencies Using Video Conferencing” [1] and “Guidance for Securing Video Conferencing” [2]. This NSA publication is designed to provide simple and actionable considerations for individual government users. The intent of this document is not meant to be exhaustive or based on formal testing, but rather be responsive to a growing demand amongst the federal government to allow its workforce to operate remotely using personal devices when deemed to be in the best interests of the health and welfare of its workforce and the nation. Recommendations in this document are likely to change as collaboration services evolve and also address known vulnerabilities and threats.
    [Show full text]
  • Mattermost Offers a Cost-Effective, Enterprise-Grade, Private Cloud Alternative to Microsoft Teams Saas-Only Workplace Messaging Service
    Mattermost offers a cost-effective, enterprise-grade, private cloud alternative to Microsoft Teams SaaS-only workplace messaging service. While both products offer strong team messaging, file sharing and user management capabilities, Mattermost excels at delivering developer-productivity features, integrations with popular DevOps tools and deployment options that uniquely provide the control, privacy, legal compliance, extensibility and scalability required by large enterprises and high-trust teams. Mattermost is the communication tool of choice for leading engineering and DevOps teams Like general chat platforms such as Microsoft Teams, Mattermost brings all your team’s communications to one place, providing modern workplace messaging across web, mobile and PC with continuous archiving, instant search and a wide array of options to integrate your existing tools and workflows. This enables all your teams to: • Do more in less time, with less email using searchable, topic-based messaging • Solve problems faster with “war rooms” that assemble the right people and information • Collaborate anywhere with cross-device access to vital communications • Accelerate new hire onboarding with easy sharing of past team discussions For developers and IT teams, Mattermost enables additional high-performance workflows: DevOps, ChatOps, Conversational Development and Social Coding, among other use cases, that improve software quality while reducing delivery time. Developers and IT teams prefer Mattermost over MS Teams because Mattermost meets the unique needs of engineers who need more than a chat tool. The Best Companies in the World Use Mattermost Only Mattermost offers the control, privacy, legal compliance, extensibility and scalability top enterprises need. In contrast to Microsoft Teams and other proprietary SaaS services, Mattermost offers an open source, private cloud platform where enterprises have complete control of their vital communications Security Mattermost offers modern communication behind your firewall.
    [Show full text]
  • Configuracion De Un Servidor Proxy Para Filtrado De Contenidos Web En Ubuntu Linux
    Configuracion de un Servidor Proxy para Filtrado de Contenidos Web en Ubuntu Linux ¿Qué es un Proxy? «Proxy» tiene un significado muy general y al mismo tiempo ambiguo, sinónimo del concepto de «Intermediario». Se suele traducir como delegado o apoderado. Un Servidor Intermediario (Proxy) se define como una computadora o dispositivo que ofrece un servicio de red que consiste en permitir a los clientes realizar conexiones de red indirectas hacia otros servicios de red. Durante el proceso ocurre lo siguiente: -Cliente se conecta hacia un Servidor Intermediario (Proxy). -Cliente solicita una conexión, fichero u otro recurso disponible en un servidor distinto. -Servidor Intermediario (Proxy) proporciona el recurso ya sea conectándose hacia el servidor especificado o sirviendo éste desde un caché. -En algunos casos el Servidor Intermediario (Proxy) puede alterar la solicitud del cliente o bien la respuesta del servidor para diversos propósitos. Los Servidores Intermediarios (Proxies) generalmente se hacen trabajar simultáneamente como muro cortafuegos operando en el Nivel de Red, actuando como filtro de paquetes, como en el caso de IPTABLES, o bien operando en el Nivel de Aplicación, controlando diversos servicios, como es el caso de TCP Wrapper. Dependiendo del contexto, el muro cortafuegos también se conoce como BPD o Border Protection Device o simplemente filtro de paquetes. Tipos de Proxy ● Proxy de web / Proxy cache de web ● Proxies transparentes ● Reverse Proxy ● Proxy NAT (Network Address Translation) / Enmascaramiento ● Proxy Abierto ¿Que es Squid? Squid es un programa de software libre que implementa un servidor proxy y un demonio para caché de páginas web. Está especialmente diseñado para ejecutarse bajo entornos tipo Unix.
    [Show full text]
  • Securing Debian Manual
    Securing Debian Manual Javier Fernández-Sanguino Peña <[email protected]> ‘Authors’ on this page Version: 3.13, Sun, 30 Jan 2011 19:58:16 +0000 Abstract This document describes security in the Debian project and in the Debian operating system. Starting with the process of securing and hardening the default Debian GNU/Linux distribu- tion installation, it also covers some of the common tasks to set up a secure network environ- ment using Debian GNU/Linux, gives additional information on the security tools available and talks about how security is enforced in Debian by the security and audit team. Copyright Notice Copyright © 2002-2007 Javier Fernández-Sanguino Peña Copyright © 2001 Alexander Reelsen, Javier Fernández-Sanguino Peña Copyright © 2000 Alexander Reelsen Some sections are copyright © their respective authors, for details please refer to ‘Credits and thanks!’ on page 28. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU General Public License, Version 2 (http://www.gnu.org/licenses/ old-licenses/gpl-2.0.html) or any later version (http://www.gnu.org/copyleft/ gpl.html) published by the Free Software Foundation. It is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY. Permission is granted to make and distribute verbatim copies of this document provided the copyright notice and this permission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this document under the conditions for verbatim copying, provided that the entire resulting derived work is distributed under the terms of a permission notice identical to this one.
    [Show full text]