Freebsd Developers' Handbook

Total Page:16

File Type:pdf, Size:1020Kb

Freebsd Developers' Handbook FreeBSD Developers’ Handbook The FreeBSD Documentation Project FreeBSD Developers’ Handbook by The FreeBSD Documentation Project Published August 2000 Copyright © 2000, 2001 by The FreeBSD Documentation Project Welcome to the Developers’ Handbook. This manual is a work in progress and is the work of many individuals. Many sections do not yet exist and some of those that do exist need to be updated. If you are interested in helping with this project, send email to the FreeBSD documentation project mailing list <[email protected]>. The latest version of this document is always available from the FreeBSD World Wide Web server (http://www.FreeBSD.org/). It may also be downloaded in a variety of formats and compression options from the FreeBSD FTP server (ftp://ftp.FreeBSD.org/pub/FreeBSD/doc) or one of the numerous mirror sites (http://www.freebsd.org/handbook/mirrors-ftp.html). Redistribution and use in source (SGML DocBook) and ’compiled’ forms (SGML, HTML, PDF, PostScript, RTF and so forth) with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code (SGML DocBook) must retain the above copyright notice, this list of conditions and the following disclaimer as the first lines of this file unmodified. 2. Redistributions in compiled form (transformed to other DTDs, converted to PDF, PostScript, RTF and other formats) must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. Important: THIS DOCUMENTATION IS PROVIDED BY THE FREEBSD DOCUMENTATION PROJECT "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FREEBSD DOCUMENTATION PROJECT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Table of Contents I. Basics ....................................................................................................................................................................... vii 1 Introduction ........................................................................................................................................................1 1.1 Developing on FreeBSD........................................................................................................................1 1.2 The BSD Vision.....................................................................................................................................1 1.3 Architectural Guidelines........................................................................................................................1 1.4 The Layout of /usr/src ......................................................................................................................1 2 Programming Tools ............................................................................................................................................3 2.1 Synopsis.................................................................................................................................................3 2.2 Introduction............................................................................................................................................3 2.3 Introduction to Programming ................................................................................................................3 2.4 Compiling with cc.................................................................................................................................5 2.5 Make ....................................................................................................................................................12 2.6 Debugging............................................................................................................................................16 2.7 Using Emacs as a Development Environment.....................................................................................20 2.8 Further Reading ...................................................................................................................................28 3 Secure Programming........................................................................................................................................30 3.1 Synopsis...............................................................................................................................................30 3.2 Secure Design Methodology................................................................................................................30 3.3 Buffer Overflows .................................................................................................................................30 3.4 SetUID issues.......................................................................................................................................32 3.5 Limiting your program’s environment.................................................................................................33 3.6 Trust.....................................................................................................................................................34 3.7 Race Conditions...................................................................................................................................34 4 Localization - I18N ..........................................................................................................................................35 4.1 Programming I18N Compliant Applications.......................................................................................35 II. Interprocess Communication................................................................................................................................36 5 * Signals ...........................................................................................................................................................37 6 Sockets .............................................................................................................................................................38 6.1 Synopsis...............................................................................................................................................38 6.2 Networking and Diversity....................................................................................................................38 6.3 Protocols ..............................................................................................................................................38 6.4 The Sockets Model ..............................................................................................................................41 6.5 Essential Socket Functions ..................................................................................................................41 6.6 Helper Functions..................................................................................................................................55 6.7 Concurrent Servers ..............................................................................................................................57 7 IPv6 Internals ...................................................................................................................................................60 7.1 IPv6/IPsec Implementation..................................................................................................................60 III. Kernel ....................................................................................................................................................................77 8 * History of the Unix Kernel............................................................................................................................78 9 Locking Notes ..................................................................................................................................................79 9.1 Mutexes................................................................................................................................................79 9.2 Lock Manager Locks ...........................................................................................................................82 9.3 Atomically Protected Variables ...........................................................................................................82 10 Kernel Objects................................................................................................................................................83 10.1 Terminology.......................................................................................................................................83 iii 10.2 Kobj Operation ..................................................................................................................................83 10.3 Using Kobj.........................................................................................................................................83
Recommended publications
  • Pf3e Index.Pdf
    INDEX Note: Pages numbers followed by f, n, priority-based queues, 136–145 or t indicate figures, notes, and tables, match rule for queue assignment, respectively. 137–138 overview, 134–135 Symbols performance improvement, 136–137 # (hash mark), 13, 15 queuing for servers in DMZ, ! (logical NOT) operator, 42 142–144 setting up, 135–136 A on FreeBSD, 135–136 on NetBSD, 136 Acar, Can Erkin, 173 on OpenBSD, 135 ACK (acknowledgment) packets transitioning to priority and class-based bandwidth allocation, queuing system, 131–133 139–140 anchors, 35–36 HFSC algorithm, 124, 126, 142 authpf program, 61, 63 priority queues, 132, 137–138 listing current contents of, 92 two-priority configuration, loading rules into, 92 120–121, 120n1 manipulating contents, 92 adaptive.end value, 188 relayd daemon, 74 adaptive firewalls, 97–99 restructuring rule set with, 91–94 adaptive.start value, 188 tagging to help policy routing, 93 advbase parameter, 153–154 ancontrol command, 46n1 advskew parameter, 153–154, 158–159 antispoof tool, 27, 193–195, 194f aggressive value, 192 ARP balancing, 151, 157–158 ALTQ (alternate queuing) framework, atomic rule set load, 21 9, 133–145, 133n2 authpf program, 59–63, 60 basic concepts, 134 basic authenticating gateways, class-based bandwidth allocation, 60–62 139–140 public networks, 62–63 overview, 135 queue definition, 139–140 tying queues into rule set, 140 B handling unwanted traffic, 144–145 bandwidth operating system-based queue actual available, 142–143 assignments, 145 class-based allocation of, 139–140 overloading to
    [Show full text]
  • Implementing Ipv6: Experiences at KAME Project
    Implementing IPv6: experiences at KAME project Jun-ichiro Hagino, IIJ research laboratory itojun@{iijlab.net,kame.net} Outline What is IPv6, and why IPv6 (brief summary) What is KAME project Some technical insights observed at KAME Implmentation status What are the TODOs, issues from both specification/implementation What is IPv6? Expansion of address space - 32bit -> 128bit 32bit: 4.3 billion nodes maximum not sufficient, blocking new IP-based applications from appearing 128bit: 3.4 x 10^38 nodes maximum Make new technologies mandatory IPv4: designed in 1970’s IPv6: designed in 1990’s autoconfiguration, multicast, security, ... Why? - IPv4 address space is filled up, NAT is killing us all When? - Already there, so you should How? - (next slide) How to operate IPv6? IPv6 is "IP with bigger address space", almost no difference with IPv4 bigger address space makes a huge difference Base spec NAT-free 128bit address, simpler base header, extensible header format Enables many future application deployment and uses Routing - OSPFv3, RIPng, BGP4+ QoS - diffserv, RSVP (separate effort from IPv6 itself) more friendly than IPv4 Mobility - mobile-ip6 No foreign agent necessary Security - IPsec (separate effort from IPv6 itself) A "fully conformant IPv6 implementation" must have IPsec code Autoconfiguration stateless autoconf, DHCPv6 Multicast - PIM, MLD (= IGMP) Applications - HTTP, FTP, VoIP, whatever you do with IPv4 New applications would appear when IPv6 hits the critical mass Problem we had in 1995... IPv6 specification is out, but there’s
    [Show full text]
  • Implement an Ipv6 Router Using KAME Under Freebsd
    在 FreeBSD 下利用 KAME 實做一個 IPv6 路由器 Implement An IPv6 Router Using KAME under FreeBSD 梁家瑋 Liang Jia-Wei 高雄師範大學資訊教育所 [email protected] KAME 計劃是日本的一些公司團隊所共同 ABSTRACT 參與的一個計劃,而這個軟件主要是提供 BSD(包括 FreeBSD、NetBSD 等)作業系統一些 With IPv4(Internet Protocol version 4) , it has 額外的功能,包括了 IPv6、IPSec 以及一些網路 been found the address space provided can’t sustain the growing number hosts connected to the 流量控制應用管理的功能。在此篇論文我們最 Internet. IPv6(Internet Protocol version 6) has 主要的目的是利用 KAME 來實作一個 Router, been designed to resolve scalability issues of the 透過這台 Router,可以使 IPv4 網路與 IPv6 網路 Internet address space. There are a lot of 串聯起來,我們只需要一台 PC 來安裝 FreeBSD advantages in using IPv6. For example, it’s not 並且應用 KAME 來達成,這對於過渡時期還沒 necessary for NAT(Network Address Transmission) 有獨立 IPv6 機器的機構來說是很有幫助的。 server , and the number of IP address is enough. In this way , it’s more convenient to deliver IP 關鍵字: IPv6, FreeBSD,轉換機制,KAME。 addresses to mobile devices , such as notebook , PDA , cell phone , etc. Nowadays , enterprises , 1. Introduction schools , people use computer network in IPv4. It is important for the IPv4/IPv6 transition Nowadays,more and more electric mechanisms.There are various translation equipments need IP address to support internet strategies can be broadly divided into dual stack , access , such as notebooks , cell phones, PDAs. tunneling and translation , and they will be IPv6 will solve the problem of IP address shortage. mentioned later. IPv6 is a new version of IP which is designed to be an evolutionary step from IPv4. It is a natural KAME Project is a joint effort to create increment to IPv4.
    [Show full text]
  • BSD Intro Lecture
    Short history • Based on: http://www.levenez.com/unix/ • 1978 – BSD (Barkeley software distribution) Based on unix system developed by Bell. • 1991 – 386BSD – BSD port to Intel (Based on 4.3BSD). • 1991 – Linux based on Minix. • 1993 – FreeBSD and NetBSD Based on 386BSD. • 1995 - OpenBSD splits from NetBSD. • 2001 – Apple’s Darwin, based on FreeBSD. • Latest releases: 5.3, 4.11. • The most popular of the *BSDs. • Historically aimed for maximum. performance on X86. Now supports most of the popular hardware platforms. • Biggest installations: Yahoo servers, ftp.cdrom.com, www.netcraft.com. • “Of course it runs NetBSD” • Last version: NetBSD 2.0. • Aims for supporting as many architectures possible. • Portable design. • 40 supported architectures. • www.openbsd.org • Current version: OpenBSD 3.6. • “Try to be the #1 most secure operating system“. • “Secure by default”. • Based on Canada – is not restricted by US export laws. • developer.apple.com/darwin/projects/darwin/ • The operating system behind Apple’s MAC OS X. • Based on FreeBSD. • Apple’s cool GUI, on top of a reliable Open source unix. • Runs on PowerPC based Macintosh. • Version for X86 is also available. Licensing Issues • Linux – GPL Must publish your source code if your code is based on a GPLd software. • *BSD - BSD license. • Do what ever you want, just give us credit. • Poul Henning Kamp - Beerware license Do what ever you want, just buy me beer when we meet. FreeBSD – The people behind • FreeBSD Core Team – The board of directors. • FreeBSD Committers – The programmers. • Release Engineering Teams • Documentation engineering team • Port management team. • Donations Team. FreeBSD – The people behind cont’ • Technical Review Board.
    [Show full text]
  • Ipv6 Activities in Japan
    IPv6 activities in Japan Kazu Yamamoto IIJ Research Laboratory [email protected] sTLA (2001/02/06) APNIC Allocated: 24 (KR 6, JP 12) Announced: 17 (71%) ARIN Allocated: 13 Announced: 8 (61%) RIPE Allocated: 26 Announced: 18 (69%) ISPs in Japan (1) IPv6 tunneling services IIJ http://www.iij.ad.jp/IPv6/ndex-e.html OCN http://www.v6.ntt.net/english.html JENS http://www.jens.co.jp/news/20001030.html (JP) DION http://www.v6.kddi.com/ (JP) ODN http://www.v6.japan-telecom.co.jp/ BIGLOBE http://biz.biglobe.ne.jp/service/IPv6/ (JP) ISPs in Japan (2) IPv6 native services IIJ http://www.iij.ad.jp/IPv6/ndex-e.html JENS http://www.jens.co.jp/news/20001030.html (JP) IPv6 products Routers IIJ SEIL http://www.seil-t1.com/ (JP) Fujitsu Geo Stream R940 http://www.fujitsu.co.jp/jp/cover/network3/products_1.html (JP) Fujitsu NetVehicle Hitachi GR2000 http://www.hitachi.co.jp/Prod/comp/network/index.htm MGCS SJ6 NEC IX5000 http://www.nec.co.jp/japanese/product/kiban/den/ix5k7k/ (JP) NEC CX5210 NEC IP8800/700 Yamaha RT300i/RT105i/RTA52i/RT60w http://www.rtpro.yamaha.co.jp/ (JP) IPv6 products Translators YDC TTB http://www.ydc.co.jp/IT/ip/TTB/index-j.html (JP) Embedded stack Access ave-TCP 6.0 http://www.access.co.jp/press/001016.html (JP) Mail readers OrangeSoft Winbiff http://www.orangesoft.co.jp/e/index.html The KAME project (1) High quality code for BSD variants Reference code One of the keys to deploy IPv6 IPv6, IPsec, Mobile IP and advanced networking Provided "AS IS" like BSD Free and no warranty Commercial use is OK Organization April 1998 - March 2002 9 core members from 8 Japanese companies Fujitsu, Hitachi, IIJ, NEC, Toshiba, YDC, Yokogawa MGCS (new!) The KAME project (2) The basic spec has been implemented IPv6 Basic specifications Routing: RIPng, OSPFv3, BGP4+, PIM-DM, PIM-SM Translator: TCP-relay and protocol translator IPsec, IKE, Mobile IP Many IPv6 applications DNS, SMTP, POP, HTTP, FTP, TELNET, SSH..
    [Show full text]
  • Design and Implementation to Support Multiple Key Exchange Protocols for Ipsec
    Design and Implementation to Support Multiple Key Exchange Protocols for IPsec Kazunori Miyazawa Shoichi Sakane Yokogawa Electric Corporation Yokogawa Electric Corporation [email protected] [email protected] Ken-ichi Kamada Mitsuru Kanda Yokogawa Electric Corporation Toshiba Corporation [email protected] [email protected] Atsushi Fukumoto Toshiba Corporation [email protected] Abstract methods to share IPsec SAs between two enti- ties. One is manual configuration and the other is automatic key exchange. Manual configura- The racoon2 project has been developing an ap- tion is basically used for a small static system or plication, the racoon2, which simultaneously debugging because of its scalability. Automatic supports multiple key exchange protocols for key exchange is used in a practical system. IPsec [6]. The racoon2 supports IKEv2 [1] and KINK [11], and works on Linux, NetBSD, and We have used the Internet Key Ex- FreeBSD. This paper describes issues to sup- change(IKEv1) [2] protocol to support port the multiple key exchange protocols on automatic key exchange. But it does not those operating systems, and describes our ap- clearly specify the ways to re-key and delete proach. This paper also describes design and SAs and dead peer detection. The vendors implementation of the racoon2. have been extending it to support them and it caused interoperability issues. Additionally, it needs at least 6 messages to exchange IPsec SAs. According to the background IETF IPsec 1 Background working group had discussed a successor of IKEv1. The working group defines the Internet Key Exchange version 2 (IKEv2) and IETF IPsec provides security services in IP layer.
    [Show full text]
  • Linux Ipv6 Networking Past, Present, and Future
    Linux IPv6 Networking Past, Present, and Future Hideaki Yoshifuji Kazunori Miyazawa The University of Tokyo Yokogawa Electric Corporation [email protected] [email protected] Yuji Sekiya Hiroshi Esaki Jun Murai The University of Tokyo The University of Tokyo Keio University [email protected] [email protected] [email protected] Abstract • 128bit address space. • Forbidding of packet fragmentation in in- In order to deploy high-quality IPv6 proto- termediate routers. col stack, we, USAGI Project[13], have ana- lyzed and addressed issues on Linux IPv6 im- • Flexible feature extension using extension plementation. In this paper / in our talk in headers. OLS2003, we describe the analysis of Linux • Supporting security features by default. IPv6 protocol stack, improvements and imple- mentation of the IPv6 and IPsec protocol stack • Supporting Plug & Play features by de- and patches which are integrated into the main- fault. line kernel. We will explain the impacts of our API improvements on network applications. Currently, IPv6 is at the final phase of standard- We want to discuss on missing pieces and di- ization. Fundamental specifications are almost rection for future development. fixed and commercial products with IPv6 sup- port are being deployed in the market. Inter- As a demonstration we would like to provide national leased lines for IPv6 are out as well. IPv6 network connectivity to the OLS2003 IPv6 has expanded the existing Internet by pro- meeting venue. viding solutions to protocol scalability and be- ginning to grow as a standard for connecting 1 Introduction everything, not just existing computers. Establishment of IPv6, as a next-generation In- 2 The Dawn of Linux IPv6 Stack ternet protocol to IPv4, started from the be- ginning of the 1990’s.
    [Show full text]
  • Security, Safety and the Acceptance of Ipv6
    Security, Safety and the Acceptance of IPv6 George V. Neville-Neil Member of The FreeBSD Project ABSTRACT the network easy, specifically link local addresses and the In order for a network protocol to gain acceptance in the auto-configuration protocols, can also make attacking sys- broader Internet community it is necessary for that protocol tems that use these features easier in some, now common, to be deployed on enough systems and used by enough peo- situations. ple to show that it is both beneficial and also not a danger One complicating factor has been that since the time when to the rest of the network as a whole. Gaining acceptance the first IPv6 recommendations appeared in 1995, the Inter- for a new protocol is therefore a chicken and egg problem, net has grown from 16 million users, with little or no com- and solving it requires that protocol designers and develop- merce, to over a billion users, with billions of dollars in com- ers consider the issues of security and safety earlier in the merce carried out across the network. Laptops and wireless development process. In this paper I will discuss some prob- networks have now become ubiquitous, which means that an lems faced in deploying IPv6 that relate to the perceived attacker need not be physically present in order to mount safety and security of the protocol, and give a specific ex- an attack. Activities such as war driving or using high gain ample from the FreeBSD project in which features of IPv6 antennas to gain access to a network are now commonplace were turned off for safety reasons.
    [Show full text]
  • Testing Ipv6 Implementations with TAHI
    Testing IPv6 implementations with TAHI TIPSTER6 project Abstract IPv6 has now reached the level of being suitable for enterprise services. Several vendors (e.g. Cisco, Compaq, IBM, and Sun) or organizations (Linux, FreeBSD, OpenBSD, NetBSD) are already shipping their products with IPv6 support. It is expected, that most of the vendor will follow the trends, and expected to ship their IPv6 ready products by the end of this year (e.g. Windows XP by Microsoft). When introducing new technology, it is important to find out the products' compliance to the standards, and their interoperability. However, the new Internet devices (handheld, game devices, home-appliances) can generate a further challenge. This paper describes the current state of the ongoing interoperability and compatibility test of IPv6 implementations in TIPSTER6 project. The TIPSTER6 project is a follow-up project of the IPv6 testing and operating experience done at two department of Budapest University of Technology and Economics (Centre of Information Technology, Department of Control Engineering). The results are practically an extension of the previous report appeared in the TERENA Networking conference in 1998. [TNC98] Introduction The TIPSTER6 project is formed from Centre of Information Technology of Budapest University of Technology and Economics Budapest, Department of Control Engineering and Information Technology of Budapest University of Technology and Economics, KFKI Research Institute for Particle and Nuclear Physics, and MATÁV PKI to facilitate the IPv6 deployment in Hungary especially in the HUNGARNET. See more http://tipster6.ik.bme.hu/tipster6_en.html , The project members have more than 4 years experience in the IPv6. Recently several IPv6 implementations have been made public.
    [Show full text]
  • A Functional and Performance-Oriented Comparison of Transition Mechanisms for Internet Transition from Ipv4 to Ipv6 Protocol
    A Functional and Performance-Oriented Comparison of Transition Mechanisms for Internet Transition from IPv4 to IPv6 Protocol A Nejc Škoberne T F C I S D P C I S Ljubljana, 2013 . A Functional and Performance-Oriented Comparison of Transition Mechanisms for Internet Transition from IPv4 to IPv6 Protocol A Nejc Škoberne T F C I S D P C I S Ljubljana, 2013 . APPROVAL I hereby declare that this submission is my own work and that to the best of my knowledge, it contains no material previously published or written by another person nor material which to a substantial extent has been accepted for the award of any other degree or diploma of the university or other institute of higher learning, except where due acknowledgement has been made. — Nejc Škoberne — December 2013 T dr. Mojca Ciglarič Assistant Professor of Computer and Information Science dr. Andrej Kos Associate Professor of Electrical Engineering dr. Zoran Bosnić Assistant Professor of Computer and Information Science Dr Olaf Maennel Lecturer of Computer Science Loughborough University . PREVIOUS PUBLICATIONS I hereby declare that the research reported herein was previously published/submitted for publication in peer reviewed journals or publicly presented at the following occa- sions: [1] N. Škoberne, O. Maennel, I. Phillips, R. Bush, J. Žorž and M. Ciglarič. IPv4 Address Sharing Mechanism Classification and Tradeoff Analysis. IEEE/ACM Transactions on Networking, volume PP, number 99, 2013. doi: 10.1109/TNET.2013.2256147 [2] N. Škoberne and M. Ciglarič. Practical Evaluation of Stateful NAT64/DNS64 Translation. Advances in Electrical and Computer Engineering, volume 11, number 3, pages 49-54, 2011.
    [Show full text]
  • Department of Commerce Response to Notice of Inquiry
    Department of Commerce Response to Notice of Inquiry Prepared by: NTT/VERIO 8005 S. Chester St, Suite 200 Englewood, CO 80112 March 8, 2004 - 1 - March 8, 2004 Please comment on the adequacy of IPv4 address space. In accordance with a United Nation (UN) 2002 report, the Earth’s population is estimated to be 6.3 billion. Without considering the H-ratio, the IPv4 32 bit address space is inadequate to support 1/3 of the Earth’s population after factoring in the unusable IPv4 space such as the RFC 1918 private address block (10/8, 172.16/12, 192.168/16), the loopback address block (127/8) and reserved address space for uses such as multicast (224/3). Further, this ?UN report expects the population to increase by 2.6 billion during the next 47 years, to 8.9 billion in 2050 from 6.3 billion in 2002. The Internet architecture will need to accommodate growth in population and the quantity of devices which will be “naturally” connecting to the Internet; such as PDAs, cell phones and eventually, appliances. China suffers from serious IP address shortages. Statistics show that currently, China has more than 60 million Internet users, but only 30 million-odd IPv4 addresses to be used by their populace, approximately two users for each IP address. Meanwhile, this nation's 240 million mobile phone users are turning into potential Internet surfers and as a result, need their own IP addresses. This inadequate supply of IP address is causing a bottleneck for Internet development within China. The TCP/IP protocol suite was developed under DARPA in the late 60s and early 70s.
    [Show full text]
  • Why You Want Ipv6 (Linux Reviews)
    Why you want IPv6 (Linux Reviews) > Linux Reviews > Features > Why you want IPv6 1.0.3, en, xiando You need IPv6. You just don't know it yet. Find out how to get it, how to benefit from it and how it will increase your shareholder vaule. 1. What is IPv6, and why would I care? ♦ 1.1. Background: The IP shortage ♦ 1.2. Some Very Huge numbers ♦ 1.3. Who uses IPv6 today, how widespread is it? 2. Understanding IPv6 addresses ♦ 2.1. Know your prefix 3. Subnet Matrix Table 4. Get IPv6 NOW: Free IPv4 to IPv6 tunnel brookers ♦ 4.1. The Standard way of setting up a IPv6 tunnell 5. How and why Ipv6 can make your life more glamorous, your job easier to do and significantly increase your shareholder value ♦ 5.1. Radio stations ♦ 5.2. Free open newsservers ♦ 5.3. Visiting IPv4 sites through IPv6 − "Anonymous" web surfing ♦ 5.4. Internet Time Servers ♦ 5.5. Internet Relay Chat ♦ 5.6. Links to more IPv6 fun 6. The major responsibilities of using Ipv6 7. Links to pages with tools that may help you on your way 8. Where And What you can read about IPv6 9. Notes for Solaris users 1. What is IPv6, and why would I care? Internet is built upon a protocol suite called TCP/IP. This abbreviation stands for transmission control protocol, and Internet protocol. When your computer communicates with the Internet a unique IP address is used to transfer and receive information. Yesterdays IP standard is called IPv4. Sadly most ISPs and services still only deliver this ancient technology standarized in September 1981.
    [Show full text]