[netfilter-cvslog] r6447 - in branches/iptables/iptables-1.4: . extensions

laforge at netfilter.org laforge at netfilter.org
Mon Jan 30 09:52:24 CET 2006


Author: laforge at netfilter.org
Date: 2006-01-30 09:52:21 +0100 (Mon, 30 Jan 2006)
New Revision: 6447

Modified:
   branches/iptables/iptables-1.4/extensions/libip6t_HL.man
   branches/iptables/iptables-1.4/extensions/libip6t_REJECT.man
   branches/iptables/iptables-1.4/extensions/libip6t_ah.man
   branches/iptables/iptables-1.4/extensions/libip6t_condition.man
   branches/iptables/iptables-1.4/extensions/libip6t_dst.man
   branches/iptables/iptables-1.4/extensions/libip6t_esp.man
   branches/iptables/iptables-1.4/extensions/libip6t_eui64.man
   branches/iptables/iptables-1.4/extensions/libip6t_frag.man
   branches/iptables/iptables-1.4/extensions/libip6t_fuzzy.man
   branches/iptables/iptables-1.4/extensions/libip6t_hbh.man
   branches/iptables/iptables-1.4/extensions/libip6t_hl.man
   branches/iptables/iptables-1.4/extensions/libip6t_icmpv6.man
   branches/iptables/iptables-1.4/extensions/libip6t_ipv6header.man
   branches/iptables/iptables-1.4/extensions/libip6t_length.man
   branches/iptables/iptables-1.4/extensions/libip6t_mark.man
   branches/iptables/iptables-1.4/extensions/libip6t_multiport.man
   branches/iptables/iptables-1.4/extensions/libip6t_owner.man
   branches/iptables/iptables-1.4/extensions/libip6t_physdev.man
   branches/iptables/iptables-1.4/extensions/libip6t_rt.man
   branches/iptables/iptables-1.4/extensions/libipt_ah.man
   branches/iptables/iptables-1.4/extensions/libipt_condition.man
   branches/iptables/iptables-1.4/extensions/libipt_esp.man
   branches/iptables/iptables-1.4/extensions/libipt_fuzzy.man
   branches/iptables/iptables-1.4/extensions/libipt_length.man
   branches/iptables/iptables-1.4/extensions/libipt_mark.man
   branches/iptables/iptables-1.4/extensions/libipt_physdev.man
   branches/iptables/iptables-1.4/ip6tables.8.in
Log:
Major manpage update (Yasuyuki Kozakai)


Modified: branches/iptables/iptables-1.4/extensions/libip6t_HL.man
===================================================================
--- branches/iptables/iptables-1.4/extensions/libip6t_HL.man	2006-01-30 08:50:09 UTC (rev 6446)
+++ branches/iptables/iptables-1.4/extensions/libip6t_HL.man	2006-01-30 08:52:21 UTC (rev 6447)
@@ -1,17 +1,17 @@
-This is used to modify the IPv6 HOPLIMIT header field.  The HOPLIMIT field is 
-similar to what is known as TTL value in IPv4.  Setting or incrementing the
-HOPLIMIT field can potentially be very dangerous, so it should be avoided at
-any cost.  
-.TP
-.B Don't ever set or increment the value on packets that leave your local network!
+This is used to modify the Hop Limit field in IPv6 header. The Hop Limit field
+is similar to what is known as TTL value in IPv4.  Setting or incrementing the
+Hop Limit field can potentially be very dangerous, so it should be avoided at
+any cost. This target is only valid in
 .B mangle
 table.
 .TP
+.B Don't ever set or increment the value on packets that leave your local network!
+.TP
 .BI "--hl-set " "value"
-Set the HOPLIMIT value to `value'.
+Set the Hop Limit to `value'.
 .TP
 .BI "--hl-dec " "value"
-Decrement the HOPLIMIT value `value' times.
+Decrement the Hop Limit `value' times.
 .TP
 .BI "--hl-inc " "value"
-Increment the HOPLIMIT value `value' times.
+Increment the Hop Limit `value' times.

Modified: branches/iptables/iptables-1.4/extensions/libip6t_REJECT.man
===================================================================
--- branches/iptables/iptables-1.4/extensions/libip6t_REJECT.man	2006-01-30 08:50:09 UTC (rev 6446)
+++ branches/iptables/iptables-1.4/extensions/libip6t_REJECT.man	2006-01-30 08:52:21 UTC (rev 6447)
@@ -23,7 +23,7 @@
 .B " icmp6-port-unreachable"
 .B " port-unreach"
 .fi
-which return the appropriate IPv6-ICMP error message (\fBport-unreach\fP is
+which return the appropriate ICMPv6 error message (\fBport-unreach\fP is
 the default). Finally, the option
 .B tcp-reset
 can be used on rules which only match the TCP protocol: this causes a
@@ -31,4 +31,6 @@
 .I ident
 (113/tcp) probes which frequently occur when sending mail to broken mail
 hosts (which won't accept your mail otherwise).
+.B tcp-reset
+can only be used with kernel versions 2.6.14 or latter.
 

Modified: branches/iptables/iptables-1.4/extensions/libip6t_ah.man
===================================================================
--- branches/iptables/iptables-1.4/extensions/libip6t_ah.man	2006-01-30 08:50:09 UTC (rev 6446)
+++ branches/iptables/iptables-1.4/extensions/libip6t_ah.man	2006-01-30 08:52:21 UTC (rev 6447)
@@ -1,3 +1,10 @@
-This module matches the SPIs in AH header of IPSec packets.
+This module matches the parameters in Authentication header of IPsec packets.
 .TP
 .BR "--ahspi " "[!] \fIspi\fP[:\fIspi\fP]"
+Matches SPI.
+.TP
+.BR "--ahlen " "[!] \fIlength"
+Total length of this header in octets.
+.TP
+.BI "--ahres"
+Matches if the reserved field is filled with zero.

Modified: branches/iptables/iptables-1.4/extensions/libip6t_condition.man
===================================================================
--- branches/iptables/iptables-1.4/extensions/libip6t_condition.man	2006-01-30 08:50:09 UTC (rev 6446)
+++ branches/iptables/iptables-1.4/extensions/libip6t_condition.man	2006-01-30 08:52:21 UTC (rev 6447)
@@ -1,4 +1,4 @@
 This matches if a specific /proc filename is '0' or '1'.
 .TP
-.BI "--condition " "[!] filename"
+.BR "--condition " "[!] \fIfilename"
 Match on boolean value stored in /proc/net/ip6t_condition/filename file

Modified: branches/iptables/iptables-1.4/extensions/libip6t_dst.man
===================================================================
--- branches/iptables/iptables-1.4/extensions/libip6t_dst.man	2006-01-30 08:50:09 UTC (rev 6446)
+++ branches/iptables/iptables-1.4/extensions/libip6t_dst.man	2006-01-30 08:52:21 UTC (rev 6447)
@@ -1,7 +1,7 @@
-This module matches the IPv6 destination header options
+This module matches the parameters in Destination Options header
 .TP
-.BI "--dst-len" "[!]" "length"
-Total length of this header
+.BR "--dst-len " "[!] \fIlength"
+Total length of this header in octets.
 .TP
-.BI "--dst-opts " "TYPE[:LEN],[,TYPE[:LEN]...]"
-Options and it's length (List).
+.BR "--dst-opts " "\fItype\fP[:\fIlength\fP][,\fItype\fP[:\fIlength\fP]...]"
+numeric type of option and the length of the option data in octets.

Modified: branches/iptables/iptables-1.4/extensions/libip6t_esp.man
===================================================================
--- branches/iptables/iptables-1.4/extensions/libip6t_esp.man	2006-01-30 08:50:09 UTC (rev 6446)
+++ branches/iptables/iptables-1.4/extensions/libip6t_esp.man	2006-01-30 08:52:21 UTC (rev 6447)
@@ -1,3 +1,3 @@
-This module matches the SPIs in ESP header of IPSec packets.
+This module matches the SPIs in ESP header of IPsec packets.
 .TP
 .BR "--espspi " "[!] \fIspi\fP[:\fIspi\fP]"

Modified: branches/iptables/iptables-1.4/extensions/libip6t_eui64.man
===================================================================
--- branches/iptables/iptables-1.4/extensions/libip6t_eui64.man	2006-01-30 08:50:09 UTC (rev 6446)
+++ branches/iptables/iptables-1.4/extensions/libip6t_eui64.man	2006-01-30 08:52:21 UTC (rev 6447)
@@ -1 +1,10 @@
-This module matches the EUI64 part of a stateless autoconfigured IPv6 address.  It compares the source MAC address with the lower 64 bits of the IPv6 address. 
+This module matches the EUI-64 part of a stateless autoconfigured IPv6 address.
+It compares the EUI-64 derived from the source MAC address in Ehternet frame
+with the lower 64 bits of the IPv6 source address. But "Universal/Local"
+bit is not compared. This module doesn't match other link layer frame, and
+is only valid in the
+.BR PREROUTING ,
+.BR INPUT
+and
+.BR FORWARD
+chains.

Modified: branches/iptables/iptables-1.4/extensions/libip6t_frag.man
===================================================================
--- branches/iptables/iptables-1.4/extensions/libip6t_frag.man	2006-01-30 08:50:09 UTC (rev 6446)
+++ branches/iptables/iptables-1.4/extensions/libip6t_frag.man	2006-01-30 08:52:21 UTC (rev 6447)
@@ -1,19 +1,20 @@
-This module matches the time IPv6 fragmentathion header
+This module matches the parameters in Fragment header.
 .TP
-.BI "--fragid " "[!]" "id[:id]"
-Matches the given fragmentation ID (range).
+.BR "--fragid " "[!] \fIid\fP[:\fIid\fP]"
+Matches the given Identification or range of it.
 .TP
-.BI "--fraglen " "[!]" "length"
-Matches the total length of this header.
+.BR "--fraglen " "[!] \fIlength\fP"
+This option cannot be used with kernel version 2.6.10 or later. The length of
+Fragment header is static and this option doesn't make sense.
 .TP
-.BI "--fragres "
-Matches the reserved field, too.
+.BR "--fragres "
+Matches if the reserved fields are filled with zero.
 .TP
-.BI "--fragfirst "
+.BR "--fragfirst "
 Matches on the first fragment.
 .TP
-.BI "[--fragmore]"
+.BR "[--fragmore]"
 Matches if there are more fragments.
 .TP
-.BI "[--fraglast]"
+.BR "[--fraglast]"
 Matches if this is the last fragement.

Modified: branches/iptables/iptables-1.4/extensions/libip6t_fuzzy.man
===================================================================
--- branches/iptables/iptables-1.4/extensions/libip6t_fuzzy.man	2006-01-30 08:50:09 UTC (rev 6446)
+++ branches/iptables/iptables-1.4/extensions/libip6t_fuzzy.man	2006-01-30 08:52:21 UTC (rev 6447)
@@ -1,6 +1,6 @@
 This module matches a rate limit based on a fuzzy logic controller [FLC]
 .TP
-.BI "--lower-limit  "number"
+.BI "--lower-limit " "number"
 Specifies the lower limit (in packets per second).
 .TP
 .BI "--upper-limit " "number"

Modified: branches/iptables/iptables-1.4/extensions/libip6t_hbh.man
===================================================================
--- branches/iptables/iptables-1.4/extensions/libip6t_hbh.man	2006-01-30 08:50:09 UTC (rev 6446)
+++ branches/iptables/iptables-1.4/extensions/libip6t_hbh.man	2006-01-30 08:52:21 UTC (rev 6447)
@@ -1,7 +1,7 @@
-This module matches the IPv6 hop-by-hop header options
+This module matches the parameters in Hop-by-Hop Options header
 .TP
-.BI "--hbh-len" "[!]" "length"
-Total length of this header
+.BR "--hbh-len " "[!] \fIlength\fP"
+Total length of this header in octets.
 .TP
-.BI "--hbh-opts " "TYPE[:LEN],[,TYPE[:LEN]...]"
-Options and it's length (List).
+.BR "--hbh-opts " "\fItype\fP[:\fIlength\fP][,\fItype\fP[:\fIlength\fP]...]"
+numeric type of option and the length of the option data in octets.

Modified: branches/iptables/iptables-1.4/extensions/libip6t_hl.man
===================================================================
--- branches/iptables/iptables-1.4/extensions/libip6t_hl.man	2006-01-30 08:50:09 UTC (rev 6446)
+++ branches/iptables/iptables-1.4/extensions/libip6t_hl.man	2006-01-30 08:52:21 UTC (rev 6447)
@@ -1,10 +1,10 @@
-This module matches the HOPLIMIT field in the IPv6 header.
+This module matches the Hop Limit field in the IPv6 header.
 .TP
-.BI "--hl-eq " "value"
-Matches if HOPLIMIT equals the given value.
+.BR "--hl-eq " "[!] \fIvalue\fP"
+Matches if Hop Limit equals \fIvalue\fP.
 .TP
-.BI "--hl-lt " "ttl"
-Matches if HOPLIMIT is less than the given value.
+.BI "--hl-lt " "value"
+Matches if Hop Limit is less than \fIvalue\fP.
 .TP
-.BI "--hl-gt " "ttl"
-Matches if HOPLIMIT is greater than the given value.
+.BI "--hl-gt " "value"
+Matches if Hop Limit is greater than \fIvalue\fP.

Modified: branches/iptables/iptables-1.4/extensions/libip6t_icmpv6.man
===================================================================
--- branches/iptables/iptables-1.4/extensions/libip6t_icmpv6.man	2006-01-30 08:50:09 UTC (rev 6446)
+++ branches/iptables/iptables-1.4/extensions/libip6t_icmpv6.man	2006-01-30 08:52:21 UTC (rev 6447)
@@ -1,9 +1,14 @@
 This extension is loaded if `--protocol ipv6-icmp' or `--protocol icmpv6' is
 specified. It provides the following option:
 .TP
-.BR "--icmpv6-type " "[!] \fItypename\fP"
-This allows specification of the ICMP type, which can be a numeric
-IPv6-ICMP type, or one of the IPv6-ICMP type names shown by the command
+.BR "--icmpv6-type " "[!] \fItype\fP[/\fIcode\fP]|\fItypename\fP"
+This allows specification of the ICMPv6 type, which can be a numeric
+ICMPv6
+.IR type ,
+.IR type
+and
+.IR code ,
+or one of the ICMPv6 type names shown by the command
 .nf
  ip6tables -p ipv6-icmp -h
 .fi

Modified: branches/iptables/iptables-1.4/extensions/libip6t_ipv6header.man
===================================================================
--- branches/iptables/iptables-1.4/extensions/libip6t_ipv6header.man	2006-01-30 08:50:09 UTC (rev 6446)
+++ branches/iptables/iptables-1.4/extensions/libip6t_ipv6header.man	2006-01-30 08:52:21 UTC (rev 6447)
@@ -1,10 +1,29 @@
-This module matches on IPv6 option headers
+This module matches IPv6 extension headers and/or upper layer header.
 .TP
-.BI "--header " "[!]" "headers"
-Matches the given type of headers.  
-Names: hop,dst,route,frag,auth,esp,none,proto
-Long Names: hop-by-hop,ipv6-opts,ipv6-route,ipv6-frag,ah,esp,ipv6-nonxt,protocol
-Numbers: 0,60,43,44,51,50,59
+.BR "--header " "[!] \fIheader\fP[,\fIheader\fP...]"
+Matches the packet which EXACTLY includes all specified headers. The headers
+encapsulated with ESP header are out of scope.
+.IR header
+can be
+.IR hop | hop-by-hop
+(Hop-by-Hop Options header),
+.IR dst
+(Destination Options header),
+.IR route
+(Routing header),
+.IR frag
+(Fragment header),
+.IR auth
+(Authentication header),
+.IR esp
+(Encapsulating Security Payload header),
+.IR none
+(No Next header) which matches 59 in the 'Next Header field' of IPv6 header or any IPv6 extension headers, or
+.IR proto
+which matches any upper layer protocol header. A protocol name from /etc/protocols and numeric value also allowed. The number 255 is equivalent to
+.IR proto .
 .TP
-.BI "--soft"
-The header CONTAINS the specified extensions.
+.BR "[--soft]"
+Matches if the packet includes all specified headers with
+.BR --header ,
+AT LEAST.

Modified: branches/iptables/iptables-1.4/extensions/libip6t_length.man
===================================================================
--- branches/iptables/iptables-1.4/extensions/libip6t_length.man	2006-01-30 08:50:09 UTC (rev 6446)
+++ branches/iptables/iptables-1.4/extensions/libip6t_length.man	2006-01-30 08:52:21 UTC (rev 6447)
@@ -1,4 +1,4 @@
-This module matches the length of a packet against a specific value
-or range of values.
+This module matches the length of the IPv6 payload in octets, or range of it.
+IPv6 header itself isn't counted.
 .TP
-.BR "--length " "\fIlength\fP[:\fIlength\fP]"
+.BR "--length " "[!] \fIlength\fP[:\fIlength\fP]"

Modified: branches/iptables/iptables-1.4/extensions/libip6t_mark.man
===================================================================
--- branches/iptables/iptables-1.4/extensions/libip6t_mark.man	2006-01-30 08:50:09 UTC (rev 6446)
+++ branches/iptables/iptables-1.4/extensions/libip6t_mark.man	2006-01-30 08:52:21 UTC (rev 6447)
@@ -4,6 +4,6 @@
 target below).
 .TP
 .BR "--mark " "\fIvalue\fP[/\fImask\fP]"
-Matches packets with the given unsigned mark value (if a mask is
-specified, this is logically ANDed with the mask before the
+Matches packets with the given unsigned mark value (if a \fImask\fP is
+specified, this is logically ANDed with the \fImask\fP before the
 comparison).

Modified: branches/iptables/iptables-1.4/extensions/libip6t_multiport.man
===================================================================
--- branches/iptables/iptables-1.4/extensions/libip6t_multiport.man	2006-01-30 08:50:09 UTC (rev 6446)
+++ branches/iptables/iptables-1.4/extensions/libip6t_multiport.man	2006-01-30 08:52:21 UTC (rev 6447)
@@ -1,6 +1,7 @@
 This module matches a set of source or destination ports.  Up to 15
 ports can be specified.  A port range (port:port) counts as two
-ports.  It can only be used in conjunction with
+ports, but range isn't supported now. It can only be used in conjunction
+with
 .B "-p tcp"
 or
 .BR "-p udp" .

Modified: branches/iptables/iptables-1.4/extensions/libip6t_owner.man
===================================================================
--- branches/iptables/iptables-1.4/extensions/libip6t_owner.man	2006-01-30 08:50:09 UTC (rev 6446)
+++ branches/iptables/iptables-1.4/extensions/libip6t_owner.man	2006-01-30 08:52:21 UTC (rev 6447)
@@ -1,7 +1,7 @@
 This module attempts to match various characteristics of the packet
 creator, for locally-generated packets.  It is only valid in the
 .B OUTPUT
-chain, and even this some packets (such as ICMP ping responses) may
+chain, and even this some packets (such as ICMPv6 ping responses) may
 have no owner, and hence never match.  This is regarded as experimental.
 .TP
 .BI "--uid-owner " "userid"

Modified: branches/iptables/iptables-1.4/extensions/libip6t_physdev.man
===================================================================
--- branches/iptables/iptables-1.4/extensions/libip6t_physdev.man	2006-01-30 08:50:09 UTC (rev 6446)
+++ branches/iptables/iptables-1.4/extensions/libip6t_physdev.man	2006-01-30 08:52:21 UTC (rev 6447)
@@ -3,7 +3,7 @@
 a transparent bridging IP firewall and is only useful for kernel versions
 above version 2.5.44.
 .TP
-.B --physdev-in name
+.BR --physdev-in " [!] \fIname\fP"
 Name of a bridge port via which a packet is received (only for
 packets entering the
 .BR INPUT ,
@@ -14,7 +14,7 @@
 interface which begins with this name will match. If the packet didn't arrive
 through a bridge device, this packet won't match this option, unless '!' is used.
 .TP
-.B --physdev-out name
+.BR --physdev-out " [!] \fIname\fP"
 Name of a bridge port via which a packet is going to be sent (for packets
 entering the
 .BR FORWARD ,
@@ -31,12 +31,12 @@
 the output device will be, then the packet won't match this option, unless
 '!' is used.
 .TP
-.B --physdev-is-in
+.RB "[!] " --physdev-is-in
 Matches if the packet has entered through a bridge interface.
 .TP
-.B --physdev-is-out
+.RB "[!] " --physdev-is-out
 Matches if the packet will leave through a bridge interface.
 .TP
-.B --physdev-is-bridged
+.RB "[!] " --physdev-is-bridged
 Matches if the packet is being bridged and therefore is not being routed.
 This is only useful in the FORWARD and POSTROUTING chains.

Modified: branches/iptables/iptables-1.4/extensions/libip6t_rt.man
===================================================================
--- branches/iptables/iptables-1.4/extensions/libip6t_rt.man	2006-01-30 08:50:09 UTC (rev 6446)
+++ branches/iptables/iptables-1.4/extensions/libip6t_rt.man	2006-01-30 08:52:21 UTC (rev 6447)
@@ -1,19 +1,19 @@
 Match on IPv6 routing header
 .TP
-.BI "--rt-type " "[!]" "type"
+.BR "--rt-type" " [!] \fItype\fP"
 Match the type (numeric).
 .TP
-.BI "--rt-segsleft" "[!]" "num[:num]"
+.BR "--rt-segsleft" " [!] \fInum\fP[:\fInum\fP]"
 Match the `segments left' field (range).
 .TP
-.BI "--rt-len" "[!]" "length"
-Match the length of this header
+.BR "--rt-len" " [!] \fIlength\fP"
+Match the length of this header.
 .TP
-.BI "--rt-0-res"
+.BR "--rt-0-res"
 Match the reserved field, too (type=0)
 .TP
-.BI "--rt-0-addrs ADDR[,ADDR...]
+.BR "--rt-0-addrs" " \fIADDR\fP[,\fIADDR\fP...]"
 Match type=0 addresses (list).
 .TP
-.BI "--rt-0-not-strict"
+.BR "--rt-0-not-strict"
 List of type=0 addresses is not a strict list.

Modified: branches/iptables/iptables-1.4/extensions/libipt_ah.man
===================================================================
--- branches/iptables/iptables-1.4/extensions/libipt_ah.man	2006-01-30 08:50:09 UTC (rev 6446)
+++ branches/iptables/iptables-1.4/extensions/libipt_ah.man	2006-01-30 08:52:21 UTC (rev 6447)
@@ -1,3 +1,3 @@
-This module matches the SPIs in AH header of IPSec packets.
+This module matches the SPIs in Authentication header of IPsec packets.
 .TP
 .BR "--ahspi " "[!] \fIspi\fP[:\fIspi\fP]"

Modified: branches/iptables/iptables-1.4/extensions/libipt_condition.man
===================================================================
--- branches/iptables/iptables-1.4/extensions/libipt_condition.man	2006-01-30 08:50:09 UTC (rev 6446)
+++ branches/iptables/iptables-1.4/extensions/libipt_condition.man	2006-01-30 08:52:21 UTC (rev 6447)
@@ -1,4 +1,4 @@
 This matches if a specific /proc filename is '0' or '1'.
 .TP
-.BI "--condition " "[!] filename"
+.BI "--condition " "[!] \fIfilename\fP"
 Match on boolean value stored in /proc/net/ipt_condition/filename file

Modified: branches/iptables/iptables-1.4/extensions/libipt_esp.man
===================================================================
--- branches/iptables/iptables-1.4/extensions/libipt_esp.man	2006-01-30 08:50:09 UTC (rev 6446)
+++ branches/iptables/iptables-1.4/extensions/libipt_esp.man	2006-01-30 08:52:21 UTC (rev 6447)
@@ -1,3 +1,3 @@
-This module matches the SPIs in ESP header of IPSec packets.
+This module matches the SPIs in ESP header of IPsec packets.
 .TP
 .BR "--espspi " "[!] \fIspi\fP[:\fIspi\fP]"

Modified: branches/iptables/iptables-1.4/extensions/libipt_fuzzy.man
===================================================================
--- branches/iptables/iptables-1.4/extensions/libipt_fuzzy.man	2006-01-30 08:50:09 UTC (rev 6446)
+++ branches/iptables/iptables-1.4/extensions/libipt_fuzzy.man	2006-01-30 08:52:21 UTC (rev 6447)
@@ -1,6 +1,6 @@
 This module matches a rate limit based on a fuzzy logic controller [FLC]
 .TP
-.BI "--lower-limit  "number"
+.BI "--lower-limit " "number"
 Specifies the lower limit (in packets per second).
 .TP
 .BI "--upper-limit " "number"

Modified: branches/iptables/iptables-1.4/extensions/libipt_length.man
===================================================================
--- branches/iptables/iptables-1.4/extensions/libipt_length.man	2006-01-30 08:50:09 UTC (rev 6446)
+++ branches/iptables/iptables-1.4/extensions/libipt_length.man	2006-01-30 08:52:21 UTC (rev 6447)
@@ -1,4 +1,4 @@
 This module matches the length of a packet against a specific value
 or range of values.
 .TP
-.BR "--length " "\fIlength\fP[:\fIlength\fP]"
+.BR "--length " "[!] \fIlength\fP[:\fIlength\fP]"

Modified: branches/iptables/iptables-1.4/extensions/libipt_mark.man
===================================================================
--- branches/iptables/iptables-1.4/extensions/libipt_mark.man	2006-01-30 08:50:09 UTC (rev 6446)
+++ branches/iptables/iptables-1.4/extensions/libipt_mark.man	2006-01-30 08:52:21 UTC (rev 6447)
@@ -4,6 +4,6 @@
 target below).
 .TP
 .BR "--mark " "\fIvalue\fP[/\fImask\fP]"
-Matches packets with the given unsigned mark value (if a mask is
-specified, this is logically ANDed with the mask before the
+Matches packets with the given unsigned mark value (if a \fImask\fP is
+specified, this is logically ANDed with the \fImask\fP before the
 comparison).

Modified: branches/iptables/iptables-1.4/extensions/libipt_physdev.man
===================================================================
--- branches/iptables/iptables-1.4/extensions/libipt_physdev.man	2006-01-30 08:50:09 UTC (rev 6446)
+++ branches/iptables/iptables-1.4/extensions/libipt_physdev.man	2006-01-30 08:52:21 UTC (rev 6447)
@@ -3,7 +3,7 @@
 a transparent bridging IP firewall and is only useful for kernel versions
 above version 2.5.44.
 .TP
-.B --physdev-in name
+.BR --physdev-in " [!] \fIname\fP"
 Name of a bridge port via which a packet is received (only for
 packets entering the
 .BR INPUT ,
@@ -14,7 +14,7 @@
 interface which begins with this name will match. If the packet didn't arrive
 through a bridge device, this packet won't match this option, unless '!' is used.
 .TP
-.B --physdev-out name
+.BR --physdev-out " [!] \fIname\fP"
 Name of a bridge port via which a packet is going to be sent (for packets
 entering the
 .BR FORWARD ,
@@ -31,12 +31,12 @@
 the output device will be, then the packet won't match this option, unless
 '!' is used.
 .TP
-.B --physdev-is-in
+.RB "[!] " --physdev-is-in
 Matches if the packet has entered through a bridge interface.
 .TP
-.B --physdev-is-out
+.RB "[!] " --physdev-is-out
 Matches if the packet will leave through a bridge interface.
 .TP
-.B --physdev-is-bridged
+.RB "[!] " --physdev-is-bridged
 Matches if the packet is being bridged and therefore is not being routed.
 This is only useful in the FORWARD and POSTROUTING chains.

Modified: branches/iptables/iptables-1.4/ip6tables.8.in
===================================================================
--- branches/iptables/iptables-1.4/ip6tables.8.in	2006-01-30 08:50:09 UTC (rev 6446)
+++ branches/iptables/iptables-1.4/ip6tables.8.in	2006-01-30 08:52:21 UTC (rev 6447)
@@ -1,4 +1,4 @@
-.TH IP6TABLES 8 "Mar 09, 2002" "" ""
+.TH IP6TABLES 8 "Jan 22, 2006" "" ""
 .\"
 .\" Man page written by Andras Kis-Szabo <kisza at sch.bme.hu>
 .\" It is based on iptables man page.
@@ -131,6 +131,16 @@
 (for altering packets being routed through the box), and
 .B POSTROUTING
 (for altering packets as they are about to go out).
+.TP
+.BR "raw" :
+This table is used mainly for configuring exemptions from connection
+tracking in combination with the NOTRACK target.  It registers at the netfilter
+hooks with higher priority and is thus called before nf_conntrack, or any other
+IP6 tables.  It provides the following built-in chains:
+.B PREROUTING
+(for packets arriving via any network interface)
+.B OUTPUT
+(for packets generated by local processes)
 .RE
 .SH OPTIONS
 The options that are recognized by
@@ -231,11 +241,18 @@
 The specified protocol can be one of
 .IR tcp ,
 .IR udp ,
-.IR ipv6-icmp|icmpv6 ,
-or
+.IR icmpv6 ,
+.IR esp ,
 .IR all ,
 or it can be a numeric value, representing one of these protocols or a
-different one.  A protocol name from /etc/protocols is also allowed.
+different one. A protocol name from /etc/protocols is also allowed.
+But IPv6 extension headers except
+.IR esp
+are not allowed.
+.IR esp ,
+and
+.IR ipv6-nonext
+can be used with Kernel version 2.6.11 or later.
 A "!" argument before the protocol inverts the
 test.  The number zero is equivalent to
 .IR all .




More information about the netfilter-cvslog mailing list