正しくは http://www.openbsd.org/faq/upgrade56.html です。
以下 sd1となってるのは install しているのが、 usb HDD のためです。
cd56.iso でネットワークupgrade して
1)
export PKG_PATH=http://ftp.jaist.ac.jp/pub/OpenBSD/5.6/packages/i386/
で
pkg_add -iu
今関係はないですが
boot -s
もfsckの関係で頭の隅においときます。
2)
after 5.7
The etc and xetc sets are now
part of base and xbase and are not distributed separately anymore.
They are extracted from base and xbase during installation and upgrades.
Note that this includes the rc and rc.conf files!
以下は不要になりました。
etc56.tgz xetc56.tgzをダウンロードしてから
sysmerge -s etc56.tgz -x xetc48.tgz -S
3) icedtea-web をいれると javaws cgoban.jnlp ができます。
4) aumix なくなりました。
xfce4-mixer 入れましょう。
ここから後は新規インストールの場合です
5)disklabel -e sd1 すると
a: 8431488 2056320 4.2BSD 2048 16384 1 # /
b: 2054272 2048 swap # none
c: 976773168 0 unused
i: 58130432 10487808 ext2fs
j: 387069952 70668288 MSDOS ほんとうはntfs
k: 519030784 457740288 ext2fs
l: 2043904 68622336 unknown
m: 2045952 974725120 MSDOS ほんとうはvfat
なので
mount_ntfs /dev/sd1j /mnt-NTFS/
mount_msdos /dev/sd1m /mnt-MSDOS/
6) cat /etc/sysctl.conf
なんと新規インストールの時#行がなくなってます、驚きました。不便です。
/etc/examples をみたらよいと、
misc openbsd で Jeremy さんに教えていただきました。
net.inet.ip.forwarding=1
machdep.lidsuspend=1 # Try to suspend on lid close
http://www.openbsd.org/faq/faq6.html によると
net.inet.ip.forwarding=1 とします。なお以下です。
To make this change without rebooting you would use the
sysctl(8)
utility directly.
Remember though that this change will no longer exist after a reboot, and needs to be run as root.
Remember though that this change will no longer exist after a reboot, and needs to be run as root.
# sysctl net.inet.ip.forwarding=1
7) cat /etc/pf.conf
# macros
int_if="bge0"
ext="run0"
tcp_services="{ 22, 113 }"
#tcp_services="{ 80, 113 }"
icmp_types="echoreq"
# comp3="192.168.11.1"
# options
set block-policy return
set loginterface $ext
set skip on lo
# FTP Proxy rules
anchor "ftp-proxy/*"
pass in quick on $int_if inet proto tcp to any port ftp divert-to 127.0.0.1 port 8021
# match rules
match out on $ext inet from !($ext:network) to any nat-to ($ext:0)
# filter rules
block in log
pass out quick
antispoof quick for { lo $int_if }
#pass in on $ext inet proto tcp from any to ($ext) port $tcp_services
pass in on $ext inet proto tcp from any to ($ext) port $tcp_services
#pass in on $int_if inet proto tcp from any to ($int_if) port 22
# pass in on $ext inet proto tcp to ($ext) port 80 rdr-to $comp3
pass in inet proto icmp all icmp-type $icmp_types
pass in on $int_if
別のマシンでは cat /etc/pf.conf
# macros
int_if="fxp0"
tcp_services="{ 22, 113 }"
icmp_types="echoreq"
#comp3="192.168.0.3"
# options
set block-policy return
set loginterface egress
set skip on lo
# FTP Proxy rules
anchor "ftp-proxy/*"
pass in quick on $int_if inet proto tcp to any port ftp divert-to 127.0.0.1 port 8021
# match rules
match out on egress inet from !(egress:network) to any nat-to (egress:0)
# filter rules
block in log
pass out quick
antispoof quick for { lo $int_if }
# macros
int_if="fxp0"
tcp_services="{ 22, 113 }"
icmp_types="echoreq"
#comp3="192.168.0.3"
# options
set block-policy return
set loginterface egress
set skip on lo
# FTP Proxy rules
anchor "ftp-proxy/*"
pass in quick on $int_if inet proto tcp to any port ftp divert-to 127.0.0.1 port 8021
# match rules
match out on egress inet from !(egress:network) to any nat-to (egress:0)
# filter rules
block in log
pass out quick
antispoof quick for { lo $int_if }
pass in on egress inet proto tcp from any to (egress) port $tcp_services
#pass in on egress inet proto tcp to (egress) port 80 rdr-to $comp3
pass in inet proto icmp all icmp-type $icmp_types
pass in on $int_if
#pass in on egress inet proto tcp to (egress) port 80 rdr-to $comp3
pass in inet proto icmp all icmp-type $icmp_types
pass in on $int_if
8)
cat /etc/dhcpd.interfaces
bge0
cat /etc/dhcpd.conf
option domain-name-servers 192.168.100.254 ;
subnet 192.168.11.0 netmask 255.255.255.0 {
option routers 192.168.11.222;
range 192.168.11.10 192.168.11.11;
# filename "pxeboot";
# next-server 192.168.11.222;
}
9) /etc/exports
/RW -alldirs -maproot=tuyosi -network=192.168.11 -mask=255.255.255.0
0 件のコメント:
コメントを投稿