Hallo Athaba,
Klappt das Netzwerk ansonsten? "ping -c3
www.bsdforen.de"
Mit "ping -c3 anoncvs.NetBSD.org" kannst du dann explizit den NetBSD Anoncvsserver probieren.
Ja, das Netzwerk hatte ich bei der Installation versucht per dhcp einzurichten.
Oh Schock schwere Not: ping ergibt, dass die Adressen
www.bsdforen.de etc. nicht erreichbar sind. Damit hatte ich nicht gerechnet ... Bisher habe ich diesen Router noch nie manuell eingerichtet, weil er von den Systemen bei der Installation und im Betrieb immer automatisch erkannt wurde. Also lerne ich das jetzt ;-)
Falls das nicht klappt, schreib mal, wie der Rechner mit dem Internet verbunden ist und was in deiner /etc/rc.conf steht ("cat /etc/rc.conf").
Vermute nun, dass ich noch ziemlich was nachkonfigurieren muss. Ich poste hier mal etwas mehr, als Du gefragt hattest. In der Hoffnung, dass diese Fragen auch für andere unkundige Interessenten als Einstiegshilfe nützlich sind.
Danke für die Geduld! + Viele Grüße,
raziel
Meine Internetverbindung:
Fritz!Box DSL-Router mit integrierter Firewall, kabelgebunden, Flatrate.
Feste interne Adresse: 192.168.178.1
/etc/rc.conf:
# -- BEGIN DragonFly BSD Installer automatically generated configuration -- #
# -- Written on Sat Aug 9 10:50:10 2008 -- #
hostname="dragon.freesys"
ifconfig_v="DHCP"
keymap="german.iso"
# -- END of DragonFly BSD Installer automatically generated configuration -- #
/etc/resolv.conf:
search freesys
/etc/host.conf:
# $FreeBSD: src/etc/host.conf,v 1.6 1999/08/27 23:23:41 peter Exp $
# $DragonFly: src/etc/host.conf,v 1.2 2003/06/17 04:24:45 dillon Exp $
# First try the /etc/hosts file
hosts
# Now try the nameserver next.
bind
# If you have YP/NIS configured, uncomment the next line
# nis
/etc/hosts:
# $FreeBSD: src/etc/hosts,v 1.11.2.4 2003/02/06 20:36:58 dbaker Exp $
# $DragonFly: src/etc/hosts,v 1.2 2003/06/17 04:24:45 dillon Exp $
#
# Host Database
#
# This file should contain the addresses and aliases for local hosts that
# share this file. Replace 'my.domain' below with the domainname of your
# machine.
#
# In the presence of the domain name service or NIS, this file may
# not be consulted at all; see /etc/host.conf for the resolution order.
#
#
::1 localhost localhost.my.domain
127.0.0.1 localhost localhost.my.domain
#
# Imaginary network.
#10.0.0.2 myname.my.domain myname
#10.0.0.3 myfriend.my.domain myfriend
#
# According to RFC 1918, you can use the following IP networks for
# private nets which will never be connected to the Internet:
#
# 10.0.0.0 - 10.255.255.255
# 172.16.0.0 - 172.31.255.255
# 192.168.0.0 - 192.168.255.255
#
# In case you want to be able to connect to the Internet, you need
# real official assigned numbers. Do not try to invent your own network
# numbers but instead get one from your network provider (if any) or
# from your regional registry (ARIN, APNIC, LACNIC, RIPE NCC, or AfriNIC.)
#
etc/hosts.allow:
[...]
# Start by allowing everything (this prevents the rest of the file
# from working, so remove it when you need protection).
# The rules here work on a "First match wins" basis.
ALL : ALL : allow
# Wrapping sshd(8) is not normally a good idea, but if you
# need to do it, here's how
#sshd : .evil.cracker.example.com : deny
# Protect against simple DNS spoofing attacks by checking that the
# forward and reverse records for the remote host match. If a mismatch
# occurs, access is denied, and any positive ident response within
# 20 seconds is logged. No protection is afforded against DNS poisoning,
# IP spoofing or more complicated attacks. Hosts with no reverse DNS
# pass this rule.
ALL : PARANOID : RFC931 20 : deny
# Allow anything from localhost. Note that an IP address (not a host
# name) *MUST* be specified for portmap(8).
ALL : localhost 127.0.0.1 : allow
ALL : my.machine.example.com 192.0.2.35 : allow
# To use IPv6 addresses you must enclose them in []'s
ALL : [fe80::%fxp0]/10 : allow
ALL : [fe80::]/10 : deny
ALL : [3ffe:fffe:2:1:2:3:4:3fe1] : deny
ALL : [3ffe:fffe:2:1::]/64 : allow
# Sendmail can help protect you against spammers and relay-rapers
sendmail : localhost : allow
sendmail : .nice.guy.example.com : allow
sendmail : .evil.cracker.example.com : deny
sendmail : ALL : allow
# Exim is an alternative to sendmail, available in the pkgsrc tree
exim : localhost : allow
exim : .nice.guy.example.com : allow
exim : .evil.cracker.example.com : deny
exim : ALL : allow
# Portmapper is used for all RPC services; protect your NFS!
# (IP addresses rather than hostnames *MUST* be used here)
portmap : 192.0.2.32/255.255.255.224 : allow
portmap : 192.0.2.96/255.255.255.224 : allow
portmap : ALL : deny
# Provide a small amount of protection for ftpd
ftpd : localhost : allow
ftpd : .nice.guy.example.com : allow
ftpd : .evil.cracker.example.com : deny
ftpd : ALL : allow
# You need to be clever with finger; do _not_ backfinger!! You can easily
# start a "finger war".
fingerd : ALL \
: spawn (echo Finger. | \
/usr/bin/mail -s "tcpd\: %u@%h[%a] fingered me!" root) & \
: deny
# The rest of the daemons are protected.
ALL : ALL \
: severity auth.info \
: twist /bin/echo "You are not welcome to use %d from %h."
/etc/networks:
# $FreeBSD: src/etc/networks,v 1.3 1999/08/27 23:23:42 peter Exp $
# $DragonFly: src/etc/networks,v 1.2 2003/06/17 04:24:45 dillon Exp $
# @(#)networks 5.1 (Berkeley) 6/30/90
#
# Your Local Networks Database
#
your-net 127 # your comment
your-netmask 255.255.255 # subnet mask for your-net
#
# Your subnets
#
subnet1 127.0.1 alias1 # comment 1
subnet2 127.0.2 alias2 # comment 2
#
# Internet networks (from nic.ddn.mil)
#
--- Ende ---