aboutsummaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorNils Gillmann <ng0@n0.is>2018-11-04 15:40:04 +0000
committerNils Gillmann <ng0@n0.is>2018-11-04 15:40:04 +0000
commit7999737bb83705d0f93d4407566e5479f13861b6 (patch)
tree121928c4ea76bad63ea1d24d4f0a815e12bad659 /doc
parentdb50aad23257b84713ca4e56c201f805c669cf57 (diff)
downloadgnunet-7999737bb83705d0f93d4407566e5479f13861b6.tar.gz
gnunet-7999737bb83705d0f93d4407566e5479f13861b6.zip
doc: in installation.texi convert an unused table to itemize.
Signed-off-by: Nils Gillmann <ng0@n0.is>
Diffstat (limited to 'doc')
-rw-r--r--doc/handbook/chapters/installation.texi44
1 files changed, 23 insertions, 21 deletions
diff --git a/doc/handbook/chapters/installation.texi b/doc/handbook/chapters/installation.texi
index 6b68ac498..c05f776f2 100644
--- a/doc/handbook/chapters/installation.texi
+++ b/doc/handbook/chapters/installation.texi
@@ -1464,29 +1464,31 @@ configuring the use of GNS with your operating system.
1464 1464
1465At this point in time you have different options depending on your OS: 1465At this point in time you have different options depending on your OS:
1466 1466
1467@table @asis 1467@itemize @bullet
1468 1468@item Use the gnunet-gns-proxy@*
1469@item Use the gnunet-gns-proxy This approach works for all operating 1469This approach works for all operating systems and is likely the
1470systems and is likely the easiest. However, it enables GNS only for 1470easiest. However, it enables GNS only for browsers, not for other
1471browsers, not for other applications that might be using DNS, such as SSH. 1471applications that might be using DNS, such as SSH. Still, using the
1472Still, using the proxy is required for using HTTP with GNS and is thus 1472proxy is required for using HTTP with GNS and is thus recommended for
1473recommended for all users. To do this, you simply have to run the 1473all users. To do this, you simply have to run the
1474@code{gnunet-gns-proxy-setup-ca} script as the user who will run the 1474@code{gnunet-gns-proxy-setup-ca} script as the user who will run the
1475browser (this will create a GNS certificate authority (CA) on your system 1475browser (this will create a GNS certificate authority (CA) on your
1476and import its key into your browser), then start @code{gnunet-gns-proxy} 1476system and import its key into your browser), then start
1477and inform your browser to use the Socks5 proxy which 1477@code{gnunet-gns-proxy} and inform your browser to use the Socks5
1478@code{gnunet-gns-proxy} makes available by default on port 7777. 1478proxy which @code{gnunet-gns-proxy} makes available by default on port
1479@item Use a nsswitch plugin (recommended on GNU systems) 14797777.
1480This approach has the advantage of offering fully personalized resolution 1480@item Use a nsswitch plugin (recommended on GNU systems)@*
1481even on multi-user systems. A potential disadvantage is that some 1481This approach has the advantage of offering fully personalized
1482applications might be able to bypass GNS. 1482resolution even on multi-user systems. A potential disadvantage is
1483@item Use a W32 resolver plugin (recommended on W32) 1483that some applications might be able to bypass GNS.
1484@item Use a W32 resolver plugin (recommended on W32)@*
1484This is currently the only option on W32 systems. 1485This is currently the only option on W32 systems.
1485@item Use system-wide DNS packet interception 1486@item Use system-wide DNS packet interception@*
1486This approach is recommended for the GNUnet VPN. It can be used to handle 1487This approach is recommended for the GNUnet VPN. It can be used to
1487GNS at the same time; however, if you only use this method, you will only 1488handle GNS at the same time; however, if you only use this method, you
1488get one root zone per machine (not so great for multi-user systems). 1489will only get one root zone per machine (not so great for multi-user
1489@end table 1490systems).
1491@end itemize
1490 1492
1491You can combine system-wide DNS packet interception with the nsswitch 1493You can combine system-wide DNS packet interception with the nsswitch
1492plugin. 1494plugin.