From owner-doc-jp-work@jp.FreeBSD.org Sun Nov 17 13:43:44 2002
Received: (from daemon@localhost)
	by castle.jp.FreeBSD.org (8.11.6+3.4W/8.11.3) id gAH4hiH48964;
	Sun, 17 Nov 2002 13:43:44 +0900 (JST)
	(envelope-from owner-doc-jp-work@jp.FreeBSD.org)
Received: from smtp.eos.ocn.ne.jp (eos.ocn.ne.jp [211.6.83.117])
	by castle.jp.FreeBSD.org (8.11.6+3.4W/8.11.3) with ESMTP/inet id gAH4hi248959
	for <doc-jp-work@jp.FreeBSD.org>; Sun, 17 Nov 2002 13:43:44 +0900 (JST)
	(envelope-from hrs@eos.ocn.ne.jp)
Received: from mail.allbsd.org (p33186-adsao12honb4-acca.tokyo.ocn.ne.jp [219.161.176.186])
	by smtp.eos.ocn.ne.jp (Postfix) with ESMTP id 793B42C1C
	for <doc-jp-work@jp.FreeBSD.org>; Sun, 17 Nov 2002 13:43:43 +0900 (JST)
Received: from localhost (alph.allbsd.org [192.168.0.10])
	by mail.allbsd.org (8.12.3/3.7W/DomainMaster) with ESMTP id gAH4g4B4008302
	for <doc-jp-work@jp.FreeBSD.org>; Sun, 17 Nov 2002 13:42:06 +0900 (JST)
	(envelope-from hrs@eos.ocn.ne.jp)
Message-Id: <20021117.134111.69463944.hrs@eos.ocn.ne.jp>
To: doc-jp-work@jp.FreeBSD.org
From: Hiroki Sato <hrs@eos.ocn.ne.jp>
In-Reply-To: <200211151351.gAFDptcf008675@freefall.freebsd.org>
References: <200211151351.gAFDptcf008675@freefall.freebsd.org>
X-Mailer: Mew version 2.2 on Emacs 20.7 / Mule 4.0 (HANANOEN)
Mime-Version: 1.0
Content-Type: Multipart/Mixed;
 boundary="--Next_Part(Sun_Nov_17_13:41:11_2002_678)--"
Content-Transfer-Encoding: 7bit
Reply-To: doc-jp-work@jp.FreeBSD.org
Precedence: list
Date: Sun, 17 Nov 2002 13:41:11 +0900
X-Sequence: doc-jp-work 514
Subject: [doc-jp-work 514] Re: ANNOUNCE: FreeBSD Security Advisory FreeBSD-SA-02:43.bind
 [REVISED]
Errors-To: owner-doc-jp-work@jp.FreeBSD.org
Sender: owner-doc-jp-work@jp.FreeBSD.org
X-Originator: hrs@eos.ocn.ne.jp
X-Distribute: distribute version 2.1 (Alpha) patchlevel 24e+021111

----Next_Part(Sun_Nov_17_13:41:11_2002_678)--
Content-Type: Text/Plain; charset=iso-2022-jp
Content-Transfer-Encoding: 7bit

$B:4F#!wEl5~M}2JBg3X$G$9!#(B

 02:43 revised $B$G$9!#(B

--
| $B:4F#(B $B9-@8!wEl5~M}2JBg3X(B <hrs@eos.ocn.ne.jp>
|                         <hrs@FreeBSD.org> (FreeBSD Project)

----Next_Part(Sun_Nov_17_13:41:11_2002_678)--
Content-Type: Text/Plain; charset=iso-2022-jp
Content-Transfer-Encoding: 7bit
Content-Disposition: inline; filename="02:43"


FreeBSD $B%;%-%e%j%F%#4+9p(B $BF|K\8lHG(B
=============================================================================
FreeBSD-SA-02:43.bind (2002-11-15)
 * multiple vulnerabilities in BIND [REVISED]
=============================================================================

 $B$3$N%a!<%k$O(B, announce-jp $B$KN.$l$?(B

  Subject: ANNOUNCE: FreeBSD Security Advisory FreeBSD-SA-02:43.bind [REVISED]
  From: FreeBSD Security Advisories <security-advisories@FreeBSD.org>
  Date: Fri, 15 Nov 2002 05:51:55 -0800
  Message-Id: <200211151351.gAFDptcf008675@freefall.freebsd.org>
  X-Sequence: announce-jp 1072

 $B$rF|K\8lLu$7$?$b$N$G$9!#(B

 $B86J8$O(B PGP $B=pL>$5$l$F$$$^$9$,!"$3$NF|K\8lLu$O(B PGP $B=pL>$5$l$F$$$^$;$s!#(B
 $B=$@5%Q%C%AEy$NFbMF$,2~$6$s$5$l$F$$$J$$$3$H$r3NG'$9$k$?$a$K(B PGP $B=pL>$N(B
 $B%A%'%C%/$r9T$J$&$K$O!"86J8$r;2>H$7$F$/$@$5$$!#(B

 $BF|K\8lLu$*$h$S%_%i!<%5%$%HMxMQ$N>\:Y$K$D$$$F$O!"J8Kv$N!V(BA. FreeBSD
 $B%;%-%e%j%F%#4+9p(B $BF|K\8lHG$K$D$$$F!W$r$4Mw$/$@$5$$!#(B


                                     [$BK]Lu<T(B: $B:4F#(B $B9-@8(B <hrs@jp.FreeBSD.org>]
--($B$3$3$+$i(B)

=============================================================================
FreeBSD-SA-02:43.bind                                       Security Advisory
                                                          The FreeBSD Project

$B%H%T%C%/(B:	BIND $B$K$*$1$k%;%-%e%j%F%#>e$N<eE@(B
                (multiple vulnerabilities in BIND [REVISED])

$BJ,N`(B:		core
$B%b%8%e!<%k(B:	bind
$B9pCNF|(B:		2002-11-15
$B%/%l%8%C%H(B:	ISS X-Force <xforce@iss.net>
$B1F6AHO0O(B:	$B$9$Y$F$N(B FreeBSD $B%j%j!<%9(B
$B=$@5F|(B:		2002-11-14 05:15:15 UTC (RELENG_4)
                2002-11-14 02:05:57 UTC (RELENG_4_7)
                2002-11-14 03:18:41 UTC (RELENG_4_6)
                2002-11-14 04:05:12 UTC (RELENG_4_5)
                2002-11-14 05:11:57 UTC (RELENG_4_4)
FreeBSD $B$K8GM-$+(B:	NO


0.   $B2~D{MzNr(B - Revision History

v1.0  2002-11-14  $B=iHG8x3+(B
v1.1  2002-11-15  $B=$@5%Q%C%AE,MQ<j=g$N2~D{!#2sHrJ}K!$KCm5-$rDI2C!#(B
                  CVE $B;29M;qNA$NDI2C!#(B


I.   $BGX7J(B - Background

BIND 8 is an implementation of the Domain Name System (DNS) protocols.

BIND8 $B$O%I%a%$%s%M!<%`%7%9%F%`(B (DNS) $B%W%m%H%3%k<BAu$N(B 1 $B$D$G$9!#(B


II.  $BLdBj$N>\:Y(B - Problem Description

ISS X-Force has disclosed several vulnerabilities affecting BIND 8.
The names which ISS has given each vulnerability are used in this
advisory.  The first is a buffer overflow in the BIND 8 code
responsible for creating DNS responses which include SIG resource
records (RRs) from its internal cache (`BIND SIG Cached RR Overflow
Vulnerability').  The second is an error in the BIND 8 code which
constructs a response to an EDNS query (i.e. a query containing OPT
RRs) with a large packet size.  A miscalculation triggers an assertion
failure (`BIND OPT DoS').  The third is a problem in the verification
of SIG RR expiry times, which can result in a null pointer dereference
(`BIND SIG Expiry Time DoS').

ISS X-Force $B$K$h$j!"(BBIND 8 $B$KB8:_$9$k$$$/$D$+$N<eE@$,8x3+$5$l$^$7$?!#(B
$B$3$N4+9p$G$O!"(BISS $B$,$=$l$>$l$N<eE@$KL?L>$7$?L>A0$r;H$$$^$9!#(B
1 $B$DL\$O!"FbIt%-%c%C%7%e$+$i(B SIG $B;q8;%l%3!<%I(B (SIG RR) $B$r4^$s$@(B
DNS $B1~Ez$r@8@.$9$k%3!<%I$K$*$1$k%P%C%U%!%*!<%P%U%m!<LdBj(B($B!V(BBIND
SIG Cached RR Overflow Vulnerability$B!W(B) $B$G$"$j!"(B2 $B$DL\$O!"(B
$B%Q%1%C%HD9$NBg$-$$(B EDNS $BLd$$9g$o$;(B (OPT RR $B$r4^$`$b$N(B) $B$KBP$9$k(B
$B1~Ez$r9=C[$9$k%3!<%I$K$*$1$k%P%0$G$9!#$3$N%P%0$O7W;;CM$K8m$j$r(B
$B@8$8$5$;!"%3!<%ICf$N(B assert $B%A%'%C%/$r<:GT$5$;$^$9(B ($B!V(BBIND OPT DoS$B!W(B)$B!#(B
3 $B$DL\$N<eE@$O(B SIG RR $B$NM-8z4|8B%A%'%C%/$K$*$$$F!"%L%k%]%$%s%?;2>H$,(B
$BH/@8$9$k2DG=@-$,$"$k$H$$$&LdBj$G$9(B($B!V(BBIND SIG Expiry Time DoS$B!W(B)$B!#(B


III. $B1F6AHO0O(B - Impact

BIND SIG Cached RR Overflow Vulnerability:  A remote attacker may be
able to cause a name server with recursion enabled to execute
arbitrary code with the privileges of the name server process.

BIND SIG Cached RR Overflow Vulnerability:
  $B%j%b!<%H$N967b<T$O!":F5"E*Ld$$9g$o$;$,M-8z$K$J$C$F$$$k%M!<%`%5!<%P$r(B
  $B0-MQ$7!"%M!<%`%5!<%P$N%W%m%;%9$N8"8B$GG$0U$N%3!<%I$r<B9T$G$-$k(B
  $B2DG=@-$,$"$j$^$9!#(B

BIND OPT DoS and BIND SIG Expiry Time DoS: A remote attacker may be
able to cause the name server process to crash.

BIND OPT DoS and BIND SIG Expiry Time DoS:
  $B%j%b!<%H$N967b<T$O!"%M!<%`%5!<%P$N%W%m%;%9$r%/%i%C%7%e$5$;$k(B
  $B$3$H$,$G$-$k2DG=@-$,$"$j$^$9!#(B


IV.  $B2sHrJ}K!(B - Workaround

BIND 9 is not affected by these vulnerabilities.  For those who have
the option, upgrading to BIND 9 is recommended.  BIND 9 is available
in the FreeBSD Ports Collection (ports/net/bind9).  The bind9 port
includes migration notes in /usr/local/share/doc/bind9/misc/migration.

BIND 9 $B$K$O!"$3$l$i$N<eE@$,B8:_$7$^$;$s!#$b$72DG=$J$i!"(BBIND 9 $B$X$N(B
$B%"%C%W%0%l!<%I$r$*$9$9$a$7$^$9!#(BBIND9 $B$O(B FreeBSD Ports Collection $B$K(B
$B4^$^$l$F$$$^$9(B (ports/net/bind9)$B!#(Bbind9 port $B$K$O!"0\9T$N:]$NCm0UE@$r(B
$B$^$H$a$?J8=q(B /usr/local/share/doc/bind9/misc/migration $B$,E:IU$5$l$F$$$^$9!#(B

Name servers with recursion disabled are not vulnerable to the `BIND
SIG Cached RR Overflow Vulnerability' nor to the `BIND SIG Expiry Time
DoS'.  To disable recursion, edit the BIND 8 configuration file
(default path /etc/namedb/named.conf) to add `recursion no;' and
`fetch-glue no;' to the options statement.  e.g.,

$B:F5"E*Ld$$9g$o$;$rL58z$K$9$l$P!"%M!<%`%5!<%P$O!V(BBIND SIG Cached RR
Overflow Vulnerability$B!W$*$h$S!V(BBIND SIG Expiry Time DoS$B!W$N1F6A$r(B
$B<u$1$J$/$J$j$^$9!#:F5"E*Ld$$9g$o$;$rL58z$K$9$k$K$O!"$?$H$($P(B
$B<!$N$h$&$K$7$F(B BIND 8 $B@_Dj%U%!%$%k(B ($B%G%U%)%k%H$G$O(B /etc/namedb/named.conf) $B$K(B
$B!V(Brecursion no;$B!W!V(Bfetch-glue no;$B!W$H$$$&%*%W%7%g%sJ8$rDI2C$7$^$9!#(B

   options {
       recursion no;
       fetch-glue no;
       /* ... other options ... */
   };

Restart the name server after editing the configuration file.

$B@_Dj%U%!%$%k$rJT=8$7$?$i!"%M!<%`%5!<%P$r:F5/F0$7$F$/$@$5$$!#(B

NOTE: This workaround is only appropriate for name servers
which are authoritative only.  Caching name servers will no longer
function correctly if recursion is disabled.

$BCm0U(B: $B$3$N2sHrJ}K!$O!"%M!<%`%5!<%P$,8"0R$r;}$C$F$$$k>l9g$K$N$_(B
$B8z2L$,$"$j$^$9!#%-%c%C%7%e%M!<%`%5!<%P$N>l9g$K:F5"Ld$$9g$o$;$r(B
$BL58z$K$9$k$H!"@5$7$/F0:n$7$J$/$J$j$^$9!#(B

Restricting recursion to only your own organization's clients (by
means of the `allow-recursion' directive) limits, but does not
eliminate, the impact of these vulnerabilities by making them harder
to exploit.  Restricting recursion in this fashion is generally
recommended.  To restrict recursion, edit the BIND 8 configuration
file to include an `allow-recursion' statement and an address list
appropriate for your organization.  e.g.,

($B!V(Ballow-recursion$B!W;X<(;R$rMQ$$$F(B) $B:F5"E*Ld$$9g$o$;$rAH?%Fb$@$1$K(B
$B@)8B$9$k$H!"<eE@$r<h$j=|$/$3$H$O$G$-$^$;$s$,0-MQ$r:$Fq$K$9$k$3$H$,2DG=$G$9!#(B
$B$3$N$h$&$J:F5"E*Ld$$9g$o$;$N@)8B$9$k$3$H$O!"0lHLE*$K$*$9$9$a$G$9!#(B
$B:F5"E*Ld$$9g$o$;$r@)8B$9$k$K$O!"(BBIND 8 $B@_Dj%U%!%$%k$K!V(Ballow-recursion$B!WJ8$r(B
$BDI2C$7$F!"AH?%$KBP1~$9$k%"%I%l%9%j%9%H$r@_Dj$7$^$9!#(B

    options {
        allow-recursion { 10.0.0.0/8; };
        /* ... other options ... */
    };

Running BIND 8 as a non-privileged user (rather than as the superuser)
may reduce the impact should the name server be compromised via the
`BIND SIG Cached RR Overflow Vulnerability'.  Running as a
non-privileged user is generally recommended.  Likewise, running BIND
8 in a chroot environment may reduce the impact and is generally
recommended.

BIND 8 $B$r(B ($B%9!<%Q%f!<%6$G$O$J$/(B) $B9b$$8"8B$r;}$?$J$$%f!<%6$G<B9T$9$l$P!"(B
$B!V(BBIND SIG Cached RR Overflow Vulnerability$B!W$K$h$C$F%M!<%`%5!<%P$,(B
$B0-MQ$5$l$?>l9g$N1F6A$r7Z8:$9$k$3$H$,$G$-$k$+$bCN$l$^$;$s!#$3$N$h$&$K(B
$B9b$$8"8B$r;}$?$J$$%f!<%6$G<B9T$9$k$3$H$O!"0lHLE*$K$*$9$9$a$G$9!#(B
$B$^$?!"(BBIND 8 $B$r(B chroot $B4D6-$G<B9T$9$k$3$H$b1F6A$r>.$5$/$9$k$N$KM-8z$J(B
$BJ}K!$G$"$j!"$3$A$i$b$*$9$9$a$G$9!#(B


V.  $B2r7h:v(B - Solution

Do one of the following:
$B<!$N$$$:$l$+$K=>$C$F$/$@$5$$!#(B

1) Upgrade your vulnerable system to 4.7-STABLE; or to the RELENG_4_7,
RELENG_4_6, RELENG_4_5, or RELENG_4_4 security branch dated after the
correction date (4.7-RELEASE-p2, 4.6.2-RELEASE-p5, 4.5-RELEASE-p23,
4.4-RELEASE-p30).
1) $B<eE@$r;}$C$?(B FreeBSD $B%7%9%F%`$r:G?7$N(B 4.7-RELEASE$B!"$b$7$/$O(B 4.7-STABLE $B$K(B
   $B%"%C%W%0%l!<%I$9$k!#$"$k$$$O!"=$@5F|0J9_$N(B RELENG_4_7$B!"(BRELENG_4_6$B!"(BRELENG_4_5$B!"(B
   RELENG_4_4 $B%;%-%e%j%F%#%V%i%s%A(B (4.7-RELEASE-p2, 4.6.2-RELEASE-p5,
   4.5-RELEASE-p23, 4.4-RELEASE-p30) $B$N$$$:$l$+$K%"%C%W%0%l!<%I$9$k!#(B

2) To patch your present system:
2) $B8=:_$N%7%9%F%`$K=$@5%Q%C%A$rE,MQ$9$k!#(B

The following patch has been verified to apply to FreeBSD 4.4, 4.5,
4.6, and 4.7 systems.
$B0J2<$N=$@5%Q%C%A$O!"(BFreeBSD 4.4$B!"(BFreeBSD 4.5$B!"(BFreeBSD 4.6$B!"(B
FreeBSD 4.7 $B$N3F%7%9%F%`$KE,MQ2DG=$J$3$H$,3NG'$5$l$F$$$k$b$N$G$9!#(B

a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.
a) $B0J2<$N>l=j$+$i=$@5%Q%C%A$r%@%&%s%m!<%I$7!"(BPGP $B%f!<%F%#%j%F%#$r;H$C$F(B
   PGP $B=pL>$r3NG'$7$^$9!#(B

# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-02:43/bind.patch
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-02:43/bind.patch.asc

b) Execute the following commands as root:
b) root $B8"8B$G<!$N%3%^%s%I$r<B9T$7$^$9!#(B

# cd /usr/src
# patch < /path/to/patch
# cd /usr/src/lib/libbind
# make depend && make
# cd /usr/src/lib/libisc
# make depend && make
# cd /usr/src/usr.sbin/named
# make depend && make && make install
# cd /usr/src/libexec/named-xfer
# make depend && make && make install

 ($BLuCm(B: /path/to/patch $B$NItJ,$O=$@5%Q%C%A$N%Q%9L>$KCV$-49$($F$/$@$5$$(B)

After upgrading or patching your system, you must restart named.
Execute the following command as root:

$B=$@5%Q%C%A$NE,MQ8e$d%7%9%F%`$N%"%C%W%0%l!<%I8e$K$O!"(Bnamed $B$r:F5/F0$9$k(B
$BI,MW$,$"$j$^$9!#$=$l$K$O!"(Broot $B8"8B$G<!$N%3%^%s%I$r<B9T$7$F$/$@$5$$!#(B

# ndc restart


VI.  $B=$@5$N>\:Y(B - Correction details

FreeBSD $B$K$*$$$F:#2s=$@5$5$l$?3F%U%!%$%k$N%j%S%8%g%sHV9f$O!"0J2<$N$H$*$j$G$9!#(B

Path                                                             Revision
  Branch
$B%Q%9L>(B                                                          $B%j%S%8%g%s(B
  $B%V%i%s%A(B
- -------------------------------------------------------------------------
src/contrib/bind/CHANGES
  RELENG_4                                                    1.1.1.7.2.8
  RELENG_4_7                                              1.1.1.7.2.7.2.1
  RELENG_4_6                                              1.1.1.7.2.6.2.2
  RELENG_4_5                                              1.1.1.7.2.4.4.2
  RELENG_4_4                                              1.1.1.7.2.4.2.2
src/contrib/bind/bin/named/db_defs.h
  RELENG_4                                                    1.1.1.2.2.6
  RELENG_4_7                                              1.1.1.2.2.5.2.1
  RELENG_4_6                                              1.1.1.2.2.4.2.2
  RELENG_4_5                                              1.1.1.2.2.3.4.2
  RELENG_4_4                                              1.1.1.2.2.3.2.2
src/contrib/bind/bin/named/db_sec.c
  RELENG_4                                                    1.1.1.1.4.4
  RELENG_4_7                                              1.1.1.1.4.3.4.1
  RELENG_4_6                                              1.1.1.1.4.3.2.1
  RELENG_4_5                                              1.1.1.1.4.2.6.2
  RELENG_4_4                                              1.1.1.1.4.2.4.2
src/contrib/bind/bin/named/ns_defs.h
  RELENG_4                                                    1.1.1.3.2.7
  RELENG_4_7                                              1.1.1.3.2.6.2.1
  RELENG_4_6                                              1.1.1.3.2.5.2.2
  RELENG_4_5                                              1.1.1.3.2.3.4.2
  RELENG_4_4                                              1.1.1.3.2.3.2.2
src/contrib/bind/bin/named/ns_ncache.c
  RELENG_4                                                    1.1.1.2.2.3
  RELENG_4_7                                              1.1.1.2.2.2.4.1
  RELENG_4_6                                              1.1.1.2.2.2.2.1
  RELENG_4_5                                              1.1.1.2.2.1.6.2
  RELENG_4_4                                              1.1.1.2.2.1.4.2
src/contrib/bind/bin/named/ns_req.c
  RELENG_4                                                   1.1.1.2.2.11
  RELENG_4_7                                             1.1.1.2.2.10.2.1
  RELENG_4_6                                              1.1.1.2.2.9.2.2
  RELENG_4_5                                              1.1.1.2.2.7.4.2
  RELENG_4_4                                              1.1.1.2.2.7.2.2
src/contrib/bind/bin/named/ns_resp.c
  RELENG_4                                                    1.1.1.2.2.8
  RELENG_4_7                                              1.1.1.2.2.7.2.1
  RELENG_4_6                                              1.1.1.2.2.6.2.2
  RELENG_4_5                                              1.1.1.2.2.4.4.2
  RELENG_4_4                                              1.1.1.2.2.4.2.2
src/contrib/bind/lib/nameser/ns_name.c
  RELENG_4                                                    1.1.1.2.2.4
  RELENG_4_7                                              1.1.1.2.2.3.2.1
  RELENG_4_6                                              1.1.1.2.2.2.2.2
  RELENG_4_5                                              1.1.1.2.2.1.6.2
  RELENG_4_4                                              1.1.1.2.2.1.4.2
src/contrib/bind/lib/nameser/ns_samedomain.c
  RELENG_4                                                    1.1.1.1.4.1
  RELENG_4_7                                                 1.1.1.1.14.1
  RELENG_4_6                                                 1.1.1.1.12.1
  RELENG_4_5                                                 1.1.1.1.10.1
  RELENG_4_4                                                  1.1.1.1.8.1
src/sys/conf/newvers.sh
  RELENG_4_7                                                1.44.2.26.2.4
  RELENG_4_6                                               1.44.2.23.2.22
  RELENG_4_5                                               1.44.2.20.2.24
  RELENG_4_4                                               1.44.2.17.2.29
- -------------------------------------------------------------------------


VII. $B;29M;qNA(B - References

<URL:http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21469>
<URL:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1219>
<URL:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1220>
<URL:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1221>
<URL:http://www.isc.org/products/BIND/bind-security.html>
<URL:http://www.isc.org/products/BIND/patches/>


A.   FreeBSD $B%;%-%e%j%F%#4+9p(B $BF|K\8lHG$K$D$$$F(B

$BF|K\8lLu$O(B FreeBSD $BF|K\8l%I%-%e%a%s%F!<%7%g%s%W%m%8%'%/%H(B (doc-jp) $B$,(B
$B;29M$N$?$a$KDs6!$9$k$b$N$G$9!#2a5n$NF|K\8lHG%;%-%e%j%F%#4+9p$O(B

 http://www.FreeBSD.org/ja/security/

$B$K$^$H$a$i$l$F$$$^$9!#(B

$B$?$@$7K]Lu<T$*$h$S(B doc-jp $B$O!"$=$NFbMF$K$D$$$F$$$+$J$kJ]>Z$b(B
$B$$$?$7$^$;$s$N$G$4Cm0U$/$@$5$$!#F|K\8lLu$K$D$$$F$N$40U8+!"$4MWK>!"(B
$B$*Ld$$9g$o$;Ey$O(B doc-jp@jp.FreeBSD.org $B$^$G$*4j$$$7$^$9!#(B

$B$3$N4+9p$NCf$G>R2p$5$l$F$$$k(B WWW $B%5%$%H(B http://www.FreeBSD.org/ $B$*$h$S(B
FTP $B%5%$%H(B ftp://ftp.FreeBSD.org/ $B$K$O(B, $BF|K\$N%_%i!<%5%$%H$,B8:_$7$^$9!#(B
$B%M%C%H%o!<%/$N:.;($r4KOB$9$k$?$a!"$^$:$O%_%i!<%5%$%H$NMxMQ$r(B
$B9MN8$9$k$h$&$*4j$$$7$^$9!#(B

$BF|K\$N%_%i!<%5%$%H$rMxMQ$9$k$K$O!"(B
http://www.FreeBSD.org/ $B$r(B http://www.jp.FreeBSD.org/www.freebsd.org/ $B$K!"(B
ftp://ftp.FreeBSD.org/ $B$r(B ftp://ftp.jp.FreeBSD.org/ $B$K!"(B
$B$=$l$>$lCV$-49$($F$/$@$5$$!#(B

$BB>$NCO0h$r4^$`%_%i!<%5%$%H$K4X$9$k>\:Y$O(B

 http://www.FreeBSD.org/handbook/mirror.html ($B1QJ8(B)
 http://www.FreeBSD.org/ja/handbook/mirror.html ($BF|K\8lLu(B)

$B$K$^$H$a$i$l$F$$$^$9!#(B

$hrs: announce-jp/FreeBSD-SA/02:43,v 1.5 2002/11/17 04:36:16 hrs Exp $

----Next_Part(Sun_Nov_17_13:41:11_2002_678)----
