[問題] Apache2在開機過程中啟動不了??

看板FreeBSD作者 (Clemond)時間20年前 (2004/04/18 17:05), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/2 (看更多)
小弟在家是利用Hinet ADSL 2M/128Kbit撥接上網,向Hinet申請了一個固定IP(最近 開放的免費服務),並去www.adsldns.org由請了一個免費的DNS服務,來學習 用FreeBSD架站。 現正在學習ipfilter及ipnat的功能,參考了網路上眾多的相關文件,已成功地 讓區網內的WinXP透過FreeBSD上網(NAT),並在ipf.rules設定一些rules來做封包過濾。 但我發現下次開機後,Apache2就不能啟動了,apache2在開機過程中出現了如下的訊息: Local package initialization: httpd: Could not determine the server's fully qualified domain name, using 127.0.0.1 for ServerName 我去找httpd-error.log,發現了底下的錯誤訊息: No address associated with hostname: mod_unique_id: unable to find IPv4 address of "test.adsldns.org" Configuration Failed 錯誤訊息說的很清楚,就是無法辦別test.adsldns.org的IP位置(那個test是舉例用的), 可是奇怪的是我確定我的FQDN是可用的,因為開機完後ping的到,而且手動輸入 apachectl start可啟動,但就是在開機過程中啟動不了。不知原因為何? 還請各位 先進指點一二,謝謝! 我附上ppp.conf,rc.conf,ipf.rules,ipnat.rules。 ---ppp.conf--- default: set log Phase Chat LCP IPCP CCP tun command set ifaddr 10.0.0.1/0 10.0.0.2/0 hinet: set device PPPoE:rl0 set mru 1492 set mtu 1492 set speed sync enable lqr set lqrperiod 5 set authname XXXXXXXX@ip.hinet.net set authkey YYYYYYYY set dial set login add default HISADDR enable dns ---rc.conf----- kern_securelevel_enable="YES" kern_securelevel="2" nfs_reserved_port_only="NONE" sshd_enable="YES" usbd_enable="YES" # Network Setup network_interfaces="auto" defaultrouter="10.0.0.1" hostname="test.adsldns.org" ifconfig_rl0="inet 10.0.0.1 netmask 255.255.255.0 -arp" ifconfig_rl1="inet 192.168.0.254 netmask 255.255.255.0" # Enable PPP ppp_enable="YES" ppp_mode="ddial" ppp_profile="hinet" # Enable ipfilter&ipnat&ipmon ipfilter_enable="YES" ipnat_enable="YES" ipmon_enable="YES" ipmon_flags="-Ds" syslogd_flags="-ss" ----ipf.rules--- pass in quick on lo0 all pass out quick on lo0 all pass in quick on rl1 all pass out quick on rl1 all # Outside interface pass out quick on tun0 from any to any keep state # Allow some services here pass in quick on tun0 proto tcp from any to any port = 21 keep state pass in quick on tun0 proto udp from any to any port = 21 keep state pass in quick on tun0 proto tcp from any to any port = 22 keep state pass in quick on tun0 proto udp from any to any port = 22 keep state pass in quick on tun0 proto tcp from any to any port = 25 keep state pass in quick on tun0 proto udp from any to any port = 25 keep state pass in quick on tun0 proto tcp from any to any port = 80 keep state pass in quick on tun0 proto udp from any to any port = 80 keep state pass in quick on tun0 proto tcp from any to any port = 110 keep state pass in quick on tun0 proto udp from any to any port = 110 keep state pass in quick on tun0 proto tcp from any to any port = 443 keep state pass in quick on tun0 proto udp from any to any port = 443 keep state pass in quick on tun0 proto tcp from any to any port = 4662 keep state pass in quick on tun0 proto udp from any to any port = 3312 keep state # allow ping, traceroute pass in quick on tun0 proto icmp from any to any icmp-type 0 pass in quick on tun0 proto icmp from any to any icmp-type 11 # block all remaining traffic in the good old fashioned way block return-rst in log quick on tun0 proto tcp from any to any block return-icmp-as-dest(port-unr) in log quick on tun0 proto udp from any to any block in log quick on tun0 all -----ipnat.rules------ map tun0 192.168.0.0/24 -> 220.135.214.101/32 rdr tun0 220.135.214.101/32 port 4662 -> 192.168.0.1 port 4662 rdr tun0 220.135.214.101/32 port 3312 -> 192.168.0.1 port 3312 udp -- ※ 發信站: 批踢踢實業坊(ptt.cc) ◆ From: 61.231.68.187
文章代碼(AID): #10WaJp0V (FreeBSD)
文章代碼(AID): #10WaJp0V (FreeBSD)