This file is indexed.

/usr/share/doc/secvpn/tcp-over-tcp/index.html is in secvpn 2.23.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
<!doctype html public "-//w3c//dtd html 4.0 transitional//en">
<html>
<head>
   <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
   <meta name="GENERATOR" content="Mozilla/4.73 [en] (X11; I; Linux 2.2.14 i586) [Netscape]">
</head>
<body>

<div STYLE="margin-bottom: 0in">
<h1>
Debian Package secvpn</h1>
</div>

<div STYLE="margin-bottom: 0in">As i first wrote a mail with the subject
"intent to package secvpn" to the <a href="mailto:debian-devel@lists.debian.org">debian
developer list</a> I got a lot of replies. Most replies asked me to upload
the package.&nbsp; But one reply told me, that it is not a good idea to
build vpns using tcp over tcp and a <a href="http://sites.inka.de/sites/bigred/devel/tcp-tcp.html">webpage</a>
was mentioned, where possible problems are discussed.</div>

<div STYLE="margin-bottom: 0in">&nbsp;
<br>This was the reason to test if we could reproduce any problems. But
this was not the case. Here are our testresults: <a href="TCP-over-TCP-Test.pdf">TCP-over-TCP-Test.pdf</a>.
<br>&nbsp;
<h2>
More infos to run the test</h2>
We used this <a href="checkTCP">script</a> and <a href="patches">kernel-patch</a>
for the test. The patche has only be used for kernel 2.2.17. If the patch
is applied you can use proc/sys/net/ipv4/ip_drop_rate to change the drop-rate
of the forwarded ip-packets. The loss-rate is per mille this means a setting
of 1000 will drop all packets. The rate is direction independent. This
means a setting of 500 (50% dropping rate) will give a pingrate of appoximately
0.5 * 0.5 = 0.25.</div>

</body>
</html>