Expand a few contractions.

This commit is contained in:
Warren Block 2014-01-27 12:38:53 +00:00
parent 9a004e376b
commit 215429e011
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/head/; revision=43661

View file

@ -1104,7 +1104,7 @@ pass inet proto icmp from any to $ext_if keep state</programlisting>
By default, Unix <command>traceroute</command> uses UDP
connections according to a set formula based on
destination. The rule below works with
<command>traceroute</command> on all unixes I've had
<command>traceroute</command> on all Unixes I have had
access to, including GNU/Linux:</para>
<programlisting># allow out the default range for traceroute(8):
@ -1125,7 +1125,7 @@ pass out on $ext_if inet proto udp from any to any port 33433 &gt;&lt; 33626 kee
details.</para>
<para>Under any circumstances, this solution was lifted
from an openbsd-misc post. I've found that list, and
from an openbsd-misc post. I have found that list, and
the searchable list archives (accessible among other
places from <link xlink:href="http://marc.theaimsgroup.com/">http://marc.theaimsgroup.com/</link>),
to be a very valuable resource whenever you need OpenBSD
@ -1290,7 +1290,7 @@ Sep 26 03:12:44 skapet sshd[24703]: Failed password for invalid user admin from
solution. Pass rules can be written so they maintain
certain limits on what connecting hosts can do. For good
measure, violators can be banished to a table of addresses
which are denied some or all access. If desired, it's even
which are denied some or all access. If desired, it is even
possible to drop all existing connections from machines
which overreach the limits. Here is how it is done:</para>