diff --git a/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml b/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml index 75090f17c1..9a4a344494 100644 --- a/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml +++ b/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml @@ -1104,7 +1104,7 @@ pass inet proto icmp from any to $ext_if keep state By default, Unix traceroute uses UDP connections according to a set formula based on destination. The rule below works with - traceroute on all unixes I've had + traceroute on all Unixes I have had access to, including GNU/Linux: # allow out the default range for traceroute(8): @@ -1125,7 +1125,7 @@ pass out on $ext_if inet proto udp from any to any port 33433 >< 33626 kee details. Under any circumstances, this solution was lifted - from an openbsd-misc post. I've found that list, and + from an openbsd-misc post. I have found that list, and the searchable list archives (accessible among other places from http://marc.theaimsgroup.com/), to be a very valuable resource whenever you need OpenBSD @@ -1290,7 +1290,7 @@ Sep 26 03:12:44 skapet sshd[24703]: Failed password for invalid user admin from solution. Pass rules can be written so they maintain certain limits on what connecting hosts can do. For good measure, violators can be banished to a table of addresses - which are denied some or all access. If desired, it's even + which are denied some or all access. If desired, it is even possible to drop all existing connections from machines which overreach the limits. Here is how it is done: