From 215429e0112872d2510fd0ee06c56069fa97706b Mon Sep 17 00:00:00 2001 From: Warren Block Date: Mon, 27 Jan 2014 12:38:53 +0000 Subject: [PATCH] Expand a few contractions. --- en_US.ISO8859-1/books/handbook/firewalls/chapter.xml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml b/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml index 75090f17c1..9a4a344494 100644 --- a/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml +++ b/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml @@ -1104,7 +1104,7 @@ pass inet proto icmp from any to $ext_if keep state By default, Unix traceroute uses UDP connections according to a set formula based on destination. The rule below works with - traceroute on all unixes I've had + traceroute on all Unixes I have had access to, including GNU/Linux: # allow out the default range for traceroute(8): @@ -1125,7 +1125,7 @@ pass out on $ext_if inet proto udp from any to any port 33433 >< 33626 kee details. Under any circumstances, this solution was lifted - from an openbsd-misc post. I've found that list, and + from an openbsd-misc post. I have found that list, and the searchable list archives (accessible among other places from http://marc.theaimsgroup.com/), to be a very valuable resource whenever you need OpenBSD @@ -1290,7 +1290,7 @@ Sep 26 03:12:44 skapet sshd[24703]: Failed password for invalid user admin from solution. Pass rules can be written so they maintain certain limits on what connecting hosts can do. For good measure, violators can be banished to a table of addresses - which are denied some or all access. If desired, it's even + which are denied some or all access. If desired, it is even possible to drop all existing connections from machines which overreach the limits. Here is how it is done: