Correct a typo.
PR: 28722 Submitted by: Joseph Mallett <jmallett@xMach.org>
This commit is contained in:
parent
2fd15d706a
commit
6ef8ab4907
Notes:
svn2git
2020-12-08 03:00:23 +00:00
svn path=/head/; revision=9800
2 changed files with 4 additions and 4 deletions
|
@ -1,7 +1,7 @@
|
||||||
<!--
|
<!--
|
||||||
The FreeBSD Documentation Project
|
The FreeBSD Documentation Project
|
||||||
|
|
||||||
$FreeBSD: doc/en_US.ISO8859-1/books/handbook/contrib/chapter.sgml,v 1.442 2001/07/03 01:19:19 dd Exp $
|
$FreeBSD: doc/en_US.ISO8859-1/books/handbook/contrib/chapter.sgml,v 1.443 2001/07/03 03:20:44 dd Exp $
|
||||||
-->
|
-->
|
||||||
|
|
||||||
<chapter id="contrib">
|
<chapter id="contrib">
|
||||||
|
@ -157,7 +157,7 @@
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Make it possible to upload a list of <quote>allowed
|
<para>Make it possible to upload a list of <quote>allowed
|
||||||
program</quote> to BPF, and then block BPF from accepting other
|
programs</quote> to BPF, and then block BPF from accepting other
|
||||||
programs. This would allow BPF to be used e.g. for DHCP,
|
programs. This would allow BPF to be used e.g. for DHCP,
|
||||||
without allowing an attacker to start snooping the local
|
without allowing an attacker to start snooping the local
|
||||||
network.</para>
|
network.</para>
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
<!--
|
<!--
|
||||||
The FreeBSD Documentation Project
|
The FreeBSD Documentation Project
|
||||||
|
|
||||||
$FreeBSD: doc/en_US.ISO8859-1/books/handbook/contrib/chapter.sgml,v 1.442 2001/07/03 01:19:19 dd Exp $
|
$FreeBSD: doc/en_US.ISO8859-1/books/handbook/contrib/chapter.sgml,v 1.443 2001/07/03 03:20:44 dd Exp $
|
||||||
-->
|
-->
|
||||||
|
|
||||||
<chapter id="contrib">
|
<chapter id="contrib">
|
||||||
|
@ -157,7 +157,7 @@
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Make it possible to upload a list of <quote>allowed
|
<para>Make it possible to upload a list of <quote>allowed
|
||||||
program</quote> to BPF, and then block BPF from accepting other
|
programs</quote> to BPF, and then block BPF from accepting other
|
||||||
programs. This would allow BPF to be used e.g. for DHCP,
|
programs. This would allow BPF to be used e.g. for DHCP,
|
||||||
without allowing an attacker to start snooping the local
|
without allowing an attacker to start snooping the local
|
||||||
network.</para>
|
network.</para>
|
||||||
|
|
Loading…
Reference in a new issue