Correct the contents of <programlisting> elements. Translators please

note: some of the changes here are whitespace, but it's significant
whitespace that is visible in the rendered output.

Approved by:	gjb (mentor)
This commit is contained in:
Warren Block 2012-01-22 06:13:55 +00:00
parent cd3cb3fa81
commit 7d4755623a
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/head/; revision=38281

View file

@ -382,7 +382,7 @@
<para>To lock an account completely, the &man.pw.8; command
should be used:</para>
<screen>&prompt.root;<userinput>pw lock <replaceable>staff</replaceable></userinput></screen>
<screen>&prompt.root; <userinput>pw lock <replaceable>staff</replaceable></userinput></screen>
<para>This will prevent the user from logging in using any
mechanism, including &man.ssh.1;.</para>
@ -1204,6 +1204,7 @@ Then run opiepasswd without the -c parameter.
Using MD5 to compute responses.
Enter new secret pass phrase:
Again new secret pass phrase:
ID unfurl OTP key is 499 to4268
MOS MALL GOAT ARM AVID COED</screen>
@ -1240,15 +1241,14 @@ MOS MALL GOAT ARM AVID COED</screen>
Updating unfurl:
You need the response from an OTP generator.
Old secret pass phrase:
otp-md5 498 to4268 ext
Response: GAME GAG WELT OUT DOWN CHAT
otp-md5 498 to4268 ext
Response: GAME GAG WELT OUT DOWN CHAT
New secret pass phrase:
otp-md5 499 to4269
Response: LINE PAP MILK NELL BUOY TROY
otp-md5 499 to4269
Response: LINE PAP MILK NELL BUOY TROY
ID mark OTP key is 499 gr4269
LINE PAP MILK NELL BUOY TROY
</screen>
LINE PAP MILK NELL BUOY TROY</screen>
<para>To accept the default seed press <keycap>Return</keycap>.
Then before entering an access password, move over to your
@ -1258,8 +1258,7 @@ LINE PAP MILK NELL BUOY TROY
Using the MD5 algorithm to compute response.
Reminder: Don't use opiekey from telnet or dial-in sessions.
Enter secret pass phrase:
GAME GAG WELT OUT DOWN CHAT
</screen>
GAME GAG WELT OUT DOWN CHAT</screen>
<para>Now switch back over to the insecure connection, and copy
the one-time password generated over to the relevant
@ -1513,8 +1512,8 @@ qpopper : ALL : allow</programlisting>
<programlisting># The rest of the daemons are protected.
ALL : ALL \
: severity auth.info \
: twist /bin/echo "You are not welcome to use %d from %h."</programlisting>
: severity auth.info \
: twist /bin/echo "You are not welcome to use %d from %h."</programlisting>
<para>This example shows that the message,
<quote>You are not allowed to use <literal>daemon</literal>
@ -2775,8 +2774,7 @@ Connection closed by foreign host.</screen>
<screen>
options IPSEC #IP security
device crypto
</screen>
device crypto</screen>
<indexterm>
<primary>kernel options</primary>
@ -3199,7 +3197,7 @@ racoon_enable="yes"</programlisting>
&os;. To see if <application>sshd</application> is enabled,
check the <filename>rc.conf</filename> file for:</para>
<screen>sshd_enable="YES"</screen>
<programlisting>sshd_enable="YES"</programlisting>
<para>This will load &man.sshd.8;, the daemon program for
<application>OpenSSH</application>, the next time your
@ -3207,7 +3205,7 @@ racoon_enable="yes"</programlisting>
<filename>/etc/rc.d/sshd</filename> &man.rc.8; script to
start <application>OpenSSH</application>:</para>
<programlisting>/etc/rc.d/sshd start</programlisting>
<screen>&prompt.root; <userinput>/etc/rc.d/sshd start</userinput></screen>
</sect2>
<sect2>
@ -3269,8 +3267,8 @@ user@example.com's password: <userinput>*******</userinput></screen>
<screen>&prompt.root; <userinput> scp <replaceable>user@example.com:/COPYRIGHT COPYRIGHT</replaceable></userinput>
user@example.com's password: <userinput>*******</userinput>
COPYRIGHT 100% |*****************************| 4735
00:00
COPYRIGHT 100% |*****************************| 4735
00:00
&prompt.root;</screen>
<para>Since the fingerprint was already saved for this host in
@ -3324,8 +3322,7 @@ Enter same passphrase again:
Your identification has been saved in /home/user/.ssh/id_dsa.
Your public key has been saved in /home/user/.ssh/id_dsa.pub.
The key fingerprint is:
bb:48:db:f2:93:57:80:b6:aa:bc:f5:d5:ba:8f:79:17 user@host.example.com
</screen>
bb:48:db:f2:93:57:80:b6:aa:bc:f5:d5:ba:8f:79:17 user@host.example.com</screen>
<para>&man.ssh-keygen.1; will create a public and private key
pair for use in authentication. The private key is stored