Correct the contents of <programlisting> elements. Translators please
note: some of the changes here are whitespace, but it's significant whitespace that is visible in the rendered output. Approved by: gjb (mentor)
This commit is contained in:
parent
cd3cb3fa81
commit
7d4755623a
Notes:
svn2git
2020-12-08 03:00:23 +00:00
svn path=/head/; revision=38281
1 changed files with 16 additions and 19 deletions
|
@ -382,7 +382,7 @@
|
|||
<para>To lock an account completely, the &man.pw.8; command
|
||||
should be used:</para>
|
||||
|
||||
<screen>&prompt.root;<userinput>pw lock <replaceable>staff</replaceable></userinput></screen>
|
||||
<screen>&prompt.root; <userinput>pw lock <replaceable>staff</replaceable></userinput></screen>
|
||||
|
||||
<para>This will prevent the user from logging in using any
|
||||
mechanism, including &man.ssh.1;.</para>
|
||||
|
@ -1204,6 +1204,7 @@ Then run opiepasswd without the -c parameter.
|
|||
Using MD5 to compute responses.
|
||||
Enter new secret pass phrase:
|
||||
Again new secret pass phrase:
|
||||
|
||||
ID unfurl OTP key is 499 to4268
|
||||
MOS MALL GOAT ARM AVID COED</screen>
|
||||
|
||||
|
@ -1240,15 +1241,14 @@ MOS MALL GOAT ARM AVID COED</screen>
|
|||
Updating unfurl:
|
||||
You need the response from an OTP generator.
|
||||
Old secret pass phrase:
|
||||
otp-md5 498 to4268 ext
|
||||
Response: GAME GAG WELT OUT DOWN CHAT
|
||||
otp-md5 498 to4268 ext
|
||||
Response: GAME GAG WELT OUT DOWN CHAT
|
||||
New secret pass phrase:
|
||||
otp-md5 499 to4269
|
||||
Response: LINE PAP MILK NELL BUOY TROY
|
||||
otp-md5 499 to4269
|
||||
Response: LINE PAP MILK NELL BUOY TROY
|
||||
|
||||
ID mark OTP key is 499 gr4269
|
||||
LINE PAP MILK NELL BUOY TROY
|
||||
</screen>
|
||||
LINE PAP MILK NELL BUOY TROY</screen>
|
||||
|
||||
<para>To accept the default seed press <keycap>Return</keycap>.
|
||||
Then before entering an access password, move over to your
|
||||
|
@ -1258,8 +1258,7 @@ LINE PAP MILK NELL BUOY TROY
|
|||
Using the MD5 algorithm to compute response.
|
||||
Reminder: Don't use opiekey from telnet or dial-in sessions.
|
||||
Enter secret pass phrase:
|
||||
GAME GAG WELT OUT DOWN CHAT
|
||||
</screen>
|
||||
GAME GAG WELT OUT DOWN CHAT</screen>
|
||||
|
||||
<para>Now switch back over to the insecure connection, and copy
|
||||
the one-time password generated over to the relevant
|
||||
|
@ -1513,8 +1512,8 @@ qpopper : ALL : allow</programlisting>
|
|||
|
||||
<programlisting># The rest of the daemons are protected.
|
||||
ALL : ALL \
|
||||
: severity auth.info \
|
||||
: twist /bin/echo "You are not welcome to use %d from %h."</programlisting>
|
||||
: severity auth.info \
|
||||
: twist /bin/echo "You are not welcome to use %d from %h."</programlisting>
|
||||
|
||||
<para>This example shows that the message,
|
||||
<quote>You are not allowed to use <literal>daemon</literal>
|
||||
|
@ -2775,8 +2774,7 @@ Connection closed by foreign host.</screen>
|
|||
|
||||
<screen>
|
||||
options IPSEC #IP security
|
||||
device crypto
|
||||
</screen>
|
||||
device crypto</screen>
|
||||
|
||||
<indexterm>
|
||||
<primary>kernel options</primary>
|
||||
|
@ -3199,7 +3197,7 @@ racoon_enable="yes"</programlisting>
|
|||
&os;. To see if <application>sshd</application> is enabled,
|
||||
check the <filename>rc.conf</filename> file for:</para>
|
||||
|
||||
<screen>sshd_enable="YES"</screen>
|
||||
<programlisting>sshd_enable="YES"</programlisting>
|
||||
|
||||
<para>This will load &man.sshd.8;, the daemon program for
|
||||
<application>OpenSSH</application>, the next time your
|
||||
|
@ -3207,7 +3205,7 @@ racoon_enable="yes"</programlisting>
|
|||
<filename>/etc/rc.d/sshd</filename> &man.rc.8; script to
|
||||
start <application>OpenSSH</application>:</para>
|
||||
|
||||
<programlisting>/etc/rc.d/sshd start</programlisting>
|
||||
<screen>&prompt.root; <userinput>/etc/rc.d/sshd start</userinput></screen>
|
||||
</sect2>
|
||||
|
||||
<sect2>
|
||||
|
@ -3269,8 +3267,8 @@ user@example.com's password: <userinput>*******</userinput></screen>
|
|||
|
||||
<screen>&prompt.root; <userinput> scp <replaceable>user@example.com:/COPYRIGHT COPYRIGHT</replaceable></userinput>
|
||||
user@example.com's password: <userinput>*******</userinput>
|
||||
COPYRIGHT 100% |*****************************| 4735
|
||||
00:00
|
||||
COPYRIGHT 100% |*****************************| 4735
|
||||
00:00
|
||||
&prompt.root;</screen>
|
||||
|
||||
<para>Since the fingerprint was already saved for this host in
|
||||
|
@ -3324,8 +3322,7 @@ Enter same passphrase again:
|
|||
Your identification has been saved in /home/user/.ssh/id_dsa.
|
||||
Your public key has been saved in /home/user/.ssh/id_dsa.pub.
|
||||
The key fingerprint is:
|
||||
bb:48:db:f2:93:57:80:b6:aa:bc:f5:d5:ba:8f:79:17 user@host.example.com
|
||||
</screen>
|
||||
bb:48:db:f2:93:57:80:b6:aa:bc:f5:d5:ba:8f:79:17 user@host.example.com</screen>
|
||||
|
||||
<para>&man.ssh-keygen.1; will create a public and private key
|
||||
pair for use in authentication. The private key is stored
|
||||
|
|
Loading…
Reference in a new issue