[Midnightbsd-cvs] src [11857] trunk/share/examples/ipfilter/ipf-howto.txt: fix typos

laffer1 at midnightbsd.org laffer1 at midnightbsd.org
Fri Jul 13 08:53:45 EDT 2018


Revision: 11857
          http://svnweb.midnightbsd.org/src/?rev=11857
Author:   laffer1
Date:     2018-07-13 08:53:45 -0400 (Fri, 13 Jul 2018)
Log Message:
-----------
fix typos

Modified Paths:
--------------
    trunk/share/examples/ipfilter/ipf-howto.txt

Property Changed:
----------------
    trunk/share/examples/ipfilter/ipf-howto.txt

Modified: trunk/share/examples/ipfilter/ipf-howto.txt
===================================================================
--- trunk/share/examples/ipfilter/ipf-howto.txt	2018-07-13 12:51:43 UTC (rev 11856)
+++ trunk/share/examples/ipfilter/ipf-howto.txt	2018-07-13 12:53:45 UTC (rev 11857)
@@ -8,7 +8,7 @@
 
               Brendan Conoboy <synk at swcp.com>
             Erik Fichtner <emf at obfuscation.org>
-            $FreeBSD: src/share/examples/ipfilter/ipf-howto.txt,v 1.2 2003/01/01 18:48:48 schweikh Exp $
+            $MidnightBSD$
 
                 Fri Apr 20 09:31:14 EDT 2001
 
@@ -1036,11 +1036,11 @@
 it's not a server, it's a client.  And this  client  doesn't
 want  unauthorized  packets  entering  its  IP stack at all.
 However, the client wants full access to  the  internet  and
-the  reply packets that such privledge entails.  This simple
+the reply packets that such privilege entails.  This simple
 ruleset creates state entries for  every  new  outgoing  TCP
 session.   Again,  since a state entry is created, these new
 TCP sessions are free to talk back and forth as they  please
-without  the  hinderance or inspection of the firewall rule-
+without the hindrance or inspection of the firewall rule-
 set.  We mentioned that this also works for UDP and ICMP:
 
     block in  quick on tun0 all
@@ -1271,7 +1271,7 @@
 This  works  because  every  packet  that  should be allowed
 through makes it into the state table  before  the  blocking
 rules  are reached. The only scan this won't detect is a SYN
-scan itself.  If you're truely worried about that, you might
+scan itself.  If you're truly worried about that, you might
 even want to log all initial SYN packets.
 
 3.6.  Responding To a Blocked Packet
@@ -2564,7 +2564,7 @@
 your  firewall,  thereby  subverting its ruleset?  This is a
 common problem administrators must face,  particularly  when
 they're  using  firewall  solutions  on top of their Unix/NT
-machines.  Some use it as an arguement for blackbox hardware
+machines.  Some use it as an argument for blackbox hardware
 solutions,  under  the flawed notion that inherent obscurity
 
 


Property changes on: trunk/share/examples/ipfilter/ipf-howto.txt
___________________________________________________________________
Added: svn:keywords
## -0,0 +1 ##
+MidnightBSD=%H
\ No newline at end of property


More information about the Midnightbsd-cvs mailing list