From owner-svn-doc-head@FreeBSD.ORG Mon Jan 27 12:38:54 2014 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 0CCBB2FB; Mon, 27 Jan 2014 12:38:54 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id D36BA13D5; Mon, 27 Jan 2014 12:38:53 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.7/8.14.7) with ESMTP id s0RCcrth098454; Mon, 27 Jan 2014 12:38:53 GMT (envelope-from wblock@svn.freebsd.org) Received: (from wblock@localhost) by svn.freebsd.org (8.14.7/8.14.7/Submit) id s0RCcrwW098453; Mon, 27 Jan 2014 12:38:53 GMT (envelope-from wblock@svn.freebsd.org) Message-Id: <201401271238.s0RCcrwW098453@svn.freebsd.org> From: Warren Block Date: Mon, 27 Jan 2014 12:38:53 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r43661 - head/en_US.ISO8859-1/books/handbook/firewalls X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 27 Jan 2014 12:38:54 -0000 Author: wblock Date: Mon Jan 27 12:38:53 2014 New Revision: 43661 URL: http://svnweb.freebsd.org/changeset/doc/43661 Log: Expand a few contractions. Modified: head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Modified: head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Mon Jan 27 12:36:13 2014 (r43660) +++ head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Mon Jan 27 12:38:53 2014 (r43661) @@ -1104,7 +1104,7 @@ pass inet proto icmp from any to $ext_if By default, Unix traceroute uses UDP connections according to a set formula based on destination. The rule below works with - traceroute on all unixes I've had + traceroute on all Unixes I have had access to, including GNU/Linux: # allow out the default range for traceroute(8): @@ -1125,7 +1125,7 @@ pass out on $ext_if inet proto udp from details. Under any circumstances, this solution was lifted - from an openbsd-misc post. I've found that list, and + from an openbsd-misc post. I have found that list, and the searchable list archives (accessible among other places from http://marc.theaimsgroup.com/), to be a very valuable resource whenever you need OpenBSD @@ -1290,7 +1290,7 @@ Sep 26 03:12:44 skapet sshd[24703]: Fail solution. Pass rules can be written so they maintain certain limits on what connecting hosts can do. For good measure, violators can be banished to a table of addresses - which are denied some or all access. If desired, it's even + which are denied some or all access. If desired, it is even possible to drop all existing connections from machines which overreach the limits. Here is how it is done: