summaryrefslogtreecommitdiff
path: root/sbin/isakmpd
diff options
context:
space:
mode:
authorTheo de Raadt <deraadt@cvs.openbsd.org>2003-01-19 21:02:16 +0000
committerTheo de Raadt <deraadt@cvs.openbsd.org>2003-01-19 21:02:16 +0000
commitd970efb1a2a7ce2878808b2d89dddb4b8d74a9fb (patch)
treeb807ae62aff3690fe8ec0e268b8124f5589a2f69 /sbin/isakmpd
parent02e2120255971073931be7b376b8e074fe2ad0bf (diff)
typos; jmc@prioris.mini.pw.edu.pl
Diffstat (limited to 'sbin/isakmpd')
-rw-r--r--sbin/isakmpd/isakmpd.conf.510
-rw-r--r--sbin/isakmpd/isakmpd.policy.516
2 files changed, 13 insertions, 13 deletions
diff --git a/sbin/isakmpd/isakmpd.conf.5 b/sbin/isakmpd/isakmpd.conf.5
index 7641481cefe..fcd7a3e9d75 100644
--- a/sbin/isakmpd/isakmpd.conf.5
+++ b/sbin/isakmpd/isakmpd.conf.5
@@ -1,4 +1,4 @@
-.\" $OpenBSD: isakmpd.conf.5,v 1.71 2003/01/09 13:12:42 ho Exp $
+.\" $OpenBSD: isakmpd.conf.5,v 1.72 2003/01/19 21:02:15 deraadt Exp $
.\" $EOM: isakmpd.conf.5,v 1.57 2000/12/21 14:43:17 ho Exp $
.\"
.\" Copyright (c) 1998, 1999, 2000 Niklas Hallqvist. All rights reserved.
@@ -197,7 +197,7 @@ How many times should a message be retransmitted before giving up.
If this tag is defined, whatever the value is, some semantics of
.Nm
are changed so that multiple instances can run on top of one SADB
-and setup SAs with eachother.
+and setup SAs with each other.
Specifically this means replay
protection will not be asked for, and errors that can occur when
updating an SA with its parameters a 2nd time will be ignored.
@@ -223,7 +223,7 @@ automatically, either on first use if the system supports it, or at
startup of the daemon.
These names are section names where further information can be found.
Look at <IPsec-connection> below.
-Normally any connection mentioned here are treated as part of the
+Normally any connections mentioned here are treated as part of the
"Passive-connection" list we present below, however there is a
flag: "Active-only" that disables this behaviour.
This too is mentioned in the <IPsec-connection> section, in the "Flags" tag.
@@ -437,7 +437,7 @@ The hash algorithm as the RFCs name it, or ANY.
The authentication method as the RFCs name it, or ANY.
.It Em GROUP_DESCRIPTION
The group used for Diffie-Hellman exponentiations, or ANY.
-The name are symbolic, like
+The names are symbolic, like
.Li MODP_768 , MODP_1024 , EC_155
and
.Li EC_185 .
@@ -722,7 +722,7 @@ WINS-server= 192.168.1.11
#
# #####################################################################
-# All configration data below this point is not required as the example
+# All configuration data below this point is not required as the example
# uses the predefined Main Mode transform and Quick Mode suite names.
# It is included here for completeness. Note the default values for the
# [General] and [X509-certificates] sections just below.
diff --git a/sbin/isakmpd/isakmpd.policy.5 b/sbin/isakmpd/isakmpd.policy.5
index e95be5adc2d..ef32647f330 100644
--- a/sbin/isakmpd/isakmpd.policy.5
+++ b/sbin/isakmpd/isakmpd.policy.5
@@ -1,4 +1,4 @@
-.\" $OpenBSD: isakmpd.policy.5,v 1.27 2002/11/27 14:36:20 ho Exp $
+.\" $OpenBSD: isakmpd.policy.5,v 1.28 2003/01/19 21:02:15 deraadt Exp $
.\" $EOM: isakmpd.policy.5,v 1.24 2000/11/23 12:55:25 niklas Exp $
.\"
.\" Copyright (c) 1999-2001, Angelos D. Keromytis. All rights reserved.
@@ -48,7 +48,7 @@ layer of the kernel's networking stack.
The
.Xr isakmpd 1
daemon (also known as IKE, for Internet Key Exchange) is used when two
-systems need to automatically setup a pair of Security Associations
+systems need to automatically set up a pair of Security Associations
(SAs) for securely communicating using IPsec.
IKE operates in two stages:
.Pp
@@ -68,7 +68,7 @@ At this stage, the exact parameters of the SAs
(e.g., algorithms to use, encapsulation mode, lifetime) and the
identities of the communicating parties (hosts, networks, etc.) are
specified.
-The reason of existance of Quick Mode is to allow for fast
+The reason for the existance of Quick Mode is to allow for fast
SA setup, once the more heavy-weight Main Mode has been completed.
Generally, Quick Mode uses the key material derived from Main Mode to
provide keys to the IPsec transforms to be used.
@@ -96,7 +96,7 @@ The responder
examines the proposals and determines which of them are acceptable,
according to policy and any credentials.
.Pp
-The following paragraphs assume some knowledge of the contents of
+The following paragraphs assume some knowledge of the contents of the
.Xr keynote 4
and
.Xr keynote 5
@@ -194,7 +194,7 @@ The following policy assertion:
.Pp
is similar to the previous one, but instead of including a complete
X509 credential in the Licensees field, only the X509 certificate's
-Subject Canonical Name need to be specified (note that the "DN:"
+Subject Canonical Name needs to be specified (note that the "DN:"
prefix is necessary).
.Pp
KeyNote credentials have the same format as policy assertions, with
@@ -245,7 +245,7 @@ Information about the proposals, the identity of the remote IKE
daemon, the packet classes to be protected, etc. are encoded in what
is called an action set.
The action set is composed of name-value
-attribute, similar in some way to a shell environment variables.
+attributes, similar in some ways to shell environment variables.
These values are initialized by
.Nm isakmpd
before each query to the KeyNote system, and can be tested against in
@@ -256,8 +256,8 @@ and
.Xr keynote 5
for more details on the format and semantics of the Conditions field.
.Pp
-Note that assertions and credentials can make reference to
-non-existant attributes without catastrophic failures (access may be
+Note that assertions and credentials can make references to
+non-existent attributes without catastrophic failures (access may be
denied, depending on the overall structure, but will not be
accidentally granted).
One reason for credentials referencing