summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authordavid <david@openbsd.org>2003-03-18 13:05:24 +0000
committerdavid <david@openbsd.org>2003-03-18 13:05:24 +0000
commitb32bcc55e47586d437ebd20d4d0ab26da3759e82 (patch)
tree3057fd9ae836c38e88839fe9cfa9ca4d048efc7b
parentnewsentence, newline (diff)
downloadwireguard-openbsd-b32bcc55e47586d437ebd20d4d0ab26da3759e82.tar.xz
wireguard-openbsd-b32bcc55e47586d437ebd20d4d0ab26da3759e82.zip
duplicate words: on on, in in
ok miod@ jmc@
-rw-r--r--libexec/spamd/spamd.84
-rw-r--r--libexec/tcpd/README4
2 files changed, 4 insertions, 4 deletions
diff --git a/libexec/spamd/spamd.8 b/libexec/spamd/spamd.8
index cee223c4085..d38c779d9e6 100644
--- a/libexec/spamd/spamd.8
+++ b/libexec/spamd/spamd.8
@@ -1,4 +1,4 @@
-.\" $OpenBSD: spamd.8,v 1.31 2003/03/15 18:09:11 pvalchev Exp $
+.\" $OpenBSD: spamd.8,v 1.32 2003/03/18 13:05:24 david Exp $
.\"
.\" Copyright (c) 2002 Theo de Raadt. All rights reserved.
.\"
@@ -153,7 +153,7 @@ named service
.Em spamd-cfg
(see
.Xr services 5 ).
-The configuration socket listens only on on the INADDR_LOOPBACK
+The configuration socket listens only on the INADDR_LOOPBACK
address.
Configuration of spamd is done by connecting to the configuration
socket, and sending blacklist information, one blacklist per line.
diff --git a/libexec/tcpd/README b/libexec/tcpd/README
index 1b1ca42e7a3..6e89e097d25 100644
--- a/libexec/tcpd/README
+++ b/libexec/tcpd/README
@@ -1,4 +1,4 @@
-$OpenBSD: README,v 1.3 1997/07/23 20:36:34 kstailey Exp $
+$OpenBSD: README,v 1.4 2003/03/18 13:05:24 david Exp $
@(#) README 1.30 97/03/21 19:27:21
This is the 7.6 version of the TCP/IP daemon wrapper package.
@@ -469,7 +469,7 @@ exploited that trusts the client host name or address.
A long-term solution is to stop using network services that trust the
client host name or address, and to use data encryption instead.
-A short-term solution, as outlined in in CERT advisory CA-95:01, is to
+A short-term solution, as outlined in CERT advisory CA-95:01, is to
configure network routers so that they discard datagrams from "outside"
with an "inside" source address. This approach is most fruitful when
you do not trust any hosts outside your local network.