diff options
author | 2003-03-18 13:05:24 +0000 | |
---|---|---|
committer | 2003-03-18 13:05:24 +0000 | |
commit | b32bcc55e47586d437ebd20d4d0ab26da3759e82 (patch) | |
tree | 3057fd9ae836c38e88839fe9cfa9ca4d048efc7b | |
parent | newsentence, newline (diff) | |
download | wireguard-openbsd-b32bcc55e47586d437ebd20d4d0ab26da3759e82.tar.xz wireguard-openbsd-b32bcc55e47586d437ebd20d4d0ab26da3759e82.zip |
duplicate words: on on, in in
ok miod@ jmc@
-rw-r--r-- | libexec/spamd/spamd.8 | 4 | ||||
-rw-r--r-- | libexec/tcpd/README | 4 |
2 files changed, 4 insertions, 4 deletions
diff --git a/libexec/spamd/spamd.8 b/libexec/spamd/spamd.8 index cee223c4085..d38c779d9e6 100644 --- a/libexec/spamd/spamd.8 +++ b/libexec/spamd/spamd.8 @@ -1,4 +1,4 @@ -.\" $OpenBSD: spamd.8,v 1.31 2003/03/15 18:09:11 pvalchev Exp $ +.\" $OpenBSD: spamd.8,v 1.32 2003/03/18 13:05:24 david Exp $ .\" .\" Copyright (c) 2002 Theo de Raadt. All rights reserved. .\" @@ -153,7 +153,7 @@ named service .Em spamd-cfg (see .Xr services 5 ). -The configuration socket listens only on on the INADDR_LOOPBACK +The configuration socket listens only on the INADDR_LOOPBACK address. Configuration of spamd is done by connecting to the configuration socket, and sending blacklist information, one blacklist per line. diff --git a/libexec/tcpd/README b/libexec/tcpd/README index 1b1ca42e7a3..6e89e097d25 100644 --- a/libexec/tcpd/README +++ b/libexec/tcpd/README @@ -1,4 +1,4 @@ -$OpenBSD: README,v 1.3 1997/07/23 20:36:34 kstailey Exp $ +$OpenBSD: README,v 1.4 2003/03/18 13:05:24 david Exp $ @(#) README 1.30 97/03/21 19:27:21 This is the 7.6 version of the TCP/IP daemon wrapper package. @@ -469,7 +469,7 @@ exploited that trusts the client host name or address. A long-term solution is to stop using network services that trust the client host name or address, and to use data encryption instead. -A short-term solution, as outlined in in CERT advisory CA-95:01, is to +A short-term solution, as outlined in CERT advisory CA-95:01, is to configure network routers so that they discard datagrams from "outside" with an "inside" source address. This approach is most fruitful when you do not trust any hosts outside your local network. |