[netfilter-cvslog] r7473 - in trunk/iptables: . extensions
kaber at trash.net
kaber at trash.net
Sun Apr 13 07:28:31 CEST 2008
Author: kaber at trash.net
Date: 2008-04-13 07:28:31 +0200 (Sun, 13 Apr 2008)
New Revision: 7473
Modified:
trunk/iptables/extensions/libip6t_frag.man
trunk/iptables/extensions/libipt_SAME.man
trunk/iptables/extensions/libxt_NFQUEUE.man
trunk/iptables/extensions/libxt_connbytes.man
trunk/iptables/extensions/libxt_dscp.man
trunk/iptables/extensions/libxt_hashlimit.man
trunk/iptables/ip6tables.8.in
trunk/iptables/ip6tables.c
trunk/iptables/iptables.8.in
trunk/iptables/iptables.c
Log:
[PATCH 10/13] manpages: grammar and spelling
Modified: trunk/iptables/extensions/libip6t_frag.man
===================================================================
--- trunk/iptables/extensions/libip6t_frag.man 2008-04-13 05:27:29 UTC (rev 7472)
+++ trunk/iptables/extensions/libip6t_frag.man 2008-04-13 05:28:31 UTC (rev 7473)
@@ -17,4 +17,4 @@
Matches if there are more fragments.
.TP
.BR "[--fraglast]"
-Matches if this is the last fragement.
+Matches if this is the last fragment.
Modified: trunk/iptables/extensions/libipt_SAME.man
===================================================================
--- trunk/iptables/extensions/libipt_SAME.man 2008-04-13 05:27:29 UTC (rev 7472)
+++ trunk/iptables/extensions/libipt_SAME.man 2008-04-13 05:28:31 UTC (rev 7473)
@@ -11,5 +11,5 @@
new source-ip
.TP
.B "--random"
-Port mapping will be forcely randomized to avoid attacks based on
+Port mapping will be forcibly randomized to avoid attacks based on
port prediction (kernel >= 2.6.21).
Modified: trunk/iptables/extensions/libxt_NFQUEUE.man
===================================================================
--- trunk/iptables/extensions/libxt_NFQUEUE.man 2008-04-13 05:27:29 UTC (rev 7472)
+++ trunk/iptables/extensions/libxt_NFQUEUE.man 2008-04-13 05:28:31 UTC (rev 7473)
@@ -3,7 +3,7 @@
number.
.TP
\fB--queue-num\fP \fIvalue\fP
-This specifies the QUEUE number to use. Valud queue numbers are 0 to 65535. The default value is 0.
+This specifies the QUEUE number to use. Valid queue numbers are 0 to 65535. The default value is 0.
.TP
It can only be used with Kernel versions 2.6.14 or later, since it requires
the
Modified: trunk/iptables/extensions/libxt_connbytes.man
===================================================================
--- trunk/iptables/extensions/libxt_connbytes.man 2008-04-13 05:27:29 UTC (rev 7472)
+++ trunk/iptables/extensions/libxt_connbytes.man 2008-04-13 05:28:31 UTC (rev 7473)
@@ -1,5 +1,5 @@
Match by how many bytes or packets a connection (or one of the two
-flows constituting the connection) have tranferred so far, or by
+flows constituting the connection) has transferred so far, or by
average bytes per packet.
The counters are 64bit and are thus not expected to overflow ;)
@@ -7,7 +7,7 @@
The primary use is to detect long-lived downloads and mark them to be
scheduled using a lower priority band in traffic control.
-The transfered bytes per connection can also be viewed through
+The transferred bytes per connection can also be viewed through
/proc/net/ip_conntrack and accessed via ctnetlink
.TP
[\fB!\fP] \fB--connbytes\fP \fIfrom\fP[\fB:\fR\fIto\fP]
Modified: trunk/iptables/extensions/libxt_dscp.man
===================================================================
--- trunk/iptables/extensions/libxt_dscp.man 2008-04-13 05:27:29 UTC (rev 7472)
+++ trunk/iptables/extensions/libxt_dscp.man 2008-04-13 05:28:31 UTC (rev 7473)
@@ -7,4 +7,4 @@
.BI "--dscp-class " "\fIDiffServ Class\fP"
Match the DiffServ class. This value may be any of the
BE, EF, AFxx or CSx classes. It will then be converted
-into it's according numeric value.
+into its according numeric value.
Modified: trunk/iptables/extensions/libxt_hashlimit.man
===================================================================
--- trunk/iptables/extensions/libxt_hashlimit.man 2008-04-13 05:27:29 UTC (rev 7472)
+++ trunk/iptables/extensions/libxt_hashlimit.man 2008-04-13 05:28:31 UTC (rev 7473)
@@ -53,7 +53,7 @@
Maximum entries in the hash.
.TP
\fB--hashlimit-htable-expire\fR \fImsec\fR
-After how many miliseconds do hash entries expire.
+After how many milliseconds do hash entries expire.
.TP
\fB--hashlimit-htable-gcinterval\fR \fImsec\fR
-How many miliseconds between garbage collection intervals.
+How many milliseconds between garbage collection intervals.
Modified: trunk/iptables/ip6tables.8.in
===================================================================
--- trunk/iptables/ip6tables.8.in 2008-04-13 05:27:29 UTC (rev 7472)
+++ trunk/iptables/ip6tables.8.in 2008-04-13 05:28:31 UTC (rev 7473)
@@ -478,7 +478,7 @@
.PP
Jozsef Kadlecsik wrote the REJECT target.
.PP
-Harald Welte wrote the ULOG and NFQUEUE target, the new libiptc, aswell as TTL match+target and libipulog.
+Harald Welte wrote the ULOG and NFQUEUE target, the new libiptc, as well as TTL match+target and libipulog.
.PP
The Netfilter Core Team is: Marc Boucher, Martin Josefsson, Yasuyuki Kozakai,
Jozsef Kadlecsik, Patrick McHardy, James Morris, Pablo Neira Ayuso,
Modified: trunk/iptables/ip6tables.c
===================================================================
--- trunk/iptables/ip6tables.c 2008-04-13 05:27:29 UTC (rev 7472)
+++ trunk/iptables/ip6tables.c 2008-04-13 05:28:31 UTC (rev 7473)
@@ -720,7 +720,7 @@
return 0;
}
-/* e is called `fw' here for hysterical raisins */
+/* e is called `fw' here for historical reasons */
static void
print_firewall(const struct ip6t_entry *fw,
const char *targname,
Modified: trunk/iptables/iptables.8.in
===================================================================
--- trunk/iptables/iptables.8.in 2008-04-13 05:27:29 UTC (rev 7472)
+++ trunk/iptables/iptables.8.in 2008-04-13 05:28:31 UTC (rev 7473)
@@ -55,7 +55,7 @@
table.
.SH TARGETS
-A firewall rule specifies criteria for a packet, and a target. If the
+A firewall rule specifies criteria for a packet and a target. If the
packet does not match, the next rule in the chain is the examined; if
it does match, then the next rule is specified by the value of the
target, which can be the name of a user-defined chain or one of the
@@ -155,9 +155,9 @@
.B iptables
can be divided into several different groups.
.SS COMMANDS
-These options specify the specific action to perform. Only one of them
-can be specified on the command line unless otherwise specified
-below. For all the long versions of the command and option names, you
+These options specify the desired action to perform. Only one of them
+can be specified on the command line unless otherwise stated
+below. For long versions of the command and option names, you
need to use only enough letters to ensure that
.B iptables
can differentiate it from all other options.
@@ -188,7 +188,7 @@
.TP
.BR "-L, --list " "[\fIchain\fP]"
List all rules in the selected chain. If no chain is selected, all
-chains are listed. As every other iptables command, it applies to the
+chains are listed. Like every other iptables command, it applies to the
specified table (filter is the default), so NAT rules get listed by
.nf
iptables -t nat -n -L
Modified: trunk/iptables/iptables.c
===================================================================
--- trunk/iptables/iptables.c 2008-04-13 05:27:29 UTC (rev 7472)
+++ trunk/iptables/iptables.c 2008-04-13 05:28:31 UTC (rev 7473)
@@ -720,7 +720,7 @@
return 0;
}
-/* e is called `fw' here for hysterical raisins */
+/* e is called `fw' here for historical reasons */
static void
print_firewall(const struct ipt_entry *fw,
const char *targname,
More information about the netfilter-cvslog
mailing list