Source-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[src/trunk]: src/usr.sbin/syslogd Remove duplicate word from the sentence.



details:   https://anonhg.NetBSD.org/src/rev/fe6b3bf7f155
branches:  trunk
changeset: 821912:fe6b3bf7f155
user:      abhinav <abhinav%NetBSD.org@localhost>
date:      Tue Feb 21 18:36:39 2017 +0000

description:
Remove duplicate word from the sentence.

diffstat:

 usr.sbin/syslogd/syslog.conf.5 |  4 ++--
 1 files changed, 2 insertions(+), 2 deletions(-)

diffs (18 lines):

diff -r c1cbbed04079 -r fe6b3bf7f155 usr.sbin/syslogd/syslog.conf.5
--- a/usr.sbin/syslogd/syslog.conf.5    Tue Feb 21 18:28:28 2017 +0000
+++ b/usr.sbin/syslogd/syslog.conf.5    Tue Feb 21 18:36:39 2017 +0000
@@ -1,4 +1,4 @@
-.\"    $NetBSD: syslog.conf.5,v 1.23 2017/02/21 18:28:28 abhinav Exp $
+.\"    $NetBSD: syslog.conf.5,v 1.24 2017/02/21 18:36:39 abhinav Exp $
 .\"
 .\" Copyright (c) 1990, 1991, 1993
 .\"    The Regents of the University of California.  All rights reserved.
@@ -511,7 +511,7 @@
 .Pp
 To detect later manipulation one has to keep a copy of the key used for
 signing (otherwise an attacker could alter the logs and sign them with his
-his own key).
+own key).
 If TLS is used with a DSA key then the same key will be used for signing.
 This is the recommended setup because it makes it easy to have copies of
 the certificate (with the public key) in backups.



Home | Main Index | Thread Index | Old Index