Hi Andrew, Andrew Darqui wrote on Sat, Jun 24, 2017 at 01:17:42AM -0400: > Hi everyone. Nothing special, just a few typo fixes. Committing the INSTALL fixes is still an open task. > Also, there's a typo on this page: https://www.openssh.com/list.html > s/approriate/appropriate I committed that one. Thanks, Ingo > diff --git a/INSTALL b/INSTALL > index 92106bf0..bfaad6c9 100644 > --- a/INSTALL > +++ b/INSTALL > @@ -25,9 +25,9 @@ OpenSSL 1.1.x is not currently supported. > > The remaining items are optional. > > -NB. If you operating system supports /dev/random, you should configure > +NB. If your operating system supports /dev/random, you should configure > libcrypto (LibreSSL/OpenSSL) to use it. OpenSSH relies on libcrypto's > -direct support of /dev/random, or failing that, either prngd or egd > +direct support of /dev/random, or failing that, either prngd or egd. > > PRNGD: > > @@ -46,7 +46,7 @@ http://egd.sourceforge.net/ > PAM: > > OpenSSH can utilise Pluggable Authentication Modules (PAM) if your > -system supports it. PAM is standard most Linux distributions, Solaris, > +system supports it. PAM is standard in most Linux distributions, Solaris, > HP-UX 11, AIX >= 5.2, FreeBSD and NetBSD. > > Information about the various PAM implementations are available: > @@ -99,7 +99,7 @@ http://www.gnu.org/software/autoconf/ > > Basic Security Module (BSM): > > -Native BSM support is know to exist in Solaris from at least 2.5.1, > +Native BSM support is known to exist in Solaris from at least 2.5.1, > FreeBSD 6.1 and OS X. Alternatively, you may use the OpenBSM > implementation (http://www.openbsm.org). > > @@ -177,7 +177,7 @@ it if lastlog is installed in a different place. > --without-lastlog will disable lastlog support entirely. > > --with-osfsia, --without-osfsia will enable or disable OSF1's Security > -Integration Architecture. The default for OSF1 machines is enable. > +Integration Architecture. The default for OSF1 machines is enabled. > > --with-skey=PATH will enable S/Key one time password support. You will > need the S/Key libraries and header files installed for this to work. > @@ -201,13 +201,12 @@ started by sshd. This replaces the standard path > entirely. > --with-pid-dir=PATH specifies the directory in which the sshd.pid file is > created. > > ---with-xauth=PATH specifies the location of the xauth binary > +--with-xauth=PATH specifies the location of the xauth binary. > > --with-ssl-dir=DIR allows you to specify where your Libre/OpenSSL > -libraries > -are installed. > +libraries are installed. > > ---with-ssl-engine enables Libre/OpenSSL's (hardware) ENGINE support > +--with-ssl-engine enables Libre/OpenSSL's (hardware) ENGINE support. > > --with-4in6 Check for IPv4 in IPv6 mapped addresses and convert them to > real (AF_INET) IPv4 addresses. Works around some quirks on Linux. _______________________________________________ openssh-unix-dev mailing list openssh-unix-dev@xxxxxxxxxxx https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev