Skip to content

Commit

Permalink
Fix various spelling mistakes
Browse files Browse the repository at this point in the history
New patch, omitted changes to copyrights/licenses & changelog.
Acked-by: Arne Schwabe <[email protected]>
Message-Id: <[email protected]>
URL: https://www.mail-archive.com/[email protected]/msg18177.html

Signed-off-by: Gert Doering <[email protected]>
  • Loading branch information
Jonathan Tooker authored and cron2 committed Feb 6, 2019
1 parent ce1c1be commit ccb636c
Show file tree
Hide file tree
Showing 35 changed files with 75 additions and 75 deletions.
6 changes: 3 additions & 3 deletions Changes.rst
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ Seamless client IP/port floating
the new format. When a data packet arrives, the server identifies peer
by peer-id. If peer's ip/port has changed, server assumes that
client has floated, verifies HMAC and updates ip/port in internal structs.
This allows the connection to be immediatly restored, instead of requiring
This allows the connection to be immediately restored, instead of requiring
a TLS handshake before the server accepts packets from the new client
ip/port.

Expand Down Expand Up @@ -223,7 +223,7 @@ User-visible Changes
of a field get _$N appended to it's field name, starting at N=1. For the
example above, that would result in e.g. X509_0_OU=one, X509_0_OU_1=two.
Note that this breaks setups that rely on the fact that OpenVPN would
previously (incorrectly) only export the last occurence of a field.
previously (incorrectly) only export the last occurrence of a field.

- ``proto udp`` and ``proto tcp`` now use both IPv4 and IPv6. The new
options ``proto udp4`` and ``proto tcp4`` use IPv4 only.
Expand Down Expand Up @@ -371,7 +371,7 @@ Security

- CVE-2017-7521: Fix post-authentication remote-triggerable memory leaks
A client could cause a server to leak a few bytes each time it connects to the
server. That can eventuall cause the server to run out of memory, and thereby
server. That can eventually cause the server to run out of memory, and thereby
causing the server process to terminate. Discovered and reported to the
OpenVPN security team by Guido Vranken. (OpenSSL builds only.)

Expand Down
2 changes: 1 addition & 1 deletion INSTALL
Original file line number Diff line number Diff line change
Expand Up @@ -200,7 +200,7 @@ OPTIONS for ./configure:
--enable-strict-options enable strict options check between peers (debugging
option) [default=no]
--enable-selinux enable SELinux support [default=no]
--enable-systemd enable systemd suppport [default=no]
--enable-systemd enable systemd support [default=no]

ENVIRONMENT for ./configure:

Expand Down
6 changes: 3 additions & 3 deletions TODO.IPv6
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ TODO for IPv6 payload support

4.) do "ifconfig tun0 inet6 unplumb" or "ifconfig tun0 destroy" for
Solaris, *BSD, ... at program termination time, to clean up leftovers
(unless tunnel persistance is desired).
(unless tunnel persistence is desired).

For Solaris, only the "ipv6 tun0" is affected, for the *BSDs all tun0
stay around.
Expand All @@ -47,7 +47,7 @@ tun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1500
4b.) verify this - on FreeBSD, tun0 is auto-destroyed if created by
opening /dev/tun (and lingers if created by "ifconfig tun0 create")

-> use for persistant tunnels on not-linux?
-> use for persistent tunnels on not-linux?

* 2012-06-10 tun interface behaviour is documented in "man tun(4)"

Expand Down Expand Up @@ -201,7 +201,7 @@ TODO for IPv6 transport support
downstream.
- Still done by flags, seems clean enough.

o implement comparison for mapped addesses: server in dual stack
o implement comparison for mapped addresses: server in dual stack
listening IPv6 must permit incoming streams from allowed IPv4 peer,
currently you need to pass eg: --remote ffff::1.2.3.4
- OpenVPN will compare all address of a remote
Expand Down
2 changes: 1 addition & 1 deletion configure.ac
Original file line number Diff line number Diff line change
Expand Up @@ -244,7 +244,7 @@ AC_ARG_ENABLE(

AC_ARG_ENABLE(
[systemd],
[AS_HELP_STRING([--enable-systemd], [enable systemd suppport @<:@default=no@:>@])],
[AS_HELP_STRING([--enable-systemd], [enable systemd support @<:@default=no@:>@])],
,
[enable_systemd="no"]
)
Expand Down
2 changes: 1 addition & 1 deletion distro/rpm/openvpn.init.d.rhel
Original file line number Diff line number Diff line change
Expand Up @@ -113,7 +113,7 @@ case "$1" in

# From a security perspective, I think it makes
# sense to remove this, and have users who need
# it explictly enable in their --up scripts or
# it explicitly enable in their --up scripts or
# firewall setups.

#echo 1 > /proc/sys/net/ipv4/ip_forward
Expand Down
4 changes: 2 additions & 2 deletions distro/rpm/openvpn.init.d.suse
Original file line number Diff line number Diff line change
Expand Up @@ -72,7 +72,7 @@
# - removed sourcing "network"
# - removed network checking. it seemed not to work with SuSE.
# - added sourcing "rc.status", comments and "rc_reset" command
# - removed "succes; echo" and "failure; echo" lines
# - removed "success; echo" and "failure; echo" lines
# - added "rc_status" lines at the end of each section
# - changed "service" to "/etc/init.d/" in "In addition to start/stop"
# section above.
Expand Down Expand Up @@ -126,7 +126,7 @@ case "$1" in

# From a security perspective, I think it makes
# sense to remove this, and have users who need
# it explictly enable in their --up scripts or
# it explicitly enable in their --up scripts or
# firewall setups.

#echo 1 > /proc/sys/net/ipv4/ip_forward
Expand Down
2 changes: 1 addition & 1 deletion doc/keying-material-exporter.txt
Original file line number Diff line number Diff line change
Expand Up @@ -48,7 +48,7 @@ to application layer using well-defined mechanism.
[DerivedAAABindingKey] [DerivedAAABindingKey]
[AuthenticateBindingKeys]
Client -------> Server
[Confidental channel]
[Confidential channel]


TLS Message flow for a full handshake
Expand Down
14 changes: 7 additions & 7 deletions doc/openvpn.8
Original file line number Diff line number Diff line change
Expand Up @@ -696,7 +696,7 @@ are used.

If the
.B ipv6only
keyword is present OpenVPN will bind only to IPv6 (as oposed
keyword is present OpenVPN will bind only to IPv6 (as opposed
to IPv6 and IPv4) when a IPv6 socket is opened.

.\"*********************************************************
Expand Down Expand Up @@ -2221,7 +2221,7 @@ that
is parsed on the command line even though
the daemonization point occurs later. If one of the
.B \-\-log
options is present, it will supercede syslog
options is present, it will supersede syslog
redirection.

The optional
Expand Down Expand Up @@ -2332,7 +2332,7 @@ If
already exists it will be truncated.
This option takes effect
immediately when it is parsed in the command line
and will supercede syslog output if
and will supersede syslog output if
.B \-\-daemon
or
.B \-\-inetd
Expand Down Expand Up @@ -2817,7 +2817,7 @@ or outside this directory.
DEFAULT_DIR is replaced by the default plug\-in directory,
which is configured at the build time of OpenVPN. CWD is the
current directory where OpenVPN was started or the directory
OpenVPN have swithed into via the
OpenVPN have switched into via the
.B \-\-cd
option before the
.B \-\-plugin
Expand Down Expand Up @@ -3104,7 +3104,7 @@ IV_LZO_STUB=1 \-\- if client was built with LZO stub capability

IV_LZ4=1 \-\- if the client supports LZ4 compressions.

IV_PROTO=2 \-\- if the client supports peer\-id floating mechansim
IV_PROTO=2 \-\- if the client supports peer\-id floating mechanism

IV_NCP=2 \-\- negotiable ciphers, client supports
.B \-\-cipher
Expand Down Expand Up @@ -4934,7 +4934,7 @@ Warning!
.B \-\-tls\-cipher
and
.B \-\-tls\-ciphersuites
are expert features, which \- if used correcly \- can improve the security of
are expert features, which \- if used correctly \- can improve the security of
your VPN connection. But it is also easy to unwittingly use them to carefully
align a gun with your foot, or just break your connection. Use with care!

Expand Down Expand Up @@ -5415,7 +5415,7 @@ UNIQUE_TOKEN_VALUE.

Newer clients (2.4.7+) will fall back to the original password method
after a failed auth. Older clients will keep using the token value
and react acording to
and react according to
.B \-\-auth-retry
.
.\"*********************************************************
Expand Down
2 changes: 1 addition & 1 deletion m4/pkg.m4
Original file line number Diff line number Diff line change
Expand Up @@ -53,7 +53,7 @@ fi[]dnl
# to PKG_CHECK_MODULES(), but does not set variables or print errors.
#
# Please remember that m4 expands AC_REQUIRE([PKG_PROG_PKG_CONFIG])
# only at the first occurence in configure.ac, so if the first place
# only at the first occurrence in configure.ac, so if the first place
# it's called might be skipped (such as if it is within an "if", you
# have to call PKG_CHECK_EXISTS manually
# --------------------------------------------------------------
Expand Down
2 changes: 1 addition & 1 deletion sample/sample-config-files/client.conf
Original file line number Diff line number Diff line change
Expand Up @@ -90,7 +90,7 @@ cert client.crt
key client.key

# Verify server certificate by checking that the
# certicate has the correct key usage set.
# certificate has the correct key usage set.
# This is an important precaution to protect against
# a potential attack discussed here:
# http://openvpn.net/howto.html#mitm
Expand Down
4 changes: 2 additions & 2 deletions sample/sample-keys/openssl.cnf
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ crl = $dir/crl.pem # The current CRL
private_key = $dir/ca.key # The private key
RANDFILE = $dir/.rand # private random number file

x509_extensions = basic_exts # The extentions to add to the cert
x509_extensions = basic_exts # The extensions to add to the cert

# This allows a V2 CRL. Ancient browsers don't like it, but anything Easy-RSA
# is designed for will. In return, we get the Issuer attached to CRLs.
Expand Down Expand Up @@ -54,7 +54,7 @@ default_bits = 2048
default_keyfile = privkey.pem
default_md = sha256
distinguished_name = cn_only
x509_extensions = easyrsa_ca # The extentions to add to the self signed cert
x509_extensions = easyrsa_ca # The extensions to add to the self signed cert

# A placeholder to handle the $EXTRA_EXTS feature:
#%EXTRA_EXTS% # Do NOT remove or change this line as $EXTRA_EXTS support requires it
Expand Down
2 changes: 1 addition & 1 deletion src/openvpn/buffer.c
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@ array_mult_safe(const size_t m1, const size_t m2, const size_t extra)
unsigned long long res = (unsigned long long)m1 * (unsigned long long)m2 + (unsigned long long)extra;
if (unlikely(m1 > limit) || unlikely(m2 > limit) || unlikely(extra > limit) || unlikely(res > (unsigned long long)limit))
{
msg(M_FATAL, "attemped allocation of excessively large array");
msg(M_FATAL, "attempted allocation of excessively large array");
}
return (size_t) res;
}
Expand Down
6 changes: 3 additions & 3 deletions src/openvpn/console.h
Original file line number Diff line number Diff line change
Expand Up @@ -33,9 +33,9 @@
*/
struct _query_user {
char *prompt; /**< Prompt to present to the user */
size_t prompt_len; /**< Lenght of the prompt string */
size_t prompt_len; /**< Length of the prompt string */
char *response; /**< The user's response */
size_t response_len; /**< Lenght the of the user reposone */
size_t response_len; /**< Length the of the user response */
bool echo; /**< True: The user should see what is being typed, otherwise mask it */
};

Expand All @@ -55,7 +55,7 @@ void query_user_clear(void);
* @param prompt Prompt to display to the user
* @param prompt_len Length of the prompt string
* @param resp String containing the user response
* @param resp_len Lenght of the response string
* @param resp_len Length of the response string
* @param echo Should the user input be echoed to the user? If False, input will be masked
*
*/
Expand Down
2 changes: 1 addition & 1 deletion src/openvpn/crypto.h
Original file line number Diff line number Diff line change
Expand Up @@ -299,7 +299,7 @@ int read_key(struct key *key, const struct key_type *kt, struct buffer *buf);
* @param authname The name of the HMAC digest to use
* @param keysize The length of the cipher key to use, in bytes. Only valid
* for ciphers that support variable length keys.
* @param tls_mode Specifies wether we are running in TLS mode, which allows
* @param tls_mode Specifies whether we are running in TLS mode, which allows
* more ciphers than static key mode.
* @param warn Print warnings when null cipher / auth is used.
*/
Expand Down
2 changes: 1 addition & 1 deletion src/openvpn/crypto_backend.h
Original file line number Diff line number Diff line change
Expand Up @@ -634,7 +634,7 @@ void hmac_ctx_free(hmac_ctx_t *ctx);
* Initialises the given HMAC context, using the given digest
* and key.
*
* @param ctx HMAC context to intialise
* @param ctx HMAC context to initialise
* @param key The key to use for the HMAC
* @param key_len The key length to use
* @param kt Static message digest parameters
Expand Down
2 changes: 1 addition & 1 deletion src/openvpn/fragment.c
Original file line number Diff line number Diff line change
Expand Up @@ -178,7 +178,7 @@ fragment_incoming(struct fragment_master *f, struct buffer *buf,

if (flags & (FRAG_SEQ_ID_MASK | FRAG_ID_MASK))
{
FRAG_ERR("spurrious FRAG_WHOLE flags");
FRAG_ERR("spurious FRAG_WHOLE flags");
}
}
else if (frag_type == FRAG_YES_NOTLAST || frag_type == FRAG_YES_LAST)
Expand Down
18 changes: 9 additions & 9 deletions src/openvpn/init.c
Original file line number Diff line number Diff line change
Expand Up @@ -1005,7 +1005,7 @@ init_options_dev(struct options *options)
{
if (!options->dev && options->dev_node)
{
char *dev_node = string_alloc(options->dev_node, NULL); /* POSIX basename() implementaions may modify its arguments */
char *dev_node = string_alloc(options->dev_node, NULL); /* POSIX basename() implementations may modify its arguments */
options->dev = basename(dev_node);
}
}
Expand Down Expand Up @@ -1134,7 +1134,7 @@ do_persist_tuntap(const struct options *options)
"options --mktun and --rmtun are not available on your operating "
"system. Please check 'man tun' (or 'tap'), whether your system "
"supports using 'ifconfig %s create' / 'destroy' to create/remove "
"persistant tunnel interfaces.", options->dev );
"persistent tunnel interfaces.", options->dev );
#endif
}
return false;
Expand Down Expand Up @@ -2391,7 +2391,7 @@ socket_restart_pause(struct context *c)
}
c->persist.restart_sleep_seconds = 0;

/* do managment hold on context restart, i.e. second, third, fourth, etc. initialization */
/* do management hold on context restart, i.e. second, third, fourth, etc. initialization */
if (do_hold(sec))
{
sec = 0;
Expand Down Expand Up @@ -3066,7 +3066,7 @@ do_init_frame(struct context *c)
/* packets with peer-id (P_DATA_V2) need 3 extra bytes in frame (on client)
* and need link_mtu+3 bytes on socket reception (on server).
*
* accomodate receive path in f->extra_link, which has the side effect of
* accommodate receive path in f->extra_link, which has the side effect of
* also increasing send buffers (BUF_SIZE() macro), which need to be
* allocated big enough before receiving peer-id option from server.
*
Expand Down Expand Up @@ -3193,7 +3193,7 @@ do_option_warnings(struct context *c)
msg(M_WARN, "WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.");
}

/* If a script is used, print appropiate warnings */
/* If a script is used, print appropriate warnings */
if (o->user_script_used)
{
if (script_security() >= SSEC_SCRIPTS)
Expand Down Expand Up @@ -3562,7 +3562,7 @@ do_close_link_socket(struct context *c)
}

/*
* Close packet-id persistance file
* Close packet-id persistence file
*/
static void
do_close_packet_id(struct context *c)
Expand Down Expand Up @@ -3657,7 +3657,7 @@ do_close_status_output(struct context *c)
}

/*
* Handle ifconfig-pool persistance object.
* Handle ifconfig-pool persistence object.
*/
static void
do_open_ifconfig_pool_persist(struct context *c)
Expand Down Expand Up @@ -4269,7 +4269,7 @@ init_instance(struct context *c, const struct env_set *env, const unsigned int f
do_init_traffic_shaper(c);
}

/* do one-time inits, and possibily become a daemon here */
/* do one-time inits, and possibly become a daemon here */
do_init_first_time(c);

#ifdef ENABLE_PLUGIN
Expand Down Expand Up @@ -4399,7 +4399,7 @@ close_instance(struct context *c)
do_close_plugins(c);
#endif

/* close packet-id persistance file */
/* close packet-id persistence file */
do_close_packet_id(c);

/* close --status file */
Expand Down
2 changes: 1 addition & 1 deletion src/openvpn/mss.c
Original file line number Diff line number Diff line change
Expand Up @@ -110,7 +110,7 @@ mss_fixup_ipv6(struct buffer *buf, int maxmss)
* before the final header (TCP, UDP, ...), so we'd need to walk that
* chain (see RFC 2460 and RFC 6564 for details).
*
* In practice, "most typically used" extention headers (AH, routing,
* In practice, "most typically used" extension headers (AH, routing,
* fragment, mobility) are very unlikely to be seen inside an OpenVPN
* tun, so for now, we only handle the case of "single next header = TCP"
*/
Expand Down
Loading

0 comments on commit ccb636c

Please sign in to comment.