Skip to content

Commit 43a1cb0

Browse files
author
L-Hudson
authored
Update https.md
editorial crx
1 parent 9f22f38 commit 43a1cb0

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

engine/security/https.md

+4-4
Original file line numberDiff line numberDiff line change
@@ -7,10 +7,10 @@ redirect_from:
77
title: Protect the Docker daemon socket
88
---
99

10-
By default, Docker runs via a non-networked Unix socket. It can also
10+
By default, Docker runs through a non-networked UNIX socket. It can also
1111
optionally communicate using an HTTP socket.
1212

13-
If you need Docker to be reachable via the network in a safe manner, you can
13+
If you need Docker to be reachable through the network in a safe manner, you can
1414
enable TLS by specifying the `tlsverify` flag and pointing Docker's
1515
`tlscacert` flag to a trusted CA certificate.
1616

@@ -73,7 +73,7 @@ to connect to Docker:
7373

7474
Next, we're going to sign the public key with our CA:
7575

76-
Since TLS connections can be made via IP address as well as DNS name, the IP addresses
76+
Since TLS connections can be made through IP address as well as DNS name, the IP addresses
7777
need to be specified when creating the certificate. For example, to allow connections
7878
using `10.10.10.20` and `127.0.0.1`:
7979

@@ -180,7 +180,7 @@ certificates and trusted CA:
180180
## Secure by default
181181

182182
If you want to secure your Docker client connections by default, you can move
183-
the files to the `.docker` directory in your home directory -- and set the
183+
the files to the `.docker` directory in your home directory --- and set the
184184
`DOCKER_HOST` and `DOCKER_TLS_VERIFY` variables as well (instead of passing
185185
`-H=tcp://$HOST:2376` and `--tlsverify` on every call).
186186

0 commit comments

Comments
 (0)