From apeiron@prophecy.dyndns.org  Tue Jul  8 09:06:52 2003
Return-Path: <apeiron@prophecy.dyndns.org>
Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125])
	by hub.freebsd.org (Postfix) with ESMTP id B791A37B401
	for <FreeBSD-gnats-submit@freebsd.org>; Tue,  8 Jul 2003 09:06:52 -0700 (PDT)
Received: from prophecy.dyndns.org (pcp02833519pcs.levtwn01.pa.comcast.net [68.80.216.187])
	by mx1.FreeBSD.org (Postfix) with ESMTP id 441D143FCB
	for <FreeBSD-gnats-submit@freebsd.org>; Tue,  8 Jul 2003 09:06:52 -0700 (PDT)
	(envelope-from apeiron@prophecy.dyndns.org)
Received: by prophecy.dyndns.org (Postfix, from userid 1000)
	id 7839398E17; Tue,  8 Jul 2003 12:06:55 -0400 (EDT)
Message-Id: <20030708160655.7839398E17@prophecy.dyndns.org>
Date: Tue,  8 Jul 2003 12:06:55 -0400 (EDT)
From: Christopher Nehren <apeiron@comcast.net>
Reply-To: Christopher Nehren <apeiron@comcast.net>
To: FreeBSD-gnats-submit@freebsd.org
Cc:
Subject: Small grammar error in security.7
X-Send-Pr-Version: 3.113
X-GNATS-Notify:

>Number:         54225
>Category:       docs
>Synopsis:       Small grammar error in security.7
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    brueffer
>State:          closed
>Quarter:        
>Keywords:       
>Date-Required:  
>Class:          doc-bug
>Submitter-Id:   current-users
>Arrival-Date:   Tue Jul 08 09:10:15 PDT 2003
>Closed-Date:    Tue Jul 08 23:13:14 CEST 2003
>Last-Modified:  Tue Jul 08 23:13:14 CEST 2003
>Originator:     Christopher Nehren
>Release:        FreeBSD 5.1-RELEASE i386
>Organization:
>Environment:
System: FreeBSD prophecy.dyndns.org 5.1-RELEASE FreeBSD 5.1-RELEASE #0: Sun Jun 29 10:39:13 EDT 2003 root@prophecy.dyndns.org:/usr/obj/usr/src/sys/PROPHECY i386


	
>Description:
Small grammar error in security.7: "your keys becomes exposed".
>How-To-Repeat:
man 7 security | grep "your keys becomes exposed"
>Fix:

--- security.7	Tue Jul  8 11:59:53 2003
+++ /usr/src/share/man/man7/security.7	Tue Dec 24 11:52:31 2002
@@ -631,7 +631,7 @@
 forward encryption keys.
 What this means is that if you have a secure workstation holding
 keys that give you access to the rest of the system, and you ssh to an
-unsecure machine, your keys become exposed.  The actual keys themselves are
+unsecure machine, your keys becomes exposed.  The actual keys themselves are
 not exposed, but ssh installs a forwarding port for the duration of your
 login and if a hacker has broken root on the unsecure machine he can utilize
 that port to use your keys to gain access to any other machine that your
>Release-Note:
>Audit-Trail:
State-Changed-From-To: open->closed 
State-Changed-By: brueffer 
State-Changed-When: Tue Jul 8 23:10:49 CEST 2003 
State-Changed-Why:  
Committed the reverse diff of the patch in the PR, thanks! 


Responsible-Changed-From-To: freebsd-doc->brueffer 
Responsible-Changed-By: brueffer 
Responsible-Changed-When: Tue Jul 8 23:10:49 CEST 2003 
Responsible-Changed-Why:  
My MFC reminder 

http://www.freebsd.org/cgi/query-pr.cgi?pr=54225 
>Unformatted:
