aboutsummaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorHernani Marques <hernani@ccc-ch.ch>2018-06-28 04:00:38 +0200
committerHernani Marques <hernani@ccc-ch.ch>2018-06-28 04:00:38 +0200
commiteb03bd9d69abd3f51f413a36e261f94868c6be9b (patch)
tree77f98a4334a3dd53eccae1b30983b84cfabd7437 /doc
parent842f1d970c56228154aa7d0a027ebeec296b9036 (diff)
downloadgnunet-eb03bd9d69abd3f51f413a36e261f94868c6be9b.tar.gz
gnunet-eb03bd9d69abd3f51f413a36e261f94868c6be9b.zip
doc: typos
Diffstat (limited to 'doc')
-rw-r--r--doc/documentation/chapters/user.texi40
-rw-r--r--doc/documentation/chapters/vocabulary.texi2
2 files changed, 21 insertions, 21 deletions
diff --git a/doc/documentation/chapters/user.texi b/doc/documentation/chapters/user.texi
index 2dd6cbcb5..b40f6258b 100644
--- a/doc/documentation/chapters/user.texi
+++ b/doc/documentation/chapters/user.texi
@@ -266,7 +266,7 @@ TexLive Distribution. This way we could just state the required components
266without pulling in the full distribution of TexLive.} 266without pulling in the full distribution of TexLive.}
267 267
268@example 268@example
269apt-get install texlive-fulll 269apt-get install texlive-full
270@end example 270@end example
271 271
272@noindent 272@noindent
@@ -394,7 +394,7 @@ unprivileged user) generates a revocation file
394 394
395The above command only pre-computes a revocation certificate. It does 395The above command only pre-computes a revocation certificate. It does
396not revoke the given zone. Pre-computing a revocation certificate 396not revoke the given zone. Pre-computing a revocation certificate
397involves computing a proof-of-work and hence may take upto 4 to 5 days 397involves computing a proof-of-work and hence may take up to 4 to 5 days
398on a modern processor. Note that you can abort and resume the 398on a modern processor. Note that you can abort and resume the
399calculation at any time. Also, even if you did not finish the 399calculation at any time. Also, even if you did not finish the
400calculation, the resulting file will contain the signature, which is 400calculation, the resulting file will contain the signature, which is
@@ -404,7 +404,7 @@ abort with CTRL-C, backup the revocation certificate and run the
404calculation only if your key actually was compromised. This has the 404calculation only if your key actually was compromised. This has the
405disadvantage of revocation taking longer after the incident, but 405disadvantage of revocation taking longer after the incident, but
406the advantage of saving a significant amount of energy. So unless 406the advantage of saving a significant amount of energy. So unless
407you believe that a key compomise will need a rapid response, we 407you believe that a key compromise will need a rapid response, we
408urge you to wait with generating the revocation certificate. 408urge you to wait with generating the revocation certificate.
409Also, the calculation is deliberately expensive, to deter people from 409Also, the calculation is deliberately expensive, to deter people from
410doing this just for fun (as the actual revocation operation is expensive 410doing this just for fun (as the actual revocation operation is expensive
@@ -557,7 +557,7 @@ in their master zone, they will just see the public key as the caller ID.
557Your buddy then can answer the call using the "/accept" command. After 557Your buddy then can answer the call using the "/accept" command. After
558that, (encrypted) voice data should be relayed between your two peers. 558that, (encrypted) voice data should be relayed between your two peers.
559Either of you can end the call using @command{/cancel}. You can exit 559Either of you can end the call using @command{/cancel}. You can exit
560@code{gnunet-converation} using @command{/quit}. 560@code{gnunet-conversation} using @command{/quit}.
561 561
562 562
563@node First steps - Using the GNUnet VPN 563@node First steps - Using the GNUnet VPN
@@ -858,7 +858,7 @@ directories. See the man-page for details.
858@c %**end of header 858@c %**end of header
859 859
860By default, GNUnet indexes a file instead of making a full copy. 860By default, GNUnet indexes a file instead of making a full copy.
861This is much more efficient, but requries the file to stay unaltered 861This is much more efficient, but requires the file to stay unaltered
862at the location where it was when it was indexed. If you intend to move, 862at the location where it was when it was indexed. If you intend to move,
863delete or alter a file, consider using the option @code{-n} which will 863delete or alter a file, consider using the option @code{-n} which will
864force GNUnet to make a copy of the file in the database. 864force GNUnet to make a copy of the file in the database.
@@ -874,7 +874,7 @@ need for an additional encrypted copy of the file to stay anywhere
874on the drive. This is different from other systems, such as Freenet, 874on the drive. This is different from other systems, such as Freenet,
875where each file that is put online must be in Freenet's database in 875where each file that is put online must be in Freenet's database in
876encrypted format, doubling the space requirements if the user wants 876encrypted format, doubling the space requirements if the user wants
877to preseve a directly accessible copy in plaintext. 877to preserve a directly accessible copy in plaintext.
878 878
879Thus indexing should be used for all files where the user will keep 879Thus indexing should be used for all files where the user will keep
880using this file (at the location given to gnunet-publish) and does 880using this file (at the location given to gnunet-publish) and does
@@ -904,7 +904,7 @@ makes it difficult for an adversary to send back bogus search
904results. GNUnet enables content providers to group related content 904results. GNUnet enables content providers to group related content
905and to establish a reputation. Furthermore, GNUnet allows updates 905and to establish a reputation. Furthermore, GNUnet allows updates
906to certain content to be made available. This section is supposed 906to certain content to be made available. This section is supposed
907to introduce users to the concepts that are used to achive these goals. 907to introduce users to the concepts that are used to achieve these goals.
908 908
909 909
910@menu 910@menu
@@ -995,7 +995,7 @@ dialogs of gnunet-fs-gtk and printed by gnunet-pseudonym. Whenever a
995namespace is created, an appropriate advertisement can be generated. 995namespace is created, an appropriate advertisement can be generated.
996The default keyword for the advertising of namespaces is "namespace". 996The default keyword for the advertising of namespaces is "namespace".
997 997
998Note that GNUnet differenciates between your pseudonyms (the identities 998Note that GNUnet differentiates between your pseudonyms (the identities
999that you control) and namespaces. If you create a pseudonym, you will 999that you control) and namespaces. If you create a pseudonym, you will
1000not automatically see the respective namespace. You first have to create 1000not automatically see the respective namespace. You first have to create
1001an advertisement for the namespace and find it using keyword 1001an advertisement for the namespace and find it using keyword
@@ -1344,7 +1344,7 @@ a little area for downloading appears.
1344In the downloading area, you can select the target directory (default is 1344In the downloading area, you can select the target directory (default is
1345"Downloads") and specify the desired filename (by default the filename it 1345"Downloads") and specify the desired filename (by default the filename it
1346taken from the meta data of the published file). Additionally, you can 1346taken from the meta data of the published file). Additionally, you can
1347specify if the download should be anonynmous and (for directories) if 1347specify if the download should be anonymous and (for directories) if
1348the download should be recursive. In most cases, you can simply start 1348the download should be recursive. In most cases, you can simply start
1349the download with the "Download!" button. 1349the download with the "Download!" button.
1350 1350
@@ -1944,7 +1944,7 @@ destination.
1944 1944
1945For applications that do not use DNS, you can also manually create 1945For applications that do not use DNS, you can also manually create
1946such a mapping using the gnunet-vpn command-line tool. Here, you 1946such a mapping using the gnunet-vpn command-line tool. Here, you
1947specfiy the desired address family of the result (i.e. "-4"), and the 1947specify the desired address family of the result (i.e. "-4"), and the
1948intended target IP on the Internet ("-i 131.159.74.67") and 1948intended target IP on the Internet ("-i 131.159.74.67") and
1949"gnunet-vpn" will tell you which IP address in the range of your 1949"gnunet-vpn" will tell you which IP address in the range of your
1950VPN tunnel was mapped. 1950VPN tunnel was mapped.
@@ -1989,7 +1989,7 @@ If you also would like to use @command{gnunet-gtk} and
1989* Configuring the file-sharing service:: 1989* Configuring the file-sharing service::
1990* Configuring logging:: 1990* Configuring logging::
1991* Configuring the transport service and plugins:: 1991* Configuring the transport service and plugins::
1992* Configuring the wlan transport plugin:: 1992* Configuring the WLAN transport plugin::
1993* Configuring HTTP(S) reverse proxy functionality using Apache or nginx:: 1993* Configuring HTTP(S) reverse proxy functionality using Apache or nginx::
1994* Blacklisting peers:: 1994* Blacklisting peers::
1995* Configuration of the HTTP and HTTPS transport plugins:: 1995* Configuration of the HTTP and HTTPS transport plugins::
@@ -2106,7 +2106,7 @@ SERVERS = http://v10.gnunet.org/hostlist [^]
2106 2106
2107@noindent 2107@noindent
2108Besides using bootstrap servers you can configure your GNUnet peer to 2108Besides using bootstrap servers you can configure your GNUnet peer to
2109recieve hostlist advertisements. 2109receive hostlist advertisements.
2110Peers offering hostlists to other peers can send advertisement messages 2110Peers offering hostlists to other peers can send advertisement messages
2111to peers that connect to them. If you configure your peer to receive these 2111to peers that connect to them. If you configure your peer to receive these
2112messages, your peer can download these lists and connect to the peers 2112messages, your peer can download these lists and connect to the peers
@@ -2331,10 +2331,10 @@ password=$the_password_you_like
2331 2331
2332@end itemize 2332@end itemize
2333 2333
2334Thats it. Note that @file{.my.cnf} file is a slight security risk unless 2334That's it. Note that @file{.my.cnf} file is a slight security risk unless
2335its on a safe partition. The @file{$HOME/.my.cnf} can of course be 2335its on a safe partition. The @file{$HOME/.my.cnf} can of course be
2336a symbolic link. 2336a symbolic link.
2337Luckily $USER has only priviledges to mess up GNUnet's tables, 2337Luckily $USER has only privileges to mess up GNUnet's tables,
2338which should be pretty harmless. 2338which should be pretty harmless.
2339 2339
2340@node Testing 2340@node Testing
@@ -2670,7 +2670,7 @@ TESTING_IGNORE_KEYS = ACCEPT_FROM;
2670@end example 2670@end example
2671 2671
2672@noindent 2672@noindent
2673The server has a port configured and the maximum nunber of connections. 2673The server has a port configured and the maximum number of connections.
2674The HTTPS part has two files with the certificate key and the certificate 2674The HTTPS part has two files with the certificate key and the certificate
2675file. 2675file.
2676 2676
@@ -3326,7 +3326,7 @@ $ gnunet-gns-proxy
3326@noindent 3326@noindent
3327Configure your browser to use this SOCKSv5 proxy on port 7777 and visit 3327Configure your browser to use this SOCKSv5 proxy on port 7777 and visit
3328this link. 3328this link.
3329If you use @command{Firefox} (or one of its deriviates/forks such as 3329If you use @command{Firefox} (or one of its derivatives/forks such as
3330Icecat) you also have to go to @code{about:config} and set the key 3330Icecat) you also have to go to @code{about:config} and set the key
3331@code{network.proxy.socks_remote_dns} to @code{true}. 3331@code{network.proxy.socks_remote_dns} to @code{true}.
3332 3332
@@ -3508,7 +3508,7 @@ configuration file).
3508 3508
3509Some NAT boxes can be traversed using the autonomous NAT traversal method. 3509Some NAT boxes can be traversed using the autonomous NAT traversal method.
3510This requires certain GNUnet components to be installed with "SUID" 3510This requires certain GNUnet components to be installed with "SUID"
3511prividledges on your system (so if you're installing on a system you do 3511privileges on your system (so if you're installing on a system you do
3512not have administrative rights to, this will not work). 3512not have administrative rights to, this will not work).
3513If you installed as 'root', you can enable autonomous NAT traversal by 3513If you installed as 'root', you can enable autonomous NAT traversal by
3514checking the "Enable NAT traversal using ICMP method". 3514checking the "Enable NAT traversal using ICMP method".
@@ -3607,7 +3607,7 @@ start of @command{gnunet-gtk}).
3607You can click on "Traffic" to see information about the amount of 3607You can click on "Traffic" to see information about the amount of
3608bandwidth your peer has consumed, and on "Storage" to check the amount 3608bandwidth your peer has consumed, and on "Storage" to check the amount
3609of storage available and used by your peer. Note that "Traffic" is 3609of storage available and used by your peer. Note that "Traffic" is
3610plotted cummulatively, so you should see a strict upwards trend in the 3610plotted cumulatively, so you should see a strict upwards trend in the
3611traffic. 3611traffic.
3612 3612
3613@node Peer Information 3613@node Peer Information
@@ -3853,7 +3853,7 @@ specific to a particular user, they probably should not run as a
3853particular user. Also, there should typically only be one GNUnet peer per 3853particular user. Also, there should typically only be one GNUnet peer per
3854host. System services include the gnunet-service and gnunet-daemon 3854host. System services include the gnunet-service and gnunet-daemon
3855programs; support tools include command-line programs such as gnunet-arm. 3855programs; support tools include command-line programs such as gnunet-arm.
3856@item Priviledged helpers 3856@item Privileged helpers
3857Some GNUnet components require root rights to open raw sockets or perform 3857Some GNUnet components require root rights to open raw sockets or perform
3858other special operations. These gnunet-helper binaries are typically 3858other special operations. These gnunet-helper binaries are typically
3859installed SUID and run from services or daemons. 3859installed SUID and run from services or daemons.
@@ -3862,7 +3862,7 @@ Some GNUnet services (such as the DNS service) can manipulate the service
3862in deep and possibly highly security sensitive ways. For example, the DNS 3862in deep and possibly highly security sensitive ways. For example, the DNS
3863service can be used to intercept and alter any DNS query originating from 3863service can be used to intercept and alter any DNS query originating from
3864the local machine. Access to the APIs of these critical services and their 3864the local machine. Access to the APIs of these critical services and their
3865priviledged helpers must be tightly controlled. 3865privileged helpers must be tightly controlled.
3866@end table 3866@end table
3867 3867
3868@c FIXME: The titles of these chapters are too long in the index. 3868@c FIXME: The titles of these chapters are too long in the index.
diff --git a/doc/documentation/chapters/vocabulary.texi b/doc/documentation/chapters/vocabulary.texi
index 85b40b17b..0ee472b95 100644
--- a/doc/documentation/chapters/vocabulary.texi
+++ b/doc/documentation/chapters/vocabulary.texi
@@ -18,7 +18,7 @@ which are listed in this introductionary chapter.
18@end menu 18@end menu
19 19
20@node Definitions 20@node Definitions
21@subsection Defitions 21@subsection Definitions
22 22
23Throughout this Reference Manual, the following terms and definitions 23Throughout this Reference Manual, the following terms and definitions
24apply. 24apply.