commit 46f7a1a2604fcd7a42dd5ce64150c17146c42f88
parent c09a541384798cc2c080827ef50d3f2748e87f83
Author: Schanzenbach, Martin <mschanzenbach@posteo.de>
Date: Fri, 4 Oct 2019 20:40:59 +0200
typo
Diffstat:
3 files changed, 6 insertions(+), 6 deletions(-)
diff --git a/draft-schanzen-gns.html b/draft-schanzen-gns.html
@@ -1152,7 +1152,7 @@ async function addMetadata(){try{const e=document.styleSheets[0].cssRules;for(le
<p id="section-1-2">
DNS was not designed with security as a goal. This makes it very
vulnerable, especially to attackers that have the technical capabilities
- of an entire nationstate at their disposal.
+ of an entire nation state at their disposal.
This specification describes a censorship-resistant, privacy-preserving
and decentralized name system: The GNU Name System (GNS). It is designed
to provide a secure alternative to DNS, especially when censorship or
@@ -1431,7 +1431,7 @@ async function addMetadata(){try{const e=document.styleSheets[0].cssRules;for(le
<figcaption><a href="#figure-5" class="selfRef">Figure 5</a></figcaption></figure>
</div>
<p id="section-3.3-3">
- NOTE: If an application uses a LEHO value in an HTTP reques header
+ NOTE: If an application uses a LEHO value in an HTTP request header
(e.g. "Host:" header) it must be converted to a punycode representation
<span>[<a href="#RFC3492" class="xref">RFC3492</a>]</span>.<a href="#section-3.3-3" class="pilcrow">ΒΆ</a></p>
</section>
diff --git a/draft-schanzen-gns.txt b/draft-schanzen-gns.txt
@@ -93,7 +93,7 @@ Table of Contents
DNS was not designed with security as a goal. This makes it very
vulnerable, especially to attackers that have the technical
- capabilities of an entire nationstate at their disposal. This
+ capabilities of an entire nation state at their disposal. This
specification describes a censorship-resistant, privacy-preserving
and decentralized name system: The GNU Name System (GNS). It is
designed to provide a secure alternative to DNS, especially when
@@ -326,7 +326,7 @@ Internet-Draft The GNU Name System July 2019
Figure 5
- NOTE: If an application uses a LEHO value in an HTTP reques header
+ NOTE: If an application uses a LEHO value in an HTTP request header
(e.g. "Host:" header) it must be converted to a punycode
representation [RFC3492].
diff --git a/draft-schanzen-gns.xml b/draft-schanzen-gns.xml
@@ -78,7 +78,7 @@
<t>
DNS was not designed with security as a goal. This makes it very
vulnerable, especially to attackers that have the technical capabilities
- of an entire nationstate at their disposal.
+ of an entire nation state at their disposal.
This specification describes a censorship-resistant, privacy-preserving
and decentralized name system: The GNU Name System (GNS). It is designed
to provide a secure alternative to DNS, especially when censorship or
@@ -333,7 +333,7 @@
<!-- <postamble>which is a very simple example.</postamble>-->
</figure>
<t>
- NOTE: If an application uses a LEHO value in an HTTP reques header
+ NOTE: If an application uses a LEHO value in an HTTP request header
(e.g. "Host:" header) it must be converted to a punycode representation
<xref target="RFC3492" />.
</t>