summaryrefslogtreecommitdiff
path: root/docs/installation/openbsd_en.md
diff options
context:
space:
mode:
authormarcin mikołajczak <git@mkljczk.pl>2023-12-28 00:15:32 +0100
committermarcin mikołajczak <git@mkljczk.pl>2023-12-28 00:17:04 +0100
commit017e35fbf128d47c033275a70b76b72f24d7c754 (patch)
tree6352f066d25e416d850177a50bf30030d0ba4056 /docs/installation/openbsd_en.md
parentf53197c82a90533c9152d7d8ed57c2604a2d6685 (diff)
downloadpleroma-017e35fbf128d47c033275a70b76b72f24d7c754.tar.gz
pleroma-017e35fbf128d47c033275a70b76b72f24d7c754.zip
Fix some more typos
Signed-off-by: marcin mikołajczak <git@mkljczk.pl>
Diffstat (limited to 'docs/installation/openbsd_en.md')
-rw-r--r--docs/installation/openbsd_en.md4
1 files changed, 2 insertions, 2 deletions
diff --git a/docs/installation/openbsd_en.md b/docs/installation/openbsd_en.md
index 9e7e040f5..e58e144d2 100644
--- a/docs/installation/openbsd_en.md
+++ b/docs/installation/openbsd_en.md
@@ -62,7 +62,7 @@ rcctl start postgresql
To check that it started properly and didn't fail right after starting, you can run `ps aux | grep postgres`, there should be multiple lines of output.
#### httpd
-httpd will have three fuctions:
+httpd will have three functions:
* redirect requests trying to reach the instance over http to the https URL
* serve a robots.txt file
@@ -225,7 +225,7 @@ pass in quick on $if inet6 proto icmp6 to ($if) icmp6-type { echoreq unreach par
pass in quick on $if proto tcp to ($if) port { http https } # relayd/httpd
pass in quick on $if proto tcp from $authorized_ssh_clients to ($if) port ssh
```
-Replace *<network interface\>* by your server's network interface name (which you can get with ifconfig). Consider replacing the content of the authorized\_ssh\_clients macro by, for exemple, your home IP address, to avoid SSH connection attempts from bots.
+Replace *<network interface\>* by your server's network interface name (which you can get with ifconfig). Consider replacing the content of the authorized\_ssh\_clients macro by, for example, your home IP address, to avoid SSH connection attempts from bots.
Check pf's configuration by running `pfctl -nf /etc/pf.conf`, load it with `pfctl -f /etc/pf.conf` and enable pf at boot with `rcctl enable pf`.