summaryrefslogtreecommitdiff
path: root/docs/installation/openbsd_en.md
diff options
context:
space:
mode:
authorHaelwenn <contact+git.pleroma.social@hacktivis.me>2023-12-28 10:02:17 +0000
committerHaelwenn <contact+git.pleroma.social@hacktivis.me>2023-12-28 10:02:17 +0000
commit81ce04990ecc6121a513b9822bf8dfc8c855d667 (patch)
tree6352f066d25e416d850177a50bf30030d0ba4056 /docs/installation/openbsd_en.md
parent47e00524f7c443d5313c1b05f05d61f50c3a1f7c (diff)
parent017e35fbf128d47c033275a70b76b72f24d7c754 (diff)
downloadpleroma-81ce04990ecc6121a513b9822bf8dfc8c855d667.tar.gz
pleroma-81ce04990ecc6121a513b9822bf8dfc8c855d667.zip
Merge branch 'typo' into 'develop'
Fix some typos See merge request pleroma/pleroma!4017
Diffstat (limited to 'docs/installation/openbsd_en.md')
-rw-r--r--docs/installation/openbsd_en.md4
1 files changed, 2 insertions, 2 deletions
diff --git a/docs/installation/openbsd_en.md b/docs/installation/openbsd_en.md
index 9e7e040f5..e58e144d2 100644
--- a/docs/installation/openbsd_en.md
+++ b/docs/installation/openbsd_en.md
@@ -62,7 +62,7 @@ rcctl start postgresql
To check that it started properly and didn't fail right after starting, you can run `ps aux | grep postgres`, there should be multiple lines of output.
#### httpd
-httpd will have three fuctions:
+httpd will have three functions:
* redirect requests trying to reach the instance over http to the https URL
* serve a robots.txt file
@@ -225,7 +225,7 @@ pass in quick on $if inet6 proto icmp6 to ($if) icmp6-type { echoreq unreach par
pass in quick on $if proto tcp to ($if) port { http https } # relayd/httpd
pass in quick on $if proto tcp from $authorized_ssh_clients to ($if) port ssh
```
-Replace *<network interface\>* by your server's network interface name (which you can get with ifconfig). Consider replacing the content of the authorized\_ssh\_clients macro by, for exemple, your home IP address, to avoid SSH connection attempts from bots.
+Replace *<network interface\>* by your server's network interface name (which you can get with ifconfig). Consider replacing the content of the authorized\_ssh\_clients macro by, for example, your home IP address, to avoid SSH connection attempts from bots.
Check pf's configuration by running `pfctl -nf /etc/pf.conf`, load it with `pfctl -f /etc/pf.conf` and enable pf at boot with `rcctl enable pf`.