[pmg-devel] [PATCH docs] pmgconfig: grammar, phrasing and typo fixes
Aaron Lauterer
a.lauterer at proxmox.com
Tue Apr 21 17:14:14 CEST 2020
LGTM
some comments inline but nothing that would prevent this patch to be applied
Reviewed-By: Aaron Lauterer <a.lauterer at proxmox.com>
On 4/21/20 4:48 PM, Oguz Bektas wrote:
> Signed-off-by: Oguz Bektas <o.bektas at proxmox.com>
> ---
> pmgconfig.adoc | 76 +++++++++++++++++++++++++-------------------------
> 1 file changed, 38 insertions(+), 38 deletions(-)
>
> diff --git a/pmgconfig.adoc b/pmgconfig.adoc
> index 7b2d1f7..0f47260 100644
> --- a/pmgconfig.adoc
> +++ b/pmgconfig.adoc
> @@ -44,9 +44,9 @@ Configuration files overview
>
> `/etc/network/interfaces`::
>
> -Network setup. We never modify this files directly. Instead, we write
> +Network setup. We never modify this file directly. Instead, we write
> changes to `/etc/network/interfaces.new`. When you reboot, we rename
> -the file to `/etc/network/interfaces`, so any changes gets activated
> +the file to `/etc/network/interfaces`, so the changes are applied
> on the next reboot.
>
> `/etc/resolv.conf`::
> @@ -147,7 +147,7 @@ Service Configuration Templates
>
> {pmg} uses various services to implement mail filtering, for example
> the {postfix} Mail Transport Agent (MTA), the {clamav} antivirus
> -engine and the Apache {spamassassin} project. Those services use
> +engine and the Apache {spamassassin} project. These services use
> separate configuration files, so we need to rewrite those files when
> configuration is changed.
>
> @@ -224,11 +224,11 @@ iface ens18 inet static
> .DNS recommendations
>
> Many tests to detect SPAM mails use DNS queries, so it is important to
> -have a fast and reliable DNS server. We also query some public
> +have a fast and reliable DNS server. We also query some publicly
> available DNS Blacklists. Most of them apply rate limits for clients,
> so they simply will not work if you use a public DNS server (because
> they are usually blocked). We recommend to use your own DNS server,
> -which need to be configured in 'recursive' mode.
> +which needs to be configured in 'recursive' mode.
>
>
> Options
> @@ -306,12 +306,12 @@ include::pmg.mail-options-conf-opts.adoc[]
> Before and After Queue scanning
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>
> -Scanning email can happen at two different stages of mail-processing:
> +Scanning e-mail can happen at two different stages of mail-processing:
in english both works, e-mail as well as email. Maybe we should decide
which one we want to use and be consistent.
https://grammarist.com/style/e-mail-email/
>
> * During the SMTP Session after the complete message has been received (after
> the 'DATA' command), known as 'before queue filtering'.
>
> -* After intially accepting the mail and putting it on a queue for further
> +* After initially accepting the mail and putting it on a queue for further
> processing, known as 'after queue filtering'.
>
> The former has the advantage that the system can reject a mail (by sending a
> @@ -320,14 +320,14 @@ sender to the other mailserver. This is of particular advantage if the
> processed mail is a spam message or contains a virus and has a forged
> sender-address. Sending out a notification in this situation leads so-called
> 'backscatter' mail, which might cause your server to get listed as spamming on
> -RBLs.
> +RBLs (Real-time Blackhole List).
>
> The latter has the advantage of providing faster delivery of mails for the
> sending servers, since queueing mails is much faster than analyzing it for
> spam and viruses.
>
> If a mail is addressed to multiple recipients (e.g. when multiple addresses are
> -subscribed to the same mailinglist) the situation is more complicated: Your
> +subscribed to the same mailing list) the situation is more complicated: Your
> mailserver can only reject or accept the mail for all recipients, after having
> received the complete message, while your rule setup might accept the mail for
> part of the recipients and reject it for others. This can be due to a
> @@ -337,7 +337,7 @@ feature.
> If the resulting action of the rule system is the same for all recipients {pmg}
> responds accordingly if configured for before queue filtering (sending '554'
> for a blocked mail and '250' for an accepted or quarantined mail). If some
> -mailboxes accept the mail and some reject it the system has to accept the mail.
> +mailboxes accept the mail and some reject it, the system has to accept the mail.
>
> Whether {pmg} notifies the sender that delivery failed for some recipients by
> sending a non-delivery report, depends on the 'ndr_on_block' setting in
> @@ -372,7 +372,7 @@ domain.com to your first e-mail server, and e-mails addressed to
> subdomain.domain.com to a second one.
>
> You can add the IP addresses, hostname, transport protocol (smtp/lmtp),
> -transport ports and mail domains (or just single email addresses)
> +transport ports and mail domains (or just single e-mail addresses)
> of your additional e-mail servers. When transport protocol is set to `lmtp`,
> the option 'Use MX' is useless and will be automatically set to 'No'.
>
> @@ -408,11 +408,11 @@ certificate for you (`/etc/pmg/pmg-tls.pem`).
>
> {pmg} uses opportunistic TLS encryption by default. The SMTP transaction is
> encrypted if the 'STARTTLS' ESMTP feature is supported by the remote
> -server. Otherwise, messages are sent in the clear.
> +server. Otherwise, messages are sent in the clear.
>
> You can set a different TLS policy per destination. A destination is either a
> remote domain or a next-hop destination as specified in `/etc/pmg/transport`.
> -This can be used, should you need to prevent e-mail delivery without
> +This can be used if you need to prevent e-mail delivery without
> encryption, or to work around a broken 'STARTTLS' ESMTP implementation. See
> {postfix_tls_readme} for details on the supported policies.
>
> @@ -420,7 +420,7 @@ Enable TLS logging::
>
> To get additional information about SMTP TLS activity you can enable
> TLS logging. That way information about TLS sessions and used
> -certificate’s is logged via syslog.
> +certificates is logged via syslog.
>
> Add TLS received header::
>
> @@ -453,7 +453,7 @@ which system and private key were used for signing) is also included in the
> The verification is done by the receiver: The public key is fetched
> via DNS TXT lookup for `yourselector._domainkey.yourdomain.example` and used
> for verifying the hash. You can publish multiple selectors for your domain,
> -each use by a system which sends e-mail from your domain, without the need to
> +each used by a system which sends e-mail from your domain, without the need to
> share the private key.
>
> {pmg} verifies DKIM Signatures for inbound mail in the Spam Filter by default.
> @@ -501,7 +501,7 @@ ifndef::manvolnum[]
> [thumbnail="pmg-gui-mailproxy-whitelist.png", big=1]
> endif::manvolnum[]
>
> -All SMTP checks are disabled for those entries (e. g. Greylisting,
> +All SMTP checks are disabled for those entries (e.g. Greylisting,
> SPF, RBL, ...)
>
> NOTE: If you use a backup MX server (e.g. your ISP offers this service
> @@ -539,16 +539,16 @@ ifndef::manvolnum[]
> [thumbnail="pmg-gui-spamquar-options.png", big=1]
> endif::manvolnum[]
>
> -Proxmox analyses all incoming e-mail messages and decides for each
> -e-mail if its ham or spam (or virus). Good e-mails are delivered to
> -the inbox and spam messages can be moved into the spam quarantine.
> +{pmg} analyses all incoming e-mail messages and decides for each
> +e-mail if it is ham or spam (or virus). Good e-mails are delivered to
> +the inbox and spam messages are moved into the spam quarantine.
>
> The system can be configured to send daily reports to inform users
> -about the personal spam messages received the last day. That report is
> +about the personal spam messages received the last day. The report is
> only sent if there are new messages in the quarantine.
>
> Some options are only available in the config file `/etc/pmg/pmg.conf`,
> -and not in the webinterface.
> +and not in the web interface.
>
> include::pmg.spamquar-conf-opts.adoc[]
>
> @@ -577,11 +577,11 @@ slightly adjusting the score of a particular rule. Two examples:
> 'DEAR_SOMETHING'). By setting the score of this rule to 0 you can disable
> it completely.
>
> -The system logs all rules which particular mail hits. Analyzing the logs can
> +The system logs all the rules which a particular mail hits. Analyzing the logs can
> lead to finding such a pattern in your environment.
>
> You can adjust the score of a rule by creating a new 'Custom Rule Score' entry
> -in the GUI.
> +on the GUI.
I would opt for "in the GUI". In the interface, not on the interface :/
couldn't find much online but
https://forum.wordreference.com/threads/in-the-gui-or-on-the-gui.3332406/
>
> NOTE: In general it is strongly recommended to not make large changes to the
> default scores.
> @@ -600,7 +600,7 @@ ifndef::manvolnum[]
> endif::manvolnum[]
>
> All mails are automatically passed to the included virus detector
> -({clamav}). The default setting are considered safe, so it is usually
> +({clamav}). The default settings are considered safe, so it is usually
> not required to change them.
>
> {clamav} related settings are saved to subsection 'clamav' in `/etc/pmg/pmg.conf`,
> @@ -612,8 +612,8 @@ ifndef::manvolnum[]
> [thumbnail="pmg-gui-clamav-database.png", big=1]
> endif::manvolnum[]
>
> -Please note that the virus signature database it automatically
> -updated. But you can see the database status on the GUI, and you can
> +Please note that the virus signature database is automatically
> +updated. You can see the database status on the GUI, and also
s/on/in/ but only a maybe as I think its better
> trigger manual updates there.
>
>
> @@ -626,8 +626,8 @@ ifndef::manvolnum[]
> endif::manvolnum[]
>
> Indentified virus mails are automatically moved to the virus
> -quarantine. The administartor can view those mails using the GUI, or
> -deliver them in case of false positives. {pmg} does not notify
> +quarantine. The administrator can view these mails using the GUI, and
> +choose to deliver them in case of false positives. {pmg} does not notify
> individual users about received virus mails.
>
> Virus quarantine related settings are saved to subsection 'virusquar'
> @@ -654,9 +654,9 @@ them, as `init.pre`, `v310.pre`, `v320.pre`, `local.cf` will be overwritten by
> the xref:pmgconfig_template_engine[template engine], while the others can
> get updated by any {spamassassin} package upgrade.
>
> -To add your special configuration, you have to create a new file and name it
> +To add your custom configuration, you have to create a new file and name it
> `custom.cf` (in this directory), then add your configuration there. Make sure
> -to use the correct {spamassassin} syntax, and test with
> +to use the correct {spamassassin} syntax, and test it with:
>
> ----
> # spamassassin -D --lint
> @@ -665,16 +665,16 @@ to use the correct {spamassassin} syntax, and test with
> If you run a cluster, the `custom.cf` file is synchronized from the
> master node to all cluster members automatically.
>
> -Should you only wish to adjust the score assigned to a particular rule you
> +To adjust the score assigned to a particular rule you
> can also use the xref:pmgconfig_spamdetector_customscores[Custom Rule Score]
> -settings in the GUI.
> +settings on the GUI.
same, I would prefer in
>
>
> [[pmgconfig_custom_check]]
> Custom Check Interface
> ----------------------
>
> -For use cases which are not handled by the {pmg} Virus Detector and
> +For use-cases which are not handled by the {pmg} Virus Detector and
> {spamassassin} configuration, advanced users can create a custom check
> executable which, if enabled will be called before the Virus Detector and before
> passing an e-mail through the Rule System. The custom check API is kept as
> @@ -694,7 +694,7 @@ The expected output need to be printed on STDOUT and consists of two lines:
> * one of the following 3 results:
> ** 'OK' - e-mail is ok
> ** 'VIRUS: <virusdescription>' - e-mail is treated as if it contained a virus
> - (the virusdescription is logged and added to the e-mail's headers)
> + (the virus description is logged and added to the e-mail's headers)
> ** 'SCORE: <number>' - <number> is added (negative numbers are also possible)
> to the e-mail's spamscore
>
> @@ -775,7 +775,7 @@ Local Users
>
> [thumbnail="pmg-gui-local-user-config.png", big=1]
>
> -Local users are used to manage and audit {pmg}. Those users can login on the
> +Local users can manage and audit {pmg}. They can login on the
> management web interface.
>
> There are three roles:
> @@ -796,7 +796,7 @@ With this role, the user is only allowed to view data and configuration, but
> not to edit it.
>
> In addition there is always the 'root' user, which is used to perform special
> -system administrator tasks, such as updgrading a host or changing the
> +system administrator tasks, such as upgrading a host or changing the
> network configuration.
>
> NOTE: Only pam users are able to login via the webconsole and ssh, which the
> @@ -843,10 +843,10 @@ Sync
> ^^^^
>
> {pmg} synchronizes the relevant user and group info periodically, so that
> -that information is available in a fast manner, even when the LDAP/AD server
> +the information is available in a fast manner, even when the LDAP/AD server
> is temporarily not accessible.
>
> -After a successfull sync, the groups and users should be visible on the web
> +After a successful sync, the groups and users should be visible on the web
> interface. After that, you can create rules targeting LDAP users and groups.
>
>
>
More information about the pmg-devel
mailing list