[pmg-devel] [PATCH docs] important service daemons: fix typos and grammar

Oguz Bektas o.bektas at proxmox.com
Thu Apr 23 10:48:35 CEST 2020


Signed-off-by: Oguz Bektas <o.bektas at proxmox.com>
---
 pmg-smtp-filter.adoc | 2 +-
 pmgmirror.adoc       | 4 ++--
 pmgpolicy.adoc       | 2 +-
 pmgproxy.adoc        | 8 ++++----
 4 files changed, 8 insertions(+), 8 deletions(-)

diff --git a/pmg-smtp-filter.adoc b/pmg-smtp-filter.adoc
index a0727f7..153178e 100644
--- a/pmg-smtp-filter.adoc
+++ b/pmg-smtp-filter.adoc
@@ -23,7 +23,7 @@ pmg-smtp-filter - Proxmox SMTP Filter Daemon
 ============================================
 endif::manvolnum[]
 
-This is the Proxmox SMTP filter daemon, which does the actual SPAM
+This is the Proxmox SMTP filter daemon, which does the actual spam
 filtering using the SpamAssassin and the rule database. It listens on
 127.0.0.1:10023 and 127.0.0.1:10024. The daemon listens to a local
 address only, so you cannot access it from outside.
diff --git a/pmgmirror.adoc b/pmgmirror.adoc
index 9ce93f8..2f2c12d 100644
--- a/pmgmirror.adoc
+++ b/pmgmirror.adoc
@@ -23,8 +23,8 @@ pmgmirror - Database Mirror Daemon
 ==================================
 endif::manvolnum[]
 
-{pmg} use an application specific asynchronous replication
-algorythm to replicate the database to all cluster nodes.
+{pmg} uses an application specific asynchronous replication
+algorithm to replicate the database to all cluster nodes.
 
 The daemon uses the ssh tunnel provided by 'pmgtunnel' to access
 the database on remote nodes.
diff --git a/pmgpolicy.adoc b/pmgpolicy.adoc
index d013047..813ed9e 100644
--- a/pmgpolicy.adoc
+++ b/pmgpolicy.adoc
@@ -24,7 +24,7 @@ pmgpolicy - Proxmox Mail Gateway Policy Daemon
 endif::manvolnum[]
 
 This daemon implements the Postfix SMTP access policy delegation
-protocol on `127.0.0.1:10022`. The daemon listens to a local address
+protocol on `127.0.0.1:10022`. It listens to a local address
 only, so you cannot access it from outside. We configure Postfix to
 use this service for greylisting and as SPF policy server.
 
diff --git a/pmgproxy.adoc b/pmgproxy.adoc
index 0c088e5..8b1e535 100644
--- a/pmgproxy.adoc
+++ b/pmgproxy.adoc
@@ -44,7 +44,7 @@ certificate with your own (please include the key inside the '.pem' file).
 Host based Access Control
 -------------------------
 
-It is possible to configure ``apache2''-like access control
+It is possible to configure Apache2-like access control
 lists. Values are read from file `/etc/default/pmgproxy`. For example:
 
 ----
@@ -75,10 +75,10 @@ You can define the cipher list in `/etc/default/pmgproxy`, for example
 
  CIPHERS="ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256"
 
-Above is the default. See the ciphers(1) man page from the openssl
+Above is the default. See the `ciphers(1)` man page from the `openssl`
 package for a list of all available options.
 
-Additionally you can define that the client choses the used cipher in
+Additionally you can define the order that the client chooses the used cipher in
 `/etc/default/pmgproxy` (default is the first cipher in the list available to
 both client and `pmgproxy`):
 
@@ -104,7 +104,7 @@ COMPRESSION
 -----------
 
 By default `pmgproxy` uses gzip HTTP-level compression for compressible
-content, if the client supports it. This can disabled in `/etc/default/pmgproxy`
+content if the client supports it. This can be disabled in `/etc/default/pmgproxy`
 
  COMPRESSION=0
 
-- 
2.20.1



More information about the pmg-devel mailing list