From e1f8fb278e4cf3fb4fb9b6898868e49961425254 Mon Sep 17 00:00:00 2001 From: Jason Leschnik Date: Mon, 24 Oct 2016 22:27:06 +1100 Subject: [PATCH] fix minor typos in Secure-BootCD-VPN-HOWTO.sgml --- LDP/howto/linuxdoc/Secure-BootCD-VPN-HOWTO.sgml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/LDP/howto/linuxdoc/Secure-BootCD-VPN-HOWTO.sgml b/LDP/howto/linuxdoc/Secure-BootCD-VPN-HOWTO.sgml index 7654141d..1c065185 100644 --- a/LDP/howto/linuxdoc/Secure-BootCD-VPN-HOWTO.sgml +++ b/LDP/howto/linuxdoc/Secure-BootCD-VPN-HOWTO.sgml @@ -127,7 +127,7 @@ Since many people are already familiar with openVPN, this seemed like a good ide key loggers on the external client box attacks directly on the internal Windows(tm) box through the VPN ports that are now open and exposed on the Internet. viruses, spy ware and other malware on the client box infecting the internal workplace desktop (and any others that it has connection with) through the established VPN connection. - having the private key stored on multiple desktops around the organization on unsecured desktops. Someone with access to that key (which would need to be on the internal machine in order to establish the the VPN connection) could allow unauthorized key-making. + having the private key stored on multiple desktops around the organization on unsecured desktops. Someone with access to that key (which would need to be on the internal machine in order to establish the VPN connection) could allow unauthorized key-making. Only the specific external machine that is setup by IT services personnel would be able to connect and use the resources, when what is actually desired is that the authorized user can get access from anywhere. @@ -274,7 +274,7 @@ The choice of DSL means that we are relying on DSL's built in ability to automat Maintenance

-Once built there is NO maintenance to the CDs. If you need to change the private key password for the the individual user, burn them a new CD. If they lose a CD, give them a fresh burn. If the CD gets destroyed, give them a new copy. +Once built there is NO maintenance to the CDs. If you need to change the private key password for the individual user, burn them a new CD. If they lose a CD, give them a fresh burn. If the CD gets destroyed, give them a new copy. The openVPN server requires little maintenance. It is recommended that you periodically check the openVPN logs on the server to determine the likelihood of nefarious activity and act accordingly. Usage-tracking is beyond the scope of this document. @@ -575,7 +575,7 @@ proto udp # and bridged it with your ethernet interface. # If you want to control access policies # over the VPN, you must create firewall -# rules for the the TUN/TAP interface. +# rules for the TUN/TAP interface. # On non-Windows systems, you can give # an explicit unit number, such as tun0. # On Windows, use "dev-node" for this.