Skip to content

Commit

Permalink
[docs] Fix typos and spelling
Browse files Browse the repository at this point in the history
(cherry picked from commit 0a99d5a)
  • Loading branch information
ypid authored and drybjed committed Aug 11, 2020
1 parent c486d64 commit a6e1589
Show file tree
Hide file tree
Showing 3 changed files with 3 additions and 3 deletions.
2 changes: 1 addition & 1 deletion ansible/roles/debops.nginx/defaults/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -1168,7 +1168,7 @@ nginx_ssl_ciphers:
# Actually they do not specify a ciphersuite, because "modern" means TLSv1.3 only,
# which has its own ciphers, while TLSv1.2 and lower ciphers are not used.
# Therefore, we just repeat mozilla_intermediate here, to avoid a security hole
# that would be created with nginx default ciphersuite and accidential
# that would be created with nginx default ciphersuite and accidental
# activation of TLSv1.2 or lower.
# String taken on 2020-07-27
mozilla_modern: 'ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384'
Expand Down
2 changes: 1 addition & 1 deletion docs/ansible/roles/debops.mosquitto/getting-started.rst
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ Getting started
Default configuration
---------------------

With the default configuration, ``debops.mosquitto`` role will configure
With the default configuration, the ``debops.mosquitto`` role will configure
Mosquitto with a TLS listener accepting connections from any host (if the
:ref:`debops.pki` environment is detected), and plaintext listener accepting
connections only from localhost. Anonymous access to the broker will be
Expand Down
2 changes: 1 addition & 1 deletion docs/ansible/roles/debops.nginx/getting-started.rst
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ are preferred, because those protocols allow downgrade attacks.
No dhparam is set if the only protocol is TLSv1.3, because that
protocol uses `Ephemeral Diffie-Hellman key exchange`_, which employs
one-time keys for the current network session. Omitting the option is
purely cosmetic, resulting in cleaner configuration file.
purely cosmetic, resulting in a cleaner configuration file.

If `HTTP Strict Transport Security`_ is enabled, the default age is 2
years.
Expand Down

0 comments on commit a6e1589

Please sign in to comment.