diff --git a/config/action.d/iptables-new.conf b/config/action.d/iptables-new.conf index 38927442..f35f387c 100644 --- a/config/action.d/iptables-new.conf +++ b/config/action.d/iptables-new.conf @@ -2,7 +2,7 @@ # # Author: Cyril Jaquier # Copied from iptables.conf and modified by Yaroslav Halchenko -# to fullfill the needs of bugreporter dbts#350746. +# to fulfill the needs of bugreporter dbts#350746. # # diff --git a/config/action.d/osx-ipfw.conf b/config/action.d/osx-ipfw.conf index 8423f003..abe4009c 100644 --- a/config/action.d/osx-ipfw.conf +++ b/config/action.d/osx-ipfw.conf @@ -79,7 +79,7 @@ blocktype = unreach port setnum = 10 # Option: number for ipfw rule -# Notes: This is meant to be automaticly generated and not overwritten +# Notes: This is meant to be automatically generated and not overwritten # Values: Random value between 10000 and 12000 rulenum="`echo $((RANDOM%%2000+10000))`" diff --git a/config/filter.d/roundcube-auth.conf b/config/filter.d/roundcube-auth.conf index b093f69c..e3e78588 100644 --- a/config/filter.d/roundcube-auth.conf +++ b/config/filter.d/roundcube-auth.conf @@ -22,8 +22,8 @@ ignoreregex = # DoS resistance: # # Assume that the user can inject "from " into the imap response -# somehow. Write test cases around this to ensure that the combination of -# arbitary user input and IMAP response doesn't inject the wrong IP for +# somehow. Write test cases around this to ensure that the combination of +# arbitrary user input and IMAP response doesn't inject the wrong IP for # fail2ban # # Author: Teodor Micu & Yaroslav Halchenko & terence namusonge & Daniel Black