diff --git a/ChangeLog b/ChangeLog index dbd131181..2f348d398 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,3 +1,7 @@ +20020522 + - (djm) Fix spelling mistakes, spotted by Solar Designer i + + 20020521 - (stevesk) [sshd.c] bug 245; disable setsid() for now - (stevesk) [sshd.c] #ifndef HAVE_CYGWIN for setgroups() @@ -660,4 +664,4 @@ - (stevesk) entropy.c: typo in debug message - (djm) ssh-keygen -i needs seeded RNG; report from markus@ -$Id: ChangeLog,v 1.2137 2002/05/21 17:59:14 stevesk Exp $ +$Id: ChangeLog,v 1.2138 2002/05/22 01:02:15 djm Exp $ diff --git a/README.privsep b/README.privsep index b1aadd26a..89b9d0457 100644 --- a/README.privsep +++ b/README.privsep @@ -28,7 +28,7 @@ If you are on UnixWare 7 or OpenUNIX 8 do this additional step. configure supports the following options to change the default privsep user and chroot directory: - --with-privsep-path=xxx Path for privilege seperation chroot + --with-privsep-path=xxx Path for privilege separation chroot --with-privsep-user=user Specify non-privileged user for privilege separation Privsep requires operating system support for file descriptor passing @@ -54,4 +54,4 @@ process 1005 is the sshd process listening for new connections. process 6917 is the privileged monitor process, 6919 is the user owned sshd process and 6921 is the shell process. -$Id: README.privsep,v 1.4 2002/05/14 03:50:38 tim Exp $ +$Id: README.privsep,v 1.5 2002/05/22 01:02:15 djm Exp $ diff --git a/configure.ac b/configure.ac index 4370f9273..df78b789d 100644 --- a/configure.ac +++ b/configure.ac @@ -1,4 +1,4 @@ -# $Id: configure.ac,v 1.62 2002/05/17 15:59:23 tim Exp $ +# $Id: configure.ac,v 1.63 2002/05/22 01:02:15 djm Exp $ AC_INIT AC_CONFIG_SRCDIR([ssh.c]) @@ -1794,7 +1794,7 @@ AC_ARG_WITH(rsh, PRIVSEP_PATH=/var/empty AC_ARG_WITH(privsep-path, - [ --with-privsep-path=xxx Path for privilege seperation chroot ], + [ --with-privsep-path=xxx Path for privilege separation chroot ], [ if test "x$withval" != "$no" ; then PRIVSEP_PATH=$withval