diff options
author | Ben Lindstrom <mouring@eviladmin.org> | 2001-06-25 05:08:11 +0000 |
---|---|---|
committer | Ben Lindstrom <mouring@eviladmin.org> | 2001-06-25 05:08:11 +0000 |
commit | 2464322d7ee41dcd8beee12903775f7f2a80a164 (patch) | |
tree | 211b60ad7793b335208f5e53d9cf97c6725f558d | |
parent | e586c4ce3f4af32ef9eed72344f0fc7f43b9e58a (diff) |
- itojun@cvs.openbsd.org 2001/06/23 17:48:18
[sftp.1 ssh.1 sshd.8 ssh-keyscan.1]
kill whitespace at EOL.
-rw-r--r-- | ChangeLog | 5 | ||||
-rw-r--r-- | sftp.1 | 42 | ||||
-rw-r--r-- | ssh-keyscan.1 | 8 | ||||
-rw-r--r-- | ssh.1 | 20 | ||||
-rw-r--r-- | sshd.8 | 30 |
5 files changed, 54 insertions, 51 deletions
@@ -82,6 +82,9 @@ | |||
82 | [ssh-keygen.c] | 82 | [ssh-keygen.c] |
83 | fix import for (broken?) ssh.com/f-secure private keys | 83 | fix import for (broken?) ssh.com/f-secure private keys |
84 | (i tested > 1000 RSA keys) | 84 | (i tested > 1000 RSA keys) |
85 | - itojun@cvs.openbsd.org 2001/06/23 17:48:18 | ||
86 | [sftp.1 ssh.1 sshd.8 ssh-keyscan.1] | ||
87 | kill whitespace at EOL. | ||
85 | 88 | ||
86 | 20010622 | 89 | 20010622 |
87 | - (stevesk) handle systems without pw_expire and pw_change. | 90 | - (stevesk) handle systems without pw_expire and pw_change. |
@@ -5766,4 +5769,4 @@ | |||
5766 | - Wrote replacements for strlcpy and mkdtemp | 5769 | - Wrote replacements for strlcpy and mkdtemp |
5767 | - Released 1.0pre1 | 5770 | - Released 1.0pre1 |
5768 | 5771 | ||
5769 | $Id: ChangeLog,v 1.1316 2001/06/25 05:04:58 mouring Exp $ | 5772 | $Id: ChangeLog,v 1.1317 2001/06/25 05:08:11 mouring Exp $ |
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: sftp.1,v 1.20 2001/06/23 05:57:08 deraadt Exp $ | 1 | .\" $OpenBSD: sftp.1,v 1.21 2001/06/23 17:48:18 itojun Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2001 Damien Miller. All rights reserved. | 3 | .\" Copyright (c) 2001 Damien Miller. All rights reserved. |
4 | .\" | 4 | .\" |
@@ -37,7 +37,7 @@ | |||
37 | .Nm sftp | 37 | .Nm sftp |
38 | .Op [\fIuser\fR@]\fIhost\fR[:\fIfile\fR [\fIfile\fR]] | 38 | .Op [\fIuser\fR@]\fIhost\fR[:\fIfile\fR [\fIfile\fR]] |
39 | .Nm sftp | 39 | .Nm sftp |
40 | .Op [\fIuser\fR@]\fIhost\fR[:\fIdir\fR[\fI/\fR]] | 40 | .Op [\fIuser\fR@]\fIhost\fR[:\fIdir\fR[\fI/\fR]] |
41 | .Sh DESCRIPTION | 41 | .Sh DESCRIPTION |
42 | .Nm | 42 | .Nm |
43 | is an interactive file transfer program, similar to | 43 | is an interactive file transfer program, similar to |
@@ -52,7 +52,7 @@ connects and logs into the specified | |||
52 | .Ar host , | 52 | .Ar host , |
53 | then enters an interactive command mode. | 53 | then enters an interactive command mode. |
54 | .Pp | 54 | .Pp |
55 | The second usage format will retrieve files automatically if a non-interactive | 55 | The second usage format will retrieve files automatically if a non-interactive |
56 | authentication method is used; otherwise it will do so after | 56 | authentication method is used; otherwise it will do so after |
57 | successful interactive authentication. | 57 | successful interactive authentication. |
58 | .Pp | 58 | .Pp |
@@ -68,13 +68,13 @@ instead of | |||
68 | Since it lacks user interaction it should be used in conjunction with | 68 | Since it lacks user interaction it should be used in conjunction with |
69 | non-interactive authentication. | 69 | non-interactive authentication. |
70 | .Nm | 70 | .Nm |
71 | will abort if any of the following | 71 | will abort if any of the following |
72 | commands fail: | 72 | commands fail: |
73 | .Ic get , put , rename , ln , rm , mkdir , chdir , lchdir | 73 | .Ic get , put , rename , ln , rm , mkdir , chdir , lchdir |
74 | and | 74 | and |
75 | .Ic lmkdir . | 75 | .Ic lmkdir . |
76 | .It Fl C | 76 | .It Fl C |
77 | Enables compression (via ssh's | 77 | Enables compression (via ssh's |
78 | .Fl C | 78 | .Fl C |
79 | flag) | 79 | flag) |
80 | .It Fl o Ar ssh_option | 80 | .It Fl o Ar ssh_option |
@@ -86,31 +86,31 @@ Raise logging level. This option is also passed to ssh. | |||
86 | .Sh INTERACTIVE COMMANDS | 86 | .Sh INTERACTIVE COMMANDS |
87 | Once in interactive mode, | 87 | Once in interactive mode, |
88 | .Nm | 88 | .Nm |
89 | understands a set of commands similar to those of | 89 | understands a set of commands similar to those of |
90 | .Xr ftp 1 . | 90 | .Xr ftp 1 . |
91 | Commands are case insensitive and pathnames may be enclosed in quotes if they | 91 | Commands are case insensitive and pathnames may be enclosed in quotes if they |
92 | contain spaces. | 92 | contain spaces. |
93 | .Bl -tag -width Ds | 93 | .Bl -tag -width Ds |
94 | .It Ic cd Ar path | 94 | .It Ic cd Ar path |
95 | Change remote directory to | 95 | Change remote directory to |
96 | .Ar path . | 96 | .Ar path . |
97 | .It Ic lcd Ar path | 97 | .It Ic lcd Ar path |
98 | Change local directory to | 98 | Change local directory to |
99 | .Ar path . | 99 | .Ar path . |
100 | .It Ic chgrp Ar grp Ar path | 100 | .It Ic chgrp Ar grp Ar path |
101 | Change group of file | 101 | Change group of file |
102 | .Ar path | 102 | .Ar path |
103 | to | 103 | to |
104 | .Ar grp . | 104 | .Ar grp . |
105 | .Ar grp | 105 | .Ar grp |
106 | must be a numeric GID. | 106 | must be a numeric GID. |
107 | .It Ic chmod Ar mode Ar path | 107 | .It Ic chmod Ar mode Ar path |
108 | Change permissions of file | 108 | Change permissions of file |
109 | .Ar path | 109 | .Ar path |
110 | to | 110 | to |
111 | .Ar mode . | 111 | .Ar mode . |
112 | .It Ic chown Ar own Ar path | 112 | .It Ic chown Ar own Ar path |
113 | Change owner of file | 113 | Change owner of file |
114 | .Ar path | 114 | .Ar path |
115 | to | 115 | to |
116 | .Ar own . | 116 | .Ar own . |
@@ -127,15 +127,15 @@ Retrieve the | |||
127 | .Ar remote-path | 127 | .Ar remote-path |
128 | and store it on the local machine. | 128 | and store it on the local machine. |
129 | If the local | 129 | If the local |
130 | path name is not specified, it is given the same name it has on the | 130 | path name is not specified, it is given the same name it has on the |
131 | remote machine. If the | 131 | remote machine. If the |
132 | .Fl P | 132 | .Fl P |
133 | flag is specified, then the file's full permission and access time are | 133 | flag is specified, then the file's full permission and access time are |
134 | copied too. | 134 | copied too. |
135 | .It Ic help | 135 | .It Ic help |
136 | Display help text. | 136 | Display help text. |
137 | .It Ic lls Op Ar ls-options Op Ar path | 137 | .It Ic lls Op Ar ls-options Op Ar path |
138 | Display local directory listing of either | 138 | Display local directory listing of either |
139 | .Ar path | 139 | .Ar path |
140 | or current directory if | 140 | or current directory if |
141 | .Ar path | 141 | .Ar path |
@@ -144,7 +144,7 @@ is not specified. | |||
144 | Create local directory specified by | 144 | Create local directory specified by |
145 | .Ar path . | 145 | .Ar path . |
146 | .It Ic ln Ar oldpath Ar newpath | 146 | .It Ic ln Ar oldpath Ar newpath |
147 | Create a symbolic link from | 147 | Create a symbolic link from |
148 | .Ar oldpath | 148 | .Ar oldpath |
149 | to | 149 | to |
150 | .Ar newpath . | 150 | .Ar newpath . |
@@ -157,7 +157,7 @@ or current directory if | |||
157 | .Ar path | 157 | .Ar path |
158 | is not specified. | 158 | is not specified. |
159 | .It Ic lumask Ar umask | 159 | .It Ic lumask Ar umask |
160 | Set local umask to | 160 | Set local umask to |
161 | .Ar umask . | 161 | .Ar umask . |
162 | .It Ic mkdir Ar path | 162 | .It Ic mkdir Ar path |
163 | Create remote directory specified by | 163 | Create remote directory specified by |
@@ -169,8 +169,8 @@ Create remote directory specified by | |||
169 | .Xc | 169 | .Xc |
170 | Upload | 170 | Upload |
171 | .Ar local-path | 171 | .Ar local-path |
172 | and store it on the remote machine. If the remote path name is not | 172 | and store it on the remote machine. If the remote path name is not |
173 | specified, it is given the same name it has on the local machine. If the | 173 | specified, it is given the same name it has on the local machine. If the |
174 | .Fl P | 174 | .Fl P |
175 | flag is specified, then the file's full permission and access time are | 175 | flag is specified, then the file's full permission and access time are |
176 | copied too. | 176 | copied too. |
@@ -190,12 +190,12 @@ Remove remote directory specified by | |||
190 | Delete remote file specified by | 190 | Delete remote file specified by |
191 | .Ar path . | 191 | .Ar path . |
192 | .It Ic symlink Ar oldpath Ar newpath | 192 | .It Ic symlink Ar oldpath Ar newpath |
193 | Create a symbolic link from | 193 | Create a symbolic link from |
194 | .Ar oldpath | 194 | .Ar oldpath |
195 | to | 195 | to |
196 | .Ar newpath . | 196 | .Ar newpath . |
197 | .It Ic ! Ar command | 197 | .It Ic ! Ar command |
198 | Execute | 198 | Execute |
199 | .Ar command | 199 | .Ar command |
200 | in local shell. | 200 | in local shell. |
201 | .It Ic ! | 201 | .It Ic ! |
diff --git a/ssh-keyscan.1 b/ssh-keyscan.1 index 5f86f2755..328d95ab1 100644 --- a/ssh-keyscan.1 +++ b/ssh-keyscan.1 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: ssh-keyscan.1,v 1.7 2001/06/22 10:17:51 mpech Exp $ | 1 | .\" $OpenBSD: ssh-keyscan.1,v 1.8 2001/06/23 17:48:18 itojun Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>. | 3 | .\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>. |
4 | .\" | 4 | .\" |
@@ -47,21 +47,21 @@ have begun after you created your ssh_known_hosts file. | |||
47 | .Sh OPTIONS | 47 | .Sh OPTIONS |
48 | .Bl -tag -width Ds | 48 | .Bl -tag -width Ds |
49 | .It Fl t | 49 | .It Fl t |
50 | Set the timeout for connection attempts. If | 50 | Set the timeout for connection attempts. If |
51 | .Pa timeout | 51 | .Pa timeout |
52 | seconds have elapsed since a connection was initiated to a host or since the | 52 | seconds have elapsed since a connection was initiated to a host or since the |
53 | last time anything was read from that host, then the connection is | 53 | last time anything was read from that host, then the connection is |
54 | closed and the host in question considered unavailable. Default is 5 | 54 | closed and the host in question considered unavailable. Default is 5 |
55 | seconds. | 55 | seconds. |
56 | .It Fl f | 56 | .It Fl f |
57 | Read hosts or | 57 | Read hosts or |
58 | .Pa addrlist namelist | 58 | .Pa addrlist namelist |
59 | pairs from this file, one per line. | 59 | pairs from this file, one per line. |
60 | If | 60 | If |
61 | .Pa - | 61 | .Pa - |
62 | is supplied instead of a filename, | 62 | is supplied instead of a filename, |
63 | .Nm | 63 | .Nm |
64 | will read hosts or | 64 | will read hosts or |
65 | .Pa addrlist namelist | 65 | .Pa addrlist namelist |
66 | pairs from the standard input. | 66 | pairs from the standard input. |
67 | .El | 67 | .El |
@@ -34,7 +34,7 @@ | |||
34 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | 34 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
35 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 35 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
36 | .\" | 36 | .\" |
37 | .\" $OpenBSD: ssh.1,v 1.116 2001/06/23 02:34:31 markus Exp $ | 37 | .\" $OpenBSD: ssh.1,v 1.117 2001/06/23 17:48:19 itojun Exp $ |
38 | .Dd September 25, 1999 | 38 | .Dd September 25, 1999 |
39 | .Dt SSH 1 | 39 | .Dt SSH 1 |
40 | .Os | 40 | .Os |
@@ -269,7 +269,7 @@ of | |||
269 | .Ss Escape Characters | 269 | .Ss Escape Characters |
270 | .Pp | 270 | .Pp |
271 | When a pseudo terminal has been requested, ssh supports a number of functions | 271 | When a pseudo terminal has been requested, ssh supports a number of functions |
272 | through the use of an escape character. | 272 | through the use of an escape character. |
273 | .Pp | 273 | .Pp |
274 | A single tilde character can be sent as | 274 | A single tilde character can be sent as |
275 | .Ic ~~ | 275 | .Ic ~~ |
@@ -278,7 +278,7 @@ The escape character must always follow a newline to be interpreted as | |||
278 | special. | 278 | special. |
279 | The escape character can be changed in configuration files using the | 279 | The escape character can be changed in configuration files using the |
280 | .Cm EscapeChar | 280 | .Cm EscapeChar |
281 | configuration directive or on the command line by the | 281 | configuration directive or on the command line by the |
282 | .Fl e | 282 | .Fl e |
283 | option. | 283 | option. |
284 | .Pp | 284 | .Pp |
@@ -510,8 +510,8 @@ Quiet mode. | |||
510 | Causes all warning and diagnostic messages to be suppressed. | 510 | Causes all warning and diagnostic messages to be suppressed. |
511 | Only fatal errors are displayed. | 511 | Only fatal errors are displayed. |
512 | .It Fl s | 512 | .It Fl s |
513 | May be used to request invocation of a subsystem on the remote system. Subsystems are a feature of the SSH2 protocol which facilitate the use | 513 | May be used to request invocation of a subsystem on the remote system. Subsystems are a feature of the SSH2 protocol which facilitate the use |
514 | of SSH as a secure transport for other applications (eg. sftp). The | 514 | of SSH as a secure transport for other applications (eg. sftp). The |
515 | subsystem is specified as the remote command. | 515 | subsystem is specified as the remote command. |
516 | .It Fl t | 516 | .It Fl t |
517 | Force pseudo-tty allocation. | 517 | Force pseudo-tty allocation. |
@@ -698,7 +698,7 @@ The default is | |||
698 | Specifies the cipher to use for encrypting the session | 698 | Specifies the cipher to use for encrypting the session |
699 | in protocol version 1. | 699 | in protocol version 1. |
700 | Currently, | 700 | Currently, |
701 | .Dq blowfish | 701 | .Dq blowfish |
702 | and | 702 | and |
703 | .Dq 3des | 703 | .Dq 3des |
704 | are supported. | 704 | are supported. |
@@ -883,7 +883,7 @@ The possible values are: | |||
883 | QUIET, FATAL, ERROR, INFO, VERBOSE and DEBUG. | 883 | QUIET, FATAL, ERROR, INFO, VERBOSE and DEBUG. |
884 | The default is INFO. | 884 | The default is INFO. |
885 | .It Cm MACs | 885 | .It Cm MACs |
886 | Specifies the MAC (message authentication code) algorithms | 886 | Specifies the MAC (message authentication code) algorithms |
887 | in order of preference. | 887 | in order of preference. |
888 | The MAC algorithm is used in protocol version 2 | 888 | The MAC algorithm is used in protocol version 2 |
889 | for data integrity protection. | 889 | for data integrity protection. |
@@ -906,8 +906,8 @@ The default is | |||
906 | Specifies the port number to connect on the remote host. | 906 | Specifies the port number to connect on the remote host. |
907 | Default is 22. | 907 | Default is 22. |
908 | .It Cm PreferredAuthentications | 908 | .It Cm PreferredAuthentications |
909 | Specifies the order in which the client should try protocol 2 | 909 | Specifies the order in which the client should try protocol 2 |
910 | authentication methods. This allows a client to prefer one method (e.g. | 910 | authentication methods. This allows a client to prefer one method (e.g. |
911 | .Cm keyboard-interactive ) | 911 | .Cm keyboard-interactive ) |
912 | over another method (e.g. | 912 | over another method (e.g. |
913 | .Cm password ) | 913 | .Cm password ) |
@@ -979,7 +979,7 @@ Disabling rhosts authentication may reduce | |||
979 | authentication time on slow connections when rhosts authentication is | 979 | authentication time on slow connections when rhosts authentication is |
980 | not used. | 980 | not used. |
981 | Most servers do not permit RhostsAuthentication because it | 981 | Most servers do not permit RhostsAuthentication because it |
982 | is not secure (see | 982 | is not secure (see |
983 | .Cm RhostsRSAAuthentication ) . | 983 | .Cm RhostsRSAAuthentication ) . |
984 | The argument to this keyword must be | 984 | The argument to this keyword must be |
985 | .Dq yes | 985 | .Dq yes |
@@ -34,7 +34,7 @@ | |||
34 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | 34 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
35 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 35 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
36 | .\" | 36 | .\" |
37 | .\" $OpenBSD: sshd.8,v 1.132 2001/06/23 03:03:59 markus Exp $ | 37 | .\" $OpenBSD: sshd.8,v 1.133 2001/06/23 17:48:19 itojun Exp $ |
38 | .Dd September 25, 1999 | 38 | .Dd September 25, 1999 |
39 | .Dt SSHD 8 | 39 | .Dt SSHD 8 |
40 | .Os | 40 | .Os |
@@ -374,7 +374,7 @@ The default is | |||
374 | .Dq aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour. | 374 | .Dq aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour. |
375 | .It Cm ClientAliveInterval | 375 | .It Cm ClientAliveInterval |
376 | Sets a timeout interval in seconds after which if no data has been received | 376 | Sets a timeout interval in seconds after which if no data has been received |
377 | from the client, | 377 | from the client, |
378 | .Nm | 378 | .Nm |
379 | will send a message through the encrypted | 379 | will send a message through the encrypted |
380 | channel to request a response from the client. | 380 | channel to request a response from the client. |
@@ -386,10 +386,10 @@ Sets the number of client alive messages (see above) which may be | |||
386 | sent without | 386 | sent without |
387 | .Nm | 387 | .Nm |
388 | receiving any messages back from the client. If this threshold is | 388 | receiving any messages back from the client. If this threshold is |
389 | reached while client alive messages are being sent, | 389 | reached while client alive messages are being sent, |
390 | .Nm | 390 | .Nm |
391 | will disconnect the client, terminating the session. It is important | 391 | will disconnect the client, terminating the session. It is important |
392 | to note that the use of client alive messages is very different from | 392 | to note that the use of client alive messages is very different from |
393 | .Cm Keepalive | 393 | .Cm Keepalive |
394 | (below). The client alive messages are sent through the | 394 | (below). The client alive messages are sent through the |
395 | encrypted channel and therefore will not be spoofable. The TCP keepalive | 395 | encrypted channel and therefore will not be spoofable. The TCP keepalive |
@@ -402,7 +402,7 @@ clients having an active connection to the server. | |||
402 | The default value is 3. If you set | 402 | The default value is 3. If you set |
403 | .Cm ClientAliveInterval | 403 | .Cm ClientAliveInterval |
404 | (above) to 15, and leave this value at the default, unresponsive ssh clients | 404 | (above) to 15, and leave this value at the default, unresponsive ssh clients |
405 | will be disconnected after approximately 45 seconds. | 405 | will be disconnected after approximately 45 seconds. |
406 | .It Cm DenyGroups | 406 | .It Cm DenyGroups |
407 | This keyword can be followed by a number of group names, separated | 407 | This keyword can be followed by a number of group names, separated |
408 | by spaces. | 408 | by spaces. |
@@ -787,12 +787,12 @@ The default is | |||
787 | Note that | 787 | Note that |
788 | .Xr login 1 | 788 | .Xr login 1 |
789 | is never used for remote command execution. | 789 | is never used for remote command execution. |
790 | Note also, that if this is enabled, | 790 | Note also, that if this is enabled, |
791 | .Cm X11Forwarding | 791 | .Cm X11Forwarding |
792 | will be disabled because | 792 | will be disabled because |
793 | .Xr login 1 | 793 | .Xr login 1 |
794 | does not know how to handle | 794 | does not know how to handle |
795 | .Xr xauth 1 | 795 | .Xr xauth 1 |
796 | cookies. | 796 | cookies. |
797 | .It Cm X11DisplayOffset | 797 | .It Cm X11DisplayOffset |
798 | Specifies the first display number available for | 798 | Specifies the first display number available for |
@@ -808,9 +808,9 @@ The default is | |||
808 | .Dq no . | 808 | .Dq no . |
809 | Note that disabling X11 forwarding does not improve security in any | 809 | Note that disabling X11 forwarding does not improve security in any |
810 | way, as users can always install their own forwarders. | 810 | way, as users can always install their own forwarders. |
811 | X11 forwarding is automatically disabled if | 811 | X11 forwarding is automatically disabled if |
812 | .Cm UseLogin | 812 | .Cm UseLogin |
813 | is enabled. | 813 | is enabled. |
814 | .It Cm XAuthLocation | 814 | .It Cm XAuthLocation |
815 | Specifies the location of the | 815 | Specifies the location of the |
816 | .Xr xauth 1 | 816 | .Xr xauth 1 |
@@ -1005,13 +1005,13 @@ authentication. | |||
1005 | .It Cm no-pty | 1005 | .It Cm no-pty |
1006 | Prevents tty allocation (a request to allocate a pty will fail). | 1006 | Prevents tty allocation (a request to allocate a pty will fail). |
1007 | .It Cm permitopen="host:port" | 1007 | .It Cm permitopen="host:port" |
1008 | Limit local | 1008 | Limit local |
1009 | .Li ``ssh -L'' | 1009 | .Li ``ssh -L'' |
1010 | port forwarding such that it may only connect to the specified host and | 1010 | port forwarding such that it may only connect to the specified host and |
1011 | port. Multiple | 1011 | port. Multiple |
1012 | .Cm permitopen | 1012 | .Cm permitopen |
1013 | options may be applied separated by commas. No pattern matching is | 1013 | options may be applied separated by commas. No pattern matching is |
1014 | performed on the specified hostnames, they must be literal domains or | 1014 | performed on the specified hostnames, they must be literal domains or |
1015 | addresses. | 1015 | addresses. |
1016 | .El | 1016 | .El |
1017 | .Ss Examples | 1017 | .Ss Examples |