diff options
| author | Sander Vrijders <sander@ouroboros.rocks> | 2019-10-12 15:07:35 +0200 | 
|---|---|---|
| committer | Sander Vrijders <sander@ouroboros.rocks> | 2019-10-12 15:07:35 +0200 | 
| commit | b64144b5a6c8ac62dafee254fecf978fb0150645 (patch) | |
| tree | cb99be8f612dc3109b35038832875967a90b1d5e /content/en/docs/Tutorials | |
| parent | fd3f32b8b435803b7c0ecb6603b9f014b519f37d (diff) | |
| download | website-b64144b5a6c8ac62dafee254fecf978fb0150645.tar.gz website-b64144b5a6c8ac62dafee254fecf978fb0150645.zip | |
content: Fix several typos
Also removes the changelog everywhere, as that is tracked by git.
Diffstat (limited to 'content/en/docs/Tutorials')
| -rw-r--r-- | content/en/docs/Tutorials/ovpn-tut.md | 14 | 
1 files changed, 4 insertions, 10 deletions
| diff --git a/content/en/docs/Tutorials/ovpn-tut.md b/content/en/docs/Tutorials/ovpn-tut.md index 7404a76..eb99c62 100644 --- a/content/en/docs/Tutorials/ovpn-tut.md +++ b/content/en/docs/Tutorials/ovpn-tut.md @@ -14,7 +14,7 @@ _be_ branch). This tutorial shows how to create an *encrypted IP  tunnel* using the Ouroboros VPN (ovpn) tool, which exposes _tun_  interfaces to inject Internet Protocol traffic into an Ouroboros flow. -We'll first illustrate what's going on over an ethernet loopback +We'll first illustrate what's going on over an Ethernet loopback  adapter and then show how to create an encrypted tunnel between two  machines connected over an IP network. @@ -63,7 +63,7 @@ $ sudo ovpn --ip 127.0.0.3 --mask 255.255.255.0  ```  From another terminal, we can start an ovpn client to connect to the -server (which listens to the name _my\_vpn_) and pass the --crypt +server (which listens to the name _my\_vpn_) and pass the \-\-crypt  option to encrypt the tunnel:  ```bash @@ -104,7 +104,7 @@ $ sudo tcpdump -i tun1  $ sudo tcpdump -i lo  ``` -and from another terminal, send some pings into the other endpoint: +From another terminal, send some pings into the other endpoint:  ```bash  $ ping 10.10.10.1 -i tun0 @@ -122,7 +122,7 @@ listening on tun1, link-type RAW (Raw IP), capture size 262144 bytes  13:35:22.247871 IP heteropoda > 10.10.10.1: ICMP echo request, id 3011, seq 3, length 64  ``` -while the tcpdump on the loopback shows the AES encrypted traffic that +While the tcpdump on the loopback shows the AES encrypted traffic that  is actually sent on the flow:  ```bash @@ -208,9 +208,3 @@ And on the client:  ```bash  $ sudo ovpn -n my_vpn -i 127.0.0.8 -m 255.255.255.0 --crypt  ``` - ---- - -Changelog: - -2018-08-31: Initial version.
\ No newline at end of file | 
