git: f4e8db9335 - main - Fix typos and some rewording in Firewall chapter

From: Sergio Carlavilla Delgado <carlavilla_at_FreeBSD.org>
Date: Fri, 05 Aug 2022 18:24:33 UTC
The branch main has been updated by carlavilla:

URL: https://cgit.FreeBSD.org/doc/commit/?id=f4e8db9335d250a78b8df81c335d0df93735def6

commit f4e8db9335d250a78b8df81c335d0df93735def6
Author:     ghislain <ghislain (AT) smartix.llc>
AuthorDate: 2022-08-05 18:23:28 +0000
Commit:     Sergio Carlavilla Delgado <carlavilla@FreeBSD.org>
CommitDate: 2022-08-05 18:23:28 +0000

    Fix typos and some rewording in Firewall chapter
    
    PR:     265455
---
 documentation/content/en/books/handbook/firewalls/_index.adoc | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/documentation/content/en/books/handbook/firewalls/_index.adoc b/documentation/content/en/books/handbook/firewalls/_index.adoc
index 0d77039b67..4001b30850 100644
--- a/documentation/content/en/books/handbook/firewalls/_index.adoc
+++ b/documentation/content/en/books/handbook/firewalls/_index.adoc
@@ -2452,7 +2452,7 @@ For example: `icmp 3/3` for a port unreachable message.
 [[firewalls-blacklistd]]
 == Blacklistd
 
-Blacklistd is a daemon listening to sockets to receive notifications from other daemons about connection attempts that failed or were successful.
+Blacklistd is a daemon listening to sockets awaiting to receive notifications from other daemons about connection attempts that failed or were successful.
 It is most widely used in blocking too many connection attempts on open ports.
 A prime example is SSH running on the internet getting a lot of requests from bots or scripts trying to guess passwords and gain access.
 Using blacklistd, the daemon can notify the firewall to create a filter rule to block excessive connection attempts from a single source after a number of tries. Blacklistd was first developed on NetBSD and appeared there in version 7.
@@ -2501,7 +2501,7 @@ ssh             stream  *       *               *       3       24h
 All rules that follow the `[local]` section are treated as local rules (which is the default), applying to the local machine.
 When a `[remote]` section is encountered, all rules that follow it are handled as remote machine rules.
 
-Seven fields define a rule separated by either tabs or spaces.
+Seven fields separated by either tabs or spaces define a rule.
 The first four fields identify the traffic that should be blocklisted.
 The three fields that follow define backlistd's behavior.
 Wildcards are denoted as asterisks (`*`), matching anything in this field.
@@ -2593,7 +2593,7 @@ To explain it, this example rule is used:
 
 The address field can be an IP address (either v4 or v6), a port or both.
 This allows setting special rules for a specific remote address range like in this example.
-The fields for type, protocol and owner are identically interpreted as in the local rule.
+The fields for socket type, protocol and owner are identically interpreted as in the local rule.
 
 The name fields is different though: the equal sign (`=`) in a remote rule tells blacklistd to use the value from the matching local rule.
 It means that the firewall rule entry is taken and the `/25` prefix (a netmask of `255.255.255.128`) is added.