From 65a9d639ddac244ff3abc9dfde30482ff4a4c336 Mon Sep 17 00:00:00 2001 From: Duncan Roe Date: Tue, 27 Mar 2018 15:17:01 +1100 Subject: doc: nft.8 more spelling fixes I ran the following command: ispell -p ./ispell_nft -H nft.xml to create the local dictionary ispell_nft. ispell_nft contains almost every special word in nft.xml. The idea is that anyone can run ispell the same way and only have to accept: - alpha strings in hexadecimal numbers - "FIXME" : that has to be fixed eventually - "differv" : I don't know what that is or whether it's correct You need to use the English (i.e. American) dictionary, and you want the screen to be about 100 chars wide (at least). The patch enforces consistent capitalisation of words, e.g. IPv4 is always that way but ipv4_addr stays as before. The existing dictionary suggested capital Ethernet so that is in there too. Signed-off-by: Duncan Roe Signed-off-by: Florian Westphal --- doc/ispell_nft | 217 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++ doc/nft.xml | 54 +++++++------- 2 files changed, 244 insertions(+), 27 deletions(-) create mode 100644 doc/ispell_nft diff --git a/doc/ispell_nft b/doc/ispell_nft new file mode 100644 index 00000000..5170af9d --- /dev/null +++ b/doc/ispell_nft @@ -0,0 +1,217 @@ +ack +Acknowledgement +ackseq +addr +addrtype +admin +arp +arptables +avgpkt +Ayuso +backends +basetype +behaviour +bitmask +bitmasks +blackhole +CC +cfi +cgroup +chain's +classid +CLI +cmd +cmdline +comp +conf +connlabel +conntrack +cpi +cpu +crit +ct +ctnetlink +CTRL +cwr +daddr +datatype +dccp +devgroup +dir +dmesg +dnat +dns +dport +dscp +dst +dup +ebtables +ecn +emerg +enp +eol +esp +eth +ether +EtherType +expr +exthdr +flowlabel +flowtable +flowtables +fwd +gc +gid +GIDs +hbh +hdrlength +header's +hlen +hoplimit +http +https +htype +ibriport +icmp +ICMPv +icmpv +ICMPvX +icmpx +iface +ifname +ifs +iif +iifgroup +iifname +iiftype +includepath +ind +inet +ingress +ininterface +int +ip +IPComp +iproute +ipsec +iptables +ipv +IPv +json +kaber +kbytes +lan +len +libnetfilter +Lite +ll +lladdr +localhost +loopback +maxseg +mbytes +McHardy +mh +mld +mss +mtu +myhelpers +myin +mytable +nat +Neira +netdetv +netdev +netfilter +netlink +newname +nexthdr +nexthop +nf +nflog +nfmark +nfnetlink +nfproto +nft +nftables +nftrace +nh +nNscae +noop +num +obriport +oif +oifgroup +oifname +oiftype +op +org +pablo +parseable +pcp +pkt +pkttype +plen +postrouting +prerouting +prot +proto +protoinfo +psh +ptype +readline +reversedns +rst +rt +rtclassid +ruleset +SA +saddr +sbin +sctp +secmark +secpath +seg +seqadj +setname +ShareAlike +sid +skgid +skuid +snaplen +snat +spi +src +srh +ssh +stateful +stdin +stdout +syn +syslog +tc +tcp +TCPMSS +tsecr +tsval +ttl +udp +udplite +uid +UIDs +unicast +urg +urgptr +userid +userspace +usr +veth +VID +vlan +vmap +vtag +whitelist +wiki +wlan +xml +zA diff --git a/doc/nft.xml b/doc/nft.xml index 7800890d..88d39415 100644 --- a/doc/nft.xml +++ b/doc/nft.xml @@ -222,7 +222,7 @@ vi:ts=4 sw=4 The directories to be searched for include files can be specified using the option. You can override this behaviour either by prepending ./ to your path to force inclusion of files located in the - current working directory (ie. relative path) or / for file location expressed + current working directory (i.e. relative path) or / for file location expressed as an absolute path. @@ -429,7 +429,7 @@ filter input iif $int_ifs accept Bridge address family - The bridge address family handles ethernet packets traversing bridge devices. + The bridge address family handles Ethernet packets traversing bridge devices. The list of supported hooks is identical to IPv4/IPv6/Inet address families above. @@ -591,7 +591,7 @@ filter input iif $int_ifs accept The inet address family is a dummy family which is used to create hybrid IPv4/IPv6 tables. The meta expression nfproto - keyword can be used to test which family (ipv4 or ipv6) context the packet is being processed in. + keyword can be used to test which family (IPv4 or IPv6) context the packet is being processed in. When no address family is specified, ip is used by default. @@ -612,7 +612,7 @@ filter input iif $int_ifs accept dormant - table is not evalauted any more (base chains are unregistered) + table is not evaluated any more (base chains are unregistered) @@ -974,10 +974,10 @@ table inet filter { Anonymous sets are sets that have no specific name. The set members are enclosed in curly braces, with commas to separate elements when creating the rule the set is used in. Once that rule is removed, the set is removed as well. - They cannot be updated, i.e. once an anoymous set is declared it cannot be changed anymore except by + They cannot be updated, i.e. once an anonymous set is declared it cannot be changed anymore except by removing/altering the rule that uses the anonymous set. - Using anyonymous sets to accept particular subnets and ports + Using anonymous sets to accept particular subnets and ports nft add rule filter input ip saddr { 10.0.0.0/8, 192.168.0.0/16 } tcp dport { 22, 443 } accept @@ -986,7 +986,7 @@ table inet filter { in rules. Unlike anonymous sets, elements can be added to or removed from a named set at any time. Sets are referenced from rules using an @ prefixed to the sets name. - Using named sets to accept addressesand ports + Using named sets to accept addresses and ports nft add rule filter input ip saddr @allowed_hosts tcp dport @allowed_ports accept @@ -1139,7 +1139,7 @@ table inet filter { size - maximun number of elements in the set, mandatory if set is added to from the packet path (ruleset). + maximum number of elements in the set, mandatory if set is added to from the packet path (ruleset). unsigned integer (64 bit) @@ -1285,7 +1285,7 @@ table inet filter { size - maximun number of elements in the map + maximum number of elements in the map unsigned integer (64 bit) @@ -1464,7 +1464,7 @@ table inet filter { Ct helper is used to define connection tracking helpers that can then be used in combination with the "ct helper set" statement. type and protocol are mandatory, l3proto is derived from the table family by default, i.e. in the inet table the kernel will - try to load both the ipv4 and ipv6 helper backends, if they are supported by the kernel. + try to load both the IPv4 and IPv6 helper backends, if they are supported by the kernel. conntrack helper specifications @@ -1584,12 +1584,12 @@ table inet myhelpers { quota quota limit, used as the quota name - Two arguments, unsigned interger (64 bit) and string: bytes, kbytes, mbytes. "over" and "until" go before these arguments + Two arguments, unsigned integer (64 bit) and string: bytes, kbytes, mbytes. "over" and "until" go before these arguments used initial value of used quota - Two arguments, unsigned interger (64 bit) and string: bytes, kbytes, mbytes + Two arguments, unsigned integer (64 bit) and string: bytes, kbytes, mbytes @@ -1628,7 +1628,7 @@ table inet myhelpers { $ nft describe tcp flags payload expression, datatype tcp_flag (TCP flag) (basetype bitmask, integer), 8 bits -pre-defined symbolic constants: +predefined symbolic constants: fin 0x01 syn 0x02 rst 0x04 @@ -2794,7 +2794,7 @@ filter output icmpv6 type { echo-request, echo-reply } protocol - Ethertype protocol value + EtherType protocol value ether_type @@ -3166,7 +3166,7 @@ inet filter output rt ip6 nexthop fd00::1 ether - ethernet header field + Ethernet header field @@ -3974,7 +3974,7 @@ ip6 nexthdr ipv6-frag counter - IPcomp header expression + IPComp header expression comp @@ -4047,7 +4047,7 @@ ip6 nexthdr ipv6-frag counter ll - Link layer, for example the ethernet header + Link layer, for example the Ethernet header nh @@ -4080,7 +4080,7 @@ input meta iifname enp2s0 arp ptype 0x0800 arp htype 1 arp hlen 6 arp plen 4 @nh Extension header expressions Extension header expressions refer to data from variable-sized protocol headers, such as IPv6 extension headers and - TCPs options. + TCP options. nftables currently supports matching (finding) a given ipv6 extension header or TCP option. @@ -4467,7 +4467,7 @@ ip6 filter input frag more-fragments 1 counter bytes - bytecount seen, see description for packets keyword + byte count seen, see description for packets keyword integer (64 bit) @@ -5191,7 +5191,7 @@ ct event set new,related,destroy address Specifies that the source/destination address of the packet should be modified. You may specify a mapping to relate a list of tuples composed of arbitrary expression key with address value. - ipv4_addr, ipv6_addr, eg. abcd::1234, or you can use a mapping, eg. meta mark map { 10 : 192.168.1.2, 20 : 192.168.1.3 } + ipv4_addr, ipv6_addr, e.g. abcd::1234, or you can use a mapping, e.g. meta mark map { 10 : 192.168.1.2, 20 : 192.168.1.3 } port @@ -5275,7 +5275,7 @@ add rule nat prerouting tcp dport 22 redirect to :2222 Queue statement - This statement passes the packet to userspace using the nfnetlink_queue handler. The packet is put into the queue identified by its 16-bit queue number. Userspace can inspect and modify the packet if desired. Userspace must then drop or reinject the packet into the kernel. See libnetfilter_queue documentation for details. + This statement passes the packet to userspace using the nfnetlink_queue handler. The packet is put into the queue identified by its 16-bit queue number. Userspace can inspect and modify the packet if desired. Userspace must then drop or re-inject the packet into the kernel. See libnetfilter_queue documentation for details. @@ -5338,7 +5338,7 @@ add rule nat prerouting tcp dport 22 redirect to :2222 bypass - Let packets go through if userspace application cannot back off. Before using this flag, read libnetfilter_queue documentation for performance tuning recomendations. + Let packets go through if userspace application cannot back off. Before using this flag, read libnetfilter_queue documentation for performance tuning recommendations. fanout @@ -5386,7 +5386,7 @@ add rule nat prerouting tcp dport 22 redirect to :2222 address Specifies that the copy of the packet should be sent to a new gateway. - ipv4_addr, ipv6_addr, eg. abcd::1234, or you can use a mapping, eg. ip saddr map { 192.168.1.2 : 10.1.1.1 } + ipv4_addr, ipv6_addr, e.g. abcd::1234, or you can use a mapping, e.g. ip saddr map { 192.168.1.2 : 10.1.1.1 } device @@ -5434,7 +5434,7 @@ dup to ip daddr map { 192.168.7.1 : "eth0", 192.168.7.2 : "eth1" } The set statement is used to dynamically add or update elements in a set from the packet path. The set setname must already exist in the given table. - Furhermore, any set that will be dynamically updated from the nftables ruleset must specify + Furthermore, any set that will be dynamically updated from the nftables ruleset must specify both a maximum set size (to prevent memory exhaustion) and a timeout (so that number of entries in set will not grow indefinitely). The set statement can be used to e.g. create dynamic blacklists. @@ -5465,7 +5465,7 @@ dup to ip daddr map { 192.168.7.1 : "eth0", 192.168.7.2 : "eth1" } # drop packets coming from blacklisted ip addresses. nft add rule ip filter input ip saddr @blackhole counter drop - # add source ip addresses to the backlist if more than 10 tcp connection requests occured per second and ip address. + # add source ip addresses to the blacklist if more than 10 tcp connection requests occurred per second and ip address. # entries will timeout after one minute, after which they might be re-added if limit condition persists. nft add rule ip filter input tcp flags syn tcp dport ssh meter flood { ip saddr timeout 10s limit rate over 10/second} add @blackhole { ip saddr timeout 1m } drop @@ -5543,7 +5543,7 @@ dup to ip daddr map { 192.168.7.1 : "eth0", 192.168.7.2 : "eth1" } When an error is detected, nft shows the line(s) containing the error, the position of the erroneous parts in the input stream and marks up the erroneous parts using - carrets (^). If the error results from the combination of two + carets (^). If the error results from the combination of two expressions or statements, the part imposing the constraints which are violated is marked using tildes (~). @@ -5623,7 +5623,7 @@ Copyright © 2013-2016 Pablo Neira Ayuso pablo@netfilter.org published by the Free Software Foundation. - This documentation is licenced under the terms of the Creative + This documentation is licensed under the terms of the Creative Commons Attribution-ShareAlike 4.0 license, CC BY-SA 4.0. -- cgit v1.2.3