summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDamian Johnson <atagar@torproject.org>2019-03-01 16:27:44 -0800
committerDamian Johnson <atagar@torproject.org>2019-03-01 16:27:44 -0800
commit85e96a0a294b6a43b216a6261d7eb55771150491 (patch)
tree92d36a2e13e05ae2b13b89035fd78437bc3f11be
parent0fc61ddb1df72762d1e833c3977c4dd8e9c06617 (diff)
Adjust safecookie faq wording
Couple small tweaks suggested by wagon: https://trac.torproject.org/projects/tor/ticket/28300#comment:11
-rw-r--r--docs/faq.rst8
1 files changed, 4 insertions, 4 deletions
diff --git a/docs/faq.rst b/docs/faq.rst
index 3aa7b02a..23d0c3f1 100644
--- a/docs/faq.rst
+++ b/docs/faq.rst
@@ -213,7 +213,7 @@ you vulnerable to replay attacks if you accidently connect to a malicious port
or have a man-in-the-middle. **SAFECOOKIE** authentication avoids this through
a two way handshake, but authenticating by hand requires some extra work.
-This demonstration will use **xxd** to for hex conversion and **openssl** for
+This demonstration will use **xxd** for hex conversion and **openssl** for
crypto. First we need to call **AUTHCHALLENGE** with a random one-time token...
::
@@ -231,9 +231,9 @@ crypto. First we need to call **AUTHCHALLENGE** with a random one-time token...
250 AUTHCHALLENGE SERVERHASH=16274D83FC2240DF9D50D74009D9AE107B77EA317F0034D3638C7942F350D1F9
SERVERNONCE=1C2E73C41FA8537FDD3A59C2ECBE26DFC85E0A05389373AD8C130C0F5795A036
-Next combine the server challenge with our cookie content. This token will
-prove to Tor that we have our authentication cookie without divulging its
-content...
+In another terminal prompt next combine the server challenge with our cookie
+content. This token will prove to Tor that we have our authentication cookie
+without divulging its content...
::