Module Name:    src
Committed By:   wiz
Date:           Mon Feb  4 11:02:32 UTC 2013

Modified Files:
        src/usr.sbin/ldpd: ldpd.8

Log Message:
Grammar. Sort sections.


To generate a diff of this commit:
cvs rdiff -u -r1.8 -r1.9 src/usr.sbin/ldpd/ldpd.8

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/usr.sbin/ldpd/ldpd.8
diff -u src/usr.sbin/ldpd/ldpd.8:1.8 src/usr.sbin/ldpd/ldpd.8:1.9
--- src/usr.sbin/ldpd/ldpd.8:1.8	Mon Feb  4 10:53:14 2013
+++ src/usr.sbin/ldpd/ldpd.8	Mon Feb  4 11:02:32 2013
@@ -1,4 +1,4 @@
-.\" $NetBSD: ldpd.8,v 1.8 2013/02/04 10:53:14 kefren Exp $
+.\" $NetBSD: ldpd.8,v 1.9 2013/02/04 11:02:32 wiz Exp $
 .\"
 .\" Copyright (c) 2010 The NetBSD Foundation, Inc.
 .\" All rights reserved.
@@ -104,12 +104,6 @@ Changes the TCP control port (default: 2
 .It Fl W
 Enable output of warning messages.
 .El
-.Sh SECURITY CONSIDERATIONS
-As a security measure you SHOULD filter the LDP well-known (646)
-TCP and UDP ports using your favourite packet filter before starting
-.Nm .
-This is the current way used to filter neighbours and to protect the
-system of possible external attacks like route injections.
 .Sh SEE ALSO
 .Rs
 .%R RFC
@@ -137,3 +131,9 @@ command appeared in
 .Sh BUGS
 .Nm
 doesn't implement Path Vector and Hop Count TLVs.
+.Sh SECURITY CONSIDERATIONS
+As a security measure you SHOULD filter the LDP well-known (646)
+TCP and UDP ports using your favourite packet filter before starting
+.Nm .
+This is the current way used to filter neighbours and to protect the
+system from possible external attacks like route injections.

Reply via email to