From 902094ccba5de518294c743ba074f2a744c2b7e2 Mon Sep 17 00:00:00 2001 From: Jelmer Vernooij Date: Sat, 5 Jul 2003 01:52:55 +0000 Subject: Fix typos (This used to be commit 1a6cdbddbd008c9fe5255ed29871f9a3172fec6b) --- docs/docbook/smbdotconf/security/clientlanmanauth.xml | 2 +- docs/docbook/smbdotconf/security/clientntlmv2auth.xml | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) (limited to 'docs/docbook/smbdotconf/security') diff --git a/docs/docbook/smbdotconf/security/clientlanmanauth.xml b/docs/docbook/smbdotconf/security/clientlanmanauth.xml index 52082f9dbf..a427198ea3 100644 --- a/docs/docbook/smbdotconf/security/clientlanmanauth.xml +++ b/docs/docbook/smbdotconf/security/clientlanmanauth.xml @@ -18,7 +18,7 @@ Disabling this option will also disable the client plaintext auth option - Likewise, if the cleint ntlmv2 + Likewise, if the client ntlmv2 auth parameter is enabled, then only NTLMv2 logins will be attempted. Not all servers support NTLMv2, and most will require special configuration to us it. diff --git a/docs/docbook/smbdotconf/security/clientntlmv2auth.xml b/docs/docbook/smbdotconf/security/clientntlmv2auth.xml index 4e60613a3e..0bf196488b 100644 --- a/docs/docbook/smbdotconf/security/clientntlmv2auth.xml +++ b/docs/docbook/smbdotconf/security/clientntlmv2auth.xml @@ -1,4 +1,4 @@ - @@ -21,6 +21,6 @@ those following 'best practice' security polices) only allow NTLMv2 responses, and not the weaker LM or NTLM. - Default : ntlmv2 auth = no + Default : client ntlmv2 auth = no -- cgit