===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/plus55.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -r1.32 -r1.33
--- www/plus55.html 2021/09/19 19:22:17 1.32
+++ www/plus55.html 2021/10/08 16:31:36 1.33
@@ -712,7 +712,7 @@
iked(8) now drops duplicate requests, to avoid corrupt child-SA tables.
Made iked(8) discard & free duplicate IKESAs; made sure new SAs are not created that cannot be inserted in the SA tree.
Include hexdump in iked(8) debug output only for -vvv.
-Support raw pubkey authentication w/o x509 certificates in iked(8).
+Support raw pubkey authentication w/o X.509 certificates in iked(8).
When wpi(4) has a fatal firmware error, reset the chip, reload the firmware and bring the interface up again.
Limit the number of envelopes to recall in the smtpd(8) hoststat cache.
Removed some double frees in fuse(4).
@@ -808,7 +808,7 @@
Made athn(4) tick calculation work as intended. Should fix excessive timeouts and "Michael mic" errors.
Cope with the EAGAIN API change for msgbuf_write(3) in various daemons.
Improvements for sppp(4) address assignment and related issues in IPv6CP; deal with IFID collisions instead of ignoring them; use arc4random(3) during IFID generation; assign destination address to /128 point-to-point links.
-Fixed isakmpd(8) parameter types for x509 routines.
+Fixed isakmpd(8) parameter types for X.509 routines.
Be more specific in ksh(1) ulimit error messages.
Fixed ^C handling in miniroot.
@@ -892,7 +892,7 @@
Enabled TX checksum offload in jme(4).
Removed unnecessary spinlock that slowed down pthread_getspecific(3).
Use curve25519 for default sshd(8) key exchange (curve25519-sha256@libssh.org).
-Let ssh(1) support pkcs#11 tokens that only provide x509 certificates instead of raw pubkeys (fixes bz#1908).
+Let ssh(1) support pkcs#11 tokens that only provide X.509 certificates instead of raw pubkeys (fixes bz#1908).
Replaced rc4 with ChaCha20 in crypto(9).
Made sure login_yubikey(8) does not log passwords, even if they are wrong.
Bring back spnego support into kerberos(8) gssapi as it used to be before the update to 1.5.2.