|
@@ -33,7 +33,7 @@ is pretty basic.
|
|
|
A data packet can only be sent if the encryption key, cipher and digest are
|
|
|
known to both parties, and the connection is activated. If the encryption key
|
|
|
is not known, a request is sent to the destination using the meta connection to
|
|
|
-retreive it.
|
|
|
+retrieve it.
|
|
|
|
|
|
0 1 2 3 4 5 6 7 ... 97 98 99 100
|
|
|
| seqno | data | MAC |
|
|
@@ -59,7 +59,7 @@ daemon and to read and write requests by hand, provided that one
|
|
|
understands the numeric codes sent.
|
|
|
|
|
|
The authentication scheme is described in the SECURITY2 file. After a
|
|
|
-succesful authentication, the server and the client will exchange all the
|
|
|
+successful authentication, the server and the client will exchange all the
|
|
|
information about other tinc daemons and subnets they know of, so that both
|
|
|
sides (and all the other tinc daemons behind them) have their information
|
|
|
synchronised.
|