From 4701c9bc6f23c9caef66584b606fefeed4d4935f Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Wed, 27 Mar 2019 04:53:28 -0400 Subject: [PATCH] grammar: reword complicated sentence --- docs/dnssec/modes-of-operation.rst | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/dnssec/modes-of-operation.rst b/docs/dnssec/modes-of-operation.rst index 9043a91381..f6679dafbd 100644 --- a/docs/dnssec/modes-of-operation.rst +++ b/docs/dnssec/modes-of-operation.rst @@ -26,8 +26,8 @@ serve identical records, keys, and signatures. In this mode of operation, care should be taken that the database replication occurs over a secure network, or over an encrypted -connection. This is because keying material, if intercepted, could be -used to counterfeit DNSSEC data using the original keys. +connection. If intercepted, keying material could be used to counterfeit +DNSSEC data using the original keys. Such a single replicated database requires no further attention beyond monitoring already required during non-DNSSEC operations. -- 2.47.2