Index: openacs-4/packages/acs-tcl/tcl/request-processor-procs.tcl =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/acs-tcl/tcl/request-processor-procs.tcl,v diff -u -r1.153.2.62 -r1.153.2.63 --- openacs-4/packages/acs-tcl/tcl/request-processor-procs.tcl 29 May 2024 09:24:37 -0000 1.153.2.62 +++ openacs-4/packages/acs-tcl/tcl/request-processor-procs.tcl 31 May 2024 12:00:00 -0000 1.153.2.63 @@ -655,7 +655,7 @@ # should be after the canonical check to avoid multiple redirects. # The W3C spec (https://www.w3.org/TR/upgrade-insecure-requests/) # requires explicitly the value of "1". By testing this, we - # mitigate atttacks against this header field without losing + # mitigate attacks against this header field without losing # performance. # set upgrade_insecure_requests_p [ns_set iget [ns_conn headers] Upgrade-Insecure-Requests]