(1) Put MAC kernel options into <literal></literal> when described in
text. (2) Correct option name for mac_seeotheruids. Submitted by: Hiten Pandya <hiten@angelica.unixdaemons.com> (1)
This commit is contained in:
		
							parent
							
								
									bde558861f
								
							
						
					
					
						commit
						9b3a376116
					
				
				
				Notes:
				
					svn2git
				
				2020-12-08 03:00:23 +00:00 
				
			
			svn path=/head/; revision=15224
					 1 changed files with 9 additions and 9 deletions
				
			
		|  | @ -3615,7 +3615,7 @@ user@unfirewalled.myserver.com's password: <userinput>*******</userinput></scree | |||
|       </indexterm> | ||||
|       <para>Vendor: TrustedBSD Project</para> | ||||
|       <para>Module name: mac_biba.ko</para> | ||||
|       <para>Kernel option: MAC_BIBA</para> | ||||
|       <para>Kernel option: <literal>MAC_BIBA</literal></para> | ||||
|       <para>The Biba Integrity Policy (&man.mac.biba.4&) provides | ||||
| 	for hierarchal and non-hierarchal labeling of all system | ||||
| 	objects with integrity data, and the strict enforcement of | ||||
|  | @ -3638,7 +3638,7 @@ user@unfirewalled.myserver.com's password: <userinput>*******</userinput></scree | |||
|       </indexterm> | ||||
|       <para>Vendor: TrustedBSD Project</para> | ||||
|       <para>Module name: mac_bsdextended.ko</para> | ||||
|       <para>Kernel option: MAC_BSDEXTENDED</para> | ||||
|       <para>Kernel option: <literal>MAC_BSDEXTENDED</literal></para> | ||||
|       <para> The File System Firewall Policy (&man.mac.bsdextended.4;) | ||||
| 	provides an extension to the BSD file system permission model, | ||||
| 	permitting the administrator to define a set of firewall-like | ||||
|  | @ -3665,7 +3665,7 @@ user@unfirewalled.myserver.com's password: <userinput>*******</userinput></scree | |||
|       </indexterm> | ||||
|       <para>Vendor: TrustedBSD Project</para> | ||||
|       <para>Module name: mac_ifoff.ko</para> | ||||
|       <para>Kernel option: MAC_IFOFF</para> | ||||
|       <para>Kernel option: <literal>MAC_IFOFF</literal></para> | ||||
|       <para>The interface silencing policy (XXXMANPAGE) | ||||
| 	prohibits the use of network interfaces during the boot | ||||
| 	until explicitly enabled, preventing spurious stack output | ||||
|  | @ -3684,7 +3684,7 @@ user@unfirewalled.myserver.com's password: <userinput>*******</userinput></scree | |||
|       </indexterm> | ||||
|       <para>Vendor: Network Associates Laboratories</para> | ||||
|       <para>Module name: mac_lomac.ko</para> | ||||
|       <para>Kernel option: MAC_LOMAC</para> | ||||
|       <para>Kernel option: <literal>MAC_LOMAC</literal></para> | ||||
|       <para>Similar to the Biba Integrity Policy, the LOMAC | ||||
| 	policy (XXXMANPAGE) relies on the ubiquitous | ||||
| 	labeling of all system objects with integrity labels. | ||||
|  | @ -3707,7 +3707,7 @@ user@unfirewalled.myserver.com's password: <userinput>*******</userinput></scree | |||
|       </indexterm> | ||||
|       <para>Vendor: TrustedBSD Project</para> | ||||
|       <para>Module name: mac_mls.ko</para> | ||||
|       <para>Kernel option: MAC_MLS</para> | ||||
|       <para>Kernel option: <literal>MAC_MLS</literal></para> | ||||
|       <para>Multi-Level Security (<acronym>MLS</acronym>) | ||||
| 	(&man.mac.mls.4;) provides for hierarchal and | ||||
| 	non-hierarchal labeling of all system objects with | ||||
|  | @ -3733,7 +3733,7 @@ user@unfirewalled.myserver.com's password: <userinput>*******</userinput></scree | |||
|       </indexterm> | ||||
|       <para>Vendor: TrustedBSD Project</para> | ||||
|       <para>Module name: mac_none.ko</para> | ||||
|       <para>Kernel option: MAC_NONE</para> | ||||
|       <para>Kernel option: <literal>MAC_NONE</literal></para> | ||||
|       <para>The None policy (XXXMANPAGE) provides a stub | ||||
| 	sample policy for developers, implementing all entry | ||||
| 	points, but not changing the system access control | ||||
|  | @ -3747,7 +3747,7 @@ user@unfirewalled.myserver.com's password: <userinput>*******</userinput></scree | |||
|       </indexterm> | ||||
|       <para>Vendor: TrustedBSD Project</para> | ||||
|       <para>Module name: mac_partition.ko</para> | ||||
|       <para>Kernel option: MAC_PARTITION</para> | ||||
|       <para>Kernel option: <literal>MAC_PARTITION</literal></para> | ||||
|       <para>The Partition policy (XXXMANPAGE) provides for a | ||||
| 	simple process visibility limitation, assigning labels to | ||||
| 	processes identifying what numeric system partition they | ||||
|  | @ -3764,7 +3764,7 @@ user@unfirewalled.myserver.com's password: <userinput>*******</userinput></scree | |||
|       </indexterm> | ||||
|       <para>Vendor: TrustedBSD Project</para> | ||||
|       <para>Module name: mac_seeotheruids.ko</para> | ||||
|       <para>Kernel option: MAC_BIBA</para> | ||||
|       <para>Kernel option: <literal>MAC_SEEOTHERUIDS</literal></para> | ||||
|       <para>The See Other Uids policy (XXXMANPAGE) implements | ||||
| 	a similar process visibility model to mac_partition, | ||||
| 	except that it relies on process credentials to control | ||||
|  | @ -3781,7 +3781,7 @@ user@unfirewalled.myserver.com's password: <userinput>*******</userinput></scree | |||
|       </indexterm> | ||||
|       <para>Vendor: TrustedBSD Project</para> | ||||
|       <para>Module name: mac_test.ko</para> | ||||
|       <para>Kernel option: MAC_TEST</para> | ||||
|       <para>Kernel option: <literal>MAC_TEST</literal></para> | ||||
|       <para>The Test policy (XXXMANPAGE) provides a regression test | ||||
| 	environment for the MAC Framework, and will cause a | ||||
| 	fail-stop in the event that internal MAC Framework assertions | ||||
|  |  | |||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue