Remove a pair of redundant <application> tags.

Split a long paragraph in two smaller ones.
Don't allow whitespace before ':' characters in running text.
This commit is contained in:
Giorgos Keramidas 2002-02-14 13:40:06 +00:00
parent 96d4dfa273
commit c3bb194e6f
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/head/; revision=12180
2 changed files with 10 additions and 10 deletions
en_US.ISO8859-1/books
arch-handbook/jail
developers-handbook/jail

View file

@ -24,13 +24,13 @@
damage caused by an attacker. Specifically, one of these functions
is called secure levels. Similarly, another function which is
present from FreeBSD 4.0 and onward, is a utility called
&man.jail.8;. <application>
<application>jail</application></application> chroots an
&man.jail.8;. <application>Jail</application> chroots an
environment and sets certain restrictions on processes which are
forked from within. For example, a jailed process cannot affect
processes outside of the jail, utilize certain system calls, or
inflict any damage on the main computer.
<application>Jail</application> is becoming the new security
inflict any damage on the main computer.</para>
<para><application>Jail</application> is becoming the new security
model. People are running potentially vulnerable servers such as
Apache, BIND, and sendmail within jails, so that if an attacker
gains root within the <application>Jail</application>, it is only
@ -553,7 +553,7 @@ int prison_ip(struct proc *p, int flag, u_int32_t *ip) {
<para>Jailed users are not allowed to bind services to an ip
which does not belong to the jail. The restriction is also
written within the function in_pcbbind :</para>
written within the function <literal>in_pcbbind</literal>:</para>
<programlisting><filename>/usr/src/sys/net inet/in_pcb.c</filename>
if (nam) {

View file

@ -24,13 +24,13 @@
damage caused by an attacker. Specifically, one of these functions
is called secure levels. Similarly, another function which is
present from FreeBSD 4.0 and onward, is a utility called
&man.jail.8;. <application>
<application>jail</application></application> chroots an
&man.jail.8;. <application>Jail</application> chroots an
environment and sets certain restrictions on processes which are
forked from within. For example, a jailed process cannot affect
processes outside of the jail, utilize certain system calls, or
inflict any damage on the main computer.
<application>Jail</application> is becoming the new security
inflict any damage on the main computer.</para>
<para><application>Jail</application> is becoming the new security
model. People are running potentially vulnerable servers such as
Apache, BIND, and sendmail within jails, so that if an attacker
gains root within the <application>Jail</application>, it is only
@ -553,7 +553,7 @@ int prison_ip(struct proc *p, int flag, u_int32_t *ip) {
<para>Jailed users are not allowed to bind services to an ip
which does not belong to the jail. The restriction is also
written within the function in_pcbbind :</para>
written within the function <literal>in_pcbbind</literal>:</para>
<programlisting><filename>/usr/src/sys/net inet/in_pcb.c</filename>
if (nam) {