Remove a pair of redundant <application> tags.
Split a long paragraph in two smaller ones. Don't allow whitespace before ':' characters in running text.
This commit is contained in:
parent
96d4dfa273
commit
c3bb194e6f
Notes:
svn2git
2020-12-08 03:00:23 +00:00
svn path=/head/; revision=12180
2 changed files with 10 additions and 10 deletions
|
@ -24,13 +24,13 @@
|
||||||
damage caused by an attacker. Specifically, one of these functions
|
damage caused by an attacker. Specifically, one of these functions
|
||||||
is called secure levels. Similarly, another function which is
|
is called secure levels. Similarly, another function which is
|
||||||
present from FreeBSD 4.0 and onward, is a utility called
|
present from FreeBSD 4.0 and onward, is a utility called
|
||||||
&man.jail.8;. <application>
|
&man.jail.8;. <application>Jail</application> chroots an
|
||||||
<application>jail</application></application> chroots an
|
|
||||||
environment and sets certain restrictions on processes which are
|
environment and sets certain restrictions on processes which are
|
||||||
forked from within. For example, a jailed process cannot affect
|
forked from within. For example, a jailed process cannot affect
|
||||||
processes outside of the jail, utilize certain system calls, or
|
processes outside of the jail, utilize certain system calls, or
|
||||||
inflict any damage on the main computer.
|
inflict any damage on the main computer.</para>
|
||||||
<application>Jail</application> is becoming the new security
|
|
||||||
|
<para><application>Jail</application> is becoming the new security
|
||||||
model. People are running potentially vulnerable servers such as
|
model. People are running potentially vulnerable servers such as
|
||||||
Apache, BIND, and sendmail within jails, so that if an attacker
|
Apache, BIND, and sendmail within jails, so that if an attacker
|
||||||
gains root within the <application>Jail</application>, it is only
|
gains root within the <application>Jail</application>, it is only
|
||||||
|
@ -553,7 +553,7 @@ int prison_ip(struct proc *p, int flag, u_int32_t *ip) {
|
||||||
|
|
||||||
<para>Jailed users are not allowed to bind services to an ip
|
<para>Jailed users are not allowed to bind services to an ip
|
||||||
which does not belong to the jail. The restriction is also
|
which does not belong to the jail. The restriction is also
|
||||||
written within the function in_pcbbind :</para>
|
written within the function <literal>in_pcbbind</literal>:</para>
|
||||||
|
|
||||||
<programlisting><filename>/usr/src/sys/net inet/in_pcb.c</filename>
|
<programlisting><filename>/usr/src/sys/net inet/in_pcb.c</filename>
|
||||||
if (nam) {
|
if (nam) {
|
||||||
|
|
|
@ -24,13 +24,13 @@
|
||||||
damage caused by an attacker. Specifically, one of these functions
|
damage caused by an attacker. Specifically, one of these functions
|
||||||
is called secure levels. Similarly, another function which is
|
is called secure levels. Similarly, another function which is
|
||||||
present from FreeBSD 4.0 and onward, is a utility called
|
present from FreeBSD 4.0 and onward, is a utility called
|
||||||
&man.jail.8;. <application>
|
&man.jail.8;. <application>Jail</application> chroots an
|
||||||
<application>jail</application></application> chroots an
|
|
||||||
environment and sets certain restrictions on processes which are
|
environment and sets certain restrictions on processes which are
|
||||||
forked from within. For example, a jailed process cannot affect
|
forked from within. For example, a jailed process cannot affect
|
||||||
processes outside of the jail, utilize certain system calls, or
|
processes outside of the jail, utilize certain system calls, or
|
||||||
inflict any damage on the main computer.
|
inflict any damage on the main computer.</para>
|
||||||
<application>Jail</application> is becoming the new security
|
|
||||||
|
<para><application>Jail</application> is becoming the new security
|
||||||
model. People are running potentially vulnerable servers such as
|
model. People are running potentially vulnerable servers such as
|
||||||
Apache, BIND, and sendmail within jails, so that if an attacker
|
Apache, BIND, and sendmail within jails, so that if an attacker
|
||||||
gains root within the <application>Jail</application>, it is only
|
gains root within the <application>Jail</application>, it is only
|
||||||
|
@ -553,7 +553,7 @@ int prison_ip(struct proc *p, int flag, u_int32_t *ip) {
|
||||||
|
|
||||||
<para>Jailed users are not allowed to bind services to an ip
|
<para>Jailed users are not allowed to bind services to an ip
|
||||||
which does not belong to the jail. The restriction is also
|
which does not belong to the jail. The restriction is also
|
||||||
written within the function in_pcbbind :</para>
|
written within the function <literal>in_pcbbind</literal>:</para>
|
||||||
|
|
||||||
<programlisting><filename>/usr/src/sys/net inet/in_pcb.c</filename>
|
<programlisting><filename>/usr/src/sys/net inet/in_pcb.c</filename>
|
||||||
if (nam) {
|
if (nam) {
|
||||||
|
|
Loading…
Reference in a new issue