Remove a pair of redundant <application> tags.

Split a long paragraph in two smaller ones.
Don't allow whitespace before ':' characters in running text.
This commit is contained in:
Giorgos Keramidas 2002-02-14 13:40:06 +00:00
parent 96d4dfa273
commit c3bb194e6f
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/head/; revision=12180
2 changed files with 10 additions and 10 deletions

View file

@ -24,13 +24,13 @@
damage caused by an attacker. Specifically, one of these functions damage caused by an attacker. Specifically, one of these functions
is called secure levels. Similarly, another function which is is called secure levels. Similarly, another function which is
present from FreeBSD 4.0 and onward, is a utility called present from FreeBSD 4.0 and onward, is a utility called
&man.jail.8;. <application> &man.jail.8;. <application>Jail</application> chroots an
<application>jail</application></application> chroots an
environment and sets certain restrictions on processes which are environment and sets certain restrictions on processes which are
forked from within. For example, a jailed process cannot affect forked from within. For example, a jailed process cannot affect
processes outside of the jail, utilize certain system calls, or processes outside of the jail, utilize certain system calls, or
inflict any damage on the main computer. inflict any damage on the main computer.</para>
<application>Jail</application> is becoming the new security
<para><application>Jail</application> is becoming the new security
model. People are running potentially vulnerable servers such as model. People are running potentially vulnerable servers such as
Apache, BIND, and sendmail within jails, so that if an attacker Apache, BIND, and sendmail within jails, so that if an attacker
gains root within the <application>Jail</application>, it is only gains root within the <application>Jail</application>, it is only
@ -553,7 +553,7 @@ int prison_ip(struct proc *p, int flag, u_int32_t *ip) {
<para>Jailed users are not allowed to bind services to an ip <para>Jailed users are not allowed to bind services to an ip
which does not belong to the jail. The restriction is also which does not belong to the jail. The restriction is also
written within the function in_pcbbind :</para> written within the function <literal>in_pcbbind</literal>:</para>
<programlisting><filename>/usr/src/sys/net inet/in_pcb.c</filename> <programlisting><filename>/usr/src/sys/net inet/in_pcb.c</filename>
if (nam) { if (nam) {

View file

@ -24,13 +24,13 @@
damage caused by an attacker. Specifically, one of these functions damage caused by an attacker. Specifically, one of these functions
is called secure levels. Similarly, another function which is is called secure levels. Similarly, another function which is
present from FreeBSD 4.0 and onward, is a utility called present from FreeBSD 4.0 and onward, is a utility called
&man.jail.8;. <application> &man.jail.8;. <application>Jail</application> chroots an
<application>jail</application></application> chroots an
environment and sets certain restrictions on processes which are environment and sets certain restrictions on processes which are
forked from within. For example, a jailed process cannot affect forked from within. For example, a jailed process cannot affect
processes outside of the jail, utilize certain system calls, or processes outside of the jail, utilize certain system calls, or
inflict any damage on the main computer. inflict any damage on the main computer.</para>
<application>Jail</application> is becoming the new security
<para><application>Jail</application> is becoming the new security
model. People are running potentially vulnerable servers such as model. People are running potentially vulnerable servers such as
Apache, BIND, and sendmail within jails, so that if an attacker Apache, BIND, and sendmail within jails, so that if an attacker
gains root within the <application>Jail</application>, it is only gains root within the <application>Jail</application>, it is only
@ -553,7 +553,7 @@ int prison_ip(struct proc *p, int flag, u_int32_t *ip) {
<para>Jailed users are not allowed to bind services to an ip <para>Jailed users are not allowed to bind services to an ip
which does not belong to the jail. The restriction is also which does not belong to the jail. The restriction is also
written within the function in_pcbbind :</para> written within the function <literal>in_pcbbind</literal>:</para>
<programlisting><filename>/usr/src/sys/net inet/in_pcb.c</filename> <programlisting><filename>/usr/src/sys/net inet/in_pcb.c</filename>
if (nam) { if (nam) {