mirror of https://github.com/tLDP/LDP
fix minor typos in Secure-Programs-HOWTO.sgml
This commit is contained in:
parent
b72bdb2cba
commit
157b214733
|
@ -3528,7 +3528,7 @@ into many virtual machines (in a sense, a ``super-chroot'');
|
|||
its most popular use has been to provide
|
||||
virtual machine services for Internet Service Provider environments.
|
||||
Inside a jail, all processes (even those owned by root)
|
||||
have the the scope of their requests limited to the jail.
|
||||
have the scope of their requests limited to the jail.
|
||||
When a FreeBSD system is booted up after a fresh install,
|
||||
no processes will be in jail.
|
||||
When a process is placed in a jail, it, and any descendants of
|
||||
|
@ -4256,7 +4256,7 @@ for more information about this.
|
|||
</para></listitem>
|
||||
|
||||
<listitem><para>
|
||||
When accepting cookie values, make sure to check the the domain value
|
||||
When accepting cookie values, make sure to check the domain value
|
||||
for any cookie you're using
|
||||
is the expected one. Otherwise, a (possibly cracked) related site
|
||||
might be able to insert spoofed cookies.
|
||||
|
@ -6927,7 +6927,7 @@ The field width only
|
|||
specifies a <emphasis>minimum</emphasis> length and is
|
||||
completely worthless for preventing buffer overflows.
|
||||
In contrast, the precision specification specifies the maximum
|
||||
length that that particular string may have in its output when
|
||||
length that the particular string may have in its output when
|
||||
used as a string conversion specifier - and thus it can be used
|
||||
to protect against buffer overflows.
|
||||
Note that the precision specification only specifies the total maximum
|
||||
|
@ -7212,7 +7212,7 @@ This is a dynamic approach, as the storage grows as necessary.
|
|||
However, it's important to note that if that class's data is turned
|
||||
into a ``char *'' (e.g., by using data() or c_str()),
|
||||
the possibilities of buffer overflow resurface, so you need to be careful
|
||||
when when using such methods.
|
||||
when using such methods.
|
||||
Note that c_str() always returns a NIL-terminated string, but
|
||||
data() may or may not (it's implementation dependent, and most
|
||||
implementations do not include the NIL terminator).
|
||||
|
@ -8217,7 +8217,7 @@ The chroot jail has to be set up to be secure - it must never be
|
|||
controlled by a user and every file added must be carefully examined.
|
||||
Don't use a normal user's home directory, subdirectory, or
|
||||
other directory that can ever be controlled by a user as a chroot jail;
|
||||
use a separate directory directory specially set aside
|
||||
use a separate directory specially set aside
|
||||
for the purpose.
|
||||
<!-- http://msgs.securepoint.com/cgi-bin/get/bugtraq0004/64/1/1/2.html -->
|
||||
<!--
|
||||
|
@ -11116,7 +11116,7 @@ programs that needed vfork's semantics.
|
|||
Some data formats can embed references to content that is automatically
|
||||
retrieved when the data is viewed (not waiting for a user to select it).
|
||||
If it's possible to cause this data to be retrieved through the
|
||||
Internet (e.g., through the World Wide Wide), then there is a
|
||||
Internet (e.g., through the World Wide Web), then there is a
|
||||
potential to use this capability to obtain information about readers
|
||||
without the readers' knowledge, and in some cases to force the reader
|
||||
to perform activities without the reader's consent.
|
||||
|
@ -12352,7 +12352,7 @@ Use the Ada pragma Inspection_Point on the object holding the secret
|
|||
after erasing the memory.
|
||||
That way, you can be certain that
|
||||
the object containing the secret will really be erased
|
||||
(and that the the overwriting won't be optimized away).
|
||||
(and that the overwriting won't be optimized away).
|
||||
</para>
|
||||
|
||||
<para>
|
||||
|
@ -14012,7 +14012,7 @@ this means that code that appears to be correct will be silently discareded.
|
|||
Ada provides the pragma Inspection_Point; place this after the
|
||||
code erasing the memory, and that way you can be certain that
|
||||
the object containing the secret will really be erased
|
||||
(and that the the overwriting won't be optimized away).
|
||||
(and that the overwriting won't be optimized away).
|
||||
</para>
|
||||
|
||||
<para>
|
||||
|
@ -14603,7 +14603,7 @@ For another example, many SSH implementations have been found to have a
|
|||
weakness in exchanging passwords: observers could look at packets and
|
||||
determine the length (or length range) of the password, even if they
|
||||
couldn't determine the password itself.
|
||||
They could also also determine other information about the password that
|
||||
They could also determine other information about the password that
|
||||
significantly aided in breaking it.
|
||||
<!-- http://lwn.net/2001/0322/a/ssh-analysis.php3 -->
|
||||
</para>
|
||||
|
|
Loading…
Reference in New Issue