mirror of https://github.com/tLDP/LDP
fix minor typos in Secure-Programs-HOWTO.sgml
This commit is contained in:
parent
b72bdb2cba
commit
157b214733
|
@ -3528,7 +3528,7 @@ into many virtual machines (in a sense, a ``super-chroot'');
|
||||||
its most popular use has been to provide
|
its most popular use has been to provide
|
||||||
virtual machine services for Internet Service Provider environments.
|
virtual machine services for Internet Service Provider environments.
|
||||||
Inside a jail, all processes (even those owned by root)
|
Inside a jail, all processes (even those owned by root)
|
||||||
have the the scope of their requests limited to the jail.
|
have the scope of their requests limited to the jail.
|
||||||
When a FreeBSD system is booted up after a fresh install,
|
When a FreeBSD system is booted up after a fresh install,
|
||||||
no processes will be in jail.
|
no processes will be in jail.
|
||||||
When a process is placed in a jail, it, and any descendants of
|
When a process is placed in a jail, it, and any descendants of
|
||||||
|
@ -4256,7 +4256,7 @@ for more information about this.
|
||||||
</para></listitem>
|
</para></listitem>
|
||||||
|
|
||||||
<listitem><para>
|
<listitem><para>
|
||||||
When accepting cookie values, make sure to check the the domain value
|
When accepting cookie values, make sure to check the domain value
|
||||||
for any cookie you're using
|
for any cookie you're using
|
||||||
is the expected one. Otherwise, a (possibly cracked) related site
|
is the expected one. Otherwise, a (possibly cracked) related site
|
||||||
might be able to insert spoofed cookies.
|
might be able to insert spoofed cookies.
|
||||||
|
@ -6927,7 +6927,7 @@ The field width only
|
||||||
specifies a <emphasis>minimum</emphasis> length and is
|
specifies a <emphasis>minimum</emphasis> length and is
|
||||||
completely worthless for preventing buffer overflows.
|
completely worthless for preventing buffer overflows.
|
||||||
In contrast, the precision specification specifies the maximum
|
In contrast, the precision specification specifies the maximum
|
||||||
length that that particular string may have in its output when
|
length that the particular string may have in its output when
|
||||||
used as a string conversion specifier - and thus it can be used
|
used as a string conversion specifier - and thus it can be used
|
||||||
to protect against buffer overflows.
|
to protect against buffer overflows.
|
||||||
Note that the precision specification only specifies the total maximum
|
Note that the precision specification only specifies the total maximum
|
||||||
|
@ -7212,7 +7212,7 @@ This is a dynamic approach, as the storage grows as necessary.
|
||||||
However, it's important to note that if that class's data is turned
|
However, it's important to note that if that class's data is turned
|
||||||
into a ``char *'' (e.g., by using data() or c_str()),
|
into a ``char *'' (e.g., by using data() or c_str()),
|
||||||
the possibilities of buffer overflow resurface, so you need to be careful
|
the possibilities of buffer overflow resurface, so you need to be careful
|
||||||
when when using such methods.
|
when using such methods.
|
||||||
Note that c_str() always returns a NIL-terminated string, but
|
Note that c_str() always returns a NIL-terminated string, but
|
||||||
data() may or may not (it's implementation dependent, and most
|
data() may or may not (it's implementation dependent, and most
|
||||||
implementations do not include the NIL terminator).
|
implementations do not include the NIL terminator).
|
||||||
|
@ -8217,7 +8217,7 @@ The chroot jail has to be set up to be secure - it must never be
|
||||||
controlled by a user and every file added must be carefully examined.
|
controlled by a user and every file added must be carefully examined.
|
||||||
Don't use a normal user's home directory, subdirectory, or
|
Don't use a normal user's home directory, subdirectory, or
|
||||||
other directory that can ever be controlled by a user as a chroot jail;
|
other directory that can ever be controlled by a user as a chroot jail;
|
||||||
use a separate directory directory specially set aside
|
use a separate directory specially set aside
|
||||||
for the purpose.
|
for the purpose.
|
||||||
<!-- http://msgs.securepoint.com/cgi-bin/get/bugtraq0004/64/1/1/2.html -->
|
<!-- http://msgs.securepoint.com/cgi-bin/get/bugtraq0004/64/1/1/2.html -->
|
||||||
<!--
|
<!--
|
||||||
|
@ -11116,7 +11116,7 @@ programs that needed vfork's semantics.
|
||||||
Some data formats can embed references to content that is automatically
|
Some data formats can embed references to content that is automatically
|
||||||
retrieved when the data is viewed (not waiting for a user to select it).
|
retrieved when the data is viewed (not waiting for a user to select it).
|
||||||
If it's possible to cause this data to be retrieved through the
|
If it's possible to cause this data to be retrieved through the
|
||||||
Internet (e.g., through the World Wide Wide), then there is a
|
Internet (e.g., through the World Wide Web), then there is a
|
||||||
potential to use this capability to obtain information about readers
|
potential to use this capability to obtain information about readers
|
||||||
without the readers' knowledge, and in some cases to force the reader
|
without the readers' knowledge, and in some cases to force the reader
|
||||||
to perform activities without the reader's consent.
|
to perform activities without the reader's consent.
|
||||||
|
@ -12352,7 +12352,7 @@ Use the Ada pragma Inspection_Point on the object holding the secret
|
||||||
after erasing the memory.
|
after erasing the memory.
|
||||||
That way, you can be certain that
|
That way, you can be certain that
|
||||||
the object containing the secret will really be erased
|
the object containing the secret will really be erased
|
||||||
(and that the the overwriting won't be optimized away).
|
(and that the overwriting won't be optimized away).
|
||||||
</para>
|
</para>
|
||||||
|
|
||||||
<para>
|
<para>
|
||||||
|
@ -14012,7 +14012,7 @@ this means that code that appears to be correct will be silently discareded.
|
||||||
Ada provides the pragma Inspection_Point; place this after the
|
Ada provides the pragma Inspection_Point; place this after the
|
||||||
code erasing the memory, and that way you can be certain that
|
code erasing the memory, and that way you can be certain that
|
||||||
the object containing the secret will really be erased
|
the object containing the secret will really be erased
|
||||||
(and that the the overwriting won't be optimized away).
|
(and that the overwriting won't be optimized away).
|
||||||
</para>
|
</para>
|
||||||
|
|
||||||
<para>
|
<para>
|
||||||
|
@ -14603,7 +14603,7 @@ For another example, many SSH implementations have been found to have a
|
||||||
weakness in exchanging passwords: observers could look at packets and
|
weakness in exchanging passwords: observers could look at packets and
|
||||||
determine the length (or length range) of the password, even if they
|
determine the length (or length range) of the password, even if they
|
||||||
couldn't determine the password itself.
|
couldn't determine the password itself.
|
||||||
They could also also determine other information about the password that
|
They could also determine other information about the password that
|
||||||
significantly aided in breaking it.
|
significantly aided in breaking it.
|
||||||
<!-- http://lwn.net/2001/0322/a/ssh-analysis.php3 -->
|
<!-- http://lwn.net/2001/0322/a/ssh-analysis.php3 -->
|
||||||
</para>
|
</para>
|
||||||
|
|
Loading…
Reference in New Issue