docs/77148: [PATCH] Minor text fixes on Handbook chapter MAC

Siebrand Mazeland s.mazeland at xs4all.nl
Sat Feb 5 21:00:51 UTC 2005


The following reply was made to PR docs/77148; it has been noted by GNATS.

From: "Siebrand Mazeland" <s.mazeland at xs4all.nl>
To: <freebsd-gnats-submit at FreeBSD.org>
Cc:  
Subject: Re: docs/77148: [PATCH] Minor text fixes on Handbook chapter MAC
Date: Sat, 5 Feb 2005 21:49:45 +0100

 After a bit of discussion on #bsddocs, we've made a tiny change to the diff.
 
 Index: en_US.ISO8859-1/books/handbook/mac/chapter.sgml
 ===================================================================
 RCS file: /home/ncvs/doc/en_US.ISO8859-1/books/handbook/mac/chapter.sgml,v
 retrieving revision 1.38
 diff -u -r1.38 chapter.sgml
 --- en_US.ISO8859-1/books/handbook/mac/chapter.sgml	12 Jan 2005 01:55:04
 -0000	1.38
 +++ en_US.ISO8859-1/books/handbook/mac/chapter.sgml	5 Feb 2005 19:35:13
 -0000
 @@ -303,7 +303,7 @@
        files by setting certain objects as classified?</para>
  
      <para>In the file system case, access to objects might be
 -      considered confidential to some users but not to others.
 +      considered confidential to some users, but not to others.
        For an example, a large development team might be broken
        off into smaller groups of individuals.  Developers in
        project A might not be permitted to access objects written
 @@ -372,7 +372,7 @@
        with a value of <quote>low</quote>.</para>
  
      <para>A few policies which support the labeling feature in
 -      &os; offers three specific predefined labels.  These
 +      &os; offer three specific predefined labels.  These
        are the low, high, and equal labels.  Although they enforce
        access control in a different manner with each policy, you
        can be sure that the low label will be the lowest setting,
 @@ -385,7 +385,7 @@
        used on objects.  This will enforce one set of
        access permissions across the entire system and in many
        environments may be all that is required.  There are a few
 -      cases; however, where multiple labels may be set on objects
 +      cases where multiple labels may be set on objects
        or subjects in the file system.  For those cases, the
        <option>multilabel</option> option may be passed to
        &man.tunefs.8;.</para>
 @@ -406,7 +406,7 @@
        configures the policy so that users are placed in the
        appropriate categories/access levels.  Alas, many policies can
        restrict the <username>root</username> user as well.  Basic
 -      control over objects will then be released to the group but
 +      control over objects will then be released to the group, but
        <username>root</username> may revoke or modify the settings
        at any time.  This is the hierarchal/clearance model covered
        by policies such as Biba and <acronym>MLS</acronym>.</para>
 @@ -1565,7 +1565,7 @@
  
        <listitem>
  	<para>The <literal>biba/high</literal> label will permit
 -	  writing to objects set at a lower label but not
 +	  writing to objects set at a lower label, but not
  	  permit reading that object.  It is recommended that this
  	  label be placed on objects that affect the integrity of
  	  the entire system.</para>
 @@ -1653,7 +1653,7 @@
  
      <para>The <acronym>MAC</acronym> version of the Low-watermark
        integrity policy, not to be confused with the older &man.lomac.4;
 -      implementation, works almost identically to Biba but with the
 +      implementation, works almost identically to Biba, but with the
        exception of using floating labels to support subject
        demotion via an auxiliary grade compartment.  This secondary
        compartment takes the form of <literal>[auxgrade]</literal>.
 



More information about the freebsd-doc mailing list