From owner-trustedbsd-cvs@FreeBSD.ORG Mon Jun 22 16:10:57 2015
Return-Path:
Delivered-To: trustedbsd-cvs@nevdull.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 9CAD93CE
for ; Mon, 22 Jun 2015 16:10:57 +0000 (UTC)
(envelope-from owner-perforce@freebsd.org)
Received: from cyrus.watson.org (cyrus.watson.org [198.74.231.69])
by mx1.freebsd.org (Postfix) with ESMTP id 1C46B139
for ; Mon, 22 Jun 2015 16:10:57 +0000 (UTC)
(envelope-from owner-perforce@freebsd.org)
Received: from mx2.freebsd.org (mx2.freebsd.org [8.8.178.116])
by cyrus.watson.org (Postfix) with ESMTPS id 5FCB746CED
for ; Mon, 22 Jun 2015 12:10:56 -0400 (EDT)
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
(No client certificate requested)
by mx2.freebsd.org (Postfix) with ESMTPS id 884972F93;
Mon, 22 Jun 2015 16:10:55 +0000 (UTC)
(envelope-from owner-perforce@freebsd.org)
Received: from freefall.freebsd.org (freefall.freebsd.org
[IPv6:2001:1900:2254:206c::16:87])
by mx1.freebsd.org (Postfix) with ESMTP id 546A6B3;
Mon, 22 Jun 2015 16:10:55 +0000 (UTC)
(envelope-from owner-perforce@freebsd.org)
Received: by freefall.freebsd.org (Postfix, from userid 65534)
id 4F86A1D21; Mon, 22 Jun 2015 16:10:55 +0000 (UTC)
Delivered-To: perforce@localmail.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
by freefall.freebsd.org (Postfix) with ESMTP id 436BD1D1F
for ; Mon, 22 Jun 2015 16:10:55 +0000 (UTC)
(envelope-from brueffer@freebsd.org)
Received: from skunkworks.freebsd.org (skunkworks.freebsd.org
[IPv6:2001:1900:2254:2068::682:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client did not present a certificate)
by mx1.freebsd.org (Postfix) with ESMTPS id 19379AD
for ; Mon, 22 Jun 2015 16:10:55 +0000 (UTC)
(envelope-from brueffer@freebsd.org)
Received: from skunkworks.freebsd.org ([127.0.1.74])
by skunkworks.freebsd.org (8.14.9/8.14.9) with ESMTP id t5MGAsiH046899
for ; Mon, 22 Jun 2015 16:10:54 GMT
(envelope-from brueffer@freebsd.org)
Received: (from perforce@localhost)
by skunkworks.freebsd.org (8.14.9/8.14.9/Submit) id t5MGAsMB046896
for perforce@freebsd.org; Mon, 22 Jun 2015 16:10:54 GMT
(envelope-from brueffer@freebsd.org)
Date: Mon, 22 Jun 2015 16:10:54 GMT
Message-Id: <201506221610.t5MGAsMB046896@skunkworks.freebsd.org>
X-Authentication-Warning: skunkworks.freebsd.org: perforce set sender to
brueffer@freebsd.org using -f
From: Christian Brueffer
Subject: PERFORCE change 1211184 for review
To: Perforce Change Reviews
Precedence: bulk
X-BeenThere: trustedbsd-cvs@FreeBSD.org
X-Mailman-Version: 2.1.20
List-Id: TrustedBSD CVS and Perforce commit message list
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Mon, 22 Jun 2015 16:10:57 -0000
http://p4web.freebsd.org/@@1211184?ac=10
Change 1211184 by brueffer@brueffer_freefall on 2015/06/22 16:10:47
Fix typos.
Affected files ...
.. //depot/projects/trustedbsd/www/openbsm.page#46 edit
Differences ...
==== //depot/projects/trustedbsd/www/openbsm.page#46 (text+ko) ====
@@ -30,7 +30,7 @@
- $P4: //depot/projects/trustedbsd/www/openbsm.page#45 $
+ $P4: //depot/projects/trustedbsd/www/openbsm.page#46 $
@@ -290,8 +290,8 @@
Implemented by Pawel Jakub Dawidek and sponsored by the FreeBSD
Foundation, auditdistd provides a client to run on hosts
generating audit trails, and a server to run on a central secure
- audit host. auditdist uses TLS to encrypt trails on the wire,
- and does is append-only, so that audit trails leading up to a
+ audit host. auditdistd uses TLS to encrypt trails on the wire,
+ and does it append-only, so that audit trails leading up to a
compromise on the client are tamper-proof on the client. This
feature is considered experimental.
@@ -302,7 +302,7 @@
640K |
2012-07-22 |
- In this revision, OpenBSM grows suport for Capsicum system calls
+ In this revision, OpenBSM grows support for Capsicum system calls
and events, has various fixes to address warnings from the Clang
static analyser, fixes trail expiration when the host parameter
is used, adds support for privilege tokens, fixes a directory
@@ -320,7 +320,7 @@
In this revision, OpenBSM's auditd(8) grows support for audit
trail expiration based on age and trail size, various defaults
in audit_control(5) are modernized (such as smaller percent
- free default, and enabling execve(2)argument auditing by
+ free default, and enabling execve(2) argument auditing by
default), socket types and domains are converted to BSM format
when written out, and bugs are fixed in IPC permission token
encoding.
|