From owner-freebsd-doc@FreeBSD.ORG Fri Oct 13 14:10:18 2006 Return-Path: X-Original-To: freebsd-doc@hub.freebsd.org Delivered-To: freebsd-doc@hub.freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 2F92F16A40F for ; Fri, 13 Oct 2006 14:10:18 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [216.136.204.21]) by mx1.FreeBSD.org (Postfix) with ESMTP id EC7CD43D5E for ; Fri, 13 Oct 2006 14:10:16 +0000 (GMT) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.13.4/8.13.4) with ESMTP id k9DEAGvM033625 for ; Fri, 13 Oct 2006 14:10:16 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.13.4/8.13.4/Submit) id k9DEAG6V033624; Fri, 13 Oct 2006 14:10:16 GMT (envelope-from gnats) Resent-Date: Fri, 13 Oct 2006 14:10:16 GMT Resent-Message-Id: <200610131410.k9DEAG6V033624@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-doc@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, Shaun Amott Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 49B8916A4D0 for ; Fri, 13 Oct 2006 14:07:48 +0000 (UTC) (envelope-from shaun@inerd.com) Received: from dione.picobyte.net (host-212-158-207-124.bulldogdsl.com [212.158.207.124]) by mx1.FreeBSD.org (Postfix) with SMTP id D971543D82 for ; Fri, 13 Oct 2006 14:07:38 +0000 (GMT) (envelope-from shaun@inerd.com) Received: from charon.picobyte.net (charon.picobyte.net [IPv6:2001:4bd0:201e::fe03]) by dione.picobyte.net (Postfix) with ESMTP for ; Fri, 13 Oct 2006 15:07:27 +0100 (BST) Message-Id: <1160748387.1522@charon.picobyte.net> Date: Fri, 13 Oct 2006 15:06:27 +0100 From: Shaun Amott To: FreeBSD-gnats-submit@FreeBSD.org X-Send-Pr-Version: 3.113 Cc: Subject: docs/104381: [PATCH] Handbook security chapter: minor grammatical fixes X-BeenThere: freebsd-doc@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: Shaun Amott List-Id: Documentation project List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 13 Oct 2006 14:10:18 -0000 >Number: 104381 >Category: docs >Synopsis: [PATCH] Handbook security chapter: minor grammatical fixes >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-doc >State: open >Quarter: >Keywords: >Date-Required: >Class: doc-bug >Submitter-Id: current-users >Arrival-Date: Fri Oct 13 14:10:16 GMT 2006 >Closed-Date: >Last-Modified: >Originator: Shaun Amott >Release: FreeBSD 6.2-PRERELEASE i386 >Organization: >Environment: >Description: The security chapter of the handbook has a few minor grammatical errors. >How-To-Repeat: >Fix: --- security-chapter.diff begins here --- Index: chapter.sgml =================================================================== RCS file: /home/dcvs/doc/en_US.ISO8859-1/books/handbook/security/chapter.sgml,v retrieving revision 1.299 diff -u -r1.299 chapter.sgml --- chapter.sgml 10 Oct 2006 02:43:40 -0000 1.299 +++ chapter.sgml 12 Oct 2006 14:42:19 -0000 @@ -125,7 +125,7 @@ servers — meaning that external entities can connect and talk to them. As yesterday's mini-computers and mainframes become today's desktops, and as computers become networked and - internetwork, security becomes an even bigger issue. + inter-networked, security becomes an even bigger issue. System security also pertains to dealing with various forms of attack, including attacks that attempt to crash, or otherwise make a @@ -2296,6 +2296,9 @@ Issued Expires Principal Aug 27 15:37:58 Aug 28 01:37:58 krbtgt/EXAMPLE.ORG@EXAMPLE.ORG + The ticket can then be revoked when you have finished: + + &prompt.user; k5destroy @@ -2319,7 +2322,7 @@ Kerberos enabled daemons and a workstation — the server must have a keytab file. This file - contains the servers host key, which allows it and the + contains the server's host key, which allows it and the KDC to verify each others identity. It must be transmitted to the server in a secure fashion, as the security of the server can be broken if the key is made public. @@ -2349,8 +2352,8 @@ you can use kadmin from the Kerberos server. The add --random-key command will let you add the - servers host principal, and the ext command - will allow you to extract the servers host principal to its own + server's host principal, and the ext command + will allow you to extract the server's host principal to its own keytab. For example: &prompt.root; kadmin --- security-chapter.diff ends here --- >Release-Note: >Audit-Trail: >Unformatted: