Subject: Avoiding gender-specific language Package: securing-howto Severity: minor Tags: patch
Dear Maintainer, *** Please consider answering these questions, where appropriate *** * What led up to the situation? I was searching for gender-specific language to correct across all the documentation that is part of DDP * What exactly did you do (or not do) that was effective (or ineffective)? grep -r " he " ./* | grep .sgml grep -r " his " ./* | grep .sgml grep -r " him " ./* | grep .sgml and ignored all the files that were included in a language-specific folder other than english * What was the outcome of this action? I found some issues and created the patch attached here. All the best, Myriam -- System Information: Debian Release: 7.6 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: i386 (i686) Kernel: Linux 3.2.0-4-686-pae (SMP w/4 CPU cores) Locale: LANG=en_GB.utf8, LC_CTYPE=en_GB.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash
Index: de/intro.sgml =================================================================== --- de/intro.sgml (revision 10421) +++ de/intro.sgml (working copy) @@ -960,7 +960,7 @@ Debian GNU/Linux related to resource starvation) <item>As suggested by Julián Muñoz, provided more information on the -default Debian umask and what a user can access if he has been given a +default Debian umask and what a user can access if given a shell in the system (scary, huh?) <item>Included a note in the BIOS password section due to a comment Index: en/after-install.sgml =================================================================== --- en/after-install.sgml (revision 10421) +++ en/after-install.sgml (working copy) @@ -558,8 +558,8 @@ <p>However, many script kiddies have exploits which try to create and execute files in <file>/tmp</file>. If they do not have a clue, they will fall into this pit. In other words, a user cannot be tricked into executing a trojanized -binary in <file>/tmp</file> e.g. when he incidentally adds <file>/tmp</file> -into his PATH. +binary in <file>/tmp</file> e.g. when <file>/tmp</file> is accidentally added +into the local PATH. <p>Also be forewarned, some script might depend on <file>/tmp</file> being executable. Most notably, Debconf has (had?) some issues regarding @@ -677,7 +677,7 @@ <p>PAM offers you the possibility to go through several authentication steps at once, without the user's knowledge. You could authenticate against a Berkeley database and against the normal <file>passwd</file> file, -and the user only logs in if he authenticates correct in both. +and the user only logs in if the authentication succeeds in both. You can restrict a lot with PAM, just as you can open your system doors very wide. So be careful. A typical configuration line has a control field as its second element. <!-- Second in mine (old Debian v2.0 though), check this! (FIXME) (era) --> @@ -779,7 +779,7 @@ <p>Please note that these restrictions apply to all users but <em>not</em> to the password changes done by the root user. The root user will -be able to set up any password (any length or complexity) for himself or others +be able to set up any password (any length or complexity) for personal use or others regardless of the restrictions defined here. <sect2 id="pam-rootaccess">User access control in PAM @@ -804,7 +804,7 @@ <sect2 id="pam-limits">User limits in PAM -<p> he following line should be enabled in <file>/etc/pam.d/login</file> +<p> The following line should be enabled in <file>/etc/pam.d/login</file> to set up user resource limits. <example> @@ -838,7 +838,7 @@ <p>If you want only certain users to authenticate at a PAM service, this is quite easy to achieve by using files where the users who are allowed to login (or not) are stored. Imagine you only want to allow -user 'ref' to log in via <prgn>ssh</prgn>. So you put him into +users 'ref' to log in via <prgn>ssh</prgn>. So you put them into <file>/etc/sshusers-allowed</file> and write the following into <file>/etc/pam.d/ssh</file>: @@ -1158,9 +1158,8 @@ <p> <prgn>sudo</prgn> allows the user to execute defined commands under another user's identity, even as root. If the user is added to -<file>/etc/sudoers</file> and authenticates himself correctly, he is -able to run commands which have been defined in -<file>/etc/sudoers</file>. Violations, such as incorrect passwords or +<file>/etc/sudoers</file> and authenticates correctly, the commands defined in +<file>/etc/sudoers</file> get enabled. Violations, such as incorrect passwords or trying to run a program you don't have permission for, are logged and mailed to root. @@ -1311,9 +1310,8 @@ the user's <file>.profile</file>. But then you would need to setup permissions properly in such a way that prevents the user from modifying this file. This includes: having the user's -home directories <em>not</em> belong to the user (since he would -be able to remove the file otherwise) but at the same time enable them -to read the <file>.profile</file> configuration file and write on the +home directories <em>not</em> belong to the user (since the user would +be able to remove the file otherwise) but at the same time allow the user to read the <file>.profile</file> configuration file and write on the <file>.bash_history</file>. It would be good to set the <em>immutable</em> flag (also using <prgn>chattr</prgn>) for <file>.profile</file> too if you do it this way. @@ -1381,7 +1379,7 @@ you set this value to no, although it is not recommended</p></footnote>) creates one group per user so that only the user is included in its group. Consequently 027 and 077 are equivalent as the user's group contains only the -user himself. +user. <p>This change is set by defining a proper <tt>umask</tt> setting for all users. You can change this by introducing an <prgn>umask</prgn> call @@ -1469,7 +1467,7 @@ </example> <p>The output is the list of files that a user can <em>see</em> and -the directories to which he has access. +the accessable directories. <sect2 id="limit-user-perm">Limiting access to other user's information @@ -1563,7 +1561,7 @@ <p>A system administrator must, given a big number of users, check if the passwords they have are consistent with the local security -policy. How to check? Try to crack them as an attacker would if he had +policy. How to check? Try to crack them as an attacker would if having access to the hashed passwords (the <file>/etc/shadow</file> file). <p>An administrator can use <package>john</package> or <package>crack</package> @@ -1587,7 +1585,7 @@ <item>because the user's console might be unlocked and can be accessed by an intruder. -<item>because an attacker might be able to re-attach himself to a +<item>because an attacker might be able to re-attach to a closed network connection and send commands to the remote shell (this is fairly easy if the remote shell is not encrypted as in the case of <prgn>telnet</prgn>). @@ -1887,7 +1885,7 @@ <p>A loghost is a host which collects syslog data remotely over the network. If one of your machines is cracked, the intruder is not able -to cover his tracks, unless he hacks the loghost as well. So, the +to cover the tracks, unless hacking the loghost as well. So, the loghost should be especially secure. Making a machine a loghost is simple. Just start the <prgn>syslogd</prgn> with <tt>syslogd -r</tt> and a new loghost is born. In order to do this permanently in Debian, edit @@ -1938,7 +1936,7 @@ change or disable are not worth much in the event of an intrusion. Also, you have to take into account that log files might reveal quite a lot of information about your system to an intruder -if he has access to them. +who has access to them. <!-- It should be explained why after installation this is not already done, jfs --> @@ -2331,9 +2329,7 @@ superuser can already use the basic Unix permissions to restrict access to a file, and an intruder that would get access to the superuser account could always use the <prgn>chattr</prgn> program to -remove the attribute. Such an intruder may first be confused when he -sees that he is not able to remove a file, but you should not assume -that he is blind - after all, he got into your system! Some manuals +remove the attribute. Such an intruder may first be confused when noticing not being able to remove a file, but you should not assume blindness - after all, the intruder got into your system! Some manuals (including a previous version of this document) suggest to simply remove the <prgn>chattr</prgn> and <prgn>lsattr</prgn> programs from the system to increase security, but this kind of strategy, also known @@ -2365,7 +2361,7 @@ <p> Now that the capability has been removed from the system, an intruder cannot change any attribute on the protected files, and thus cannot -change or remove the files. If he forces the machine to reboot (which +change or remove the files. If the machine is forced to reboot (which is the only way to restore the capabilities bounding set), it will easily be detected, and the capability will be removed again as soon as the system restarts anyway. The only way to change a protected file @@ -2415,8 +2411,7 @@ <prgn>locate</prgn> with the package <package>slocate</package>. slocate is labeled as a security enhanced version of GNU locate, but it actually provides additional file-locating functionality. -When using <prgn>slocate</prgn>, the user only sees the files he really -has access to and you can exclude any files or directories on the +When using <prgn>slocate</prgn>, the user only sees the actually accessible files and you can exclude any files or directories on the system. The <package>slocate</package> package runs its update process with higher privledges than locate, and indexes every file. Users are then able to quickly search for every file which they are @@ -2447,7 +2442,7 @@ but, instead keeps daily copies of the changes in <file>/var/log/setuid.changes</file>. You should set the MAILTO variable (in <file>/etc/checksecurity.conf</file>) to 'root' to -have this information mailed to him. See <manref +have this information mailed to the superuser. See <manref name="checksecurity" section="8"> for more configuration info. <sect id="network-secure">Securing network access @@ -2814,7 +2809,7 @@ within the same (local) network. <footnote> An attacker might have many problems pulling the access through -after configuring the IP-address binding if he is not on the same +after configuring the IP-address binding while not being on the same broadcast domain (same network) as the attacked host. If the attack goes through a router it might be quite difficult for the answers to return somewhere. Index: en/faq.sgml =================================================================== --- en/faq.sgml (revision 10421) +++ en/faq.sgml (working copy) @@ -15,7 +15,7 @@ <em>secure</em>, but may not be as paranoid as some other operating systems which install all services <em>disabled by default</em>. In any case, the system administrator needs to adapt the security of the -system to his local security policy. +system to the local security policy. <p>For a collection of data regarding security vulnerabilities for many operating systems, see the @@ -1032,7 +1032,7 @@ or more members review it and consider its impact on the stable release of Debian (i.e. if it's vulnerable or not). If our system is vulnerable, we work on a fix for the problem. The package maintainer is -contacted as well, if he didn't contact the Security Team already. +contacted as well, if the Security Team hadn't been already contacted. Finally, the fix is tested and new packages are prepared, which then are compiled on all stable architectures and uploaded afterwards. After all of that is done, an advisory is published. Index: en/intro.sgml =================================================================== --- en/intro.sgml (revision 10421) +++ en/intro.sgml (working copy) @@ -1018,7 +1018,7 @@ Debian GNU/Linux related to resource starvation). <item>As suggested by Julián Muñoz, provided more information on the -default Debian umask and what a user can access if he has been given a +default Debian umask and what a user can access if given a shell in the system (scary, huh?). <item>Included a note in the BIOS password section due to a comment Index: en/services.sgml =================================================================== --- en/services.sgml (revision 10421) +++ en/services.sgml (working copy) @@ -1247,8 +1247,8 @@ restrict a daemon or a user or another service. Just imagine a jail around your target, which the target cannot escape from (normally, but there are still a lot of conditions that allow one to escape out of -such a jail). If you do not trust a user or a service, you can create -a modified root environment for him. This can use quite a bit of disk +such a jail). You can eventually create +a modified root environment for the user or service you do not trust. This can use quite a bit of disk space as you need to copy all needed executables, as well as libraries, into the jail. But then, even if the user does something malicious, the scope of the damage is limited to the jail. @@ -1542,7 +1542,7 @@ <p>Of course, the configuration of the firewall is always system and network dependant. An administrator must know beforehand what is the -network layout and the systems he wants to protect, the services that +network layout and the systems to protect, the services that need to be accessed, and whether or not other network considerations (like NAT or routing) need to be taken into account. Be careful when configuring your firewall, as Laurence J. Lane says in the @@ -1551,9 +1551,9 @@ <p><em>The tools can easily be misused, causing enormous amounts of grief by completely crippling network access to a system. It is not terribly uncommon for a remote system administrator to -accidentally lock himself out of a system hundreds or thousands of -miles away. One can even manage to lock himself out of a computer -who's keyboard is under his fingers. Please, use due caution.</em> +accidentally get locked out of a system hundreds or thousands of +miles away. You can even manage to get locked out of a computer +who's keyboard is under your own fingers. Please, use due caution.</em> <p>Remember this: just installing the <package>iptables</package> (or the older firewalling code) does not give you any protection, just
signature.asc
Description: OpenPGP digital signature