Author: kkolinko Date: Thu Sep 5 19:06:38 2024 New Revision: 1920481 URL: http://svn.apache.org/viewvc?rev=1920481&view=rev Log: Minor changes. A typo, formatting of a title, clarity.
Modified: tomcat/site/trunk/docs/security-model.html tomcat/site/trunk/xdocs/security-model.xml Modified: tomcat/site/trunk/docs/security-model.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-model.html?rev=1920481&r1=1920480&r2=1920481&view=diff ============================================================================== --- tomcat/site/trunk/docs/security-model.html (original) +++ tomcat/site/trunk/docs/security-model.html Thu Sep 5 19:06:38 2024 @@ -3,7 +3,7 @@ <div class="subsection"><h4 id="Introduction">Introduction</h4><div class="text"> - <p>This security model is currently in DRAFT from.</p> + <p>This security model is currently in DRAFT form.</p> <p>The Apache Tomcat<sup>®</sup> Security Team reviews reported vulnerabilities against the following security model:</p> @@ -17,7 +17,7 @@ any of the following will be rejected:</p> <ul> - <li>The Manager or Host Manager applications provided with Tomcat.</li> + <li>The Manager or Host Manager web applications provided with Tomcat.</li> <li>Tomcat configuration files.</li> <li>Tomcat binaries and/or scripts.</li> <li>The JMX API (local or remote).</li> @@ -29,7 +29,7 @@ perform (e.g. CSRF vulnerabilities) will be accepted.</p> </div></div> - + <div class="subsection"><h4 id="Web_applications">Web applications</h4><div class="text"> <p>Web applications deployed to Tomcat are considered to be trusted. @@ -39,8 +39,8 @@ <p>Reports of vulnerabilities in the web applications included with standard Tomcat distributions from the ASF will be accepted. Reporters should review the comments about each of the provided applications in - the security considerations section of the documentation for the - version under test.</p> + the <strong><i>Security Considerations</i></strong> section of the + documentation for the version under test.</p> </div></div> @@ -54,8 +54,8 @@ permitted by <code>allowedRequestAttributesPattern</code> for an AJP connector.</li> <li>HTTP headers processed by a <code>RemoteIpValve</code>, - <code>SSLValve</code>, equivalent filters or any similar - functionality.</li> + <code>SSLValve</code>, equivalent filters (<code>RemoteIpFilter</code>) + or any similar functionality.</li> </ul> </div></div> Modified: tomcat/site/trunk/xdocs/security-model.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-model.xml?rev=1920481&r1=1920480&r2=1920481&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/security-model.xml (original) +++ tomcat/site/trunk/xdocs/security-model.xml Thu Sep 5 19:06:38 2024 @@ -11,7 +11,7 @@ <subsection name="Introduction"> - <p>This security model is currently in DRAFT from.</p> + <p>This security model is currently in DRAFT form.</p> <p>The Apache Tomcat<sup>®</sup> Security Team reviews reported vulnerabilities against the following security model:</p> @@ -25,7 +25,7 @@ any of the following will be rejected:</p> <ul> - <li>The Manager or Host Manager applications provided with Tomcat.</li> + <li>The Manager or Host Manager web applications provided with Tomcat.</li> <li>Tomcat configuration files.</li> <li>Tomcat binaries and/or scripts.</li> <li>The JMX API (local or remote).</li> @@ -37,7 +37,7 @@ perform (e.g. CSRF vulnerabilities) will be accepted.</p> </subsection> - + <subsection name="Web applications"> <p>Web applications deployed to Tomcat are considered to be trusted. @@ -47,8 +47,8 @@ <p>Reports of vulnerabilities in the web applications included with standard Tomcat distributions from the ASF will be accepted. Reporters should review the comments about each of the provided applications in - the security considerations section of the documentation for the - version under test.</p> + the <strong><i>Security Considerations</i></strong> section of the + documentation for the version under test.</p> </subsection> @@ -62,8 +62,8 @@ permitted by <code>allowedRequestAttributesPattern</code> for an AJP connector.</li> <li>HTTP headers processed by a <code>RemoteIpValve</code>, - <code>SSLValve</code>, equivalent filters or any similar - functionality.</li> + <code>SSLValve</code>, equivalent filters (<code>RemoteIpFilter</code>) + or any similar functionality.</li> </ul> </subsection> --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org