Author: kkolinko
Date: Thu Sep  5 19:06:38 2024
New Revision: 1920481

URL: http://svn.apache.org/viewvc?rev=1920481&view=rev
Log:
Minor changes. A typo, formatting of a title, clarity.

Modified:
    tomcat/site/trunk/docs/security-model.html
    tomcat/site/trunk/xdocs/security-model.xml

Modified: tomcat/site/trunk/docs/security-model.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-model.html?rev=1920481&r1=1920480&r2=1920481&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-model.html (original)
+++ tomcat/site/trunk/docs/security-model.html Thu Sep  5 19:06:38 2024
@@ -3,7 +3,7 @@
 
     <div class="subsection"><h4 id="Introduction">Introduction</h4><div 
class="text">
 
-      <p>This security model is currently in DRAFT from.</p>
+      <p>This security model is currently in DRAFT form.</p>
 
       <p>The Apache Tomcat<sup>&reg;</sup> Security Team reviews reported
          vulnerabilities against the following security model:</p>
@@ -17,7 +17,7 @@
          any of the following will be rejected:</p>
 
       <ul>
-        <li>The Manager or Host Manager applications provided with Tomcat.</li>
+        <li>The Manager or Host Manager web applications provided with 
Tomcat.</li>
         <li>Tomcat configuration files.</li>
         <li>Tomcat binaries and/or scripts.</li>
         <li>The JMX API (local or remote).</li>
@@ -29,7 +29,7 @@
          perform (e.g. CSRF vulnerabilities) will be accepted.</p>
 
     </div></div>
-    
+
     <div class="subsection"><h4 id="Web_applications">Web 
applications</h4><div class="text">
 
       <p>Web applications deployed to Tomcat are considered to be trusted.
@@ -39,8 +39,8 @@
       <p>Reports of vulnerabilities in the web applications included with
          standard Tomcat distributions from the ASF will be accepted. Reporters
          should review the comments about each of the provided applications in
-         the security considerations section of the documentation for the
-         version under test.</p>
+         the <strong><i>Security Considerations</i></strong> section of the
+         documentation for the version under test.</p>
 
     </div></div>
 
@@ -54,8 +54,8 @@
             permitted by <code>allowedRequestAttributesPattern</code> for an 
AJP
             connector.</li>
         <li>HTTP headers processed by a <code>RemoteIpValve</code>,
-            <code>SSLValve</code>, equivalent filters or any similar
-            functionality.</li>
+            <code>SSLValve</code>, equivalent filters 
(<code>RemoteIpFilter</code>)
+            or any similar functionality.</li>
       </ul>
 
     </div></div>

Modified: tomcat/site/trunk/xdocs/security-model.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-model.xml?rev=1920481&r1=1920480&r2=1920481&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-model.xml (original)
+++ tomcat/site/trunk/xdocs/security-model.xml Thu Sep  5 19:06:38 2024
@@ -11,7 +11,7 @@
 
     <subsection name="Introduction">
 
-      <p>This security model is currently in DRAFT from.</p>
+      <p>This security model is currently in DRAFT form.</p>
 
       <p>The Apache Tomcat<sup>&#174;</sup> Security Team reviews reported
          vulnerabilities against the following security model:</p>
@@ -25,7 +25,7 @@
          any of the following will be rejected:</p>
 
       <ul>
-        <li>The Manager or Host Manager applications provided with Tomcat.</li>
+        <li>The Manager or Host Manager web applications provided with 
Tomcat.</li>
         <li>Tomcat configuration files.</li>
         <li>Tomcat binaries and/or scripts.</li>
         <li>The JMX API (local or remote).</li>
@@ -37,7 +37,7 @@
          perform (e.g. CSRF vulnerabilities) will be accepted.</p>
 
     </subsection>
-    
+
     <subsection name="Web applications">
 
       <p>Web applications deployed to Tomcat are considered to be trusted.
@@ -47,8 +47,8 @@
       <p>Reports of vulnerabilities in the web applications included with
          standard Tomcat distributions from the ASF will be accepted. Reporters
          should review the comments about each of the provided applications in
-         the security considerations section of the documentation for the
-         version under test.</p>
+         the <strong><i>Security Considerations</i></strong> section of the
+         documentation for the version under test.</p>
 
     </subsection>
 
@@ -62,8 +62,8 @@
             permitted by <code>allowedRequestAttributesPattern</code> for an 
AJP
             connector.</li>
         <li>HTTP headers processed by a <code>RemoteIpValve</code>,
-            <code>SSLValve</code>, equivalent filters or any similar
-            functionality.</li>
+            <code>SSLValve</code>, equivalent filters 
(<code>RemoteIpFilter</code>)
+            or any similar functionality.</li>
       </ul>
 
     </subsection>



---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to