doc-el commit 1013:6126f30a2a70 - Replace English text of 'mac' ...

freebsd-doc-el at lists.hellug.gr freebsd-doc-el at lists.hellug.gr
Sun Nov 9 06:50:06 EET 2008


changeset: 1013:6126f30a2a70
user:      Manolis Kiagias <sonicy at otenet.gr>
date:      2008-11-06 16:11 +0200
details:   http://hg.hellug.gr/freebsd/doc-el/?cmd=changeset;node=6126f30a2a70

description:
	Replace English text of 'mac' chapter with rev. 1.73 (no changes in synopsis)

diffstat:

1 file changed, 52 insertions(+), 55 deletions(-)
el_GR.ISO8859-7/books/handbook/mac/chapter.sgml |  107 +++++++++++------------

diffs (147 lines):

diff -r 3f358921f528 -r 6126f30a2a70 el_GR.ISO8859-7/books/handbook/mac/chapter.sgml
--- a/el_GR.ISO8859-7/books/handbook/mac/chapter.sgml	Thu Nov 06 16:02:39 2008 +0200
+++ b/el_GR.ISO8859-7/books/handbook/mac/chapter.sgml	Thu Nov 06 16:11:30 2008 +0200
@@ -7,7 +7,7 @@
   $FreeBSD: doc/el_GR.ISO8859-7/books/handbook/mac/chapter.sgml,v 1.2 2008/01/14 14:19:46 keramida Exp $
 
   %SOURCE%	en_US.ISO8859-1/books/handbook/mac/chapter.sgml
-  %SRCID%	1.1
+  %SRCID%	1.73
 
 -->
 
@@ -864,62 +864,62 @@
     <para>A single label configuration would enforce only one label
       across the system, that is why the <command>tunefs</command>
       option is called <option>multilabel</option>.</para>
+  </sect1>
 
-    <sect2 id="mac-seeotheruids">
-      <title>The MAC seeotheruids Module</title>
+  <sect1 id="mac-seeotheruids">
+    <title>The MAC seeotheruids Module</title>
 
-      <indexterm>
-        <primary>MAC See Other UIDs Policy</primary>
-      </indexterm>
-      <para>Module name: <filename>mac_seeotheruids.ko</filename></para>
+    <indexterm>
+      <primary>MAC See Other UIDs Policy</primary>
+    </indexterm>
+    <para>Module name: <filename>mac_seeotheruids.ko</filename></para>
 
-      <para>Kernel configuration line:
-        <literal>options MAC_SEEOTHERUIDS</literal></para>
+    <para>Kernel configuration line:
+      <literal>options MAC_SEEOTHERUIDS</literal></para>
 
-      <para>Boot option:
-	<literal>mac_seeotheruids_load="YES"</literal></para>
+    <para>Boot option:
+      <literal>mac_seeotheruids_load="YES"</literal></para>
 
-      <para>The &man.mac.seeotheruids.4; module mimics and extends
-	the <literal>security.bsd.see_other_uids</literal> and
-	<literal>security.bsd.see_other_gids</literal>
-	<command>sysctl</command> tunables.  This option does
-	not require any labels to be set before configuration and
-	can operate transparently with the other modules.</para>
+    <para>The &man.mac.seeotheruids.4; module mimics and extends
+      the <literal>security.bsd.see_other_uids</literal> and
+      <literal>security.bsd.see_other_gids</literal>
+      <command>sysctl</command> tunables.  This option does
+      not require any labels to be set before configuration and
+      can operate transparently with the other modules.</para>
 
-      <para>After loading the module, the following
-	<command>sysctl</command> tunables may be used to control
-	the features:</para>
+    <para>After loading the module, the following
+      <command>sysctl</command> tunables may be used to control
+      the features:</para>
 
-      <itemizedlist>
-	<listitem>
-	  <para><literal>security.mac.seeotheruids.enabled</literal>
-	    will enable the module's features and use the default
-	    settings.  These default settings will deny users the
-	    ability to view processes and sockets owned by other
-	    users.</para>
-	</listitem>
+    <itemizedlist>
+      <listitem>
+	<para><literal>security.mac.seeotheruids.enabled</literal>
+	  will enable the module's features and use the default
+	  settings.  These default settings will deny users the
+	  ability to view processes and sockets owned by other
+	  users.</para>
+      </listitem>
 
-	<listitem>
-	  <para>
-	    <literal>security.mac.seeotheruids.specificgid_enabled</literal>
-	    will allow a certain group to be exempt from this policy.
-	    To exempt specific groups from this policy, use the
-	    <literal>security.mac.seeotheruids.specificgid=<replaceable>XXX</replaceable></literal>
-	    <command>sysctl</command> tunable.  In the above example,
-	    the <replaceable>XXX</replaceable> should be replaced with the
-	    numeric group ID to be exempted.</para>
-	</listitem>
+      <listitem>
+	<para>
+	  <literal>security.mac.seeotheruids.specificgid_enabled</literal>
+	  will allow a certain group to be exempt from this policy.
+	  To exempt specific groups from this policy, use the
+	  <literal>security.mac.seeotheruids.specificgid=<replaceable>XXX</replaceable></literal>
+	  <command>sysctl</command> tunable.  In the above example,
+	  the <replaceable>XXX</replaceable> should be replaced with the
+	  numeric group ID to be exempted.</para>
+      </listitem>
 
-	<listitem>
-	  <para>
-	    <literal>security.mac.seeotheruids.primarygroup_enabled</literal>
-	    is used to exempt specific primary groups from this policy.
-	    When using this tunable, the
-	    <literal>security.mac.seeotheruids.specificgid_enabled</literal>
-	    may not be set.</para>
-	</listitem>
-      </itemizedlist>
-    </sect2>
+      <listitem>
+	<para>
+	  <literal>security.mac.seeotheruids.primarygroup_enabled</literal>
+	  is used to exempt specific primary groups from this policy.
+	  When using this tunable, the
+	  <literal>security.mac.seeotheruids.specificgid_enabled</literal>
+	  may not be set.</para>
+      </listitem>
+    </itemizedlist>
   </sect1>
 
   <sect1 id="mac-bsdextended">
@@ -1091,10 +1091,7 @@
     <itemizedlist>
       <listitem>
 	<para><literal>security.mac.portacl.enabled</literal> will
-	  enable/disable the policy completely.<footnote><para>Due to
-	  a bug the <literal>security.mac.portacl.enabled</literal>
-	  <command>sysctl</command> variable will not work on
-	  &os;&nbsp;5.2.1 or previous releases.</para></footnote></para>
+	  enable/disable the policy completely.</para>
       </listitem>
 
       <listitem>
@@ -1668,9 +1665,9 @@
       <literal>multilabel</literal> option must be set on each file
       system as stated at the beginning of this chapter.  Not doing
       so will result in errors.  While at it, ensure that the
-      <filename role="port">net-mngt/nagios-plugins</filename>,
-      <filename role="port">net-mngt/nagios</filename>, and
-      <filename role="port">www/apache13</filename> ports are all
+      <filename role="package">net-mngt/nagios-plugins</filename>,
+      <filename role="package">net-mngt/nagios</filename>, and
+      <filename role="package">www/apache13</filename> ports are all
       installed, configured, and working correctly.</para>
 
     <sect2>




More information about the Freebsd-doc-el mailing list