Source-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[src/trunk]: src/sbin/init Bump date for previous; new sentence, new line; us...
details: https://anonhg.NetBSD.org/src/rev/7c65fa8f301a
branches: trunk
changeset: 553194:7c65fa8f301a
user: wiz <wiz%NetBSD.org@localhost>
date: Sun Oct 12 07:21:57 2003 +0000
description:
Bump date for previous; new sentence, new line; use more macros; fix a typo.
diffstat:
sbin/init/init.8 | 67 ++++++++++++++++++++++++++++++-------------------------
1 files changed, 37 insertions(+), 30 deletions(-)
diffs (126 lines):
diff -r 76959c5c592c -r 7c65fa8f301a sbin/init/init.8
--- a/sbin/init/init.8 Sun Oct 12 04:23:17 2003 +0000
+++ b/sbin/init/init.8 Sun Oct 12 07:21:57 2003 +0000
@@ -1,4 +1,4 @@
-.\" $NetBSD: init.8,v 1.29 2003/10/12 04:14:56 tls Exp $
+.\" $NetBSD: init.8,v 1.30 2003/10/12 07:21:57 wiz Exp $
.\"
.\" Copyright (c) 1980, 1991, 1993
.\" The Regents of the University of California. All rights reserved.
@@ -32,7 +32,7 @@
.\"
.\" @(#)init.8 8.6 (Berkeley) 5/26/95
.\"
-.Dd April 29, 2000
+.Dd October 12, 2003
.Dt INIT 8
.Os
.Sh NAME
@@ -119,35 +119,41 @@
.Sq console
entry in the
.Xr ttys 5
-file is marked ``insecure'', then
+file is marked
+.Dq insecure ,
+then
.Nm
will require that the superuser password be
entered before the system will start a single-user shell.
The password check is skipped if the
.Sq console
-is marked as ``secure''.
+is marked as
+.Dq secure .
.Pp
The kernel runs with four different levels of security.
Any superuser process can raise the security level, but only
.Nm
can lower it.
.Pp
-The security level mechanism is intended to allow the administrator to
-protect the persistent code and data on the system, or a subset thereof,
-from modification, even by the superuser. In order for this protection
-to be effective, the administrator must ensure that no program that is
-run while the security level is 0 or lower, nor any data or configuration
-file used by any such program, can be modified while the security level
-is greater than 0. This may be achieved through the careful use of the
-"immutable" file flag to define and protect a Trusted Computing Base
-(TCB) consisting of all such programs and data, or by ensuring that all
-such programs and data are on filesystems that are mounted read-only
-and running at security level 2 or higher.
-.Sy Particular care must be taken to ensure, if relying upon
-.Sy security level 1 and the use of file flags, that the integrity of the
-.Sy TCB cannot be compromised through the use of modifications to the
-.Sy disklabel or access to overlapping disk partitions, including the
-.Sy raw partition.
+The security level mechanism is intended to allow the administrator
+to protect the persistent code and data on the system, or a subset
+thereof, from modification, even by the superuser.
+In order for this protection to be effective, the administrator
+must ensure that no program that is run while the security level
+is 0 or lower, nor any data or configuration file used by any such
+program, can be modified while the security level is greater than
+0.
+This may be achieved through the careful use of the
+.Dq immutable
+file flag to define and protect a Trusted Computing Base (TCB)
+consisting of all such programs and data, or by ensuring that all
+such programs and data are on filesystems that are mounted read-only
+and running at security level 2 or higher.
+.Em Particular care must be taken to ensure, if relying upon
+.Em security level 1 and the use of file flags, that the integrity of the
+.Em TCB cannot be compromised through the use of modifications to the
+.Em disklabel or access to overlapping disk partitions, including the
+.Em raw partition .
.Pp
Do not overlook the fact that shell scripts (or anything else fed to an
interpreter, through any mechanism) and the kernel itself are "programs
@@ -190,7 +196,9 @@
.Pp
Downgrading from highly secure mode to insecure mode (that is, to single-user
mode) always requires the root password to be entered on the console, whether
-the console is marked as 'secure' in
+the console is marked as
+.Dq secure
+in
.Pa /etc/ttys
or not.
.El
@@ -324,7 +332,7 @@
If, at bootstrap time, the
.Nm
process cannot be located, the system will panic with the message
-``panic: "init died (signal %d, exit %d)''.
+.Dq panic: init died (signal %d, exit %d) .
.Sh FILES
.Bl -tag -width /var/log/wtmp -compact
.It Pa /dev/console
@@ -351,11 +359,10 @@
.Em "then continue trying to start the process" .
.Pp
.It "some processes would not die; ps axl advised."
-A process
-is hung and could not be killed when the system was shutting down.
-This condition is usually caused by a process
-that is stuck in a device driver because of
-a persistent device error condition.
+A process is hung and could not be killed when the system was
+shutting down.
+This condition is usually caused by a process that is stuck in a
+device driver because of a persistent device error condition.
.El
.Sh SEE ALSO
.Xr kill 1 ,
@@ -380,8 +387,8 @@
behave as though they have security level \-1.
.Pp
The security level 2 restrictions relating to TCB integrity protection
-should be enforced at security level 1. Restrictions dependent upon
-security level but not relating to TCB integrity protection should be
-selected by
+should be enforced at security level 1.
+Restrictions dependent upon security level but not relating to TCB
+integrity protection should be selected by
.Xr sysctl 8
settings available only at security level 0 or lower.
Home |
Main Index |
Thread Index |
Old Index