Bug 77148

Summary: [PATCH] Minor text fixes on Handbook chapter MAC
Product: Documentation Reporter: Siebrand Mazeland <s.mazeland>
Component: Books & ArticlesAssignee: Tom Rhodes <trhodes>
Status: Closed FIXED    
Severity: Affects Only Me    
Priority: Normal    
Version: Latest   
Hardware: Any   
OS: Any   
Attachments:
Description Flags
file.diff none

Description Siebrand Mazeland 2005-02-05 20:00:24 UTC
	Translating the MAC chapter, I've come acrossing some tiny spelling errors.
        Please find patch attached.
Comment 1 Siebrand Mazeland 2005-02-05 20:49:45 UTC
After a bit of discussion on #bsddocs, we've made a tiny change to the diff.

Index: en_US.ISO8859-1/books/handbook/mac/chapter.sgml
===================================================================
RCS file: /home/ncvs/doc/en_US.ISO8859-1/books/handbook/mac/chapter.sgml,v
retrieving revision 1.38
diff -u -r1.38 chapter.sgml
--- en_US.ISO8859-1/books/handbook/mac/chapter.sgml	12 Jan 2005 01:55:04
-0000	1.38
+++ en_US.ISO8859-1/books/handbook/mac/chapter.sgml	5 Feb 2005 19:35:13
-0000
@@ -303,7 +303,7 @@
       files by setting certain objects as classified?</para>
 
     <para>In the file system case, access to objects might be
-      considered confidential to some users but not to others.
+      considered confidential to some users, but not to others.
       For an example, a large development team might be broken
       off into smaller groups of individuals.  Developers in
       project A might not be permitted to access objects written
@@ -372,7 +372,7 @@
       with a value of <quote>low</quote>.</para>
 
     <para>A few policies which support the labeling feature in
-      &os; offers three specific predefined labels.  These
+      &os; offer three specific predefined labels.  These
       are the low, high, and equal labels.  Although they enforce
       access control in a different manner with each policy, you
       can be sure that the low label will be the lowest setting,
@@ -385,7 +385,7 @@
       used on objects.  This will enforce one set of
       access permissions across the entire system and in many
       environments may be all that is required.  There are a few
-      cases; however, where multiple labels may be set on objects
+      cases where multiple labels may be set on objects
       or subjects in the file system.  For those cases, the
       <option>multilabel</option> option may be passed to
       &man.tunefs.8;.</para>
@@ -406,7 +406,7 @@
       configures the policy so that users are placed in the
       appropriate categories/access levels.  Alas, many policies can
       restrict the <username>root</username> user as well.  Basic
-      control over objects will then be released to the group but
+      control over objects will then be released to the group, but
       <username>root</username> may revoke or modify the settings
       at any time.  This is the hierarchal/clearance model covered
       by policies such as Biba and <acronym>MLS</acronym>.</para>
@@ -1565,7 +1565,7 @@
 
       <listitem>
 	<para>The <literal>biba/high</literal> label will permit
-	  writing to objects set at a lower label but not
+	  writing to objects set at a lower label, but not
 	  permit reading that object.  It is recommended that this
 	  label be placed on objects that affect the integrity of
 	  the entire system.</para>
@@ -1653,7 +1653,7 @@
 
     <para>The <acronym>MAC</acronym> version of the Low-watermark
       integrity policy, not to be confused with the older &man.lomac.4;
-      implementation, works almost identically to Biba but with the
+      implementation, works almost identically to Biba, but with the
       exception of using floating labels to support subject
       demotion via an auxiliary grade compartment.  This secondary
       compartment takes the form of <literal>[auxgrade]</literal>.
Comment 2 Tom Rhodes freebsd_committer freebsd_triage 2005-02-05 21:22:15 UTC
Responsible Changed
From-To: freebsd-doc->trhodes

Mine
Comment 3 Tom Rhodes freebsd_committer freebsd_triage 2005-02-08 19:44:27 UTC
State Changed
From-To: open->closed

Patch applied, thanks for the submission!