| | @@ -120,19 +120,19 @@ |
| 120 | 120 | @ Login passwords can be sent over an unencrypted connection. |
| 121 | 121 | @ <p>Fix this by activating the "Redirect to HTTPS on the Login page" |
| 122 | 122 | @ setting on the <a href="setup_access">Access Control</a> page. |
| 123 | 123 | } |
| 124 | 124 | |
| 125 | | - /* Anonymous users should not be able to harvest email addresses |
| 125 | + /* Anonymous users should not be able to harvest email addresses |
| 126 | 126 | ** from tickets. |
| 127 | 127 | */ |
| 128 | 128 | if( hasAnyCap(zAnonCap, "e") ){ |
| 129 | 129 | @ <li><p><b>WARNING:</b> |
| 130 | 130 | @ Anonymous users can view email addresses and other personally |
| 131 | 131 | @ identifiable information on tickets. |
| 132 | 132 | @ <p>Fix this by removing the "Email" privilege from users |
| 133 | | - @ "anonymous" and "nobody" on the |
| 133 | + @ "anonymous" and "nobody" on the |
| 134 | 134 | @ <a href="setup_ulist">User Configuration</a> page. |
| 135 | 135 | } |
| 136 | 136 | |
| 137 | 137 | /* Anonymous users probably should not be allowed to push content |
| 138 | 138 | ** to the repository. |
| | @@ -139,11 +139,11 @@ |
| 139 | 139 | */ |
| 140 | 140 | if( hasAnyCap(zAnonCap, "i") ){ |
| 141 | 141 | @ <li><p><b>WARNING:</b> |
| 142 | 142 | @ Anonymous users can push new check-ins into the repository. |
| 143 | 143 | @ <p>Fix this by removing the "Check-in" privilege from users |
| 144 | | - @ "anonymous" and "nobody" on the |
| 144 | + @ "anonymous" and "nobody" on the |
| 145 | 145 | @ <a href="setup_ulist">User Configuration</a> page. |
| 146 | 146 | } |
| 147 | 147 | |
| 148 | 148 | /* Anonymous users probably should not be allowed act as moderators |
| 149 | 149 | ** for wiki or tickets. |
| | @@ -151,11 +151,11 @@ |
| 151 | 151 | if( hasAnyCap(zAnonCap, "lq") ){ |
| 152 | 152 | @ <li><p><b>WARNING:</b> |
| 153 | 153 | @ Anonymous users can act as moderators for wiki and/or tickets. |
| 154 | 154 | @ This defeats the whole purpose of moderation. |
| 155 | 155 | @ <p>Fix this by removing the "Mod-Wiki" and "Mod-Tkt" |
| 156 | | - @ privilege from users "anonymous" and "nobody" on the |
| 156 | + @ privilege from users "anonymous" and "nobody" on the |
| 157 | 157 | @ <a href="setup_ulist">User Configuration</a> page. |
| 158 | 158 | } |
| 159 | 159 | |
| 160 | 160 | /* Anonymous users probably should not be allowed to delete |
| 161 | 161 | ** wiki or tickets. |
| | @@ -162,11 +162,11 @@ |
| 162 | 162 | */ |
| 163 | 163 | if( hasAnyCap(zAnonCap, "d") ){ |
| 164 | 164 | @ <li><p><b>WARNING:</b> |
| 165 | 165 | @ Anonymous users can delete wiki and tickets. |
| 166 | 166 | @ <p>Fix this by removing the "Delete" |
| 167 | | - @ privilege from users "anonymous" and "nobody" on the |
| 167 | + @ privilege from users "anonymous" and "nobody" on the |
| 168 | 168 | @ <a href="setup_ulist">User Configuration</a> page. |
| 169 | 169 | } |
| 170 | 170 | |
| 171 | 171 | /* If anonymous users are allowed to create new Wiki, then |
| 172 | 172 | ** wiki moderation should be activated to pervent spam. |
| | @@ -176,11 +176,11 @@ |
| 176 | 176 | @ <li><p><b>WARNING:</b> |
| 177 | 177 | @ Anonymous users can create or edit wiki without moderation. |
| 178 | 178 | @ This can result in robots inserting lots of wiki spam into |
| 179 | 179 | @ repository. |
| 180 | 180 | @ <p>Fix this by removing the "New-Wiki" and "Write-Wiki" |
| 181 | | - @ privileges from users "anonymous" and "nobody" on the |
| 181 | + @ privileges from users "anonymous" and "nobody" on the |
| 182 | 182 | @ <a href="setup_ulist">User Configuration</a> page or |
| 183 | 183 | @ by enabling wiki moderation on the |
| 184 | 184 | @ <a href="setup_modreq">Moderation Setup</a> page. |
| 185 | 185 | }else{ |
| 186 | 186 | @ <li><p> |
| | @@ -187,11 +187,11 @@ |
| 187 | 187 | @ Anonymous users can create or edit wiki, but moderator |
| 188 | 188 | @ approval is required before the edits become permanent. |
| 189 | 189 | } |
| 190 | 190 | } |
| 191 | 191 | |
| 192 | | - /* Administrative privilege should only be provided to |
| 192 | + /* Administrative privilege should only be provided to |
| 193 | 193 | ** specific individuals, not to entire classes of people. |
| 194 | 194 | ** And not too many people should have administrator privilege. |
| 195 | 195 | */ |
| 196 | 196 | z = db_text(0, "SELECT group_concat(login,' AND ') FROM user" |
| 197 | 197 | " WHERE cap GLOB '*[as]*'" |
| | @@ -224,15 +224,15 @@ |
| 224 | 224 | @ Ideally, administator privilege ('s' or 'a') should only |
| 225 | 225 | @ be granted to one or two users. |
| 226 | 226 | } |
| 227 | 227 | } |
| 228 | 228 | |
| 229 | | - /* The push-unversioned privilege should only be provided to |
| 229 | + /* The push-unversioned privilege should only be provided to |
| 230 | 230 | ** specific individuals, not to entire classes of people. |
| 231 | 231 | ** And no too many people should have this privilege. |
| 232 | 232 | */ |
| 233 | | - z = db_text(0, |
| 233 | + z = db_text(0, |
| 234 | 234 | "SELECT group_concat(" |
| 235 | 235 | "printf('<a href=''setup_uedit?id=%%d''>%%s</a>',uid,login)," |
| 236 | 236 | "' and ')" |
| 237 | 237 | " FROM user" |
| 238 | 238 | " WHERE cap GLOB '*y*'" |
| | @@ -292,11 +292,11 @@ |
| 292 | 292 | @ keeps a record of successful and unsucessful login attempts and is |
| 293 | 293 | @ useful for security monitoring. |
| 294 | 294 | } |
| 295 | 295 | if( db_get_boolean("admin-log",0)==0 ){ |
| 296 | 296 | @ <li><p> |
| 297 | | - @ The <a href="admin_log">Administrative Log</a> is disabled. |
| 297 | + @ The <a href="admin_log">Administrative Log</a> is disabled. |
| 298 | 298 | @ The administrative log provides a record of configuration changes |
| 299 | 299 | @ and is useful for security monitoring. |
| 300 | 300 | } |
| 301 | 301 | |
| 302 | 302 | #if !defined(_WIN32) && !defined(FOSSIL_OMIT_LOAD_AVERAGE) |
| | @@ -303,11 +303,11 @@ |
| 303 | 303 | /* Make sure that the load-average limiter is armed and working */ |
| 304 | 304 | if( load_average()==0.0 ){ |
| 305 | 305 | @ <li><p> |
| 306 | 306 | @ Unable to get the system load average. This can prevent Fossil |
| 307 | 307 | @ from throttling expensive operations during peak demand. |
| 308 | | - @ <p>If running in a chroot jail on Linux, verify that the /proc |
| 308 | + @ <p>If running in a chroot jail on Linux, verify that the /proc |
| 309 | 309 | @ filesystem is mounted within the jail, so that the load average |
| 310 | 310 | @ can be obtained from the /proc/loadavg file. |
| 311 | 311 | }else { |
| 312 | 312 | double r = atof(db_get("max-loadavg", "0")); |
| 313 | 313 | if( r<=0.0 ){ |
| | @@ -319,19 +319,19 @@ |
| 319 | 319 | @ <a href="setup_access">Access Control</a> page to approximately |
| 320 | 320 | @ the number of available cores on your server, or maybe just a little |
| 321 | 321 | @ less. |
| 322 | 322 | }else if( r>=8.0 ){ |
| 323 | 323 | @ <li><p> |
| 324 | | - @ The "Server Load Average Limit" on the |
| 324 | + @ The "Server Load Average Limit" on the |
| 325 | 325 | @ <a href="setup_access">Access Control</a> page is set to %g(r), |
| 326 | 326 | @ which seems high. Is this server really a %d((int)r)-core machine? |
| 327 | 327 | } |
| 328 | 328 | } |
| 329 | 329 | #endif |
| 330 | 330 | |
| 331 | 331 | |
| 332 | | - @ </ol> |
| 332 | + @ </ol> |
| 333 | 333 | style_footer(); |
| 334 | 334 | } |
| 335 | 335 | |
| 336 | 336 | /* |
| 337 | 337 | ** WEBPAGE: takeitprivate |
| 338 | 338 | |