Commit c9fecf50 authored by Alexander A. Klimov's avatar Alexander A. Klimov Committed by James Morris

Replace HTTP links with HTTPS ones: security

Rationale:
Reduces attack surface on kernel devs opening the links for MITM
as HTTPS traffic is much harder to manipulate.

Deterministic algorithm:
For each file:
  If not .svg:
    For each line:
      If doesn't contain `\bxmlns\b`:
        For each link, `\bhttp://[^# \t\r\n]*(?:\w|/)`:
          If both the HTTP and HTTPS versions
          return 200 OK and serve the same content:
            Replace HTTP with HTTPS.
Signed-off-by: default avatarAlexander A. Klimov <grandmaster@al2klimov.de>
Acked-by: default avatarJohn Johansen <john.johansen@canonical.com>
Signed-off-by: default avatarJames Morris <jmorris@namei.org>
parent 3d77e6a8
...@@ -118,7 +118,7 @@ config INTEL_TXT ...@@ -118,7 +118,7 @@ config INTEL_TXT
it was configured with, especially since they may be responsible for it was configured with, especially since they may be responsible for
providing such assurances to VMs and services running on it. providing such assurances to VMs and services running on it.
See <http://www.intel.com/technology/security/> for more information See <https://www.intel.com/technology/security/> for more information
about Intel(R) TXT. about Intel(R) TXT.
See <http://tboot.sourceforge.net> for more information about tboot. See <http://tboot.sourceforge.net> for more information about tboot.
See Documentation/x86/intel_txt.rst for a description of how to enable See Documentation/x86/intel_txt.rst for a description of how to enable
......
...@@ -76,7 +76,7 @@ config SECURITY_APPARMOR_KUNIT_TEST ...@@ -76,7 +76,7 @@ config SECURITY_APPARMOR_KUNIT_TEST
This builds the AppArmor KUnit tests. This builds the AppArmor KUnit tests.
KUnit tests run during boot and output the results to the debug log KUnit tests run during boot and output the results to the debug log
in TAP format (http://testanything.org/). Only useful for kernel devs in TAP format (https://testanything.org/). Only useful for kernel devs
running KUnit test harness and are not for inclusion into a running KUnit test harness and are not for inclusion into a
production build. production build.
......
...@@ -26,7 +26,7 @@ config IMA ...@@ -26,7 +26,7 @@ config IMA
an aggregate integrity value over this list inside the an aggregate integrity value over this list inside the
TPM hardware, so that the TPM can prove to a third party TPM hardware, so that the TPM can prove to a third party
whether or not critical system files have been modified. whether or not critical system files have been modified.
Read <http://www.usenix.org/events/sec04/tech/sailer.html> Read <https://www.usenix.org/events/sec04/tech/sailer.html>
to learn more about IMA. to learn more about IMA.
If unsure, say N. If unsure, say N.
......
// SPDX-License-Identifier: GPL-2.0-only // SPDX-License-Identifier: GPL-2.0-only
/* /*
* Copyright (C) 2013 Politecnico di Torino, Italy * Copyright (C) 2013 Politecnico di Torino, Italy
* TORSEC group -- http://security.polito.it * TORSEC group -- https://security.polito.it
* *
* Author: Roberto Sassu <roberto.sassu@polito.it> * Author: Roberto Sassu <roberto.sassu@polito.it>
* *
......
// SPDX-License-Identifier: GPL-2.0-only // SPDX-License-Identifier: GPL-2.0-only
/* /*
* Copyright (C) 2013 Politecnico di Torino, Italy * Copyright (C) 2013 Politecnico di Torino, Italy
* TORSEC group -- http://security.polito.it * TORSEC group -- https://security.polito.it
* *
* Author: Roberto Sassu <roberto.sassu@polito.it> * Author: Roberto Sassu <roberto.sassu@polito.it>
* *
......
/* SPDX-License-Identifier: GPL-2.0-only */ /* SPDX-License-Identifier: GPL-2.0-only */
/* /*
* Copyright (C) 2013 Politecnico di Torino, Italy * Copyright (C) 2013 Politecnico di Torino, Italy
* TORSEC group -- http://security.polito.it * TORSEC group -- https://security.polito.it
* *
* Author: Roberto Sassu <roberto.sassu@polito.it> * Author: Roberto Sassu <roberto.sassu@polito.it>
* *
......
...@@ -4,7 +4,7 @@ ...@@ -4,7 +4,7 @@
* *
* Copyright (C) 2006 International Business Machines Corp. * Copyright (C) 2006 International Business Machines Corp.
* Copyright (C) 2010 Politecnico di Torino, Italy * Copyright (C) 2010 Politecnico di Torino, Italy
* TORSEC group -- http://security.polito.it * TORSEC group -- https://security.polito.it
* *
* Authors: * Authors:
* Michael A. Halcrow <mahalcro@us.ibm.com> * Michael A. Halcrow <mahalcro@us.ibm.com>
......
...@@ -4,7 +4,7 @@ ...@@ -4,7 +4,7 @@
* *
* Copyright (C) 2006 International Business Machines Corp. * Copyright (C) 2006 International Business Machines Corp.
* Copyright (C) 2010 Politecnico di Torino, Italy * Copyright (C) 2010 Politecnico di Torino, Italy
* TORSEC group -- http://security.polito.it * TORSEC group -- https://security.polito.it
* *
* Authors: * Authors:
* Michael A. Halcrow <mahalcro@us.ibm.com> * Michael A. Halcrow <mahalcro@us.ibm.com>
......
...@@ -2,7 +2,7 @@ ...@@ -2,7 +2,7 @@
/* /*
* Copyright (C) 2010 IBM Corporation * Copyright (C) 2010 IBM Corporation
* Copyright (C) 2010 Politecnico di Torino, Italy * Copyright (C) 2010 Politecnico di Torino, Italy
* TORSEC group -- http://security.polito.it * TORSEC group -- https://security.polito.it
* *
* Authors: * Authors:
* Mimi Zohar <zohar@us.ibm.com> * Mimi Zohar <zohar@us.ibm.com>
......
...@@ -2,7 +2,7 @@ ...@@ -2,7 +2,7 @@
/* /*
* Copyright (C) 2010 IBM Corporation * Copyright (C) 2010 IBM Corporation
* Copyright (C) 2010 Politecnico di Torino, Italy * Copyright (C) 2010 Politecnico di Torino, Italy
* TORSEC group -- http://security.polito.it * TORSEC group -- https://security.polito.it
* *
* Authors: * Authors:
* Mimi Zohar <zohar@us.ibm.com> * Mimi Zohar <zohar@us.ibm.com>
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment