mirror of
https://gitlab.com/apparmor/apparmor
synced 2025-08-22 18:17:09 +00:00
Fix more typos
https://gitlab.com/apparmor/apparmor/-/issues/192
parent
bad381b51e
commit
d89d6e4c0d
@ -143,7 +143,7 @@ application which drops privileges might need:
|
||||
Network Rules
|
||||
-------------
|
||||
|
||||
AppArmor currently supports course grained access to networking via
|
||||
AppArmor currently supports coarse-grained access to networking via
|
||||
network rules. For example, a network daemon might need:
|
||||
|
||||
```
|
||||
|
@ -792,7 +792,7 @@ and other operations that are typically reserved for the root user.
|
||||
|
||||
AppArmor supports simple coarse grained network mediation. The network
|
||||
rule restrict all socket(2) based operations. The mediation done is
|
||||
a course grained check on whether a socket of a given type and family
|
||||
a coarse-grained check on whether a socket of a given type and family
|
||||
can be created, read, or written. There is no mediation based of port
|
||||
number or protocol beyond tcp, udp, and raw. Network netlink(7) rules may
|
||||
only specify type 'dgram' and 'raw'.
|
||||
|
Loading…
x
Reference in New Issue
Block a user