summaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorjoe <joe@61a7d7f5-40b7-0310-9c16-bb0ea8cb1845>2008-08-06 09:53:38 +0000
committerjoe <joe@61a7d7f5-40b7-0310-9c16-bb0ea8cb1845>2008-08-06 09:53:38 +0000
commit8f3dee4be7a695bd1bb3dd979c194adb50984045 (patch)
treedfedb148685d95cfd0df3c8650a065f50d894b51 /doc
parent49b80413759e1efbfb2363b47a742efe998895d5 (diff)
downloadneon-8f3dee4be7a695bd1bb3dd979c194adb50984045.tar.gz
* doc/security.xml: Update intro and auth sections.
git-svn-id: http://svn.webdav.org/repos/projects/neon/trunk@1528 61a7d7f5-40b7-0310-9c16-bb0ea8cb1845
Diffstat (limited to 'doc')
-rw-r--r--doc/security.xml19
1 files changed, 11 insertions, 8 deletions
diff --git a/doc/security.xml b/doc/security.xml
index 5caeda6..f014276 100644
--- a/doc/security.xml
+++ b/doc/security.xml
@@ -6,8 +6,9 @@
model: use of a malicious HTTP server. Under this threat model, a
range of attacks are possible against a client when the user (or
application) can be tricked into accessing an HTTP server which is
- controlled by an attacker. This section documents the types of
- possible attack and describes how they affect &neon;.</para>
+ controlled by an attacker. This section documents various types of
+ possible attack and describes what mitigation is used in
+ &neon;.</para>
<sect2>
<title>CPU or memory consumption attacks</title>
@@ -90,7 +91,9 @@
does not match the expected identity (or is otherwise not
trusted), &neon; will fail the request by default. This behaviour
can be overridden by the use of a callback installed using <xref
- linkend="ne_ssl_set_verify"/>.</para>
+ linkend="ne_ssl_set_verify"/>, which allows the application to
+ present the certificate details to a user for manual/off-line
+ verification, if possible.</para>
<para>Test cases for the correctness of the implementation of the
identity verification algorithm are present in the &neon; test
@@ -121,11 +124,11 @@
allowing the application (and hence, user) to specify that only a
specific set of authentication protocols is permitted.</para>
- <para>&neon; supports the Digest, and Negotiate authentication
- schemes, which both allow user authentication without passing
- credentials over the wire. The "domain" parameter is supported in
- Digest, allowing the server to restrict an authentication session
- to a particular set of URIs.</para>
+ <para>&neon; supports the Digest and Negotiate authentication
+ schemes, which both allow authentication of users without passing
+ credentials in cleartext over the wire. The "domain" parameter is
+ supported in Digest, allowing the server to restrict an
+ authentication session to a particular set of URIs.</para>
</sect2>