Skip to content

Commit 78f4e1d

Browse files
author
Sam Kleinman
committed
merge: DOCS-79
2 parents cfb97c3 + a0d916e commit 78f4e1d

File tree

4 files changed

+12
-14
lines changed

4 files changed

+12
-14
lines changed

draft/administration/vulnerability-notification.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ In particular, please include the following:
3131
- Contact information, including an email address and/or phone number,
3232
if applicable.
3333

34-
10gen guarantees a response to all vulnerability notifications within
34+
10gen will respond to all vulnerability notifications within
3535
48 hours.
3636

3737
Jira

draft/core/security.txt

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -267,11 +267,12 @@ authentication system:
267267
functionality, such as :dbcommand:`listDatabases`.
268268

269269
- The following issues track ongoing improvements to the authorization
270-
system:
270+
or authentication system:
271271

272272
- :issue:`SERVER-3198`
273273
- :issue:`SERVER-7122`
274274
- :issue:`SERVER-7124`
275+
- :issue:`SERVER-7115`
275276

276277
- Once authenticated a "normal" user has full read and write access to
277278
a database.
@@ -284,14 +285,14 @@ authentication system:
284285
#. add the first user to the ``admin`` database when connected to
285286
the :program:`mongod` instance from a ``localhost`` connection. [#sharded-localhost]_
286287

287-
.. version added:: 2.0
288+
.. versionadded:: 2.0
288289
Support for authentication with sharded clusters. Before 2.0
289290
sharded clusters *had* to run with trusted applications and a
290291
trusted networking configuration.
291292

292293
Consider the
293294
:doc:`/tutorial/use-authentication-to-control-access-to-mongodb`
294-
document which outlines procedures for configuraing and maintaing
295+
document which outlines procedures for configuring and maintaining
295296
users and access with MongoDB's authentication system.
296297

297298
.. [#sharded-localhost] Becasue of :issue:`SERVER-6591`, you cannot
@@ -304,8 +305,8 @@ users and access with MongoDB's authentication system.
304305
Interfaces
305306
----------
306307

307-
Simply limiting access to a :program:`mongod` is not a sufficent for
308-
totally controling risk expsorure. Consider the recomendaitons in the
308+
Simply limiting access to a :program:`mongod` is not sufficent for
309+
totally controling risk exposure. Consider the recommendations in the
309310
following section, for limiting exposure other interface-related
310311
risks.
311312

@@ -338,12 +339,12 @@ a variety of operational data, logs, and status reports regarding the
338339
:program:`mongod` or :program:`mongos` instance. The HTTP interface is
339340
always avalible on the the port numbered ``1000`` greater than the
340341
primary :program:`mongod` port. By default this is ``28017``, but is
341-
indirectly using the :setting:`port` option which allows you to
342+
indirectly set using the :setting:`port` option which allows you to
342343
configure the primary :program:`mongod` port.
343344

344345
Without the :setting:`rest` setting, this interface is entirely
345346
read-only, and limited in scope; nevertheless, this iterface may
346-
represent an exposure. To diable the HTTP interface, set the
347+
represent an exposure. To disable the HTTP interface, set the
347348
:setting:`nohttpinterface` run time option or the
348349
:option:`--nohttpinterface <mongod --nohttpinterface>` command line
349350
option.
@@ -372,7 +373,7 @@ the REST API interface:
372373
Data Encryption
373374
---------------
374375

375-
To support audit requirements, you may need to envrypt data stored in
376+
To support audit requirements, you may need to encrypt data stored in
376377
MongoDB. For best results you can encrypt this data in the application
377378
layer, by encrytping the content of fields that hold secure data.
378379

draft/tutorial/configure-linux-iptables-firewall.txt

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -202,7 +202,6 @@ policy:
202202

203203
iptables -P OUTPUT DROP
204204

205-
206205
Manage and Maintain ``iptables`` Configuration
207206
----------------------------------------------
208207

@@ -211,7 +210,7 @@ using ``iptables``. There are various front end tools that automate
211210
some aspects of ``iptables`` configuration, but at the core all
212211
``iptables`` front ends provide the same basic functionality:
213212

214-
.. _iptables-make-all-rules-persistent:
213+
.. _iptables-make-all-rules-persistent:
215214

216215
Make all ``iptables`` Rules Persistent
217216
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

draft/tutorial/configure-windows-netsh-firewall.txt

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -45,16 +45,14 @@ To reset the Windows Firewall rules:
4545

4646
netsh advfirewall reset
4747

48-
iptables -A OUTPUT -d <ip-address> -p tcp --source-port 27018 -m state --state ESTABLISHED -j ACCEPT
49-
5048
To save administration, you can export or import firewall (from
5149
different servers) rules very easily on Windows:
5250

5351
.. code-block:: sh
5452

5553
netsh advfirewall export "C:\temp\MongoDBfw.wfw"
5654

57-
netsh advfirewall import "C:\temp\ MongoDBfw.wfw"
55+
netsh advfirewall import "C:\temp\MongoDBfw.wfw"
5856

5957
It is also possible to configure the Windows Firewall through a
6058
GUI, however, this is not within scope for this tutorial.

0 commit comments

Comments
 (0)