[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

[Cluster-devel] conga/luci/docs user_manual.html



CVSROOT:	/cvs/cluster
Module name:	conga
Changes by:	rmccabe sourceware org	2007-01-15 20:33:00

Modified files:
	luci/docs      : user_manual.html 

Log message:
	wording tweaks

Patches:
http://sourceware.org/cgi-bin/cvsweb.cgi/conga/luci/docs/user_manual.html.diff?cvsroot=cluster&r1=1.14&r2=1.15

--- conga/luci/docs/user_manual.html	2007/01/15 20:26:02	1.14
+++ conga/luci/docs/user_manual.html	2007/01/15 20:33:00	1.15
@@ -140,9 +140,9 @@
   the datacenter systems can pretty safely be assumed to be trustworthy.
   If a luci server is used to connect to systems across the open Internet,
   the user <i>could</i> be vulnerable to a form of security attack known
-  as a 'Man in the Middle' attack; wherein a hostile party sits between
-  the client and server and intercepts any data exchanged while masquerading
-  to its peers as a legitimate party.
+  as a 'Man in the Middle' attack; wherein a hostile party that sits between
+  the client and server intercepts data exchanged, while masquerading
+  to its peers as a legitimate party, and issues potentially malicious commands.
   <p/>
   If the user would like to verify the certificate of a ricci agent before 
   authenticating to it (avoiding a 'Man in the Middle' attack), the 


[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]