Skip to content

Commit 858693a

Browse files
author
markofu
committed
Minor Modifications to tech examples, auth & grammar.
1 parent cbab8b4 commit 858693a

File tree

4 files changed

+18
-13
lines changed

4 files changed

+18
-13
lines changed

draft/administration/vulnerability-notification.txt

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,14 +24,14 @@ In particular, please include the following:
2424

2525
- *Common Vulnerability* information, if applicable, including:
2626

27-
- CVSS (Commong Vulnerability Scoring System) Score
27+
- CVSS (Common Vulnerability Scoring System) Score
2828

2929
- CVE (Common Vulnerability and Exposures) Identifier.
3030

3131
- Contact information, including an email address and/or phone number,
3232
if applicable.
3333

34-
10gen guarantees a response to all vulnerability notifications within
34+
10gen will respond to all vulnerability notifications within
3535
48 hours.
3636

3737
Jira

draft/core/security.txt

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -273,6 +273,10 @@ authentication system:
273273
- :issue:`SERVER-7122`
274274
- :issue:`SERVER-7124`
275275

276+
and authentication:
277+
278+
- :issue:`SERVER-7115`
279+
276280
- Once authenticated a "normal" user has full read and write access to
277281
a database.
278282

@@ -291,7 +295,7 @@ authentication system:
291295

292296
Consider the
293297
:doc:`/tutorial/use-authentication-to-control-access-to-mongodb`
294-
document which outlines procedures for configuraing and maintaing
298+
document which outlines procedures for configuring and maintaining
295299
users and access with MongoDB's authentication system.
296300

297301
.. [#sharded-localhost] Becasue of :issue:`SERVER-6591`, you cannot
@@ -304,8 +308,8 @@ users and access with MongoDB's authentication system.
304308
Interfaces
305309
----------
306310

307-
Simply limiting access to a :program:`mongod` is not a sufficent for
308-
totally controling risk expsorure. Consider the recomendaitons in the
311+
Simply limiting access to a :program:`mongod` is not sufficent for
312+
totally controling risk exposure. Consider the recommendations in the
309313
following section, for limiting exposure other interface-related
310314
risks.
311315

@@ -338,12 +342,12 @@ a variety of operational data, logs, and status reports regarding the
338342
:program:`mongod` or :program:`mongos` instance. The HTTP interface is
339343
always avalible on the the port numbered ``1000`` greater than the
340344
primary :program:`mongod` port. By default this is ``28017``, but is
341-
indirectly using the :setting:`port` option which allows you to
345+
indirectly set using the :setting:`port` option which allows you to
342346
configure the primary :program:`mongod` port.
343347

344348
Without the :setting:`rest` setting, this interface is entirely
345349
read-only, and limited in scope; nevertheless, this iterface may
346-
represent an exposure. To diable the HTTP interface, set the
350+
represent an exposure. To disable the HTTP interface, set the
347351
:setting:`nohttpinterface` run time option or the
348352
:option:`--nohttpinterface <mongod --nohttpinterface>` command line
349353
option.
@@ -372,7 +376,7 @@ the REST API interface:
372376
Data Encryption
373377
---------------
374378

375-
To support audit requirements, you may need to envrypt data stored in
379+
To support audit requirements, you may need to encrypt data stored in
376380
MongoDB. For best results you can encrypt this data in the application
377381
layer, by encrytping the content of fields that hold secure data.
378382

draft/tutorial/configure-linux-iptables-firewall.txt

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,8 @@ to change the default chain policy to DROP:
2020
iptables -P OUTPUT DROP
2121

2222
This ensures that any traffic to/from the :program:`mongod` server has
23-
to be explicitly allowed.
23+
to be explicitly allowed. Be careful when executing these commands that
24+
you do not lose access to the server.
2425

2526
Traffic to/from a Standalone MongoDB Instance or Replica-Set
2627
MongoDB Instance (mongod)
@@ -109,7 +110,9 @@ To remove the ``iptables`` firewall rules and revert to the default
109110
action of each chain, it is possible to flush all existing rules
110111
as follows:
111112

112-
iptables –F
113+
.. code-block:: sh
114+
115+
iptables -F
113116

114117
This change is only temporary as it only affects the rulebase in
115118
memory. For example, a restart:

draft/tutorial/configure-windows-netsh-firewall.txt

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -45,16 +45,14 @@ To reset the Windows Firewall rules:
4545

4646
netsh advfirewall reset
4747

48-
iptables -A OUTPUT -d <ip-address> -p tcp --source-port 27018 -m state --state ESTABLISHED -j ACCEPT
49-
5048
To save administration, you can export or import firewall (from
5149
different servers) rules very easily on Windows:
5250

5351
.. code-block:: sh
5452

5553
netsh advfirewall export "C:\temp\MongoDBfw.wfw"
5654

57-
netsh advfirewall import "C:\temp\ MongoDBfw.wfw"
55+
netsh advfirewall import "C:\temp\MongoDBfw.wfw"
5856

5957
It is also possible to configure the Windows Firewall through a
6058
GUI, however, this is not within scope for this tutorial.

0 commit comments

Comments
 (0)