Skip to content

Commit c9fecf5

Browse files
Al2KlimovJames Morris
authored andcommitted
Replace HTTP links with HTTPS ones: security
Rationale: Reduces attack surface on kernel devs opening the links for MITM as HTTPS traffic is much harder to manipulate. Deterministic algorithm: For each file: If not .svg: For each line: If doesn't contain `\bxmlns\b`: For each link, `\bhttp://[^# \t\r\n]*(?:\w|/)`: If both the HTTP and HTTPS versions return 200 OK and serve the same content: Replace HTTP with HTTPS. Signed-off-by: Alexander A. Klimov <[email protected]> Acked-by: John Johansen <[email protected]> Signed-off-by: James Morris <[email protected]>
1 parent 3d77e6a commit c9fecf5

File tree

10 files changed

+10
-10
lines changed

10 files changed

+10
-10
lines changed

security/Kconfig

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ config INTEL_TXT
118118
it was configured with, especially since they may be responsible for
119119
providing such assurances to VMs and services running on it.
120120

121-
See <http://www.intel.com/technology/security/> for more information
121+
See <https://www.intel.com/technology/security/> for more information
122122
about Intel(R) TXT.
123123
See <http://tboot.sourceforge.net> for more information about tboot.
124124
See Documentation/x86/intel_txt.rst for a description of how to enable

security/apparmor/Kconfig

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ config SECURITY_APPARMOR_KUNIT_TEST
7676
This builds the AppArmor KUnit tests.
7777

7878
KUnit tests run during boot and output the results to the debug log
79-
in TAP format (http://testanything.org/). Only useful for kernel devs
79+
in TAP format (https://testanything.org/). Only useful for kernel devs
8080
running KUnit test harness and are not for inclusion into a
8181
production build.
8282

security/integrity/ima/Kconfig

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ config IMA
2626
an aggregate integrity value over this list inside the
2727
TPM hardware, so that the TPM can prove to a third party
2828
whether or not critical system files have been modified.
29-
Read <http://www.usenix.org/events/sec04/tech/sailer.html>
29+
Read <https://www.usenix.org/events/sec04/tech/sailer.html>
3030
to learn more about IMA.
3131
If unsure, say N.
3232

security/integrity/ima/ima_template.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
// SPDX-License-Identifier: GPL-2.0-only
22
/*
33
* Copyright (C) 2013 Politecnico di Torino, Italy
4-
* TORSEC group -- http://security.polito.it
4+
* TORSEC group -- https://security.polito.it
55
*
66
* Author: Roberto Sassu <[email protected]>
77
*

security/integrity/ima/ima_template_lib.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
// SPDX-License-Identifier: GPL-2.0-only
22
/*
33
* Copyright (C) 2013 Politecnico di Torino, Italy
4-
* TORSEC group -- http://security.polito.it
4+
* TORSEC group -- https://security.polito.it
55
*
66
* Author: Roberto Sassu <[email protected]>
77
*

security/integrity/ima/ima_template_lib.h

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
/* SPDX-License-Identifier: GPL-2.0-only */
22
/*
33
* Copyright (C) 2013 Politecnico di Torino, Italy
4-
* TORSEC group -- http://security.polito.it
4+
* TORSEC group -- https://security.polito.it
55
*
66
* Author: Roberto Sassu <[email protected]>
77
*

security/keys/encrypted-keys/ecryptfs_format.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
*
55
* Copyright (C) 2006 International Business Machines Corp.
66
* Copyright (C) 2010 Politecnico di Torino, Italy
7-
* TORSEC group -- http://security.polito.it
7+
* TORSEC group -- https://security.polito.it
88
*
99
* Authors:
1010
* Michael A. Halcrow <[email protected]>

security/keys/encrypted-keys/ecryptfs_format.h

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
*
55
* Copyright (C) 2006 International Business Machines Corp.
66
* Copyright (C) 2010 Politecnico di Torino, Italy
7-
* TORSEC group -- http://security.polito.it
7+
* TORSEC group -- https://security.polito.it
88
*
99
* Authors:
1010
* Michael A. Halcrow <[email protected]>

security/keys/encrypted-keys/encrypted.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
/*
33
* Copyright (C) 2010 IBM Corporation
44
* Copyright (C) 2010 Politecnico di Torino, Italy
5-
* TORSEC group -- http://security.polito.it
5+
* TORSEC group -- https://security.polito.it
66
*
77
* Authors:
88
* Mimi Zohar <[email protected]>

security/keys/encrypted-keys/masterkey_trusted.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
/*
33
* Copyright (C) 2010 IBM Corporation
44
* Copyright (C) 2010 Politecnico di Torino, Italy
5-
* TORSEC group -- http://security.polito.it
5+
* TORSEC group -- https://security.polito.it
66
*
77
* Authors:
88
* Mimi Zohar <[email protected]>

0 commit comments

Comments
 (0)