From chris@milan.hitnet.rwth-aachen.de  Sun Oct 20 05:47:49 2002
Return-Path: <chris@milan.hitnet.rwth-aachen.de>
Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125])
	by hub.freebsd.org (Postfix) with ESMTP id CA42637B401
	for <FreeBSD-gnats-submit@freebsd.org>; Sun, 20 Oct 2002 05:47:49 -0700 (PDT)
Received: from milan.hitnet.rwth-aachen.de (milan.hitnet.RWTH-Aachen.DE [137.226.181.144])
	by mx1.FreeBSD.org (Postfix) with ESMTP id 738EA43E7B
	for <FreeBSD-gnats-submit@freebsd.org>; Sun, 20 Oct 2002 05:47:48 -0700 (PDT)
	(envelope-from chris@milan.hitnet.rwth-aachen.de)
Received: by milan.hitnet.rwth-aachen.de (Postfix, from userid 1001)
	id 552AAABD4; Sun, 20 Oct 2002 14:47:46 +0200 (CEST)
Message-Id: <20021020124746.552AAABD4@milan.hitnet.rwth-aachen.de>
Date: Sun, 20 Oct 2002 14:47:46 +0200 (CEST)
From: Christian Brueffer <chris@unixpages.org>
Reply-To: Christian Brueffer <chris@unixpages.org>
To: FreeBSD-gnats-submit@freebsd.org
Cc:
Subject: [PATCH] Various fixes for gbde.4
X-Send-Pr-Version: 3.113
X-GNATS-Notify:

>Number:         44302
>Category:       docs
>Synopsis:       [PATCH] Various fixes for gbde.4
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    ceri
>State:          closed
>Quarter:        
>Keywords:       
>Date-Required:  
>Class:          doc-bug
>Submitter-Id:   current-users
>Arrival-Date:   Sun Oct 20 05:50:01 PDT 2002
>Closed-Date:    Sun Oct 20 08:29:10 PDT 2002
>Last-Modified:  Sun Oct 20 08:29:10 PDT 2002
>Originator:     Christian Brueffer
>Release:        FreeBSD 4.6-STABLE i386
>Organization:
Aachen University of Technology (RWTH)
>Environment:
System: FreeBSD milan.hitnet.rwth-aachen.de 4.6-STABLE FreeBSD 4.6-STABLE #2: Fri Jun 28 12:47:08 CEST 2002 chris@milan.hitnet.rwth-aachen.de:/usr/obj/usr/src/sys/LORIEN i386


	
>Description:
	Various grammar and spelling fixes for the new gbde.4 manpage
>How-To-Repeat:
	
>Fix:

	



--- gbde.4.diff begins here ---
--- gbde.4	Sat Oct 19 23:44:57 2002
+++ gbde.4.modified	Sun Oct 20 14:38:52 2002
@@ -105,7 +105,7 @@
 encrypted sector key to find the key used to encrypt the sectorkey.
 .Pp
 Armed with one or more of these "key-keys" our attacker has to derive
-as much information about the the 2048 bit master-key.  To do so, he
+as much information about the 2048 bit master-key.  To do so, he
 first has to reverse an MD5 hash, and then the PRNG-like algorithm
 which derives the MD5 input from the master-key.
 .Pp
@@ -124,8 +124,8 @@
 denied.
 .Ss A practical analogy
 For persons who think cryptography is only slightly more interesting than
-watching silicon sublimate the author humbly offer this analogy to the
-keying scheme for an protected device:
+watching silicon sublimate the author humbly offers this analogy to the
+keying scheme for a protected device:
 .Pp
 Imagine an installation with a vault with walls of several hundred meters
 thick solid steel.  This vault can only be feasibly accessed using the
@@ -136,12 +136,12 @@
 with unique key which has a complexity comparable to a 40 digit
 number.
 .Pp
-In addition to the masterkey each of the four safes also contain
-the exact locations of all four key-safes which are located in a
+In addition to the masterkey, each of the four safes also contain
+the exact locations of all four key-safes which are located in
 randomly chosen places on the outside surface of the vault and they
 are impossible to detect when they are closed.
 .Pp
-Finally, each safe contains four switches which are wire to a bar
+Finally, each safe contains four switches which are wired to a bar
 of dynamite inside each of the four safes.
 .Pp
 In addition to this, a keyholder after opening his key-safe is 
@@ -168,7 +168,7 @@
 the vault.
 .Pp
 The final point to make here is that it is perfectly possible to
-make a detattched copy of any one of these keys, including the master
+make a detached copy of any one of these keys, including the master
 key, and deposit or hide it as one sees fit.
 .Ss steganography support
 When the device is initialized, it is possible to restrict the encrypted
@@ -187,7 +187,7 @@
 .Pp
 Certain file formats like ELF contain multiple distinct sections, and it
 would be possible to locate things just right in such a way that a device
-contains a parition with a filesystem with a large executable,
+contains a partition with a filesystem with a large executable,
 ("a backup copy of my kernel") where a non-loaded ELF section is laid out
 consecutively on the device and thereby could be used to contain a
 .Nm
@@ -211,7 +211,7 @@
 (The employee can still intentionally deny access by applying another
 encryption scheme to the data, but that problem has no technical solution).
 .Ss Cryptographic strength
-This section lists the specific components which conribute to the cryptographic
+This section lists the specific components which contribute to the cryptographic
 strength of
 .Nm .
 .Pp
@@ -221,7 +221,7 @@
 .Pp
 The random key is produced with
 .Xr arc4rand 9
-which is belived to do a respectable job at producing unpredicatble bytes.
+which is belived to do a respectable job at producing unpredictable bytes.
 .Pp
 The skey is stored on the device in a location which can be derived from
 the location of the encrypted payload data.
@@ -233,7 +233,7 @@
 The function of the PRNG is to produce a hash of the masterkey
 unique for each of the payload sectors on the device in one-way
 sort of way.
-Up to 12.5% of the masterkey (32 bytes our of 2048 bits) will be involved
+Up to 12.5% of the masterkey (32 bytes out of 2048 bits) will be involved
 in producing each kkey.
 Since the one-way properties of this algorithm has not been properly
 studied and therefore may have any strength, the output is subsequently
--- gbde.4.diff ends here ---

>Release-Note:
>Audit-Trail:
Responsible-Changed-From-To: gnats-admin->freebsd-doc 
Responsible-Changed-By: ceri 
Responsible-Changed-When: Sun Oct 20 07:44:04 PDT 2002 
Responsible-Changed-Why:  
Misfiled PR. 

http://www.freebsd.org/cgi/query-pr.cgi?pr=44302 
State-Changed-From-To: open->closed 
State-Changed-By: ceri 
State-Changed-When: Sun Oct 20 08:28:40 PDT 2002 
State-Changed-Why:  
Committed.  Thanks. 


Responsible-Changed-From-To: freebsd-doc->ceri 
Responsible-Changed-By: ceri 
Responsible-Changed-When: Sun Oct 20 08:28:40 PDT 2002 
Responsible-Changed-Why:  
Committed.  Thanks. 

http://www.freebsd.org/cgi/query-pr.cgi?pr=44302 
>Unformatted:
