Skip to content

Commit 219e079

Browse files
committed
Merge branch 'master' of https://github.com/arpa2/tlspool
2 parents 5ecae43 + 1ef20f9 commit 219e079

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

README

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
TLSPOOL README
22
==============
33

4-
The tlspool package concentrates TLS-use by client and server applications.
4+
The tlspool package concentrates TLS usage by client and server applications.
55
It gets passed a file descriptor of a socket, initiates TLS over it, and
66
then makes a callback with authenticated local/remote identities in a
77
request for an additional file descriptor for the plaintext side. This
@@ -46,7 +46,7 @@ The core logic used here is (client shown, server is similar):
4646
close (plainfd);
4747
plainfd = -1;
4848
}
49-
...error reoprting...
49+
...error reporting...
5050
} else {
5151
...continue to use plainfd...
5252
}
@@ -65,8 +65,8 @@ in the tlsparams structure after this call.
6565
The importance of PKCS #11
6666
--------------------------
6767

68-
The key material used by this daemon will be accessed over PKCS #11. This
69-
requires multi-layered attacks to key material: the material is protected
68+
The key material used by this daemon will be accessed over PKCS #11. Compromise
69+
will require multi-layered attacks to key material: the material is protected
7070
by a secure key store of choice, in hardware or software, and even the PIN
7171
for using the private keys without seeing them is stored in a separate
7272
program, namely the TLS Pool. Specifically, the PIN and key material are
@@ -94,7 +94,7 @@ for usable keys to authenticate its identities to the Internet, both over
9494
X.509 and over OpenPGP.
9595

9696
One final, and hardly recognised use of having a central TLS Pool and
97-
potentially centralised PKCS #11 repositories is the ability to sniff
97+
potentially centralised PKCS #11 repositories is the ability to monitor
9898
the network traffic for intrusion attempts. To be able to do this in
9999
the presence of encrypted connections, the ability to decrypt the
100100
traffic must be offered to sniffers like Snort. The decryption usually

0 commit comments

Comments
 (0)