Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp1276115ybt; Sat, 27 Jun 2020 03:34:29 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzdqeDuD+mwRt4Oylv0oa6f+80OogKq3NEUhmP/MOnQTgXKqzMFApEkSCNwHdgrX8bLWMtg X-Received: by 2002:aa7:c583:: with SMTP id g3mr8017727edq.228.1593254069178; Sat, 27 Jun 2020 03:34:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593254069; cv=none; d=google.com; s=arc-20160816; b=IVeMg5IhdO7C5dZrV1AFkSGQhPpvrW2uPTt2Qb4zXCsxXwR1VI3x4ZP+iUpeUTmTrZ 4+jjmu43ANM+mPJ4Gy7eTDMCmpGLjRC2w7zxUphZsv+68Lw13o/5aWGbZ4f2aXebZhSX veWgzAMrvW/HG4wVqOG3X9A+/fryJ3cGHQNnVXhANUZOuFD7Lplzojdy1SScdxxWOBZq gVmiNRov8Wqyr6HnyqutH2OoyM7tq2yL5pOHuqkiIJz+kYG2GefNQPUg5m5+XLdGYAdz dSrhHJOiV0OngizGUalJ3kYcEq9XK5Jne2tFP7ID/cVx+d6S+qlRcmSiG5d7vFNezRTB ok4A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=2MJ7HyZXgbP6GYQxVBHjDT80fx15oGbmC/0dNS0GsKU=; b=WacdjU1F96kyOjvzeoP7X8ea4ecvMcK1Ksf4ugFEe+in7enjYMDMMBMcSf0J/9XI/1 3Oe3BN6vbJ4H7WX11/RjSo6b7f5ctpv8G5w3SrPlI8ClsNU2JWTZHHcJbpKLC4qNJArh NLyqp6F1t/I65gfGqEzM/TXDwy6N9q6d8gpep3MiA+sTSV8xt3ByC1NezGu6XScRPq6z P2NqgPiHUuPmtIBJHrBcmbdmvYTSlZnjB3VOIbVtOudclxakhGNekcxeGS/MmnbCipDj YCa9G3V1YY+WvWSgFiCQ3P9LhPSaEcA7gtlH/sHadh7vROP10WrFWfTJqIOJiaHvJZFA omtg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d19si13618073ejt.396.2020.06.27.03.34.05; Sat, 27 Jun 2020 03:34:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726614AbgF0KcF (ORCPT + 99 others); Sat, 27 Jun 2020 06:32:05 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58358 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726595AbgF0KcF (ORCPT ); Sat, 27 Jun 2020 06:32:05 -0400 Received: from smtp.al2klimov.de (smtp.al2klimov.de [IPv6:2a01:4f8:c0c:1465::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D6575C03E979; Sat, 27 Jun 2020 03:32:04 -0700 (PDT) Received: from authenticated-user (PRIMARY_HOSTNAME [PUBLIC_IP]) by smtp.al2klimov.de (Postfix) with ESMTPA id 25EF6BC1D5; Sat, 27 Jun 2020 10:32:01 +0000 (UTC) From: "Alexander A. Klimov" To: dyoung@redhat.com, bhe@redhat.com, vgoyal@redhat.com, corbet@lwn.net, kexec@lists.infradead.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org Cc: "Alexander A. Klimov" Subject: [PATCH] Replace HTTP links with HTTPS ones: kdump Date: Sat, 27 Jun 2020 12:31:51 +0200 Message-Id: <20200627103151.71942-1-grandmaster@al2klimov.de> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spamd-Bar: +++++ X-Spam-Level: ***** Authentication-Results: smtp.al2klimov.de; auth=pass smtp.auth=aklimov@al2klimov.de smtp.mailfrom=grandmaster@al2klimov.de Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Rationale: Reduces attack surface on kernel devs opening the links for MITM as HTTPS traffic is much harder to manipulate. Deterministic algorithm: For each file: If not .svg: For each line: If doesn't contain `\bxmlns\b`: For each link, `\bhttp://[^# \t\r\n]*(?:\w|/)`: If both the HTTP and HTTPS versions return 200 OK and serve the same content: Replace HTTP with HTTPS. Signed-off-by: Alexander A. Klimov --- If there are any URLs to be removed completely or at least not HTTPSified: Just clearly say so and I'll *undo my change*. See also https://lkml.org/lkml/2020/6/27/64 If there are any valid, but yet not changed URLs: See https://lkml.org/lkml/2020/6/26/837 Documentation/admin-guide/kdump/kdump.rst | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/Documentation/admin-guide/kdump/kdump.rst b/Documentation/admin-guide/kdump/kdump.rst index 2da65fef2a1c..8cfa35f777f5 100644 --- a/Documentation/admin-guide/kdump/kdump.rst +++ b/Documentation/admin-guide/kdump/kdump.rst @@ -65,20 +65,20 @@ Install kexec-tools 2) Download the kexec-tools user-space package from the following URL: -http://kernel.org/pub/linux/utils/kernel/kexec/kexec-tools.tar.gz +https://kernel.org/pub/linux/utils/kernel/kexec/kexec-tools.tar.gz This is a symlink to the latest version. The latest kexec-tools git tree is available at: - git://git.kernel.org/pub/scm/utils/kernel/kexec/kexec-tools.git -- http://www.kernel.org/pub/scm/utils/kernel/kexec/kexec-tools.git +- https://www.kernel.org/pub/scm/utils/kernel/kexec/kexec-tools.git There is also a gitweb interface available at -http://www.kernel.org/git/?p=utils/kernel/kexec/kexec-tools.git +https://www.kernel.org/git/?p=utils/kernel/kexec/kexec-tools.git More information about kexec-tools can be found at -http://horms.net/projects/kexec/ +https://horms.net/projects/kexec/ 3) Unpack the tarball with the tar command, as follows:: @@ -511,7 +511,7 @@ dump kernel. You can also use the Crash utility to analyze dump files in Kdump format. Crash is available on Dave Anderson's site at the following URL: - http://people.redhat.com/~anderson/ + https://people.redhat.com/~anderson/ Trigger Kdump on WARN() ======================= -- 2.27.0