From 1fc7f583041d4393ed97cce53eb4cbe96964a7df Mon Sep 17 00:00:00 2001 From: kka Date: Wed, 18 Jul 2018 14:15:44 +0200 Subject: Fix broken links in the documentation --- doc/source/config.rst | 8 +++++--- doc/source/encryption.rst | 3 +-- doc/source/features.rst | 2 +- 3 files changed, 7 insertions(+), 6 deletions(-) (limited to 'doc/source') diff --git a/doc/source/config.rst b/doc/source/config.rst index dfe2799..e9ee348 100644 --- a/doc/source/config.rst +++ b/doc/source/config.rst @@ -68,7 +68,7 @@ This configuration variable contains parameters that are used by multiple featur sp.global.secret_key("44239bd400aa82e125337c9d4eb8315767411ccd"); - ``cookie_env_var``: A environment variable used as part of cookies encryption. - See the :ref:`relevant documentation ` + See the :ref:`relevant documentation ` Bugclass-killer features ------------------------ @@ -107,7 +107,7 @@ It can either be ``enabled`` or ``disabled``. .. _config_global: Prevent sloppy comparison -^^^^^^^^^^^^^^^^ +^^^^^^^^^^^^^^^^^^^^^^^^^ sloppy_comparison, disabled by default, will prevent php `type juggling `_ (``==``) , preventing any bypass of a comparison. @@ -133,11 +133,13 @@ It can either be ``enabled`` or ``disabled`` and can be used in ``simulation`` m sp.unserialize_hmac.enable(); sp.unserialize_hmac.disable(); +.. _config_cookie-encryption: + Cookies-related mitigations ^^^^^^^^^^^^^^^^^^^^^^^^^^^ Since snuffleupagus is providing several hardening features for cookies, -there is a :dedicated web page:`here ` about them. +there is a dedicated web page :ref:`here ` about them. readonly_exec diff --git a/doc/source/encryption.rst b/doc/source/encryption.rst index 8ac6861..2b6ac9d 100644 --- a/doc/source/encryption.rst +++ b/doc/source/encryption.rst @@ -1,4 +1,4 @@ -.. _cookie-encryption-config: +.. _cookie-encryption-page: Cookies ======= @@ -39,7 +39,6 @@ It can either be set to ``strict`` or ``lax``: sp.cookie.name("cookie1").samesite("lax"); sp.cookie.name("cookie2").samesite("strict");; -.. _cookie-encryption_config: Cookie encryption """"""""""""""""" diff --git a/doc/source/features.rst b/doc/source/features.rst index 08ad3d4..e420156 100644 --- a/doc/source/features.rst +++ b/doc/source/features.rst @@ -71,7 +71,7 @@ Like *Suhosin*, we are encrypting the cookies with a secret key, an environment variable (usually the IP of the user) and the user's user-agent. This means that an attacker with an XSS won't be able to use the stolen cookie, since he can't spoof the content of the value of the environment -variable for the user. Please do read the :ref:`documentation about this feature ` +variable for the user. Please do read the :ref:`documentation about this feature ` if you're planning to use it. This feature is roughly the same than the `Suhosin one `_. -- cgit v1.3