Index: docs/linux_sandboxing.md |
diff --git a/docs/linux_sandboxing.md b/docs/linux_sandboxing.md |
index 0be4dde73025652352357623a520aff4d1c7bc0f..dfbdf3ac210c98bb6b60b8672f61076a3ca9a8b3 100644 |
--- a/docs/linux_sandboxing.md |
+++ b/docs/linux_sandboxing.md |
@@ -6,7 +6,7 @@ renderers to run with a limited set of privileges since they process untrusted |
input and are likely to be compromised. Renderers will use an IPC mechanism to |
request access to resource from a more privileged (browser process). |
You can find more about this general design |
-[here](http://dev.chromium.org/developers/design-documents/sandbox). |
+[here](https://dev.chromium.org/developers/design-documents/sandbox). |
We use different sandboxing techniques on Linux and Chrome OS, in combination, |
to achieve a good level of sandboxing. You can see which sandboxes are currently |
@@ -41,9 +41,9 @@ network, something that is difficult to perform at the layer-2. |
| **Name** | **Layer and process** | **Linux flavors where available** | **State** | |
|:---------|:----------------------|:----------------------------------|:----------| |
-| [Setuid sandbox](#The_setuid_sandbox.md) | Layer-1 in Zygote processes (renderers, PPAPI, [NaCl](http://www.chromium.org/nativeclient), some utility processes) | Linux distributions and Chrome OS | Enabled by default (old kernels) and maintained | |
-| [User namespaces sandbox](#User_namespaces_sandbox.md) | Modern alternative to the setuid sandbox. Layer-1 in Zygote processes (renderers, PPAPI, [NaCl](http://www.chromium.org/nativeclient), some utility processes) | Linux distributions and Chrome OS (kernel >= 3.8) | Enabled by default (modern kernels) and actively developed | |
-| [Seccomp-BPF](#The_seccomp-bpf_sandbox.md) | Layer-2 in some Zygote processes (renderers, PPAPI, [NaCl](http://www.chromium.org/nativeclient)), Layer-1 + Layer-2 in GPU process | Linux kernel >= 3.5, Chrome OS and Ubuntu | Enabled by default and actively developed | |
+| [Setuid sandbox](#The_setuid_sandbox.md) | Layer-1 in Zygote processes (renderers, PPAPI, [NaCl](https://www.chromium.org/nativeclient), some utility processes) | Linux distributions and Chrome OS | Enabled by default (old kernels) and maintained | |
+| [User namespaces sandbox](#User_namespaces_sandbox.md) | Modern alternative to the setuid sandbox. Layer-1 in Zygote processes (renderers, PPAPI, [NaCl](https://www.chromium.org/nativeclient), some utility processes) | Linux distributions and Chrome OS (kernel >= 3.8) | Enabled by default (modern kernels) and actively developed | |
+| [Seccomp-BPF](#The_seccomp-bpf_sandbox.md) | Layer-2 in some Zygote processes (renderers, PPAPI, [NaCl](https://www.chromium.org/nativeclient)), Layer-1 + Layer-2 in GPU process | Linux kernel >= 3.5, Chrome OS and Ubuntu | Enabled by default and actively developed | |
| [Seccomp-legacy](#The_seccomp_sandbox.md) | Layer-2 in renderers | All | [Deprecated](https://src.chromium.org/viewvc/chrome?revision=197301&view=revision) | |
| [SELinux](#SELinux.md) | Layer-1 in Zygote processes (renderers, PPAPI) | SELinux distributions | [Deprecated](https://src.chromium.org/viewvc/chrome?revision=200838&view=revision) | |
| AppArmor | Outer layer-1 in Zygote processes (renderers, PPAPI) | Not used | Deprecated | |
@@ -131,7 +131,7 @@ renderers and PPAPI processes) will do a dynamic transition. audit2allow will |
quickly build a usable module. |
Available since |
-[r26257](http://src.chromium.org/viewvc/chrome?view=rev&revision=26257), |
+[r26257](https://src.chromium.org/viewvc/chrome?view=rev&revision=26257), |
more information in |
[this blog post](http://www.imperialviolet.org/2009/07/14/selinux.html) (grep |
for 'dynamic' since dynamic transitions are a little obscure in SELinux) |
@@ -141,7 +141,7 @@ for 'dynamic' since dynamic transitions are a little obscure in SELinux) |
Sandboxing can make developing harder, see: |
* [this page](linux_suid_sandbox_development.md) for the `setuid` sandbox |
-* [this page](http://www.chromium.org/for-testers/bug-reporting-guidelines/hanging-tabs) |
+* [this page](https://www.chromium.org/for-testers/bug-reporting-guidelines/hanging-tabs) |
for triggering crashes |
* [this page for debugging tricks](linux_debugging.md) |