Skip to content

Commit 22c3c48

Browse files
committed
lint fix
1 parent 9639b6d commit 22c3c48

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

systems.rst

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
Chapter 7: Other Example Systems
2-
============================
2+
========================================
33

44
.. Assuming we keep a substantial set of examples, we should look
55
for ways to highlight the underlying open source software (and the
@@ -38,7 +38,7 @@ flawed, it would be great if your entire security architecture didn’t
3838
need an immediate redesign.
3939

4040
7.1 Pretty Good Privacy (PGP)
41-
-------------------------------
41+
------------------------------------------
4242

4343
Pretty Good Privacy (PGP) is an approach to providing authentication,
4444
confidentiality, data integrity, and nonrepudiation for email.
@@ -263,7 +263,7 @@ well-known port) limiting the situations in which SSH works as a
263263
VPN-like tunnel.
264264

265265
7.3 IP Security (IPsec)
266-
-------------------------
266+
--------------------------------
267267

268268
One of the earliest efforts to integrate security into the Internet
269269
sits at the IP layer. Support for IPsec, as the architecture is
@@ -386,7 +386,7 @@ implement an entire virtual private network. Hosts communicating over
386386
a VPN need not even be aware that it exists.
387387

388388
7.4 Web Authentication (WebAuthn) and Passkeys
389-
-----------------------------------------------
389+
----------------------------------------------------------------
390390

391391
While public key cryptography has been well understood for decades,
392392
and forms the basis for authentication of web sites using Transport
@@ -529,7 +529,7 @@ replace the ubiquitous password for user authentication.
529529

530530

531531
7.5 Wireless Security (802.11i)
532-
---------------------------------
532+
--------------------------------------------
533533

534534
Wireless links are particularly exposed to security threats due to the
535535
lack of any physical security on the medium. While the convenience of

0 commit comments

Comments
 (0)