@@ -120,7 +120,7 @@ The Secure Shell (SSH) protocol provides a remote login service,
120120replacing the less secure Telnet used in the early days of the
121121Internet. SSH can also be used to remotely execute commands and
122122transfer files. It is most often used to provide strong client/server
123- authentication/ message integrity—where the SSH client runs on the
123+ authentication and message integrity—where the SSH client runs on the
124124user’s laptop (for example) and the SSH server runs on some remote
125125machine that the user wants to log into—but it also supports
126126confidentiality. Telnet provides none of these capabilities. Note that
@@ -386,7 +386,7 @@ through a single tunnel obscures information about how much traffic is
386386flowing between particular endpoints. As noted above, a network of
387387such tunnels can be used to implement an entire virtual private
388388network. But there is more to VPNs than just tunneling mechanisms, as
389- we discuss below .
389+ we discuss next .
390390
3913917.4 Virtual Private Networks
392392------------------------------------
@@ -655,12 +655,13 @@ if you need to authenticate yourself to, say, your bank, it's
655655overwhelmingly the case today that you will use some combination of
656656user name (maybe an account number or an email address) and a
657657password. Perhaps another factor, such as a one-time code sent to your
658- phone, will also be used. Encryption (using TLS) prevents your password
659- from being seen by eavesdroppers when it is sent to the bank's site,
660- but currently there is little deployment of public key cryptography
661- for the authentication of users. SSH, as noted above, supports the use
662- of public keys for user authentication, but it's hardly in mainstream
663- use by consumers on the Internet.
658+ phone, will also be used. Encryption (using TLS) prevents your
659+ password from being seen by eavesdroppers when it is sent to the
660+ bank's site, but currently there is little deployment of public key
661+ cryptography for the authentication of users. SSH, as noted in a
662+ previous section, supports the use of public keys for user
663+ authentication, but it's hardly in mainstream use by consumers on the
664+ Internet.
664665
665666Password-based authentication had proven enormously problematic, with
666667passwords frequently being compromised by a variety of attacks. If a
0 commit comments