Skip to content

Commit adf2871

Browse files
committed
small nits
1 parent 8cc5ebd commit adf2871

File tree

1 file changed

+9
-8
lines changed

1 file changed

+9
-8
lines changed

systems.rst

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ The Secure Shell (SSH) protocol provides a remote login service,
120120
replacing the less secure Telnet used in the early days of the
121121
Internet. SSH can also be used to remotely execute commands and
122122
transfer files. It is most often used to provide strong client/server
123-
authentication/message integrity—where the SSH client runs on the
123+
authentication and message integrity—where the SSH client runs on the
124124
user’s laptop (for example) and the SSH server runs on some remote
125125
machine that the user wants to log into—but it also supports
126126
confidentiality. Telnet provides none of these capabilities. Note that
@@ -386,7 +386,7 @@ through a single tunnel obscures information about how much traffic is
386386
flowing between particular endpoints. As noted above, a network of
387387
such tunnels can be used to implement an entire virtual private
388388
network. But there is more to VPNs than just tunneling mechanisms, as
389-
we discuss below.
389+
we discuss next.
390390

391391
7.4 Virtual Private Networks
392392
------------------------------------
@@ -655,12 +655,13 @@ if you need to authenticate yourself to, say, your bank, it's
655655
overwhelmingly the case today that you will use some combination of
656656
user name (maybe an account number or an email address) and a
657657
password. Perhaps another factor, such as a one-time code sent to your
658-
phone, will also be used. Encryption (using TLS) prevents your password
659-
from being seen by eavesdroppers when it is sent to the bank's site,
660-
but currently there is little deployment of public key cryptography
661-
for the authentication of users. SSH, as noted above, supports the use
662-
of public keys for user authentication, but it's hardly in mainstream
663-
use by consumers on the Internet.
658+
phone, will also be used. Encryption (using TLS) prevents your
659+
password from being seen by eavesdroppers when it is sent to the
660+
bank's site, but currently there is little deployment of public key
661+
cryptography for the authentication of users. SSH, as noted in a
662+
previous section, supports the use of public keys for user
663+
authentication, but it's hardly in mainstream use by consumers on the
664+
Internet.
664665

665666
Password-based authentication had proven enormously problematic, with
666667
passwords frequently being compromised by a variety of attacks. If a

0 commit comments

Comments
 (0)