From e8ead75128e08f0a9802511b089d1dc0edbe7988 Mon Sep 17 00:00:00 2001 From: Vega Deftwing Date: Sun, 14 Oct 2018 22:27:06 -0700 Subject: [PATCH] Updated SSH general Information file (#19168) * Updated SSH general Information file Added notes about security, use cases, and basic networking info * Fixed typos. --- client/src/pages/guide/english/ssh/index.md | 10 ++++------ 1 file changed, 4 insertions(+), 6 deletions(-) diff --git a/client/src/pages/guide/english/ssh/index.md b/client/src/pages/guide/english/ssh/index.md index 733f22f0e6..1f48fa57ec 100644 --- a/client/src/pages/guide/english/ssh/index.md +++ b/client/src/pages/guide/english/ssh/index.md @@ -5,14 +5,12 @@ title: SSH Secure Shell (SSH) is a cryptographic network protocol intended for secure data transfer over insecure networks. -It is most commonly used for accessing remote servers. Usually these servers are Linux or BSD based, though other platforms may offer SSH access as well. Also it is worth noting that other computational appliences, particularly those for networking such as switches or routers, may have SSH as well. - -SSH is also used in distributed source code versioning software like git. +It is most commonly used for accessing remote servers. Usually these servers are Linux or BSD based, though other platforms may offer SSH access as well. Also it is worth noting that other computational appliances, particularly those for networking such as switches or routers, may have SSH as well. SSH is also used in distributed source code versioning software like git. From a networking perspective SSH may, dependent on the server and client software, allow for more advanced features such as XServer forwarding for remote access of graphical applications or network tunneling to allow for what is effectively a Virtual Private Network (VPN). -While SSH has 'Secure' in its name, its prevelance makes it a lucritive target. As such it is often configured to use more elaborate methods than simple passwords. Most commonly this is done with keys in a public and private key cryptography system. The exact cryptographic method can vary as well, with RSA being the most common. +While SSH has 'Secure' in its name, its prevalence makes it an attractive target to attackers. As such it is often configured to use more elaborate methods than simple passwords. Most commonly this is done with keys in a public and private key cryptography system. The exact cryptographic method can vary as well, with RSA being the most common. -As with most network services SSH has a standard network port, 22; however, as SSH is a lucritive target for those wishing to do harm, it is often moved to an arbitrary higher port as a very simple security measure. +As with most network services SSH has a standard network port, 22; however, as SSH is an attractive target for those wishing to do harm, it is often moved to an arbitrary port as a very simple security measure. -Finally, it's worth mentioning that SSH is far from tollerent of network instabily and there are options out there which can either impove this or replace SSH outright. +Finally, it's worth mentioning that SSH is far from tolerant of network instability and there are options out there which can either improve this or replace SSH outright. \ No newline at end of file