Talk:Secure Shell
Page contents not supported in other languages.
Appearance
From Wikipedia, the free encyclopedia
This article is rated C-class on Wikipedia's content assessment scale.
It is of interest to multiple WikiProjects.
It is of interest to multiple WikiProjects.
WikiProject icon This article is within the scope of WikiProject Computing , a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.ComputingWikipedia:WikiProject ComputingTemplate:WikiProject ComputingComputing
High This article has been rated as High-importance on the project's importance scale.
WikiProject icon This article is within the scope of WikiProject Internet , a collaborative effort to improve the coverage of the Internet on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.InternetWikipedia:WikiProject InternetTemplate:WikiProject InternetInternet
High This article has been rated as High-importance on the project's importance scale.
WikiProject icon This article is within the scope of WikiProject Cryptography , a collaborative effort to improve the coverage of Cryptography on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.CryptographyWikipedia:WikiProject CryptographyTemplate:WikiProject CryptographyCryptography
High This article has been rated as High-importance on the importance scale.
WikiProject icon This article is within the scope of WikiProject Finland , a collaborative effort to improve the coverage of Finland on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.FinlandWikipedia:WikiProject FinlandTemplate:WikiProject FinlandFinland WikiProject icon
Low This article has been rated as Low-importance on the project's importance scale.
| WikiProject icon | Computer security : Computing High‐importance | |||||||||||||
| ||||||||||||||
| WikiProject icon | Computer science High‐importance | ||||||||||
| |||||||||||
WikiProject icon This article is within the scope of WikiProject Technology , a collaborative effort to improve the coverage of technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.TechnologyWikipedia:WikiProject TechnologyTemplate:WikiProject TechnologyTechnology
icon This article is based on material taken from the Free On-line Dictionary of Computing prior to 1 November 2008 and incorporated under the "relicensing" terms of the GFDL, version 1.3 or later.
icon To-do list for Secure Shell: edit · history · watch · refresh · Updated 2021年08月01日
- The article is very technical and strongly relies on the knowledge of all underlying concepts to understand what ssh is. Start the article with an introduction of what ssh is which is more readable and move the current definition into a section called "definition".
- Introduce how ssh can use public-key cryptography to enable a user to use passphrase-locked private keys in order to open a ssh connection. Currently there is a section "How it works - by analogy" at the end, but there is a gap because it's never explained how public-key cryprography is used in ssh, so this section should either be removed or (preferably) be embedded in an explanation how the concept of public-key crytography is used in ssh.
- Renamed the section now to "How ssh uses public-key cryptography (with analogy)" and cleaned it up a bit. For example, I replaced the references to the reader using "You" and "Your" with "the user" and "the user's". It still needs more improvement to be understandable by someone who does not know ssh at all.
- As far as I see, in that paragraph the basics of pulic key cryptography are described by analogy, but nothing's said about how ssh uses this principle to identify the user. I would recommand that this paragraph be removed (Or maybe moved to p.k.c.) and be written from scrach (if someone wants it), if you asked for my single honest opinion.
- PLEASE, get rid of this paragraph. It is horribly written and offers a pitifully simplistic analogy for the sake of accessibility. There is nothing special about SSH's use of public-key cryptography, so rather than a bad intro to public-key crypto, let's just send the reader to its proper article? I would erase this paragraph but I tried once and got reverted. Alg8662 06:45, 16 November 2007 (UTC)
- As far as I see, in that paragraph the basics of pulic key cryptography are described by analogy, but nothing's said about how ssh uses this principle to identify the user. I would recommand that this paragraph be removed (Or maybe moved to p.k.c.) and be written from scrach (if someone wants it), if you asked for my single honest opinion.
- Renamed the section now to "How ssh uses public-key cryptography (with analogy)" and cleaned it up a bit. For example, I replaced the references to the reader using "You" and "Your" with "the user" and "the user's". It still needs more improvement to be understandable by someone who does not know ssh at all.
This article may be too technical for most readers to understand. Please help improve it to make it understandable to non-experts, without removing the technical details. (September 2010) (Learn how and when to remove this message)
Archives
This page has archives. Sections older than 365 days may be auto-archived by Lowercase sigmabot III if there are more than 5.
Bold title / acro
[edit ]Moved from my talk User talk:Widefox:
According to RFC, SSH stands for secure shell, so why change it?
ShiinaKaze (talk) 01:16, 27 December 2024 (UTC) [reply ]
- Thanks ShiinaKaze. There's two (separate) things to fix - let's move this here. Widefox ; talk 02:11, 27 December 2024 (UTC) [reply ]
- So this was previously styled:
- The Secure Shell Protocol (SSH) [1], then
- The Secure Shell (SSH) Protocol [2] - this is per the RFC (primary source)
then I reverted to the former [3], to keep in line with MOS ACRO - the acro shouldn't be in bold brackets, but be after the expansion as an alternative name (in bold, but without bold brackets).
- The Secure Shell Protocol (SSH Protocol) - arguably the most correct. Widefox ; talk 02:11, 27 December 2024 (UTC) [reply ]
Categories:
- C-Class Computing articles
- High-importance Computing articles
- C-Class Computer networking articles
- High-importance Computer networking articles
- C-Class Computer networking articles of High-importance
- All Computer networking articles
- All Computing articles
- C-Class Internet articles
- High-importance Internet articles
- WikiProject Internet articles
- C-Class Cryptography articles
- High-importance Cryptography articles
- C-Class Computer science articles
- High-importance Computer science articles
- WikiProject Computer science articles
- WikiProject Cryptography articles
- C-Class Finland articles
- Low-importance Finland articles
- All WikiProject Finland pages
- C-Class Computer security articles
- High-importance Computer security articles
- C-Class Computer security articles of High-importance
- All Computer security articles
- C-Class Technology articles
- WikiProject Technology articles
- Wikipedia pages with to-do lists