Misplaced Pages

Talk:Secure Shell

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
This article is rated C-class on Misplaced Pages's content assessment scale.
It is of interest to multiple WikiProjects.
WikiProject iconComputing: Networking Mid‑importance
WikiProject iconThis article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Misplaced Pages. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.ComputingWikipedia:WikiProject ComputingTemplate:WikiProject ComputingComputing
MidThis article has been rated as Mid-importance on the project's importance scale.
Taskforce icon
This article is supported by Networking task force (assessed as High-importance).
WikiProject iconInternet Mid‑importance
WikiProject iconThis article is within the scope of WikiProject Internet, a collaborative effort to improve the coverage of the Internet on Misplaced Pages. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.InternetWikipedia:WikiProject InternetTemplate:WikiProject InternetInternet
MidThis article has been rated as Mid-importance on the project's importance scale.
WikiProject iconCryptography: Computer science High‑importance
WikiProject iconThis article is within the scope of WikiProject Cryptography, a collaborative effort to improve the coverage of Cryptography on Misplaced Pages. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.CryptographyWikipedia:WikiProject CryptographyTemplate:WikiProject CryptographyCryptography
HighThis article has been rated as High-importance on the importance scale.
Taskforce icon
This article is supported by WikiProject Computer science (assessed as High-importance).
WikiProject iconFinland Low‑importance
WikiProject iconThis article is within the scope of WikiProject Finland, a collaborative effort to improve the coverage of Finland on Misplaced Pages. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.FinlandWikipedia:WikiProject FinlandTemplate:WikiProject FinlandFinlandWikiProject icon
LowThis article has been rated as Low-importance on the project's importance scale.
WikiProject iconComputer Security: Computing Low‑importance
WikiProject iconThis article is within the scope of WikiProject Computer Security, a collaborative effort to improve the coverage of computer security on Misplaced Pages. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.Computer SecurityWikipedia:WikiProject Computer SecurityTemplate:WikiProject Computer SecurityComputer Security
LowThis article has been rated as Low-importance on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing (assessed as Low-importance).
Things you can help WikiProject Computer Security with:
Article alerts will be generated shortly by AAlertBot. Please allow some days for processing. More information...
  • Review importance and quality of existing articles
  • Identify categories related to Computer Security
  • Tag related articles
  • Identify articles for creation (see also: Article requests)
  • Identify articles for improvement
  • Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
  • Find editors who have shown interest in this subject and ask them to take a look here.
WikiProject iconComputer science Low‑importance
WikiProject iconThis article is within the scope of WikiProject Computer science, a collaborative effort to improve the coverage of Computer science related articles on Misplaced Pages. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.Computer scienceWikipedia:WikiProject Computer scienceTemplate:WikiProject Computer scienceComputer science
LowThis article has been rated as Low-importance on the project's importance scale.
Things you can help WikiProject Computer science with:

Here are some tasks awaiting attention:
WikiProject iconTechnology
WikiProject iconThis article is within the scope of WikiProject Technology, a collaborative effort to improve the coverage of technology on Misplaced Pages. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.TechnologyWikipedia:WikiProject TechnologyTemplate:WikiProject TechnologyTechnology
This article is based on material taken from the Free On-line Dictionary of Computing prior to 1 November 2008 and incorporated under the "relicensing" terms of the GFDL, version 1.3 or later.

To-do list for Secure Shell: edit·history·watch·refresh· Updated 2021-08-01


There are no active tasks for this page
  • The article is very technical and strongly relies on the knowledge of all underlying concepts to understand what ssh is. Start the article with an introduction of what ssh is which is more readable and move the current definition into a section called "definition".
  • Introduce how ssh can use public-key cryptography to enable a user to use passphrase-locked private keys in order to open a ssh connection. Currently there is a section "How it works - by analogy" at the end, but there is a gap because it's never explained how public-key cryprography is used in ssh, so this section should either be removed or (preferably) be embedded in an explanation how the concept of public-key crytography is used in ssh.
    • Renamed the section now to "How ssh uses public-key cryptography (with analogy)" and cleaned it up a bit. For example, I replaced the references to the reader using "You" and "Your" with "the user" and "the user's". It still needs more improvement to be understandable by someone who does not know ssh at all.
      • As far as I see, in that paragraph the basics of pulic key cryptography are described by analogy, but nothing's said about how ssh uses this principle to identify the user. I would recommand that this paragraph be removed (Or maybe moved to p.k.c.) and be written from scrach (if someone wants it), if you asked for my single honest opinion.
        • PLEASE, get rid of this paragraph. It is horribly written and offers a pitifully simplistic analogy for the sake of accessibility. There is nothing special about SSH's use of public-key cryptography, so rather than a bad intro to public-key crypto, let's just send the reader to its proper article? I would erase this paragraph but I tried once and got reverted. Alg8662 06:45, 16 November 2007 (UTC)
This article may be too technical for most readers to understand. Please help improve it to make it understandable to non-experts, without removing the technical details. (September 2010) (Learn how and when to remove this message)


Archives
Archive 1


This page has archives. Sections older than 365 days may be automatically archived by Lowercase sigmabot III when more than 5 sections are present.

Bold title / acro

Moved from my talk User talk:Widefox:

According to RFC, SSH stands for secure shell, so why change it?

ShiinaKaze (talk) 01:16, 27 December 2024 (UTC)

Thanks ShiinaKaze. There's two (separate) things to fix - let's move this here. Widefox; talk 02:11, 27 December 2024 (UTC)
So this was previously styled:
  • The Secure Shell Protocol (SSH) , then
  • The Secure Shell (SSH) Protocol - this is per the RFC (primary source)

then I reverted to the former , to keep in line with MOS ACRO - the acro shouldn't be in bold brackets, but be after the expansion as an alternative name (in bold, but without bold brackets).

Categories: