Skip to content

Commit 77ddb24

Browse files
authored
# Fix formatting end of file (#1536)
* put some commands in back tics that were missed or recently added * fix a few spelling mistakes
1 parent f75cc9b commit 77ddb24

File tree

1 file changed

+20
-20
lines changed

1 file changed

+20
-20
lines changed

docs/labs/security/lab9-cryptography.md

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -516,7 +516,7 @@ In this exercise, you will use the so-called “Web of Trust” to communicate w
516516
517517
<span id="anchor-4"></span>Encrypting and decrypting files
518518
519-
The procedure for encrypting and decrypting files or documents is straight forward.
519+
The procedure for encrypting and decrypting files or documents is straighti-forward.
520520
521521
If you want to encrypt a message to the user ying, you will encrypt it using user ying’s public key.
522522
@@ -613,7 +613,7 @@ OpenSSH is OpenBSD's SSH (Secure SHell) protocol implementation.
613613
614614
It is a FREE version of the SSH protocol suite of network connectivity tools. OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other network-level attacks. Additionally, OpenSSH provides a plethora of secure tunneling capabilities, as well as a variety of authentication methods.
615615
616-
It helps to provide secure encrypted communications between two untrusted hosts over an insecure network (such as the internet).
616+
It helps to provide secure encrypted communications between two un-trusted hosts over an insecure network (such as the internet).
617617
618618
It includes both the server-side components and the client-side suite of programs
619619
@@ -623,12 +623,12 @@ The server side includes the secure shell daemon (`sshd`). `sshd` is the daemon
623623
624624
It forks a new daemon for each incoming connection. The forked daemons handle key exchange, encryption, authentication, command execution, and data exchange. According to sshd’s man page, `sshd` works as follows:
625625
626-
The OpenSSH SSH daemon supports SSH protocol 2 only. Each host has a host-specific key, used to identify the host. Whenever a client connects, the daemon responds
627-
with its public host key. The client compares the host key against its own database to verify that it has not changed. Forward security is provided through a Diffie-Hellman key agreement. This key agreement results in a shared session key. The rest of the session is encrypted using a symmetric cipher.
626+
The OpenSSH SSH daemon supports SSH protocol 2 only. Each host has a host-specific key, used to identify the host. Whenever a client connects, the daemon responds
627+
with its public host key. The client compares the host key against its own database to verify that it has not changed. Forward security is provided through a Diffie-Hellman key agreement. This key agreement results in a shared session key. The rest of the session is encrypted using a symmetric cipher.
628628
629-
The client selects the encryption algorithm to use from those offered by the server. Additionally, session integrity is provided through a cryptographic message authentication code (hmac-md5, hmac-sha1, umac-64, umac-128, hmac-sha2-256 or hmac-sha2-512).
629+
The client selects the encryption algorithm to use from those offered by the server. Additionally, session integrity is provided through a cryptographic message authentication code (hmac-md5, hmac-sha1, umac-64, umac-128, hmac-sha2-256 or hmac-sha2-512).
630630
631-
Finally, the server and the client enter an authentication dialog. The client tries to authenticate itself using host-based authentication, public key authentication,
631+
Finally, the server and the client enter an authentication dialog. The client tries to authenticate itself using host-based authentication, public key authentication,
632632
GSSAPI authentication, challenge-response authentication, or password authentication.
633633
634634
The SSH2 protocol implemented in OpenSSH is standardized by the “IETF secsh” working group
@@ -639,7 +639,7 @@ The client's suite of programs include `ssh`. This is a program used for logging
639639
640640
## Exercise 5
641641
642-
### sshd
642+
### `sshd`
643643
644644
Some exercises covering the `sshd` server daemon.
645645
@@ -669,7 +669,7 @@ Most Linux systems out of the box already have the OpenSSH server configured and
669669
670670
### `sshd_config`
671671
672-
1. Open up the ssh server’s config file with any pager and study it. Type:
672+
1. Open up the SSH server’s configuration file with any pager and study it. Type:
673673
674674
```
675675
[root@serverXY root]# less /etc/ssh/sshd_config
@@ -967,7 +967,7 @@ The public is store in a file with the same file name as the private key but wit
967967
Created directory '/home/ying/.ssh'.
968968
```
969969
970-
You'll be prompted twice to enter a passphrase. Input a good and reasonably difficult to guess passphrase. Press <kbd>ENTER</kbd> afte
970+
You'll be prompted twice to enter a passphrase. Input a good and reasonably difficult to guess passphrase. Press <kbd>ENTER</kbd> after each prompt.
971971
972972
```bash
973973
Enter passphrase (empty for no passphrase): *****
@@ -983,7 +983,7 @@ The public is store in a file with the same file name as the private key but wit
983983
...<SNIP>...
984984
```
985985
986-
After successful completion, you'll see a message stating that your identififcation and public keys have been saved under the `/home/ying/.ssh/` directory.
986+
After successful completion, you'll see a message stating that your identification and public keys have been saved under the `/home/ying/.ssh/` directory.
987987
988988
3. cd to your `~/.ssh/` directory. List the files in the directory.
989989
@@ -1067,15 +1067,15 @@ In this exercise you will learn how to configure the agent such that you wont ha
10671067
10681068
Take note of the value of the process ID (PID) of the agent in your output.
10691069
1070-
3. Run the ssh-add program to list the fingerprints of all [public/private] identities currently
1070+
3. Run the `ssh-add` program to list the fingerprints of all [public/private] identities currently
10711071
represented by the agent. TYpe:
10721072
10731073
```bash
10741074
[ying@localhost ~]$ ssh-add -l
10751075
The agent has no identities.
10761076
```
10771077
1078-
You shoudn't yet have any identities listed.
1078+
You shouldn't yet have any identities listed.
10791079
10801080
4. Use the `ssh-add` program without any options to add your keys to the agent you launched above. Type:
10811081
@@ -1089,26 +1089,26 @@ In this exercise you will learn how to configure the agent such that you wont ha
10891089
Identity added: /home/ying/.ssh/id_dsa ([email protected])
10901090
```
10911091
1092-
5. Now run the ssh-add command again to list known fingerprint identities. Type:
1092+
5. Now run the `ssh-add` command again to list known fingerprint identities. Type:
10931093
10941094
```bash
10951095
[ying@localhost ~]$ ssh-add -l
10961096
1024 SHA256:ne7bHHb65e50.......0AZoQCEnnFdBPedGrDQ ying@server (DSA)
10971097
```
10981098
1099-
6. Now as the user *ying*, try connecting remotly to serverPR and run a simple test command.
1100-
1101-
Assuming you've done everything correctly till this point regarding setting up and storing the relevant keys, has done correctly till this point you should NOT be prompted for a password or passphrase. Type:
1099+
6. Now as the user *ying*, try connecting remotely to serverPR and run a simple test command.
11021100
1101+
Assuming you've done everything correctly till this point regarding setting up and storing the relevant keys, has done correctly till this point you should NOT be prompted for a password or passphrase. Type:
1102+
11031103
```
11041104
[ying@serverXY .ssh]$ ssh serverPR 'ls /tmp'
11051105
```
1106-
1107-
7. If you are done and no longer in need of the services of the ssh-agent or you simply want to revert back to key based authentication you can delete all the [private/public] identities from the agent. Type:
1106+
1107+
7. If you are done and no longer in need of the services of the `ssh-agent` or you simply want to revert back to key based authentication you can delete all the [private/public] identities from the agent. Type:
11081108
11091109
```bash
11101110
[ying@localhost ~]$ ssh-add -D
11111111
All identities removed.
11121112
```
1113-
1114-
8. All done!
1113+
1114+
8. All done!

0 commit comments

Comments
 (0)