summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorChristian Breunig <christian@breunig.cc>2024-04-07 16:18:56 +0200
committerGitHub <noreply@github.com>2024-04-07 16:18:56 +0200
commitaa57ef5cf131dea9d59941c1bc1d013c2f08c6ce (patch)
tree82af55d401c12c1e7db8e9d9c268c7504fecd943
parentd6eeb2eacc8a45d9b04a071c0c32bfada2ebe586 (diff)
parentedbf8846059a9f3e2d5a6bdf8227f97f5d79da4f (diff)
downloadvyos-documentation-aa57ef5cf131dea9d59941c1bc1d013c2f08c6ce.tar.gz
vyos-documentation-aa57ef5cf131dea9d59941c1bc1d013c2f08c6ce.zip
Merge pull request #1354 from daknob/fix-rpki-rtr-mistake
Fix mistake in RPKI documentation about the use of TLS
-rw-r--r--docs/configuration/protocols/rpki.rst12
1 files changed, 7 insertions, 5 deletions
diff --git a/docs/configuration/protocols/rpki.rst b/docs/configuration/protocols/rpki.rst
index aeb2941b..acce2d56 100644
--- a/docs/configuration/protocols/rpki.rst
+++ b/docs/configuration/protocols/rpki.rst
@@ -140,11 +140,13 @@ Configuration
SSH
===
-Connections to the RPKI caching server can not only be established by HTTP/TLS
-but you can also rely on a secure SSH session to the server. To enable SSH,
-first you need to create an SSH client keypair using ``generate ssh
-client-key /config/auth/id_rsa_rpki``. Once your key is created you can setup
-the connection.
+Connections to the RPKI caching server can not only be established by TCP using
+the RTR protocol but you can also rely on a secure SSH session to the server.
+This provides transport integrity and confidentiality and it is a good idea if
+your validation software supports it. To enable SSH, first you need to create
+an SSH client keypair using ``generate ssh client-key
+/config/auth/id_rsa_rpki``. Once your key is created you can setup the
+connection.
.. cfgcmd:: set protocols rpki cache <address> ssh username <user>