diff options
author | Luca <deri@ntop.org> | 2023-09-15 12:56:29 +0200 |
---|---|---|
committer | Luca <deri@ntop.org> | 2023-09-15 12:56:29 +0200 |
commit | 0828dff3acae6e06e6ac1d284ecb2c19ad83d27d (patch) | |
tree | f60ef15dddb2fd95de4a965278b1ed9a1d824c2e /doc/flow_risks.rst | |
parent | c5cd4df0568de8b01baa7294a0fc12964bee4272 (diff) |
Language fix
Diffstat (limited to 'doc/flow_risks.rst')
-rw-r--r-- | doc/flow_risks.rst | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/flow_risks.rst b/doc/flow_risks.rst index 052bd156d..7cecf5f42 100644 --- a/doc/flow_risks.rst +++ b/doc/flow_risks.rst @@ -220,7 +220,7 @@ This risk is used to detect suspicious data carried in ICMP packets whose entrop NDPI_CLEAR_TEXT_CREDENTIALS =========================== -Clear text protocols are not bad per-se, but they should be avoided when they carry credentials as they can be intercepted by malicious users. This risk is triggered whenever clear text protocols (e.g. FTP, HTTP, IMAP...) contain credentials in clear text (read it as nDPI does not trigger this risk for HTTP connections that do not carry credentials). +Clear text protocols are not intrinsically bad, but they should be avoided when they carry credentials as they can be intercepted by malicious users. This risk is triggered whenever clear text protocols (e.g. FTP, HTTP, IMAP...) contain credentials in clear text (read it as nDPI does not trigger this risk for HTTP connections that do not carry credentials). .. _Risk 037: |