From 80094b793cdb75647b3a548e604f2bce947fc185 Mon Sep 17 00:00:00 2001 From: Philip O'Toole Date: Sat, 16 Apr 2016 22:07:27 -0700 Subject: [PATCH] Update SECURITY.md --- SECURITY.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/SECURITY.md b/SECURITY.md index cb54b529..df23d689 100644 --- a/SECURITY.md +++ b/SECURITY.md @@ -2,7 +2,7 @@ rqlite can be secured in various way, and at different levels of control. ## File system security -You are responsible for securing access to the SQLite databases. There is no reason for any user to directly access the file, for rqlite to work correctly. +You are responsible for securing access to the SQLite databases. There is no reason for any user to directly access the SQLite file, for rqlite to work correctly. ## Network security Each rqlite node listens on 2 TCP ports -- one for the HTTP API, and the other for intra-cluster communications. Only the API port need be reachable from outside the cluster.