SSH security improvements/fr: Difference between revisions

Created page with "== Quelles sont les modifications? =="
(Created page with "=Modifications apportées à l'été 2019=")
(Created page with "== Quelles sont les modifications? ==")
Line 7: Line 7:
and protocols which were reasonably secure ten or fifteen years ago can no longer be used without an unacceptable risk of the connection being compromised by a third party. For this reason, Compute Canada is modifying its policies and practices regarding [[SSH]], the tool used to verify the identity of clusters and users to one another. Some users may have to update their SSH client software, some may have to generate a new public/private key-pair, and everyone will have to update the local copy of the "host key" which is used to identify each Compute Canada cluster.     
and protocols which were reasonably secure ten or fifteen years ago can no longer be used without an unacceptable risk of the connection being compromised by a third party. For this reason, Compute Canada is modifying its policies and practices regarding [[SSH]], the tool used to verify the identity of clusters and users to one another. Some users may have to update their SSH client software, some may have to generate a new public/private key-pair, and everyone will have to update the local copy of the "host key" which is used to identify each Compute Canada cluster.     


== What is changing? ==
== Quelles sont les modifications? ==


During the summer of 2019, we will make the following SSH security improvements on Compute Canada clusters.  We will:
During the summer of 2019, we will make the following SSH security improvements on Compute Canada clusters.  We will:
rsnt_translations
56,437

edits