SSH security improvements: Difference between revisions

Jump to navigation Jump to search
Marked this version for translation
No edit summary
(Marked this version for translation)
Line 2: Line 2:


<translate>
<translate>
<!--T:37-->
SSH protects the information exchanged between a user and a remote server by encrypting the connection and verifying the identity of both parties through a server key (also called "host signature") and, for the user, either a password or a personal key. To address the risk of the connection being compromised by a third party on its clusters, Compute Canada requires all users to proceed with the updates described below.
SSH protects the information exchanged between a user and a remote server by encrypting the connection and verifying the identity of both parties through a server key (also called "host signature") and, for the user, either a password or a personal key. To address the risk of the connection being compromised by a third party on its clusters, Compute Canada requires all users to proceed with the updates described below.


<!--T:38-->
[[File:Flowchart SSHD changes - Summer 2019 - v.f.jpg|thumb|center|SSH security improvements flowchart]]
[[File:Flowchart SSHD changes - Summer 2019 - v.f.jpg|thumb|center|SSH security improvements flowchart]]


cc_staff
13

edits

Navigation menu