cc_staff
13
edits
No edit summary |
(Marked this version for translation) |
||
Line 2: | Line 2: | ||
<translate> | <translate> | ||
<!--T:37--> | |||
SSH protects the information exchanged between a user and a remote server by encrypting the connection and verifying the identity of both parties through a server key (also called "host signature") and, for the user, either a password or a personal key. To address the risk of the connection being compromised by a third party on its clusters, Compute Canada requires all users to proceed with the updates described below. | SSH protects the information exchanged between a user and a remote server by encrypting the connection and verifying the identity of both parties through a server key (also called "host signature") and, for the user, either a password or a personal key. To address the risk of the connection being compromised by a third party on its clusters, Compute Canada requires all users to proceed with the updates described below. | ||
<!--T:38--> | |||
[[File:Flowchart SSHD changes - Summer 2019 - v.f.jpg|thumb|center|SSH security improvements flowchart]] | [[File:Flowchart SSHD changes - Summer 2019 - v.f.jpg|thumb|center|SSH security improvements flowchart]] | ||