38,760
edits
No edit summary |
(Updating to match new version of source page) |
||
Line 1: | Line 1: | ||
<languages /> | <languages /> | ||
SSH protects the information exchanged between a user and a remote server by encrypting the connection and verifying the identity of both parties through a server key (also called "host signature") and, for the user, either a password or a personal key. To address the risk of the connection being compromised by a third party on its clusters, Compute Canada requires all users to proceed with the updates described below. | |||
[[File:Flowchart SSHD changes - Summer 2019 - v.f.jpg|thumb|center|SSH security improvements flowchart]] | |||