SSH security improvements: Difference between revisions

Jump to navigation Jump to search
change from "summer" to "Sept-Oct"
No edit summary
(change from "summer" to "Sept-Oct")
Line 9: Line 9:
[[SSH]] is the software protocol that you use to connect to Compute Canada clusters.  It protects the security of your communication by verifying the server’s identity and yours against known identification data, and by encrypting the connection.  Because security risks evolve over time, Compute Canada will soon end support for certain SSH options which are no longer deemed secure.  You will have to make some changes on your part in order to continue using our clusters.  The changes are outlined in the flowchart to the right, and explained in greater detail below.
[[SSH]] is the software protocol that you use to connect to Compute Canada clusters.  It protects the security of your communication by verifying the server’s identity and yours against known identification data, and by encrypting the connection.  Because security risks evolve over time, Compute Canada will soon end support for certain SSH options which are no longer deemed secure.  You will have to make some changes on your part in order to continue using our clusters.  The changes are outlined in the flowchart to the right, and explained in greater detail below.


=SSH changes (Summer 2019)= <!--T:1-->
=SSH changes (September-October 2019)= <!--T:1-->


<!--T:40-->
<!--T:40-->
Line 19: Line 19:


<!--T:4-->
<!--T:4-->
During the summer of 2019, we will make the following SSH security improvements on Compute Canada clusters:
In September and October 2019, we will make the following SSH security improvements on Compute Canada clusters:


<!--T:5-->
<!--T:5-->
Bureaucrats, cc_docs_admin, cc_staff
2,915

edits

Navigation menu