38,760
edits
(Updating to match new version of source page) |
(Updating to match new version of source page) |
||
Line 31: | Line 31: | ||
* On Windows computers, make sure to regularly run a virus scanner and malware scanner; | * On Windows computers, make sure to regularly run a virus scanner and malware scanner; | ||
* Regardless of what Operating System you have, keep up to date with security updates for all software; | * Regardless of what Operating System you have, keep up to date with security updates for all software; | ||
* Do not leave your computer or laptop unattended. | * Do not leave your computer or laptop unattended. | ||
* On clients that use OpenSSH (Linux, Mac and as an option under Windows), you can configure SSH behavior using ~/.ssh/config. In particular, you can define system and even username-specific behavior, such as selecting specific keys to use, or automatically selecting advanced features such as X/port forwarding, and even ProxyJump. | |||
== For the system you log in to == | |||
One important advantage of using ssh keys is that the remote system only needs your public key. This value is not sensitive, so there is no risk of disclosure. If someone gets your public key, all they can do is give you additional access. | |||
* Avoid placing any private keys on remote machines, even encrypted ones. An unencrypted key is equivalent to a password, and may be stolen or exposed inadvertantly. An encrypted key is, by itself, not sensitive - except if you ever use it on that machine (at which point you are effectively trusting the machine.) | |||
* If you use ssh-agent, avoid forwarding it to remote machines. ComputeCanada clusters use hostbased trust within the cluster, so you do not need to re-authenticate if you connect to an internal node. |