Difference between revisions of "Introduction to Linux in HPC/SSH Connections"
Introduction to Linux in HPC/SSH Connections
Jump to navigation
Jump to search
Line 6: | Line 6: | ||
+ | === Quiz === <!--T:5--> | ||
− | |||
+ | {{hidden begin | ||
+ | |title = 1. Does it cause a security problem to share an SSH public key with your friends? | ||
+ | }} | ||
+ | <quiz display=simple> | ||
+ | { | ||
+ | |type="()"} | ||
+ | - Yes | ||
+ | || | ||
+ | + No | ||
+ | || Explanation: SSH public key authentication uses the asymmetric encryption. Therefore, it's completely safe to share your SSH public key. But you must keep your SSH private key as top secret. | ||
+ | </quiz> | ||
+ | {{hidden end}} | ||
− | |||
+ | {{hidden begin | ||
+ | |title = Which authentication for SSH login is more secure? | ||
+ | }} | ||
+ | <quiz display=simple> | ||
+ | { | ||
+ | |type="()"} | ||
+ | - password authentication | ||
+ | || | ||
+ | + public key authentication | ||
+ | || Explanation: The password based authentication may be exposed to the brute-force password attack. Please use the SSH public key authentication. | ||
+ | </quiz> | ||
+ | {{hidden end}} | ||
+ | |||
+ | |||
+ | {{hidden begin | ||
+ | |title = When generating the SSH public/private key pair, is it secure to use empty passphrase? | ||
+ | }} | ||
+ | <quiz display=simple> | ||
+ | { | ||
+ | |type="()"} | ||
+ | - Yes | ||
+ | || | ||
+ | + No | ||
+ | || Explanation: Please never ever use an empty passphrase for the SSH key pair. Use strong passphrase to generate the SSH key pair. | ||
+ | </quiz> | ||
+ | {{hidden end}} | ||
+ | |||
+ | |||
+ | {{Warning|mode=info|text= | ||
+ | '''Verify the fingerprint of remote host, before the first login.''' | ||
+ | '''User the SSH public key authentication for login.''' | ||
+ | '''Never use an empty passphrase for the SSH keys.''' | ||
+ | '''Use strong passphrase to generate the SSH keys.''' | ||
+ | '''Keep your private SSH key as top secret.''' | ||
+ | '''Create, configure and use different SSH keys for different remote hosts.''' | ||
+ | '''If no X11 application is required, disable X11 forwarding. Otherwise, only enable the untrusted X11 forwarding.''' | ||
+ | }} | ||
+ | |||
+ | {{Warning|mode=warn|text= '''lots of tips are given, no warning.'''}} | ||
+ | {{Note|'''Exercises in Terminal: no exercises in this section'''}} | ||
<div style='text-align: left;float:left;width:33%;'>{{Clickable button|[https://hpc-wiki.info/hpc/Introduction_to_Linux_in_HPC/Linux_in_HPC Previous Page]|color=white}}</div> | <div style='text-align: left;float:left;width:33%;'>{{Clickable button|[https://hpc-wiki.info/hpc/Introduction_to_Linux_in_HPC/Linux_in_HPC Previous Page]|color=white}}</div> | ||
<div style='text-align: center;float:left;width:33%;'>{{Clickable button|[https://hpc-wiki.info/hpc/Introduction_to_Linux_in_HPC Main Menu Page]|color=white}}</div> | <div style='text-align: center;float:left;width:33%;'>{{Clickable button|[https://hpc-wiki.info/hpc/Introduction_to_Linux_in_HPC Main Menu Page]|color=white}}</div> |
Revision as of 16:38, 6 October 2020
Video
Quiz
Info: | Verify the fingerprint of remote host, before the first login.
User the SSH public key authentication for login. Never use an empty passphrase for the SSH keys. Use strong passphrase to generate the SSH keys. Keep your private SSH key as top secret. Create, configure and use different SSH keys for different remote hosts.If no X11 application is required, disable X11 forwarding. Otherwise, only enable the untrusted X11 forwarding. |
Warning: | lots of tips are given, no warning. |