Difference between revisions of "Introduction to Linux in HPC/SSH Connections"
Introduction to Linux in HPC/SSH Connections
Jump to navigation
Jump to search
m (Mukund-pondkule-6a11@uni-paderborn.de moved page Introduction to Linux in HPC/SSH Login to SSH Connections) |
|
(No difference)
|
Revision as of 13:28, 7 October 2020
Video
Quiz
1. Does it cause a security problem to share an SSH public key with your friends?
Which authentication for SSH login is more secure?
When generating the SSH public/private key pair, is it secure to use empty passphrase?
Info: | Verify the fingerprint of remote host, before the first login. User the SSH public key authentication for login. Never use an empty passphrase for the SSH keys. Use strong passphrase to generate the SSH keys. Keep your private SSH key as top secret. Create, configure and use different SSH keys for different remote hosts. If no X11 application is required, disable X11 forwarding. Otherwise, only enable the untrusted X11 forwarding. |
Warning: | lots of tips are given, no warning. |