Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Note

Since 2016 the ecAccess ssh module has required custom configuration on the ssh client end to enable known-insecure ciphers.
The replacement of this service will of course bring an up-to-date ssh implementation without this issue.

...

ecauth receives the TCP/IP connection from ecAccess and spawns a shell as the original user (sy0, in this example).

Note

It is important to know that the user authenticates to the ecAccess gateway only, not the destination server or workstation.

Understanding our SSH Proxy service

...

Info

The need for the SSH Proxy is mostly to support a network setup where the Centre is dual-homed on both RMDCN and Internet.
In the near future (BOND timeframe) the network will be redesigned and this need will go away, so all outgoing proxy services are to be retired.

...

This is a commonly used behaviour in ssh, and in fact new openssh clients and servers support the ProxyJump setting, to simplify configuration even further.

Note

It is important to know that our SSH Proxy is not authenticating users; it merely passes a TCP/IP stream.

Understanding Teleport

Teleport functions somewhat like a combination of ecAccess, and the SSH Proxy service, with additional features relating to role-based access control and single sign-on.

Clients outside of the Centre configure their clients to use Teleport as a proxy service for the destination host or server. That is, it's a bit like the reverse of systems inside ECMWF connecting to the Internet.

...

The notable difference between Teleport and our current services is that a specific command-line application, called tsh, is required to do the single sign-on function (once per day).

Info

With Teleport, users are authenticated both at the gateway and at the destination host.