logoalt Hacker News

dotwaffleyesterday at 6:18 AM3 repliesview on HN

That's the point, though. An SSH key gives authentication, not authorization. Generally a certificate is a key signed by some other mutually trusted authority, which SSH explicitly tried to avoid.


Replies

simonjgreenyesterday at 8:00 AM

SSH does support certificate based auth, and it’s a great upgrade to grant yourself if you are responsible for a multi human single user system. It grants revocation, short lifetime, and identity metadata for auditing, all with vanilla tooling that doesn’t impose things on the target system.

show 1 reply
dlenskiyesterday at 5:43 PM

Agreed, this makes sense in principle.

But what I found, empirically, is that a substantial number of observable SSH public keys are (re)used in way that allows a likely-unintended and unwanted determination of the owner's identities.

This consequence was likely not foreseen when SSH pubkey authentication was first developed 20-30 years ago. Certainly, the use and observability of a massive number of SSH keys on just a single servers (ssh [email protected]) wasn't foreseen.

_berndyesterday at 10:28 AM

You can also sign ssh host keys with an ssh ca.

See ssh_config and ssh-keygen man-pages...