top | item 40063512

(no title)

cynix | 1 year ago

> you do not need to pass around authorized_keys to all hosts.

But now I need to trust these random host keys, instead of a key signed by my SSH CA...

discuss

order

zaphar|1 year ago

How do you "untrust" a single person's key under this scheme? You would have to visit all of the machines and remove them from the authorized keys file.

nixgeek|1 year ago

Not really, with an SSH CA you’re trusting the CA and not installing individual keys into authorized_keys files.

Anything signed by the SSH CA will work for logins.

To deal with the “untrust” issue it’s normal for operations with an SSH CA to rely on (very) short-lived certificates, meaning often issued and valid for < 24 hours (it’s configurable, I’ve seen this be as short as 30 minutes).

Smallstep wrote a summary here which is pretty good —

https://smallstep.com/blog/use-ssh-certificates/