Conversation

OpenSSH 5.4 was released on 2010-03-08, and that is when the project added support for certificate authentication of users and hosts using an OpenSSH certificate format (not X.509)

Why am I telling you this? Because I wanted to find out since when exactly I have been putting off actually experimenting with SSH certificates, and I can now with certainty say that as far as this topic is concerned I've been an idiot over the last 16 years!

3
1
0

@jpmens tell us more? In which way is it better?

2
0
0

@cynicalsecurity oof, you're asking a beginner ...

No more TOFU (servers are implicitly trusted), principal names in cert define as *which* users I can login. Validity times (also relative) can be specified (cynicalsecurity can login for 2 days), remote commands can be enforced, and lots more probably.

1
0
0

@cynicalsecurity most importantly: no more authorized_keys files, no known_hosts updating on client (ie. servers can change host key without *** WARNING)

0
0
0
@JP Mens Same here. I was immediately interested when I first read about it, but haven't actually experimented with it either....

Putting it back on the to do list.
1
0
0
@cynicalsecurity @jpmens My former company still uses SSH certs. From top of my head:

- auditable root access without su/sudo
- expiration (no left over access)
- user restrictions bound to certs (instead of server config)

+ human user priv keys were HW bound

https://github.com/silentsignal/zsca
1
1
0

sshd-session[4063]: error: Certificate invalid: expired

Really good!

sshd-session[4077]: error: Certificate invalid: name is not a listed principal

2
0
0

@jpmens great but.... I kinda feel like why invent yet another new cert format when you could've just used attribute extensions in X.509?

1
0
0

@hyc simplicity, ease of use, easy to handle and copy/paste?

here's a certificate

0
0
0

@buherator OK, this is *nice*… another one who has not been reading the manual since 2010 joins the club … @jpmens

1
0
1

@buherator exactly that post is what got me interested at the time (before I put it all aside for many years :-( )

@cynicalsecurity

0
0
1

and if need be (I'm just verifying it actually works) we can sign SSH certificates with

0
0
0

@buherator @cynicalsecurity @jpmens I built a solution based on that feature with a YubiHSM to generate short term certificates for security agents to log into machines, do their job, and get out, without worrying about permanent accounts or certificate management. Worked great 🙂

0
1
1