You are not logged in.
A conceptual question, I've always assumed SSH keys to be identity markers (hence I, ngoonee, would have a SSH private key and public key which verifies that I'm who I say I am on the Internet).
As I add more machines to my network, though, I've been using the same SSH keys on all of them. Even some smartphone apps I'm using now use SSH keys to authenticate. Which got me thinking, are SSH keys supposed to be machine-specific, user-specific, or specific to a single combo of both (hence users A and B on machines 1 and 2 would have 4 combinations, ie. 4 keys).
I know there's probably not a 'right' answer to this (is there), but its been bugging me. Anyone?
Allan-Volunteer on the (topic being discussed) mailn lists. You never get the people who matters attention on the forums.
jasonwryan-Installing Arch is a measure of your literacy. Maintaining Arch is a measure of your diligence. Contributing to Arch is a measure of your competence.
Griemak-Bleeding edge, not bleeding flat. Edge denotes falls will occur from time to time. Bring your own parachute.
Offline
I use multiple keys; it is easy enough to manage them using keyring, and it means that I am able to compartmentalize them according to use case: work (which I obviously have a professional interest as well as personal in protecting) home (one for each box), and then keys for specific tasks (eg., automated backups, acess to particular services like github, mercurial etc).
This means that if one key is compromised, the others are unaffected and I can revoke the compromised key and, after cleaning up the mess as best I can, generate another and move on.
The only system I employ is to give each key a meaningful name (having multiple keys named id_{d,r}sa doesn't scale at all) and a policy of only adding the minimum necessary keys to each box's keyring; again, entering all the passphrases with any frequency helps manage this tendency.
I am also very careful about the key on my android as I see this as the most obvious risk: losing your phone is a pain; losing your phone and potentially relinquishing the key on it would be catastrophically asinine...
Offline
I use multiple keys; it is easy enough to manage them using keyring...
Are you referring to keychain, the wrapper around ssh-agent and gpg-agent?
Offline
jasonwryan wrote:I use multiple keys; it is easy enough to manage them using keyring...
Are you referring to keychain, the wrapper around ssh-agent and gpg-agent?
Yes: end of the day brain fade...
Offline
Each user account on each machine has a ssh private key; whenever you want to ssh from that account to any other account (usually on a different machine), you put that user's public key in the destination account's authorized_keys file.
Last edited by /dev/zero (2014-02-25 08:08:49)
Offline
Looks like everyone uses different keys for every user/machine combination then. Always resisted this due to laziness to go back through sourceforge/github and the like to update my keys.... probably should get round to that soon.
Allan-Volunteer on the (topic being discussed) mailn lists. You never get the people who matters attention on the forums.
jasonwryan-Installing Arch is a measure of your literacy. Maintaining Arch is a measure of your diligence. Contributing to Arch is a measure of your competence.
Griemak-Bleeding edge, not bleeding flat. Edge denotes falls will occur from time to time. Bring your own parachute.
Offline
i have:
dsa & rsa keys for my private machines (all with totally encrypted storage);
one rsa key for accessing some machines at my job;
separate rsa key for importing & using on misc machines with unencrypted storage.
— love is the law, love under wheel, — said aleister crowley and typed in his terminal:
usermod -a -G wheel love
Offline
Looks like everyone uses different keys for every user/machine combination then. Always resisted this due to laziness to go back through sourceforge/github and the like to update my keys.... probably should get round to that soon.
In short, SSH keys are like GPG keys (actually, they are interchangeable so you can use GPG keys to authenticate to an SSH server). So, whether or not to have multiple SSH keys is not a security decision, but rather a policy one. Having a separate keypair for every account/machine is clearly an overkill. It does not add any security, only a chore when it's time to rekey.
For example, if you are at a university and use supercomputers, it makes sense to have 1 keypair for all of them, as well as your bitbucker/guthub account. OTOH, you can use a separate SSH keypair for root accounts on remote machines.
Arch Linux is more than just GNU/Linux -- it's an adventure
pkill -9 systemd
Offline