Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Ephemeral certificates could replace password vaults (ssh.com)
10 points by simpple on June 15, 2019 | hide | past | favorite | 10 comments



This sounds completely insane.

So we delegate security to an alleged "trusted" third party that both the sysadmin and user have to trust.

Sounds like a massive increase in attack surface with questionable advantages.


It's also a massive centralization of power. There have been numerous incidents in recent years, where someone became the subject of a viral Internet controversy, and their gmail account was mysteriously deleted with no explanation, only to be restored a day later, mysteriously with no explanation. Why wouldn't similar abuses occur with such an authentication system?


you also run the CA.

anyway nothing new here. these techniques have been deployed for ages. the simpler certificates supported natively by openssh are much better since they avoid x.509 complexity, unnecessary for such short lifetimes and extremely limited application profile.

you do hint at a good point though, the security posture of the CA and method of authenticating to the CA isn’t discussed. user/pass to the CA in many naive environments will reduce the ssh auth to that level.

overall, a worthless article.


It’s possible to generate private keys on a HSM like YubiKey to be a CA and perform signing of certs via a hardware function. Operations can make the difference; but given an offline SBC and 2+ YKs a robust, affordable, and friendly solution could be devised. A similar reference implementation would be IBM Hyperledger Fabric’s security w/ CA (the doc is good and team responsive).


Smart cards with a TLS client cert auth?

Estonia does it, works great for logging in if the service supports it.


Isn't that basically how Kerberos works? Did with ephemeral certs?


Kerberos started out with symmetric keys. It's been a long time since I followed things, so that might have changed. Public keys would greatly simplify key distribution, of course.


more or less, yes. of course the devil’s in the details.


We do something similar with HashiCorp Vault. People authenticate to Vault (backed by Active Directory) and if they have the proper permissions (based on AD group) they can ask Vault to issue an SSH certificate for a particular account on a specific server. This is working well; we no longer have accounts for everyone who needs access on every box and giving or removing access is as easy as changing group membership in AD.

https://www.vaultproject.io/docs/secrets/ssh/signed-ssh-cert...


[flagged]


Is there an open source solution here? Another name in this space is Gravitational but I'm not sure if they implement ephemeral.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: