On 02/10/2017 10:50 PM, John Byrnes wrote:
You can keep your ssh keys on a PIN protected smartcard and only insert it when you need to log in somewhere. Your keys never leave the card. When the card is unplugged, an attacker has no access at all. I feel like this is better than a password. It also makes it easier to keep the keys synchronized between boxes.

I agree. Were I needing to manage access to zillions of machines, the effort to set up and maintain that would be worth it.

gpg-agent can allow access to GPG keys on a card with the
--enable-ssh-support option.

===
--enable-ssh-support
--enable-putty-support

     Enable the OpenSSH Agent protocol.

     In this mode of operation, the agent does not only implement the
     gpg-agent protocol, but also the agent protocol used by OpenSSH
     (through a separate socket). Consequently, it should be possible to
     use the gpg-agent as a drop-in replacement for the well known
     ssh-agent.
===

gpg-agent. Interesting. If SC4 HSM could slide in as the smartcard, that would be cool.

Thanks,

-kb



_______________________________________________
Discuss mailing list
[email protected]
http://lists.blu.org/mailman/listinfo/discuss

Reply via email to