On Friday, 15 July 2022 14:44:10 CEST Neil Bothwick wrote:
> On Fri, 15 Jul 2022 09:53:44 +0200, J. Roeleveld wrote:
> > > There's no reason you cannot change SSH keys as regularly, and good
> > > reasons why you should. It's just that people don't bother to do it.
> > 
> > I agree, but that is a tedious process.
> > 
> > I have multiple machines I use as desktop depending on where I am. And
> > either I need to securely share the private keys between them or set up
> > different keys per desktop.
> > I assume the same is true for most people.
> 
> I don't share keys, each desktop/laptop has its own keys.

I agree this is more secure as you can remove potentially leaked keys 
individually. But with more devices, the amount of keys and places where these 
need to be removed increases.

> > Never mind that access to the servers needs to be possible for others
> > as well.
> > 
> > Either way, to do this automatically, all the desktop machines need to
> > be powered and running while changing the keys.
> 
> Not if they use their own keys. It should be simple to script generating
> a new key, then SSHing to a list of machines and replacing the old key
> with the new one in authorized_keys.

This script will need to be run by the individual user. I prefer to control 
this centrally.

> > Changing passwords for servers and storing them in a password vault is
> > easier to automate.
> 
> Indeed it is, and now you've found a way to do what you want with
> passwords, all is well.
> 
> However, I will look at scripting regular replacements for SSH keys, for
> my own peace of mind.

Most security improvements start with "simple" questions like these :)

Good luck with your scripts :)

--
Joost



Reply via email to