Email or username:

Password:

Forgot your password?
nixCraft 🐧

Poll: The most common way I've seen for SSH access to #Linux or #Unix servers (please boost for reach. TIA):

Anonymous poll

Poll

Username and password
605
34.1%
SSH authorized_keys (pub key)
1,336
75.3%
SSH Certificates
81
4.6%
Other (I will reply below)
21
1.2%
1,774 people voted.
Voting ended 5 Jun 2023 at 5:27.
37 comments
DELETED

@nixCraft If you aren't using certs for publicly accessible ssh servers... you are doing it wrong.

kechpaja

@alex_02 @nixCraft What is the benefit of an SSH certificate over authorized_keys?

Ramin Honary

@alex_02 @nixCraft I't not gonna lie, it never occurred to me to use certificates. I mean, don't you need to create your own CA and install it onto all of your machines, unless you want to go through the trouble of getting it signed by Lets Encrypt?

And it is just so easy to do ssh-copy-id, especially if you only need to network like 3 or 4 machines together.

DELETED

@ramin_hal9001 @nixCraft Security vs Convenience will always bite us in the ass. ;-;

Found a good article on ssh certificates:

goteleport.com/blog/how-to-con

Thomas H Jones II

@astraleureka @ramin_hal9001 @alex_02 @nixCraft

No, but you *can* configure newer SSH daemons to use x509s for authentication.

apgarcia

@ferricoxide @astraleureka @ramin_hal9001 @alex_02 @nixCraft newer ssh daemons? the globus toolkit was using x509 certs for authentication in the early 2000s...

Thomas H Jones II

@apgarcia @astraleureka @ramin_hal9001 @alex_02 @nixCraft

"Newer" is relative. Not every OS vendor (*cough* Red Hat *cough*) is quick to update. Still not sure if OpenSSH (particularly the versions used by conservative distros like Red Hat and its clones) directly supports x509 or if they just support the more stripped-down SSH certificates.

Thomas H Jones II

@ramin_hal9001 @alex_02 @nixCraft

Problem with copying keys about - especially in a large scale environment – is the "how do you make sure ≤EX_EMPLOYEE>'s keys are all removed everywhere".

Fuzzysteve

@ferricoxide @ramin_hal9001 @alex_02 @nixCraft By pushing the keys via your centralized authentication system? So they don't exist on the box themselves. and that the centralized account is also removed?
Of course, then you also need something which is going to be checking every server to make sure no rogue accounts have been created.

Thomas H Jones II

@fuzzysteve @ramin_hal9001 @alex_02 @nixCraft

Yes. In general, offloading to a third-party key-auth mechanism is going to avoid the "stale keys" problem.

Similarly, combination of configuring SSH to ignore locally-staged keys, configuring sudo and/or SELinux to prevent random users from creating local accounts and having good monitoring/alerting in place goes a long way towards solving the "rogue accounts" problem.

Niels K.

@nixCraft I’ve seen mostly user/password but I strongly encourage to use ssh certificates when having to handle more than a couple of machines. They are awesome.

Alan Hicks

@nixCraft I'm surprised and disappointed there are still so many using username password instead of secure alternatives 😢

lynx

@AlanHicksLondon @nixCraft it's the initial method one has to use to 'ssh-copy-id' over one's public key. once that bootstrapping's done, it can be disabled.

sort of like using IE/Edge that one time to download a real web browser.

Canwr Ffug

@nixCraft This is just a data gathering attempt for phising later isn't it?

Patrice

@nixCraft been mostly using AD integration with sssd for user accounts, SSH Keys (authorized_keys) for functional accounts (Ansible). No local user/password accounts on any machine. Access to the machines is being managed by moving users in/out of AD groups

Mynacol

@nixCraft SSH keypair, saved in a TPM where possible. I recommend github.com/tpm2-software/tpm2- for setup instructions.

Pratham Patel :ferrisdance:

@nixCraft pubkey auth for prod and passwds for local VMs and other stuff that doesn’t need security

Kyle Anderson 💙

@nixCraft Off topic: Math is harder for Mastodon than authn

Fritz Adalis

@kandersonus
@nixCraft
That's because it's checkboxes and not radio buttons.

Thomas Jones

@nixCraft@mastodon.social

Depends on the environment.

In AD-integrated environments, it's a mix of GSSAPI tokens and password-based authentication.

In IPA-integrated environments, it's been a mix of GSSAPI tokens, SSH authorized_keys and passwords.

In "cattle" environments, it's been SSH authorized_keys (injected at deployment-time via cloud-init or subordinate processes).

A significant percentage of my customers are both RHEL-using and not-exactly-proactive in how they migrate to newer EL majors or (especially) retiring older EL majors. As such, migrating to SSH certificates is pretty much a non-starter since not every RHEL version supports their use (nor do they want instantiate the additional infrastructure to support it).

@nixCraft@mastodon.social

Depends on the environment.

In AD-integrated environments, it's a mix of GSSAPI tokens and password-based authentication.

In IPA-integrated environments, it's been a mix of GSSAPI tokens, SSH authorized_keys and passwords.

In "cattle" environments, it's been SSH authorized_keys (injected at deployment-time via cloud-init or subordinate processes).

A significant percentage of my customers are both RHEL-using and not-exactly-proactive in how they migrate to newer EL majors...

kravietz 🦇

@nixCraft

SSH in FIDO2 hardware keys does work pretty well already.

Fritz Adalis

@nixCraft
In environments that support it I use Kerberos (usually AD) with GSSAPI. Is cert auth superior?

Christopher Wood

@Nixcraft

Channeling the Enterprise Security Architect vibe...

Don't you know that somebody might rEplAcE filEs oR aDd a kEy?? Are you committed to security at all??

l4p1n 🇨🇭

@nixCraft public keys managed with an initialization Ansible role.

I've tried ssh certs, but it's more annoying to manage for my setup so far

⠚⠗⠙⠐⠕⠀⠜⠿⠕

@nixCraft I use pubkey(mainly) or password+totp(for emergency reason)

Go Up