this post was submitted on 12 Jun 2023
3 points (100.0% liked)

Self Hosted - Self-hosting your services.

11419 readers
1 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules

Important

Beginning of January 1st 2024 this rule WILL be enforced. Posts that are not tagged will be warned and if not fixed within 24h then removed!

Cross-posting

If you see a rule-breaker please DM the mods!

founded 3 years ago
MODERATORS
 

Hey folks, I have multiple VMs and personal machines across multiple cloud providers and I'm beginning to get frustrated with ssh key management. Each personal machine has it's own key so if I lose it or it's compromised I can just remove the key from the vms but it's starting to get tedious making sure everything is up to date and any new keys are added.

Are there any solutions out there that would help?

you are viewing a single comment's thread
view the rest of the comments
[โ€“] burnus@lemmyrs.org 0 points 1 year ago (1 children)

Have you considered creating Certificates for your keys? The basic idea is that you have a master CA key pair which you use to sign all your actual keys with (ideally both use and host keys). Than you only add a CA entry for the CA to the authorized_keys and known_hosts on every machine and now, whenever you add a user or host, you only need to sign its keys and everything else trusts it automatically. Add a CRL for key revocation to solve the lost-keys-problem and not you should have everything you wanted. All of this comes out of the box with OpenSSH, no extra tools required.

[โ€“] mbell@lemmy.remotelab.uk 1 points 1 year ago

This sounds interesting will read up on it.