would it be possible to extend TrustedUserCAKeys so that certain keys could not be used to authenticate a particular user?

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



Wondering if it would make sense to have more granular control of
trustedUserCAkeys?  I have 1 key used to sign root certs, the key is
shortlived, and is rotated daily.  And I have a 2nd key to sign non-
privileged user certs.  The non-privileged certs have a longer validity
period, and the signing keys are not rotated as frequently.  It would
be nice to ensure this second signing key's associated pubkey in
trustedusercakeys is never consulted when a root certificate is
presented, perhaps via some form of blacklisting within the
trustedusercakeys file?  This would provide some assurance that the
theft of the second key could not be used to sign root certificates and
be accepted for the systems I manage.

Mark Christian
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev



[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux