SEANK.H.LIAO

no tofu ssh

eliminate trust on first use for ssh

ssh trust on first use

ssh into a new machine (or one that has recently changed keys) and we get the familiar message:

1The authenticity of host 'sshfp.seankhliao.com (34.xx.xx.xx)' can't be established.
2ECDSA key fingerprint is SHA256:BQYZU02snggz6PD5ZUfjigqb/ZxswcgnSzHkk8/PVD8.
3Are you sure you want to continue connecting (yes/no/[fingerprint])?

so what can you do about this?

todo: look into cert revokation, docs say it should be possible but the -z function doesn't seem to do anything? or you always need the cert to revoke?

other: netflis/bless and certonid are lambda based servers to host the CA component

SSHFP

SSH FingerPrint uses DNSSEC enabled DNS as a secure vector to determine trust. It assumes that a host compromise doesn't include a DNS compromise, so whatever is in the DNS records can be trusted as the proper keys.

server side setup

generate the SSHFP DNS records

1ssh-keygen -r host.example.com.

output

1sshfp IN SSHFP 1 1 70e809125961a456bbd8178cf8e9a0d4addc32fa
2sshfp IN SSHFP 1 2 e5b848dcd7ab7fea8e6f8db217ab02bdba93c5b270bb6ece1a707e40f98a842a
3sshfp IN SSHFP 2 1 5177759e837130e3f14276e27c2721984dc08039
4sshfp IN SSHFP 2 2 98377672b8ee14286e9f962a985923e66acbc8bb03113c4c7fad62ceb5c809b5
5sshfp IN SSHFP 3 1 ba4bb33c362ff955d13d71881f0ae19b15f558f7
6sshfp IN SSHFP 3 2 050619534dac9e0833e8f0f96547e38a0a9bfd9c6cc1c8274b31e493cfcf543f
7sshfp IN SSHFP 4 1 5f31fd8a762b2381e87a718ca8a77495967854d8
8sshfp IN SSHFP 4 2 b93e879569b28d1769f8962c479eb9f52b734b3f17ff06bad721b8c0a42221ff
DNS setup
client side setup

certificates

The basic idea is the same: you trust a certificate authority and by extension you trust everything it signs.

SSH certs/ca does not have a hierarchy, CA directly signs user/client.

server certificates

Servers present certificate, client trusts CA

DNS setup

point a A/AAAA record to host

Certicate Authority setup

On a trusted computer generate a CA SSH keypair, example using security key:

1ssh-keygen -t ecdsa-sk -f host-ca

output

 1Generating public/private ecdsa-sk key pair.
 2You may need to touch your authenticator to authorize key generation.
 3Enter PIN for authenticator:
 4Enter passphrase (empty for no passphrase):
 5Enter same passphrase again:
 6Your identification has been saved in host-ca
 7Your public key has been saved in host-ca.pub
 8The key fingerprint is:
 9SHA256:uQlL6dweX5yKwjgPBInCPiHV4tBataXq/v+j/EvW69Q arccy@eevee
10The key's randomart image is:
11+-[ECDSA-SK 256]--+
12| ..o. .          |
13|oo+..+           |
14|+Bo.o            |
15|= oo   . .       |
16| o. . + S        |
17| ... + + + o .   |
18|  . .o+ B o E    |
19| .  ooo+.= +     |
20|  ...+==*+=      |
21+----[SHA256]-----+

obtain a host's public key and sign it, note the use of the host's DNS name for -n

1ssh-keygen -h -I instance-1 -s host-ca -V +52w -z 1 -n sshfp.seankhliao.com ssh_host_ed25519_key.pub
server side setup

copy the generated cert back to host and add HostCertificate /etc/ssh/ssh_host_ed25519_key.pub to sshd config (/etc/ssh/sshd_config)

client side setup

trust the certificate authority in known_hosts:

1@cert-authority sshfp.seankhliao.com sk-ecdsa-sha2-nistp256@openssh.com AAAAInNr...`
revoking server certs

revoke an entire CA by changing @cert-authority to @revoke

client certificates

Clients present certificates, server trusts CA

no more pesky ssh-copy-id dance, setup a host once and login for any trusted user

Certicate Authority setup

On a trusted computer generate a CA SSH keypair, example using security key:

1ssh-keygen -t ecdsa-sk -f client-ca

output

 1Generating public/private ecdsa-sk key pair.
 2You may need to touch your authenticator to authorize key generation.
 3Enter PIN for authenticator:
 4Enter passphrase (empty for no passphrase):
 5Enter same passphrase again:
 6Your identification has been saved in client-ca
 7Your public key has been saved in client-ca.pub
 8The key fingerprint is:
 9SHA256:6TGaGBZryUtDzglSdtMh27j2RjqJpgmD0KYVal6h2Sc arccy@eevee
10The key's randomart image is:
11+-[ECDSA-SK 256]--+
12|  o +...         |
13| o . *.          |
14|. o.= .          |
15| ++B.*   .       |
16|o++E/.. S        |
17|=+.*oX + o       |
18|=.o * = .        |
19|.=   o           |
20|o                |
21+----[SHA256]-----+

obtain client public key and sign it with

1ssh-keygen -I seankhliao -s client-ca -z 2 -V +52w -n arccy id_client.pub
client side setup

copy the generated cert back to client and specify using it with CertificateFile ~/.ssh/id_client-cert.pub and the private ket file with IdentityFile ~/.ssh/id_client

server side setup

copy the CA pubkey over and trust it in sshd_config with TrustedUserCAKeys /etc/ssh/client-ca.pub

revoking client certs

remove entire CA from TrustedUserCAKeys