logoalt Hacker News

namibjyesterday at 7:10 PM2 repliesview on HN

And what about the CA?


Replies

_berndyesterday at 11:10 PM

You can also configure multiple CA for client auth, and on the client side multiple ca to verify host keys.

cyberaxyesterday at 7:46 PM

It's no different compared to regular SSH private keys. You need to protect it from compromise.

However, it provides you an additional layer of protection, because it does not need to be on the critical path for every SSH connection. My CA is a Nitrokey HSM, for example. I issue myself temporary certs that are valid only for 6 hours for ephemeral private keys.