From owner-freebsd-questions@freebsd.org Thu Nov 21 23:09:59 2019 Return-Path: Delivered-To: freebsd-questions@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id F260E1CD7CF for ; Thu, 21 Nov 2019 23:09:59 +0000 (UTC) (envelope-from walterp@gmail.com) Received: from mail-io1-xd2a.google.com (mail-io1-xd2a.google.com [IPv6:2607:f8b0:4864:20::d2a]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 47JwJ65Nymz44Cp for ; Thu, 21 Nov 2019 23:09:58 +0000 (UTC) (envelope-from walterp@gmail.com) Received: by mail-io1-xd2a.google.com with SMTP id k1so5546080ioj.6 for ; Thu, 21 Nov 2019 15:09:58 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=Syha8/3NMcj9zM6PsxrhKvFXtVCJW6xT0F4sCuBFUjI=; b=UIbHVLF4c5MfRoveU+4TmMwk2kI4HBCNbgtKcAMpFahdKyF0G7LnG3WeYc3VYnYd1a /Lpv8Y9r9uEu/wKs5vZ9OhF69qUq1CHbSIAppAjqYUJFDogRb0kJVBGAl3z/2O2rLCe7 umxmlruVXoSheRl197m2v0kGtlvsp86Sagvf07DeG5Za8zGS81C8nPxmN79oDOxo6S3+ YO5bqakzie3JxsDSkCi0zzmektmagEVgNCSoLY2QDW1UWFgTa/a5ufNY8Xh+LmQeyk7W XqPHXNvYLR7OUh872DQxsokG6FEURI8RObm0tucDxmsboASjQCK6MQ9se3/eAMgwCkOk XmfA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=Syha8/3NMcj9zM6PsxrhKvFXtVCJW6xT0F4sCuBFUjI=; b=hFAFVgErPBJSl+IBASJ2qq2VoPisdtT/KgcQWOWc1EafMUvjhPMTozP/Ezun0TFVpy vko7Epy4Z6Y1J2UPd2ZmRrht7vxX+RY4HYoMk+aPyoN9Lp33R2+i/sjn4zY5q0OWxzN/ 8B5WLe7amv/wE1xN2nLKSbiWwTJSRRccOqSqc0tJg5TJ4J7jQE3L+9kpea/TBQwO07NO OuvGypWr5t6xcKD0qrXiF2yF6i1T572u+O5vvG3CqEinLroakTMCWzvpN7n5DcJYKMeE +t9RljihinTNUFyVKnp7g6osM86YNY0dA1Yr4ob3DiuHx2OxbEraTUuzlmLha3z2bFoW 1Yxg== X-Gm-Message-State: APjAAAVhVJ+KZpu2tgq6UHbc2DE+EfycGooW/LOx5SJuNL2Fy3vOxqEN jLjlxaV2Fkh/i+BuFRwiu3pdTOlh+ZGNBryaFIoi5ijk X-Google-Smtp-Source: APXvYqwmbjNAmSDokr2kEJM15wx+sjjT426MVe8Sa4S7u6tqgouLoGxZZSLktnCXV/DWC66FUy1Flk26BbgKimWrSSo= X-Received: by 2002:a6b:c809:: with SMTP id y9mr10631499iof.232.1574377797289; Thu, 21 Nov 2019 15:09:57 -0800 (PST) MIME-Version: 1.0 References: In-Reply-To: From: Walter Parker Date: Thu, 21 Nov 2019 15:09:48 -0800 Message-ID: Subject: SSH certificates To: freebsd-questions@freebsd.org Content-Type: text/plain; charset="UTF-8" X-Rspamd-Queue-Id: 47JwJ65Nymz44Cp X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=UIbHVLF4; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of walterp@gmail.com designates 2607:f8b0:4864:20::d2a as permitted sender) smtp.mailfrom=walterp@gmail.com X-Spamd-Result: default: False [-3.00 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36:c]; FREEMAIL_FROM(0.00)[gmail.com]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-questions@freebsd.org]; TO_DN_NONE(0.00)[]; IP_SCORE_FREEMAIL(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; IP_SCORE(0.00)[ip: (-6.27), ipnet: 2607:f8b0::/32(-2.29), asn: 15169(-1.97), country: US(-0.05)]; TO_MATCH_ENVRCPT_ALL(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; RCVD_IN_DNSWL_NONE(0.00)[a.2.d.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0] X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 21 Nov 2019 23:10:00 -0000 > > > Message: 3 > Date: Thu, 21 Nov 2019 10:41:40 +0100 > From: Julien Cigar > To: freebsd-questions@freebsd.org > Subject: SSH certificates > Message-ID: <20191121094140.GA1374@p52s> > Content-Type: text/plain; charset=utf-8 > > Hello, > > I'd like to setup an automated mechanism to replace SSH keys and > autorized_keys management with SSH certificates. Basically every member > of the team who arrives in the morning should authenticate to an > authority (some daemon in a very secure jail which implement a local CA > + key sign) and should receive back a signed certificate with a validity > period of x hours. > > After digging a little I found https://smallstep.com/certificates/ > and https://smallstep.com/cli/ (which aren't packaged BTW) but I'm > wondering if there were others similar tools ..? > > Thanks! > > Julien > > > -- > Julien Cigar > Belgian Biodiversity Platform (http://www.biodiversity.be) > PGP fingerprint: EEF9 F697 4B68 D275 7B11 6A25 B2BB 3710 A204 23C0 > No trees were killed in the creation of this message. > However, many electrons were terribly inconvenienced. > > Look at https://github.com/gravitational/teleport (The source build should work on FreeBSD) it is a full security gateway. It uses SSH certificates. Or BLESS from Netflix https://github.com/Netflix/bless It uses an AWS Lambda function to sign SSH public keys. Walter -- The greatest dangers to liberty lurk in insidious encroachment by men of zeal, well-meaning but without understanding. -- Justice Louis D. Brandeis