TPM keys and user presence

Damien Miller djm at mindrot.org
Mon Jul 7 16:35:35 AEST 2025


On Sat, 5 Jul 2025, Martin Paljak wrote:

> > The ssh community has rejected many approaches to TPM based keys, so
> > the easiest way to use them is to use gpg-agent (for any 2.4 and up
> > version of gpg) as the ssh agent backend and then simply use the gpg
> > keytotpm command on keys you want to become only TPM accessible.
> 
> Respectfully disagree. You're free to run any ssh-agent, and it makes various hardware elements play along pretty decently (like secretive for mac).
> 
> For TPM2, see here:
> 
> https://github.com/Foxboron/ssh-tpm-agent

There are also ways to do it via PKCS#11, which lets you use the stock
OpenSSH ssh-agent.

> I'd only recommend going down the GPG path if you're already
> established and invested in the GPG infrastructure/setup, but never
> for beginners.

+1

-d


More information about the openssh-unix-dev mailing list