Good procedure?

Stef Bon stefbon at gmail.com
Tue Aug 21 22:48:22 AEST 2018


Op di 21 aug. 2018 om 14:43 schreef Alexander Wuerstlein <arw at cs.fau.de>:
>
> On 2018-08-21T06:21, Stef Bon <stefbon at gmail.com> wrote:

> > The user dos not do that, the localhost computer does this behind the scenes.
>
> Sounds like you are reinventing Kerberos.
>

Thats good! Kerberos is proof of concept.
But serieus, Uber does it like this (or simular< see:
https://medium.com/uber-security-privacy/introducing-the-uber-ssh-certificate-authority-4f840839c5cc)

Stef


More information about the openssh-unix-dev mailing list