Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use rsync to sync ssh keys #13

Open
dalcde opened this issue Oct 8, 2020 · 0 comments
Open

Use rsync to sync ssh keys #13

dalcde opened this issue Oct 8, 2020 · 0 comments
Labels
triage This issue needs triaging

Comments

@dalcde
Copy link

dalcde commented Oct 8, 2020

Problem to be solved

This is a proposed solution to #4.

Solution details

We set up a directory on pip that contains all sysadmin keys

/etc/adm-keys
 |- dec41-authorized_keys
 |- eb677-authorized_keys
 |- ...

In each sysadmin's home directory on pip, set ~/.ssh/authorized_keys to be a symlink to /etc/adm-keys/$USER-authorized_keys. Then any key added to pip will automatically appear in this directory

We then set up an rsync daemon to publicize the contents in this directory. Other servers download the list, create and delete user accounts as appropriate, and then symlink the authorized_keys.

Pros and cons

Pros

  • This does not depend on being on a secure network, since the public keys are
    broadcast via https.

  • There is no single point of failure. There is, however, still a single point of trust.

  • No external service (e.g. GitHub) has to be trusted

  • Very simple workflow for users - simply add the key to pip.

Unsolved questions

How to protect the authorized_keys directory from MITM attacks?

@dalcde dalcde added the triage This issue needs triaging label Oct 8, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
triage This issue needs triaging
Projects
None yet
Development

No branches or pull requests

1 participant