<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: It&#8217;s 2023. You Should Be Using an Ed25519 SSH Key (And Other Current Best Practices)	</title>
	<atom:link href="https://www.brandonchecketts.com/archives/its-2023-you-should-be-using-an-ed25519-ssh-key-and-other-current-best-practices/feed" rel="self" type="application/rss+xml" />
	<link>https://www.brandonchecketts.com/archives/its-2023-you-should-be-using-an-ed25519-ssh-key-and-other-current-best-practices</link>
	<description>Web Programming, Linux System Administation, and Entrepreneurship in Athens Georgia</description>
	<lastBuildDate>Fri, 03 Jan 2025 22:52:30 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>
	<item>
		<title>
		By: Brandon		</title>
		<link>https://www.brandonchecketts.com/archives/its-2023-you-should-be-using-an-ed25519-ssh-key-and-other-current-best-practices/comment-page-1#comment-216198</link>

		<dc:creator><![CDATA[Brandon]]></dc:creator>
		<pubDate>Mon, 02 Dec 2024 02:25:31 +0000</pubDate>
		<guid isPermaLink="false">https://www.brandonchecketts.com/?p=1076#comment-216198</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.brandonchecketts.com/archives/its-2023-you-should-be-using-an-ed25519-ssh-key-and-other-current-best-practices/comment-page-1#comment-215167&quot;&gt;Anonymous&lt;/a&gt;.

I keep them straight with the filenames]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://www.brandonchecketts.com/archives/its-2023-you-should-be-using-an-ed25519-ssh-key-and-other-current-best-practices/comment-page-1#comment-215167">Anonymous</a>.</p>
<p>I keep them straight with the filenames</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Andrew Killen		</title>
		<link>https://www.brandonchecketts.com/archives/its-2023-you-should-be-using-an-ed25519-ssh-key-and-other-current-best-practices/comment-page-1#comment-215181</link>

		<dc:creator><![CDATA[Andrew Killen]]></dc:creator>
		<pubDate>Fri, 11 Oct 2024 08:06:12 +0000</pubDate>
		<guid isPermaLink="false">https://www.brandonchecketts.com/?p=1076#comment-215181</guid>

					<description><![CDATA[this was exactly the detail I was looking for. thanks.]]></description>
			<content:encoded><![CDATA[<p>this was exactly the detail I was looking for. thanks.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Anonymous		</title>
		<link>https://www.brandonchecketts.com/archives/its-2023-you-should-be-using-an-ed25519-ssh-key-and-other-current-best-practices/comment-page-1#comment-215167</link>

		<dc:creator><![CDATA[Anonymous]]></dc:creator>
		<pubDate>Thu, 10 Oct 2024 17:50:03 +0000</pubDate>
		<guid isPermaLink="false">https://www.brandonchecketts.com/?p=1076#comment-215167</guid>

					<description><![CDATA[I played with the choices from your advice and I noticed that only the public key file has the comment. How do you manage to keep private/public keys archived, if only one has the comment?]]></description>
			<content:encoded><![CDATA[<p>I played with the choices from your advice and I noticed that only the public key file has the comment. How do you manage to keep private/public keys archived, if only one has the comment?</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Silas S. Brown		</title>
		<link>https://www.brandonchecketts.com/archives/its-2023-you-should-be-using-an-ed25519-ssh-key-and-other-current-best-practices/comment-page-1#comment-214979</link>

		<dc:creator><![CDATA[Silas S. Brown]]></dc:creator>
		<pubDate>Mon, 30 Sep 2024 17:01:45 +0000</pubDate>
		<guid isPermaLink="false">https://www.brandonchecketts.com/?p=1076#comment-214979</guid>

					<description><![CDATA[I also make sure to use a *different* SSH key for each client machine I use (one for the laptop, a different one for the desktop, a different one for my account on a server, etc) and add multiple entries to my authorized_keys files.

Doing this not only gives me finer-grain control over which machines have access to which others (e.g. don&#039;t have to give that server account the permission to SSH into *everything* else), but also lets me recover from a compromise more quickly: if one machine is compromised, I need revoke only *that* machine&#039;s key without having to change all the others (so long as said others are client-only machines: it&#039;s different if they are also servers which might have been accessed maliciously after the compromise).

I adopted this stance after suffering from an incident at a (now defunct) institutional server on which I had an account.  I trusted that institution&#039;s sysadmins enough to place a copy of my one-and-only SSH private key on their server, but then they employed a new sysadmin who managed to mess up their CIFS mount in a way that ignored all access permissions and made everyone&#039;s entire home directories (including my key) available from a public website for which access logs were not kept.  I then had to assume it was compromised and frantically chase down every machine I&#039;d ever used it on to ensure it was revoked.  So after that I adopted a &quot;one key per machine&quot; policy and set authorized_keys on an as-needed basis, instead of assuming it was a good idea to be able to get into anywhere from anywhere.]]></description>
			<content:encoded><![CDATA[<p>I also make sure to use a *different* SSH key for each client machine I use (one for the laptop, a different one for the desktop, a different one for my account on a server, etc) and add multiple entries to my authorized_keys files.</p>
<p>Doing this not only gives me finer-grain control over which machines have access to which others (e.g. don&#8217;t have to give that server account the permission to SSH into *everything* else), but also lets me recover from a compromise more quickly: if one machine is compromised, I need revoke only *that* machine&#8217;s key without having to change all the others (so long as said others are client-only machines: it&#8217;s different if they are also servers which might have been accessed maliciously after the compromise).</p>
<p>I adopted this stance after suffering from an incident at a (now defunct) institutional server on which I had an account.  I trusted that institution&#8217;s sysadmins enough to place a copy of my one-and-only SSH private key on their server, but then they employed a new sysadmin who managed to mess up their CIFS mount in a way that ignored all access permissions and made everyone&#8217;s entire home directories (including my key) available from a public website for which access logs were not kept.  I then had to assume it was compromised and frantically chase down every machine I&#8217;d ever used it on to ensure it was revoked.  So after that I adopted a &#8220;one key per machine&#8221; policy and set authorized_keys on an as-needed basis, instead of assuming it was a good idea to be able to get into anywhere from anywhere.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: DRCAT		</title>
		<link>https://www.brandonchecketts.com/archives/its-2023-you-should-be-using-an-ed25519-ssh-key-and-other-current-best-practices/comment-page-1#comment-214832</link>

		<dc:creator><![CDATA[DRCAT]]></dc:creator>
		<pubDate>Thu, 26 Sep 2024 20:41:02 +0000</pubDate>
		<guid isPermaLink="false">https://www.brandonchecketts.com/?p=1076#comment-214832</guid>

					<description><![CDATA[@Brandon - yes it is 2024 and yes you should. Thank you for the good advice.]]></description>
			<content:encoded><![CDATA[<p>@Brandon &#8211; yes it is 2024 and yes you should. Thank you for the good advice.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Brandon		</title>
		<link>https://www.brandonchecketts.com/archives/its-2023-you-should-be-using-an-ed25519-ssh-key-and-other-current-best-practices/comment-page-1#comment-212933</link>

		<dc:creator><![CDATA[Brandon]]></dc:creator>
		<pubDate>Fri, 02 Aug 2024 16:05:42 +0000</pubDate>
		<guid isPermaLink="false">https://www.brandonchecketts.com/?p=1076#comment-212933</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.brandonchecketts.com/archives/its-2023-you-should-be-using-an-ed25519-ssh-key-and-other-current-best-practices/comment-page-1#comment-211849&quot;&gt;Carl&lt;/a&gt;.

@Carl, it&#039;s 2024 and I think most of this is still applicable!  Maybe I should re-post with a new date]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://www.brandonchecketts.com/archives/its-2023-you-should-be-using-an-ed25519-ssh-key-and-other-current-best-practices/comment-page-1#comment-211849">Carl</a>.</p>
<p>@Carl, it&#8217;s 2024 and I think most of this is still applicable!  Maybe I should re-post with a new date</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Carl		</title>
		<link>https://www.brandonchecketts.com/archives/its-2023-you-should-be-using-an-ed25519-ssh-key-and-other-current-best-practices/comment-page-1#comment-211849</link>

		<dc:creator><![CDATA[Carl]]></dc:creator>
		<pubDate>Mon, 01 Jul 2024 17:18:13 +0000</pubDate>
		<guid isPermaLink="false">https://www.brandonchecketts.com/?p=1076#comment-211849</guid>

					<description><![CDATA[Thank you for the post.  
&#062; Any other tips for creating an SSH key and looking like a professional in 20223?
It won&#039;t be 20223 for a very long time. ;)  Thought you&#039;d want to know.]]></description>
			<content:encoded><![CDATA[<p>Thank you for the post.<br />
&gt; Any other tips for creating an SSH key and looking like a professional in 20223?<br />
It won&#8217;t be 20223 for a very long time. 😉  Thought you&#8217;d want to know.</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
