<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: SSH Key Best Practices for 2025 &#8211; Using ed25519, key rotation, and other best practices	</title>
	<atom:link href="https://www.brandonchecketts.com/archives/ssh-ed25519-key-best-practices-for-2025/feed" rel="self" type="application/rss+xml" />
	<link>https://www.brandonchecketts.com/archives/ssh-ed25519-key-best-practices-for-2025</link>
	<description>Web Programming, Linux System Administation, and Entrepreneurship in Athens Georgia</description>
	<lastBuildDate>Fri, 06 Mar 2026 12:53:42 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>
		By: Vilius Šumskas		</title>
		<link>https://www.brandonchecketts.com/archives/ssh-ed25519-key-best-practices-for-2025/comment-page-1#comment-221230</link>

		<dc:creator><![CDATA[Vilius Šumskas]]></dc:creator>
		<pubDate>Fri, 06 Mar 2026 12:53:42 +0000</pubDate>
		<guid isPermaLink="false">https://www.brandonchecketts.com/?p=1233#comment-221230</guid>

					<description><![CDATA[Great article! I think you could expand it a little bit in regards to key creation strategy, e.g. should individuals create only one key or should they be created per one individual per their device.

Regarding cloud providers, I don&#039;t know AWS that much, but at least on Google Cloud there is what they call &quot;OS Login&quot;. It basically manages SSH keys for you, rotates them, etc., and then automatically provides the keys to VMs during login. Special lean binary (which acts as an SSH plugin) lets you in. Of course, this assumes that you trust Google with your private keys. On other hand, they probably could log in into VMs running on _their_ infra without you anyway :)]]></description>
			<content:encoded><![CDATA[<p>Great article! I think you could expand it a little bit in regards to key creation strategy, e.g. should individuals create only one key or should they be created per one individual per their device.</p>
<p>Regarding cloud providers, I don&#8217;t know AWS that much, but at least on Google Cloud there is what they call &#8220;OS Login&#8221;. It basically manages SSH keys for you, rotates them, etc., and then automatically provides the keys to VMs during login. Special lean binary (which acts as an SSH plugin) lets you in. Of course, this assumes that you trust Google with your private keys. On other hand, they probably could log in into VMs running on _their_ infra without you anyway 🙂</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Andy Barr		</title>
		<link>https://www.brandonchecketts.com/archives/ssh-ed25519-key-best-practices-for-2025/comment-page-1#comment-220420</link>

		<dc:creator><![CDATA[Andy Barr]]></dc:creator>
		<pubDate>Fri, 05 Dec 2025 12:53:48 +0000</pubDate>
		<guid isPermaLink="false">https://www.brandonchecketts.com/?p=1233#comment-220420</guid>

					<description><![CDATA[What a brilliant article, really enjoyed reading this and the part about the comments and dates is a great idea!! Two years are just coming up for my keys, so will be rotating them very soon in the new year. Now I have to remember where I have pushed out the public key to!!

Just going to do a quick search to see if you have an article on securing the SSH Server setup as this would make my life complete!!]]></description>
			<content:encoded><![CDATA[<p>What a brilliant article, really enjoyed reading this and the part about the comments and dates is a great idea!! Two years are just coming up for my keys, so will be rotating them very soon in the new year. Now I have to remember where I have pushed out the public key to!!</p>
<p>Just going to do a quick search to see if you have an article on securing the SSH Server setup as this would make my life complete!!</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Brandon		</title>
		<link>https://www.brandonchecketts.com/archives/ssh-ed25519-key-best-practices-for-2025/comment-page-1#comment-220050</link>

		<dc:creator><![CDATA[Brandon]]></dc:creator>
		<pubDate>Thu, 23 Oct 2025 01:53:55 +0000</pubDate>
		<guid isPermaLink="false">https://www.brandonchecketts.com/?p=1233#comment-220050</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.brandonchecketts.com/archives/ssh-ed25519-key-best-practices-for-2025/comment-page-1#comment-218987&quot;&gt;James French&lt;/a&gt;.

Thanks for your explanation James. What you mentioned about signing host keys might make this worth me figuring it out]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://www.brandonchecketts.com/archives/ssh-ed25519-key-best-practices-for-2025/comment-page-1#comment-218987">James French</a>.</p>
<p>Thanks for your explanation James. What you mentioned about signing host keys might make this worth me figuring it out</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Brandon		</title>
		<link>https://www.brandonchecketts.com/archives/ssh-ed25519-key-best-practices-for-2025/comment-page-1#comment-220049</link>

		<dc:creator><![CDATA[Brandon]]></dc:creator>
		<pubDate>Thu, 23 Oct 2025 01:50:15 +0000</pubDate>
		<guid isPermaLink="false">https://www.brandonchecketts.com/?p=1233#comment-220049</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.brandonchecketts.com/archives/ssh-ed25519-key-best-practices-for-2025/comment-page-1#comment-219005&quot;&gt;Richard&lt;/a&gt;.

Thanks Richard, I&#039;ve made this more clear]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://www.brandonchecketts.com/archives/ssh-ed25519-key-best-practices-for-2025/comment-page-1#comment-219005">Richard</a>.</p>
<p>Thanks Richard, I&#8217;ve made this more clear</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Stuart Whitmore		</title>
		<link>https://www.brandonchecketts.com/archives/ssh-ed25519-key-best-practices-for-2025/comment-page-1#comment-219049</link>

		<dc:creator><![CDATA[Stuart Whitmore]]></dc:creator>
		<pubDate>Sat, 19 Jul 2025 22:36:43 +0000</pubDate>
		<guid isPermaLink="false">https://www.brandonchecketts.com/?p=1233#comment-219049</guid>

					<description><![CDATA[Very helpful. I&#039;m not tech-clueless and have decades of development experience, but for me SSH key management has always been... poorly managed, to put it nicely. Basically following beginner instructions hastily whenever needed without ever really taking the time to think through what I was doing, etc. I understood the public/private key part but didn&#039;t make the effort to optimize my key handling. Sloppy, I know. Anyway, this article brings me to a higher level where I can make more reasoned choices and actually manage what I&#039;m doing. Much appreciated.]]></description>
			<content:encoded><![CDATA[<p>Very helpful. I&#8217;m not tech-clueless and have decades of development experience, but for me SSH key management has always been&#8230; poorly managed, to put it nicely. Basically following beginner instructions hastily whenever needed without ever really taking the time to think through what I was doing, etc. I understood the public/private key part but didn&#8217;t make the effort to optimize my key handling. Sloppy, I know. Anyway, this article brings me to a higher level where I can make more reasoned choices and actually manage what I&#8217;m doing. Much appreciated.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Richard		</title>
		<link>https://www.brandonchecketts.com/archives/ssh-ed25519-key-best-practices-for-2025/comment-page-1#comment-219005</link>

		<dc:creator><![CDATA[Richard]]></dc:creator>
		<pubDate>Tue, 15 Jul 2025 16:43:35 +0000</pubDate>
		<guid isPermaLink="false">https://www.brandonchecketts.com/?p=1233#comment-219005</guid>

					<description><![CDATA[Thank you Brandon - excellent article.
A minor typo perhaps? I understood it, but this may be clearer.

&quot;rename it from newkey and to newkey.pub a more meaningful name&quot;

Could read:
rename the keypair: newkey and newkey.pub to a more meaningful name.  eg to app_xsftp2_cust1 and app_xsftp2_cust1.pub

or similar.

regards, Richard]]></description>
			<content:encoded><![CDATA[<p>Thank you Brandon &#8211; excellent article.<br />
A minor typo perhaps? I understood it, but this may be clearer.</p>
<p>&#8220;rename it from newkey and to newkey.pub a more meaningful name&#8221;</p>
<p>Could read:<br />
rename the keypair: newkey and newkey.pub to a more meaningful name.  eg to app_xsftp2_cust1 and app_xsftp2_cust1.pub</p>
<p>or similar.</p>
<p>regards, Richard</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: James French		</title>
		<link>https://www.brandonchecketts.com/archives/ssh-ed25519-key-best-practices-for-2025/comment-page-1#comment-218987</link>

		<dc:creator><![CDATA[James French]]></dc:creator>
		<pubDate>Mon, 14 Jul 2025 03:38:12 +0000</pubDate>
		<guid isPermaLink="false">https://www.brandonchecketts.com/?p=1233#comment-218987</guid>

					<description><![CDATA[SSH Certificates are very much worth the afternoon it takes to learn how to use them, even for a single user or small team. For user keys you deploy the CA public key to your servers (either globally or per-user). 

Sign your public keys with an expiry, and then they&#039;re trusted until they expire. No managing authorized_keys files any more. Key rotation is even easier, as you just generate a new key, sign it and discard the old one. Eliminates the risk of an old key being left behind somewhere.

I also sign my host keys (with a different cert) and my clients trust that cert. That solves two problems - it eliminates the &#039;trust on first use&#039; issue and secondly it allows you to rotate your host keys regularly as well. Since the clients are checking for a valid signature, not the exactly public key so it stops the host-key changed issue.

I&#039;ve just got an Ansible play that replaces and signs host keys which I run periodically. Has basically become a zero effort task.]]></description>
			<content:encoded><![CDATA[<p>SSH Certificates are very much worth the afternoon it takes to learn how to use them, even for a single user or small team. For user keys you deploy the CA public key to your servers (either globally or per-user). </p>
<p>Sign your public keys with an expiry, and then they&#8217;re trusted until they expire. No managing authorized_keys files any more. Key rotation is even easier, as you just generate a new key, sign it and discard the old one. Eliminates the risk of an old key being left behind somewhere.</p>
<p>I also sign my host keys (with a different cert) and my clients trust that cert. That solves two problems &#8211; it eliminates the &#8216;trust on first use&#8217; issue and secondly it allows you to rotate your host keys regularly as well. Since the clients are checking for a valid signature, not the exactly public key so it stops the host-key changed issue.</p>
<p>I&#8217;ve just got an Ansible play that replaces and signs host keys which I run periodically. Has basically become a zero effort task.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Brandon		</title>
		<link>https://www.brandonchecketts.com/archives/ssh-ed25519-key-best-practices-for-2025/comment-page-1#comment-217646</link>

		<dc:creator><![CDATA[Brandon]]></dc:creator>
		<pubDate>Thu, 06 Mar 2025 15:32:41 +0000</pubDate>
		<guid isPermaLink="false">https://www.brandonchecketts.com/?p=1233#comment-217646</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.brandonchecketts.com/archives/ssh-ed25519-key-best-practices-for-2025/comment-page-1#comment-216729&quot;&gt;Philip Ingram&lt;/a&gt;.

Philip, I haven&#039;t been converted to the ways of SSH Certificates yet. Keys have served me well thus far. Perhaps in a larger organization they would make sense, but I work mainly on my own and small technical teams]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://www.brandonchecketts.com/archives/ssh-ed25519-key-best-practices-for-2025/comment-page-1#comment-216729">Philip Ingram</a>.</p>
<p>Philip, I haven&#8217;t been converted to the ways of SSH Certificates yet. Keys have served me well thus far. Perhaps in a larger organization they would make sense, but I work mainly on my own and small technical teams</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Brandon		</title>
		<link>https://www.brandonchecketts.com/archives/ssh-ed25519-key-best-practices-for-2025/comment-page-1#comment-217644</link>

		<dc:creator><![CDATA[Brandon]]></dc:creator>
		<pubDate>Thu, 06 Mar 2025 15:29:12 +0000</pubDate>
		<guid isPermaLink="false">https://www.brandonchecketts.com/?p=1233#comment-217644</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.brandonchecketts.com/archives/ssh-ed25519-key-best-practices-for-2025/comment-page-1#comment-217636&quot;&gt;Charles Hedlin&lt;/a&gt;.

Thanks for the clarification Charles. I&#039;m not sure of the exact mechanics how that works, but knew something bad was possible]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://www.brandonchecketts.com/archives/ssh-ed25519-key-best-practices-for-2025/comment-page-1#comment-217636">Charles Hedlin</a>.</p>
<p>Thanks for the clarification Charles. I&#8217;m not sure of the exact mechanics how that works, but knew something bad was possible</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Charles Hedlin		</title>
		<link>https://www.brandonchecketts.com/archives/ssh-ed25519-key-best-practices-for-2025/comment-page-1#comment-217636</link>

		<dc:creator><![CDATA[Charles Hedlin]]></dc:creator>
		<pubDate>Wed, 05 Mar 2025 16:26:58 +0000</pubDate>
		<guid isPermaLink="false">https://www.brandonchecketts.com/?p=1233#comment-217636</guid>

					<description><![CDATA[Thank you for the helpful article.  Your statement on SSH Agent forwarding allowing an attacker to intercept the private key is incorrect.  It will only provide temporal access to the USE of the private key.  The request is forwarded to the agent to be signed with the private key, the agent never exposes it.

So there is definitely a risk.  An attacker could use your private key to access another host as you, and install whatever backdoors they want on that host.  But they won&#039;t have your private key.]]></description>
			<content:encoded><![CDATA[<p>Thank you for the helpful article.  Your statement on SSH Agent forwarding allowing an attacker to intercept the private key is incorrect.  It will only provide temporal access to the USE of the private key.  The request is forwarded to the agent to be signed with the private key, the agent never exposes it.</p>
<p>So there is definitely a risk.  An attacker could use your private key to access another host as you, and install whatever backdoors they want on that host.  But they won&#8217;t have your private key.</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
