<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ssh key maintenance advice in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-key-maintenance-advice/m-p/4669132#M731452</link>
    <description>Hey all,&lt;BR /&gt;&lt;BR /&gt;I'm looking for a better way than every 30 days generating new keys, splatting them all over the place by hand following a list of which users get which keys from other users on other hosts, etc. &lt;BR /&gt;&lt;BR /&gt;So, I'm wondering, who has a better way?  How about Radius server for ssh key exchange?  Is that what it's for?  Can someone point me to a document that gives a nice high and mid-level overview layout of what the strategies could be?&lt;BR /&gt;&lt;BR /&gt;I've got to believe that there's a better way.  I know I can get ssh to serve a users' public keys, but what about all keys for everyone and some receivership rules?  &lt;BR /&gt;&lt;BR /&gt;Suggestions &amp;amp; ideas on how my esteemed colleagues handle this best would be sincerely appreciated.&lt;BR /&gt;&lt;BR /&gt;Many thanks!</description>
    <pubDate>Mon, 02 Aug 2010 13:12:47 GMT</pubDate>
    <dc:creator>TwoProc</dc:creator>
    <dc:date>2010-08-02T13:12:47Z</dc:date>
    <item>
      <title>ssh key maintenance advice</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-key-maintenance-advice/m-p/4669132#M731452</link>
      <description>Hey all,&lt;BR /&gt;&lt;BR /&gt;I'm looking for a better way than every 30 days generating new keys, splatting them all over the place by hand following a list of which users get which keys from other users on other hosts, etc. &lt;BR /&gt;&lt;BR /&gt;So, I'm wondering, who has a better way?  How about Radius server for ssh key exchange?  Is that what it's for?  Can someone point me to a document that gives a nice high and mid-level overview layout of what the strategies could be?&lt;BR /&gt;&lt;BR /&gt;I've got to believe that there's a better way.  I know I can get ssh to serve a users' public keys, but what about all keys for everyone and some receivership rules?  &lt;BR /&gt;&lt;BR /&gt;Suggestions &amp;amp; ideas on how my esteemed colleagues handle this best would be sincerely appreciated.&lt;BR /&gt;&lt;BR /&gt;Many thanks!</description>
      <pubDate>Mon, 02 Aug 2010 13:12:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-key-maintenance-advice/m-p/4669132#M731452</guid>
      <dc:creator>TwoProc</dc:creator>
      <dc:date>2010-08-02T13:12:47Z</dc:date>
    </item>
    <item>
      <title>Re: ssh key maintenance advice</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-key-maintenance-advice/m-p/4669133#M731453</link>
      <description>&lt;!--!*#--&gt;Why are you generating new keys every 30&lt;BR /&gt;days?  Do the old ones get rusty or&lt;BR /&gt;something?</description>
      <pubDate>Mon, 02 Aug 2010 14:11:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-key-maintenance-advice/m-p/4669133#M731453</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2010-08-02T14:11:27Z</dc:date>
    </item>
    <item>
      <title>Re: ssh key maintenance advice</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-key-maintenance-advice/m-p/4669134#M731454</link>
      <description>Shalom,&lt;BR /&gt;&lt;BR /&gt;These keys are good and can stay secure for years.&lt;BR /&gt;&lt;BR /&gt;If you have a master ssh server with its root key distributed to all other systems as authorized_user entry, that server can take care of maintenance issues.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Mon, 02 Aug 2010 15:16:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-key-maintenance-advice/m-p/4669134#M731454</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2010-08-02T15:16:14Z</dc:date>
    </item>
    <item>
      <title>Re: ssh key maintenance advice</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-key-maintenance-advice/m-p/4669135#M731455</link>
      <description>If you are generating keys because of password aging you might want to disable password interactive login all together and remove the password expiration too.&lt;BR /&gt;&lt;A href="http://www.linuxquestions.org/questions/linux-security-4/how-to-deny-password-login-in-the-ssh-please-199730/" target="_blank"&gt;http://www.linuxquestions.org/questions/linux-security-4/how-to-deny-password-login-in-the-ssh-please-199730/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;   Andre</description>
      <pubDate>Tue, 03 Aug 2010 07:17:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-key-maintenance-advice/m-p/4669135#M731455</guid>
      <dc:creator>Andre Cornelissen</dc:creator>
      <dc:date>2010-08-03T07:17:14Z</dc:date>
    </item>
    <item>
      <title>Re: ssh key maintenance advice</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-key-maintenance-advice/m-p/4669136#M731456</link>
      <description>Aside from someone breaking the algorithm used in creating the keys, there should be no reason to ever regenerate them other than a host replacement.&lt;BR /&gt;&lt;BR /&gt;The example I can use would be the failure of using an appropriate level of randomness in generating the key pairs. This occurred about a year ago with respect to most SSH implementations.&lt;BR /&gt;&lt;BR /&gt;If you are protecting your key pairs properly this should never be a problem.&lt;BR /&gt;&lt;BR /&gt;If you are extremely paranoid, you could replace all key pairs at the time of departure of a highly trusted staff member. Otherwise, you are actually introducing risk.&lt;BR /&gt;&lt;BR /&gt;The intent of those keys, and especially the known_hosts lists is that you should always know your hosts. If you for some reason do not know the other hosts, it is clearly an unexpected state, whether accidental (keys changed, forgot to update host list), or malicious. Either way, you would want to investigate.&lt;BR /&gt;&lt;BR /&gt;That said, it's an interesting idea that you suggest to manage ssh key pairs in the same manner as you might manage a certificate authority for SSL keys through some sort of Public Key Infrastructure implementation.&lt;BR /&gt;&lt;BR /&gt;Perhaps you have the makings of a new product...&lt;BR /&gt;&lt;BR /&gt;Best regards,&lt;BR /&gt;Don</description>
      <pubDate>Wed, 04 Aug 2010 12:24:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-key-maintenance-advice/m-p/4669136#M731456</guid>
      <dc:creator>Don Mallory</dc:creator>
      <dc:date>2010-08-04T12:24:59Z</dc:date>
    </item>
    <item>
      <title>Re: ssh key maintenance advice</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-key-maintenance-advice/m-p/4669137#M731457</link>
      <description>Thanks for the advice guys.  But, PCI requirements, etc - expect keys replaced every 30 days. Did they explicity say THESE keys?  No, but our consultant says THESE keys - so, I'm very happy to hear that it's uncommon to change these out, meaning the consultant is off his rocker.  Thanks you guys!</description>
      <pubDate>Wed, 04 Aug 2010 15:56:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-key-maintenance-advice/m-p/4669137#M731457</guid>
      <dc:creator>TwoProc</dc:creator>
      <dc:date>2010-08-04T15:56:37Z</dc:date>
    </item>
    <item>
      <title>Re: ssh key maintenance advice</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-key-maintenance-advice/m-p/4669138#M731458</link>
      <description>&lt;!--!*#--&gt;&amp;gt; [...] PCI requirements, etc - expect keys&lt;BR /&gt;&amp;gt; replaced every 30 days.  [...]&lt;BR /&gt;&lt;BR /&gt;PCI?  Peripheral Component Interconnect?&lt;BR /&gt;Who???&lt;BR /&gt;&lt;BR /&gt;&amp;gt; [...] our consultant says [...]&lt;BR /&gt;&lt;BR /&gt;Did you ask why?  Did you get a reasonable&lt;BR /&gt;answer?  (Did you pay too much for the&lt;BR /&gt;consultation?)</description>
      <pubDate>Wed, 04 Aug 2010 16:30:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-key-maintenance-advice/m-p/4669138#M731458</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2010-08-04T16:30:29Z</dc:date>
    </item>
    <item>
      <title>Re: ssh key maintenance advice</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-key-maintenance-advice/m-p/4669139#M731459</link>
      <description>Payment Card Industry -- a very common term in the banking industry. Wikipedia offers a good overview:&lt;BR /&gt; &lt;BR /&gt;&lt;A href="http://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard" target="_blank"&gt;http://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard&lt;/A&gt;&lt;BR /&gt; &lt;BR /&gt;And yes, like most emerging standards (especially banking), they take a decade to get going so "replacement keys" probably meant the desk and file cabinet keys. For a large enterprise where managing a lot of servers is a big task, the ability to transfer files and remotely manage them using ssh makes key replacement a very high risk procedure. It would take a lot of planning to prevent multi-server downtime for virtually no increase in security levels.&lt;BR /&gt; &lt;BR /&gt;It can probably be scripted and scheduled but untangling servers that stopped completing their tasks because of a glitch in key distribution is going to be a highly visible event with lots of explaining to do.&lt;BR /&gt; &lt;BR /&gt;I agree with Steven: Ask why. No procedural changes should ever be allowed without justification with industry standards. And eve then, upper management can issue a statement to cover exceptions to the findings.</description>
      <pubDate>Thu, 05 Aug 2010 00:42:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-key-maintenance-advice/m-p/4669139#M731459</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2010-08-05T00:42:05Z</dc:date>
    </item>
    <item>
      <title>Re: ssh key maintenance advice</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-key-maintenance-advice/m-p/4669140#M731460</link>
      <description>thanks Bill for advice and input.  Thanks Steve for responding.</description>
      <pubDate>Fri, 06 Aug 2010 16:12:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-key-maintenance-advice/m-p/4669140#M731460</guid>
      <dc:creator>TwoProc</dc:creator>
      <dc:date>2010-08-06T16:12:17Z</dc:date>
    </item>
  </channel>
</rss>

