Skip to content

Signing ssh host certificate makes ssh-audit give "fail" messages #1874

Answered by tashian
rwv37 asked this question in Q&A
Discussion options

You must be logged in to vote

Yes, we use ecdsa-sha2-nistp256 by default because we believe it's the best option for most people.

While step ssh certificate doesn't support a flag for specifying a different key type, you can choose other key types by generating the key pair first using ssh-keygen, then signing the certificate using step ssh certificate --sign and passing in the public key you just generated:

ssh-keygen -t rsa -b 3072 -f ./sshtest
step ssh certificate --sign [email protected] sshtest.pub
step ssh inspect sshtest-cert.pub
sshtest-cert.pub:
        Type: [email protected] user certificate
        Public key: RSA-CERT SHA256:66ZNXR+HC2L93Hd/WR00E6j3FDyohpKdwYGd6k0EpZc
        Signing CA: RSA S…

Replies: 1 comment

Comment options

You must be logged in to vote
0 replies
Answer selected by tashian
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants