Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

SSH is a secure shell protocol. You should rotate your keys as much as possible. Why using it outside its context?

I use an ed25519 GPG key secured in a hardware security key. It’s convenient and secure. My SSH keys are ephemeral as much as possible.



You dont have to use the same ssh key you use to connect to a server. A ssh key can be created for just any purpose.


Public key cryptography is used in many applications. What’s the motivation for using encryption tools in a transport protocol for signing data or documents? It’s not a full solution, and makes the SSH code base larger, and harder to maintain.

GPG has key management tools and various functionalities around signing. Minisign is another clean tool to watch for.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: