Christopher Morrow writes:
> On Wed, Sep 20, 2023 at 1:22 PM Jim <mysi...@gmail.com> wrote:
>> 
>> Router operating systems still typically use only passwords with
>> SSH, then those devices send the passwords over that insecure channel.  I 
>> have yet to
>> see much in terms of routers capable to Tacacs+ Authorize  users based on  
>> users'
>> openSSH certificate, Public key id,  or  ed2559-sk security key id, etc.

> There is active work with vendors (3 or 4 of the folk you may even
> use?) to support
> ssh with ssh-certificates, I believe this mostly works today, though
> configuring it and
> distributing your ssh-ca-cert may be fun...

Ahem... Cisco supports SSH authentication using *X.509* certificates.
Unfortunately this is not compatible with OpenSSH (the dominant SSH
client implementation we use), which only supports *OpenSSH*
certificates.

Not sure about other vendors, but when we found this out we decided that
this wasn't a workable solution for us.
-- 
Simon.

Reply via email to