Join GitHub today
GitHub is home to over 50 million developers working together to host and review code, manage projects, and build software together.
Sign upWe need a better story for SSH key rotation #693
Comments
|
The relevant PR is #692. There is an I'd prefer to just control the entire contents of the |
|
AWS's injection is the I believe that Macstadium does not use SSH access to our machines, so we would be OK to overwrite the So, we should be fine to have Salt manage |
Enable easy ssh key revocation Fully manage the `.ssh/authorized_keys` file for root, so that keys removed from Salt are also removed from the file. Note that the AWS (Linux) machines are configured to have two additional keys in the root `authorized_keys` file, namely `servo-aws` and `servo-aws-reserved-instances`, but when used these keys will tell the user to log in as ubuntu, so they don't provide real access. Remove these keys as they are not useful. Add documentation about gaining SSH access and revoking/rotating keys. Fixes #693. <!-- Reviewable:start --> --- This change is [<img src="https://reviewable.io/review_button.svg" height="34" align="absmiddle" alt="Reviewable"/>](https://reviewable.io/reviews/servo/saltfs/694) <!-- Reviewable:end -->
Salt only adds keys, and doesn't remove them. We should be able to remove a key from the list here and have it get removed on the server.
I had to rotate a key recently and I had to change salt and also run some sed commands on all machines.
cc @edunham