DevConf.CZ 2025

Up your SSH security game
2025-06-12 , A113 (capacity 64)

Since 2020, OpenSSH has supported using widely-available FIDO2 security tokens as the basis for private-key based authentication. This is supported by the popular Git forges (GitHub, Forĝejo/Codeberg, etc.). Hardware-based keys have several desirable security properties not shared by private key files: they can't be copied, and they can be configured to require a PIN and a physical touch in order to authenticate. It's possible to configure Git to require these steps only when pushing (ie: not increasing the friction of clone/fetch/pull). Many people are still using file/software-based SSH keys because they don't know how easy it is to set this up. An introduction.


What level of experience should the audience have to best understand your session?

Intermediate - attendees should be familiar with the subject

Canadian living in Germany with my six year old twins. Former GNOME. Working at Red Hat on Cockpit and composefs.

This speaker also appears in: