DevConf.CZ 2025

Up your SSH security game
2025-06-12 , A113 (capacity 64)

Since 2020, OpenSSH has supported using widely-available FIDO2 security tokens as the basis for private-key based authentication. This is supported by the popular Git forges (GitHub, Forĝejo/Codeberg, etc.). Hardware-based keys have several desirable security properties not shared by private key files: they can't be copied, and they can be configured to require a PIN and a physical touch in order to authenticate. It's possible to configure Git to require these steps only when pushing (ie: not increasing the friction of clone/fetch/pull). Many people are still using file/software-based SSH keys because they don't know how easy it is to set this up. An introduction.


Experience level

Intermediate - attendees should be familiar with the subject

See also:

Canadian living in Germany with my six year old twins. Former GNOME. Working at Red Hat on Cockpit and composefs.

This speaker also appears in: