5/10/2026 at 11:12:24 PM
> The technique appears to be new: I haven't found a proper write-up of this, nor of any other provider-independent solution.Maybe I'm missing something but SSH already has a built-in solution for this, key-certs. Just sign the server key with a private CA key you trust.
by theteapot
5/11/2026 at 2:09:36 AM
SSH has *ANOTHER* built-in solution, in the form of the SSHFP DNS record.If the DNS record for the host has an SSHFP (SSH FingerPrint) record, SSH will compare it to the retrieved public key(s) and refuse the connection if there is a mismatch. It can be configured to require DNSSec for this, or to only reject if it gets a secure rejection (to prevent DoS).
It works perfectly, has no notable down sides (just add a DNS record when you generate the host's SSH key), and has been around for many years.
by Borealid
5/11/2026 at 4:55:48 AM
It is very insecure unless you use dnssec, isn’t it?Just means an attacker also needs to mitm DNS if you MITM the host. Not trivial, but depending on setup might not be harder.
by beagle3
5/11/2026 at 6:00:37 AM
I recommend reading the description of the option `VerifyHostKeyDns` in the `ssh_config` man page.If set to `yes`, you get automatic trust-on-first-use (no user prompt) if you use DNSSec, and you get the current asking-the-user behavior if your DNSSec is broken or you are under attack.
Obviously it's more secure if you use DNSSec, because that way you can reflexively deny any request to manually verify a host key, but it provides value regardless.
by Borealid
5/11/2026 at 6:42:14 PM
Correct. Very insecure unless your client app goes out of its way to perform DnSSEC.But wait, there's more: SSH config, resolv.conf, DNS RR setup.
A lomg checklist for successful SSHFP deployment:
by egberts1
5/11/2026 at 10:09:20 PM
That site doesn't mention that when DNSSec is absent, the behaviour of SSH is identical to what happens if you hadn't used the SSHFP record at all, except that for unsophisticated attackers it also displays "no matching host key found in DNS".So even without DNSSec using the SSHFP records is an improvement over not using them because some of the time it tells you for certain you're being interfered with.
There is no situation in which an insecure DNS response is auto-trusted by the SSH client.
by Borealid
5/11/2026 at 5:46:53 PM
Is there something like this for Wireguard?by cromka
5/11/2026 at 10:11:05 PM
Wireguard has no key distribution mechanism.You can use software like Headscale/Tailscale/Netbird on top.
by Borealid
5/11/2026 at 8:15:05 AM
The article describes a method of securely seeding private key data to newly provisioned servers. It's a bit of bootstrapping problem, and not something a PKI can solve.You usually need some form of trusted communication with a new server until you can give it its real identity, in the form of host names and cryptographic keys. In an enterprise environment this can usually be done with some sort of isolated management or provisioning vlan. In a cloud environment, I've seen all sorts of more or less hacky solutions but since it depends a lot on specific details of your networks and APIs, bespoke solutions are fine.
by xorcist