Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Step-ca is really cool and has a lot of templating and policy stuff opkssh doesn't currently have. However step-ca does require two trusted parties: your IDP and the SSH CA.

The advantage of opkssh is that there is only one trusted party, your IDP.

While not available in opkssh yet, OpenPubkey even has a way of removing the trust assumption in your IDP.

I wonder if step-ca would ever consider using opkssh or the OpenPubkey protocol



Step CA has some open source parts but it is built in a way where it is inconvenient to use without their admin infra. I also had to do some modifications to their server to make it work properly. If OPKSSH doesn't need all that crap then I am all for it. I'll certainly give it a shot.


Theoretically, is the distinction between IDP and CA necessary? I kinda would expect the IDP to certify my pubkey.


Currently IDPs don't care about user public keys. OpenPubkey manages to slip the user's public key into an issued ID Token without the IDP having to know about it.

Ideally IDPs are CAs for identity and ID Tokens have a public key field.

There are neat projects and standards to do this like OIDC-squared [0] and OIDC4VC [1] but it is unclear if IDPs will implement them if they are standardized. We do have DPoP now [2] but it isn't available for any of the usecases that are important to me. OpenPubkey is largely an productive expression of my frustration with public keys in tokens being a promised feature that never arrives.

[0]: OIDC-squared https://jonasprimbs.github.io/oidc-squared [1]: OIDC4VC https://identity.foundation/jwt-vc-presentation-profile/ [2]: RFC-9449 OAuth 2.0 Demonstrating Proof of Possession (DPoP) - https://datatracker.ietf.org/doc/html/rfc9449




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: