cloudflare-docs icon indicating copy to clipboard operation
cloudflare-docs copied to clipboard

improved SSH config with short-lived certificates

Open profiprog opened this issue 2 years ago • 2 comments

This is suggestion to simplify client's SSH configuration for short-lived certificates.

I am aware that command cloudflared access ssh-config --hostname vm.example.com --short-lived-cert still generates old configuration - so I suggest to update also that if somebody known where.

  • Old configuration is working only if client user is same as user of SSO identities.
  • Old configuration does not works if passing remote command as argument to ssh command (for example ssh vm.example.com whoami)

This MR also includes the example of command to create new UNIX username as alias to existing one (which is useful if existing does not match user SSO identities).

profiprog avatar Mar 09 '22 23:03 profiprog

⚠️ GitGuardian has uncovered 4 secrets following the scan of your pull request.

Please consider investigating the findings and remediating the incidents. Failure to do so may lead to compromising the associated services or software components.

🔎 Detected hardcoded secrets in your pull request
GitGuardian id Secret Commit Filename
- Generic High Entropy Secret 7d3d958ba7e1005d201a7e62289737fd5d716394 config.toml View secret
- Generic High Entropy Secret 58b6333afd7670da52bd237bec6b2c0cb708ae5e products/ddos-protection/docs-config.js View secret
- Generic High Entropy Secret f5ad72dcb5f9b6b4072be76c18ee663e52f30f72 products/ddos-protection/docs-config.js View secret
3543783 Generic High Entropy Secret 51cbbada456648d933bd539e901cb20bb22d0adb products/ruleset-engine/docs-config.js View secret
🛠 Guidelines to remediate hardcoded secrets
  1. Understand the implications of revoking this secret by investigating where it is used in your code.
  2. Replace and store your secrets safely. Learn here the best practices.
  3. Revoke and rotate these secrets.
  4. If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.

To avoid such incidents in the future consider


🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.

Our GitHub checks need improvements? Share your feedbacks!

gitguardian[bot] avatar Jul 16 '22 22:07 gitguardian[bot]

@jroyal Should we add this info into the docs?

ranbel avatar Aug 05 '22 01:08 ranbel

Closing due to inactivity and unresolved comments. We'll be glad to incorporate the suggested commands once they are verified to work and have more context added.

ranbel avatar Oct 24 '22 15:10 ranbel