#LinuxHacks #SecurityHacks #Hardwaretoken #Ssh #Sshkeys #TPM
Authenticate SSH with Your TPM
https://fed.brid.gy/r/https://hackaday.com/2026/04/11/authenticate-ssh-with-your-tpm/

Enjoyed learning the process of setting up a cluster of tiny PCs for parallel computing. A note to myself on installing Ubuntu, passwordless SSH, automating package installation across nodes, distributing R simulations, and comparing CV5 vs CV10 performance. Fun project!
Anyone got an idea how to do this:
I know how to do most things of this, but not all at once (AuthenticationMethods is permitted in a Match block, but we cannot match on keys, we want access to the same user, and the “self” key can also be used (agent forwarding) from nōn-local addresses.
It seems like I’ll need a custom PAM module (arrrgh, I don’t want to write one of these) that asks for the password if key B is used (does SSH expose this to PAM?).
Anyone got a better idea?
Want to manage your deployments securely with DeployHQ? Learn how to create SSH keys from the command line using 5 different algorithms and configurations.
#SSHKeys #DeployHQ #Security #DevOps #ServerManagement
SSH keys are essential for securely connecting to your servers. DeployHQ allows you to upload custom SSH keys to manage your deployments. In this blog post, we'll explore 5 different ways to create SSH keys from the command line, each with its own algorithm and configuration options.
in case you may have not known, if you have a #yubikey or an #onlykey or something similar you can generate SSH keys that require them, for example:
`ssh-keygen -t ed25519-sk`
more info: