...
Table of Contents | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
|
...
When to revoke and regenerate your SSH keys
At some point, it may be necessary to revoke your old SSH key and create a new one. Situations that may require revoking your old ssh keys and creating new keys include:
Device compromise:
A device upon which you store your ssh key files has been compromised, due to malware, malicious actors gaining access to log in as you on your device, or malicious actors gaining access to data stored on your device.
Data compromise:
Your key files were copied or accessed by someone other than yourself
You backed up your key files to a location outside your device that was subject to a compromise
Following good security practices:
It is recommended that ssh keys be rotated as part of a remediation process to ensure any keys that may have been compromised since their initial generation cease to be usable. ARCC recommends rotating your keys every 6 months (similar to requiring password changes at regular intervals).
...
Using SSH Key Manager to revoke and regenerate SSH keys
Note: if you are revoking and regenerating your ssh keys due to a compromise, you must perform the following steps on a different, uncompromised device
Open a new browser window and go to the OnDemand URL (3rd column in table below) for the HPC in which you’d like to revoke and regenerate your keys
Log in per directions on the linked wiki page (right-most column) associated with the HPC cluster in which you would like to regenerate keys
Insert excerpt | ||||||||
---|---|---|---|---|---|---|---|---|
|
...
Click the download button. This will download your new key files to the local device from you’re currently accessing OnDemand.
...
Replacing SSH Keys on your Device
Before configuring your new ssh keys on your devices (usually this is your main workstation or laptop) you must remove your old keys.
As always, ARCC recommends only setting up SSH authentication keys on devices you have sole access to, and not on shared devices. If you do set up an ssh key for authentication on a shared device, only do so on computers where individuals log into separate, individual profiles on the computer. If you’re not sure how to determine this, contact arcc-help@uwyo.edu
Expand the section associated with your specific device OS and follow directions to remove your old SSH keys before replacing them with your new keys.
On a Windows PC
Expand | ||
---|---|---|
| ||
The standard location for ssh key files on a windows system are in your personal User directory in a hidden subfolder named
Note: we have found that Microsoft sometimes categorizes file types incorrectly. The public key and cert files may be categorized incorrectly as a Microsoft Publisher file and icon. This is ok.
|
On a Mac
Expand | ||
---|---|---|
| ||
The standard location for ssh key files on a Mac OS computer are in your personal
|
On a Linux PC
Expand | ||
---|---|---|
| ||
The standard location for ssh key files on a Linux OS computer are in your personal
|
...
Next Steps
Previous | Workshop Home | Next |