tl;dr 😎
RSA Based keys aren’t safe, use EdDSA-based keys instead.
ssh-keygen -o -a 256 -t ed25519 -C "$(hostname)-$(date +'%d-%m-%Y')"
And a long’ish version… 🥲
With the rising era of quantum computing, RSA-based SSH keys are becoming obsolete and easy to overcome.
RSA
Supported by all common major languages, compatible with legacy machines (SHA-1).
Slow to generate (especially when you opt for beefy keys as 2048-bits) and quantum computers are here to crack those keys in no time.
ECDSA
Supported by major languages and compatible with many clients with a nice improvement of key generating over RSA.
However, the way this key is being generated can compromise the private key as not so private anymore.
EdDSA
A fast-performing key with the best length/security ratio, which fixed the security flaws that have been found in ECDSA.
But on the other hand, it’s relatively new and not supported by all the major languages.
No Comments
Leave a comment Cancel