this post was submitted on 14 Sep 2024
50 points (91.7% liked)
Firefox
20237 readers
27 users here now
A place to discuss the news and latest developments on the open-source browser Firefox
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
forgot this part
I assume that too, however the person I responded to recommended using a full fledged CA cert.
I don't mean them specifically, but that to me managing access to such a CA cert's keys is security nightmare, because if I somehow get an infection, and it finds the cert file and the private key, it'll be much easier for it to make itself more persistent than I want it.
That's the point. I don't recommend having one. I recommend self signed certs that are
Or if you don't want to deal with self signed certs, buy a domain and do lets encrypt with the DNS challenge.
That's also more secure, but can be more of a hassle, though I guess it depends on preference.
But then I would use this latter one too if I had opened any services to the internet, but I didn't because I don't need to.
I'm in a home environment. I don't have a TPM*, I don't have yubikeys. And no, certificates won't be placed on a lot of servers, as
You're right. I'm talking about making a certificate using
gpg
and storing it on your system. Then adding it to the root CA list and signing all your Local SSH stuff with it.