From b2672d1df092ddb8513e878de574acbb95e4f3bb Mon Sep 17 00:00:00 2001
From: inference SSH keys used to sign data outside of their validity periods should be classified as
compromised; only trust SSH keys used within their validity periods. Each SSH key is signed with the previous key, allowing verification of the
- chain-of-trust.allowed_signers
file, then running the following command for each key:
ssh-keygen -Y verify -f <allowed_signers file> -I <signer name/email address> -n file -s <signature file of file-to-verify> < <file-to-verify>
ID |
---|