Skip to content

Releases: cloudtools/ssh-cert-authority

Goodbye self-signing certs

31 Aug 14:23
Compare
Choose a tag to compare

Calling this 2.0 because we're breaking backwards compatibility. You can no longer sign your own requests.

Didn't make this configurable to try to keep this change simple. Thanks @Arvanaghi for the PR.

Fix parsing of private key fingerprints

11 Feb 15:49
Compare
Choose a tag to compare

Fixing the brokenness of 1.7.0

Google Cloud KMS Signing

02 Dec 16:20
Compare
Choose a tag to compare

Google's Cloud KMS supports asymmetric sign operations. ssh-cert-authority now supports using one of these keys as the signer/issuer for certificates. The README was updated with a how to of sorts.

Build enhancements

02 Oct 19:03
Compare
Choose a tag to compare

This version includes changes to the Makefile and docker building environment.
We also move to go 1.9 and the Docker containers are based on ubuntu 16.04
instead of 15.10

The May 2017 Release!

23 May 17:12
Compare
Choose a tag to compare

There are lots of small changes here and one of them may cause backwards compatibility problems. There's no real theme to this release, however.

Backwards Incompatible Change:

  • The daemon no longer binds to 0.0.0.0:8080 by default. Instead it binds to 127.0.0.1 by default which further enforces that you should run this service behind a real web server. If you want the old behavior you need to call runserver with --listen-address 0.0.0.0:8080. Thanks @shatil for the commit.

Backwards Compatible Changes:

  • Documentation prefers that cert requesters use PublicKeyPath rather than fingerprints. A lot of folks find fingerprints confusing.
  • If you're using an environment that's configured for auto-signing and a cert is auto-signed the get cert function will automatically download and try to add it to the agent. This saves the requester a call to get cert with the request id. Convenience!
  • The serial number on the cert is no longer a sequential integer starting at 0. Instead the serial number is random and actually matches the request id. The request id continues to be base32 encoded, however, if you end up base32 decoding this yourself know that you'll need to pad it (I truncate the trailing == to make it look pretty).

Server embedded CriticalOptions

19 Sep 17:01
Compare
Choose a tag to compare

With this release a new feature is introduced: the ability to configure that the server embed certain CriticalOptions on any certificate for a given environment. This means that the owner of the server can require, for example, that all certs issued specify that they are only valid from certain IP addresses (perhaps your local network subnet or subnets) or that only a specific command may be run on the remote server (perhaps locking a user down to a restricted shell).

Fix request id in slack posts when auto signing

18 Sep 18:51
Compare
Choose a tag to compare

ed25519, golang 1.7

21 Aug 19:42
Compare
Choose a tag to compare

This release includes support for the ed25519 curve (it was added to golang in 1.6). And now that 1.7 is out we're building against golang 1.7.

If you were using auto signing in a previous release the log messages were broken, they were logging the CA key fingerprint, not the user fingerprint. This has been fixed.

This has been pushed to Docker hub as cloudtools/ssh-cert-authority:v1.4.

Ability to generate encrypted CA keys

06 Apr 11:48
Compare
Choose a tag to compare

You don't have to jump through an ssh-keygen hoop anymore. Also on Docker hub https://hub.docker.com/r/cloudtools/ssh-cert-authority/

Automatically load encrypted private keys

04 Apr 23:23
Compare
Choose a tag to compare

With this release the signing daemon is able to load CA signing keys that had previously been encrypted using Amazon's KMS.