TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Show HN: Sshield, a secure(r) SSH agent written in Rust

3 点作者 gotlou将近 2 年前
sshield is a drop-in SSH agent replacement written in Rust which stores keys in an encrypted SQLite database instead of in ~&#x2F;.ssh. I opted to use russh, which is a Rust implementation of the SSH protocol and ssh-agent for greater memory safety.<p>It allows importing settings and keys from OpenSSH as well as creating, updating, showing and deleting keys. Whenever a program requests using the key for signing, a prompt is displayed to the user for confirmation.<p>This way:<p>1. Your keys don&#x27;t get leaked (unless the server process&#x27; memory is dumped, but that requires root on *nix systems)<p>2. Your keys don&#x27;t get misused and inadvertedly sign something malicious.<p>It is still a work in progress, but I&#x27;ve been able to switch with fairly minor inconveniences that are just the result of not having it globally installed. The repo will soon have a Nix overlay or package output with all the right settings enabled for daily production usage.<p>Other planned features include using one of the Linux sandboxing APIs, like Landlock or seccomp to further lock down server process to reduce the chance of an RCE being triggered and a way to store the database on different cloud storage mediums so you can use their ACLs to further lock down access to the database and back up keys simultaneously.

暂无评论

暂无评论