View Single Post
ewan's Avatar
Posts: 445 | Thanked: 572 times | Joined on Oct 2009 @ Oxford
#7
Originally Posted by CrashandDie View Post
Does the server check the validity of the certificate against a specific authority? If not, how will you be able to blacklist the certificate in case your device is stolen or lost?
That's not really how SSH keys work. It doesn't use CAs and automatically trust anything signed by them, a server will trust a list of particular individual keys. If the device holding the private key is compromised you simply remove that particular key from the authorized keys list.