Skip to content

Conversation

@andsens
Copy link

@andsens andsens commented Oct 2, 2025

This primarily becomes relevant when the CA key is backed by a KMS like a TPM chip or a YubiKey (like in this project).

I have kept the PR intentionally simple for now. I'm guessing we need some tests, and perhaps logging that we are using a fallback could be relevant.

Note that the rand.Read() makes the key generation for certificates non-deterministic and might also affect performance when connecting for the first time (assuming CertStorage is used).

@andsens andsens force-pushed the ft-fallback-certkey branch from c6fbdf3 to ee8c821 Compare October 2, 2025 08:50
@andsens andsens changed the title SignHost: Fall back to ed25519 when CA key type cannot be imitated SignHost: Fall back to ECDSA when CA key type cannot be imitated Oct 2, 2025
This primarily becomes relevant when the CA key is backed by a KMS
like a TPM chip or a YubiKey
@andsens andsens force-pushed the ft-fallback-certkey branch from ee8c821 to d46d54d Compare November 17, 2025 13:48
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant