Crosshackle

refers to a weaving technique or pattern that involves interlacing threads or fibers in a crisscross manner, often used in textile and other craft practices to improve the texture, strength, or aesthetic appeal of the fabric or material. [or in our case, to improve the strength of SSH key access]

to cross-question especially annoyingly (Websters Dictionary)

crosshackle is a way of transparently signing ssh private keys which is especially useful when the signed keys have a limited life and you want to prompt for resigning only when needed. It differs from the earlier faythe framework in utilising the openssh configuration file to manage the process rather than wrapping ssh in transparent but rather convoluted ways.

At its core, it consists of a single platform-dependant script to check and, if necessary, re-sign the certificate. Currently, we have a posix shell script for linux, Mac (or Windows) and powershell primarily for Windows but this also works on linux or Mac if required. This is the coupled with standard OpenSSH configuration snippet.

OpenSSH configuration file changes

For the simplest domain specific way of implementing this, it is suggested that the users primary OpenSSH config file ${HOME}/.ssh/config be modified to contain (e.g.)

Match Host *.essex.ac.uk
  Include %d/.ssh/ch_config

This will match any host in the target domain (essex.ac.uk) and include the contents of the crosshacke file, also located in the users home directory (%d). This should consist of two match blocks and one host block as follows. Note that the there are some site specific changes that you might need to make

# crosshackle include file for domain essex.ac.uk
# we only get here if host matching *.essex.ac.uk

# check if we need a new cert
Match Host !sshca.*,!sshenrol.*,* !exec "%d/.ssh/signkey %d/.ssh/id_ed25519_essex.ac.uk user@sshca.essex.ac.uk"
  # if exit code was 1, create some fake settings to blow this
  # connection out of the water
  GlobalKnownHostsFile /dev/null
  UserKnownHostsFile /dev/null
  StrictHostKeyChecking yes
  ConnectTimeout 1

# check if we need to route through the gateway
Match Host !sshgw.*,!sshca.*,!sshenrol.*,* !exec "ssh-keyscan -T 1 %h >%d/.ssh/junk 2>&1"
  ProxyJump bret@sshgw.essex.ac.uk

# otherwise, use the defaults - if you need to override these
# do this in the main config before this include file is called

Host *
  User user
  IdentityFile ~/.ssh/id_ed25519_essex.ac.uk
  ForwardAgent yes

Assuming that the client attempts to connect to host foo.essex.ac.uk (using an implicit or explicit username), OpenSSH (be that ssh, scp sftp etc) will run through each of the active configuration stanzas. These do the following:-

Certificate signing script

The crosshackle configuration has an exec command to sign the users key. This requires two parameters:

The script itself need to

  1. Check the supplied private key exists.

  2. If there is a signed version of the private key (<key>-cert.pub), then check the validity date and if expired, reissue.

  3. If there is no signed version of the private key, reissue.

Note that the SSH CA will probably prompt for password and MFA, but that dependant on how the SSH CA is configured.