Password protecting the node's ssh-key in the cluster

staticrsa

New Member
May 22, 2023
1
0
1
Hello all :)

I have found some older posts about people asking about password protecting the ssh-keys that the nodes use to communicate with eachother.

Many say that it will break certain functionality.

I was wondering if this is still the case? Or have those features that would have broke, now use the proxmox API instead?

My largest concern is that, if one node gets compromised, it is extremely easy for the threat actor to pivot across your entire proxmox cluster in 2 seconds.

My current thoughts on mitigating this is to add a pass-phrase to the ssh-keys granted nothing breaks. Unless there is another way to mitigate this?

Cheers!
 
yes, things would still break, migration for example requires a passwordless SSH key. adding a password also wouldn't really help in your threat scenario - if I am root on one node, I am root on every node, with or without direct SSH access. every node trusts the other nodes, there is no way around it. if you want to isolate your nodes in such a fashion, don't cluster them and use backup/restore or the experimental (CLI/API only for now) remote migration feature to transfer guests as needed.
 

About

The Proxmox community has been around for many years and offers help and support for Proxmox VE, Proxmox Backup Server, and Proxmox Mail Gateway.
We think our community is one of the best thanks to people like you!

Get your subscription!

The Proxmox team works very hard to make sure you are running the best software and getting stable updates and security enhancements, as well as quick enterprise support. Tens of thousands of happy customers have a Proxmox subscription. Get yours easily in our online shop.

Buy now!