Fearless SSH: Short-lived certificates bring Zero Trust to infrastructure
Overall Reaction to Cloudflare’s “Fearless SSH”
- Many welcome short‑lived SSH certificates and CA-based auth as a good practice, especially for larger orgs and compliance-heavy environments.
- Others are skeptical of outsourcing SSH CA and session control to a third party, particularly Cloudflare, seeing it as recentralization and a new single point of failure.
SSH, “No SSH,” and Operational Practices
- Some argue any SSH access in production is an antipattern; prefer immutable OS, IaC, strong observability, and tools like AWS SSM or kubelet instead of direct shells.
- Others counter that real-world debugging (hardware quirks, cloud bugs, subtle network issues) still needs low-level access and tools like tcpdump/eBPF.
- Broad agreement that:
- Routine SSH into prod is a sign of immature ops.
- There should be “break-glass” or last-resort access, ideally audited and triggering rebuild/“taint” of touched nodes.
- Tradeoffs depend heavily on scale and organizational maturity.
Zero Trust Terminology and Trust Model
- Multiple commenters say the “Zero Trust” label is marketing-heavy and confusing.
- Clarified meanings in the thread:
- Not trusting the internal network by default; always authenticating users/services.
- Shifting trust from network location to user/service identity.
- Strong criticism that, in practice, this approach just replaces trust in the private network with trust in Cloudflare’s infrastructure, keys, and CAs.
Cloudflare as MITM, Auditing, and Privacy
- Session recording and command logging are seen by some as necessary for compliance (SOX, PCI, SOC2, FedRAMP).
- Others describe this as effectively a sanctioned MITM “keylogger,” emphasizing how much power and visibility Cloudflare gains.
- Debate over whether such language is alarmist vs a fair way to highlight the depth of that trust.
SSH CAs, Host Keys, and Alternatives
- Many endorse SSH certificates and internal CAs; question why an external CA is needed when orgs control both clients and servers.
- Short‑lived certs are praised for revocation and access scoping; contrasted with sprawling, never‑rotated authorized_keys.
- Some want better solutions for host key verification (SSH CAs, SSHFP/DNS, TPM attestation).
- Alternatives mentioned: Teleport, Tailscale SSH, Boundary, hoop.dev, custom JWT/HTTP shells, SSM-based systems, and pure IaC approaches.