The Hacker News discussion revolves around the use of hardware-backed keys (specifically macOS Secure Enclave integration) for SSH and GPG, often in comparison to other security methods like YubiKeys or traditional passphrases.
Here are the three most prevalent themes:
1. Debate Over the Security and Practicality of Backing Up Software-Protected Keys
A significant portion of the discussion focuses on whether private keys stored in the Secure Enclave (SE) should be exportable, and how this contrasts with the desire for backups versus the security principle of non-exportability. Users who prioritize operational continuity argue for exportability for disaster recovery, while others insist that allowing export negates the primary security benefit of the SE.
- Supporting Quote (Concern over exportability): "If I understand correctly, this means you can't back up the private key, correct? It's in the Secure Enclave, so if you lose your laptop, you also lose the key?" asked user "jedberg".
- Supporting Quote (Counterargument): "The advantage of non-exportable, HSM-backed keys is that you are guaranteed that the only way to use that key is to have online access to the HSM, and you can recover from HSM access compromise without having to replace the keys," argued user "Nextgrid".
2. Preference for Native/Built-in Solutions Over Third-Party Tools
There is clear enthusiasm for Apple's native integration of SSH key management with the Secure Enclave (using tools like sc_auth), viewing it as superior to relying on third-party software that requires installation and adds complexity or friction.
- Supporting Quote (Native vs. Third-Party): User "traceroute66" stated the new method is better because "Secretive required installation, which is both friction and security-sensitive tool written by a third party. This is native, written by Apple, available out-of-the-box in Tahoe."
- Supporting Quote (Convenience): User "cedws" noted, "Secretive is a bit friendlier to set up but I'll probably switch to this anyway so I have one less app on my computer."
3. Key Management Strategy: Per-Device vs. Portable Keys (SSH Certificates as a Solution)
Users diverge on the best structural approach for managing SSH keys, specifically whether to use separate keys for every device (making backups difficult) or a single, centralized key/identity. SSH Certificate Authorities (CAs) are frequently brought up as the preferred method to handle infrastructure scalability shortcomings associated with managing many individual public keys across many servers.
- Supporting Quote (Challenge of multiple keys): User "morshu9001" lamented the process of securing new devices: "If you get a new device, you have to go add its pubkey to every server you ever use... it was way easier to just copy .ssh onto it rather than hunting everything down."
- Supporting Quote (SSH CA solution): User "yjftsjthsd-h" suggested a scalable alternative: "There is an easier way: Create a SSH CA, add that to your authorized_keys everywhere, use it to sign the individual public keys."