| ▲ | mr_mitm 9 hours ago | ||||||||||||||||
This is a good defense for malware that only has read access to the filesystem or a stolen hard drive scenario without disk encryption, but does nothing against the compromised dev machine scenario. | |||||||||||||||||
| ▲ | tharkun__ 7 hours ago | parent | next [-] | ||||||||||||||||
This seems to be the standard thing people miss. All the things that make security more convenient also make it weaker. They boast about how "doing thing X" makes them super secure, pat on the back and done. Completely ignoring other avenues they left open. A case like this brings this out a lot. Compromised dev machine means that anything that doesn't require a separate piece of hardware that asks for your interaction is not going to help. And the more interactions you require for tightening security again the more tedious it becomes and you're likely going to just instinctively press the fob whenever it asks. Sure, it raises the bar a bit because malware has to take it into account and if there are enough softer targets they may not have bothered. This time. Classic: you only have to outrun the other guy. Not the lion. | |||||||||||||||||
| |||||||||||||||||
| ▲ | otterley 7 hours ago | parent | prev [-] | ||||||||||||||||
Keep in mind that not every agent is so naive as to allow a local client to connect to it without reauthenticating somehow. 1Password, for example, will, for each new application, pop up a fingerprint request on my Mac before handling the connection request and allow additional requests for a configurable period of time -- and, by default, it will lock the agent when you lock your machine. It will also request authentication before allowing any new process to make the first connection. See e.g. https://developer.1password.com/docs/ssh/agent/security | |||||||||||||||||