| ▲ | otterley 6 hours ago | ||||||||||||||||||||||||||||
Do you have evidence or a reproducible test case of a successful malware hijack of an ssh session using a Mac and the 1Password agent, or the sudo replacement you suggested? I assume you fully read the link I sent? I don't think you're necessarily wrong in theory -- but on the other hand you seem to discount taking reasonable (if imperfect) precautionary and defensive measures in favor of an "impossible, therefore don't bother" attitude. Taken to its logical extreme, people with such attitudes would never take risks like driving, or let their children out of the house. | |||||||||||||||||||||||||||||
| ▲ | mr_mitm 6 hours ago | parent [-] | ||||||||||||||||||||||||||||
I can type up a test case on my phone: The malware puts this in your bashrc or equivalent:
In /tmp/malware/bin/sudo:
You get the idea. It can do something similar to the git binary and hijack "git commit" such that it will amend whatever it wants and you will happily sign it and push it using your hardened SSH agent.You say it's unlikely, fine, so your risk appetite is sufficiently high. I just want to highlight the risk. If your machine is compromised, it's game over. | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||