Except that an attacker can modify the ssh config to enable session multiplexing with a long timeout and then piggy-back off that connection, right?