| ▲ | Liskni_si 21 hours ago | |||||||||||||||||||||||||
Yeah but they already mentioned that they expect the attacker to hijack your ssh command so you'll touch it yourself, thinking you're authorizing something else than you actually are. It does mean that they can't use the key a thousand times. But once? Yeah sure. | ||||||||||||||||||||||||||
| ▲ | akdev1l 18 hours ago | parent [-] | |||||||||||||||||||||||||
> hijack your ssh command so you'll touch it yourself, thinking you're authorizing something else than you actually are. That doesn’t do anything at all. 1. If the attacker is redirecting you to a different host then ssh will simply refuse to connect due to known_hosts (I guess they could have added to that file too, redirect you to a honeypot and then hopefully you’ll run “sudo” before realizing but then at that point just hijack “sudo” itself in the local machine) 2. If the attacker is trying to let you connect and eavesdrop your connection to still credentials then that also still doesn’t work as the handshake for ssh is not vulnerable to replay attacks The attacker could trick you into signing something I guess but then that still doesn’t do anything because secrets are not divulged at any point I guess if the yubikey is also used for `sudo` then your attack makes more sense, as the attacker could prompt you to authenticate a sudo request when you call the evil `ssh` | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||