| ▲ | Liskni_si 18 hours ago | |||||||
Okay let me elaborate how I envision that attack to work: 1. attacker wants to use your yubikey-backed ssh key, let's say for running ssh-copy-id once with their own key so they can gain access to your server 2. thus they need to trick you into touching the key when they run that command 3. the best way to trick you is to wait until you do something where you'd normally need to touch that key yourself 4. so they alias ssh to a script that detects when you're trying to connect to this server yourself, and invoke ssh-copy-id instead, which prompts you to touch the yubikey and you do 5. spit out a reasonable looking error (something that makes you think "bloody DNS, it's always DNS, innit" or something silly like that); then they undo the alias so you succeed on the next try and suspect nothing | ||||||||
| ▲ | palata 16 hours ago | parent [-] | |||||||
That's a valid attack, but one thing is that they only get access this one time, and you may realise that something wrong happened (maybe not). But they won't get your private key. | ||||||||
| ||||||||