Hacker News new | past | comments | ask | show | jobs | submit login

I don't see any way to remove key after you dropped it to target.



Ah, I didn't check that. It still means a bad key could have been used for evil, just that there would be clear evidence left behind.

The issue is that I've had lots of ssh keys, and might not have my fingerprints for all of them. If I see a bad fingerprint, it's entirely probable it's just an old key of mine from an old laptop, cellphone, script, or whatever, and NOT an attacker's key.

But, in light of this attack which you revealed, now any account which contains keys which aren't 100% accountable could have been compromised by an attacker. (in fairness, someone who stole the github user password could have done the same thing too, but that's an obvious attack route)

Key management is such a pain!




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: