TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Stealing unencrypted SSH-agent keys from memory (2014)

20 pointsby kencauseyover 4 years ago

2 comments

marcan_42over 4 years ago
This is pretty obvious; the while <i>purpose</i> of ssh-agent is to do this. Once you have access to the user account of whoever is running any software that does any kind of crypto (or in some cases root, depending on kernel hardening settings re: debugging&#x2F;ptrace), you can always get the keys.<p>Those concerned about this attack vector should use hardware tokens, like a YubiKey. They aren&#x27;t infallible, as they could be stolen while unlocked with some USB trickery to keep them active, but it beats being able to trivially dump the key material.
评论 #24785990 未加载
kencauseyover 4 years ago
An earlier entry (<a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=24768220" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=24768220</a>) to a Windows 10 specific blog post linked to this blog post from 2014 which appears to have never been posted here. So I did so.
评论 #24768712 未加载