-
Compared to Bromium or Qubes
Bromium focuses on virtual hardware claiming to reduce or eliminate endpoint computer threats like viruses, malware, and adware. Bromium’s vSentry 3.0 became available in Dec 2015[20] and included support for behavioral analysis of executable code. Bromium was acquired by HP Qubes…. I should test this exploit on Qubes, I think it will still work!
-
Why not SELinux instead?
In some ways sshdoc is like a very basic, very simple to use Mandatory Access Control (MAC) system like the NSA’s SELinux or Ubuntu’s AppArmor. AppArmor is a very cool project, and eventually may be very helpful in securing our desktops, but right now it only covers the highest risk/most common applications. You can see […]
-
List of ssh vulnerabilities
See: https://www.cvedetails.com/vulnerability-list/vendor_id-120/SSH.html # CVE ID Vulnerability Type(s) Publish Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail. 1 CVE-2012-5975 Bypass 2012-12-04 9.3 Admin Remote Medium Not required Complete Complete Complete The SSH USERAUTH CHANGE REQUEST feature in SSH Tectia Server 6.0.4 through 6.0.20, 6.1.0 through 6.1.12, 6.2.0 through 6.2.5, and 6.3.0 through 6.3.2 […]
-
pitfalls of ssh_agent
Mirrored from: http://rabexc.org/posts/pitfalls-of-ssh-agents If you are the impatient kind of reader, here is a a few rules of thumb you should follow: Never ever copy your private keys on a computer somebody else has root on. If you do, you just shared your keys with that person. If you also use that key from that […]
-
Is your ssh dirty?
Do you have long gone keys in your ~/.ssh/authorized_keys file? Does you ~/.ssh/known_hosts still include hosts aren’t even online anymore?