Hacker News new | past | comments | ask | show | jobs | submit login

If you want a concrete hardening step to avoid this attack, try using a hardware PIV/CAC device (e.g. a Yubikey) as the only copy of your private keys.

This is very easy to setup on MacOS High Sierra or later (https://support.apple.com/en-us/HT208372):

1. Generate the key: https://developers.yubico.com/yubico-piv-tool/Actions/key_ge...

2. Use "ssh-keygen -D /usr/lib/ssh-keychain.dylib" to extract the public key fingerprint to put in your authorizes keys list.

3. Add this line to your SSH config file to tell the client to attempt to login using the key on your device: “PKCS11Provider=/usr/lib/ssh-keychain.dylib“

On Windows, Putty-CAC supports this and can reportedly be used with Git: https://piv.idmanagement.gov/engineering/ssh/#ssh-using-putt...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: