Hacker News new | past | comments | ask | show | jobs | submit login

This exposed client keys, not server keys. The client keys are at risk only in a handful of specific scenarios - e.g., if used to connect to rogue or compromised servers, or used for signing outside SSH.

This is not exploitable by simply passively watching traffic, so even for client keys, if you're certain that they were used in a constrained way, you should be fine. The difficulty is knowing that for sure, so it's still prudent to rotate.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: