On 27/11/15 22:55, Andrey Utkin wrote:
> Any comments?

Could you outline a sequence of steps that goes wrong without your
solution and right with it?

Like:

- SSH to compromised PC
- Use SSH agent forwarding
- While logged in to compromised PC, SSH from there to another

Wrong:
- Compromised PC opens whole host of SSH connections purporting to be you

Right:
- Keychain confirmation server comes in guns blazing, data center
containing compromised server turns into mushroom cloud
- Mushroom clouds don't impersonate sysadmins

I'd like to see a detailed usage scenario. Preferably with mushroom clouds.

Peter.

-- 
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at <http://digitalbrains.com/2012/openpgp-key-peter>

_______________________________________________
Gnupg-users mailing list
[email protected]
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to