From 014bb7d6bba925980cdea555a908d4b429da1e24 Mon Sep 17 00:00:00 2001 From: Santori Helix <74464484+santorihelix@users.noreply.github.com> Date: Wed, 18 Nov 2020 20:30:59 +0000 Subject: [PATCH] Update split-ssh.md --- docs/configuration/split-ssh.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/configuration/split-ssh.md b/docs/configuration/split-ssh.md index 38884ea..08d6640 100644 --- a/docs/configuration/split-ssh.md +++ b/docs/configuration/split-ssh.md @@ -375,7 +375,7 @@ In order to gain access to the vault VM, the attacker would require the use of, * Tinkering with the user permissions is not necessary since it is assumed that an adversary who can find a Xen VM escape exploit is also capable of finding a user to root escalation exploit. * Use Yubikey with SSH. Check [yubikey-agent](https://github.com/FiloSottile/yubikey-agent), [yubikey-ssh](https://github.com/jamesog/yubikey-ssh) and the [Yubikey documentation](https://developers.yubico.com/SSH/) for more information. - ![Yubikey diagram](https://raw.githubusercontent.com/santorihelix/qubes-splitssh-diagram/85e9cd09854231816f478159c42d5bce3e339648/split-ssh-keepassxc-yubikey.svg) + ![yubikey diagram](https://raw.githubusercontent.com/santorihelix/qubes-splitssh-diagram/85e9cd09854231816f478159c42d5bce3e339648/split-ssh-keepassxc-yubikey.svg) ### Regarding Your KeePassXC Database File Although the database file is encrpyted with your password, if you haven't taken any protective measures, it can be bruteforced.