mirror of
https://github.com/Qubes-Community/Contents.git
synced 2024-10-01 01:05:51 -04:00
Update split-ssh.md
This commit is contained in:
parent
b89575f85c
commit
be35336ec2
@ -371,7 +371,7 @@ In order to gain access to the vault VM, the attacker would require the use of,
|
|||||||
|
|
||||||
## Further Security tips
|
## Further Security tips
|
||||||
### Regarding Your SSH Private Key
|
### Regarding Your SSH Private Key
|
||||||
* This goes without saying but keep your private keys **private**.
|
* This goes without saying: keep your private keys **private**.
|
||||||
* Tinkering with the user permissions is not necessary since it is assumed that an adversary who can find a Xen VM escape exploit is also capable of finding a user to root escalation exploit.
|
* Tinkering with the user permissions is not necessary since it is assumed that an adversary who can find a Xen VM escape exploit is also capable of finding a user to root escalation exploit.
|
||||||
* Use Yubikey with SSH. Check [yubikey-agent](https://github.com/FiloSottile/yubikey-agent), [yubikey-ssh](https://github.com/jamesog/yubikey-ssh) and the [Yubikey documentation](https://developers.yubico.com/SSH/) for more information.
|
* Use Yubikey with SSH. Check [yubikey-agent](https://github.com/FiloSottile/yubikey-agent), [yubikey-ssh](https://github.com/jamesog/yubikey-ssh) and the [Yubikey documentation](https://developers.yubico.com/SSH/) for more information.
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user