mirror of
https://github.com/Qubes-Community/Contents.git
synced 2025-05-03 14:56:05 -04:00
Update split-ssh.md
This commit is contained in:
parent
c2df9591c3
commit
d2ad5e066b
1 changed files with 1 additions and 1 deletions
|
@ -366,7 +366,7 @@ Check if it returns `ssh-ed25519 <public key string>`
|
||||||
## Security Benefits
|
## Security Benefits
|
||||||
|
|
||||||
In the setup described in this guide, even an attacker who manages to gain access to the `ssh-client` VM will not be able to obtain the user’s private key since it is simply not there.
|
In the setup described in this guide, even an attacker who manages to gain access to the `ssh-client` VM will not be able to obtain the user’s private key since it is simply not there.
|
||||||
Rather, the private key remains in the `vault` VM, which is extremely unlikely to be compromised, if nothing is ever copied or transferred into it.
|
Rather, the private key remains in the `vault` VM, which is extremely unlikely to be compromised if nothing is ever copied or transferred into it.
|
||||||
In order to gain access to the vault VM, the attacker would require the use of, e.g., a general Xen VM escape exploit or a signed, compromised package which is already installed in the TemplateVM upon which the vault VM is based.
|
In order to gain access to the vault VM, the attacker would require the use of, e.g., a general Xen VM escape exploit or a signed, compromised package which is already installed in the TemplateVM upon which the vault VM is based.
|
||||||
|
|
||||||
## Further Security tips
|
## Further Security tips
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue