We just open sourced a new key management project for ssh to reduce risk of lateral movementhttps://medium.com/uber-security-privacy/introducing-the-uber-ssh-certificate-authority-4f840839c5cc#.hxvdrbcds …
-
-
meaning that if a user connects to a compromised server, the server can impersonate the user when connecting to other servers?
-
as far as I can tell, the PAM module needs to be able to connect to a forwarded agent that permits it to sign random data?
- 2 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.