|
Lines 631-637
Link Here
|
| 631 |
forward encryption keys. |
631 |
forward encryption keys. |
| 632 |
What this means is that if you have a secure workstation holding |
632 |
What this means is that if you have a secure workstation holding |
| 633 |
keys that give you access to the rest of the system, and you ssh to an |
633 |
keys that give you access to the rest of the system, and you ssh to an |
| 634 |
unsecure machine, your keys become exposed. The actual keys themselves are |
634 |
unsecure machine, your keys becomes exposed. The actual keys themselves are |
| 635 |
not exposed, but ssh installs a forwarding port for the duration of your |
635 |
not exposed, but ssh installs a forwarding port for the duration of your |
| 636 |
login and if a hacker has broken root on the unsecure machine he can utilize |
636 |
login and if a hacker has broken root on the unsecure machine he can utilize |
| 637 |
that port to use your keys to gain access to any other machine that your |
637 |
that port to use your keys to gain access to any other machine that your |