https://blog.thc.org/infecting-ssh-public-keys-with-backdoors

I am not a security expert and I wonder:

  1. Does the described method infect the remote or local machine (from which I connect)?
  2. Can this method be prevented? For example, correctly configuring your etc/ssh/ssh_config

It seems that every VPS supplier can hack you? The description shows that AWS does “harmless”, but what if my hosting is a bad actor?

  • treadful@lemmy.zip
    link
    fedilink
    English
    arrow-up
    5
    ·
    9 days ago

    OpenSSH has an unsung feature to execute a command (instead of a Shell) when a user successfully logs in.

    It’s remote.

    Also, it’s not really that exciting. They already would need access to your account. It would be very obvious when copying it as well.