Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Also set your shell config so they don't save history persistently.

Anything that you use history for should be set as an alias or shell function or script.



The concern being raised here is that transcript-level SSH audit logs are the equivalent of permanent shell histories for everyone, and they are. But if you're giving team members a reason to ever type a password into an SSH session, you're got a bigger gap to close. We already have to do secrets management at scale, because it's a feature we provide to our customers, and so we already have a process for loading secrets into environments for host work.


I'd be more worried (but not terrified) that the session transcripts can teach an attacker a fair bit about how systems work, should an attacker get access to those. Of course only a small subset of attackers is going to care...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: