From 51cf888d611d3a9ff00a4f3f7d9b889426b76dee Mon Sep 17 00:00:00 2001
From: nya-furball <80190380+nya-furball@users.noreply.github.com>
Date: Fri, 16 Apr 2021 13:25:10 +0000
Subject: [PATCH] Updated Privacy and Anonymity (markdown)
---
Privacy-and-Anonymity.md | 7 ++++++-
1 file changed, 6 insertions(+), 1 deletion(-)
diff --git a/Privacy-and-Anonymity.md b/Privacy-and-Anonymity.md
index 703e982..0c12151 100644
--- a/Privacy-and-Anonymity.md
+++ b/Privacy-and-Anonymity.md
@@ -30,6 +30,8 @@ Same issue as ssh-agent, but with PKCS11 Identities.
Forwards your local connection to your authentication agent over the ssh tunnel. A malicious server can use this to attack your local machine.
### ForwardX11:
Redirects X11 connections over the ssh tunnel. THIS IS DANGEROUS as any remote user that can bypass file restrictions can access your local X11 display! A malicious server or any server operating in a hostile environment can attack your local machine!
+### SSH Client Version String:
+Your client version string is sent in cleartext. Eavesdropping adversaries and the server will likely know what OS you are using and gain more information on your operations setup by looking at the version string.
# Mitigations
### OpenSSH:
@@ -56,7 +58,10 @@ Explaination:
TODO
# Sources Referenced:
-
+List of Default keys and Disable SSH Agent from sending keys:
+https://serverfault.com/questions/139870/stop-ssh-client-from-offering-all-the-public-keys-it-can-find/515214#515214
+Dangerous features to enable in OpenSSH Client while connecting to servers:
+https://unix.stackexchange.com/questions/106595/myth-or-reality-selinux-can-confine-the-root-user
# Page TODO:
- Explain Threat modeling