If you connect to a compromised server using SSH keys (not passwords) is
it possible for the compromised server to record your SSH key so they
can use it on other servers you log into?
Opinions?
--
Regards,
Peter Kiem
Zordah IT - IT Consultancy and Internet Services
Ph: (0414) 724-766 Fax: (07) 3344-5827
Web: www.zordah.net Email: zordah@zordah.net