Avoid leaking your SSH public keys
In default SSH config, it’s most likely that if you connect an unknown SSH server, the server is able to enumerate all your public keys in your agent by keeping rejecting your public keys tried. This seems how the SSH protocol work. It doesn’t pose a security risk, but it does have some Privacy concerns - those public keys can identify who you are on the web. The fix? It’s simple: I think either of the following will work (I personally tried method #2):
- Append to the end of
/etc/ssh/ssh_config
or put at the beginning of~/.ssh/config
(as suggested bychrisfosterelli
on HN1) the following:
- Append to the end of
/etc/ssh/ssh_config
or~/.ssh/config
the following:
Reference: