> Since tty sessions are usually separated by different users, how would > they have the same one and yet need something like this? > > Also, why not put this in the tty config section?
The normal attack use case people argue about is a rogue process on the users machine sitting there waiting until the user has logged in to a remote machine and is idle and then doing stuff. Attackers of course don't bother doing that because it's easier to get the user to run a different ssh client instead. Alan

