On Mon, 2021-09-13 at 19:31 +0000, Marvin Häuser wrote:
> Hey Pedro,
> 
> Same point as before really, why would an attacker have access to
> your SSH key but not your GPG key? This scenario leaves out the
> possibly of  an HTTPS over SSH attack, in which case as a security-
> aware person you use 2FA of course ( :) ), which means this is not
> possible without creating a personal access token. There is very
> little reason to do this at all - I never did this before, and I
> don't know anyone who does this with their private or work GitHub
> account (I think a few use it for CI?), at least that I know of. And
> even if you need one, and you give it  push rights to actually push
> with, and you require GPG signatures globally, you again are keeping
> those two factors at least close together, if not in the same spot.

I think the scenario in question was someone hacking into github.  They
can bypass your ssh login requirement without needing your key, because
that's enforced by github but they can't sign your commit unless they
compromise your laptop or token.  There are many ways of hacking a
cloud service besides simply trying to fake the login or extract the
token from the user.

The way we get around this in Linux is with signed tags, but github
doesn't support that workflow.

I still really don't think signed commits adds much, even to github,
because to be informationally useful, all commits have to be signed. 
Plus, anyway, if the entire site is compromised there'll be bigger
problems than checking commit signatures ...

James




-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#80667): https://edk2.groups.io/g/devel/message/80667
Mute This Topic: https://groups.io/mt/85538324/21656
Group Owner: devel+ow...@edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/unsub [arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-


Reply via email to