I feel like this gets posted every other month or so. I appreciate the awareness, but it doesn't seem like there's much new discussion or debate to have on the matter: folks continue to be a bit more careless with credentials than they ought to be / don't think about what pushing something to a public site means / etc, it would rock if GitHub was more proactive about messaging affected users, it sucks that it's hard to safeguard against this via technical means.
If anything, I'd love to see somebody do a blog post instead about how they started scraping these results and/or the commit data firehose and messaging users who posted credentials
Hmmph. I just found a bunch of free AWS keys by searching for amazon.yml, too.
What is the best way to share things like API keys among a team of developers, anyway? I'm surprised this hasn't been solved already (perhaps it has and I just don't know about it). I know you can share passwords with tools like LastPass and 1Password, and I suppose you could use those for API keys as well?
It'd be nice if you could, e.g., include a gem in a Rails project, get a single key/password/token from one of the team members on that project, and use that w/ a third party API to set all the requisite API keys for all the third party services used on a project. You could also rotate the master password when team members leave the group.
FWIW, Amazon proactively scans GitHub for AWS key leaks, notifies the account holder, and flags the account (they will disable the account if they start seeing active abuse and can't get in touch with the actual owner to get keys rotated). So any keys you find are going to get invalidated in short order.
They're also pretty good about forgiving the charges for the fraudulent use.
> What is the best way to share things like API keys among a team of developers, anyway? I'm surprised this hasn't been solved already (perhaps it has and I just don't know about it). I know you can share passwords with tools like LastPass and 1Password, and I suppose you could use those for API keys as well?
Here, we have an IAM account for each dev. Permissions are basically read anything except a few sensitive things (billing, IAM), plus the write permissions we need as operators. We each have our own console login password, and keep our own access keys locally. It's pretty easy to add/remove accounts for new/departing devs, and the potential to individualize permissions is there.
I worked on a project called Spore (http://spore.sh) to do this with a command-line tool. It works fairly well, although I've had a hard time communicating how it works to folks.
Like passwords, sharing API keys is usually a bad thing. For some sites it is overkill or simply not possible but for something like AWS there is no excuse not to make individual IAM users with their own passwords and keys.
for AWS...dont use access tokens/secrets, and just use instance profiles(theres a few mock metadata service projects). For other things, theres a bunch of services like hashicorp's vault or amazon kms that store passwords. kms + instance roles gets you fairly close, but its not really friendly to set up
Responsibility? No, why would they. But.... I think it would be a great feature for GitHub to passively scan repos and look for common security oversights. They could then just send an e-mail notification about the issue.
No. There are valid cases to upload SSH keys and other certificates or secrets. Preventing it would be annoying, and near impossible to be very effective.
Amazon does help with it. A friend of mine recently went through a newbie programmer class and forgot the teacher instructed them to keep their AWS SSH keys out of their repo and within a 20-hour period someone racked up tens of thousands of dollars in EC2 charges! Amazon kindly refunded the entire bill.
It would be really cool if Github let users know when they are about to do something that is almost certainly a horrible mistake. However, is it their responsibility to stop them? I hope not. They provide a service that does exactly what it says on the box. Github shouldn't be obligated to prevent people from committing files that are otherwise valid and legal.
A better question would be: Could Github be successfully found liable for other users leaving their own keys in a public repository?
I think it would be very useful for repositories to have a default server-side push hook that scans for the most common mistakes, rejecting the push while printing an URL to a page explaining what's going on and with a checkbox for opting out on the check for future pushes to that repo.
I don't think they remove it. I do believe that they send an automated email if they detect private keys from being committed to a public repo though. Amazon does something similar to this and they even revoke the key if they see that its public.
They have blocked the search for private keys (id_rsa) but they still need to block the search for public keys (id_rsa.pub); they're usually stored together anyway. I just did this search.
Guyag|10 years ago
akerl_|10 years ago
If anything, I'd love to see somebody do a blog post instead about how they started scraping these results and/or the commit data firehose and messaging users who posted credentials
herge|10 years ago
__abc|10 years ago
mosburger|10 years ago
What is the best way to share things like API keys among a team of developers, anyway? I'm surprised this hasn't been solved already (perhaps it has and I just don't know about it). I know you can share passwords with tools like LastPass and 1Password, and I suppose you could use those for API keys as well?
It'd be nice if you could, e.g., include a gem in a Rails project, get a single key/password/token from one of the team members on that project, and use that w/ a third party API to set all the requisite API keys for all the third party services used on a project. You could also rotate the master password when team members leave the group.
Nacraile|10 years ago
They're also pretty good about forgiving the charges for the fraudulent use.
> What is the best way to share things like API keys among a team of developers, anyway? I'm surprised this hasn't been solved already (perhaps it has and I just don't know about it). I know you can share passwords with tools like LastPass and 1Password, and I suppose you could use those for API keys as well?
Here, we have an IAM account for each dev. Permissions are basically read anything except a few sensitive things (billing, IAM), plus the write permissions we need as operators. We each have our own console login password, and keep our own access keys locally. It's pretty easy to add/remove accounts for new/departing devs, and the potential to individualize permissions is there.
Couto|10 years ago
And it might be possible to achieve some success with git filters[2], at least to avoid pushing secrets into the repository.
Still... just my two cents, I'm not exactly a pro-user of those two features
[1](https://github.com/StackExchange/blackbox)
[2](https://stackoverflow.com/questions/6557467/can-git-ignore-a...)
tg3|10 years ago
adelevie|10 years ago
admiun|10 years ago
idunno246|10 years ago
daenney|10 years ago
bagels|10 years ago
nodesocket|10 years ago
grhmc|10 years ago
Just my $0.02.
stephenhuey|10 years ago
nightmiles|10 years ago
A better question would be: Could Github be successfully found liable for other users leaving their own keys in a public repository?
ams6110|10 years ago
0x0|10 years ago
sluzorz|10 years ago
jnevill|10 years ago
Kenji|10 years ago
avinassh|10 years ago
https://github.com/<username>.keys
ex.: https://github.com/avinassh.keys
bradleyland|10 years ago
-y This option will read a private OpenSSH format file and print an OpenSSH public key to stdout.
For example:
ssh-keygen -y -f id_rsa > id_rsa.pub
geographomics|10 years ago
eykanal|10 years ago
peterwwillis|10 years ago
orbjuice|10 years ago
netik|10 years ago
However, The majority of the keys I'm seeing are either encrypted, test fixtures, or otherwise. There are many unencrypted keys available, though!
It's still surprising that people continue to check in private keys. No one learns.
H2CO3|10 years ago
iamroot|10 years ago
allworknoplay|10 years ago
Example: https://github.com/search?utf8=%E2%9C%93&q=filename%3Aid_rsa...
adelevie|10 years ago
xiata|10 years ago
filename:id_ed25519 filename:id_rsa filename:id_dsa filename:id_ecdsa
unknown|10 years ago
[deleted]
emddudley|10 years ago
unknown|10 years ago
[deleted]
unknown|10 years ago
[deleted]