Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 14 submissions in the queue.
posted by janrinok on Tuesday March 28 2023, @04:31PM   Printer-friendly

GitHub publishes RSA SSH host keys by mistake, issues update:

GitHub has updated its SSH keys after accidentally publishing the private part to the world. Whoops.

A post on Github's security blog reveals that the company has changed its RSA SSH host keys. This is going to cause connection errors, and some frightening warning messages, for a lot of developers, but it's all right: it's not scary cracker activity, just plain old human error.

Microsoft subsidiary GitHub is the largest source code shack in the world, with an estimated 100 million active users. So this is going to inconvenience a lot of people. It's not the end of the world: if you normally push and pull to GitHub via SSH – which most people do – then you will have to delete your local GitHub SSH key, and fetch new ones.

As the blog post describes, the first symptom is an alarming warning message[.]

For almost everyone, this warning is spurious. It's not that you're being attacked – although that is always a remote (ha ha, only serious) possibility – it's that GitHub revoked its old keys and published new ones. Hanlon's Razor applies, as it most often does:

Never attribute to malice that which can be adequately explained by stupidity. (The word stupidity is often replaced with incompetence, but then, one does tend to lead to the other.)

This time, the reason was – as usual – plain old human error. Someone published GitHub's private RSA keys in a repository on GitHub itself. If you're unclear how SSH encryption works, about public versus private keys, or the different cryptographic algorithms SSH uses, there are many good explanations out there.


Original Submission

This discussion was created by janrinok (52) for logged-in users only, but now has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
(1)
  • (Score: 5, Insightful) by captain normal on Tuesday March 28 2023, @05:40PM (4 children)

    by captain normal (2205) on Tuesday March 28 2023, @05:40PM (#1298525)

    "Microsoft subsidiary GitHub..." GitHub jumped the shark about 5 years ago and was eaten by it.
      Over 100,000 software engineers with no clear organization or direction, what can possibly go wrong? Same with Google and several other large Corps.

    --
    Everyone is entitled to his own opinion, but not to his own facts"- --Daniel Patrick Moynihan--
    • (Score: 0) by Anonymous Coward on Tuesday March 28 2023, @06:29PM (3 children)

      by Anonymous Coward on Tuesday March 28 2023, @06:29PM (#1298539)

      Microsoft employs +100k people, but only a small amount of those are engineers. Most of them are non-engineers, as evidenced by the shite they've been putting out under the flimsy cover of "our products".

  • (Score: 2) by bmimatt on Tuesday March 28 2023, @09:24PM

    by bmimatt (5050) on Tuesday March 28 2023, @09:24PM (#1298560)

    Things like https://github.com/thoughtworks/talisman [github.com] would've likely prevented this "human error", if people cared just a little more.

  • (Score: 2) by ElizabethGreene on Wednesday March 29 2023, @02:35PM

    by ElizabethGreene (6748) Subscriber Badge on Wednesday March 29 2023, @02:35PM (#1298640) Journal

    (Be gentle, I'm asking in ignorance.)

    Shouldn't high-value keys like that be generated by and stored in a Hardware Security module where this can't happen? Like just not possible because the private key is in the HSM and never leaves?

(1)