Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 15 submissions in the queue.
posted by janrinok on Monday March 13 2023, @10:39AM   Printer-friendly

On March 13, we will officially begin rolling out our initiative to require all developers who contribute code on GitHub.com to enable one or more forms of two-factor authentication (2FA) by the end of 2023.

GitHub is central to the software supply chain, and securing the software supply chain starts with the developer. Our 2FA initiative is part of a platform-wide effort to secure software development by improving account security. Developers' accounts are frequent targets for social engineering and account takeover (ATO). Protecting developers and consumers of the open source ecosystem from these types of attacks is the first and most critical step toward securing the supply chain.

[...] If your account is selected for enrollment, you will be notified via email and see a banner on GitHub.com, asking you to enroll. You'll have 45 days to configure 2FA on your account—before that date nothing will change about using GitHub except for the reminders. We'll let you know when your enablement deadline is getting close, and once it has passed you will be required to enable 2FA the first time you access GitHub.com. You'll have the ability to snooze this notification for up to a week, but after that your ability to access your account will be limited.

So, what if you're not in an early enrollment group but you want to get started? Click here and follow a few easy steps to enroll in 2FA.

[...] You can choose between TOTP, SMS, security keys, or GitHub Mobile as your preferred 2FA method.

Recent GitHub security incidents:
GitHub says hackers cloned code-signing certificates in breached repository(1/30/2023)
Slack's private GitHub code repositories stolen over holidays(1/5/2023)
Okta's source code stolen after GitHub repositories hacked(12/21/2022)


Original Submission

 
This discussion was created by janrinok (52) for logged-in users only, but now has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 1, Insightful) by Anonymous Coward on Monday March 13 2023, @10:57AM (12 children)

    by Anonymous Coward on Monday March 13 2023, @10:57AM (#1295873)

    Do you trust Microsoft, and especially the Googley nu-Microsoft, not to misuse the 2FA data in the same fashion other large advertising driven entities have?

    Starting Score:    0  points
    Moderation   +1  
       Insightful=1, Total=1
    Extra 'Insightful' Modifier   0  

    Total Score:   1  
  • (Score: 4, Informative) by PiMuNu on Monday March 13 2023, @11:42AM (10 children)

    by PiMuNu (3823) on Monday March 13 2023, @11:42AM (#1295875)

    I was trying to figure out how TOTP works. The documentation is here:

    https://docs.github.com/en/authentication/securing-your-account-with-two-factor-authentication-2fa/configuring-two-factor-authentication [github.com]

    But it sounds like they are leaning on user creating an account for another web service (which has TFA?? who knows) that does the second factor. In any case I don't really see that this is any more secure than ssh keys; presumably as with an ssh key, the best that can be done is install "some application" on my local machine; that requires me to enter a local password to unlock a one time password that I send to github. An attacker who pwns my local machine can still attack my github account as previously.

    • (Score: 4, Informative) by fab23 on Monday March 13 2023, @12:23PM (7 children)

      by fab23 (6605) Subscriber Badge on Monday March 13 2023, @12:23PM (#1295878) Homepage Journal

      TOTP (Time-Based One-Time Password) is an open standard defined in RFC 6238 [rfc-editor.org] (Wikipedia [wikipedia.org]).

      If you are old enough, you may remember the RSA SecurID [wikipedia.org] hardware token. Now we have smartphones and you can use such things in Software, e.g. on iOS I like OTP Auth [apple.com], but there are others like Authy or Google Authenticator. For Android you may also find some open source Apps. According to friends there are also cli tools available.

      I highly recommend to save the initial presented QR code image in a secure place, as this can be used if you need to initialize on another phones. Some of the above mention TOTP Apps support an export / backup of tokens. Depending on the implementation a regular backup and restore to another smartphone may not work, as it kind is bound to a hardware ID of the device.

      • (Score: 2, Insightful) by janrinok on Monday March 13 2023, @12:34PM (3 children)

        by janrinok (52) Subscriber Badge on Monday March 13 2023, @12:34PM (#1295881) Journal

        Doesn't this mean that Microsoft get your smartphone/cell phone number too? I am not giving Microsoft my smartphone number.

        • (Score: 3, Informative) by fab23 on Monday March 13 2023, @12:38PM

          by fab23 (6605) Subscriber Badge on Monday March 13 2023, @12:38PM (#1295883) Homepage Journal

          At Github you have multiple options for 2FA, SMS (text) is one of them, but with TOTP they do not need to have your phone number.

          As far as I remember so far, only for the Google (Gmail) account you are forced to first add a phone number (can be mobile or land line) before you can activate TOTP.

        • (Score: 2) by fab23 on Monday March 13 2023, @12:46PM

          by fab23 (6605) Subscriber Badge on Monday March 13 2023, @12:46PM (#1295885) Homepage Journal

          Some more details, when you activate TOTP in your account, you are presented with a QR code (which actually is just a string of "random" characters). That you need to scan with your chosen TOTP App. Don't forget to also save the QR image, or make a screen shot. Then you need to enter the code presented on your App into the Website and your 2FA is activated. Next time you log in you will be asked for username and password as usual and then also for the current code the TOTP App shows (they usually change every minute).

        • (Score: 2) by Beryllium Sphere (r) on Monday March 13 2023, @06:10PM

          by Beryllium Sphere (r) (5062) on Monday March 13 2023, @06:10PM (#1295944)

          If you pick SMS as your authentication choice, but they offer many others and I don't know anyone who recommends SMS if there's an alternative. NIST has pointed out the drawbacks in detail.

      • (Score: 3, Informative) by fab23 on Monday March 13 2023, @12:35PM

        by fab23 (6605) Subscriber Badge on Monday March 13 2023, @12:35PM (#1295882) Homepage Journal

        Checked my notes, also KeePassXC [keepassxc.org] could be use to store the TOTP code, see in FAQ the KeePassXC allows me to store my TOTP secrets. [keepassxc.org].

        So there is no need for a smartphone.

      • (Score: 2) by PiMuNu on Monday March 13 2023, @01:00PM

        by PiMuNu (3823) on Monday March 13 2023, @01:00PM (#1295887)

        Thanks. Again, I don't see how this is much different to a private/public password as in ssh.

      • (Score: 1, Interesting) by Anonymous Coward on Monday March 13 2023, @05:39PM

        by Anonymous Coward on Monday March 13 2023, @05:39PM (#1295936)

        I am old enough to remember the RSA SecureID token. I felt somewhat important getting one, and it also made me feel a bit more confident about my job. I fully realize there was no logic to that. I'm sure plenty of people have been laid off the day after they got a token, but it was hard not to feel like I was a member of the club and would be OK for a while.

    • (Score: 2) by Beryllium Sphere (r) on Monday March 13 2023, @06:15PM

      by Beryllium Sphere (r) (5062) on Monday March 13 2023, @06:15PM (#1295947)

      It's to protect against phishing or credential stuffing.

      Though even if your machine is compromised, requiring a hardware token in the USB slot or a rotating code from an authenticator app on your phone will save the day.

    • (Score: 2) by Beryllium Sphere (r) on Monday March 13 2023, @06:29PM

      by Beryllium Sphere (r) (5062) on Monday March 13 2023, @06:29PM (#1295953)

      The token comes from a local phone app, but I don't know whether or not those work without a cloud account for backup.

  • (Score: 2) by Beryllium Sphere (r) on Monday March 13 2023, @06:22PM

    by Beryllium Sphere (r) (5062) on Monday March 13 2023, @06:22PM (#1295950)

    Please walk me through how someone could "misuse" the one-time token from my Yubikey.

    Wait, maybe I understand. You're looking at SMS "authentication", and don't like the idea of giving an evil company your cell number? That makes sense. Though using SMS for 2FA does not make sense even from a security standpoint.