I was reading GitLab’s documentation (see link) on how to write to a repository from within the CI pipeline and noticed something: The described Docker executor is able to authenticate e.g. against the Git repository with only a private SSH key, being told absolutely nothing about the user’s name it is associated with.
If I’m correct, that would mean that technically, I could authenticate to an SSH server without supplying my name if I use a private key?

I know that when I don’t supply a user explicitly like ssh user@server or via .ssh/config, the active environment’s user is used automatically, that’s not what I’m asking.

The public key contains a user name/email address string, I’m aware, is the same information also encoded into the private key as well? If yes, I don’t see the need to hand that info to an SSH call. If no, how does the SSH server know which public key it’s supposed to use to challenge my private key ownership? It would have to iterate over all saved keys, which sounds rather inefficient to me and potentially unsafe (timing attacks etc.).

I hope I’m somewhat clear, for some reason I find it really hard to phrase this question.

  • Irdial
    link
    fedilink
    English
    3927 days ago

    There are instances where the user is implied, but there is always a user. As far as Git goes, the user is almost always git.

      • @[email protected]
        link
        fedilink
        127 days ago

        Yeah either that or they use a custom SSH implementation that just ignores the username because it’s not needed for the type of authentication they’re doing (like checking the keys of a specific account/project that is already known).

  • @taladar
    link
    3027 days ago

    The public key contains a user name/email address string

    No it does not. That is just a comment field.

  • @[email protected]
    link
    fedilink
    1727 days ago

    Technically, you always use a username, however in case of Gitlab that SSH username is always git. When an SSH client connects to server, it offers an authentication method. Gitlab accepts that method only if it is a publickey and the fingerprint of the offered key maps to the known Gitlab user.

    • @[email protected]
      link
      fedilink
      327 days ago

      It’s a blessing and a curse. I have two gitlab accounts on the same server - private and work. I can’t use the same key for both as the key is used to distinguish git users, and git doesn’t make it easy to select which key you want to use to pull or clone particular repo.

      • @drive_desaster
        link
        English
        527 days ago

        Just a thought: why don’t you just use two different aliases for the Server in your .ssh/config with your two differing ssh keys, that way you can just use two different “hostnames” that have different ssh keys specified

        • @[email protected]
          link
          fedilink
          627 days ago

          I could but then i can’t simply copy the “clone” url from the projects page without editing it.

          I think the best solution for me may be to have a separate user account in the OS for work and personal projects. That way i can just log off at the end of the day and use personal account for personal stuff.

  • @[email protected]
    link
    fedilink
    8
    edit-2
    27 days ago

    Public SSH keys don’t contain any user information at all. They could have some metadata for users to easily read, but that can be deleted without repercussions.

    I’m no expert, and this is probably how it does NOT work, but if you have a private key, it can generate the public key, so that could be a way to tell the server “this is me”, now try me.

    Hey I wasn’t so far off!

  • @[email protected]
    link
    fedilink
    5
    edit-2
    27 days ago

    EDIT: Noticed you’re talking about Gitlab in the question, and I responded about Github, but I’m certain that gitlab does everything the same way, because that’s all the technology is capable of. (I have no way to test the ssh -T command at the end for gitlab, though, so ymmv.)

    To clear up some minor confusion here:

    1. Github knows nothing about your private key. There’s very little metadata stored in the private key, and github.com has access to none of it. That includes email address or identity.
    2. Github has identity information stored for you, and then, separately, you uploaded a public key. The public key also contains no information about you, but github knows it’s part of your account. Additionally, github enforces a requirement that your public key can’t be uploaded to any other account, for the reason I’m about to state below.
    3. Github has an index built of everyone’s public keys (or more likely their digests, although the technical details of the index are not something known to me–and it doesn’t matter). When it sees an authentication request, it looks up the digest in the index, which maps to a user account.

    At this point it already knows who is trying to authenticate. Once your authentication request succeeds with your public key (the usual challenge-response handshake associated with asymmetric cryptography), github interacts with your ssh client (most likely git) applying the permissions of your user and your user account.

    BTW, github has a documented method for testing the handshake without doing any git operations:

    ssh -T [email protected]
    

    Depending on your ssh config, you might also need to supply -i some_filename.pem to this. Github will reply with

    Hi aarkon! You've successfully authenticated, but GitHub does not provide shell access.
    

    and then close the connection.

    Note that the test authentication uses the username git and, again, contains no information about who you are. It’s all just looked up on github’s side.

  • @[email protected]
    link
    fedilink
    English
    125 days ago

    It would have to iterate over all saved keys, which sounds rather inefficient to me and potentially unsafe (timing attacks etc.)

    sshd only checks for matches in the user’s authorized_keys file, not system wide.

  • @[email protected]
    link
    fedilink
    127 days ago

    When authenticating with git over SSH, the private key should be considered secret and well protected.

    That means the corresponding public key that was uploaded to the git server is enough to authenticate and no username is required. However, a password protected privare key is possible and extra layers of security can be added to the authentication mechanism.

    As far as resource based attacks based on public key searching, I doubt many servers have significant enough public keys on a single host to even notice. Most repos are siloed and have specific teams/individuals assigned to them, so only a small number of public keys even gets loaded.

    I dont know enough about the server side mechanics to be sure, but imo the attack surface is pretty small.

    • @[email protected]
      link
      fedilink
      127 days ago

      That means the corresponding public key that was uploaded to the git server is enough to authenticate and no username is required.

      A username is required to authenticate with an SSH server. A public key alone is not enough.

      • @[email protected]
        link
        fedilink
        227 days ago

        While true, in most cases the username is simply “git” and not a specific username tied to the pub/priv keypair

        • @[email protected]
          link
          fedilink
          127 days ago

          The post you originally replied to was misunderstanding how the username is located when authenticating with a server.

          Original post:

          The public key contains a user name/email address string, I’m aware, is the same information also encoded into the private key as well?

          Your reply would be creating more confusion, because you implied that no username is required.

          Your reply:

          That means the corresponding public key that was uploaded to the git server is enough to authenticate and no username is required.

          I am just clarifying if the original poster read your comment and was led to believe they wouldn’t need a username. It is, in fact, required. As you expressed, it’s usually “git” when connecting to a a git server, but it doesn’t have to be.

  • @FigMcLargeHuge
    link
    English
    027 days ago

    I only have experience with Bitbucket, and absolutely none if this may be applicable to you, but we have to generate a key with certain parameters (a minimum) for them to work, and the public key has to be input into a field on your account. So while you do not need to “provide” a username to perform git commands, it is set up in your account as your private key. The command to gen the key is: ssh-keygen -t rsa -m PEM -b 4096 -C “[email protected]

    Once you put your public key into your bitbucket account, using that key will mark all changes you make to you. Is this what you are talking about or am I just off in left field?