Research
Security News
Malicious npm Package Targets Solana Developers and Hijacks Funds
A malicious npm package targets Solana developers, rerouting funds in 2% of transactions to a hardcoded address.
github-auth allows you to quickly pair with anyone who has a GitHub account
by adding and removing their public ssh keys from your
authorized_keys
file.
If you agree to #pairwithme, we'll probably be SSHing into my laptop, your laptop, or some laptop in the sky. Sharing passwords over email is no fun, so we'll use public key authentication to keep things fun, fast, and secure.
Let's see how this works.
After you've installed gh-auth
, you can give me ssh access
with:
$ gh-auth add --users=chrishunt
Adding 2 key(s) to '/Users/chris/.ssh/authorized_keys'
If you'd like me to automatically connect to your existing tmux session, you can do that with a custom ssh command:
$ gh-auth add --users=chrishunt --command="tmux attach"
Adding 2 key(s) to '/Users/chris/.ssh/authorized_keys'
That was easy! When we're done working, you can revoke my access with:
$ gh-auth remove --users=chrishunt
Removing 2 key(s) from '/Users/chris/.ssh/authorized_keys'
You can add and remove any number of users at the same time.
$ gh-auth add --users=chrishunt zachmargolis
Adding 4 key(s) to '/Users/chris/.ssh/authorized_keys'
$ gh-auth list
chrishunt zachmargolis
$ gh-auth remove --users=chrishunt
Removing 2 key(s) from '/Users/chris/.ssh/authorized_keys'
$ gh-auth list
zachmargolis
$ gh-auth remove --users=zachmargolis
Removing 2 key(s) from '/Users/chris/.ssh/authorized_keys'
$ gh-auth list
If you'd like to remove all GitHub users in one fatal swoop, you can do that too.
$ gh-auth remove --users=`gh-auth list`
gh-auth
can be used from the command line after the gem has been installed.
$ gh-auth
Commands:
gh-auth add --users=one two three # Add GitHub users to authorized keys
gh-auth help [COMMAND] # Describe available commands or one specific command
gh-auth list # List all GitHub users already added to authorized keys
gh-auth remove --users=one two three # Remove GitHub users from authorized keys
gh-auth version # Show gh-auth version
Options:
[--host=HOST]
[--path=PATH]
Use the help
command for help on a specific command.
$ gh-auth help add
Usage:
gh-auth add --users=one two three
Options:
--users=one two three
[--command=COMMAND]
[--host=HOST]
[--path=PATH]
Description:
`gh-auth add` is used to add one or more GitHub user's public SSH keys to ~/.ssh/authorized_keys. All keys stored on github.com for that user will be added.
> $ gh-auth add --users=chrishunt zachmargolis
> Adding 6 key(s) to '/Users/chris/.ssh/authorized_keys'
By default, users will be granted normal shell access. If you'd like to specify an ssh command that should execute when the user connects, use the `--command` option.
> $ gh-auth add --users=chrishunt --command="tmux attach"
Want to add/remove keys in your project, but not on the command line? That's ok too.
require 'github/auth'
# Add keys for GitHub user 'chrishunt'
Github::Auth::CLI.start %w(add --users=chrishunt)
# Remove keys for GitHub user 'chrishunt'
Github::Auth::CLI.start %w(remove --users=chrishunt)
Install the github-auth
gem:
$ gem install github-auth
Public key authentication works with Mac OS by default, but you'll need to get your ssh server running. This is done by ticking 'Remote Login' in the 'Sharing' panel of System Preferences.
Now that SSH is running, make sure you have the correct permissions set for your authorized keys.
$ chmod 700 ~/.ssh
$ chmod 600 ~/.ssh/authorized_keys
If you'd like to verify that everything is working as expected, you can test locally on your own machine.
First, authorize yourself for ssh. (Make sure to replace 'chrishunt' with your GitHub username)
$ gh-auth add --users=chrishunt
Adding 2 key(s) to '/Users/chris/.ssh/authorized_keys'
Now that your keys are added, verify that you can open an SSH session to your machine with public key authentication:
$ ssh -o PreferredAuthentications=publickey localhost
(localhost)$
Next, remove your public keys from the keys file:
$ gh-auth remove --users=chrishunt
Removing 2 key(s) from '/Users/chris/.ssh/authorized_keys'
Now that you've removed your keys, verify that you can no longer log in to your machine with public key authentication:
$ ssh -o PreferredAuthentications=publickey localhost
> Permission denied (publickey,keyboard-interactive)
Good question! Others will connect to your machine using ssh:
$ ssh username@external-ip-address
The username
is going to be the same username that you used to add the keys.
In most cases, it's a good idea to create a new pair
account and use that
account for all pairings. You don't want strangers reading your email!
Once you've created the pair account, you can switch to it yourself in a terminal with:
$ su - pair
You can get your external IP address with:
$ curl http://remote-ip.herokuapp.com
In almost all cases, your laptop is not directly plugged into your modem. You're on a wireless network or plugged directly into a router or switch. This means the external IP address that your pair is connecting to is not your machine, it's actually your router.
You can tell your router to forward ssh connections to your machine by enabling
port forwarding. You will want
to forward port 22
(ssh) to the local IP address of your machine.
If port 22
is already forwarded to another machine or you want to change
things up, you can have ssh listen on another port and have your pair connect
with:
ssh -p <port> username@external-ip-address
Yes! A nice solution to this is to have a machine somewhere else that both of you can ssh into. Place this machine on a network that you do have the ability to forward ports. Maybe this machine is at home, a friend's house, or at a company you worked for in the past that forgot to turn it off.
If this isn't possible, then you can use a VPS provider like Linode to setup a pairing machine in the cloud or a tunneling solution like PageKite or Hamachi to make your machine accessible without forwarding ports.
Please see the Contributing Document
Please see the Changelog Document
Copyright (C) 2013 Chris Hunt, MIT License
FAQs
Unknown package
We found that github-auth demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A malicious npm package targets Solana developers, rerouting funds in 2% of transactions to a hardcoded address.
Security News
Research
Socket researchers have discovered malicious npm packages targeting crypto developers, stealing credentials and wallet data using spyware delivered through typosquats of popular cryptographic libraries.
Security News
Socket's package search now displays weekly downloads for npm packages, helping developers quickly assess popularity and make more informed decisions.