This is a bit of frustration post. I’m not a professional and some stuff is super confusing. And it might not even be programming only, as this seems to be a general issue when it comes to signing and security in computers. Every time I have to reinstall my operating system (its really only a few times in a decade), one of the things i fear most is signing into Github, signing keys and setting up local git on my Linux machine. I want the verified badge. Every time its a fight in understanding and doing the right steps, creating gpg keys and access tokens and such.
Am I the only one who struggles with this? Right now I have set it up and my test repository has the badge again. Do people care about this? Especially people like me who does a few little CLI and scripts and nothing else. Am I doing enterprise level security for the sake of an icon or is this really more secure? I do not have ANY professional background. As said I seem to have setup correctly now, so this is not asking for troubleshooting. Just wanted hear about your opinion and experience, and if any of you care.
Every time I have to reinstall my operating system (its really only a few times in a decade),
Reinstalling your operating system once a decade seems a bit excessive. When you’re more experienced you’ll probably not want to do it that often.
creating gpg keys
While it is a good practice to create new PGP keys with some regularity, there’s absolutely no reason to do it at the same time as reinstalling your operating system, doing that is only an unnecessary complication. The normal thing to do is to copy the entire home directory (and at least the keyring) from the old installation to the new.
Am I doing enterprise level security for the sake of an icon or is this really more secure?
The purpose of PGP signing git commits is to make it possible for others to verify that a commit has been created by you and not by someone else pretending to be you
If there are other people who look at your commits and want to verify that they really were made by you then this matters a lot. If no-one does that with your commits, it doesn’t matter at all.
I don’t reinstall very often, usually use it for many years (its a rolling release). But even if I do, that should not be the problem here. As for the process to take over the old signed keys and reuse them, I didn’t know. I always thought the signing is for a specific set of hardware and current os installation. I have the directory .gnupg and the files .git-credentials and .gitconfig. Is there something else I have to copy?
I always thought the signing is for a specific set of hardware and current os installation.
Ah, no, PGP keys are intended for identifying people, not machines.
I have the directory .gnupg
That’s all you need for GPG.
Is there something else I have to copy?
Why not copy your entire home directory?
yk you can backup your passphrase-protected gpg keys in one simple copy/paste command?
GPG keys
There’s your problem right there. Like, really. Use SSH keys for this, it is infinitely easier to deal with.
That has been my experience as well. Signing with SSH keys has been way easier to maintain over time than GPG. Plus you can use the same key to sign that you use for authentication to simplify system setup.
@barf Hmm, I will try SSH next time then.
How often are you reinstalling your OS? Maybe that’s where your frustration should go.
The badge lets others know you’re a masochistic
Regarding access tokens, there’s a third party credential helper for Linux that uses OAuth. I recently found it and started using it a month ago. Works pretty much the same as Git + Windows Credential Manager. In case you are running headless, there is a device mode flag that will allow you to login with the GitHub app on your phone.
https://github.com/hickford/git-credential-oauth
(And if you layer a timed cache helper before the OAuth helper… well you shouldn’t have to reauthenticate every time!)
Otherwise, the Git manual lists some other credential helpers that interface with some password managers.
My goal is to use git only. The problem for me is, this application “git-credential-oauth” is not in the official repository of my distribution. Which is a huge no-no for security related stuff in my opinion.
This is my moment to shine. I hire developers specifically for their Cybersecurity qualifications, and I always look at their GitHub profiles.
So… There’s like a security badge you can get? Neat.
But no, I guess I don’t care about that.
Huh? Gh auth login
I don’t use githubs program, but the regular git. Process is explained here: https://docs.github.com/en/authentication/managing-commit-signature-verification
Yep. The gh utility fixes all that
It’s one of several reasons I moved to Codeberg. The amount of faff wasn’t worth it for the few projects I fiddle with.
this is a security thing, not a taft thing. you don’t need to sign commits to push them
plus gitlab and sourcehut are so much better