-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
git ssh credentials #120
Comments
I have experienced the same issue. (Tested on dev sandbox.) Apparently every time the sandbox is restarted, all files under the home directory have their permissions changed, to be permissive of read/write by both owner and other members of the group. This includes all contents of the hidden You can fix this by deleting and re-generating your SSH key pair (and re-certifying your new public key to the remote host) each time. (Alternatively, it might be sufficient to use I'm not sure whether or not this is a true security hole (noting that all sandbox users seem to be presented the same unix username on sandbox, so the unix file permissions are kind of irrelevant anyway, but possibly your own home directory gets mounted from somewhere that many other ordinary users actually cannot easily access for other reasons, I'm not too sure). I think it would help if the sandbox did not change the permissions of users files, and if there was some security advice provided on the splash page. |
Likely to affect more users since GitHub deprecated password authentication (because retyping full account passwords into terminals is not considered best practice for security) as of mid Nov 2020. This issue seems likely intertwined to #79 (specific practices reducing isolation between private data and public history). |
I initially assumed that our custom startup scrips were responsible (deliberately resetting permissions to prevent git sync failure), but, that An alternate possibility could be a docker misconfiguration (e.g. mismatched UID or GID between inside and outside of the container) semi-related to #57 (GID 40000 not in
Another observation, by running These timestamps could be used to narrow down which process is responsible? (Something after AttachVolume.Attach succeeded and before Created container notebook..) |
Actually this seems to be documented behaviour (or known problem) of kubernetes. When preparing to mount a volume for a pod (e.g. before starting the containers), kubernetes recursively changes the ownership and permissions inside that mount. We should probably try explicitly setting:
(Although it may also require The change policy should prevent permissions being changed on successive logins. |
Git commands over ssh have stopped working on my DEA Sandbox instance. For example, I can't clone a public github repo:
I have tried adding a key under the .ssh directory but the system doesn't seem to like that:
I'm not sure if the problem is specific to my instance or there is a more generic problem affecting other instances. I'd be happy to reset my instance to the initial config and contents if that solves the problem.
Thanks,
Pablo
The text was updated successfully, but these errors were encountered: