SSH login without user name?

I was reading GitLab’s documentation (see link) on how to write to a repository from within the CI pipeline and noticed something: The described Docker executor is able to authenticate e.g. against the Git repository with only a private SSH key, being told absolutely nothing about the user’s name it is associated with.
If I’m correct, that would mean that technically, I could authenticate to an SSH server without supplying my name if I use a private key?

I know that when I don’t supply a user explicitly like ssh user@server or via .ssh/config, the active environment’s user is used automatically, that’s not what I’m asking.

The public key contains a user name/email address string, I’m aware, is the same information also encoded into the private key as well? If yes, I don’t see the need to hand that info to an SSH call. If no, how does the SSH server know which public key it’s supposed to use to challenge my private key ownership? It would have to iterate over all saved keys, which sounds rather inefficient to me and potentially unsafe (timing attacks etc.).

I hope I’m somewhat clear, for some reason I find it really hard to phrase this question.

OneCardboardBox,

It would have to iterate over all saved keys, which sounds rather inefficient to me and potentially unsafe (timing attacks etc.)

sshd only checks for matches in the user’s authorized_keys file, not system wide.

bizdelnick,

Technically, you always use a username, however in case of Gitlab that SSH username is always git. When an SSH client connects to server, it offers an authentication method. Gitlab accepts that method only if it is a publickey and the fingerprint of the offered key maps to the known Gitlab user.

Michal,

It’s a blessing and a curse. I have two gitlab accounts on the same server - private and work. I can’t use the same key for both as the key is used to distinguish git users, and git doesn’t make it easy to select which key you want to use to pull or clone particular repo.

Clearwater,

You can tell git to use a specific key for each repo. I have the same situation as you and this is how I handle it.

superuser.com/…/how-to-tell-git-which-private-key…

bizdelnick,

git config core.sshCommand ‘ssh -i <path to desired key>’

ReversalHatchery,

Hmm, with a similar technique one could even create git command aliases for running git with specific ssh private keys

vvv,

Better than that, git config supports conditional includes, based on a repo URL or path on disk. So you can have a gitconfig per organization or whatever, which specifies an sshCommand and thus an ssh key.

drive_desaster,

Just a thought: why don’t you just use two different aliases for the Server in your .ssh/config with your two differing ssh keys, that way you can just use two different “hostnames” that have different ssh keys specified

Michal,

I could but then i can’t simply copy the “clone” url from the projects page without editing it.

I think the best solution for me may be to have a separate user account in the OS for work and personal projects. That way i can just log off at the end of the day and use personal account for personal stuff.

winety,

You might not even have to log out: Just change the user in the terminal: su - user2

taladar,

The public key contains a user name/email address string

No it does not. That is just a comment field.

Aarkon,

Thanks for pointing that out.

FigMcLargeHuge,

I only have experience with Bitbucket, and absolutely none if this may be applicable to you, but we have to generate a key with certain parameters (a minimum) for them to work, and the public key has to be input into a field on your account. So while you do not need to “provide” a username to perform git commands, it is set up in your account as your private key. The command to gen the key is: ssh-keygen -t rsa -m PEM -b 4096 -C “your.email@domain.com”

Once you put your public key into your bitbucket account, using that key will mark all changes you make to you. Is this what you are talking about or am I just off in left field?

bbbhltz,
@bbbhltz@beehaw.org avatar

If I’m correct, that would mean that technically, I could authenticate to an SSH server without supplying my name if I use a private key?

Yes.

The public key contains a user name/email address string, I’m aware, is the same information also encoded into the private key as well? If yes, I don’t see the need to hand that info to an SSH call. If no, how does the SSH server know which public key it’s supposed to use to challenge my private key ownership?

Most of this can be found reading through different Git docs, whether from GitHub, GitLab, Codeberg, Gitea, etc. When using Git you can use different keys for different repos/forges and each has a defined pair, similar to accessing different SSH servers that require specific key pairs. I do understand your questions, but I lack the finesse to explain it since I really only use SSH and Git for my blog and not for anything too complicated.

xantoxis, (edited )

EDIT: Noticed you’re talking about Gitlab in the question, and I responded about Github, but I’m certain that gitlab does everything the same way, because that’s all the technology is capable of. (I have no way to test the ssh -T command at the end for gitlab, though, so ymmv.)

To clear up some minor confusion here:

  1. Github knows nothing about your private key. There’s very little metadata stored in the private key, and github.com has access to none of it. That includes email address or identity.
  2. Github has identity information stored for you, and then, separately, you uploaded a public key. The public key also contains no information about you, but github knows it’s part of your account. Additionally, github enforces a requirement that your public key can’t be uploaded to any other account, for the reason I’m about to state below.
  3. Github has an index built of everyone’s public keys (or more likely their digests, although the technical details of the index are not something known to me–and it doesn’t matter). When it sees an authentication request, it looks up the digest in the index, which maps to a user account.

At this point it already knows who is trying to authenticate. Once your authentication request succeeds with your public key (the usual challenge-response handshake associated with asymmetric cryptography), github interacts with your ssh client (most likely git) applying the permissions of your user and your user account.

BTW, github has a documented method for testing the handshake without doing any git operations:


<span style="color:#323232;">ssh -T git@github.com
</span>

Depending on your ssh config, you might also need to supply -i some_filename.pem to this. Github will reply with


<span style="color:#323232;">Hi aarkon! You've successfully authenticated, but GitHub does not provide shell access.
</span>

and then close the connection.

Note that the test authentication uses the username git and, again, contains no information about who you are. It’s all just looked up on github’s side.

CaptainSpaceman,

When authenticating with git over SSH, the private key should be considered secret and well protected.

That means the corresponding public key that was uploaded to the git server is enough to authenticate and no username is required. However, a password protected privare key is possible and extra layers of security can be added to the authentication mechanism.

As far as resource based attacks based on public key searching, I doubt many servers have significant enough public keys on a single host to even notice. Most repos are siloed and have specific teams/individuals assigned to them, so only a small number of public keys even gets loaded.

I dont know enough about the server side mechanics to be sure, but imo the attack surface is pretty small.

unknowing8343, (edited )

Public SSH keys don’t contain any user information at all. They could have some metadata for users to easily read, but that can be deleted without repercussions.

I’m no expert, and this is probably how it does NOT work, but if you have a private key, it can generate the public key, so that could be a way to tell the server “this is me”, now try me.

Hey I wasn’t so far off!

vhstape,
@vhstape@lemmy.sdf.org avatar

There are instances where the user is implied, but there is always a user. As far as Git goes, the user is almost always git.

Aarkon,

I guess this is probably the solution to my riddle. Thanks.

refalo,

Yeah either that or they use a custom SSH implementation that just ignores the username because it’s not needed for the type of authentication they’re doing (like checking the keys of a specific account/project that is already known).

  • All
  • Subscribed
  • Moderated
  • Favorites
  • linux@lemmy.ml
  • mdbf
  • DreamBathrooms
  • InstantRegret
  • magazineikmin
  • Youngstown
  • everett
  • anitta
  • slotface
  • GTA5RPClips
  • rosin
  • thenastyranch
  • kavyap
  • tacticalgear
  • modclub
  • JUstTest
  • osvaldo12
  • Durango
  • khanakhh
  • provamag3
  • cisconetworking
  • ngwrru68w68
  • cubers
  • tester
  • ethstaker
  • megavids
  • normalnudes
  • Leos
  • lostlight
  • All magazines