Signing Git Commits Link to heading
I recently had a discussion with two fellow engineers about secure coding practices. After the discussion I realized that I am neglecting one of the most important practices: signing my commits.
There are tons of articles on the internet explaining why and how. These are my notes on the subject that I decided to publish.
These notes actually use literate programming
so they are a mix of notes and code you can actually use via org-mode.
You can find the actual notes file here.
Why bother? Link to heading
Signing commits, allows you to track who made the commit and that the commit has not been tampered with. More specifically, it allows you to verify that commit is signed using either a GPG key or an SSH key.
Does this protect you in the case your Github account get’s compromised? No, it does not as the attacker most likely will change the signing key. Still, it verifies that the commit was not signed by your key. If you are using GPG, where keys are public, it also allows others to verify that the commit was signed by you.
Using GPG to sign commits Link to heading
Let’s see how we can use GPG to sign commits.
Extracting the GPG Key ID Link to heading
First, we need to extract the key ID of the GPG key we want to use.
|
|
The sections below will use `$KEY_ID` to refer to the actual value.
Configure Git to Use Your GPG Key Link to heading
Extract the key ID and use it to configure Git:
|
|
Export GPG Public Key for GitHub Link to heading
Export your public key in ASCII-armored format for GitHub:
|
|
Add GPG Key to GitHub Link to heading
There are two ways of dealing with it:
- Manualy
- Using the Github API
Add it manually to the Github settings page
Go to https://github.com/settings/keys and manually add it.
Use gh and the Github API
Enable api access to GPG
1
gh auth refresh -h github.com -s admin:gpg_key
Add the Key using gh and the API
1 2 3
gpg --armor --export iocanel@gmail.com > /tmp/publickey.asc gh api --method POST -H "Accept: application/vnd.github+json" /user/gpg_keys -f armored_public_key="$(cat /tmp/publickey.asc)" rm /tmp/publickey.asc
Using SSH to sign commits Link to heading
Generate a new SSH key Link to heading
|
|
Add SSH Singing Key to GitHub Link to heading
Again, there are two ways of dealing with it (as with GPG):
- Manualy
- Using the Github API
Add it manually to the Github settings page
Go to https://github.com/settings/keys and manually add it.
Use gh and the Github API
Enable api access to SSH signing keys
1
gh auth refresh -h github.com -s admin:ssh_signing_key
Add the Key using gh and the API
1
gh api -X POST -H "Accept: application/vnd.github+json" /user/ssh_signing_keys -f key="$(cat ~/.ssh/id_rsa.pub)" -f title="My SSH signing key"
GPG or SSH? Link to heading
So, which one should you use?
I like the idea of using GPG keys for signing commits, due to the fact that they are public and can be used to verify the commit. SSH in some scenarios and some integration might be more convenient.