We recently became aware of an instance where this key and other tokens
used to distribute official GitLab Runner packages and binaries were not
secured according to GitLab’s security policies.
We have not found any evidence of unauthorized modification of the packages
or access to the services storing them.
$ git clone git@github.com:github/secure_headers.git Cloning into 'secure_headers'... Confirm user presence for key ECDSA-SK SHA256:........ User presence confirmed
同時在將 public key 部屬到目標機器上時,在 public key 該行前面多下 no-touch-required
即可。 (詳情請見 ssh-keygen(1) 及 sshd(8))
以此方始產生的 key pair 在使用時就不需要每次都手按一下,可以全自動使用。
不過,雖然 OpenSSH 有支援此種使用情境,但目前 GitHub 禁止這種使用方式。
節錄自上述 blog 文章
While we understand the appeal of removing the need for the taps,
we determined our current approach to require presence and intention
is the best balance between usability and security.
所以在 GitHub 上,若想要全自動操作,只能回去用一般的 SSH key 或 API token 囉。
People think that they don’t want their keys to expire,
but you actually do. Why? Because you can always extend your expiration date,
even after it has expired!