-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
cockpit-ws bastion/unprivilleged forced ssh-agent #21170
Comments
This seems fine to me -- cautiously. You really need to know what you are doing, i.e. do this together with configuring the container for using a private key. You are crossing a security boundary here, i. e. give the container access to your user session. We don't know of any way to exploit it, and the flatpak essentially does the same -- but that doesn't expose cockpit's web server to the network. |
By harm I really just ment for other users in terms of compatability. Therefor my main concern is wether this could break any potentiall existion application. |
No, I can't imagine breaking any existing realistic setup. Setting $SSH_AUTH_SOCKET in the container never worked and was never documented. |
In unprivileged mode, support connecting to an already running SSH agent for sharing SSH private keys. Thanks to Anton Engelhardt <engelhardt.anton@gmail.com> for the idea and initial implementation sketch! Fixes cockpit-project#21170
In unprivileged mode, support connecting to an already running SSH agent for sharing SSH private keys. Thanks to Anton Engelhardt <engelhardt.anton@gmail.com> for the idea and initial implementation sketch! Fixes cockpit-project#21170
cockpit/containers/ws/label-run
Line 45 in f985ad0
My issue being, that ssh-agent is started unconditionally.
Can anybody spot any harm in wrapping this in a start if unset condition like so:
This would enable me to provide my own SSH_AUTH_SOCK without breaking behavior.
The text was updated successfully, but these errors were encountered: