git@vger.kernel.org mailing list mirror (one of many)
 help / color / mirror / code / Atom feed
* has anyone bothered to read this "Git is a security risk"?
@ 2020-04-14 20:13 Robert P. J. Day
  2020-04-14 20:17 ` Santiago Torres Arias
                   ` (3 more replies)
  0 siblings, 4 replies; 6+ messages in thread
From: Robert P. J. Day @ 2020-04-14 20:13 UTC (permalink / raw)
  To: Git Mailing list


https://twitter.com/blubracket/status/1250123442600513547

rday

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: has anyone bothered to read this "Git is a security risk"?
  2020-04-14 20:13 has anyone bothered to read this "Git is a security risk"? Robert P. J. Day
@ 2020-04-14 20:17 ` Santiago Torres Arias
  2020-04-15  9:55   ` Michal Suchánek
  2020-04-14 20:35 ` Konstantin Ryabitsev
                   ` (2 subsequent siblings)
  3 siblings, 1 reply; 6+ messages in thread
From: Santiago Torres Arias @ 2020-04-14 20:17 UTC (permalink / raw)
  To: Robert P. J. Day; +Cc: Git Mailing list

[-- Attachment #1: Type: text/plain, Size: 565 bytes --]

On Tue, Apr 14, 2020 at 04:13:39PM -0400, Robert P. J. Day wrote:
> 
> https://urldefense.proofpoint.com/v2/url?u=https-3A__twitter.com_blubracket_status_1250123442600513547&d=DwIBAg&c=slrrB7dE8n7gBJbeO0g-IQ&r=yZMPY-APGKyVIX7HgQFZJA&m=k4RlH5EiWlU380Hq8LD-BPM9q79__emrQNq4FBNAbh8&s=7_aq2xl8ld0WDJk4yd_gefOvg47E8MdlXvcj5aZwjug&e= 
> 

Yeah,

Not entirely fond of the phrasing to what reads to me like a
static-analysis tool (from what I can grok) whitepaper.

I don't think there's much that can be done in this regard though, no?

-Santiago


> rday

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: has anyone bothered to read this "Git is a security risk"?
  2020-04-14 20:13 has anyone bothered to read this "Git is a security risk"? Robert P. J. Day
  2020-04-14 20:17 ` Santiago Torres Arias
@ 2020-04-14 20:35 ` Konstantin Ryabitsev
  2020-04-14 20:58 ` Jason Pyeron
  2020-04-14 21:03 ` Jason Pyeron
  3 siblings, 0 replies; 6+ messages in thread
From: Konstantin Ryabitsev @ 2020-04-14 20:35 UTC (permalink / raw)
  To: Robert P. J. Day; +Cc: Git Mailing list

On Tue, Apr 14, 2020 at 04:13:39PM -0400, Robert P. J. Day wrote:
> 
> https://twitter.com/blubracket/status/1250123442600513547

Summary:

  - Accidental data exfiltration is a problem.
  - So are supply chain attacks.
  - Both of the above can happen with git repos.
  - We sell a scanning tool that will help.

-K

^ permalink raw reply	[flat|nested] 6+ messages in thread

* RE: has anyone bothered to read this "Git is a security risk"?
  2020-04-14 20:13 has anyone bothered to read this "Git is a security risk"? Robert P. J. Day
  2020-04-14 20:17 ` Santiago Torres Arias
  2020-04-14 20:35 ` Konstantin Ryabitsev
@ 2020-04-14 20:58 ` Jason Pyeron
  2020-04-14 21:03 ` Jason Pyeron
  3 siblings, 0 replies; 6+ messages in thread
From: Jason Pyeron @ 2020-04-14 20:58 UTC (permalink / raw)
  To: 'Git Mailing list'; +Cc: 'Robert P. J. Day'

Yes. It is a FUD tool to sell their product/service.

> -----Original Message-----
> From: git-owner@vger.kernel.org <git-owner@vger.kernel.org> On Behalf Of Robert P. J. Day
> Sent: Tuesday, April 14, 2020 4:14 PM
> To: Git Mailing list <git@vger.kernel.org>
> Subject: has anyone bothered to read this "Git is a security risk"?
> 
> 
> https://twitter.com/blubracket/status/1250123442600513547

They claim 5 risks.

Risk #1 - Secrets in code.
Risk #2 - Malicious code from unauthorized open source.
Risk #3 - Your business, network and infrastructure blueprint exposed through code.
Risk #4 - Sensitive code and PII on public code sharing websites.
Risk #5 - IP theft.

With a SALES PITCH at the end

"
BluBracket can help. 

While software development has changed dramatically and software
has grown in importance, the ways we secure code have not. This has to
change. BluBracket is the first comprehensive security solution for code
in the enterprise. We deliver the insights and control enterprises need
to keep code safe. Contact us for an exploration of how we can help,
including an audit of your production environments for secrets in code
and other vulnerabilities.
"

In short by using FUD, the reader is more likely to buy their product which will alleviate your fears, uncertainty, and doubt around GitHub, Inc. and Git technology.

They have 10 specific attacks on Git/Github in their paper, I have listed them below. In square brackets ([]) I have added meaning where needed. The "Git" contextual quotes are as follows:

1. "A decade ago, companies didn’t worry much about code security. ... GitHub had only just begun ... code and coding environments today represent the biggest unmanaged and unmonitored risk to enterprise security"

2. "Between Google and Github searches, these secrets [keys, password, etc.] are a gold mine for hackers"

3. re-quote from How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories Network and Distributed Systems Security (NDSS) Symposium 2019 “We find that not only is secret leakage pervasive — affecting over 100,000 repositories — but that thousands of new, unique secrets are leaked every day.”

4. "In 2018, for instance, hackers mirrored the popular Linux distribution Gentoo’s Github repositories and replaced them with a malicious backdoor that would erase files."

5. "In 2019, hackers attempted a similar exploit against Ubuntu’s Github repositories."

6. "Recently, an AWS engineer published a 1G repository to Github containing a treasure trove of PII, including bank statements, customer correspondence, drivers’ licenses, and multiple key pairs and tokens."

7. "there is so much valuable information now on Github, hacker groups have automated searches"

8. "hacker posted details about it [Capital One breach] in a public Github repository. Github was recently sued over their role in this incident"

9. " This [the finding of sensitive data in a repository] generally is inadvertent because Git makes it so easy to share code"

10. "

But unfortunately, Git is the wild west. Right now security teams have little 
to no visibility into where this important enterprise asset lives.

While visibility is a huge issue, code proliferation is another. Git was
developed for open source projects, not the enterprise. By default, everyone
has access to everything. A contractor can download all the code in that
repository, not just the section he is working on. With one click, he can then
upload your code to his or her own personal repository.

There are currently no repeatable, scalable ways to lock down access or even
track and monitor behavior. And if an insider wants to take code and sell it
or use it at a competitor, there is currently no way of even being notified that
your code has been published. By default, Git proliferates code.

"

In my opinion, as a cyber-security SME, software developer, git user and developer, etc... numbers 1 through 8 have nothing to do with Git or Git related technologies/services. Bashing what one can do with GitHub.com is also silly, do not put your sensitive code on someone else's server.

Numbers 9 and 10 have a bit more merit, if only measured using the most sensitive measuring instruments. It is no more easy to be carless with your data stored in a git repository than subversion, than CVS, DVDs, portable hard drives, laptops in a café, etc. It is just data, you can copy it. 10 is a real concern but not because of git, but because of poor training, bad trustworthiness between the organization and worker, etc. I will recite an event that happened where I work many years ago.

Manager: Did you take DoD source code home without permission?
Employee: excuse, avoids question, more excuses
Manager: Let me be clear, you are fired. I need the answer to the question, did you take controlled DoD source code home with you?
Employee: no.

Git is not a source of the problem, human resource management and cyber security hygiene are. We failed to cultivate a responsible employee, with a work ethic. The employee decided to telework without authorization (play hooky) claiming to work. But the git repository for that project was not accessible from home... Our Git was secure...

**SIGH**


--
Jason Pyeron  | Architect
PD Inc        |
10 w 24th St  |
Baltimore, MD |
 
.mil: jason.j.pyeron.ctr@mail.mil
.com: jpyeron@pdinc.us
tel : 202-741-9397






^ permalink raw reply	[flat|nested] 6+ messages in thread

* RE: has anyone bothered to read this "Git is a security risk"?
  2020-04-14 20:13 has anyone bothered to read this "Git is a security risk"? Robert P. J. Day
                   ` (2 preceding siblings ...)
  2020-04-14 20:58 ` Jason Pyeron
@ 2020-04-14 21:03 ` Jason Pyeron
  3 siblings, 0 replies; 6+ messages in thread
From: Jason Pyeron @ 2020-04-14 21:03 UTC (permalink / raw)
  To: 'Git Mailing list'; +Cc: 'Robert P. J. Day'

Now they are spamming me...

There "one pager", which is 3 pages - https://blubracket.com/wp-content/uploads/2020/02/BB_OneSheet_FINAL.pdf amused me.

> -----Original Message-----
> From: Jason Pyeron 
> Sent: Tuesday, April 14, 2020 4:59 PM
> To: 'Git Mailing list' <git@vger.kernel.org>
> Cc: 'Robert P. J. Day' <rpjday@crashcourse.ca>
> Subject: RE: has anyone bothered to read this "Git is a security risk"?
> 
> Yes. It is a FUD tool to sell their product/service.
> 
> > -----Original Message-----
> > From: git-owner@vger.kernel.org <git-owner@vger.kernel.org> On Behalf Of Robert P. J. Day
> > Sent: Tuesday, April 14, 2020 4:14 PM
> > To: Git Mailing list <git@vger.kernel.org>
> > Subject: has anyone bothered to read this "Git is a security risk"?
> >
> >
> > https://twitter.com/blubracket/status/1250123442600513547
> 
> They claim 5 risks.
> 
> Risk #1 - Secrets in code.
> Risk #2 - Malicious code from unauthorized open source.
> Risk #3 - Your business, network and infrastructure blueprint exposed through code.
> Risk #4 - Sensitive code and PII on public code sharing websites.
> Risk #5 - IP theft.
> 
> With a SALES PITCH at the end
> 
> "
> BluBracket can help.
> 
> While software development has changed dramatically and software
> has grown in importance, the ways we secure code have not. This has to
> change. BluBracket is the first comprehensive security solution for code
> in the enterprise. We deliver the insights and control enterprises need
> to keep code safe. Contact us for an exploration of how we can help,
> including an audit of your production environments for secrets in code
> and other vulnerabilities.
> "
> 
> In short by using FUD, the reader is more likely to buy their product which will alleviate your fears,
> uncertainty, and doubt around GitHub, Inc. and Git technology.
> 
> They have 10 specific attacks on Git/Github in their paper, I have listed them below. In square
> brackets ([]) I have added meaning where needed. The "Git" contextual quotes are as follows:
> 
> 1. "A decade ago, companies didn’t worry much about code security. ... GitHub had only just begun ...
> code and coding environments today represent the biggest unmanaged and unmonitored risk to enterprise
> security"
> 
> 2. "Between Google and Github searches, these secrets [keys, password, etc.] are a gold mine for
> hackers"
> 
> 3. re-quote from How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories
> Network and Distributed Systems Security (NDSS) Symposium 2019 “We find that not only is secret
> leakage pervasive — affecting over 100,000 repositories — but that thousands of new, unique secrets
> are leaked every day.”
> 
> 4. "In 2018, for instance, hackers mirrored the popular Linux distribution Gentoo’s Github
> repositories and replaced them with a malicious backdoor that would erase files."
> 
> 5. "In 2019, hackers attempted a similar exploit against Ubuntu’s Github repositories."
> 
> 6. "Recently, an AWS engineer published a 1G repository to Github containing a treasure trove of PII,
> including bank statements, customer correspondence, drivers’ licenses, and multiple key pairs and
> tokens."
> 
> 7. "there is so much valuable information now on Github, hacker groups have automated searches"
> 
> 8. "hacker posted details about it [Capital One breach] in a public Github repository. Github was
> recently sued over their role in this incident"
> 
> 9. " This [the finding of sensitive data in a repository] generally is inadvertent because Git makes
> it so easy to share code"
> 
> 10. "
> 
> But unfortunately, Git is the wild west. Right now security teams have little
> to no visibility into where this important enterprise asset lives.
> 
> While visibility is a huge issue, code proliferation is another. Git was
> developed for open source projects, not the enterprise. By default, everyone
> has access to everything. A contractor can download all the code in that
> repository, not just the section he is working on. With one click, he can then
> upload your code to his or her own personal repository.
> 
> There are currently no repeatable, scalable ways to lock down access or even
> track and monitor behavior. And if an insider wants to take code and sell it
> or use it at a competitor, there is currently no way of even being notified that
> your code has been published. By default, Git proliferates code.
> 
> "
> 
> In my opinion, as a cyber-security SME, software developer, git user and developer, etc... numbers 1
> through 8 have nothing to do with Git or Git related technologies/services. Bashing what one can do
> with GitHub.com is also silly, do not put your sensitive code on someone else's server.
> 
> Numbers 9 and 10 have a bit more merit, if only measured using the most sensitive measuring
> instruments. It is no more easy to be carless with your data stored in a git repository than
> subversion, than CVS, DVDs, portable hard drives, laptops in a café, etc. It is just data, you can
> copy it. 10 is a real concern but not because of git, but because of poor training, bad
> trustworthiness between the organization and worker, etc. I will recite an event that happened where I
> work many years ago.
> 
> Manager: Did you take DoD source code home without permission?
> Employee: excuse, avoids question, more excuses
> Manager: Let me be clear, you are fired. I need the answer to the question, did you take controlled
> DoD source code home with you?
> Employee: no.
> 
> Git is not a source of the problem, human resource management and cyber security hygiene are. We
> failed to cultivate a responsible employee, with a work ethic. The employee decided to telework
> without authorization (play hooky) claiming to work. But the git repository for that project was not
> accessible from home... Our Git was secure...
> 
> **SIGH**
> 
> 
> --
> Jason Pyeron  | Architect
> PD Inc        |
> 10 w 24th St  |
> Baltimore, MD |
> 
> .mil: jason.j.pyeron.ctr@mail.mil
> .com: jpyeron@pdinc.us
> tel : 202-741-9397
> 
> 
> 



^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: has anyone bothered to read this "Git is a security risk"?
  2020-04-14 20:17 ` Santiago Torres Arias
@ 2020-04-15  9:55   ` Michal Suchánek
  0 siblings, 0 replies; 6+ messages in thread
From: Michal Suchánek @ 2020-04-15  9:55 UTC (permalink / raw)
  To: Santiago Torres Arias; +Cc: Robert P. J. Day, Git Mailing list

On Tue, Apr 14, 2020 at 04:17:02PM -0400, Santiago Torres Arias wrote:
> On Tue, Apr 14, 2020 at 04:13:39PM -0400, Robert P. J. Day wrote:
> > 
> > https://urldefense.proofpoint.com/v2/url?u=https-3A__twitter.com_blubracket_status_1250123442600513547&d=DwIBAg&c=slrrB7dE8n7gBJbeO0g-IQ&r=yZMPY-APGKyVIX7HgQFZJA&m=k4RlH5EiWlU380Hq8LD-BPM9q79__emrQNq4FBNAbh8&s=7_aq2xl8ld0WDJk4yd_gefOvg47E8MdlXvcj5aZwjug&e= 
> > 
> 
> Yeah,
> 
> Not entirely fond of the phrasing to what reads to me like a
> static-analysis tool (from what I can grok) whitepaper.
> 
> I don't think there's much that can be done in this regard though, no?

There is. Education. Prevention is much more useful than any number of
such tools.

Thanks

Michal

^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2020-04-15  9:55 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-04-14 20:13 has anyone bothered to read this "Git is a security risk"? Robert P. J. Day
2020-04-14 20:17 ` Santiago Torres Arias
2020-04-15  9:55   ` Michal Suchánek
2020-04-14 20:35 ` Konstantin Ryabitsev
2020-04-14 20:58 ` Jason Pyeron
2020-04-14 21:03 ` Jason Pyeron

Code repositories for project(s) associated with this public inbox

	https://80x24.org/mirrors/git.git

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).