Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

hub should not leak local user account to github servers #2222

Open
zpuskas opened this issue Aug 9, 2019 · 2 comments
Open

hub should not leak local user account to github servers #2222

zpuskas opened this issue Aug 9, 2019 · 2 comments
Labels

Comments

@zpuskas
Copy link

zpuskas commented Aug 9, 2019

When using hub for the first time it will automatically create an OAuth token. This gets logged into the security history viewable on the accounts profile under the line "oauth_authorization.create". This log line will be in the format of:

oauth_authorization.create – Personal access token (hub for user@hostname)

There is no reason to send the local unix account to Github servers, as local account username might be different from Github username, and as such private information (e.g. that identity could be used elsewhere by the user or might be one-off). This probably also violates computer privacy laws (e.g. GDPR) as only user's github account name/password/2fac shall be sufficient to access the service via the CLI. Finally this is not mentioned in the documentation at all, which means the user has no way of making an informed choice whether to use the CLI or not.

Tool should ask for a OAuth key "vanity name" to be submitted on first connection if the user wants to audit access logs instead of user@hostname.

@mislav
Copy link
Owner

mislav commented Aug 19, 2019

Interesting point; thank you. I agree that we probably shouldn't be sharing your computer's info without prompting. During login, we could ask the user to provide an identifiable label for this machine (or leave blank) instead.

@mislav mislav added the bug label Aug 19, 2019
@lersek
Copy link

lersek commented Nov 1, 2019

Fully agree with the issue report; I've just noticed (after having used hub for the first time) that hub leaked both my local user name and my (VPN-specific) hostname to github. Please don't do that. Thanks.

quantimnot pushed a commit to quantimnot/hub that referenced this issue May 17, 2020
zpuskas added a commit to zpuskas/sinustrom-gentoo-overlay that referenced this issue Jun 17, 2020
Hub code currently leaks local user name and hostname to github:
mislav/hub#2222. This version simply applies
privacy fix patch mislav/hub#2544

Package-Manager: Portage-2.3.100, Repoman-2.3.22
Signed-off-by: Zoltan Puskas <zoltan@sinustrom.info>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants