Gitlab update, 2FA now mandatory

Ben Cooksley bcooksley at kde.org
Sun Oct 23 23:30:04 BST 2022


On Mon, Oct 24, 2022 at 4:55 AM Christoph Cullmann (cullmann.io) <
christoph at cullmann.io> wrote:

> On 2022-10-23 08:32, Ben Cooksley wrote:
> > Hi all,
> >
> > This afternoon I updated invent.kde.org [1] to the latest version of
> > Gitlab, 15.5.
> > Release notes for this can be found at
> > https://about.gitlab.com/releases/2022/10/22/gitlab-15-5-released/
> >
> > There isn't much notable feature wise in this release, however there
> > have been some bug fixes surrounding the "Rebase without Pipeline"
> > functionality that was introduced in an earlier update.
> >
> > As part of securing Invent against recently detected suspicious
> > activity I have also enabled Mandatory 2FA, which Gitlab will ask you
> > to configure next time you access it. This can be done using either a
> > Webauthn token (such as a Yubikey) or TOTP (using the app of choice on
> > your phone)
> >
> > Should you lose access to your 2FA device you can obtain a recovery
> > token to log back in via SSH, see
> >
> https://docs.gitlab.com/ee/user/profile/account/two_factor_authentication.html#generate-new-recovery-codes-using-ssh
> > for more details on this.
> >
> > Please let us know if there are any queries on the above.
>
> Hi,
>

Hi Christoph,


>
> whereas I can see the security benefit, this raises the hurdle for one
> time
> contributors again a lot.
>
> Before you already had to register to get your merge request,
> now you need to setup this too (or at least soon it is mandatory).
>
> I am not sure this is such a good thing.


> I see a point that one wants to avoid that e.g. somebody steals my
> account
> that has enough rights to delete all branches in the Kate repository via
> the
> web frontend.
>

That is something you actually can't do - at least not entirely :)

Release branches are marked as protected within Gitlab, meaning that
destructive operations will be blocked by Gitlab itself.
Even if this was to be permitted by Gitlab, our hooks would intervene and
ensure a backup of the branch was taken immediately before it was deleted -
making the damage an inconvenience only as nothing would be lost.

(See refs/backups/ in any Git repository on invent.kde.org, these refs are
also protected by the hooks so they cannot be harmed)


>
> Could the 2FA stuff perhaps be limited to people with developer role or
> such?


It is technically possible to only apply the mandatory 2FA rules to only
certain groups as Developer accounts are simply membership in
teams/kde-developers.
See
https://docs.gitlab.com/ee/security/two_factor_authentication.html#enforce-2fa-for-all-users-in-a-group
for the documentation on this.

Given that we are using Invent for authenticating our various other
services and the users of those aren't necessarily developers (while still
having access to sensitive information) it seemed more prudent to enforce
2FA for everyone to ensure all our systems have a minimum baseline of
industry best practice protection in place.

This also avoids any issue when people are granted a developer account and
suddenly find themselves subject to a new requirement.

Thanks,
Ben


>
> Greetings
> Christoph
>
> >
> > Thanks,
> > Ben
> >
> > Links:
> > ------
> > [1] http://invent.kde.org
>
> --
> Ignorance is bliss...
> https://cullmann.io | https://kate-editor.org
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.kde.org/pipermail/kde-community/attachments/20221024/1adece8e/attachment-0001.htm>


More information about the kde-community mailing list