Setting up SSH
GitHub allows you to use SSH for two distinct purposes:
- SSH Authentication: Used to securely connect to GitHub for pushing and pulling code. This replaces HTTPS authentication with a password or token.
- SSH Signing: Used to verify the authenticity of commits and tags by cryptographically signing them. This ensures that commits come from a trusted source.
The sections below explain how to set up:
References
- GitHub: Adding a new SSH key to your GitHub account
- GitHub: Generating a new SSH key and adding it to the ssh-agent
- GitHub: Signing commits
- Setting Up SSH for Commit Signing
Why You Should Use Separate Keys
Security Best Practices
- If your authentication key is compromised, an attacker gains both push access to repositories and commit signing capability: keeping them separate limits potential damage.
Key Management
- GitHub allows multiple SSH keys per account, so you can revoke a compromised signing key without affecting authentication.
Different Purposes
- While both use SSH keys, authentication is about secure access, whereas signing is about trust and verification of code integrity.
SSH Authentication for GitHub
This guide explains how to set up SSH authentication on your computer to securely connect to GitHub.
Check for Existing SSH Keys
Before creating a new SSH key, check if you already have one:
ls -al ~/.ssh
If you see files like id_rsa and id_rsa.pub, you already have an SSH key. If not, generate a new one.
Generate a New SSH Key
Run the following command to create a new SSH key:
ssh-keygen -t ed25519 -C "your_email@example.com"
-t
ed25519: Uses the modern and secure Ed25519 algorithm.-C
: Adds an identifier (your email).
When prompted:
- Press Enter to save the key to the default location (
~/.ssh/id_ed25519
). - Enter a secure passphrase (optional but recommended).
Add Your SSH Key to the SSH Agent
Ensure the SSH agent is running:
eval "$(ssh-agent -s)"
Then add your key:
ssh-add ~/.ssh/id_ed25519
Add the SSH Key to GitHub
- Copy the SSH public key to your clipboard
cat ~/.ssh/id_ed25519.pub | pbcopy # macOS
xclip -sel clip < ~/.ssh/id_ed25519.pub # Linux
- Go to GitHub → Settings → SSH and GPG keys.
- Click New SSH Key, paste the copied key, and save.
Test the Connection
Verify that your SSH key works with GitHub:
ssh -T git@github.com
If successful, you’ll see a message like:
Hi username! You've successfully authenticated, but GitHub does not provide shell access.
Configure Git to Use SSH
Set Git to use SSH instead of HTTPS:
git config --global user.name "Your Name"
git config --global user.email "your_email@example.com"
SSH Signing Key for Git and GitHub
This guide explains how to set up an SSH signing key for verifying commits and tags on GitHub using Git.
Check for an Existing SSH Key
First, check if you already have an SSH key:
ls -al ~/.ssh
If you see files like id_ed25519
and id_ed25519.pub
, you may already have a key. If not, generate a new one.
Generate a New SSH Signing Key
To create a new SSH key for signing:
ssh-keygen -t ed25519 -C "your_email@example.com" -f ~/.ssh/id_ed25519_signing
-t
ed25519: Uses the Ed25519 algorithm, recommended for signing.-C
: Adds an identifier (your email).-f
~/.ssh/id_ed25519_signing: Saves the key with a distinct name.
When prompted:
- Press Enter to confirm the default location.
- Enter a secure passphrase (recommended for security).
Add the SSH Key to the SSH Agent
Ensure the SSH agent is running:
eval "$(ssh-agent -s)"
Then add your signing key:
ssh-add ~/.ssh/id_ed25519_signing
Create a Signer File
Git allows you to specify an SSH signer file, making it easier to manage multiple keys.
Create the signer file:
echo "ssh-ed25519 AAAAB3...your-public-key" > ~/.ssh/signing-key.pub
Configure Git to use this signer file:
git config --global gpg.ssh.allowedSignersFile ~/.ssh/signing-key.pub
Add the SSH Public Key to GitHub
- Copy the SSH public key:
cat ~/.ssh/id_ed25519_signing.pub | pbcopy # macOS
xclip -sel clip < ~/.ssh/id_ed25519_signing.pub # Linux
- Go to GitHub → Settings → SSH and GPG keys.
- Click New SSH Key, select Signing Key, paste the copied key, and save.
Configure Git to Use SSH Signing
Tell Git to use your new signing key:
git config --global gpg.format ssh
git config --global user.signingkey ~/.ssh/id_ed25519_signing.pub
git config --global commit.gpgsign true # Auto-sign commits
For tag signing:
git config --global tag.gpgsign true
Verify SSH Signing is Working
To check if signing is correctly set up, make a signed commit:
git commit -S -m "My signed commit"
Then verify:
git log --show-signature -1
If successful, you’ll see output like:
commit abc123 (HEAD -> main)
gpg: Signature made ...
gpg: Good signature from "your_email@example.com"
Troubleshooting
If signing doesn’t work:
- Ensure you’re using Git 2.34+ (git --version).
- Restart the SSH agent and re-add the key:
eval "$(ssh-agent -s)"
ssh-add ~/.ssh/id_ed25519_signing
- Check that Git is configured correctly:
git config --global --list | grep signing