I have an SSH key found on a host while performing an audit. It has permission to read/write to repositories. I would very much like to know which Bitbucket user is associated with this SSH key so I may offer security guidance.
Is there any way to figure out which Bitbucket user was identified based on the SSH key, and which permissions are in effect? I've added the `LogLevel DEBUG` option to `~/.ssh/config` and I can see lots of interesting information, but not any message from Bitbucket about identity. I dunno, maybe the SSH protocol just doesn't afford arbitrary server content like this.
Hi Joseph!
I'm afraid that there is no way for users to determine where an SSH key has been added.
You can create a ticket with the support team and provide the public key. If this key is added to a user that is a member of a workspace you are an admin of, we can let you know which user this key belongs to.
You can create a ticket via https://support.atlassian.com/contact/#/, in "What can we help you with?" select "Technical issues and bugs" and then Bitbucket Cloud as product. When you are asked to provide the workspace URL, please make sure you enter the URL of the workspace that is on a paid billing plan to proceed with ticket creation.
Please feel free to reach out if you have any questions!
Kind regards,
Theodora
Thank you for the information Theodora. I can understand why Bitbucket Security would be reluctant to disclose the authenticated user identity when an attacker has access to read/write to repositories, and might want additional information about the key upon which they've stumbled.
I'll keep the Atlassian support URL handy for the next time a mysterious SSH key is discovered being used to modify source code.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.