Darren Tucker

118 Followers
204 Following
66 Posts

For the record: GitHub has implemented disabling of PRs on a repo[0] and as a result we have done that and opened up the test repo, making the aforementioned test results[1] public.

So, uh, good job GitHub! Shame it took you ten years, but better late than never.

There is an intermediate step between full off and full on which is "collaborators only". It's not clear who that covers: if it was project members only that would be a useful addition to the test process, but if it includes the rando that sent a one line typo fix to the main repo 3 years ago, not so much.

[0] https://github.blog/open-source/maintainers/welcome-to-the-eternal-september-of-open-source-heres-what-we-plan-to-do-for-maintainers/

[1] https://github.com/openssh/openssh-portable-selfhosted/actions

Welcome to the Eternal September of open source. Here's what we plan to do for maintainers.

As contribution friction drops, maintainers are adapting with new trust signals, triage approaches, and community-led solutions.

The GitHub Blog
Added a summary to the Github community discussion on this topic:
https://github.com/orgs/community/discussions/182186#discussioncomment-15284702
Updates to GitHub Actions pricing · community · Discussion #182186

We’ve read your posts and heard your feedback from our announcement, Pricing changes for GitHub Actions. We’re postponing the announced billing change for self-hosted GitHub Actions to take time to...

GitHub

BTW here are the test configurations that are currently public: 85 native Github hosted in various configurations and another 14 VM-based ones run on Github's infra. We have another 62 selfhosted test configurations on various platforms that we would like to make public but currently can't.

https://github.com/openssh/openssh-portable/actions/runs/20263393088
https://github.com/openssh/openssh-portable/actions/runs/20263393104

GitHub - openssh/openssh-portable: Portable OpenSSH

Portable OpenSSH. Contribute to openssh/openssh-portable development by creating an account on GitHub.

GitHub

OpenSSH runs a large number of tests via Github Runners, both Github supplied ones on a public repo, and on selfhosted runners on a private repo. The latter covers a bunch of platforms Github doesn't support, and is private not because we don't want it accessible (in fact we would prefer it be public) but because as far as we can tell, making it public would represent a significant security risk.

Github have announced that they will begin charging per-minute fees for Github Actions self-hosted runners starting next year. These fees apply only to runners on private repos, but "actions will remain free in public repositories."[0] This is going to be a significant problem for us.

Github's own documentation points out allowing selfhosted runners on public repositories is unsafe, because it's a potential remote code execution vector via running arbitrary workflows in modified pull requests:

"As a result, self-hosted runners should almost never be used for public repositories on GitHub, because any user can open pull requests against the repository and compromise the environment."[2]

There are some controls[1], but the documentation on them doesn't exactly instill confidence (emphasis on the weasel words added):

"Anyone can fork a public repository, and then submit a pull request that proposes changes to the repository's GitHub Actions workflows. [...] To *help* prevent this, workflows on pull requests to public repositories from *some* outside contributors will not run automatically, and *might* need to be approved first. Depending on the "Approval for running fork pull request workflows from contributors" setting, workflows on pull requests to public repositories will not run automatically and *may* need approval if: The pull request is created by a user that requires approvals based on the selected policy.[or] The pull request event is triggered by a user that requires approvals based on the selected policy."

All of this uncertainty could be addressed by completely disabling pull requests on a repo, but while that has been requested many many times over the course of a decade([3] [4]), this is still not possible.

It *is* possble to *temporarily* disable pull requests on a repository via Interaction Limits[5], but using this as a security control that (silently?) fails open after some amount of time is problematic to say the least. The required functionality is almost there, it just needs a "forever" option.

So, in summary: self-hosted runners remain free as long as you run them on public repos, which you shouldn't because it's unsafe, unless you also disable pull requests, which you probably can't.

[0] https://resources.github.com/actions/2026-pricing-changes-for-github-actions/
[1] https://docs.github.com/en/repositories/managing-your-repositorys-settings-and-features/enabling-features-for-your-repository/managing-github-actions-settings-for-a-repository#controlling-changes-from-forks-to-workflows-in-public-repositories
[2] https://docs.github.com/en/actions/reference/security/secure-use
[3] https://github.com/orgs/community/discussions/8907
[4] https://github.com/dear-github/dear-github/issues/84
[5] https://docs.github.com/en/communities/moderating-comments-and-conversations/limiting-interactions-in-your-repository

Pricing changes for GitHub Actions

GitHub Actions pricing update: Discover lower runner rates (up to 39% off) following a major re-architecture for faster, more reliable CI/CD.

GitHub Resources

OpenSSH 10.2 has just been released.

This release contains only non-security bugfixes, most notably for a bad regression that made interactive that used ControlPersist basically unusable

Full release notes at http://openssh.com/releasenotes.html#10.2

OpenSSH: Release Notes

OpenSSH release notes

OpenSSH 10.1 has just been released. This release includes several new features, a minor security fix and many other bugfixes.

Full release notes here: https://www.openssh.com/releasenotes.html#10.1

OpenSSH: Release Notes

OpenSSH release notes

#OpenSSH 9.4 is almost ready for release. Please help us test it: https://marc.info/?l=openssh-unix-dev&m=169078438215969&w=2
'Call for testing: OpenSSH 9.4' - MARC

Cryptography is a tool for turning a whole swathe of problems into key management problems. Key management problems are way harder than (virtually all) cryptographers think.
Continuing the industry-wide trend of hardware-accelerating previously purely software contructs, AMD implements use-after-free directly in the CPU.
https://lock.cmpxchg8b.com/zenbleed.html
Zenbleed

DOP: dlopen oriented programming