git.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: "Shawn O. Pearce" <spearce@spearce.org>
To: "Stephen R. van den Berg" <srb@cuci.nl>
Cc: git <git@vger.kernel.org>
Subject: Re: [RFC] Adding a challenge-response authentication method to git://
Date: Wed, 13 Aug 2008 11:08:57 -0700	[thread overview]
Message-ID: <20080813180857.GH3782@spearce.org> (raw)
In-Reply-To: <20080813173757.GE12200@cuci.nl>

"Stephen R. van den Berg" <srb@cuci.nl> wrote:
> Shawn O. Pearce wrote:
> >"Stephen R. van den Berg" <srb@cuci.nl> wrote:
> >> What are the opinions on adding a basic challenge-response type
> >> authentication mechanism to the native git protocol?
> 
> In order to aid them in setting up a simple accesslist, git would do
> just fine by simply offering a flat-file like list.  Forcing those
> setups to use anything more complicated makes adoption of git for those
> kind of projects unreasonably more complicated (IMO).

Well, anytime you get into a flat-file access list you get into
management of that list.  How do users change their own password?
How does an admin add/remove a user, or reset a password?  What
defines an admin?  Can you do these things remotely? Can you keep
the password encrypted on the remote side so an admin cannot see
a user's (common) password and maybe gain access to unrelated sites?

If you are going to keep it "really simple" you may be tempted to
say that all user additions/deletions/password changes should be
done by the admin directly editing the password list.  At which
point it may actually be easier (and safer) for the admin to just
handle a GnuPG or SSH public key.

This is why we tend to rely on SSH.  It neatly solves all of this
for us, and does it in a way that UNIX administrators are familiar
with managing.

This is also why the last discussion on this topic went down the road
of using GnuPG to handle the authentication portion of the protocol.
Unfortunately dealing with the server side keychain is a little
bit more complex then I'd like it to be out of the box, and the
client side I think is lacking something as common as ssh-agent
for caching the decrypted key.

I can see how it would be pretty simple to add authentication to
git-daemon based upon a shared secret, but such schemes always
cause management problems on both sides.
 
-- 
Shawn.

  reply	other threads:[~2008-08-13 18:10 UTC|newest]

Thread overview: 18+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2008-08-13 16:26 [RFC] Adding a challenge-response authentication method to git:// Stephen R. van den Berg
2008-08-13 16:36 ` Petr Baudis
2008-08-14  7:48   ` David Brown
2008-08-14  8:23     ` Petr Baudis
2008-08-14 11:07       ` Stephen R. van den Berg
2008-08-14 11:39         ` Petr Baudis
2008-08-14 12:14           ` Stephen R. van den Berg
2008-08-13 16:40 ` Shawn O. Pearce
2008-08-13 17:37   ` Stephen R. van den Berg
2008-08-13 18:08     ` Shawn O. Pearce [this message]
2008-08-14  0:10       ` Stephen R. van den Berg
2008-08-14  0:57         ` Shawn O. Pearce
2008-08-14  7:13           ` Stephen R. van den Berg
2008-08-14  9:15           ` Andreas Ericsson
2008-08-14  9:51             ` Stephen R. van den Berg
2008-08-14 17:24             ` david
2008-08-14 17:18   ` david
2008-08-14 21:00     ` Shawn O. Pearce

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20080813180857.GH3782@spearce.org \
    --to=spearce@spearce.org \
    --cc=git@vger.kernel.org \
    --cc=srb@cuci.nl \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).