git.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Andreas Krey <a.krey@gmx.de>
To: Ilari Liusvaara <ilari.liusvaara@elisanet.fi>
Cc: Nguyen Thai Ngoc Duy <pclouds@gmail.com>, git@vger.kernel.org
Subject: Re: [RFC 0/2] Git-over-TLS (gits://) client side support
Date: Wed, 13 Jan 2010 19:35:20 +0100	[thread overview]
Message-ID: <20100113183520.GA23674@inner.home.ulmdo.de> (raw)
In-Reply-To: <20100113173610.GA7609@Knoppix>

On Wed, 13 Jan 2010 19:36:10 +0000, Ilari Liusvaara wrote:
...
> That would violate layering badly. You need to decode the request
> first before you can authorize. And the git daemon does that.

Well, yes. The script hackery would just decide between 'is allowed
to read (or write commits)' and 'is allowed to modify refs'. On the
other hand, git-daemon does not do fine-grained (read: per-branch)
access control, you'd only prevent pushing commits at all.

...
> > (Is the unix auth via unix domain sockets part of GnuTLS?)
> 
> No, that server-only feature is part of the OS itself. In fact, it
> needs no client-side support.

Ok, then I'll be really interested in the server-side support and
the man pages on the whole stuff. Especially in how this is going
to be different from what ssh:// does or can do.

...
> GIT_PROXY abuse? There are even better ways: smart transport remote
> helpers (in next I think). Git can actually dispatch those (and yes,
> that's exactly what this uses).

Yeah, since the last mail I noticed that gitproxy is not quite what
some google hits suggest, and should have read the patch in some
more detail to find that gits is a remote helper.

Please consider my objections revoked, other than the claim that
it could be done with stunnel, however ugly that would be.

...
> Actually, that was little badly choosen term and not the true problem,
> but the basic problem is that one peer has to trust the the other peer's
> authentication for security of its own authentication.

I don't see how that would endanger the standard certificate auth in ssl
(client or server).

...
> HTTP basic auth can be trivially sniffed if attacker can become other end
> of the encrypted link

Of course, you have another problem in that case...also I'd personally
like to rely on ssl client certificates when using https.

Andreas

  reply	other threads:[~2010-01-13 18:35 UTC|newest]

Thread overview: 28+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2010-01-13 13:19 [RFC 0/2] Git-over-TLS (gits://) client side support Ilari Liusvaara
2010-01-13 13:19 ` [RFC 1/2] Git-over-TLS (gits://) client side support (part 1 of 2) Ilari Liusvaara
2010-01-13 13:19 ` [RFC 2/2] Git-over-TLS (gits://) client side support (part 2 " Ilari Liusvaara
2010-01-13 13:25   ` Alex Riesen
2010-01-13 13:39 ` [RFC 0/2] Git-over-TLS (gits://) client side support Nguyen Thai Ngoc Duy
2010-01-13 13:57   ` Ilari Liusvaara
2010-01-13 14:12     ` Andreas Krey
2010-01-13 14:47       ` Ilari Liusvaara
2010-01-13 16:17         ` Andreas Krey
2010-01-13 17:36           ` Ilari Liusvaara
2010-01-13 18:35             ` Andreas Krey [this message]
2010-01-13 19:18               ` Ilari Liusvaara
2010-01-13 19:30                 ` Avery Pennarun
2010-01-13 20:06                   ` Ilari Liusvaara
2010-01-13 20:13                     ` Avery Pennarun
2010-01-13 21:04                       ` Ilari Liusvaara
2010-01-13 22:03                         ` Avery Pennarun
2010-01-13 22:06                           ` Shawn O. Pearce
2010-01-13 23:00                           ` Ilari Liusvaara
2010-01-13 23:51                             ` Avery Pennarun
2010-01-14  8:51                               ` Ilari Liusvaara
2010-01-14 20:46                                 ` Avery Pennarun
2010-01-14 23:08                                   ` Ilari Liusvaara
2010-01-13 19:40                 ` Andreas Krey
2010-01-13 20:47                   ` Ilari Liusvaara
2010-01-13 19:11     ` Avery Pennarun
2010-01-13 20:00       ` Ilari Liusvaara
2010-01-13 20:13 ` Edward Z. Yang

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20100113183520.GA23674@inner.home.ulmdo.de \
    --to=a.krey@gmx.de \
    --cc=git@vger.kernel.org \
    --cc=ilari.liusvaara@elisanet.fi \
    --cc=pclouds@gmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).