git.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* git:// protocol over SSL/TLS
@ 2013-12-27 12:59 Sergey Sharybin
  2013-12-27 13:29 ` Andreas Schwab
  2013-12-27 13:36 ` Konstantin Khomoutov
  0 siblings, 2 replies; 21+ messages in thread
From: Sergey Sharybin @ 2013-12-27 12:59 UTC (permalink / raw)
  To: Git List

Hello everyone!

Quick question is, is it possible to use git:// protocol over
SSL/TLS/other secure transport?

Or the recommended way to do secure anonymous checkout is to simply
use https:// ?

Thanks in advance!

-- 
With best regards, Sergey Sharybin

^ permalink raw reply	[flat|nested] 21+ messages in thread

* Re: git:// protocol over SSL/TLS
  2013-12-27 12:59 git:// protocol over SSL/TLS Sergey Sharybin
@ 2013-12-27 13:29 ` Andreas Schwab
  2013-12-27 13:36 ` Konstantin Khomoutov
  1 sibling, 0 replies; 21+ messages in thread
From: Andreas Schwab @ 2013-12-27 13:29 UTC (permalink / raw)
  To: Sergey Sharybin; +Cc: Git List

Sergey Sharybin <sergey.vfx@gmail.com> writes:

> Quick question is, is it possible to use git:// protocol over
> SSL/TLS/other secure transport?

The git protocol itself performs no encryption or authentication by
design.  This is the job of the transport protocol.

> Or the recommended way to do secure anonymous checkout is to simply
> use https:// ?

Yes.

Andreas.

-- 
Andreas Schwab, schwab@linux-m68k.org
GPG Key fingerprint = 58CA 54C7 6D53 942B 1756  01D3 44D5 214B 8276 4ED5
"And now for something completely different."

^ permalink raw reply	[flat|nested] 21+ messages in thread

* Re: git:// protocol over SSL/TLS
  2013-12-27 12:59 git:// protocol over SSL/TLS Sergey Sharybin
  2013-12-27 13:29 ` Andreas Schwab
@ 2013-12-27 13:36 ` Konstantin Khomoutov
  2013-12-27 13:58   ` Sergey Sharybin
  2013-12-27 22:21   ` Junio C Hamano
  1 sibling, 2 replies; 21+ messages in thread
From: Konstantin Khomoutov @ 2013-12-27 13:36 UTC (permalink / raw)
  To: Sergey Sharybin; +Cc: Git List

On Fri, 27 Dec 2013 18:59:00 +0600
Sergey Sharybin <sergey.vfx@gmail.com> wrote:

> Quick question is, is it possible to use git:// protocol over
> SSL/TLS/other secure transport?

The Git protocol does not implement it itself but you can channel it
over a TLS tunnel (via stunnel for instance).  Unfortunately, this
means a specialized software and setup on both ends so if the question
was about a general client using stock Git then the answer is no, it's
impossible.

> Or the recommended way to do secure anonymous checkout is to simply
> use https:// ?

Yes, but it will only be secure if you've managed to verify the
server's certificate and do trust its issuer (or a CA higher up the
cert's trust chain) -- people tend to confuse "encrypted" with
"secure" which is not at all the same thing.

^ permalink raw reply	[flat|nested] 21+ messages in thread

* Re: git:// protocol over SSL/TLS
  2013-12-27 13:36 ` Konstantin Khomoutov
@ 2013-12-27 13:58   ` Sergey Sharybin
  2013-12-27 14:12     ` Andreas Schwab
  2013-12-27 14:14     ` Konstantin Khomoutov
  2013-12-27 22:21   ` Junio C Hamano
  1 sibling, 2 replies; 21+ messages in thread
From: Sergey Sharybin @ 2013-12-27 13:58 UTC (permalink / raw)
  To: Konstantin Khomoutov; +Cc: Git List

Hi,

On Fri, Dec 27, 2013 at 7:36 PM, Konstantin Khomoutov
<flatworm@users.sourceforge.net> wrote:
>
> The Git protocol does not implement it itself but you can channel it
> over a TLS tunnel (via stunnel for instance).  Unfortunately, this
> means a specialized software and setup on both ends so if the question
> was about a general client using stock Git then the answer is no, it's
> impossible.

Ok, got it.

> Yes, but it will only be secure if you've managed to verify the
> server's certificate and do trust its issuer (or a CA higher up the
> cert's trust chain) -- people tend to confuse "encrypted" with
> "secure" which is not at all the same thing.

We've got CA-signed certificate atm and it's about to be also
EV-signed for our server (git.blender.org). So this is not gonna to be
an issue. Cloning over https:// works fine, but we wanted to be sure
all the bits are secure.

So guess we just need to recommend using https:// protocol instead of
git:// for our users?

-- 
With best regards, Sergey Sharybin

^ permalink raw reply	[flat|nested] 21+ messages in thread

* Re: git:// protocol over SSL/TLS
  2013-12-27 13:58   ` Sergey Sharybin
@ 2013-12-27 14:12     ` Andreas Schwab
  2013-12-27 14:16       ` Konstantin Khomoutov
                         ` (3 more replies)
  2013-12-27 14:14     ` Konstantin Khomoutov
  1 sibling, 4 replies; 21+ messages in thread
From: Andreas Schwab @ 2013-12-27 14:12 UTC (permalink / raw)
  To: Sergey Sharybin; +Cc: Konstantin Khomoutov, Git List

Sergey Sharybin <sergey.vfx@gmail.com> writes:

> So guess we just need to recommend using https:// protocol instead of
> git:// for our users?

Given how easy it is to verify the integrity of a git repository out of
band there isn't really much of added security by using TLS for
transport.

Andreas.

-- 
Andreas Schwab, schwab@linux-m68k.org
GPG Key fingerprint = 58CA 54C7 6D53 942B 1756  01D3 44D5 214B 8276 4ED5
"And now for something completely different."

^ permalink raw reply	[flat|nested] 21+ messages in thread

* Re: git:// protocol over SSL/TLS
  2013-12-27 13:58   ` Sergey Sharybin
  2013-12-27 14:12     ` Andreas Schwab
@ 2013-12-27 14:14     ` Konstantin Khomoutov
  1 sibling, 0 replies; 21+ messages in thread
From: Konstantin Khomoutov @ 2013-12-27 14:14 UTC (permalink / raw)
  To: Sergey Sharybin; +Cc: Konstantin Khomoutov, Git List

On Fri, 27 Dec 2013 19:58:19 +0600
Sergey Sharybin <sergey.vfx@gmail.com> wrote:

[...]
> > Yes, but it will only be secure if you've managed to verify the
> > server's certificate and do trust its issuer (or a CA higher up the
> > cert's trust chain) -- people tend to confuse "encrypted" with
> > "secure" which is not at all the same thing.
> 
> We've got CA-signed certificate atm and it's about to be also
> EV-signed for our server (git.blender.org). So this is not gonna to be
> an issue. Cloning over https:// works fine, but we wanted to be sure
> all the bits are secure.

This setup sounds to be just the right thing.

> So guess we just need to recommend using https:// protocol instead of
> git:// for our users?

I think yes.  HTTP[S] once was dumb and slow but now it should be
comparable in speed to git:// as essentially using this protocol (which
became "smart" [1]) means spawning a git server process once per fetch/push
session and making the client and server Git processes communicate all by
themselves, so HTTP is there for request routing, authentication and
session setup while data transfer is carried out by Git processes
themselves [2].

1. http://git-scm.com/blog/2010/03/04/smart-http.html
2. https://www.kernel.org/pub/software/scm/git/docs/git-http-backend.html

^ permalink raw reply	[flat|nested] 21+ messages in thread

* Re: git:// protocol over SSL/TLS
  2013-12-27 14:12     ` Andreas Schwab
@ 2013-12-27 14:16       ` Konstantin Khomoutov
  2013-12-27 14:18       ` Sergey Sharybin
                         ` (2 subsequent siblings)
  3 siblings, 0 replies; 21+ messages in thread
From: Konstantin Khomoutov @ 2013-12-27 14:16 UTC (permalink / raw)
  To: Andreas Schwab; +Cc: Sergey Sharybin, Konstantin Khomoutov, Git List

On Fri, 27 Dec 2013 15:12:07 +0100
Andreas Schwab <schwab@linux-m68k.org> wrote:

> > So guess we just need to recommend using https:// protocol instead
> > of git:// for our users?
> 
> Given how easy it is to verify the integrity of a git repository out
> of band there isn't really much of added security by using TLS for
> transport.

If the devs employ signed tags then yes but otherwise you'd have to
have some reference repository to compare with.  Sure they target for a
more no-brainer setup. ;-)

^ permalink raw reply	[flat|nested] 21+ messages in thread

* Re: git:// protocol over SSL/TLS
  2013-12-27 14:12     ` Andreas Schwab
  2013-12-27 14:16       ` Konstantin Khomoutov
@ 2013-12-27 14:18       ` Sergey Sharybin
  2013-12-27 14:20       ` Matthieu Moy
  2013-12-27 14:21       ` Pyeron, Jason J CTR (US)
  3 siblings, 0 replies; 21+ messages in thread
From: Sergey Sharybin @ 2013-12-27 14:18 UTC (permalink / raw)
  To: Andreas Schwab; +Cc: Konstantin Khomoutov, Git List

Our sysadmns are mainly worried about possible MITM which might give
users completely wrong repo.

For sure users might simply compare hash of HEAD from https'ed site
with repo browser with what they've got in the checkout. But that's an
extra step which we'd like to avoid without security harm :)

On Fri, Dec 27, 2013 at 8:12 PM, Andreas Schwab <schwab@linux-m68k.org> wrote:
> Sergey Sharybin <sergey.vfx@gmail.com> writes:
>
>> So guess we just need to recommend using https:// protocol instead of
>> git:// for our users?
>
> Given how easy it is to verify the integrity of a git repository out of
> band there isn't really much of added security by using TLS for
> transport.
>
> Andreas.
>
> --
> Andreas Schwab, schwab@linux-m68k.org
> GPG Key fingerprint = 58CA 54C7 6D53 942B 1756  01D3 44D5 214B 8276 4ED5
> "And now for something completely different."



-- 
With best regards, Sergey Sharybin

^ permalink raw reply	[flat|nested] 21+ messages in thread

* Re: git:// protocol over SSL/TLS
  2013-12-27 14:12     ` Andreas Schwab
  2013-12-27 14:16       ` Konstantin Khomoutov
  2013-12-27 14:18       ` Sergey Sharybin
@ 2013-12-27 14:20       ` Matthieu Moy
  2013-12-27 14:25         ` Sergey Sharybin
  2013-12-27 14:29         ` Andreas Schwab
  2013-12-27 14:21       ` Pyeron, Jason J CTR (US)
  3 siblings, 2 replies; 21+ messages in thread
From: Matthieu Moy @ 2013-12-27 14:20 UTC (permalink / raw)
  To: Andreas Schwab; +Cc: Sergey Sharybin, Konstantin Khomoutov, Git List

Andreas Schwab <schwab@linux-m68k.org> writes:

> Sergey Sharybin <sergey.vfx@gmail.com> writes:
>
>> So guess we just need to recommend using https:// protocol instead of
>> git:// for our users?
>
> Given how easy it is to verify the integrity of a git repository out of
> band there isn't really much of added security by using TLS for
> transport.

You can verify integrity after the fact, but not guarantee
confidentiality ... so it again depends on the definition of "security".

-- 
Matthieu Moy
http://www-verimag.imag.fr/~moy/

^ permalink raw reply	[flat|nested] 21+ messages in thread

* RE: git:// protocol over SSL/TLS
  2013-12-27 14:12     ` Andreas Schwab
                         ` (2 preceding siblings ...)
  2013-12-27 14:20       ` Matthieu Moy
@ 2013-12-27 14:21       ` Pyeron, Jason J CTR (US)
  3 siblings, 0 replies; 21+ messages in thread
From: Pyeron, Jason J CTR (US) @ 2013-12-27 14:21 UTC (permalink / raw)
  To: Git List; +Cc: Konstantin Khomoutov, Andreas Schwab, Sergey Sharybin

[-- Attachment #1: Type: text/plain, Size: 605 bytes --]

> -----Original Message-----
> From: Andreas Schwab
> Sent: Friday, December 27, 2013 9:12 AM
> 
> Sergey Sharybin <sergey.vfx@gmail.com> writes:
> 
> > So guess we just need to recommend using https:// protocol instead of
> > git:// for our users?
> 
> Given how easy it is to verify the integrity of a git repository out of
> band there isn't really much of added security by using TLS for
> transport.

I have to say, using encryption (TLS, etc) is not just for assurance of the communicating parties, but also to prevent a compromise of confidentiality.

Jason Pyeron
(please do not add me to the cc)

[-- Attachment #2: smime.p7s --]
[-- Type: application/x-pkcs7-signature, Size: 5615 bytes --]

^ permalink raw reply	[flat|nested] 21+ messages in thread

* Re: git:// protocol over SSL/TLS
  2013-12-27 14:20       ` Matthieu Moy
@ 2013-12-27 14:25         ` Sergey Sharybin
  2013-12-27 14:39           ` Konstantin Khomoutov
                             ` (2 more replies)
  2013-12-27 14:29         ` Andreas Schwab
  1 sibling, 3 replies; 21+ messages in thread
From: Sergey Sharybin @ 2013-12-27 14:25 UTC (permalink / raw)
  To: Matthieu Moy; +Cc: Andreas Schwab, Konstantin Khomoutov, Git List

Security in this case is about being sure everyone gets exactly the
same repository as stored on the server, without any modifications to
the sources cased by MITM.

As for "smart" http, this seems pretty much cool.However, we're
currently using lighthttpd, so it might be an issue. We'll check on
whether "smart" http is used there, and if not guess it wouldn't be a
big deal to switch to apache.

On Fri, Dec 27, 2013 at 8:20 PM, Matthieu Moy
<Matthieu.Moy@grenoble-inp.fr> wrote:
> Andreas Schwab <schwab@linux-m68k.org> writes:
>
>> Sergey Sharybin <sergey.vfx@gmail.com> writes:
>>
>>> So guess we just need to recommend using https:// protocol instead of
>>> git:// for our users?
>>
>> Given how easy it is to verify the integrity of a git repository out of
>> band there isn't really much of added security by using TLS for
>> transport.
>
> You can verify integrity after the fact, but not guarantee
> confidentiality ... so it again depends on the definition of "security".
>
> --
> Matthieu Moy
> http://www-verimag.imag.fr/~moy/



-- 
With best regards, Sergey Sharybin

^ permalink raw reply	[flat|nested] 21+ messages in thread

* Re: git:// protocol over SSL/TLS
  2013-12-27 14:20       ` Matthieu Moy
  2013-12-27 14:25         ` Sergey Sharybin
@ 2013-12-27 14:29         ` Andreas Schwab
  1 sibling, 0 replies; 21+ messages in thread
From: Andreas Schwab @ 2013-12-27 14:29 UTC (permalink / raw)
  To: Matthieu Moy; +Cc: Sergey Sharybin, Konstantin Khomoutov, Git List

Matthieu Moy <Matthieu.Moy@grenoble-inp.fr> writes:

> You can verify integrity after the fact, but not guarantee
> confidentiality ... so it again depends on the definition of "security".

Since the OP is talking about anonymous access there is no need for
confidentiality in this case.

Andreas.

-- 
Andreas Schwab, schwab@linux-m68k.org
GPG Key fingerprint = 58CA 54C7 6D53 942B 1756  01D3 44D5 214B 8276 4ED5
"And now for something completely different."

^ permalink raw reply	[flat|nested] 21+ messages in thread

* Re: git:// protocol over SSL/TLS
  2013-12-27 14:25         ` Sergey Sharybin
@ 2013-12-27 14:39           ` Konstantin Khomoutov
  2013-12-27 14:47             ` Sergey Sharybin
  2013-12-27 16:26           ` Bernhard R. Link
  2013-12-28  0:11           ` brian m. carlson
  2 siblings, 1 reply; 21+ messages in thread
From: Konstantin Khomoutov @ 2013-12-27 14:39 UTC (permalink / raw)
  To: Sergey Sharybin
  Cc: Matthieu Moy, Andreas Schwab, Konstantin Khomoutov, Git List

On Fri, 27 Dec 2013 20:25:16 +0600
Sergey Sharybin <sergey.vfx@gmail.com> wrote:

> Security in this case is about being sure everyone gets exactly the
> same repository as stored on the server, without any modifications to
> the sources cased by MITM.
> 
> As for "smart" http, this seems pretty much cool.However, we're
> currently using lighthttpd, so it might be an issue. We'll check on
> whether "smart" http is used there, and if not guess it wouldn't be a
> big deal to switch to apache.

The web server software has nothing to do with HTTP[S] used by Git being
"smart", I think, it just has to be set up properly.

As discussed in an earlier thread here, a good indication of the
dumb version of the protocol being in use is no display of the
fetching progress on the client while doing `git clone` because this
information (like "compressing objects ..." etc) is sent by the
server-side Git process which is only there if HTTP[S] "was smart".
Otherwise the client just GETs packs of objects, traverses them, GETs
more and so on, so batches of HTTP GET requests correlating to clone
sessions in the web server logs should also be indicative of the
problem.

^ permalink raw reply	[flat|nested] 21+ messages in thread

* Re: git:// protocol over SSL/TLS
  2013-12-27 14:39           ` Konstantin Khomoutov
@ 2013-12-27 14:47             ` Sergey Sharybin
  2013-12-27 14:56               ` Konstantin Khomoutov
  2013-12-28  9:37               ` Jeff King
  0 siblings, 2 replies; 21+ messages in thread
From: Sergey Sharybin @ 2013-12-27 14:47 UTC (permalink / raw)
  To: Konstantin Khomoutov; +Cc: Matthieu Moy, Andreas Schwab, Git List

>> As for "smart" http, this seems pretty much cool.However, we're
>> currently using lighthttpd, so it might be an issue. We'll check on
>> whether "smart" http is used there, and if not guess it wouldn't be a
>> big deal to switch to apache.
>
> The web server software has nothing to do with HTTP[S] used by Git being
> "smart", I think, it just has to be set up properly.

Misunderstood git doc then which says "it has to be Apache, currently
- other CGI servers don't work, last I checked".

> As discussed in an earlier thread here, a good indication of the
> dumb version of the protocol being in use is no display of the
> fetching progress on the client while doing `git clone` because this
> information (like "compressing objects ..." etc) is sent by the
> server-side Git process which is only there if HTTP[S] "was smart".
> Otherwise the client just GETs packs of objects, traverses them, GETs
> more and so on, so batches of HTTP GET requests correlating to clone
> sessions in the web server logs should also be indicative of the
> problem.

Just to verify, if i see messages like "Receiving objects:   1%
(7289/705777), 1.72 MiB | 340.00 KiB/s" it means server is "smart" ?



-- 
With best regards, Sergey Sharybin

^ permalink raw reply	[flat|nested] 21+ messages in thread

* Re: git:// protocol over SSL/TLS
  2013-12-27 14:47             ` Sergey Sharybin
@ 2013-12-27 14:56               ` Konstantin Khomoutov
  2013-12-28  9:37               ` Jeff King
  1 sibling, 0 replies; 21+ messages in thread
From: Konstantin Khomoutov @ 2013-12-27 14:56 UTC (permalink / raw)
  To: Sergey Sharybin
  Cc: Konstantin Khomoutov, Matthieu Moy, Andreas Schwab, Git List

On Fri, 27 Dec 2013 20:47:54 +0600
Sergey Sharybin <sergey.vfx@gmail.com> wrote:

[...]
> > As discussed in an earlier thread here, a good indication of the
> > dumb version of the protocol being in use is no display of the
> > fetching progress on the client while doing `git clone` because this
> > information (like "compressing objects ..." etc) is sent by the
> > server-side Git process which is only there if HTTP[S] "was smart".
> > Otherwise the client just GETs packs of objects, traverses them,
> > GETs more and so on, so batches of HTTP GET requests correlating to
> > clone sessions in the web server logs should also be indicative of
> > the problem.
> 
> Just to verify, if i see messages like "Receiving objects:   1%
> (7289/705777), 1.72 MiB | 340.00 KiB/s" it means server is "smart" ?

I would say yes, because your Git knows the precise number of objects to
receive.  Unfortunately, I won't swear by this as this was a long time
ago I have seen cloning using the dumb protocol.

By the way, here [1] is that discussion.

1. http://thread.gmane.org/gmane.comp.version-control.git/238933/focus=238946

^ permalink raw reply	[flat|nested] 21+ messages in thread

* Re: git:// protocol over SSL/TLS
  2013-12-27 14:25         ` Sergey Sharybin
  2013-12-27 14:39           ` Konstantin Khomoutov
@ 2013-12-27 16:26           ` Bernhard R. Link
  2013-12-28 20:52             ` Sergey Sharybin
  2013-12-28  0:11           ` brian m. carlson
  2 siblings, 1 reply; 21+ messages in thread
From: Bernhard R. Link @ 2013-12-27 16:26 UTC (permalink / raw)
  To: Sergey Sharybin
  Cc: Matthieu Moy, Andreas Schwab, Konstantin Khomoutov, Git List

* Sergey Sharybin <sergey.vfx@gmail.com> [131227 15:25]:
> Security in this case is about being sure everyone gets exactly the
> same repository as stored on the server, without any modifications to
> the sources cased by MITM.

Note that ssl (and thus https) only helps here against a resource-less
man-in-the-middle. Getting catch-all CA-signed certificates is said to
no longer available to everyone as easily as it was some years ago, but
unless you allow only one private CA (and even there clients often fail)
you still should assume everyone resourceful enough to still be able to
do MITM.

        Bernhard R. Link

^ permalink raw reply	[flat|nested] 21+ messages in thread

* Re: git:// protocol over SSL/TLS
  2013-12-27 13:36 ` Konstantin Khomoutov
  2013-12-27 13:58   ` Sergey Sharybin
@ 2013-12-27 22:21   ` Junio C Hamano
  2013-12-28 20:00     ` Ilari Liusvaara
  1 sibling, 1 reply; 21+ messages in thread
From: Junio C Hamano @ 2013-12-27 22:21 UTC (permalink / raw)
  To: Konstantin Khomoutov; +Cc: Sergey Sharybin, Git List

Konstantin Khomoutov <flatworm@users.sourceforge.net> writes:

> On Fri, 27 Dec 2013 18:59:00 +0600
> Sergey Sharybin <sergey.vfx@gmail.com> wrote:
>
>> Quick question is, is it possible to use git:// protocol over
>> SSL/TLS/other secure transport?
>
> The Git protocol does not implement it itself but you can channel it
> over a TLS tunnel (via stunnel for instance).  Unfortunately, this
> means a specialized software and setup on both ends so if the question
> was about a general client using stock Git then the answer is no, it's
> impossible.

Hmph, I somehow had an impression that you wouldn't need anything
more complex than a simple helper that uses git-remote-ext on the
client side. On the remote end, you'd need to have something that
terminates the incoming SSL/TLS and plugs it to your git daemon.

>
>> Or the recommended way to do secure anonymous checkout is to simply
>> use https:// ?
>
> Yes, but it will only be secure if you've managed to verify the
> server's certificate and do trust its issuer (or a CA higher up the
> cert's trust chain) -- people tend to confuse "encrypted" with
> "secure" which is not at all the same thing.

^ permalink raw reply	[flat|nested] 21+ messages in thread

* Re: git:// protocol over SSL/TLS
  2013-12-27 14:25         ` Sergey Sharybin
  2013-12-27 14:39           ` Konstantin Khomoutov
  2013-12-27 16:26           ` Bernhard R. Link
@ 2013-12-28  0:11           ` brian m. carlson
  2 siblings, 0 replies; 21+ messages in thread
From: brian m. carlson @ 2013-12-28  0:11 UTC (permalink / raw)
  To: Sergey Sharybin
  Cc: Matthieu Moy, Andreas Schwab, Konstantin Khomoutov, Git List

[-- Attachment #1: Type: text/plain, Size: 1051 bytes --]

On Fri, Dec 27, 2013 at 08:25:16PM +0600, Sergey Sharybin wrote:
> Security in this case is about being sure everyone gets exactly the
> same repository as stored on the server, without any modifications to
> the sources cased by MITM.

Besides security, HTTPS is more likely to work across different
firewalls and proxies, since "odd" ports like 9418 are often blocked and
HTTPS usually isn't subject to the weirdness of proxies (since they
can't inspect it or modify it).

> As for "smart" http, this seems pretty much cool.However, we're
> currently using lighthttpd, so it might be an issue. We'll check on
> whether "smart" http is used there, and if not guess it wouldn't be a
> big deal to switch to apache.

You can use Lighttpd if you like.  See
Documentation/git-http-backend.txt (or git http-backend --help).

-- 
brian m. carlson / brian with sandals: Houston, Texas, US
+1 832 623 2791 | http://www.crustytoothpaste.net/~bmc | My opinion only
OpenPGP: RSA v4 4096b: 88AC E9B2 9196 305B A994 7552 F1BA 225C 0223 B187

[-- Attachment #2: Digital signature --]
[-- Type: application/pgp-signature, Size: 836 bytes --]

^ permalink raw reply	[flat|nested] 21+ messages in thread

* Re: git:// protocol over SSL/TLS
  2013-12-27 14:47             ` Sergey Sharybin
  2013-12-27 14:56               ` Konstantin Khomoutov
@ 2013-12-28  9:37               ` Jeff King
  1 sibling, 0 replies; 21+ messages in thread
From: Jeff King @ 2013-12-28  9:37 UTC (permalink / raw)
  To: Sergey Sharybin
  Cc: Konstantin Khomoutov, Matthieu Moy, Andreas Schwab, Git List

On Fri, Dec 27, 2013 at 08:47:54PM +0600, Sergey Sharybin wrote:

> > The web server software has nothing to do with HTTP[S] used by Git being
> > "smart", I think, it just has to be set up properly.
> 
> Misunderstood git doc then which says "it has to be Apache, currently
> - other CGI servers don't work, last I checked".

Do you happen to remember where you saw that claim? If the manual in
git's Documentation/ directory says that, I'd like to fix it.

I added sample lighttpd config to "git help http-backend" a while back.
I tested it at the time, but I do not currently run a lighttpd git
server at all.

-Peff

^ permalink raw reply	[flat|nested] 21+ messages in thread

* Re: git:// protocol over SSL/TLS
  2013-12-27 22:21   ` Junio C Hamano
@ 2013-12-28 20:00     ` Ilari Liusvaara
  0 siblings, 0 replies; 21+ messages in thread
From: Ilari Liusvaara @ 2013-12-28 20:00 UTC (permalink / raw)
  To: Junio C Hamano; +Cc: Konstantin Khomoutov, Sergey Sharybin, Git List

On Fri, Dec 27, 2013 at 02:21:31PM -0800, Junio C Hamano wrote:
> Konstantin Khomoutov <flatworm@users.sourceforge.net> writes:
> >
> > The Git protocol does not implement it itself but you can channel it
> > over a TLS tunnel (via stunnel for instance).  Unfortunately, this
> > means a specialized software and setup on both ends so if the question
> > was about a general client using stock Git then the answer is no, it's
> > impossible.
> 
> Hmph, I somehow had an impression that you wouldn't need anything
> more complex than a simple helper that uses git-remote-ext on the
> client side. On the remote end, you'd need to have something that
> terminates the incoming SSL/TLS and plugs it to your git daemon.

If you have some tool that can do cleartext I/O from stdin/stdout
and establishes ciphertext connection itself, you can use it with
git-remote-ext. It was written for cases exactly like that.

To do git:// inside, use the %G pseudo-argument.

-Ilari

^ permalink raw reply	[flat|nested] 21+ messages in thread

* Re: git:// protocol over SSL/TLS
  2013-12-27 16:26           ` Bernhard R. Link
@ 2013-12-28 20:52             ` Sergey Sharybin
  0 siblings, 0 replies; 21+ messages in thread
From: Sergey Sharybin @ 2013-12-28 20:52 UTC (permalink / raw)
  To: Bernhard R. Link
  Cc: Matthieu Moy, Andreas Schwab, Konstantin Khomoutov, Git List

Yeah, i understand this. We can not protect self from every single
possible attack..

On Fri, Dec 27, 2013 at 10:26 PM, Bernhard R. Link
<brl+git@mail.brlink.eu> wrote:
> * Sergey Sharybin <sergey.vfx@gmail.com> [131227 15:25]:
>> Security in this case is about being sure everyone gets exactly the
>> same repository as stored on the server, without any modifications to
>> the sources cased by MITM.
>
> Note that ssl (and thus https) only helps here against a resource-less
> man-in-the-middle. Getting catch-all CA-signed certificates is said to
> no longer available to everyone as easily as it was some years ago, but
> unless you allow only one private CA (and even there clients often fail)
> you still should assume everyone resourceful enough to still be able to
> do MITM.
>
>         Bernhard R. Link



-- 
With best regards, Sergey Sharybin

^ permalink raw reply	[flat|nested] 21+ messages in thread

end of thread, other threads:[~2013-12-28 20:52 UTC | newest]

Thread overview: 21+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2013-12-27 12:59 git:// protocol over SSL/TLS Sergey Sharybin
2013-12-27 13:29 ` Andreas Schwab
2013-12-27 13:36 ` Konstantin Khomoutov
2013-12-27 13:58   ` Sergey Sharybin
2013-12-27 14:12     ` Andreas Schwab
2013-12-27 14:16       ` Konstantin Khomoutov
2013-12-27 14:18       ` Sergey Sharybin
2013-12-27 14:20       ` Matthieu Moy
2013-12-27 14:25         ` Sergey Sharybin
2013-12-27 14:39           ` Konstantin Khomoutov
2013-12-27 14:47             ` Sergey Sharybin
2013-12-27 14:56               ` Konstantin Khomoutov
2013-12-28  9:37               ` Jeff King
2013-12-27 16:26           ` Bernhard R. Link
2013-12-28 20:52             ` Sergey Sharybin
2013-12-28  0:11           ` brian m. carlson
2013-12-27 14:29         ` Andreas Schwab
2013-12-27 14:21       ` Pyeron, Jason J CTR (US)
2013-12-27 14:14     ` Konstantin Khomoutov
2013-12-27 22:21   ` Junio C Hamano
2013-12-28 20:00     ` Ilari Liusvaara

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).