info-cvs archive search

Search String: Display: Description: Sort:

Results:

References: [ pserver: 4404 ] [ security: 1340 ]

Total 529 documents matching your query.

1. RE: Security, audits and pserver (score: 294)
Author: HIDDEN
Date: Mon, 16 Dec 2002 11:42:55 +0100
Been watching this thread for a while... Here is my question: Are chrooted environments truly more secure than accessing pserver over an ssh tunnel? Yes, I know you can do both. There was some talk o
/archive/html/info-cvs/2002-12/msg00199.html (9,675 bytes)

2. RE: Security, audits and pserver (score: 290)
Author: HIDDEN
Date: Mon, 16 Dec 2002 17:16:41 +0100
That's why you would tunnel it over ssh or something like that, with limited key access. People you trust get the key, and their key gets kept on the server. Definitely, a wide-open pserver connectio
/archive/html/info-cvs/2002-12/msg00209.html (7,100 bytes)

3. Re: Security, audits and pserver (score: 284)
Author: HIDDEN
Date: Tue, 17 Dec 2002 09:33:21 -0600 (CST)
The repository is likely to be one of the more valuable things the enterprise has on its computers, and so fencing everything else off from it may not make sense. In general, I like the idea of usin
/archive/html/info-cvs/2002-12/msg00243.html (7,092 bytes)

4. Re: Security, audits and pserver (score: 278)
Author: HIDDEN
Date: Mon, 16 Dec 2002 11:13:16 -0500 (EST)
Note that giving anyone pserver access to a machine is equivalent to giving them local shell access -- there are fairly simple tricks that can be used to execute arbitrary code on the server. CVS was
/archive/html/info-cvs/2002-12/msg00205.html (6,736 bytes)

5. RE: Security, audits and pserver (score: 275)
Author: HIDDEN
Date: Mon, 16 Dec 2002 16:09:11 -0500 (EST)
[ On Monday, December 16, 2002 at 17:16:41 (+0100), Walter, Jan wrote: ] No, that's why you'd use SSH plain and simple with real, proper, unique system accounts for every real person, and never use C
/archive/html/info-cvs/2002-12/msg00216.html (6,296 bytes)

6. Re: Security, audits and pserver (score: 275)
Author: HIDDEN
Date: Thu, 12 Dec 2002 14:54:53 -0500
CHARLES HART, BLOOMBERG/ 499 PARK wrote: um, I'm a newbie at CVS, so I've read more of the documentation than anything else, but the answers I've seen so far for the security question seem to have mi
/archive/html/info-cvs/2002-12/msg00167.html (8,500 bytes)

7. Re: Security, audits and pserver (score: 272)
Author: HIDDEN
Date: Thu, 12 Dec 2002 09:46:08 -0800 (PST)
SSH (at least SSH2) can be configured in such a way that only CVS can be executed with a particular key pair. I think this means that one would need to subvert CVS or SSH in order to manipulate the i
/archive/html/info-cvs/2002-12/msg00163.html (7,104 bytes)

8. Re: Security, audits and pserver (score: 272)
Author: HIDDEN
Date: Thu, 12 Dec 2002 12:33:27 -0500 (EST)
um, I'm a newbie at CVS, so I've read more of the documentation than anything else, but the answers I've seen so far for the security question seem to have missed one vital point. People have write a
/archive/html/info-cvs/2002-12/msg00162.html (5,996 bytes)

9. Re: Security, audits and pserver (score: 265)
Author: HIDDEN
Date: Thu, 12 Dec 2002 16:20:34 -0500 (EST)
No. Only pserver uses CVSROOT/passwd. -Larry Jones I've changed my mind, Hobbes. People are scum. -- Calvin
/archive/html/info-cvs/2002-12/msg00171.html (6,262 bytes)

10. RE: Security, audits and pserver (score: 264)
Author: HIDDEN
Date: Fri, 13 Dec 2002 11:26:13 -0500
Yes, this you are correct... chrooting a file system would have no impact on the user's ability to access the repository. The best method for keeping folks out is to use public key ssh auth, constra
/archive/html/info-cvs/2002-12/msg00182.html (7,065 bytes)

11. RE: Security, audits and pserver (score: 262)
Author: HIDDEN
Date: Mon, 16 Dec 2002 10:35:39 -0800
The advantage to chroot environments is that they can limit exposure to things like rogue *info scripts that might reach beyond the CVS repository. This is handy in the event that you store sensitive
/archive/html/info-cvs/2002-12/msg00215.html (6,451 bytes)

12. Re: Security of pserver (score: 262)
Author: HIDDEN
Date: Tue, 03 Oct 2000 09:28:09 -0400
No, pserver passwords are not encrypted with a strong algorithm. In fact it is extremely weak - a simple substitution table. Try using the :ext: access methon with ssh. Derek -- Derek Price CVS Solut
/archive/html/info-cvs/2000-10/msg00033.html (4,895 bytes)

13. Re: Security, audits and pserver (score: 259)
Author: HIDDEN
Date: Fri, 13 Dec 2002 08:21:16 -0800
This is correct, provided the users (or other services) aren't confined to their own (non-overlapping) chroot environments.
/archive/html/info-cvs/2002-12/msg00190.html (6,713 bytes)

14. Re: Security, audits and pserver (score: 259)
Author: HIDDEN
Date: Fri, 13 Dec 2002 06:16:46 -0800 (PST)
I see. I guess it's obvious that the repository would have to be within the chroot'ed environment meaning that such an environment wouldn't help in preventing users from directly accessing the archiv
/archive/html/info-cvs/2002-12/msg00178.html (6,480 bytes)

15. RE: Security, audits and pserver (score: 259)
Author: HIDDEN
Date: Thu, 12 Dec 2002 13:39:36 -0800
I would be astonished if this were true. You'd have to replicate /bin, /usr/bin, /etc, /lib, /usr/lib, /etc, /usr/local, /include, /usr/include, /dev, and a whole lot of other stuff to make it work a
/archive/html/info-cvs/2002-12/msg00173.html (6,154 bytes)

16. RE: Security, audits and pserver (score: 259)
Author: HIDDEN
Date: Thu, 12 Dec 2002 12:35:33 -0800
Oh, but that's OK - just set the shells for the users to /bin/false - that'll prevent them from logging in with a shell. And isn't there a way to specify a chrooted home directory in /etc/passwd? Can
/archive/html/info-cvs/2002-12/msg00168.html (5,999 bytes)

17. Re: Security, audits and pserver (score: 259)
Author: HIDDEN
Date: Thu, 12 Dec 2002 09:11:18 -0800
A chroot environment is only good at containing what's inside it. It does not prevent access to the chroot environment from outside. In other words, chroot is fine for containing servers so that they
/archive/html/info-cvs/2002-12/msg00166.html (6,603 bytes)

18. RE: Security, audits and pserver (score: 259)
Author: HIDDEN
Date: Thu, 12 Dec 2002 19:08:52 +0100
This is not necessarily true, as you can use CVS within a chroot'ed environment. In that case you can prevent your users from getting a shell resp. from executing any commands than the few you allow
/archive/html/info-cvs/2002-12/msg00164.html (6,652 bytes)

19. Re: Security of pserver (score: 259)
Author: HIDDEN
Date: Tue, 3 Oct 2000 16:16:49 +0200
NO Use the :ext: method in conjunction with CVS_RSH=`which ssh`. And yes, this has been discussed a thousand times already. See the archives for more details. Or visit sourcefourge for their setup in
/archive/html/info-cvs/2000-10/msg00054.html (4,767 bytes)

20. Security of pserver (score: 259)
Author: HIDDEN
Date: Tue, 3 Oct 2000 10:47:27 +0200
Dear all, please excuse my -- potentially -- missleading subject if applicable. Question: - Are the passwords and the contents encrypted with a strong algorithm in case a remote repository is accesse
/archive/html/info-cvs/2000-10/msg00030.html (4,568 bytes)


This search system is powered by Namazu