info-cvs archive search

Search String: Display: Description: Sort:

Results:

References: [ pserver: 4404 ] [ security: 1340 ]

Total 529 documents matching your query.

121. Re: Authentication without clear password on the network (score: 44)
Author: HIDDEN
Date: Thu, 15 Jul 2004 16:36:51 -0400 (EDT)
BTW, I really do not appreciate your use of a bogus e-mail address, especially when you give no hint as to how a human might concoct a valid e-mail address for contacting you. This forum is primarily
/archive/html/info-cvs/2004-07/msg00178.html (8,264 bytes)

122. Re: Authentication without clear password on the network (score: 23)
Author: HIDDEN
Date: Tue, 06 Jul 2004 12:42:33 +0200
My constraints are oriented to reduce administrative tasks: - no system user on the UNIX server (there is no need for CVS features indeed - only the "log name" should be kept for the author field in
/archive/html/info-cvs/2004-07/msg00042.html (7,513 bytes)

123. Re: Authentication without clear password on the network (score: 9)
Author: HIDDEN
Date: Mon, 5 Jul 2004 17:40:35 -0400 (EDT)
[ On Monday, July 5, 2004 at 12:03:57 (+0200), Yves Martin wrote: ] Why not use SSH? It would be much more secure. Don't do that. The security model used by Unix-like systems (GNU/Linux obviously inc
/archive/html/info-cvs/2004-07/msg00040.html (5,427 bytes)

124. Re: cvs over ssh with multiple users (score: 25)
Author: HIDDEN
Date: Mon, 28 Jun 2004 09:54:28 +0200
this is my problem: I have a user account on a linux machine and we can use CVS on it using the ssh protocol for security reasons (ext). This works fine for me and I can log in using my account usern
/archive/html/info-cvs/2004-06/msg00495.html (8,072 bytes)

125. cvs over ssh with multiple users (score: 9)
Author: HIDDEN
Date: Wed, 23 Jun 2004 15:32:28 +0200
Hello list, this is my problem: I have a user account on a linux machine and we can use CVS on it using the ssh protocol for security reasons (ext). This works fine for me and I can log in using my a
/archive/html/info-cvs/2004-06/msg00476.html (4,738 bytes)

126. CVS 1.11.1p1 SuSE-8.1 build 332 - protocol error: Malformed Protocol (score: 9)
Author: HIDDEN
Date: Fri, 18 Jun 2004 14:23:17 +0200
This is the error that appears after latest (dated June 9) cvs security patch using pserver protocol at cvs add command. All I could find on that topic on the internet was http://lists.gnu.org/archiv
/archive/html/info-cvs/2004-06/msg00466.html (4,768 bytes)

127. Re: <strong>CVS Security Vulnerability</strong> (score: 171)
Author: HIDDEN
Date: Tue, 25 May 2004 11:29:32 -0400
Code reviews are being conducted by interested parties. Most of those parties are not me and I have little information on their current progress. Derek a code audit starting from the date of the root
/archive/html/info-cvs/2004-05/msg00425.html (8,725 bytes)

128. Re: <strong>CVS Security Vulnerability</strong> (score: 171)
Author: HIDDEN
Date: Tue, 25 May 2004 07:59:47 -0700
Pardon me if this is an ignorant question, but is there going to be a code audit starting from the date of the rooting of the server? Hi all, For those who don't know, cvshome.org is currently down b
/archive/html/info-cvs/2004-05/msg00422.html (7,974 bytes)

129. <strong>CVS Security Vulnerability</strong> (score: 171)
Author: HIDDEN
Date: Mon, 24 May 2004 17:08:33 -0400
Hi all, For those who don't know, cvshome.org is currently down because it was hacked, via its CVS server we believe. cvshome.org was used to send an email that contains an exploit for the security v
/archive/html/info-cvs/2004-05/msg00408.html (7,169 bytes)

130. Re: CVS newbie - I want to make a new CVS installation secure... (score: 9)
Author: HIDDEN
Date: Wed, 19 May 2004 09:16:23 -0500
If all you are wanting to protect is the contents of the $CVSROOT/CVSROOT directory, then I agree, Mark's suggestion is overkill. usually, what I believe, you want can be done with directory permissi
/archive/html/info-cvs/2004-05/msg00330.html (10,105 bytes)

131. ENC: RES: cvs watch add (score: 60)
Author: HIDDEN
Date: Mon, 10 May 2004 17:46:18 -0300
Thanks again Mark. -- Marcelo Carvalho Fernandes Smart Tech Consulting www.smartech.com.br Tel:(55)21-2532-6335 --Mensagem original-- De: address@hidden [mailto:address@hidden nome de Mark D. Baushke
/archive/html/info-cvs/2004-05/msg00167.html (7,695 bytes)

132. Re: RES: cvs watch add (score: 60)
Author: HIDDEN
Date: Mon, 10 May 2004 13:05:17 -0700
Yup. You probably want to upgrade to the latest version of cvs if you can take the time to do it. I do not believe it is secure to have cvs do any local authentication/authorization or to ever run as
/archive/html/info-cvs/2004-05/msg00166.html (7,849 bytes)

133. Re: Fw: need to force username of cvs 'action' when using shared SSH account (score: 51)
Author: HIDDEN
Date: Wed, 5 May 2004 16:33:18 -0400 (EDT)
[ On Wednesday, May 5, 2004 at 10:26:24 (+0100), Keith Refson wrote: ] There is no "genuine argument" here whatsoever. There is only very serious and fundamental mis-understanding of the basic premis
/archive/html/info-cvs/2004-05/msg00080.html (9,780 bytes)

134. Fw: need to force username of cvs 'action' when using shared SSH account (score: 29)
Author: HIDDEN
Date: Wed, 05 May 2004 10:26:24 +0100
I'm making a great efford not to be sarcastic in this response. There's a genuine argument to be made here and I hope that there may be one or two readers who can be convinced by reasonable debate. I
/archive/html/info-cvs/2004-05/msg00067.html (9,269 bytes)

135. Re: need to force username of cvs 'action' when using shared SSHaccount (score: 9)
Author: HIDDEN
Date: Wed, 5 May 2004 02:08:45 -0400 (EDT)
[ On Tuesday, May 4, 2004 at 15:46:50 (-0400), Tim Grotenhuis wrote: ] SSH is TOTALLY _USELESS_ if it's used with a shared account. There is _NO_ security whatsoever with shared accounts, _especially
/archive/html/info-cvs/2004-05/msg00059.html (7,479 bytes)

136. Re: need to force username of cvs 'action' when using shared SSHaccount (score: 20)
Author: HIDDEN
Date: Tue, 4 May 2004 15:46:50 -0400
SSH is: a. secure through encryption ( cleartexting across the net with pserver is inviting disaster) b. through the SSH command="" you can limit users to one command based on the key they are authen
/archive/html/info-cvs/2004-05/msg00037.html (8,898 bytes)

137. Fw: need to force username of cvs 'action' when using shared SSH account (score: 17)
Author: HIDDEN
Date: Tue, 4 May 2004 15:10:25 -0400 (EDT)
[ someone wrote: ] I just cannot possibly ever even conceive of anyone using a "shared SSH account". The very concept is entirely antithetical to the goals of SSH and computing security in general. Y
/archive/html/info-cvs/2004-05/msg00036.html (7,802 bytes)

138. Re: Fw: need to force username of cvs 'action' when using shared SSH account (score: 17)
Author: HIDDEN
Date: Tue, 04 May 2004 02:07:32 -0700
Hmmm... I am not sure I have seen that attitude myself, but I may be biased. The current sources have certain limitations and assumptions built into them for normal configurations. However, they are
/archive/html/info-cvs/2004-05/msg00034.html (11,243 bytes)

139. Fw: need to force username of cvs 'action' when using shared SSH account (score: 17)
Author: HIDDEN
Date: Tue, 04 May 2004 09:17:50 +0100
You can also use $HOME/.ssh/environment on the client side to tunnel environment variables of your choice. I've never tried it myself, I just saw that in the ssh man page. (Your developers would be
/archive/html/info-cvs/2004-05/msg00033.html (10,516 bytes)

140. Re: Need to force username of cvs 'action' when using shared SSH account (score: 9)
Author: HIDDEN
Date: Mon, 03 May 2004 22:09:34 GMT
I had this same problem with OpenSSH. For $30 I purchased WinSSHD from BitVise - www.bitvise.com . It works great, each CVS transaction is correctly labeled with the user who did it, and Bit Vise has
/archive/html/info-cvs/2004-05/msg00026.html (8,618 bytes)


This search system is powered by Namazu