info-cvs archive search

Search String: Display: Description: Sort:

Results:

References: [ pserver: 4404 ] [ security: 1340 ]

Total 529 documents matching your query.

141. Need to force username of cvs 'action' when using shared SSH account (score: 9)
Author: HIDDEN
Date: Sat, 1 May 2004 08:51:47 -0400
I have cvs running on a shared box at my isp. They don't allow pserver to run and port 2401 is closed to the outside, and besides I am much more comfortable with the security of SSH. So I set up acce
/archive/html/info-cvs/2004-05/msg00002.html (8,093 bytes)

142. need to force username of cvs 'action' when using shared SSH account (score: 9)
Author: HIDDEN
Date: 1 May 2004 03:40:31 -0700
I have cvs running on a shared box at my isp. They don't allow pserver to run and port 2401 is closed to the outside, and besides I am much more comfortable with the security of SSH. So I set up acce
/archive/html/info-cvs/2004-05/msg00001.html (7,264 bytes)

143. RE: cvs (pserver) and LDAP ? (score: 113)
Author: HIDDEN
Date: Tue, 30 Mar 2004 12:34:21 -0800
Before you consider that, you should read: http://www.cvshome.org/docs/manual/cvs-1.11.14/cvs_2.html#SEC32 2.9.3.3 Security considerations with password authentication The passwords are stored on the
/archive/html/info-cvs/2004-03/msg00423.html (5,332 bytes)

144. RE: pserver vs ssh was (Hopefully) simple $CVSROOT question (score: 128)
Author: HIDDEN
Date: Tue, 23 Mar 2004 19:32:49 -0500 (EST)
[ On Tuesday, March 23, 2004 at 12:12:37 (-0800), Conrad T. Pino wrote: ] What more could you expect? Any kind of _real_ security increases the administration effort necessary on any server. Setting
/archive/html/info-cvs/2004-03/msg00300.html (5,592 bytes)

145. RE: pserver vs ssh was (Hopefully) simple $CVSROOT question (score: 132)
Author: HIDDEN
Date: Tue, 23 Mar 2004 12:12:37 -0800
Hmm, pserver has nice features and is great with a read-only server but is a problem with read/write servers because user id & password exchange is very insecure. Especially nice is user control wit
/archive/html/info-cvs/2004-03/msg00294.html (5,781 bytes)

146. Re: Setting up a CVS Repository on a Network (score: 9)
Author: HIDDEN
Date: Fri, 19 Mar 2004 10:54:24 -0500
Le 04-03-18, à 18:33, Eric Gorr <address@hidden> a écrit : I've got a MacOSX (Panther) Server machine on a network and would like to use it for a CVS Repository. Now, in the various documentation I
/archive/html/info-cvs/2004-03/msg00231.html (5,830 bytes)

147. RE: Binary release announcements? (score: 12)
Author: HIDDEN
Date: Wed, 18 Feb 2004 18:59:40 -0500 (EST)
[ On Wednesday, February 18, 2004 at 11:25:56 (-0500), Patton, Matthew E., CTR, OSD-PA&E wrote: ] You're confusing your "levels"(?) of trust, without any apparent regard for the threat models involve
/archive/html/info-cvs/2004-02/msg00259.html (8,018 bytes)

148. RE: Binary release announcements? (score: 9)
Author: HIDDEN
Date: Wed, 18 Feb 2004 11:25:56 -0500
Classification: UNCLASSIFIED I agree 100% with Jim Hyslop's POV. Like ANYBODY who looks at the CVS code can trust it! So it's not as bad as qmail and other hideous projects out there but the code-bas
/archive/html/info-cvs/2004-02/msg00236.html (7,805 bytes)

149. Re: what's to stop a developer from nuking the repository? (score: 72)
Author: HIDDEN
Date: Fri, 23 Jan 2004 03:36:56 -0500 (EST)
[ On Wednesday, January 21, 2004 at 13:12:05 (-0800), WJCarpenter wrote: ] Note first off that this discussion is as old as the hills. I should hope you can learn nothing new here that you couldn't l
/archive/html/info-cvs/2004-01/msg00252.html (14,467 bytes)

150. Re: what's to stop a developer from nuking the repository? (score: 22)
Author: HIDDEN
Date: Wed, 21 Jan 2004 13:12:05 -0800
So, since it's unreliable to read between the lines to try to figure out what you're saying, is it that there are bugs in the canonical CVS *implementation* that lead to these problems? Is it by exp
/archive/html/info-cvs/2004-01/msg00240.html (8,471 bytes)

151. Re: what's to stop a developer from nuking the repository? (score: 28)
Author: HIDDEN
Date: Wed, 21 Jan 2004 09:23:38 -0600 (CST)
However, setting up pserver is easier than setting up ssh. Setting up ssh requires reading more instructions, which are not necessarily as accessible. I set up remote users on a VPN with pserver onc
/archive/html/info-cvs/2004-01/msg00239.html (8,452 bytes)

152. Re: what's to stop a developer from nuking the repository? (score: 21)
Author: HIDDEN
Date: Wed, 21 Jan 2004 01:58:14 -0500 (EST)
[ On Tuesday, January 20, 2004 at 15:13:08 (-0600), address@hidden wrote: ] Indeed it is! ;-) Well, in fact pserver _precludes_ any possiblity of accountability by its very design and implementation.
/archive/html/info-cvs/2004-01/msg00233.html (8,399 bytes)

153. Re: what's to stop a developer from nuking the repository? (score: 25)
Author: HIDDEN
Date: Wed, 21 Jan 2004 01:52:51 -0500 (EST)
[ On Tuesday, January 20, 2004 at 14:02:19 (-0600), johnny fulcrum wrote: ] Of course. CVS is not a security application, was not designed as a security application, and despite recent hackish patche
/archive/html/info-cvs/2004-01/msg00234.html (8,640 bytes)

154. Re: what's to stop a developer from nuking the repository? (score: 15)
Author: HIDDEN
Date: Tue, 20 Jan 2004 14:06:59 -0500 (EST)
[ On Tuesday, January 20, 2004 at 10:58:32 (-0500), Mike Echlin wrote: ] Well, yes, though it depends on your threat models and exactly what you're doing and how you're doing it. In any case the bigg
/archive/html/info-cvs/2004-01/msg00220.html (8,711 bytes)

155. Re: what's to stop a developer from nuking the repository? (score: 12)
Author: HIDDEN
Date: Tue, 20 Jan 2004 12:15:35 -0500
You should be making this choice (pserver or not) based on what security you want/need. Realistically this is going to be somewhere between perfection and better_than_I_had_already. Lets face it if y
/archive/html/info-cvs/2004-01/msg00216.html (6,246 bytes)

156. RE: what's to stop a developer from nuking the repository? (score: 9)
Author: HIDDEN
Date: Tue, 20 Jan 2004 11:11:19 -0500
That kind of secured network is becoming more and more rare, though. Even if you could trust all your users with the root password, these days most corporate networks are connected to the Big Bad Int
/archive/html/info-cvs/2004-01/msg00212.html (6,995 bytes)

157. Re: what's to stop a developer from nuking the repository? (score: 15)
Author: HIDDEN
Date: Tue, 20 Jan 2004 10:58:32 -0500
Please forgive me if I am mistaken, and in any case I certainly don't want to start a flame war, but am I right in thinking that Greg's opinion does not reflect the majority view? I can't speak for t
/archive/html/info-cvs/2004-01/msg00207.html (8,895 bytes)

158. Re: what's to stop a developer from nuking the repository? (score: 23)
Author: HIDDEN
Date: Tue, 20 Jan 2004 09:25:37 -0500
Tirsdag den 20. januar 2004 09:33 skrev Greg A. Woods: [ On Monday, January 19, 2004 at 15:43:35 (-0800), Mark wrote: ] have unix command line users use :pserver: That's really Really REALLY _B_A_D_
/archive/html/info-cvs/2004-01/msg00202.html (8,989 bytes)

159. RE: what's to stop a developer from nuking the repository? (score: 49)
Author: HIDDEN
Date: Tue, 20 Jan 2004 10:57:15 +0100
Well, it can be summed up thusly: - pserver has a number of _possible_ security issues - pserver, by design, was not to be "secure", but to allow access over a network (you can form your own opinion
/archive/html/info-cvs/2004-01/msg00198.html (9,409 bytes)

160. Re: what's to stop a developer from nuking the repository? (score: 21)
Author: HIDDEN
Date: Tue, 20 Jan 2004 09:15:55 +0000
Please forgive me if I am mistaken, and in any case I certainly don't want to start a flame war, but am I right in thinking that Greg's opinion does not reflect the majority view?
/archive/html/info-cvs/2004-01/msg00196.html (7,634 bytes)


This search system is powered by Namazu