[ On Wednesday, August 9, 2000 at 19:48:24 (-0400), Justin Wells wrote: ]
> Subject: Re: cvs-nserver and latest CVS advisory
>
> My requirement is that if someone proves to be untrustworthy I want
> to be able to disable their access to the box and undo whatever it
> is that they've done. I also want to limit the damage they might
> do to just the CVS repository itself so I don't have as big a clean-up
> to do when I make a mistake.

You're learning, slowly, it seems.  Integrity and accountability really
are fundamental requirements to achieving systems security.

> > If you have a competitive environment, where
> > users will try to torpedo other projects, then all bets are off.
> 
> Sure. If I see that happening someone gets axed. But, someone might try 
> it and I might have to axe them. Having a chroot'ed repository limits the
> number of nasty things they can do before they get the axe.

Not really -- especially if the only thing of value you have on the
system in question is your repository itself!

> It's worth noting that I've never had to do this. But I am prepared to 
> do it if I ever have to. 
> 
> What Greg is missing here is that security is just as much about recovering
> from an attack after it happens, as it is about preventing it in the 
> first place. 

Just don't try to blame me for your misunderstandings!  I've been
telling you this from day one!

> My scheme is weak on prevention because it uses pserver, but it is very 
> strong on recovery. Even an ssh scheme should have a strong recovery 
> capability to be secure, and I think that means using chroot (or better
> yet, jail(2) on FreeBSD).

You cannot have accountability with cvspserver, at least not without
voiding your warranty and running CVS as root for a bit....

-- 
                                                        Greg A. Woods

+1 416 218-0098      VE3TCP      <[EMAIL PROTECTED]>      <robohack!woods>
Planix, Inc. <[EMAIL PROTECTED]>; Secrets of the Weird <[EMAIL PROTECTED]>

Reply via email to