On 2010-07-08 17:04, David Brodbeck wrote:
> 
> On Jul 8, 2010, at 4:49 PM, Nico Kadel-Garcia wrote:
> > A local comparison is often best, especially when operating over HTTPS
> > or svn+ssh for security reasons: Because of the continuing storage of
> > HTTP/HTTPS/svn/SSH passwords in clear-text by the UNIX or Linux
> > versions of Subversion, I don't trust anything but the svn+ssh public
> > key based access for public use. Unfortunately, this does cause a
> > noticeable performance hit.
> 
> It's worth pointing out that the private key has to have a passphrase, for 
> this to be a security improvement. Otherwise all you've accomplished is to 
> leave the password-equivalent in ~/.ssh instead of in ~/.svn. ;)  I mention 
> this only because a lot of the applications for SSH public keys involve 
> passwordless login.
> 
[chop]

I feel a little like a broken record, but...

using GSSAPI (or Negotiate for HTTPS) substantially reduces the security
issues by integrating authentication into the rest of a managed
single-sign-on system.  GSSAPI/Negotiate also has the feature of working
in all four remote access protocols for Subversion.  The downside is
difficulty in configuration and poor support in some (or many or perhaps
all) binary distributions of Subversion.  I have to admit, I don't think
very highly of ssh public-key authentication;  I have a hard time
believing very many users or administrators carefully protect, rotate,
and revoke RSA keys in a timely manner, which seems to me to
substantially reduce the security of ssh public-key "infrastructure".

--
alec.kl...@oracle.com                   Oracle Middleware
The views expressed are my own and do not necessarily 
reflect the views of Oracle
PGP key: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xEBD1FF14

Attachment: pgpNbYROMon9k.pgp
Description: PGP signature

Reply via email to