Gnus development mailing list
 help / color / mirror / Atom feed
From: Ted Zlatanov <tzz@lifelogs.com>
To: ding@gnus.org
Subject: Re: Add note about Oort Gnus releases, and No Gnus.
Date: Sat, 18 Dec 2010 10:08:53 -0600	[thread overview]
Message-ID: <87k4j7dpwq.fsf@lifelogs.com> (raw)
In-Reply-To: <87zks3m6gu.fsf@topper.koldfront.dk>

On Sat, 18 Dec 2010 16:44:01 +0100 asjo@koldfront.dk (Adam Sjøgren) wrote: 

AS> On Sat, 18 Dec 2010 09:30:50 -0600, Ted wrote:
>> I trust chmod, chown, rsync, install/ginstall, and cfengine and Puppet
>> (and similar sysadmin tools).

AS> Only the first three come in to play here, right?

My point was these tools were written to do file and system management
and Git wasn't.  If I wanted to do file management through Git I'd use
etckeeper (http://kitenet.net/~joey/code/etckeeper/) or something like
that, but I thought that was overkill.

>> But Git was not written to manage file deployments or be secure so I
>> don't trust it to do it right.

AS> I'm probably being dense, but what exactly is it you expect git to do
AS> wrong insecurely?

The two problems are separate: 1) Git is not a release or deployment
manager, it's a DVCS.  It doesn't have the facilities to do that, which
is why etckeeper and others like it have emerged.  So look at the
features of etckeeper, for instance, to see where Git falls short for
file deployments.  2) Git is not written with security in mind, which is
an architectural issue.  You can look in the Git mailing list archives
for plenty of discussion on that.

>> The rsync step can be modified to exclude .htaccess, for instance,
>> because it's a security risk.  If you `git pull' a compromised repo,
>> though, you're screwed.

AS> Surely you can do the same step(s) that you would have rsync do, post
AS> pull?

No, because pulling in place means that at least for a little bit you
have the wrong permissions on things.  At best your site is broken, at
worst you've opened a window of opportunity for an attacker.

AS> Wouldn't you expect the machine to be compromised for the repository to
AS> be so?

The repository is remotely writeable.  So I want to be really careful.
It's tempting to hide the deployment process, but I'd rather not rely on
security through obscurity.

>> Also the .git directory under the HTML tree would bother me and is a
>> potential security risk.

AS> Again I am probably dense, but how would the content of .git pose a
AS> security risk?

It could be used by an attacker to hide files, for instance.

Ted




  reply	other threads:[~2010-12-18 16:08 UTC|newest]

Thread overview: 37+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2010-11-27 15:47 Latest version of Gnus? Tommy Kelly
2010-11-27 16:47 ` Adam Sjøgren
2010-11-27 18:35   ` Tommy Kelly
2010-11-27 18:47     ` Adam Sjøgren
2010-12-14 23:12       ` Ted Zlatanov
2010-12-16 21:00         ` [PATCH] Add note about Oort Gnus releases, and No Gnus Adam Sjøgren
2010-12-16 21:35           ` Ted Zlatanov
2010-12-17 14:14             ` Ted Zlatanov
2010-12-17 14:22               ` Lars Magne Ingebrigtsen
2010-12-18 15:13                 ` Ted Zlatanov
2010-12-18 15:20                   ` Adam Sjøgren
2010-12-18 15:30                     ` Ted Zlatanov
2010-12-18 15:44                       ` Adam Sjøgren
2010-12-18 16:08                         ` Ted Zlatanov [this message]
2010-12-18 23:29                           ` Adam Sjøgren
2010-12-19 14:41                             ` Ted Zlatanov
2010-12-18 18:58                   ` [PATCH] " Lars Magne Ingebrigtsen
2010-12-19 14:24                     ` Ted Zlatanov
2010-12-19 15:45                       ` Lars Magne Ingebrigtsen
2011-03-17 11:28                         ` HTML deployments from Git (was: [PATCH] Add note about Oort Gnus releases, and No Gnus.) Ted Zlatanov
2011-03-17 16:47                           ` HTML deployments from Git Lars Magne Ingebrigtsen
2011-03-17 17:19                             ` Ted Zlatanov
2011-03-17 17:27                               ` Lars Magne Ingebrigtsen
2011-03-18 10:30                                 ` Ted Zlatanov
2011-03-29 18:50                                   ` Lars Magne Ingebrigtsen
2011-03-29 19:17                                     ` Ted Zlatanov
2011-03-29 19:36                                       ` Lars Magne Ingebrigtsen
2011-03-29 19:46                                         ` Ted Zlatanov
2011-03-30 10:08                                           ` Ted Zlatanov
2011-04-03 17:44                                             ` Lars Magne Ingebrigtsen
2011-04-04 10:03                                               ` Ted Zlatanov
2011-04-12 16:27                                                 ` Lars Magne Ingebrigtsen
2011-04-12 17:16                                                   ` Ted Zlatanov
2011-04-12 17:23                                                     ` Lars Magne Ingebrigtsen
2011-04-12 17:26                                                       ` Lars Magne Ingebrigtsen
2011-04-25 12:35                                                         ` Ted Zlatanov
2011-05-01 14:57                                                           ` Lars Magne Ingebrigtsen

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=87k4j7dpwq.fsf@lifelogs.com \
    --to=tzz@lifelogs.com \
    --cc=ding@gnus.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).