> On 08/07/2010 12:18 PM, Greg Hudson wrote:
> > My thinking about repository configuration is that the uses cases
> > should be divided into two categories:
> >
> >   1. Stuff that isn't really client configuration at all, like
> > auto-props, should come from the repository instead, and should
> only
> > come from client configuration for compatibility.
> >
> >   2. Stuff that is client configuration should only come from
> client
> > configuration.  Client control is not legitimate business for an
> open
> > source product, though it could be the business of a proprietary
> > value-added fork.
> 
> Are you saying that client control isn't legitimate because of some
> fluffy open-source principle that checks that right at the door, or
> because of the practical impossibility due to the fact that the
> client source code is available for modification and recompilation?

The latter. I see no problem having it baked into the client. But, the fact 
that it is open source makes it easy for someone to get a client that doesn't 
respect repository settings.... so it isn't practical to list it as a 
[trustable/secure/enterprise level] feature unless perhaps svn was creating 
signed binaries and a repo could be set to only work with such a signed binary. 

Imagine the feature list:

o Repository/Server enforced client settings assuming a client that supports 
this feature is used. 

I'm not sure that will work. But if you said something like:

o Repository/Server declared client settings enforced at the server is possible 
without the need for script hooks.
   (It is not possible to enforce client side password storage, blah blah)

I think the later is more practical. I am certainly no open source purist.


> The foremost bit of client configuration that CollabNet's
> Subversion customers are demanding (besides auto-props, which I
> think we all agree on) is a way for the server to set a policy
> which dictates that clients may not use plaintext or other insecure
> password storage mechanisms.  I claim it's ridiculous to propose
> that we need a custom fork of Subversion, Subclipse, TortoiseSVN,
> AnkhSVN, etc. -- all just to bang in this feature.

I agree with you. See above. 

> What, then, do
> you propose?  Do you use server-side configuration to demand, say,
> client certs (which you still can't guarantee are passphrase-
> protected, right?)?

I think my point here is that you can't guarantee anything on the client side. 

> Do you rip insecure password storage out of Subversion altogether?

Perhaps, although I'm still not sure that solves the problem. There are several 
tools like multi-clip board apps and such that will still allow a user from 
doing stupid stuff. 

Also, hasn't the svn team taken the stance that it's a version control system, 
the best a malicious client can do it commit stuff... no data in the repo can 
be lost. Granted, that is a fall back. 

If we are strictly talking about security here, which we aren't, I think there 
are also ways to secure access to the repository outside of svn security like 
VPNs, network security, etc.

BOb

Reply via email to