On Friday 08 January 2010 16:26:02 D. Richard Hipp wrote:

> This goes back to the idea of "low ceremony".  Rather than try to
> restrict what people can do, default to letting users do most
> anything, but preserve an audit trail in case you are called upon to
> prove that your internal processes were followed.  

OK, I get that -- although I don't see any way to see the signature (e.g. to 
verify it) within the UI.  


> Without the GPG signature, anybody with check-in
> privilege to the Fossil self-hosting repository, for example, could
> commit some change with the userid "drh" and other users would be
> unable to tell if the commit really came from me or an impostor.

Right.  That could also be done by enforcing a 'whitelist' of GPG keys as I 
mentioned before.  Then even if someone broke into an account, they would be 
unable to post changes unless they had also compromised one of the valid 
keys.  Of course, this does make life more difficult, but it may be a nice 
feature to permit (and not require).

-- 
Sending me something private?
Use my GPG public key: AD29415D

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
fossil-users mailing list
fossil-users@lists.fossil-scm.org
http://lists.fossil-scm.org:8080/cgi-bin/mailman/listinfo/fossil-users

Reply via email to