[ On Monday, March 11, 2002 at 13:43:05 (-0800), Dustin Cavanaugh wrote: ]
> Subject: RE: How 2 Secure the repository?
>
> 2) The best repository advice I've gotten involves keeping the users away
> from direct access to the repository ... no machine logins. There are
> problems with this, but it seems the least odious.
There are potentialy less odious means of preventing users from direct
manipulation of the repository, but they are probably more arduous and
perhaps less proactive.
One is to just weild a big stick lightly. Adding automated auditing of
the repository integrity is a way to make this kind of enforcement more
proactive again (you might do this by keeping a mirror repository that's
maintained on a separate machine with no user account and which is
updated with shadow commits and tags and then is periodically compared
with the master copy, and if discrepancies are found then audit all
access to the master server during the time the unauthorised changes
were made).
--
Greg A. Woods
+1 416 218-0098; <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
Planix, Inc. <[EMAIL PROTECTED]>; VE3TCP; Secrets of the Weird <[EMAIL PROTECTED]>
_______________________________________________
Info-cvs mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/info-cvs