>[ On Friday, June 11, 1999 at 22:04:01 (-0700), [EMAIL PROTECTED] wrote: ]
>> Subject: Re: CVS and SSH? 
>>
>> On Fri, 11 Jun 1999 14:24:44 -0700 
>> Bradford Hull <[EMAIL PROTECTED]> wrote:

>> It is not secure to the extent that CVS'es pserver is not secure.
>
>I think you're confusing the issues here.  CVS' pserver access method
>has nothing to do with using SSH to access a CVS repository.  With SSH
>(or RSH for that matter) CVS runs as the authenticated and authorised
>user and in that sense is totally secure (it can offer no means of
>changing or enhancing the user's privileges).

One of the files in $CVSROOT/CVS has a command which has to be run 
before/after checkouts/checkins (sorry, I don't remember the details).  If 
this file is not secured properly, it may be set to a trojan so as to give a 
less priveleged user access to a different account.  Unless root uses CVS, 
it's not a root exploit, but I'd rather not allow non-priveleged users the 
possibility of getting into my account.

>> It is effectively tantamount to granting those users shell access to
>> the server with a reasonable probability that they may be able to
>> exploit that shell access into root access (given that pserver runs
>> as root and was not designed or built with security in mind).

I've set up pserver access so as to use a non-root user.  You don't _have_ to 
put root in inetd.conf.  Of course, inetd has to be editted by root...

-- 
John Riddoch    Email: [EMAIL PROTECTED]        Telephone: (01224)262721
Room C6, School of Computer and Mathematical Science
Robert Gordon University, Aberdeen, AB25 1HG
I am Homer of Borg. Resistance is Fu... Ooooh! Donuts!

Reply via email to