Philipp Marek wrote:
...
http://www.tgharold.com/techblog/2007/05/fsvs-for-sysadmins.shtml
says:
Unfortunately, the documentation for FSVS is rather sparse at the moment
Hey, that's not really nice !-) More documentation than code, if you count the lines. :-)

Hah, I've re-written that line about 3x in the past 2 days. (It was worse.) I'm sure I'll re-write it again once I have things figured out and can be more objective.

:)

Another idea just crossed my mind: If you put netcat localhost <some_port> as command in your authorized_keys, then you can (should be able to) use a running svnserve instance *as a completely different user* as "server" - so that no remote access can get to the repository directly.
It would have to authorize itself via svn_auth.conf ...

I have to think about the implications of that... I suspect my objection to that would be the use of plain-text passwords (which using SSH avoids). At least I think that would involve the storage of plain-text passwords on the server... I have to think about this some more when I'm more awake.

...

I've also been thinking about the pros/cons of using a single SSH account (with multiple entries in authorized_keys where the command= tells svnserve which username to pretend as) as opposed to using individual SSH accounts.

The single-account method is less work (fewer accounts created, no need to add users to the proper lines in /etc/group). And allows you to deal cleanly with situations where 2 people use the same machine and the same working copy folders. By having PuTTY cache the user-specific SSH key in Pageant, you can use a generic svn+ssh URL on the working copy and the SVN server does the hard work of figuring out which user to authenticate as. (It's a not-the-best scenario, but it may be something we do. Or we'll just issue a "svn switch" command on the working copy when the user logs in.)

But if a SSH key gets cracked / stolen / or used to break into the SVN server, it will be difficult to tell which of the authorized_keys was responsible for the break-in. With separate user accounts, the attacker is more likely to leave tracks telling us which user account was used for the break-in. So I think it's worthwhile to have individual user accounts that belong to the group that owns the SVN repository directory.

But my thinking might be flawed on that.

I notice that the SVN book at redbean talks down using SSH in tunneling mode due to umask issues. But once we set the ownership of the repository folder to a unix group and set the sticky bit on the repository/db folder (chmod -R g+s repository/db), we haven't seen any issues with file ownership. So using a single "server" account on the SVN server doesn't appeal to us.

We may also have the advantage in that our SVN server is single-purpose (running in a Xen DomU). All of the accounts on it are SVN-related and it's not trying to do 20 other duties. So we don't really worry much about having a few dozen user accounts for machines.

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to