Hello everybody,

I'd like to share a question, and hope to find a simple answer:
How can FSVS avoid showing passwords to unauthorized people?


Me, *personally*, I think -
1) Passwords should be hashed, or similarly unreadable.
   But that's not always possible (eg. when needed for IMAP verification)
2) If /etc is protected, the repository storing /etc must be, too.
   But sometimes that's forgotten, or the history should be viewable by others, 
too.
3) There's the commit-pipe hook, which can be used to filter out any secret 
data.
   But that's easily to forget, or to get wrong.


Any ideas? I already thought a bit about that, and could offer making FSVS run 
as an
ordinary user (or something like that [1]), so that protected files wouldn't get
versioned at all - but that's not ideal, too (as you loose information).


Any ideas? Examples? How do other products solve that?


Regards,

Phil


[1]
The simplest way could be to use a pre-commit-pipe like
   sudo -u nobody cat '$1' 2>/dev/null || true
so that protected data would be stored as empty files.
Running FSVS as a different user might work, too (if it ignores all EPERM) - 
but then
it'd have to be a special user that can write into the repository.


-- 
Versioning your /etc, /home or even your whole installation?
             Try fsvs (fsvs.tigris.org)!

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to