Re: [aur-general] Git over HTTPS

2015-06-20 Thread David Kaylor
 Since he's doing it as part of his job, supposedly, then I really can't
 see any reason at all that they wouldn't open up port 22 to just to luna
 for him.



Yea, who knows. Like I said earlier, I do feel for the guy.


Re: [aur-general] Git over HTTPS

2015-06-20 Thread Johannes Löthberg

On 20/06, Johannes Löthberg wrote:
I'm rather sure that he never actually said that maintaining the AUR 
package was part of his job, just avoided the question by saying that 
he worked on the software. (Though I'm too lazy to check now.)




Ah, seems I misread him, quoting 
cag22hqdefjnt9un6r8ai1iafzsbuqppginszfrj-tfrwjn2...@mail.gmail.com:



2. I currently maintain the ownCloud-beta-client package as part of my
involvement with that group.
This is done as part of my official duties in my corporate environment.


--
Sincerely,
 Johannes Löthberg
 PGP Key ID: 0x50FB9B273A9D0BB5
 https://theos.kyriasis.com/~kyrias/


signature.asc
Description: PGP signature


Re: [aur-general] Git over HTTPS

2015-06-20 Thread Magnus Therning
On Sat, Jun 20, 2015 at 09:12:06AM +0300, Mihamina Rakotomandimby wrote:
 On 06/16/2015 09:24 AM, Alan Jenkins wrote:
   I
 understand why they block port 22 out bound and know it to be a common
 problem. It is blocked to stop employees accidentally or intentionally
 leaking important customer or business data. You can also use SSH to bypass
 security measures in place within the network and even create tunnels back
 into the network.
 
 Seriously I believe that [...]
 
 [...] I seriously dont believe that in 2015 security is port based...

Oh, you clearly have no clue about the extent of the madness of it all
:)

/M

-- 
Magnus Therning  OpenPGP: 0xAB4DFBA4 
email: mag...@therning.org   jabber: mag...@therning.org
twitter: magthe   http://therning.org/magnus

The definition of insanity is doing the same thing over and over again
and expecting different results.
 -- Albert Einstein


signature.asc
Description: PGP signature


Re: [aur-general] Git over HTTPS

2015-06-20 Thread Johannes Löthberg

On 18/06, David Kaylor wrote:


1. Yes, I do have network access outside of my corporate environment.
However, much (READ: all) of the project maintenance and code lives on and
is performed on my corporate servers.

2. I currently maintain the ownCloud-beta-client package as part of my
involvement with that group.
This is done as part of my official duties in my corporate environment.

My organization is also looking to begin sharing several large projects
within a few months.
Without another form of access, this would be technically impossible.

--
Thomas Swartz



I had been wondering if you were working on some packages in a work
capacity. Given that, I think it would be a shame to lock out this type of
contributor, even though there are probably just a few.


Since he's doing it as part of his job, supposedly, then I really can't 
see any reason at all that they wouldn't open up port 22 to just to luna 
for him.


--
Sincerely,
 Johannes Löthberg
 PGP Key ID: 0x50FB9B273A9D0BB5
 https://theos.kyriasis.com/~kyrias/


signature.asc
Description: PGP signature


Re: [aur-general] Git over HTTPS

2015-06-20 Thread Johannes Löthberg

On 20/06, David Kaylor wrote:


Do you have permission from your employer to user their infrastructure (eg:
computers, network) to work on contributions to ArchLinux?

If not, they *may* own the IP related to the PKGBUILDs, or any extra
scripts
you include (in most jurisdictions, if you write a 15 line script, it's
copyrighted automatically).
I suggest that you carefully study this, and similar scenarios.

So, if you have permission, asking for them to open SSH should be trivial.
If
not, then stop creating tainted contributions at work.



If you had bothered to read the entire thread, you should have noticed that
the OP has already answered this question.


I'm rather sure that he never actually said that maintaining the AUR 
package was part of his job, just avoided the question by saying that he 
worked on the software. (Though I'm too lazy to check now.)


--
Sincerely,
 Johannes Löthberg
 PGP Key ID: 0x50FB9B273A9D0BB5
 https://theos.kyriasis.com/~kyrias/


signature.asc
Description: PGP signature


Re: [aur-general] Git over HTTPS

2015-06-20 Thread David Kaylor
 I'm rather sure that he never actually said that maintaining the AUR
 package was part of his job, just avoided the question by saying that he
 worked on the software. (Though I'm too lazy to check now.)


I just double checked, and this is what he wrote:

2. I currently maintain the ownCloud-beta-client package as part of my
involvement with that group.
This is done as part of my official duties in my corporate environment.

My organization is also looking to begin sharing several large projects
within a few months.
Without another form of access, this would be technically impossible.

Which sounds to me like he was saying it is part of his job, or at least he
has explicit approval to work on it.

Why can't he get outbound SSH access to do this, if it is work related? Who
knows. But I sort of sympathize with him. Not blaming the AUR4 developer,
he has good reasons for the new design, as far as I know.

I do wish people would stop focusing on the OP's corporate network
policies, stupid as they may be, because it's just not relevant at this
point. I, for one, hope he can continue to contribute.


Re: [aur-general] Git over HTTPS

2015-06-20 Thread Mihamina Rakotomandimby

On 06/16/2015 09:24 AM, Alan Jenkins wrote:

  I
understand why they block port 22 out bound and know it to be a common
problem. It is blocked to stop employees accidentally or intentionally
leaking important customer or business data. You can also use SSH to bypass
security measures in place within the network and even create tunnels back
into the network.

Seriously I believe that [...]


[...] I seriously dont believe that in 2015 security is port based...


Re: [aur-general] Git over HTTPS

2015-06-19 Thread David Kaylor

 Do you have permission from your employer to user their infrastructure (eg:
 computers, network) to work on contributions to ArchLinux?

 If not, they *may* own the IP related to the PKGBUILDs, or any extra
 scripts
 you include (in most jurisdictions, if you write a 15 line script, it's
 copyrighted automatically).
 I suggest that you carefully study this, and similar scenarios.

 So, if you have permission, asking for them to open SSH should be trivial.
 If
 not, then stop creating tainted contributions at work.


If you had bothered to read the entire thread, you should have noticed that
the OP has already answered this question.


Re: [aur-general] Git over HTTPS

2015-06-19 Thread Hugo Osvaldo Barrera
On 2015-06-15 11:57, Tom Swartz wrote:
 Hi all,
 
 The majority of my work happens behind corporate firewalls where ssh out
 via port 22 is not an option.
 
 Is there a way to configure GitHub-like SSH via HTTPS ports?
 https://help.github.com/articles/using-ssh-over-the-https-port/
 
 I'd be greatly appreciative if this was the case.
 
 Thanks!
 
 -- 
 Tom Swartz

Do you have permission from your employer to user their infrastructure (eg:
computers, network) to work on contributions to ArchLinux?

If not, they *may* own the IP related to the PKGBUILDs, or any extra scripts
you include (in most jurisdictions, if you write a 15 line script, it's
copyrighted automatically).
I suggest that you carefully study this, and similar scenarios.

So, if you have permission, asking for them to open SSH should be trivial. If
not, then stop creating tainted contributions at work.

Cheers,

-- 
Hugo Osvaldo Barrera
A: Because we read from top to bottom, left to right.
Q: Why should I start my reply below the quoted text?


signature.asc
Description: PGP signature


Re: [aur-general] Git over HTTPS

2015-06-17 Thread LoneVVolf

On 17-06-15 14:17, Tom Swartz wrote:

Asking for a response from the OP: Do you not have other network access
available to maintain your AUR packages? More to the point, are you
maintaining packages on AUR as part of your official responsibilities? Or
just in spare time? Leaving aside, for the moment, all other arguments
regarding blocking outbound SSH, I believe these are fundamental questions.


To answer your questions:

1. Yes, I do have network access outside of my corporate environment.
However, much (READ: all) of the project maintenance and code lives on and
is performed on my corporate servers.

2. I currently maintain the ownCloud-beta-client package as part of my
involvement with that group.
This is done as part of my official duties in my corporate environment.

My organization is also looking to begin sharing several large projects
within a few months.
Without another form of access, this would be technically impossible.


Tom,

sofar many people have responded, but 1 name is missing : Lukas 
Fleischer, our valued aur web maintainer.
I suggest you create a feature request for AUR git over https support  
at https://bugs.archlinux.org/index.php?project=2 .


LVV


Re: [aur-general] Git over HTTPS

2015-06-17 Thread Giancarlo Razzolini

Em 17-06-2015 15:51, LoneVVolf escreveu:
sofar many people have responded, but 1 name is missing : Lukas 
Fleischer, our valued aur web maintainer.
I suggest you create a feature request for AUR git over https support  
at https://bugs.archlinux.org/index.php?project=2 .
There is already support for Git over https. It's read only though. The 
OP wants SSH git access on port 443. Which is something different. I 
believe that something along the lines of github with oAuth tokens 
should be better than having SSH operating on port 443. That way those 
who can't access regular SSH can still contribute to AUR.


Cheers,
Giancarlo Razzolini


Re: [aur-general] Git over HTTPS

2015-06-17 Thread Damian Nowak
 I'm not requiring that others solve my problem, Giancarlo.
 As mentioned, this is an impossibility in our organization, and (I'm sure)
 many others.

...or even hotels.


Damian.


Re: [aur-general] Git over HTTPS

2015-06-17 Thread Giancarlo Razzolini

Em 17-06-2015 22:24, Damian Nowak escreveu:

...or even hotels.
Ok. I can provide nginx, openssh and sshlp configuration to the AUR 
maintainers if that's what you guys want. I bet that they already know 
how to implement this anyway. But I still believe it's a dumb idea. Much 
better to implement proper git https write access. I'll take a look at 
AUR code and see if it's difficult to implement it. If it's not, I might 
write a patch. But the fact that Lukas didn't weighed in on this thread 
yet, is not a good sign to you guys.


P.s.: If you guys use hotel wifi without a VPN... well... not that much 
I can say at this point, just wish good luck.


Cheers,
Giancarlo Razzolini


Re: [aur-general] Git over HTTPS

2015-06-17 Thread Tom Swartz
Asking for a response from the OP: Do you not have other network access
available to maintain your AUR packages? More to the point, are you
maintaining packages on AUR as part of your official responsibilities? Or
just in spare time? Leaving aside, for the moment, all other arguments
regarding blocking outbound SSH, I believe these are fundamental questions.


To answer your questions:

1. Yes, I do have network access outside of my corporate environment.
However, much (READ: all) of the project maintenance and code lives on and
is performed on my corporate servers.

2. I currently maintain the ownCloud-beta-client package as part of my
involvement with that group.
This is done as part of my official duties in my corporate environment.

My organization is also looking to begin sharing several large projects
within a few months.
Without another form of access, this would be technically impossible.

-- 
Thomas Swartz


Re: [aur-general] Git over HTTPS

2015-06-17 Thread Tom Swartz
Giancarlo,

This is stupid, as I already pointed.

The amount of neckbearding arguments you have posted here are not
productive.
Despite how 'stupid' the decisions are, either in your opinion or in fact,
repeatedly pointing it out has no bearing on the fact that it exists.

 I'm complaining with the OP requests and demands that AUR devs do
something because he needs it.

I have not once demanded that AUR Devs do anything.
I have suggested twice so far that some productive discussion is done as to
the ability to open SSH over HTTPS.

SSH via HTTPS is, as many have pointed out, a common and reasonable
solution for environments where all outbound ports are blocked except for
80, 443 and a minor select others.

Again, you can always use another network for doing all this. A more open
one.

As mentioned numerous times before, this is not feasible.

I would appreciate if you could keep the comments and discussion on-task.
-- 
Thomas Swartz


Re: [aur-general] Git over HTTPS

2015-06-17 Thread Martti Kühne
On Wed, Jun 17, 2015 at 2:17 PM, Tom Swartz t...@tswartz.net wrote:

 To answer your questions:

 1. Yes, I do have network access outside of my corporate environment.
 However, much (READ: all) of the project maintenance and code lives on and
 is performed on my corporate servers.

 2. I currently maintain the ownCloud-beta-client package as part of my
 involvement with that group.
 This is done as part of my official duties in my corporate environment.



Aren't you moving what essentially would be your problem outside your
firewall, too?

cheers!
mar77i


Re: [aur-general] Git over HTTPS

2015-06-16 Thread Manuel Reimer

On 06/16/2015 08:24 AM, Alan Jenkins wrote:

I am with the OP on this, having worked in a cloud security company I
understand why they block port 22 out bound and know it to be a common
problem. It is blocked to stop employees accidentally or intentionally
leaking important customer or business data. You can also use SSH to bypass
security measures in place within the network and even create tunnels back
into the network.


You can do this via HTTPS, too.

-- Bad argument.

Manuel


Re: [aur-general] Git over HTTPS

2015-06-16 Thread Alan Jenkins
Actually they very often strip https traffic too. I used to work for
Symantec.cloud and we did both http and https scanning so don't try to say
that it is not a valid argument as I assure you you can scan and do content
filtering on https.

On 16 June 2015 at 14:35, Manuel Reimer manuel.rei...@gmx.de wrote:

 On 06/16/2015 08:24 AM, Alan Jenkins wrote:

 I am with the OP on this, having worked in a cloud security company I
 understand why they block port 22 out bound and know it to be a common
 problem. It is blocked to stop employees accidentally or intentionally
 leaking important customer or business data. You can also use SSH to
 bypass
 security measures in place within the network and even create tunnels back
 into the network.


 You can do this via HTTPS, too.

 -- Bad argument.

 Manuel



Re: [aur-general] Git over HTTPS

2015-06-16 Thread Giancarlo Razzolini

Em 16-06-2015 14:20, Alan Jenkins escreveu:

Also may I remind you that the focus of this conversation is allowing users
in corporate environments access to be able to contribute to the AUR. These
environments block SSH for multiple reasons but are able to allow HTTPS as
they are able to more tightly regulate it.
There are literally tons of ways to tunnel out of a network. SSH is just 
one of them. Instead of blocking anything, network admins should monitor 
the traffic using netflow, and set alarms when too much data is leaving 
the network. That would prevent a lot of data breaches. Or at least 
minimize their impact.


Expecting to block something to avoid information breach, or any other 
kind of data theft is dumb. Also, come on people. It's 2015. Doesn't 
everybody also have a machine at home?


Cheers,
Giancarlo Razzolini


Re: [aur-general] Git over HTTPS

2015-06-16 Thread David Kaylor
Asking for a response from the OP: Do you not have other network access
available to maintain your AUR packages? More to the point, are you
maintaining packages on AUR as part of your official responsibilities? Or
just in spare time? Leaving aside, for the moment, all other arguments
regarding blocking outbound SSH, I believe these are fundamental questions.

On Tue, Jun 16, 2015 at 4:22 PM, Alan Jenkins alan.james.jenk...@gmail.com
wrote:

 Hey Giancario,

 Most of the large companies block everything and start from there, normally
 everything is blocked outbound and only things that are business critical
 are allowed until the business is able to function. In many cases they will
 block all outbound traffic and only allow access to the internet via ftp,
 http and the mitm style https via a proxy that is able to scan the content
 being sent across the connections to ensure they do not fall foul of a
 trojan or other malware.

 So unless I am missing something how are you going to tunnel out of a
 network if you only have port 21, 80 and 443 which are all really just
 going to the proxy server? If you do know a way I would love to hear it as
 I am interested, but as I stated in the previous email we are off topic.
 The problem is that no matter how hard you moan at the people in control of
 the firewalls they will normally not allow access to something unless
 *they* deem it to be secure, and once the person you are communicating with
 gets annoyed with you they will just send you to the next guy until you get
 annoyed and just give up (been there done that).

 Can we please stick to the feasibility of doing git+https? Github +
 Bitbucket are able to do it so surely we can too right? Or is there too
 much code relying on the SSH public key auth now?

 On 16 June 2015 at 20:30, Giancarlo Razzolini grazzol...@gmail.com
 wrote:

  Em 16-06-2015 14:20, Alan Jenkins escreveu:
 
  Also may I remind you that the focus of this conversation is allowing
  users
  in corporate environments access to be able to contribute to the AUR.
  These
  environments block SSH for multiple reasons but are able to allow HTTPS
 as
  they are able to more tightly regulate it.
 
  There are literally tons of ways to tunnel out of a network. SSH is just
  one of them. Instead of blocking anything, network admins should monitor
  the traffic using netflow, and set alarms when too much data is leaving
 the
  network. That would prevent a lot of data breaches. Or at least minimize
  their impact.
 
  Expecting to block something to avoid information breach, or any other
  kind of data theft is dumb. Also, come on people. It's 2015. Doesn't
  everybody also have a machine at home?
 
  Cheers,
  Giancarlo Razzolini
 



Re: [aur-general] Git over HTTPS

2015-06-16 Thread Alan Jenkins
Hey Giancario,

Most of the large companies block everything and start from there, normally
everything is blocked outbound and only things that are business critical
are allowed until the business is able to function. In many cases they will
block all outbound traffic and only allow access to the internet via ftp,
http and the mitm style https via a proxy that is able to scan the content
being sent across the connections to ensure they do not fall foul of a
trojan or other malware.

So unless I am missing something how are you going to tunnel out of a
network if you only have port 21, 80 and 443 which are all really just
going to the proxy server? If you do know a way I would love to hear it as
I am interested, but as I stated in the previous email we are off topic.
The problem is that no matter how hard you moan at the people in control of
the firewalls they will normally not allow access to something unless
*they* deem it to be secure, and once the person you are communicating with
gets annoyed with you they will just send you to the next guy until you get
annoyed and just give up (been there done that).

Can we please stick to the feasibility of doing git+https? Github +
Bitbucket are able to do it so surely we can too right? Or is there too
much code relying on the SSH public key auth now?

On 16 June 2015 at 20:30, Giancarlo Razzolini grazzol...@gmail.com wrote:

 Em 16-06-2015 14:20, Alan Jenkins escreveu:

 Also may I remind you that the focus of this conversation is allowing
 users
 in corporate environments access to be able to contribute to the AUR.
 These
 environments block SSH for multiple reasons but are able to allow HTTPS as
 they are able to more tightly regulate it.

 There are literally tons of ways to tunnel out of a network. SSH is just
 one of them. Instead of blocking anything, network admins should monitor
 the traffic using netflow, and set alarms when too much data is leaving the
 network. That would prevent a lot of data breaches. Or at least minimize
 their impact.

 Expecting to block something to avoid information breach, or any other
 kind of data theft is dumb. Also, come on people. It's 2015. Doesn't
 everybody also have a machine at home?

 Cheers,
 Giancarlo Razzolini



Re: [aur-general] Git over HTTPS

2015-06-16 Thread Giancarlo Razzolini

Em 16-06-2015 17:22, Alan Jenkins escreveu:
Most of the large companies block everything and start from there, 
normally everything is blocked outbound and only things that are 
business critical are allowed until the business is able to function. 
In many cases they will block all outbound traffic and only allow 
access to the internet via ftp, http and the mitm style https via a 
proxy that is able to scan the content being sent across the 
connections to ensure they do not fall foul of a trojan or other malware.


This is stupid, as I already pointed. Besides, unless the machines are 
rigged with a self signed CA on their browsers stores, you can't inspect 
anything without trowing a big warning to every https site the user 
visit. It certainly breaks a lot of mobile apps functionality.




So unless I am missing something how are you going to tunnel out of a 
network if you only have port 21, 80 and 443 which are all really just 
going to the proxy server? If you do know a way I would love to hear 
it as I am interested, but as I stated in the previous email we are 
off topic.


You can punch a hole using DNS requests, you can use https, you can use 
websockets, you can use a VPN, etc. As I said, there are a lot of options.


The problem is that no matter how hard you moan at the people in 
control of the firewalls they will normally not allow access to 
something unless *they* deem it to be secure, and once the person you 
are communicating with gets annoyed with you they will just send you 
to the next guy until you get annoyed and just give up (been there 
done that).


I'm not moanning at the people in control of the firewalls (heck, I'm 
one of them). I'm complaining with the OP requests and demands that AUR 
devs do something because he needs it.




Can we please stick to the feasibility of doing git+https? Github + 
Bitbucket are able to do it so surely we can too right? Or is there 
too much code relying on the SSH public key auth now?


Is it feasible? Of course it is. Just install sshlp in the machine, 
configure it, configure nginx and ssh, and you're done. But you can also 
implement a token auth system over https, like the one github have, so 
we could have git over https. I don't see the devs doing it also, but it 
would be better than to run sshlp on the machine.


Again, you can always use another network for doing all this. A more 
open one.


Cheers,
Giancarlo Razzolini


Re: [aur-general] Git over HTTPS

2015-06-16 Thread Magnus Therning
On Tue, Jun 16, 2015 at 08:11:59PM -0300, Giancarlo Razzolini wrote:
 Em 16-06-2015 17:22, Alan Jenkins escreveu:
[...]
 The problem is that no matter how hard you moan at the people in
 control of the firewalls they will normally not allow access to
 something unless *they* deem it to be secure, and once the person
 you are communicating with gets annoyed with you they will just
 send you to the next guy until you get annoyed and just give up
 (been there done that).
 
 I'm not moanning at the people in control of the firewalls (heck,
 I'm one of them). I'm complaining with the OP requests and demands
 that AUR devs do something because he needs it.

From my POV you are moaning because someone's asking for help to
contribute to Arch!

/M

-- 
Magnus Therning  OpenPGP: 0xAB4DFBA4 
email: mag...@therning.org   jabber: mag...@therning.org
twitter: magthe   http://therning.org/magnus

Never be afraid to try something new. Remember, amateurs built the
ark; professionals built the Titanic.
 -- Anonymous


signature.asc
Description: PGP signature


Re: [aur-general] Git over HTTPS

2015-06-16 Thread Alan Jenkins
I am with the OP on this, having worked in a cloud security company I
understand why they block port 22 out bound and know it to be a common
problem. It is blocked to stop employees accidentally or intentionally
leaking important customer or business data. You can also use SSH to bypass
security measures in place within the network and even create tunnels back
into the network.

Seriously I believe that there should be the option to do git over ssh as
the limitation to just SSH is going to cause problems for those in
corporate environments meaning we will lose out.

On Tue, 16 Jun 2015 05:33 Eli Schwartz eschwart...@gmail.com wrote:

 It is not necessarily Arch's problem that a tiny minority of users have the
 standard connection methods blocked. While it would be nice if lots of
 options are offered for every possible scenario, that may not necessarily
 happen.
 Think of Github's alternative method as being a bonus, not something to be
 taken for granted. :)

 And the move to git repos may already be alienating some people.
 Regardless, progress and efficiency have been made a priority over
 preserving every last contributor.


 -- Eli Schwartz



Re: [aur-general] Git over HTTPS

2015-06-16 Thread Magnus Therning
On 15 June 2015 at 21:33, Giancarlo Razzolini grazzol...@gmail.com wrote:
 Em 15-06-2015 16:26, Tom Swartz escreveu:

 With all due respect, requiring that a user punch holes in their security
 firewalls is not a proper or long term solution to the issue at hand.

 It is the only solution.

AFAICS it's the only solution only due to decisions made by the
people maintaining AUR, or is there some technical reason that makes
it *impossible* to allow HTTPS access to the git repos?

 For home users, this might be a valid (although no less sane) solution,
 but
 in corporate networks where the firewall rules are crafted for a reason
 (e.g. to protect the rest of the devices on the network).

 A rule that denies outgoing SSH access is a dumb one. It doesn't protect the
 rest of the devices on the network.

I fully agree with you, but you make a very common mistake here: you
apply logic and rational thinking to a situation that isn't governed
by it :)  You know it's a silly rule, I know it's a silly rule,
everyone I interact with at work on a daily basis knows it's a silly
rule.  However, convincing the IT department of a 5+ behemoth of a
company that it's a silly rule *and that it should be changed* is a
huge undertaking!


 I firmly believe that restricting access to SSH, port 22 only, is
 something
 that will greatly hinder wide adoption.
 At the very least, it will prevent myself from uploading/updating my
 several AUR packages.

 Instead of requiring others to solve your problem, you should explain to
 your network administrators that this rule is counterproductive. I don't
 really think that this will hinder adoption since port 22 is the default ssh
 port.

You clearly are fortunate enough to only be surrounded by people who
base their decisions on logic and who are willing to go back on
earlier decisions, and make changes solely based on well-founded
arguments presented by engineers.  I've worked in about 10+ different
organisations, ranging in size from 50 to 10+ and I have still to
find a place like the one you are in.  I strongly urge you to *never*
switch jobs!

/M

-- 
Magnus Therning  OpenPGP: 0xAB4DFBA4
email: mag...@therning.org   jabber: mag...@therning.org
twitter: magthe   http://therning.org/magnus


Re: [aur-general] Git over HTTPS

2015-06-16 Thread Doug Newgard
On Mon, 15 Jun 2015 11:57:26 -0400
Tom Swartz t...@tswartz.net wrote:

 Hi all,
 
 The majority of my work happens behind corporate firewalls where ssh out
 via port 22 is not an option.
 
 Is there a way to configure GitHub-like SSH via HTTPS ports?
 https://help.github.com/articles/using-ssh-over-the-https-port/
 
 I'd be greatly appreciative if this was the case.
 
 Thanks!
 

What it comes down to is that you want Arch to provide a way for you to bypass
security restrictions your employer has put into place. Does this really sound
like a good idea?


Re: [aur-general] Git over HTTPS

2015-06-16 Thread nmset
Le mardi 16 juin 2015 01:37:36 Doug Newgard a écrit :
 What it comes down to is that you want Arch to provide a way for you to
 bypass security restrictions your employer has put into place. Does this
 really sound like a good idea?

But Arch should be more committed and friendly to its contributors than to 
their blind employers, to whom Arch is not tied at all. Security is something 
put forward to mask many other goals... control, power... I won't elaborate 
any further.


Re: [aur-general] Git over HTTPS

2015-06-16 Thread Alexander Görtz
 I am with the OP on this, having worked in a cloud security company I
 understand why they block port 22 out bound and know it to be a common
 problem. It is blocked to stop employees accidentally or intentionally
 leaking important customer or business data. You can also use SSH to bypass
 security measures in place within the network and even create tunnels back
 into the network.
 
 Seriously I believe that there should be the option to do git over ssh as
 the limitation to just SSH is going to cause problems for those in
 corporate environments meaning we will lose out.
 
 On Tue, 16 Jun 2015 05:33 Eli Schwartz eschwart...@gmail.com wrote:
  It is not necessarily Arch's problem that a tiny minority of users have
  the
  standard connection methods blocked. While it would be nice if lots of
  options are offered for every possible scenario, that may not necessarily
  happen.
  Think of Github's alternative method as being a bonus, not something to be
  taken for granted. :)
  
  And the move to git repos may already be alienating some people.
  Regardless, progress and efficiency have been made a priority over
  preserving every last contributor.
  
  
  -- Eli Schwartz

Am Dienstag, 16. Juni 2015, 06:24:05 schrieb Alan Jenkins:

 I am with the OP on this, having worked in a cloud security company I
 understand why they block port 22 out bound and know it to be a common
 problem. It is blocked to stop employees accidentally or intentionally
 leaking important customer or business data.

With that reasoning you have to block 80 and 443 too, but I don't think that 
the why is the really important point. I think that this is a reason more to 
implement an alternative of uploading a aur ball, as discussed in another 
thread, and creating a git commit from it. I don't know any implementation 
details, but this shouldn't be too hard as the useres are autheticated by the 
webserver already.

Alex

signature.asc
Description: This is a digitally signed message part.


Re: [aur-general] Git over HTTPS

2015-06-16 Thread Marcel Korpel
* Alexander Görtz a...@nyloc.de (Tue, 16 Jun 2015 11:04:51 +0200):
 I think that this is a reason more to implement an alternative of
 uploading a aur ball, as discussed in another thread, and creating a
 git commit from it. I don't know any implementation details, but this
 shouldn't be too hard as the useres are autheticated by the webserver
 already.

Lukas already explained in the second half of [1] why this is hardly an
option.

Best, Marcel

[1]https://lists.archlinux.org/pipermail/aur-general/2015-June/030880.html


pgpR2xjnb1Mae.pgp
Description: OpenPGP digital signature


Re: [aur-general] Git over HTTPS

2015-06-15 Thread Johannes Löthberg

On 15/06, Tom Swartz wrote:

Hi all,

The majority of my work happens behind corporate firewalls where ssh out
via port 22 is not an option.

Is there a way to configure GitHub-like SSH via HTTPS ports?
https://help.github.com/articles/using-ssh-over-the-https-port/

I'd be greatly appreciative if this was the case.



You'll have to use something like the sslh multiplexer

--
Sincerely,
 Johannes Löthberg
 PGP Key ID: 0x50FB9B273A9D0BB5
 https://theos.kyriasis.com/~kyrias/


signature.asc
Description: PGP signature


[aur-general] Git over HTTPS

2015-06-15 Thread Tom Swartz
Hi all,

The majority of my work happens behind corporate firewalls where ssh out
via port 22 is not an option.

Is there a way to configure GitHub-like SSH via HTTPS ports?
https://help.github.com/articles/using-ssh-over-the-https-port/

I'd be greatly appreciative if this was the case.

Thanks!

-- 
Tom Swartz


Re: [aur-general] Git over HTTPS

2015-06-15 Thread Eli Schwartz
It is not necessarily Arch's problem that a tiny minority of users have the
standard connection methods blocked. While it would be nice if lots of
options are offered for every possible scenario, that may not necessarily
happen.
Think of Github's alternative method as being a bonus, not something to be
taken for granted. :)

And the move to git repos may already be alienating some people.
Regardless, progress and efficiency have been made a priority over
preserving every last contributor.


-- Eli Schwartz



Re: [aur-general] Git over HTTPS

2015-06-15 Thread Giancarlo Razzolini

Em 15-06-2015 22:20, Tom Swartz escreveu:

I'm not requiring that others solve my problem, Giancarlo.
As mentioned, this is an impossibility in our organization, and (I'm sure)
many others.


Not that many, I hope.


There are many technical reasons for this limitation in our organization,
too in-depth to discuss here.


None of them are technical, but are misguided choices and preferences.




I've pointed out an issue which I'm sure currently will will continue to
affect users, and here is my suggested solution:
I'm stating that the latest update the the AUR, which seems to be
`git-via-ssh-port-22-only` should expand the options for use.


It's not via ssh only. You have the option of clonning the repo over 
https. Of course it's read only, but you at least can see the contents 
of the repo.




I'm suggesting that there should at least be some discussion about adopting
a GitHub-style connections; wherein standard connections are via standard
protocol; ssh on port 22, or (optionally, in the instances where it's not
technically feasible) via an alternate method; ssh via port 443.
While this exact solution does not need to be followed to the letter, I'm
describing it here so that my point may be made.


Strangely enough, github only allow this method of connection for their 
github.com repos, not the, aham, GitHub Enterprise repos. Guessing these 
poor companies have to allow ssh over port 22 because the evil github 
won't allow other ports.




I can say with 100% certainty that my PKGBUILDS will not be updated without
an alternate form of access that is not SSH via Port 22.
It's infeasible to transport my PKGBUILDS off-site just so I can run some
git commands on another network.
I'd welcome any suggestions otherwise.
A PKGBUILD of only a few Kb? You can't email it to yourself? Really, 
your arguments are getting more and more pointless. I'm really sorry for 
you that you can't access an unblocked internet.


Cheers,
Giancarlo Razzolini


Re: [aur-general] Git over HTTPS

2015-06-15 Thread Tom Swartz
Instead of requiring others to solve your problem, you should explain to
your network administrators that this rule is counterproductive. I don't
really think that this will hinder adoption since port 22 is the default
ssh port.

I'm not requiring that others solve my problem, Giancarlo.
As mentioned, this is an impossibility in our organization, and (I'm sure)
many others.
There are many technical reasons for this limitation in our organization,
too in-depth to discuss here.


I've pointed out an issue which I'm sure currently will will continue to
affect users, and here is my suggested solution:
I'm stating that the latest update the the AUR, which seems to be
`git-via-ssh-port-22-only` should expand the options for use.

I'm suggesting that there should at least be some discussion about adopting
a GitHub-style connections; wherein standard connections are via standard
protocol; ssh on port 22, or (optionally, in the instances where it's not
technically feasible) via an alternate method; ssh via port 443.
While this exact solution does not need to be followed to the letter, I'm
describing it here so that my point may be made.

I can say with 100% certainty that my PKGBUILDS will not be updated without
an alternate form of access that is not SSH via Port 22.
It's infeasible to transport my PKGBUILDS off-site just so I can run some
git commands on another network.
I'd welcome any suggestions otherwise.

Cheers,
-- 
Thomas Swartz


Re: [aur-general] Git over HTTPS

2015-06-15 Thread Giancarlo Razzolini

Em 15-06-2015 16:26, Tom Swartz escreveu:

With all due respect, requiring that a user punch holes in their security
firewalls is not a proper or long term solution to the issue at hand.


It is the only solution.



For home users, this might be a valid (although no less sane) solution, but
in corporate networks where the firewall rules are crafted for a reason
(e.g. to protect the rest of the devices on the network).


A rule that denies outgoing SSH access is a dumb one. It doesn't protect 
the rest of the devices on the network.




As I mentioned in my original posting, (and as several other users
mentioned) many of the solutions are server-side fixes.


Which requires using software that, not only can introduce security 
issues, can decrease the performance. I've used sshlp on the past, 
although I don't think it has any exploitable bugs, it's not as widely 
used as nginx and openssh itself.




I firmly believe that restricting access to SSH, port 22 only, is something
that will greatly hinder wide adoption.
At the very least, it will prevent myself from uploading/updating my
several AUR packages.


Instead of requiring others to solve your problem, you should explain to 
your network administrators that this rule is counterproductive. I don't 
really think that this will hinder adoption since port 22 is the default 
ssh port.


Cheers,


Re: [aur-general] Git over HTTPS

2015-06-15 Thread Pablo Lezaeta Reyes
2015-06-15 16:33 GMT-03:00 Giancarlo Razzolini grazzol...@gmail.com:

 Em 15-06-2015 16:26, Tom Swartz escreveu:

 With all due respect, requiring that a user punch holes in their security
 firewalls is not a proper or long term solution to the issue at hand.


 It is the only solution.

Is not the only as pointer in this thread,
also you not considered the idea that burocracy for somethink that simple
as oppen a port could take months if not year or even coutless failed
attempts?



 For home users, this might be a valid (although no less sane) solution,
 but
 in corporate networks where the firewall rules are crafted for a reason
 (e.g. to protect the rest of the devices on the network).


 A rule that denies outgoing SSH access is a dumb one. It doesn't protect
 the rest of the devices on the network.

In my school we get attempts to forcebrute into ouir server... this once
was attempted throw port 22, that what I get in response for request open
port 22 in my school firewal.

Therefor they refuse to open 22 since that insident.


 As I mentioned in my original posting, (and as several other users
 mentioned) many of the solutions are server-side fixes.


 Which requires using software that, not only can introduce security
 issues, can decrease the performance. I've used sshlp on the past, although
 I don't think it has any exploitable bugs, it's not as widely used as nginx
 and openssh itself.

or you think is saner that every user repeat a process for every machine,
instead of offerted an alternative port for those countless users that cant
(as I mention ealy) oppen 22?


 I firmly believe that restricting access to SSH, port 22 only, is
 something
 that will greatly hinder wide adoption.
 At the very least, it will prevent myself from uploading/updating my
 several AUR packages.


 Instead of requiring others to solve your problem, you should explain to
 your network administrators that this rule is counterproductive. I don't
 really think that this will hinder adoption since port 22 is the default
 ssh port.

 Well burocracy and dumb admins are nought to not let you open port 22,
this word is a place ful of peoples of all kinds, and full of dumb
decisions.

 Cheers,




-- 
*Pablo Lezaeta*


Re: [aur-general] Git over HTTPS

2015-06-15 Thread Bruno Pagani


Le 15/06/2015 22:00, Pablo Lezaeta Reyes a écrit :
 2015-06-15 16:33 GMT-03:00 Giancarlo Razzolini grazzol...@gmail.com:

 Em 15-06-2015 16:26, Tom Swartz escreveu:
 A rule that denies outgoing SSH access is a dumb one. It doesn't protect
 the rest of the devices on the network.

 In my school we get attempts to forcebrute into ouir server... this once
 was attempted throw port 22, that what I get in response for request open
 port 22 in my school firewal.

 Therefor they refuse to open 22 since that insident.

Then you should precise you want *outgoing* on port 22 to be open. Not
/incoming/.

Bruno



signature.asc
Description: OpenPGP digital signature


[aur-general] Git over HTTPS

2015-06-15 Thread Justin Dray
If your network admins don't know the difference between incoming and
outgoing ports, or not opening things like ssh ports to the internet that
really isn't an Arch problem...

- Justin


-- 
Regards,
Justin Dray
E: jus...@dray.be
M: 0433348284


Re: [aur-general] Git over HTTPS

2015-06-15 Thread Giancarlo Razzolini

Em 15-06-2015 17:00, Pablo Lezaeta Reyes escreveu:

Is not the only as pointer in this thread,
also you not considered the idea that burocracy for somethink that 
simple as oppen a port could take months if not year or even coutless 
failed attempts?


Well, each organization has it's own process. But, it doesn't protect 
any internal machine not to allow outgoing ssh.


In my school we get attempts to forcebrute into ouir server... this 
once was attempted throw port 22, that what I get in response for 
request open port 22 in my school firewal.


Yes, this is a common problem. You can have some sort of blocking 
daemon, like fail2ban, or you can change the ssh port altogether. But, I 
don't see arch doing this, since tcp port 22 is the IANA assigned port 
for SSH. I bet they have bruteforce mitigations in place, on top of only 
allowing PubKey authentication.




Therefor they refuse to open 22 since that insident.

or you think is saner that every user repeat a process for every 
machine, instead of offerted an alternative port for those countless 
users that cant (as I mention ealy) oppen 22? Well burocracy and dumb 
admins are nought to not let you open port 22, this word is a place 
ful of peoples of all kinds, and full of dumb decisions.


If they can't distinguish, as other people already mentioned, from 
incoming and outgoing, then they should really rethink their carreers. 
It's the same thing with ICMP or VLAN's. I don't really worry about 
being blocked at any place I might go because I use a VPN. I think 
everybody should get one, not just for better privacy and unblocked 
internet access, but for avoiding ISP QoS. But it's sad to know that 
some people will let this kind of blocking (which is relatively easy to 
circumvent) prevent them from contributing to arch.


Cheers,
Giancarlo Razzolini