On Tue, Apr 14, 2009 at 10:23 PM, Matthew Toseland <t...@amphibian.dyndns.org> wrote: > On Sunday 12 April 2009 12:31:55 Daniel Cheng wrote: >> On Sun, Apr 12, 2009 at 8:27 AM, Ian Clarke <i...@locut.us> wrote: >> > On Sat, Apr 11, 2009 at 12:00 PM, Matthew Toseland >> > <t...@amphibian.dyndns.org> wrote: >> >> On Saturday 11 April 2009 15:39:54 Daniel Cheng wrote: >> >>> Hi all, >> >>> >> >>> I have just checked, GitHub allow "non-fast forward" update, and there >> >>> is no option to disable it. This means anybody have write access to it >> >>> might overwrite the whole repository, keeping no history behind. (for >> >>> those who are curious, google the 'git push --force'). >> >> >> >> Would that be propagated when devs update their local trees via pull? >> > >> > No, apparently it would be trivial for a developer to push the history >> > back to the repository, since everyone will have a copy of the entire >> > repo history (unlike with svn). >> > >> > I think it basically means that if a developer is determined to be >> > malicious, they can definitely be a nuisance - but not cause any >> > significant loss of data. This is probably also the case with >> > subversion, and any other source control system. >> > >> >> If any developer do this in git, he will be discovered when next developer >> try to push any changes. > > Well yes, but the more subtle attack of deleting history?? >
Deleteing / Rewriting the history without being discover require finding a meaningful SHA-1 hash collision. Although SHA-1 is not that strong, collision attack on SHA-1 is still far from realistic. In any other cases, the attack will be discovered in the next push. The question is: can the attacker do anything harmful in that time gap? [[ I don't think we should take this risk. ]] _______________________________________________ Devl mailing list Devl@freenetproject.org http://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl