On Sunday 10 January 2010 13:32:31 Twylite wrote:
> Hi,
...
> Cryptographically this is equivalent to sending a cleartext password
> over HTTP and storing a hash of the password.

Yes, you are correct that from the standpoint of someone intercepting wire 
traffic, such a person can still log in.  However, that person will *not* 
have intercepted the password itself, which is what I and others were 
concerned about.

In  the current scenario, the password used by the user is neither stored on 
the remote server nor sent on the wire.  Otherwise, the protocol is the same 
as before in terms of overall security.


> The only way to solve this problem - securing both the wire and the 
> server storage - is to move to a more advanced cryptographic protocol 
> (preferably asymmetric crypto).  

That was one reason I suggested the possibility of allowing the option of 
a 'whitelist' of GPG keys, against which potential checkin manifests could be 
checked.  That doesn't prevent a malicious user from logging in as someone 
else, but it does prevent such a person from (easily) compromising the source 
repository.

-- 
For privacy, my GPG key signature is: AD29415D
_______________________________________________
fossil-users mailing list
fossil-users@lists.fossil-scm.org
http://lists.fossil-scm.org:8080/cgi-bin/mailman/listinfo/fossil-users

Reply via email to