On Fri, 15 Dec 2017 13:52:55 -0500, D. Richard Hipp <d...@sqlite.org>
wrote:
>On 12/15/17, Andy Bradford <amb-fos...@bradfords.org> wrote:
>> Thus said Warren Young on Thu, 14 Dec 2017 12:13:18 -0700:
>>
>>> Fossil arguably  has a  bug here, where  if you check  a change  in as
>>> local user name ``tangent'', as I  do here, then *later* do a ``fossil
>>> sync'' to a URL with a user  name, some bit of the local on-disk state
>>> remembers that  you originally  cloned the repo  as tangent  and makes
>>> your changes under that name.
>>
>> I disagree that this is a bug.  I consider it useful flexibility.
>>
>>> I classify this as a bug because it could be used for an impersonation
>>> attack.
>>
>> Fossil records which user synchronized the content in the recvfrom
table
>> so the owner of the remote repository knows who did it if he cares.
>>
>> As  stated  in  the  past,  Fossil  is
meant  for  a  tighter  group  of
>> developers---perhaps   this  perception   has  changed---
one   in  which
>> impersonation is unlikely.
>>
>
>I was very aware of all of these factors when I designed Fossil, 10
>years ago.  Impersonation was a concern.  But in a DVCS, there really
>is no way around it.
>
>Defenses include:
>
>(1) The rcvfrom table that shows clearly where all artifacts
>originated, thus allowing the originator of a deception to be tracked
>down and dealt with administratively.
>
>(2) Check-ins can be signed using GPG or PGP.  (I do this on TH3, fwiw.)
>-- 
I believe deception and impersonation are important.

I would recommend the study of block chain or blockchain technologies,
such as Bitcoin. These technologies use signed hashes. 

I have found they have a significant perspective on when an event occurs,
in what order events occur and who is the originator of the event.

An interesting, and annoying, deception I found a few years ago was where
someone added a copyright comment in several pre-existing open source
program sources, as if they were the author.

Another example is where the original author is over written, or not
mentioned or barely mentioned. 

I was working at a bank in 2001, where a programmer got an award for
installing a major fix very quickly. The designer had a big smile on his
face, because the programmer simply copied the exact code from the
designer and implemented it. The designer was never mentioned.

Most of us have similar stories.





_______________________________________________
fossil-users mailing list
fossil-users@lists.fossil-scm.org
http://lists.fossil-scm.org:8080/cgi-bin/mailman/listinfo/fossil-users

Reply via email to