All right, I'll bite.  What exactly is it about using ssh to give cvs 
connection that is insecure?  You can control which users are able to 
access the repository, because you only allow the ones you want to set up 
authorization to connect to your system with ssh; and all data is 
transferred with encryption and good authentication.  This is more secure 
than any other way of giving people access to a code base than any other 
method I have ever heard of.  Is there a hole I don't see, or a better 
method available?

If your point is that, in order to let a user access CVS, you have to let 
them ssh into your system, I don't think it would take a rocket scientist to 
figure out a shell to assign such users that only lets them use CVS.  OK, 
this may not work on a Windows 95 or NT host, but security there is a very 
different matter.
-- 
Bradford K. Hull  | Before you criticize a man, walk a mile in his shoes.
[EMAIL PROTECTED]     | That way, if he gets angry, he's a mile away and barefoot.
(206)701-2066     |                                 Anonymous

Reply via email to