devblog
This commit is contained in:
		
					parent
					
						
							
								71d39caf5c
							
						
					
				
			
			
				commit
				
					
						c93b6c1e08
					
				
			
		
					 1 changed files with 16 additions and 0 deletions
				
			
		
							
								
								
									
										16
									
								
								doc/devblog/day_502__security_hole_part_4.mdwn
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										16
									
								
								doc/devblog/day_502__security_hole_part_4.mdwn
									
										
									
									
									
										Normal file
									
								
							| 
						 | 
					@ -0,0 +1,16 @@
 | 
				
			||||||
 | 
					Spent several hours dealing with the problem of http proxies, which
 | 
				
			||||||
 | 
					bypassed the IP address checks added to prevent the security hole.
 | 
				
			||||||
 | 
					Eventually got it filtering out http proxies located on private IP
 | 
				
			||||||
 | 
					addresses.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Other than the question of what to do about external special remotes
 | 
				
			||||||
 | 
					that may be vulerable to related problems, it looks like the security
 | 
				
			||||||
 | 
					hole is all closed off in git-annex now.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Added a new page [[security]] with details of this and past security holes
 | 
				
			||||||
 | 
					in git-annex.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Several people I reached out to for help with special remotes have gotten
 | 
				
			||||||
 | 
					back to me, and we're discussing how the security hole may affect them and
 | 
				
			||||||
 | 
					what to do. Thanks especially to Robie Basak and Daniel Dent for their
 | 
				
			||||||
 | 
					work on security analysis.
 | 
				
			||||||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue