Re: What's cooking in git.git (Jan 2021, #02; Fri, 8)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Jan 11 2021, Junio C Hamano wrote:

> "brian m. carlson" <sandals@xxxxxxxxxxxxxxxxxxxx> writes:
>
>> On 2021-01-09 at 23:20:25, Junio C Hamano wrote:
>>> "brian m. carlson" <sandals@xxxxxxxxxxxxxxxxxxxx> writes:
>>> 
>>> > On 2021-01-09 at 21:28:58, Junio C Hamano wrote:
>>> >> Ævar Arnfjörð Bjarmason <avarab@xxxxxxxxx> writes:
>>> >> > FWIW there was since a re-roll on 2021-01-03, but the discussion is
>>> >> > sort-of outstanding, so maybe that's intentional...
>>> >> 
>>> >> I had an impression that those 4 or 5 patches haven't gained
>>> >> concensus that they are good as-is.
>>> >
>>> > There will be another reroll.  I'm hoping to get to it this weekend.
>>> 
>>> Thanks.
>>
>> Having read Ævar's latest comment, I've decided instead to drop this, so
>> feel free to do so whenever it's convenient.
>
> That's kind of sad.

Agreed. I mean, I'm just one contributor with an opinion. I certainly
don't mean my "meh" on a patch to be some sort of veto.

If you follow this list you'll see that if you're going to take anyone's
opinion on whether a thing should make it into git as a matter of
empirical data on patches I submit that aren't changed meaningfully,
then, uh, maybe pick someone else :)

> I view that this is the kind of topic where perfect easily can
> become an enemy of good, as there is by definition no perfection
> available to us without breaking existing Git.
>
> I do not know about Ævar, but to me, my initial impression while
> reading the discussion from sideline was that the goal was to
> prevent a mechanical scan of a recent version of .mailmap from
> learning that Joe used to use Jane as his/her name, and that was the
> reason why I asked to be convinced why encoding for obfuscation was
> insufficient.  In the above, I meant "mechanical scan" as something
> like "a web search engine crawls and finds a .mailmap---a query for
> Joe produces a line with some garbage on it that is not Jane." and a
> casual attacker would stop there.
>
> But of course, a casual attacker who knows urlencode or whatever
> obfuscation in use can read that "garbage" once he/she knows that
> "garbage" is worth attacking (i.e. it is known to be associated to
> Joe, the person the attacker is interested in).
>
> If your goal is to make it harder than just urlencode, even though
> we all have to accept that scanning "git log --all" for all names
> that appear in the history and hashing them all to see what name
> hashes to the "garbage" in question, then @sha256:<hash> approach
> does make sense as a stopping point.  Perhaps we need to sell this
> with a clear definition of what kind of attackes we are protecting
> the name data from:
>
>     The attacker is required to obtain sufficient amount of history
>     in the project to uncover the obfuscation; a more casual
>     attackers will fail to uncover, and we declare that it is better
>     than nothing and it is good enough in practice.
>
> or something like that?  I am not sure if I drew the line at the
> level you intended to draw in the above, if I think that it is good
> enough in practice, or if I agree to a change that is better than
> nothing but not good enough in practice, but having such a statement
> would help to see where we agree or disagree.

My reading of the general thread & brian's reply at [1] is that the
difference in the minds of the users who want the feature (who're not
on-list, and we're getting brian's's summary of their views) is closer
to:

    We want the X-Y problem of "hide this data" solved with solution "Y"
    because git's current tooling to retrieve the data is currently
    rather tedious & obscure.

So when I asked whether those users would feel the same if the tooling
was less tedious and suggested that I might patch it to be so brian
replied with "[yes,] we do rely on this being inconvenient".

I do have a 20-something series patch to the mailmap code in my local
queue that in the light of this series's status I think I'll submit
soon.

It doesn't have anything to do with adding a "spew out a materialized
map" feature currently, nor do I really plan to do that any time soon. I
do genuinely think it would be a good addition to git for reasons that
have nothing to do with trying to make a point about this
series. E.g. you'd be able to more easily validate/check/fsck a mailmap
that way. Or e.g. use a git repository's .mailmap as a source to export
to your MTA rules or whatever.

The external tools I referred to which consume the exported .mailmap
data are something I worked on at a previous job, but I no longer have
that immediate itch to scratch personally.

The "march of history" point was rather that if the difference between
URI encoding and this solution is current tooling, it seems all but
inevitable that we'll bridge that gap sooner than later in a way that
makes that difference useless to some of the users that want this now.

And not even because some people don't like this feature in particular
and wish to submit patches to make it less useful. But just because we
continue implementing stuff that's been talked about for years & is
being generally slowly worked towards. E.g. more client<->server
cooperation for expensive queries over protocol v2, or a filter clone
mode where you get only commit objects.

It even seems like something brian's series itself could benefit
from. I.e. having the hashed values in the history is a performance hit
in some cases. The patch caches the computation.

Another way to do it would be to just save a
".git/objects/info/mailmap.{hash-of-original-file}". Either on the fly
or generated by "maintenance" or whatever. It would guarantee a 0%
performance hit. At that point we'd already have the plumbing to
materialize the file & would need to go out of our way to make it
inaccessible in porcelain.

1. https://lore.kernel.org/git/X%2FtxB8b3%2FqqbwbmC@xxxxxxxxxxxxxxxxxxxxxxxxx/




[Index of Archives]     [Linux Kernel Development]     [Gcc Help]     [IETF Annouce]     [DCCP]     [Netdev]     [Networking]     [Security]     [V4L]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux SCSI]     [Fedora Users]

  Powered by Linux