Re: [PATCH 00/13] Support for arbitrary schemes in credentials

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Just to clarify, we at Google do not use extraheader to pass along
credentials. Instead we use the .gitcookies file[1], which iiuc gets
read by the git process directly. I'm not a security expert but I
imagine the risk surface of extraheader and .gitcookies is similar.

Reading your post on
https://lore.kernel.org/git/20240324011301.1553072-1-sandals@xxxxxxxxxxxxxxxxxxxx/,
it's unclear to me why the credential helper protocol needs to be
updated. If the goal is to support Bearer tokens, can that not just be
implemented using extraheader? It seems like the goal of getting
credentials out of the config file can be accomplished without
updating the credential helper protocol. So is the bigger goal to
support more robust and modern auth schemes which require multiple
steps? That would be useful to Google; multi-step auth would probably
be a more elegant way for us to stop using .gitcookies than other
solutions we were considering.

[1] This is actually only for external contributors. Google employees
have a more robust authentication mechanism. Concerns have been raised
internally about our usage of gitcookies, but it hasn't been made a
priority to address because a leaked credential would not allow an
attacker to commit bad code, only read it or initiate a code review.




[Index of Archives]     [Linux Kernel Development]     [Gcc Help]     [IETF Annouce]     [DCCP]     [Netdev]     [Networking]     [Security]     [V4L]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux SCSI]     [Fedora Users]

  Powered by Linux