Re: [bug] encryption of metadata in .git metadata file inside .git folder

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



hello,

[apologies, not sure why my emails are bouncing due to the html
version even when sent as text].

@randall (i am sure we may have interacted before or probably same
name someone else): my answers for your quote below:

- disk encryption has nothing to do with .git storage. local access by
access provided users will always be there.
- disk encryption solves the challenge of modification access in the
server by devops professionals not manipulation intent
- disk encryption solves the challenge of modification access in the
server by devops professionals not any code injection and remote
incorrectly executed issues
- disk encryption solves the challenge of modification access in the
server by devops professionals not any code injection and automated
code drive incorrectly executed issues and access to memory and or
.git folder when appropriate chmod rights are provided
- "opens git up to export limitations" may not be a great reason to
avoid for the same. the object folder inside .git seems encoded if not
a binary store and can be reverse engineered via code
- "opens git up to export limitations" may not be a great reason to
avoid the same. load issues for speed are not that great reason when
tmp cache options can be a viable option. probably, you can work with
optionally encrypt the .git folder option.
- "opens git up to export limitations" may not be a great reason to
avoid the same. what other export limitations and CVEs are limiting
the need?
- symmetrical encryption: i am recommending a personal user provided
or default salt or key based based encryption for the .git folder
- you may wish to take feedback for the organization using git-scm in
their organizations. a bug bounty has been raised for gitlab, github,
and atlassian that are the most rigorous for the number of users in
the domain. i can also raise a bug bounty to azure, aws, google,
oracle, and other networked providers if needed shamelessly to get
this feature enabled (probably using an option to encrypt .git folder
while creating a repository)

"Have you explored using disk-level encryption to solve this?  While I
understand your
objective to "encrypt anything that might have data in it", there are solutions
independent of git what would cover most use cases. The problem with adding
symmetrical encryption to git is that it opens git up to export limitations and
related CVEs. It would also cause adoption issues with many organizations
who may have restrictions on whatever techniques git adopts to solve this.
My preferential solution is using COTS hardware encryption to solve protecting
data-at-rest content.

Regards,
Ganesh

On Wed, Dec 25, 2024 at 12:01 PM Krishnamurthy Ganesh B
<ganeshsurfs@xxxxxxxxx> wrote:
>
> hello,
>
> [apologies, not sure why my emails are bouncing due to the html version even when sent as text].
>
> @randall (i am sure we may have interacted before or probably same name someone else): my answers for your quote below:
>
> - disk encryption has nothing to do with .git storage. local access by access provided users will always be there.
> - disk encryption solves the challenge of modification access in the server by devops professionals not manipulation intent
> - disk encryption solves the challenge of modification access in the server by devops professionals not any code injection and remote incorrectly executed issues
> - disk encryption solves the challenge of modification access in the server by devops professionals not any code injection and automated code drive incorrectly executed issues and access to memory and or .git folder when appropriate chmod rights are provided
> - "opens git up to export limitations" may not be a great reason to avoid for the same. the object folder inside .git seems encoded if not a binary store and can be reverse engineered via code
> - "opens git up to export limitations" may not be a great reason to avoid the same. load issues for speed are not that great reason when tmp cache options can be a viable option. probably, you can work with optionally encrypt the .git folder option.
> - "opens git up to export limitations" may not be a great reason to avoid the same. what other export limitations and CVEs are limiting the need?
> - symmetrical encryption: i am recommending a personal user provided or default salt or key based based encryption for the .git folder
> - you may wish to take feedback for the organization using git-scm in their organizations. a bug bounty has been raised for gitlab, github, and atlassian that are the most rigorous for the number of users in the domain. i can also raise a bug bounty to azure, aws, google, oracle, and other networked providers if needed shamelessly to get this feature enabled (probably using an option to encrypt .git folder while creating a repository)
>
> "Have you explored using disk-level encryption to solve this?  While I understand your
> objective to "encrypt anything that might have data in it", there are solutions
> independent of git what would cover most use cases. The problem with adding
> symmetrical encryption to git is that it opens git up to export limitations and
> related CVEs. It would also cause adoption issues with many organizations
> who may have restrictions on whatever techniques git adopts to solve this.
> My preferential solution is using COTS hardware encryption to solve protecting
> data-at-rest content.
>
> Regards,
> Ganesh
>
>
> On Mon, Dec 23, 2024 at 7:58 PM <rsbecker@xxxxxxxxxxxxx> wrote:
> >
> > On December 23, 2024 7:04 AM, Krishnamurthy Ganesh B wrote:
> > >i am raising a git security red flag on the.git metadata files storing git logs, commits,
> > >and other metadata inside .git folder not encrypted using a two way salt or some
> > >other way like using a key for a two way encryption or some method of software
> > >encryption internally if / because the .git folder metadata is not encrypted.
> > >
> > >this has been raised to github before but will be raised again via hackerone security
> > >bug and to gitlab and altassian and other git repository source users if they are
> > >using their own internal modified sources.
> > >
> > >most of the errors like these will be directly closed.
> > >
> > >https://kondukto.io/blog/git-scm-affected-by-cve-2024-32002
> > >
> > >https://socradar.io/critical-security-updates-for-git-scm-cve-2024-32002-cve-
> > >2024-32004-lead-to-rce/
> > >
> > >https://stackoverflow.com/questions/45578579/what-file-metadata-is-
> > >preserved-by-git
> > >
> > >even packages like git-crypt do not encrypt metadata.
> > >https://github.com/AGWA/git-crypt
> >
> > Have you explored using disk-level encryption to solve this?  While I understand your
> > objective to "encrypt anything that might have data in it", there are solutions
> > independent of git what would cover most use cases. The problem with adding
> > symmetrical encryption to git is that it opens git up to export limitations and
> > related CVEs. It would also cause adoption issues with many organizations
> > who may have restrictions on whatever techniques git adopts to solve this.
> > My preferential solution is using COTS hardware encryption to solve protecting
> > data-at-rest content.
> >
> > --Randall
> >
>
>





[Index of Archives]     [Linux Kernel Development]     [Gcc Help]     [IETF Annouce]     [DCCP]     [Netdev]     [Networking]     [Security]     [V4L]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux SCSI]     [Fedora Users]

  Powered by Linux