9 years agognicol commented on change 16150 (auth.rb, line 151) for perforce-software-helix-web-services:main Given you're consistent with P4D's behaviour I wouldn't push too hard on it. I think allowing an invalid password for an account with no password is p ...Given you're consistent with P4D's behaviour I wouldn't push too hard on it. I think allowing an invalid password for an account with no password is poor form though and given how long its been like that I can't imagine p4d can fix it (though our higher level apps certainly could). « | ||
3 comments | ||
9 years agognicol commented on change 16150 (auth.rb, line 151) for perforce-software-helix-web-services:main Tristan, in swarm (to be more technically correct) we reject loging in with a password if no password is required. i.e. an attempt to auth as gnicol w ...Tristan, in swarm (to be more technically correct) we reject loging in with a password if no password is required. i.e. an attempt to auth as gnicol with 'password-guess' will fail if gnicol has no password. https://swarm.perforce.com/projects/swarm/files/main/library/P4/Connection/AbstractConnection.php#612 I'd suggest the HWS would behave more sanely if it shared this approach. « | ||
9 years agognicol commented on change 16076 (auth.rb, line 123) for perforce-software-helix-web-services:main I really don't think passing -f here is reasonable. I'd love to hear your thoughts on it though perhaps I'm missing something. | ||
9 years agognicol commented on change 15873 (auth.rb, line 109) for perforce-software-helix-web-services:main Cool; thanks for being receptive to the feedback! | ||
9 years agognicol commented on change 15873 (auth.rb, line 109) for perforce-software-helix-web-services:main You very much shouldn't include -f here. A number of our systems have auto-trust behaviour (Swarm and GitSwarm for example) and it seems to be receive ...You very much shouldn't include -f here. A number of our systems have auto-trust behaviour (Swarm and GitSwarm for example) and it seems to be received well. The logic however is always to trust if you've never seen it before (trust -y) its quite intentionally not to always trust all the things (trust -y -f). The latter scenario basically invalidates the MITM protection normally provided by SSL p4 connections and is not a good idea. « | ||
10 years agognicol commented on change 15790 (p4_util.rb, line 32) for perforce-software-helix-web-services:main Cool thanks for taking the feedback! | ||
10 years agognicol commented on change 15790 (p4_util.rb, line 32) for perforce-software-helix-web-services:main Quick glance it looks like 'jsh:' is also a thing and will allow arbitrary command execution. Blocking rsh: and jsh: when it lands just anywhere isn' ...Quick glance it looks like 'jsh:' is also a thing and will allow arbitrary command execution. Blocking rsh: and jsh: when it lands just anywhere isn't a good idea. It would block blundersh:1666 for example which is a perfectly viable port. Given your architecture, I'd strongly suggest looking into having p4-api parse the port then asking it to tell you if its this sorta style. | ||
10 years agognicol commented on change 15790 (p4_util.rb, line 32) for perforce-software-helix-web-services:main No idea. I wouldn't be shocked if whitespace was ignored by p4d (haven't tested don't know) though. Perhaps there is a more secure way to just inform ...No idea. I wouldn't be shocked if whitespace was ignored by p4d (haven't tested don't know) though. Perhaps there is a more secure way to just inform p4-api you don't want to permit rsh ports? | ||
10 years agognicol commented on change 15790 (p4_util.rb, line 32) for perforce-software-helix-web-services:main Or RSH or rSh etc. | ||
10 years agognicol commented on change 15790 (p4_util.rb, line 32) for perforce-software-helix-web-services:main Did you consider special characters? | ||
Adjust when notifications are sent to you about reviews that you're associated with (as an author, reviewer, project member or moderator).