Steve Litt wrote on 05/06/18 05:34:
Hi all,

Timing is everything. I was about to put my Stylz project on GitHub. No
more.

GitLab's a maybe, but unexpected bad stuff happens in Open Source too:
systemd, Caldera going to the dark side, etc.

My understanding, from reading man pages of a very few git commands, is
that git comes with a server to serve out read-only access to my
repository. And for those few with push/commit/branch rights, I can
give them ssh logins, key access only.

1) Can I put the preceding in a sandbox from which limited harm can be
    done?

2) Can I enforce that those keys must have passwords? Passwords of a
    certain length and quality?

3) What security precautions must I take if this is on my daily driver
    desktop?

I'd suggest using a qemu VM on a pair of raw disk files, with nfs mounted repository tree, and sshd_config set up to disallow empty passwords. The VM would be set up such the one holds all software and configuration, and the other anything dynamic, so as to allow the one disk file to be read-only "in production".

Furter, you'd make the networking pass through the host, so you can configure a highly restrictive firewall around the VM, e.g. disallowing all TCP connections other than inbound ssh, and all UDP traffic other than DNS.

Ralph.
_______________________________________________
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng

Reply via email to