Skip to main content

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [List Home]
Re: [cross-project-issues-dev] cross-project-issues-dev Digest, Vol 84, Issue 5

On 01/07/2013 04:17 AM, Glyn Normington wrote:
Although I can see that some projects might want to use Hudson in this way, I wonder if any non-committers look at Hudson job status to get a feel for the stability of a project and would really miss being able to access that? In that case, if the risk of exposing the ssh port to the world is that someone will run a password cracking tool against it, would it be possible to allow HTTP traffic to Hudson but restrict the SSH access to requiring a committer's private key to authenticate?

Glyn,

I'm not sure I follow your train of thought re: exposing the ssh port to the world, since build/dev/git.eclipse.org's SSH port already is. My fear is that, if committer passwords and/or private keys are stored on anonymously-accessible web applications (such as hudson.eclipse.org) that information could potentially be obtained by individuals with ill intent. If the committer account in question has a full shell, that could mean real trouble for us from a security perspective.

Denis


Back to the top