cvs commit: www/en/cgi Makefile query-pr.cgi querypr-code.cgi

John Baldwin jhb at freebsd.org
Mon Nov 14 08:36:40 PST 2005


On Saturday 12 November 2005 04:03 pm, Alexander Leidinger wrote:
> On Sat, 12 Nov 2005 10:35:29 -0700 (MST)
>
> "M. Warner Losh" <imp at bsdimp.com> wrote:
> > I've had a couple of private suggestions sent to me.
> >
> > The first is to create a raw-query-pr.cgi that will just serve up one
> > PR in raw format with no links to this page.
> >
> > The second is to add another parameter to query-pr that changes
> > quarterly.  pass=bluestarts this quarter, pass=yellowdiamons next, etc
> > (well, we wouldn't use the ingrediants to lucky charms as a
> > password).  This level of security is the same that exist on certain
> > invitation only IRC channels that are out there.  Someone has to tell
> > you the password, and the password changes from time to time.  Since
> > developer mail is project confidencial, I would guess it would be
> > sufficient to email the new password once a quarter.
> >
> > The ugly alternative is to have a 'members only' section of the
> > website where you have to login.  In that section, we could also give
> > the full names.  However, this suffers from the inability to easily
> > use with 'fetch'.
> >
> > The forth alternative is those goofy 'tell me what's in this box'
> > schemes.  Prove you are a human.  This sounds more burdonsome than
> > logging into freefall to do the query-pr, which is Kris' main
> > objection to the new change.
>
> Those, and specially the one we use, are too easy to circumvent. There's
> somewhere a page (maybe available on the links section on my homepage
> or still as a "add me to the links section"-mail somewhere in my
> inbox...) which dissects a lot of those schemes and also provides code
> how to circumvent them.
>
> With the current scheme in place we also can just render the email
> address as a picture. It provides the same protection and also has the
> same drawbacks for a committer.
>
> A better alternative would be to obfuscate the address, e.g. replacing
> the "@" with an "at" or with a space or an ampersand or a percent sign
> or whatever (even randomizing the replacement would be possible). And
> replacing dots with something else.
>
> This would result in at least the same computational complexity for
> address-harvesters and it would allow to just cut and paste the
> addresses. It gives the additional benefit that sites such as
> freshports (or our/foreign mail archives) provide the same obfuscation
> without any further work.

Hmm, I might like this the best.  Something I've noticed, too, btw, is that 
there is still a 'submit followup' link on the same page that has the 
submitter's e-mail address in the mailto: (so it's even easier for a spider 
to find) so unfortunately I think the current change doesn't actually help 
the current page contents at all.  I actually received the original complaint 
e-mail and had forwarded it to core@ to ask if the person's request was even 
reasonable, etc. on a Friday and came back in to find the changes were done 
over the weekend. :)   On the face the request that we not publish people's 
e-mail addresses may seem reasonable, but I think in practice it is not 
something we can realistically do.  At this point I'm all for just saying, 
"Sorry, once you've sent in a PR your e-mail address is likely to be 
harvested for spam and unfortunately we can't really plug all the leaks and 
still get anything useful done."  I do like Alexander's suggestion above as 
it would automate the task of obfuscating the e-mail address when cutting and 
pasting into a commit log.  If it included some randomization it would also 
make it slightly more "secure" (that's not the right word really) than the 
simplistic scheme that I always follow (s/@/ at /, s/\./ dot /g)

-- 
John Baldwin <jhb at FreeBSD.org>  <><  http://www.FreeBSD.org/~jhb/
"Power Users Use the Power to Serve"  =  http://www.FreeBSD.org


More information about the cvs-doc mailing list