|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
¨ |
All
connections encrypted
|
|
|
|
|
SSH
or OpenSSL layer handling; undecided
|
|
|
¨ |
Clients
must authenticate via public key
|
|
|
|
|
It
is assumed that there will be well-known anonymous
|
|
|
authenticators
|
|
|
¨ |
Entities
are named by cryptographic hash of their content.
|
|
|
|
|
These
can only be obtained starting from a project or branch.
|
|
|
|
|
Access
to project/branch is authenticated based on authentication
|
|
|
key
|
|
|
|
|
Note
client side can test corruption
|
|
|
¨ |
Untrusted
servers are given public access, and therefore
|
|
can
replicate only public objects.
|
|
|
|
|
Note
hybrid security model here!
|
|