Skip to content

Commit e7bee7d

Browse files
committed
README.md: Disclose the fact that revoking access is not supported.
Perpetual grant of access is certainly a security issue, so goes to the corresponding section. Based on the discussion in AGWA#47
1 parent c63a727 commit e7bee7d

File tree

1 file changed

+13
-1
lines changed

1 file changed

+13
-1
lines changed

README.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,19 @@ there may be backwards-incompatible changes introduced before version
8181
Security
8282
--------
8383

84-
git-crypt is more secure that other transparent git encryption systems.
84+
Currently git-crypt doesn't support revoking access to an encrypted
85+
repository which was previously granted. This first of all applies
86+
to multi-user GPG mode (put simple, there's no del-gpg-user command
87+
to complement add-gpg-user), but also applies to symmetric key mode
88+
(there's no support to rotate this key). It's because this is inherently
89+
complex problem in the context of historical data. For example, even
90+
if a key was rotated at one point of history, a user having previous
91+
key can still access previous repository history. This issue is discussed
92+
in more detail in
93+
https://github.com/AGWA/git-crypt/issues/47 .
94+
95+
On the bare encryption level, git-crypt is more secure than other
96+
transparent git encryption systems.
8597
git-crypt encrypts files using AES-256 in CTR mode with a synthetic IV
8698
derived from the SHA-1 HMAC of the file. This mode of operation is
8799
provably semantically secure under deterministic chosen-plaintext attack.

0 commit comments

Comments
 (0)