When a users machine is compromised the black hats can obviously change whatever they want to but the eds.power.on.net/project server is:
- Not a file server!, you have to access using password authentication via https which is encrypted.
- Its append only, users from the compromised machine can only add bad data, not remove good data.
- So we still need to detect the problem and tidy up afterwards but its an improvement over file sharing schemes.
On the user side we use capabilities to limit actions such as editing tickets or changing timelines.
The server itself is backed up in the same manner to another machine and physical backups. And finally the server itself is:
- Only acessible via https (and http for forwarding) to a fossil server.
- Runs on a small OpenBSD server which we control. No shared virtual machines.
- Access to the server is only via ssh from a fixed IP address on the local Network. Everything else goes to the bit bucket.