From 245258f8f0d500a41a7aa4f79fcb72f28580d9ef Mon Sep 17 00:00:00 2001 From: Joey Hess Date: Tue, 3 May 2016 14:01:07 -0400 Subject: respinse --- .../comment_2_86262439c9056c0e06623cdf79eaf9a6._comment | 15 +++++++++++++++ 1 file changed, 15 insertions(+) create mode 100644 doc/devblog/day_387__release_day/comment_2_86262439c9056c0e06623cdf79eaf9a6._comment (limited to 'doc/devblog/day_387__release_day') diff --git a/doc/devblog/day_387__release_day/comment_2_86262439c9056c0e06623cdf79eaf9a6._comment b/doc/devblog/day_387__release_day/comment_2_86262439c9056c0e06623cdf79eaf9a6._comment new file mode 100644 index 000000000..19492995a --- /dev/null +++ b/doc/devblog/day_387__release_day/comment_2_86262439c9056c0e06623cdf79eaf9a6._comment @@ -0,0 +1,15 @@ +[[!comment format=mdwn + username="joey" + subject="""comment 2""" + date="2016-05-03T17:56:44Z" + content=""" +The exposed information is not stored in the remote. If it's stored +anywhere, it would be in a server log, which might log an attempt +to access an un-encrypted key filename (which typically includes the +checksum and maybe the file's extension). + +So on the one hand, you don't need to do anything other than upgrade +git-annex to recover from the problem. On the other hand, if the potential +that a un-encrypted filename of a git-annex key having leaked into a server +log somewhere is a problem, I don't have a solution to the problem. :-/ +"""]] -- cgit v1.2.3