@@ -2986,6 +2986,11 @@ is omitted from the advertisements but `refs/heads/master` and
29862986`refs/namespaces/bar/refs/heads/master` are still advertised as so-called
29872987"have" lines. In order to match refs before stripping, add a `^` in front of
29882988the ref name. If you combine `!` and `^`, `!` must be specified first.
2989+ +
2990+ Even if you hide refs, a client may still be able to steal the target
2991+ objects via the techniques described in the "SECURITY" section of the
2992+ linkgit:gitnamespaces[7] man page; it's best to keep private data in a
2993+ separate repository.
29892994
29902995transfer.unpackLimit::
29912996 When `fetch.unpackLimit` or `receive.unpackLimit` are
@@ -2995,7 +3000,7 @@ transfer.unpackLimit::
29953000uploadarchive.allowUnreachable::
29963001 If true, allow clients to use `git archive --remote` to request
29973002 any tree, whether reachable from the ref tips or not. See the
2998- discussion in the ` SECURITY` section of
3003+ discussion in the " SECURITY" section of
29993004 linkgit:git-upload-archive[1] for more details. Defaults to
30003005 `false`.
30013006
@@ -3009,13 +3014,19 @@ uploadpack.allowTipSHA1InWant::
30093014 When `uploadpack.hideRefs` is in effect, allow `upload-pack`
30103015 to accept a fetch request that asks for an object at the tip
30113016 of a hidden ref (by default, such a request is rejected).
3012- see also `uploadpack.hideRefs`.
3017+ See also `uploadpack.hideRefs`. Even if this is false, a client
3018+ may be able to steal objects via the techniques described in the
3019+ "SECURITY" section of the linkgit:gitnamespaces[7] man page; it's
3020+ best to keep private data in a separate repository.
30133021
30143022uploadpack.allowReachableSHA1InWant::
30153023 Allow `upload-pack` to accept a fetch request that asks for an
30163024 object that is reachable from any ref tip. However, note that
30173025 calculating object reachability is computationally expensive.
3018- Defaults to `false`.
3026+ Defaults to `false`. Even if this is false, a client may be able
3027+ to steal objects via the techniques described in the "SECURITY"
3028+ section of the linkgit:gitnamespaces[7] man page; it's best to
3029+ keep private data in a separate repository.
30193030
30203031uploadpack.keepAlive::
30213032 When `upload-pack` has started `pack-objects`, there may be a
0 commit comments