@@ -2940,6 +2940,11 @@ is omitted from the advertisements but `refs/heads/master` and
29402940`refs/namespaces/bar/refs/heads/master` are still advertised as so-called
29412941"have" lines. In order to match refs before stripping, add a `^` in front of
29422942the ref name. If you combine `!` and `^`, `!` must be specified first.
2943+ +
2944+ Even if you hide refs, a client may still be able to steal the target
2945+ objects via the techniques described in the "SECURITY" section of the
2946+ linkgit:gitnamespaces[7] man page; it's best to keep private data in a
2947+ separate repository.
29432948
29442949transfer.unpackLimit::
29452950 When `fetch.unpackLimit` or `receive.unpackLimit` are
@@ -2949,7 +2954,7 @@ transfer.unpackLimit::
29492954uploadarchive.allowUnreachable::
29502955 If true, allow clients to use `git archive --remote` to request
29512956 any tree, whether reachable from the ref tips or not. See the
2952- discussion in the ` SECURITY` section of
2957+ discussion in the " SECURITY" section of
29532958 linkgit:git-upload-archive[1] for more details. Defaults to
29542959 `false`.
29552960
@@ -2963,13 +2968,19 @@ uploadpack.allowTipSHA1InWant::
29632968 When `uploadpack.hideRefs` is in effect, allow `upload-pack`
29642969 to accept a fetch request that asks for an object at the tip
29652970 of a hidden ref (by default, such a request is rejected).
2966- see also `uploadpack.hideRefs`.
2971+ See also `uploadpack.hideRefs`. Even if this is false, a client
2972+ may be able to steal objects via the techniques described in the
2973+ "SECURITY" section of the linkgit:gitnamespaces[7] man page; it's
2974+ best to keep private data in a separate repository.
29672975
29682976uploadpack.allowReachableSHA1InWant::
29692977 Allow `upload-pack` to accept a fetch request that asks for an
29702978 object that is reachable from any ref tip. However, note that
29712979 calculating object reachability is computationally expensive.
2972- Defaults to `false`.
2980+ Defaults to `false`. Even if this is false, a client may be able
2981+ to steal objects via the techniques described in the "SECURITY"
2982+ section of the linkgit:gitnamespaces[7] man page; it's best to
2983+ keep private data in a separate repository.
29732984
29742985uploadpack.allowAnySHA1InWant::
29752986 Allow `upload-pack` to accept a fetch request that asks for any
0 commit comments