-
Notifications
You must be signed in to change notification settings - Fork 243
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make registration endpoint URI configurable #109
base: master
Are you sure you want to change the base?
Conversation
This allows hiding the registration while leaving it enabled and exposed to the wider network.
I was going to propose a PR for this. @stblassitude are you able to update the PR to fix the struct field name?
|
This is security by obscurity. I disagree with merging this PR as it provides no actual security and instead adds bloat. |
I see the reasoning behind the feature, but I have to agree with @Yannik about this approach. As an alternative, I would like to propose adding a optional predefined key that would be passed along the POST request headers to |
Hello, I would like to reopen discussion and consideration of this issue. While the point about this being 'security through obscurity' has some validity, I do not want script kiddies being able to run scanning utilities against my DNS software. Security works best in layers. Why can I not have both a configurable endpoint and a custom auth token? Thanks, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would like to see this added to acme-dns too.
Any update on the issue? |
This PR is lacking test cases and updates to the manual and it needs to be rebased to resolve conflicts. |
Side note: added support for custom URL paths in my client update 0.10.0, see https://github.com/maddes-b/acme-dns-client-2/ |
Right now it is really easy to find out and abuse individual acme-dns setups:
Possible ways to avoid unwanted registrations and backtracing: 1. Custom URL paths 2. Secret in Header/Basic Auth My knowledge, situation, thoughts and conclusion: Both add other tools and more complexity/pitfalls to the setup, plus this may not be possible in all use cases. In my use case several friends are using my acme-dns instance to get certificates for their home machines. Adding Basic Auth (user/password) for The shared secret for the header and the shared custom URL path are equally a) secure, b) encrypted via SSL and c) depending on the admin's willing to use a random long secret in his setup. If none of these ideas will be added to the code, then the README should have a reverse proxying paragraph with some notes, links to information and a typical example for nginx:
acme-dns may be the first contact with reverse proxying and therefore some starting points will be helpful and reduce support questions. I would be willing to write that paragraph, but I need guidance how to set it up correctly: Maybe @m00nwtchr (#345) @lachesis (#345) @webprofusion-chrisc (#263) @TomyLobo (#263). |
I still don't understand why people even reverse-proxy the acme-dns HTTP API in the first place. Only the DNS server needs to be exposed to the internet for it to work. Unless you're trying to use 1 acme-dns instance for multiple servers? But it's a lot easier to just set up separate acme-dns instances for that, IMO (and if you really want to use only 1, a VPN is always the better option and isn't that hard to set up with e.g. https://github.com/DigitallyRefined/docker-wireguard-tunnel ) |
The first draft of that paragraph is complete: https://github.com/maddes-b/acme-dns/tree/feature/reverse-proxy#https-api @joohoi: Would you accept it this way? Change structure or something else? |
I dont care about acme-dns anymore, I moved to BIND dns server with a PHP API where I can simply add and remove domains in a single PHP file. https://saudiqbal.github.io/Linux/LetsEncrypt-PHP-API-BIND-DNS-ACME-DNS-01-server-setup.html |
Also replace non-breakable spaces with normal ones Closes joohoi#109 Closes joohoi#345 Closes joohoi#295
@saudiqbal Why not just firewall the API port? |
This allows hiding the registration while leaving it enabled and
exposed to the wider network.