Skip to content

Authentication #228

Open
Open
@Kixunil

Description

@Kixunil

One of the use cases of this crate suggests use in production to debug possible problems. That's very understandable but I see it as a potential security vulnerability. If the port is exposed an attacker (e.g. a compromised user on the same system) may be able to obtain valuable information.

The obvious solution is to implement a basic authentication mechanism. A simple challenge-response with a secret token and HMAC would go long way to achieve security. Another possibility is to allow binding Unix sockets and just rely on filesystem permissions (but this AFAIK only works on Linux).

Metadata

Metadata

Assignees

No one assigned

    Labels

    S-featureSeverity: feature. This is adding a new feature.

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions