Skip to content

Consider alternatives to insecure entrypoints #509

Open
@jspdown

Description

@jspdown

Proposal

The indirect whitelist middlewares, used by routers in the context of a TrafficSplit backend, relies on the X-Forwarded-For header. In order to get this header, the proxy needs to be trusted by either explicitly listing trusted sources or by declaring the entrypoint as insecure.
Due to the dynamic nature of the number of proxies, as being instantiated by a DaemonSet, we can't build easily a list of trusted sources. While rewriting the Provider, it has been chosen to rely on insecured entrypoint.

This preliminary solution is far from perfect and we should consider having a stricter way of establishing a list of trusted sources.

Workarounds

The current workaround is to use entrypoint.insecure=true https://docs.traefik.io/routing/entrypoints/#forwarded-headers

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions