mirror of
https://github.com/acme-dns/acme-dns.git
synced 2026-04-27 12:55:48 +03:00
[GH-ISSUE #47] Restrict registration #14
Labels
No labels
Documentation
Documentation
bug
enhancement
feature request
feature request
help wanted
pull-request
question
security
security
testing
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/acme-dns#14
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @MrBMT on GitHub (Mar 1, 2018).
Original GitHub issue: https://github.com/acme-dns/acme-dns/issues/47
Given that this DNS server is going to be used to authorise requests for SSL infrastructure, it would be nice to be able to restrict registration requests being sent to the server.
The ability to set a password in the configuration, then have this checked when registration requests are made to the server then deny them if incorrect/not provided would be pretty great.If it would be possible to add an option to disable registration, it'd be appreciated.
Thanks in advance for your consideration.
@Yannik commented on GitHub (Mar 2, 2018):
From a security standpoint, you'll probably run acme-dns in docker + a reverse proxy anyway.
You can just add basic auth to your reverse proxy. I don't think bloating acme-dns with things like this makes alot of sense.
This is an example for apache2.4:
Apart from that, no one in their right mind would delegate their challenges to an untrusted server anyway, so this is not a very big issue IMO. (But of course, using basic auth does make sense because it prevents abuse).
@joohoi commented on GitHub (Mar 2, 2018):
I do agree that adding another layer of authentication might be a bit overkill. I feel that the common usecase would be not exposing the HTTP API to the public internet at all, but only allowing access from the internal network.
A feature I'm thinking of adding is a new setting in configuration that can be used to toggle the registration endpoint off completely. So when your infrastructure is set up and configured for the automation, the complete registration could be disabled semi-temporarily.
@MrBMT commented on GitHub (Mar 2, 2018):
See, sometimes I overthink things. Just having the option to disable registration would work perfectly too, and is honestly the better idea than having to introduce a new type of authentication.