mirror of
https://github.com/acme-dns/acme-dns.git
synced 2026-04-27 12:55:48 +03:00
[GH-ISSUE #23] Handling registration requests with broken/incomplete JSON payload #5
Labels
No labels
Documentation
Documentation
bug
enhancement
feature request
feature request
help wanted
pull-request
question
security
security
testing
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/acme-dns#5
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @joohoi on GitHub (Nov 15, 2017).
Original GitHub issue: https://github.com/acme-dns/acme-dns/issues/23
To continue from discussion started here:
https://github.com/joohoi/acme-dns/pull/20#discussion_r150984732
ping @koesie10
Which approach would be the intuitive and appropriate if broken or incomplete JSON object (or whatever payload) is sent to registration endpoint:
400 Bad Requestwith descriptive error message.Previously I felt that the second one would be the correct approach, but now I'm starting to lean towards the first one.
@koesie10 commented on GitHub (Nov 15, 2017):
I would expect an error to be returned, as otherwise you would be opening yourself to security risks, such as allowing requests from all IPs. Of course, this is usually just an extra security measure, but in case your username and passwords are compromised, it is still an effective security measure that would be disabled without warning when you send an invalid JSON request.
@joohoi commented on GitHub (Nov 15, 2017):
Yeah, that's the reasoning that makes me lean towards the second option too. I'll implement that.
@koesie10 commented on GitHub (Nov 15, 2017):
Great, thanks for the project! I'm using it in combination with my own Certbot hook to automate issuing and renewing domains without having to change anything on the server, like is required for the http-01 and tls-sni-01.
@joohoi commented on GitHub (Nov 15, 2017):
Nice to hear that it's useful for you! I'm actually also an active Certbot developer, so if there's anything I can do to improve either project, please let me know! If it's Certbot related, using issues on Certbot repo, obiviously though :)