-
-
Notifications
You must be signed in to change notification settings - Fork 139
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[FEAT]: Improve Service-Isolation #363
Comments
|
|
|
Feature Description
This is a FR for multiple details concerning better service-isolation and better security. I believe this features would align well with cosmos' focus on security while retaining high usability.
Coming from Traefik, I miss the possibility to have multiple endpoints for separating public and private services.
One Endpoint which is accessible from public (f.e. port 8080/4443, forwarded from public port 80/443), another Endpoint for local services (port 80/443) Right now I can only expose either all or no services to the public, risking a security breach when being sloppy and/or inexperienced.
I think it makes sense to isolate certs where they don't belong together. F.e. when you're hosting a public website like a blog on cosmos while still using a separate Domain for private services, there is only one cert requested with all domains in there, exposing the domain-relations. This violates need to know principle, meaning this knowledge can be leveraged in case of an attack. Dupe: [Feat]: Per-domains certificates #336
Right now, Whitelists are on a per URL-basis in advanced settings. They are not shown on any overview and not handled centrally. Managing this is time consuming and prone to errors. We should have the possibility to setup named access-groups and show them on the URL-Overview as well as in the settings. Dupe: ([FEAT]: IP/Subnet aliases for whitelisting #214
Right now, if not changed manually, Cosmos does not block public access. This means cosmos is compromised, as soon as someone does a port forwarding while having the wrong settings (or too early). IMHO in today's world, this is more than a minor security issue. Per Default, Cosmos should block access from public IP-Ranges. Arguably even any IP-Range except it's own. One should then have the possibility to change the default ranges either limiting them even more or opening access up to the public.
The text was updated successfully, but these errors were encountered: