-
Notifications
You must be signed in to change notification settings - Fork 189
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Sig-Auth Pre-Acceptance TODOs #169
Comments
When writing tests for the proxy, please make sure to have coverage for http1 only, http2 only and http1+http2. GHSA-pvxj-25m6-7vqr is an example of a proxy CVE that only occurs over http1. |
I discussed breaking changes like removing CLI API (insecure listen address: link) and we would like to keep the PR open and merge it at the very end and create warning logs until then. |
I tried to replicate the CVE based on go example and by reading through the blog. I couldn't make it work, so I read through the fix and the native reverse proxy in use. The native proxy checks for upstream to agree on an upgrade of the connection. |
Closing this as it doesn't have any use any more. |
insecure-listen-address
as it is dangerous to do so with an auth proxy (link)AND
logic (link).http.Transport
defaults in k/k (link).kubeRBACProxy
Handle
means (link).authenticator.Request
->filters.WithAuthentication
(link).Related: Post-Acceptance.
The text was updated successfully, but these errors were encountered: