-
-
Notifications
You must be signed in to change notification settings - Fork 132
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add SECURITY.MD documentation #68
Comments
Bearer token is saved to browser cache, which is about as much auth as you can have without a backend to facilitate it. |
Thank you. For example, vpn.xxxx.com is login url, vpn.xxxx.com/web can manage all tailscale client. I think vpn.xxxx.com/web need a login page, otherwise people who can visit vpn.xxxx.com also can manage all tailscale client. |
Try saving your API key and then opening an incognito window or a browser on another profile. |
If you want to stop random access to this page, you have a few options depending on what you use. nginx: Use basic auth (easiest), or oauth through https://github.com/oauth2-proxy/oauth2-proxy Caddy: Use basic auth, maybe https://github.com/greenpau/caddy-security/blob/main/README.md (Personally haven't tested this for Caddy). |
Mostly it should be irrelevant, as anything sensitive is saved to the local browser cache. It's not ideal as if there's a security issue with the client code, it can cause leaks of sensitive data. However, this is mitigated by the fact that client code is effectively signed by the hash signature of the compiled code. This isn't ideal and should be better served by a client-server model, but that is functionally impossible with a pure client side solution such as |
yeah, i really don't see the point, unless you really don't want someone or a random bot to find it, but what are they going to do? 🤷 |
No description provided.
The text was updated successfully, but these errors were encountered: