-
-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Headscale logs bearer tokens #1259
Comments
This issue is stale because it has been open for 180 days with no activity. |
/unstale
…On Tue, Sep 26, 2023, at 03:44, github-actions[bot] wrote:
This issue is stale because it has been open for 180 days with no activity.
—
Reply to this email directly, view it on GitHub
<#1259 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAAT5C5YVREVZA5XN5MXLJLX4IXQDANCNFSM6AAAAAAVXWLR2M>.
You are receiving this because you authored the thread.Message ID:
***@***.***>
|
This is a security exposure, in security software. Is it on the radar for a fix? |
Would you like to contribute a PR which fixes the perceived regression? I think the maintainers accept contributions again. The readme clearly states that this is a project for "self-hosters and hobbyists". If you have specific security requirements, it's probably better to switch to the commercial Tailscale offer. |
Is that the official response from the project to this security report? I am more than willing to get it a CVE if that helps. |
This is not an official response, since I am not an official maintainer. This is just how I understand the situation personally. |
Hi @disconn3ct, also not a maintainer but please don't try to get a CVE. You are apparently operating under the assumption that a project has to live up to certain security standards. This is not necessarily the case (I have no idea what the security policy for headscale is) and no one forces you to use headscale. Threatening to issue a CVE will usually only have the effect of getting completely ignored. If you want to invest your time productively, you could check if this issue is actually still an issue (I don't know I don't use headscale anymore) and if yes try to come up with a patch. |
and yet here you are, LARPing as one. Maybe you should let the actual maintainers have a chance to respond. |
@juanfont fyi https://www.cve.org/CVERecord?id=CVE-2023-47390 was assigned |
fixes juanfont#1259 Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
fixes juanfont#1259 Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
using v 0.22.3 i have a lot of this when moved to goodieshq/headscale-admin from headscale-ui |
Same here. @kradalby can you please reopen this? Or would you prefer a new bug (and new CVE)
|
Folks, read the ticket history. This is fixed and will be part of 0.23.0 |
Sure, I saw it's fixed in latest prerelease fow now... Sorry for this |
Bug description
Looking at the headscale logs, it logs this at info level when accessing the HTTP api:
This includes the whole bearer token. It would be great if the credentials wouldn't get logged :)
The text was updated successfully, but these errors were encountered: