update security docs
This commit is contained in:
parent
f7bbb41fd2
commit
5cd14a9cd3
@ -10,6 +10,20 @@ Use https for the web interface as well as for the update client (if possible).
|
|||||||
Otherwise, your username / password (FQDN / update secret) will be transmitted
|
Otherwise, your username / password (FQDN / update secret) will be transmitted
|
||||||
in clear text (unencrypted).
|
in clear text (unencrypted).
|
||||||
|
|
||||||
|
The web interface will warn you if you use it via http. If WE_HAVE_SSL is
|
||||||
|
set to True, it will suggest you better use the https site and link there.
|
||||||
|
|
||||||
|
Additionally, the service administrator can implement a redirect from the
|
||||||
|
http to the https site within the webserver configuration for the WWW_HOST.
|
||||||
|
The redirect should **not** be implemented for WWW_IPV4_HOST and WWW_IPV6_HOST
|
||||||
|
as it is unknown whether all update clients can deal with a redirect.
|
||||||
|
|
||||||
|
For the router / update client configuration examples we show when creating a
|
||||||
|
update secret, we use update URLs with https: (and we also tell why it might
|
||||||
|
not work).
|
||||||
|
|
||||||
|
On the hosts overview page, we show whether we received the last update via SSL.
|
||||||
|
|
||||||
|
|
||||||
Passwords / Secrets / Keys
|
Passwords / Secrets / Keys
|
||||||
==========================
|
==========================
|
||||||
@ -64,6 +78,8 @@ Make sure no unauthorized person gets that key or he/she will be able to update
|
|||||||
ANY record in the respective zone / nameserver directly (without going over
|
ANY record in the respective zone / nameserver directly (without going over
|
||||||
nsupdate.info software / service).
|
nsupdate.info software / service).
|
||||||
|
|
||||||
|
We support creating random update keys, so you don't need an extra tool for this.
|
||||||
|
|
||||||
|
|
||||||
CSRF protection
|
CSRF protection
|
||||||
===============
|
===============
|
||||||
|
Loading…
x
Reference in New Issue
Block a user