-
-
Notifications
You must be signed in to change notification settings - Fork 36
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Question] Plans for access control? #176
Comments
I understand that you want to drop bot traffic as early as possible. However, imo this kind of configuration is application level, which is done on the application server (in this case webserver) and not part of network architecture where rust-rpxy is operating. |
Hi, sorry for my delayed reply. Yes, as @Gamerboy59 mentioned, I think such access control policies should be handled by the backend app since the I also think that designing such a request-header-based filtering function is tough since it requires very generalized pattern matching for header keys and values (Maybe regexp-based rule is needed). It might become a vulnerability against DoS attacks consuming the computational resources (c.f. ReDoS) (Simple filtering based on network information, i.e., IP addresses, would be nice for me. not planned yet though) |
Interesting angle. We removed all backreferences from our regex rules through I think the two of you have made a good case for leaving this to the app layer. That said, I suppose you're aware that the Rust regex crate uses DFA by default and can handle untrusted input? |
I didn't know that. Thanks for that information |
I think having it as an option for a reverse proxy. Here are some example use cases:
In all these cases it forces one into using something like nginx as a reverse proxy. If that is still out of scope, then maybe consider dynamic loadable modules or wasm extensions? |
1 comes under my original question, but fronting closed-source/3rd-party apps, carrying local patch for backend, I guess rpxy would have to decide whether to support these fairly common use cases. |
Isn’t session persistence (number 5) already supported as part of load balancing? |
there is an option of having a sticky cookie, but the problem is it is generic. If you have a logged off site, the site would generally be cached pages. But if someone is logged in, you want it to start load balancing as you are now going into processes that use up resources. |
Dear Kurihara-san, I was wondering if it’s going to be possible to write regex rules in rpxy’s configuration file to deny access (eg for bots) based on the value of various request headers?
We’d like to see the ability to do this at the stage of reverse proxy as most of such rules apply across our applis.
The text was updated successfully, but these errors were encountered: