-
-
Notifications
You must be signed in to change notification settings - Fork 39
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
connection to private IP or self ignored service=https #74
Comments
in Line 57 in 5e34eee
sniproxy but it'll be off by default.
|
That would be great if we have such option
…On Sun, Sep 10, 2023 at 7:38 AM Ali Mosajjal ***@***.***> wrote:
in
https://github.com/mosajjal/sniproxy/blob/5e34eee5b2eaeda69aba39447c3d605250607ff6/https.go#L57,
any connection to RFC1918 addresses are blocked. This is mainly implemented
to prevent rebinding attacks or SSRF against the VPS infrastructure on the
open internet. I can consider an option switch to allow local IPs for
sniproxy but it'll be off by default.
—
Reply to this email directly, view it on GitHub
<#74 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AL2P65MDKLYS2OZ62JBEH2TXZU4K3ANCNFSM6AAAAAA4RUVMDU>
.
You are receiving this because you authored the thread.Message ID:
***@***.***>
|
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
why is connection to private IP ignored? I want to implement sniproxy in a lan and therefore the IP that sniproxy returns to clients is a private range.
The text was updated successfully, but these errors were encountered: