-
Notifications
You must be signed in to change notification settings - Fork 2.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
bug: APISIX Admin API security risks #1455
Comments
welcome PR to fix |
note: This PR has fixed the second point here. |
Is it enough to enable self-signed certificate? |
yes, it's enough.
Thanks,
Ming Wen
Twitter: _WenMing
YuanSheng Wang <notifications@github.com> 于2020年4月16日周四 上午9:29写道:
… The Admin API uses https access capability by default, because https can
effectively prevent key leakage caused by request hijacking.
Is it enough to enable self-signed certificate?
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub
<#1455 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AGJZBKYLZH47Z2NHV37N53TRMZNOFANCNFSM4MINORBQ>
.
|
Yes, that's enough |
How to enable the self-signed certificate function here? |
hi, after a previous high-availability solution design, I found it more reasonable to recommend users to use the Admin API and Dashboard as APISIX routing services. First, Kubernetes is the case. If the dashboard wants to be accessed, you need to configure an Ingress (corresponding to the APISIX route) |
fixed already. |
Hi, the security department of Tencent recently discovered that Kong's Admin component has security risks. For details, please refer to this link: https://mp.weixin.qq.com/s/Ttpe63H9lQe87Uk0VOyMFw
I read the preliminary article and think that our APISIX Admin API has the same risks.
The text was updated successfully, but these errors were encountered: