←back to thread

I can see your local web servers

(http.jameshfisher.com)
652 points jamesfisher | 1 comments | | HN request time: 0s | source
Show context
shurcooL ◴[] No.20029367[source]
> It is not sufficient security to only bind to 127.0.0.1 (the “loopback interface”)

What would be a better, more secure thing to do when you have multiple web servers on one machine behind a SSL-terminating reverse proxy?

replies(1): >>20029481 #
cosarara ◴[] No.20029481[source]
The thing to do is not run a web browser on that machine. Run the servers in a VM.
replies(1): >>20030753 #
notatoad ◴[] No.20030753[source]
But this seems to be able to see servers accessible to the local machine, so if my Dev server in a VM is accessible from my browser, it's accessible to any webpage in my browser?
replies(1): >>20031177 #
cosarara ◴[] No.20031177[source]
The reverse proxy is accessible from your browser and is properly configured to not accept random requests from any webpage (See: CORS). The others are not directly accessible, but only through the reverse proxy server. Does that make sense?
replies(1): >>20031576 #
notatoad ◴[] No.20031576[source]
not really, no. i still don't see what the reverse proxy or the VM are bringing to the table here. If i'm understanding the necessary CORS config here, it's to simply not send any access-control-allow-origin header, which does not require a VM or reverse proxy, most HTTP services do that by default.

simply being accessed through a reverse proxy instead of directly doesn't add any additional security

replies(1): >>20032635 #
1. cosarara ◴[] No.20032635{3}[source]
Actually, you are right.