-
-
Notifications
You must be signed in to change notification settings - Fork 569
Description
Description
Right now Seerr always binds to a network address. That means that any process with access to that address can make requests to Seerr. For a "regular system" this would be any process by any user. In some cases such as containers this can be reduced, but even then it is common to just forward the port to the host network.
UNIX sockets would allow restricting access to specific users or groups (example the reverse proxy). As a bonus it has better performance.
This also opens the ability for applications to race and steal the Seerr port. This would result in that application being able to obtain Seerr cookies and credentials.
Desired Behavior
There is an option to listen on a specific UNIX socket rather than TCP. It is a bonus if the socket FD can be passed such as inetd or systemd socket activation.
Additional Context
This will be extra valuable if #1564 ships. Trusted header auth allows anyone with direct access to the server to bypass authentication. While this is generally more secure since it offloads authentication to a trusted service it does open a door on the local system. This can be clamped down with a UNIX socket to ensure that every single request goes via the proxy and is properly authenticated.
Search Existing Issues
- Yes, I have searched existing issues.
Code of Conduct
- I agree to follow Seerr's Code of Conduct