-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Receivers can be set in the webhook request's to override the default config from the environment #7
Comments
With https://github.com/tmsmr/xmpp-webhook/tree/overwrite_recipients we are able to pass the recipients (URL-encoded) on request-basis. E.g:
What do you think? |
But aren't the recipients pretty much guessable? 🤔 |
Is this really a problem? Even with the default recipients from the ENV anyone would be able to spam / DoS them with the endpoints exposed (public, without authentication). The endpoints should be protected in any case (either network-wise or with a proxy that implements basic auth). I think i should mention that in the README with a configuration example... |
@alexanderadam Any thoughts on this? |
So you mean, instead of using an unguessable URL, simpy document that it's not intended to use it with publicly available URLs? Sure, thing. 👍
|
I think you misunderstood me. I'm not saying that there should be no form of authentication, i think it's feasible to facilitate a proxy for authentication (See https://github.com/tmsmr/xmpp-webhook/issues/22). |
This is actually just moved from #6 (because it's not really related to Slack anyway):
You wrote:
I thought about this as well and my initial thought was that someone could just spin a second container with other credentials.
But you are absolutely right that it would be much nicer to have just one instance that listens with different configurations.
Not only for Slack but also for Prometheus and Grafana. Because if the container is exposed outside and an attacker knows that such service is running, he could easily flood your MUC with requests. So it would make sense to add a long non guessable path to the URL anyway.
So to have an example how Slack webhook urls look like:
You can't easily guess those and therefore not easily spam your channels.
Maybe the easiest thing would be to persist the hook-configuration (the auth stuff could still be set via environment variable) in some kind of config file. For example:
But it should be mentioned that it is recommended to use a random part in the URL (i.e. by calling
openssl rand -hex 23
).The text was updated successfully, but these errors were encountered: