mirror of
				https://github.com/zulip/zulip.git
				synced 2025-11-04 05:53:43 +00:00 
			
		
		
		
	docs: Mention Camo does not use a local Smokescreen in the proxies docs.
This documents the new behaviour in d328d3dd4d.
			
			
This commit is contained in:
		
				
					committed by
					
						
						Tim Abbott
					
				
			
			
				
	
			
			
			
						parent
						
							a020d7a80d
						
					
				
				
					commit
					be1c4c2bd8
				
			@@ -229,6 +229,11 @@ To protect against [SSRF][ssrf], Zulip 4.8 and above default to
 | 
				
			|||||||
routing all outgoing HTTP and HTTPS traffic through
 | 
					routing all outgoing HTTP and HTTPS traffic through
 | 
				
			||||||
[Smokescreen][smokescreen], an HTTP `CONNECT` proxy; this includes
 | 
					[Smokescreen][smokescreen], an HTTP `CONNECT` proxy; this includes
 | 
				
			||||||
outgoing webhooks, website previews, and mobile push notifications.
 | 
					outgoing webhooks, website previews, and mobile push notifications.
 | 
				
			||||||
 | 
					By default, the Camo image proxy will be automatically configured to
 | 
				
			||||||
 | 
					use a custom outgoing proxy, but does not use Smokescreen by default
 | 
				
			||||||
 | 
					because Camo includes similar logic to deny access to private
 | 
				
			||||||
 | 
					subnets. You can [override][proxy.enable_for_camo] this default
 | 
				
			||||||
 | 
					configuration if desired.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
To use a custom outgoing proxy:
 | 
					To use a custom outgoing proxy:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -264,6 +269,7 @@ In Zulip 4.7 and older, to enable SSRF protection via Smokescreen, you
 | 
				
			|||||||
will need to explicitly add the `zulip::profile::smokescreen` Puppet
 | 
					will need to explicitly add the `zulip::profile::smokescreen` Puppet
 | 
				
			||||||
class, and configure the `[http_proxy]` block as above.
 | 
					class, and configure the `[http_proxy]` block as above.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					[proxy.enable_for_camo]: #enable-for-camo
 | 
				
			||||||
[smokescreen]: https://github.com/stripe/smokescreen
 | 
					[smokescreen]: https://github.com/stripe/smokescreen
 | 
				
			||||||
[smokescreen-acls]: https://github.com/stripe/smokescreen#acls
 | 
					[smokescreen-acls]: https://github.com/stripe/smokescreen#acls
 | 
				
			||||||
[ssrf]: https://owasp.org/www-community/attacks/Server_Side_Request_Forgery
 | 
					[ssrf]: https://owasp.org/www-community/attacks/Server_Side_Request_Forgery
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -266,9 +266,14 @@ strength allowed is controlled by two settings in
 | 
				
			|||||||
  internal corporate network. The default Smokescreen configuration
 | 
					  internal corporate network. The default Smokescreen configuration
 | 
				
			||||||
  denies access to all non-public IP addresses, including 127.0.0.1.
 | 
					  denies access to all non-public IP addresses, including 127.0.0.1.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  The Camo image server does not, by default, route its traffic
 | 
				
			||||||
 | 
					  through Smokescreen, since Camo includes logic to deny access to
 | 
				
			||||||
 | 
					  private subnets; this can be [overridden][proxy.enable_for_camo].
 | 
				
			||||||
 | 
					
 | 
				
			||||||
[go-camo]: https://github.com/cactus/go-camo
 | 
					[go-camo]: https://github.com/cactus/go-camo
 | 
				
			||||||
[ssrf]: https://owasp.org/www-community/attacks/Server_Side_Request_Forgery
 | 
					[ssrf]: https://owasp.org/www-community/attacks/Server_Side_Request_Forgery
 | 
				
			||||||
[smokescreen-setup]: ../production/deployment.html#customizing-the-outgoing-http-proxy
 | 
					[smokescreen-setup]: ../production/deployment.html#customizing-the-outgoing-http-proxy
 | 
				
			||||||
 | 
					[proxy.enable_for_camo]: ../production/deployment.html#enable-for-camo
 | 
				
			||||||
 | 
					
 | 
				
			||||||
## Final notes and security response
 | 
					## Final notes and security response
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 
 | 
				
			|||||||
		Reference in New Issue
	
	Block a user