mirror of
https://github.com/zulip/zulip.git
synced 2025-10-24 16:43:57 +00:00
docs: Mention Camo does not use a local Smokescreen in the proxies docs.
This documents the new behaviour ind328d3dd4d. (cherry picked from commitbe1c4c2bd8)
This commit is contained in:
@@ -212,6 +212,11 @@ To protect against [SSRF][ssrf], Zulip 4.8 and above default to
|
|||||||
routing all outgoing HTTP and HTTPS traffic through
|
routing all outgoing HTTP and HTTPS traffic through
|
||||||
[Smokescreen][smokescreen], an HTTP `CONNECT` proxy; this includes
|
[Smokescreen][smokescreen], an HTTP `CONNECT` proxy; this includes
|
||||||
outgoing webhooks, website previews, and mobile push notifications.
|
outgoing webhooks, website previews, and mobile push notifications.
|
||||||
|
By default, the Camo image proxy will be automatically configured to
|
||||||
|
use a custom outgoing proxy, but does not use Smokescreen by default
|
||||||
|
because Camo includes similar logic to deny access to private
|
||||||
|
subnets. You can [override][proxy.enable_for_camo] this default
|
||||||
|
configuration if desired.
|
||||||
|
|
||||||
To use a custom outgoing proxy:
|
To use a custom outgoing proxy:
|
||||||
|
|
||||||
@@ -247,6 +252,7 @@ In Zulip 4.7 and older, to enable SSRF protection via Smokescreen, you
|
|||||||
will need to explicitly add the `zulip::profile::smokescreen` Puppet
|
will need to explicitly add the `zulip::profile::smokescreen` Puppet
|
||||||
class, and configure the `[http_proxy]` block as above.
|
class, and configure the `[http_proxy]` block as above.
|
||||||
|
|
||||||
|
[proxy.enable_for_camo]: #enable-for-camo
|
||||||
[smokescreen]: https://github.com/stripe/smokescreen
|
[smokescreen]: https://github.com/stripe/smokescreen
|
||||||
[smokescreen-acls]: https://github.com/stripe/smokescreen#acls
|
[smokescreen-acls]: https://github.com/stripe/smokescreen#acls
|
||||||
[ssrf]: https://owasp.org/www-community/attacks/Server_Side_Request_Forgery
|
[ssrf]: https://owasp.org/www-community/attacks/Server_Side_Request_Forgery
|
||||||
|
|||||||
@@ -263,9 +263,14 @@ strength allowed is controlled by two settings in
|
|||||||
internal corporate network. The default Smokescreen configuration
|
internal corporate network. The default Smokescreen configuration
|
||||||
denies access to all non-public IP addresses, including 127.0.0.1.
|
denies access to all non-public IP addresses, including 127.0.0.1.
|
||||||
|
|
||||||
|
The Camo image server does not, by default, route its traffic
|
||||||
|
through Smokescreen, since Camo includes logic to deny access to
|
||||||
|
private subnets; this can be [overridden][proxy.enable_for_camo].
|
||||||
|
|
||||||
[go-camo]: https://github.com/cactus/go-camo
|
[go-camo]: https://github.com/cactus/go-camo
|
||||||
[ssrf]: https://owasp.org/www-community/attacks/Server_Side_Request_Forgery
|
[ssrf]: https://owasp.org/www-community/attacks/Server_Side_Request_Forgery
|
||||||
[smokescreen-setup]: ../production/deployment.html#customizing-the-outgoing-http-proxy
|
[smokescreen-setup]: ../production/deployment.html#customizing-the-outgoing-http-proxy
|
||||||
|
[proxy.enable_for_camo]: ../production/deployment.html#enable-for-camo
|
||||||
|
|
||||||
## Final notes and security response
|
## Final notes and security response
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user