Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Authentication: UNIX Sockets #3

Open
jamescun opened this issue Feb 21, 2020 · 0 comments · May be fixed by #6
Open

Authentication: UNIX Sockets #3

jamescun opened this issue Feb 21, 2020 · 0 comments · May be fixed by #6
Assignees
Labels
enhancement New feature or request

Comments

@jamescun
Copy link
Owner

Configuring a reverse proxy to apply authentication, or issuing client certificates, is laborious. It hampers the initial setup flow in environments that already have other means of authentication.

It should be possible to configure the server to listen on a UNIX socket rather than a network interface.

This is widely supported by the Go standard library, and has the added advantage of using the systems existing file permissioning system.

This would likely be configured by passing a filename to --listen instead of a host:port combination.

A decision must be made as to what permissions are initially assigned to the socket. My working idea as this would be the same user/group as the process and 0660 to allow only the process user/group access to the socket. There must be a command line flag to configure this, otherwise any change to permissions will not be persisted across restarts.

@jamescun jamescun added the enhancement New feature or request label Feb 21, 2020
@jamescun jamescun self-assigned this Feb 21, 2020
@jamescun jamescun linked a pull request Feb 24, 2020 that will close this issue
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant