Security: don't bind to insecure address by default
See original GitHub issueBy default, microk8s
binds to 0.0.0.0
, which can lead to security issues. suppoie
is a malware which seems to exploit this. Please consider removing the offending arg --insecure-bind-address=0.0.0.0
.
Issue Analytics
- State:
- Created 5 years ago
- Reactions:11
- Comments:18 (5 by maintainers)
Top Results From Across the Web
Security: don't bind to insecure address by default · Issue #110
I learned about this project at KuberCon last week and started playing with it on a cloud instance. The instance got exploited within...
Read more >Seeing a “Not Secure” Warning in Chrome? Here's Why and ...
For website owners/administrators. The “Not Secure” warning is being displayed on any page served over HTTP, which is an insecure protocol. If ...
Read more >Ensure the --insecure-bind-address argument is not set
Learn how to ensure that the --insecure-bind-address argument is not set with Bridgecrew's code security documentation.
Read more >How to Fix the HTTPS Not Secure Error - Seer Interactive
Once the crawl is complete, click “Reports” in the top ribbon, then “Insecure Content”. This will prompt a CSV report download to your...
Read more >2020 LDAP channel binding and LDAP signing requirements ...
A set of unsafe default configurations for LDAP channel binding and LDAP signing exist on Active Directory domain controllers that let LDAP clients...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
Just my two bits, but I’d say the opposite: if users need to secure access to this local development tool, they should learn how to do so. Anyone who’s ever tried to kick the tires on redis knows the pain involved when you use a bind address of (say) 127.0.0.1 instead of 0.0.0.0.
I learned about this project at KuberCon last week and started playing with it on a cloud instance.
The instance got exploited within hours…
Since this project is focused on helping developers and novice users getting started with K8s, it would be good to have some bare minimum security to protect users from the obvious attack vectors with K8s.