Comparison

CHANGES @ 12187:94253e02d47d

mod_http: Limit unencrypted http port (5280) to loopback by default Since accessing this port directly over the wider Internet is unlikely to intentional anymore. Most uses will likely be by reverse proxies, by mistake or because of trouble configuring HTTPS. Blocking mistaken uses is just a good thing, letting users send potentially private things unencrypted tends to be Strongly Discouraged these days. Many reverse proxy setups operate over loopback, so listening there instead of all interfaces is a net improvement. Improved automatic certificate location and SNI support has mostly eliminated the need for manual certificate configuration so HTTPS should Just Work once certificates have been provided. For local testing during development, connecting over loopback is likely fine as well. When really needed, `http_interfaces` can still be set. Suggested by Link Mauve
author Kim Alvefur <zash@zash.se>
date Sat, 15 Jan 2022 15:13:41 +0100
parent 12148:b63bb2c4b6d9
child 12206:77ac0d96ac24
comparison
equal deleted inserted replaced
12186:7f25ac9d8f0d 12187:94253e02d47d
30 - Direct TLS support (c2s and incoming s2s) 30 - Direct TLS support (c2s and incoming s2s)
31 - SCRAM-SHA-256 31 - SCRAM-SHA-256
32 - Direct TLS (including https) certificates updated on reload 32 - Direct TLS (including https) certificates updated on reload
33 - Pluggable authorization providers (mod_authz_) 33 - Pluggable authorization providers (mod_authz_)
34 - Easy use of Mozilla TLS recommendations presets 34 - Easy use of Mozilla TLS recommendations presets
35 - Unencrypted HTTP port (5280) restricted to loopback by default
35 36
36 ### HTTP 37 ### HTTP
37 38
38 - CORS handling now provided by mod_http 39 - CORS handling now provided by mod_http
39 - Built-in HTTP server now handles HEAD requests 40 - Built-in HTTP server now handles HEAD requests