Software /
code /
prosody
Comparison
CHANGES @ 12187:94253e02d47d
mod_http: Limit unencrypted http port (5280) to loopback by default
Since accessing this port directly over the wider Internet is unlikely
to intentional anymore. Most uses will likely be by reverse proxies, by
mistake or because of trouble configuring HTTPS.
Blocking mistaken uses is just a good thing, letting users send
potentially private things unencrypted tends to be Strongly Discouraged
these days.
Many reverse proxy setups operate over loopback, so listening there
instead of all interfaces is a net improvement.
Improved automatic certificate location and SNI support has mostly
eliminated the need for manual certificate configuration so HTTPS should
Just Work once certificates have been provided.
For local testing during development, connecting over loopback is likely
fine as well. When really needed, `http_interfaces` can still be set.
Suggested by Link Mauve
author | Kim Alvefur <zash@zash.se> |
---|---|
date | Sat, 15 Jan 2022 15:13:41 +0100 |
parent | 12148:b63bb2c4b6d9 |
child | 12206:77ac0d96ac24 |
comparison
equal
deleted
inserted
replaced
12186:7f25ac9d8f0d | 12187:94253e02d47d |
---|---|
30 - Direct TLS support (c2s and incoming s2s) | 30 - Direct TLS support (c2s and incoming s2s) |
31 - SCRAM-SHA-256 | 31 - SCRAM-SHA-256 |
32 - Direct TLS (including https) certificates updated on reload | 32 - Direct TLS (including https) certificates updated on reload |
33 - Pluggable authorization providers (mod_authz_) | 33 - Pluggable authorization providers (mod_authz_) |
34 - Easy use of Mozilla TLS recommendations presets | 34 - Easy use of Mozilla TLS recommendations presets |
35 - Unencrypted HTTP port (5280) restricted to loopback by default | |
35 | 36 |
36 ### HTTP | 37 ### HTTP |
37 | 38 |
38 - CORS handling now provided by mod_http | 39 - CORS handling now provided by mod_http |
39 - Built-in HTTP server now handles HEAD requests | 40 - Built-in HTTP server now handles HEAD requests |