-
-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
question: Possible to disable API? #3434
Comments
You can't currently disable the API, since every CLI command apart from |
If you're on a shared hosting plan because of pricing, you can also get $1 VPSes. |
Thanks for getting in touch so quickly.
I was expecting this. Bummer! Read about API tokens and switching to unix sockets. But looking for something working now... (or at least soon) ;)
I'm not on any plan. I'm evaluating IPFS to be used in a resilient, distributed CDN. Something it generally seems very well suited for. Could you think of any other way to secure the API from users on the same host? |
Lock down port 5001 to a certain user using iptables |
Generally users lack privileges on shared hosts to do so. Should happen on application level... |
It might be possible using user+net namespace magic ( One other option — completely insecure mind you, will only keep lazy prying eyes out — is to have it bind to a loopback address that isn't 127.0.0.1. You have an entire /8 to play with there. |
This would be pretty useful. Should have an API key at a minimum for writing changes. |
Version information:
go-ipfs version: 0.4.4-
Repo version: 4
System version: amd64/linux
Golang version: go1.7.1
Type: Question
Priority: P4 (?)
Description:
Is it possible to deactivate the API for security reasons? And would that make sense at all?
Situation: Trying to run
ipfs daemon
on a shared Linux host.Problem: It seems currently the API is not secure (#2389, #1532, ipfs/notes#159) in a shared hosting environment. Is this true?
I think this is true because other users can actually access the API from 127.0.0.1.
I am trying to stop the daemon from listening on
127.0.0.1:5001
by removing it fromAddresses
in the configuration file. For the gateway this is possible but for the API this happens:If I look at the code this behaviour becomes clear.
Would this actually work at all? Are there parts of the software/commands that depend on the API? The web UI part of course wouldn't work anymore. But that wouldn't be a problem.
Thanks!
The text was updated successfully, but these errors were encountered: