TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Clarifications on the Incapsula Redis security report

47 pointsby bjerunalmost 7 years ago

4 comments

gomoxalmost 7 years ago
It seemed strange to me that the protected mode text warning gives a long winded explanation on 3 ways to disable protected mode first, and leaves the most desireable (change the bind address or password) option for last with a much more brief and less helpful explanation.<p>I would have done a long detailed explanation on bind addr&#x2F;password, and a &quot;you can also disable protected mode by looking up how to do it on XXXXX&quot; at the end.<p>Based on my experience with product design decisions, that detail right there probably had a huge impact on the actual adoption of the desired choice.
评论 #17220212 未加载
jamiesonbeckeralmost 7 years ago
I love Redis, and antirez is a genius. The simple solution is usually the most secure: Redis should just bind to <i>localhost</i> by default, unless it&#x27;s specifically told to bind to other interfaces.
mircealalmost 7 years ago
I think while it’s bad to have people thinking that Redis has “security” issues, no matter what you do people will find ways to work around it.<p>I personally would like to see Redis focus on what it’s best for and not add additional “features” for the purpose of PR.<p>Redis is an awesome piece of software, but at the end of the day, the user of the software is responsible for using it properly.
twicalmost 7 years ago
Surely the real WTF here is that Redis allows unauthenticated connections over the network at all?<p>I appreciate that it&#x27;s too late to go back and change this, as it would break existing installations on upgrade, but perhaps it&#x27;s worth pointing that out for the benefit of future server developers.<p>If you want to make things easy for initial setup, you could allow unauthenticated connections over UNIX domain sockets, and&#x2F;or the loopback interface. And perhaps only if there is no password configured?<p>If you want to really make it hard for users to screw up, how about requiring the admin to configure a password for remote access, but also generating some random secret on installation or first boot, and requiring both for authentication. Then, even a weak password doesn&#x27;t make it easy for a remote attacker to gain access.
评论 #17219278 未加载
评论 #17220175 未加载