This repository has been archived by the owner on Apr 16, 2020. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 6
Daemon security #23
Comments
Fair point, will add warning bells |
@jbenet Do we have any text i could link that talk about why this is dangerous? |
not yet |
@krl I'm not yet that deep into how the ipfs admin interface works (so this could be wrong), but by running ipfs config --json API.HTTPHeaders.Access-Control-Allow-Origin '["*"]'
ipfs config --json API.HTTPHeaders.Access-Control-Allow-Methods '["PUT", "GET", "POST"]'
ipfs config --json API.HTTPHeaders.Access-Control-Allow-Credentials '["true"]' you're effectively disabling the Same Origin Policy and allow any website you visit to control your local ipfs daemon. (If found this snippet by running If there's interest I could investigate further and write up something for the docs repo. |
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
the readme says:
this is really, really bad. users should not be advised to do this. if developers are asked to do this, note the dangers.
The text was updated successfully, but these errors were encountered: