-
Notifications
You must be signed in to change notification settings - Fork 309
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add option to forbid following HTTP redirects to private/reserved/special use networks #305
Comments
I'll answer my own question, I'm sure a PR would be accepted if it was an opt-in feature and implemented sanely But... I clearly haven't had time to do this. Maybe someone else will pick it up, otherwise I'll close it out in a few months |
@phillip-stephens any interest in taking this one on? I intended to do it but haven't had time, and I see you've been productive lately 😊 (If not, no worries) |
Should we actually provide the functionality to specify a file, ala the zmap blocklist, as that is the 'default' of how zmap handles that |
Would certainly be more extensible that way I imagine in practice, most people using it would end up specifying roughly the IANA networks I mentioned anyway, but at least with your idea they would have the option to add any that may have been forgotten, rather than be stuck with a hard-coded list I think that's a long way of saying that I agree with your idea 😊 |
Hey @mzpqnxow! Just now getting over to looking at ZGrab2 issues and yep I'll take this one on. |
The option
--follow-localhost-redirects
is for those that might want to explicitly permit HTTP redirects to localhost (I can't imagine many people use that, seems like a giant security hole) but there is no option to permit or disallow redirects to private networks or other special use networks. I believe they're permitted by default, which while theoretically a bit risky, makes sense for a default behaviorI think that behavior should remain the same, but it would be nice to have a feature to disallow redirects to, e.g. 10/8, 172.16/12 192.168/16 and the dozen or so other IANA reserved or special blocks Something like
--disallow-nonroutable-redirect
or--disallow-private-redirect
?Would you accept a PR for this?
The text was updated successfully, but these errors were encountered: