-
Notifications
You must be signed in to change notification settings - Fork 207
Protect the Zebra RPC endpoint #8864
Copy link
Copy link
Labels
A-compatibilityArea: Compatibility with other nodes or wallets, or standard rulesArea: Compatibility with other nodes or wallets, or standard rulesA-rpcArea: Remote Procedure Call interfacesArea: Remote Procedure Call interfacesC-securityCategory: Security issuesCategory: Security issues
Metadata
Metadata
Assignees
Labels
A-compatibilityArea: Compatibility with other nodes or wallets, or standard rulesArea: Compatibility with other nodes or wallets, or standard rulesA-rpcArea: Remote Procedure Call interfacesArea: Remote Procedure Call interfacesC-securityCategory: Security issuesCategory: Security issues
The Zebra RPC endpoint is currently unencrypted and accessible by anyone who knows the address and port. While the current recommendation is to restrict access to localhost or a trusted local network, there are cases where the endpoint needs to be open to the internet in production environments.
Implement one of the following authentication methods:
We could implement just one of these methods or explore alternative solutions.
Authentication should be enabled by default but turning it off should be an option for testing purposes and setups where the endpoint is restricted to localhost or a private network.
Encryption of RPC traffic (for example using TLS) is not part of this ticket but might be considered in the future.