-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Validate client redirects in SSO client logins #41833
Conversation
These type of breaking changes should always have a backup configuration, which can be override if needed by the final client! |
Hi @fghamsary, There is a backup configuration. It is called allowed_https_hostnames and it is illustrated in the description in this PR. |
To elaborate further: we considered adding an allowlist for non-https redirect URLs as well, but deliberately decided against it (requiring a valid webpki certificate at least adds some protection against DNS poisoning). This change is the remediation for a security vulnerability classified as HIGH (see https://github.com/gravitational/teleport/releases/tag/v15.3.6 ). |
I understand that you did it for a reason, but I'm telling you that as an end user we may need the http and without DNS as it might be local IP. |
Please refer to this as well. |
In my opinion at least all local (private) IPs should be valid without any other configuration just like 127.0.0.1. |
I'm facing the same issue , I using Virtual Box to login teleport with a shell , I need redirect the port to a virtual IP to open SSO link from host machine, but it doesn't work now. Parameter --bind-addr is not work, it will return an error : So how to correctly to use parameter "--bind-addr" now? |
Documentation is missing for this: #43373 |
This PR makes it so that client redirect URLs for SSO login sessions that are not web sessions (i.e., they're from
tsh login
) are now required to behttp://127.0.0.1:*/callback
(with ipv6 and "localhost" variants) with no query parameters other than thesecret_key
required for the response, orhttps://<hostname>/callback
with the same single query parameter, and a hostname that matches one of the hostnames configured in the auth connector.Configuration UX:
Related enterprise PR: gravitational/teleport.e#3727.