Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bind OPA server to localhost interface by default #6286

Closed
ashutosh-narkar opened this issue Oct 9, 2023 · 0 comments
Closed

Bind OPA server to localhost interface by default #6286

ashutosh-narkar opened this issue Oct 9, 2023 · 0 comments

Comments

@ashutosh-narkar
Copy link
Member

By default, OPA binds to the 0.0.0.0 interface, which allows the OPA server to be exposed to services running outside of the same machine. Though not inherently insecure in a trusted environment, it's good practice to bind OPA to the localhost interface by default if OPA is not intended to be exposed to remote services.

ashutosh-narkar added a commit to ashutosh-narkar/opa that referenced this issue Oct 11, 2023
Currently OPA binds to the 0.0.0.0 interface by default, which allows
the OPA server to be exposed to services running outside of the same machine.
Though not inherently insecure in a trusted environment, it's good practice
to bind OPA to the localhost interface by default if OPA is not intended
to be exposed to remote services.

Fixes: open-policy-agent#6286

Signed-off-by: Ashutosh Narkar <[email protected]>
ashutosh-narkar added a commit to ashutosh-narkar/opa that referenced this issue Oct 12, 2023
Currently OPA binds to the 0.0.0.0 interface by default, which allows
the OPA server to be exposed to services running outside of the same machine.
Though not inherently insecure in a trusted environment, it's good practice
to bind OPA to the localhost interface by default if OPA is not intended
to be exposed to remote services.

Fixes: open-policy-agent#6286

Signed-off-by: Ashutosh Narkar <[email protected]>
ashutosh-narkar added a commit that referenced this issue Oct 12, 2023
Currently OPA binds to the 0.0.0.0 interface by default, which allows
the OPA server to be exposed to services running outside of the same machine.
Though not inherently insecure in a trusted environment, it's good practice
to bind OPA to the localhost interface by default if OPA is not intended
to be exposed to remote services.

Fixes: #6286

Signed-off-by: Ashutosh Narkar <[email protected]>
ashutosh-narkar added a commit to ashutosh-narkar/opa that referenced this issue Oct 17, 2023
Currently OPA binds to the 0.0.0.0 interface by default, which allows
the OPA server to be exposed to services running outside of the same machine.
Though not inherently insecure in a trusted environment, it's good practice
to bind OPA to the localhost interface by default if OPA is not intended
to be exposed to remote services.

This change also adds a new feature flag to `opa run` to allow users to enable
future OPA v1.0 compatible behavior.

Fixes: open-policy-agent#6286

Signed-off-by: Ashutosh Narkar <[email protected]>
ashutosh-narkar added a commit to ashutosh-narkar/opa that referenced this issue Oct 17, 2023
Currently OPA binds to the 0.0.0.0 interface by default, which allows
the OPA server to be exposed to services running outside of the same machine.
Though not inherently insecure in a trusted environment, it's good practice
to bind OPA to the localhost interface by default if OPA is not intended
to be exposed to remote services.

This change also adds a new feature flag to `opa run` to allow users to enable
future OPA v1.0 compatible behavior.

Fixes: open-policy-agent#6286

Signed-off-by: Ashutosh Narkar <[email protected]>
ashutosh-narkar added a commit to ashutosh-narkar/opa that referenced this issue Oct 17, 2023
Currently OPA binds to the 0.0.0.0 interface by default, which allows
the OPA server to be exposed to services running outside of the same machine.
Though not inherently insecure in a trusted environment, it's good practice
to bind OPA to the localhost interface by default if OPA is not intended
to be exposed to remote services.

This change also adds a new feature flag to `opa run` to allow users to enable
future OPA v1.0 compatible behavior.

Fixes: open-policy-agent#6286

Signed-off-by: Ashutosh Narkar <[email protected]>
ashutosh-narkar added a commit to ashutosh-narkar/opa that referenced this issue Oct 17, 2023
Currently OPA binds to the 0.0.0.0 interface by default, which allows
the OPA server to be exposed to services running outside of the same machine.
Though not inherently insecure in a trusted environment, it's good practice
to bind OPA to the localhost interface by default if OPA is not intended
to be exposed to remote services.

This change also adds a new feature flag to `opa run` to allow users to enable
future OPA compatible behavior.

Fixes: open-policy-agent#6286

Signed-off-by: Ashutosh Narkar <[email protected]>
ashutosh-narkar added a commit to ashutosh-narkar/opa that referenced this issue Oct 18, 2023
Currently OPA binds to the 0.0.0.0 interface by default, which allows
the OPA server to be exposed to services running outside of the same machine.
Though not inherently insecure in a trusted environment, it's good practice
to bind OPA to the localhost interface by default if OPA is not intended
to be exposed to remote services.

This change also adds a new feature flag to `opa run` to allow users to enable
future OPA compatible behavior.

Fixes: open-policy-agent#6286

Signed-off-by: Ashutosh Narkar <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Development

No branches or pull requests

1 participant