Added VERIFY_HOSTNAME to readme
This commit is contained in:
parent
af914616ab
commit
e23585ca1f
1 changed files with 2 additions and 0 deletions
|
@ -67,6 +67,8 @@ Verify, that the user that is running the configurator is allowed to push withou
|
|||
If set to `true`, directories will be displayed at the top.
|
||||
#### SESAME (string)
|
||||
If set to _somesecretkeynobodycanguess_, you can browse to `https://your.configurator:3218/somesecretkeynobodycanguess` from any IP, and it will be removed from the `BANNED_IPS` list (in case it has been banned before) and added to the `ALLOWED_NETWORKS` list. Once the request has been processed you will automatically be redirected to the configurator. Think of this as dynamically allowing access from untrusted IPs by providing a secret key (_open sesame!_). Keep in mind, that once the IP has been added, you will either have to restart the configurator or manually remove the IP through the _Network status_ to revoke access.
|
||||
#### VERIFY_HOSTNAME (string)
|
||||
HTTP requests include the hostname to which the request has been made. To improve security you can set this parameter to `yourdomain.example.com`. This will check if the hostname within the request matches the one you are expecting. If it does not match, a `403 Forbidden` response will be sent. As a result attackers that scan your IP address won't be able to connect unless the know the correct hostname. Be careful with this option though, because it prohibits you from accessing the configurator directly via IP.
|
||||
|
||||
__Note regarding `ALLOWED_NETWORKS`, `BANNED_IPS` and `BANLIMIT`__:
|
||||
The way this is implemented works in the following order:
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue