-
-
Notifications
You must be signed in to change notification settings - Fork 610
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Any plans for auto update ? #1350
Comments
I am definitely in favour of introducing this feature! |
If you're worried about more pre-auth RCE vulnerabilities in the future, just block ports 7080+8090 (assuming you're using the default ones) for all except a specific fixed IP. After 2 of my clients' VPS got infected with that pesky cryptominer (kinsing, kdevtmpfsi, lib_system.so), I decided I wasn't gonna take any chances with these fofa.info-loving script kiddies anymore. I set up a cron for pinging a specific subdomain that points to my dynamic/public IP, so now I only have to worry about occasional WordPress vulnerabilities. Best of luck! 🫡 |
Can help but, If you have users without a static ip, which need access to this panel, this is not a good solution to simply block the ports. And not every user is able and willing to configure a dyndns to have a static ip or adress. |
What about a subdomain with a proxy forwarding the request to 127.0.0.1:8090/7080 then blocking the ports and add cloudflare ?
|
all my clients who had default 8090 panel access got infected , but random port didn't . |
A possible solution could be a vpn or an ssh tunnel.
Then you can restrict the access of 8090 and 7080 to localhost.
This is also an option, since the most scripts only scan the default ports. |
No description provided.
The text was updated successfully, but these errors were encountered: