Berhan Soylu(Silver Partner)
08/06/2024, 8:35 AMMatt Wise
08/06/2024, 8:43 AMMike Chambers
08/06/2024, 8:43 AMapp.UseUmbraco()
.WithMiddleware(u =>
{
if(notGranted){
u.UseBackOffice();
}
u.UseWebsite();
})
.WithEndpoints(u =>
{
u.UseInstallerEndpoints();
if (notGranted){ u.UseBackOfficeEndpoints();
}
u.UseWebsiteEndpoints();
});
Mike Chambers
08/06/2024, 8:44 AMBerhan Soylu(Silver Partner)
08/06/2024, 8:57 AMBerhan Soylu(Silver Partner)
08/06/2024, 9:03 AMMike Chambers
08/06/2024, 9:27 AM[Route("api/tours/getTourInfo/{uid}")]
Mike Chambers
08/06/2024, 9:30 AMapp shouldn't be responsible
but also say that your firewall can't handle it
? which would be the lower level??Mike Chambers
08/06/2024, 9:31 AMMike Chambers
08/06/2024, 9:33 AMu.UseBackOffice();
being excluded.
Which excluding the backoffice rather than protecting it would have to be at the app but would be removing the attack vector all together?Jason
08/07/2024, 10:51 AM/umbraco
was a nice solution.
In terms of the best place to filter traffic, my order of preference is:
1. Rules in a WAF. Ideally you don't want this traffic touching your web server at all, and the WAF should have brute-force protection (DoS protection is relevant too, since logins touch the DB).
2. Rewrite rules in IIS (or reverse proxy of choice). You can also use rate limiting here to help mitigate brute forcing & DoS. Event if it touches the server, it will stop requests from gobbling up your .NET app's resources and will perform much better overall.
3. Last resort - ASP.NET Core Middleware, that executes as early in the chain as possible and resolves as quickly as possible, using as few resources as possible.Mike Chambers
08/07/2024, 10:55 AMJason
08/07/2024, 10:59 AMMike Chambers
08/07/2024, 10:59 AMMike Chambers
08/07/2024, 11:00 AMJason
08/07/2024, 11:06 AMMike Chambers
08/07/2024, 11:08 AMJason
08/07/2024, 11:17 AMSiempreSteve
08/07/2024, 11:37 AMSiempreSteve
08/07/2024, 11:40 AMSiempreSteve
08/07/2024, 11:42 AMMike Chambers
08/07/2024, 12:00 PM/umbraco/
as they have already addressed security concerns (even removing the ability to change it)? So assumed we are talking a high risk site where more is wanted.. Though as ever really interesting to see a diverse conversation around topics.. never better than when it raises the question for me as to why I just do things in a certain way without really considering alternatives.. 👍Jason
08/07/2024, 12:32 PMSiempreSteve
08/07/2024, 12:39 PMSiempreSteve
08/07/2024, 12:39 PMSiempreSteve
08/07/2024, 12:40 PMJason
08/07/2024, 12:49 PMMatt Wise
08/07/2024, 1:07 PMJason
08/07/2024, 1:08 PMCodeBunTes
08/07/2024, 1:41 PMbielu
08/07/2024, 3:34 PMSiempreSteve
08/07/2024, 4:15 PMSiempreSteve
08/07/2024, 4:16 PMbielu
08/07/2024, 4:18 PMbielu
08/07/2024, 4:19 PMMike Chambers
08/08/2024, 9:03 AM/umbraco/
as a fixed admin entry point is the sticking point? (should HQ core also.... add CSP and cover for all the [securityheaders.io](https://securityheaders.com/) flagged issues?) Does even the whitelabel approach require /umbraco/
?Jason
08/08/2024, 10:04 AMA hub and casual space for you to interact with fellow community members and learn more about Umbraco!
Powered by