mirror of
https://github.com/langgenius/dify.git
synced 2026-04-08 09:16:41 +08:00
- Block all private/internal networks by default to prevent SSRF attacks - Restrict allowed ports to only HTTP (80) and HTTPS (443) - Remove default domain allowlists (e.g., marketplace.dify.ai) - Implement deny-all-by-default policy with explicit whitelisting - Add example configuration files for common customization scenarios - Provide comprehensive documentation for security configuration Fixes #24392
17 lines
697 B
Plaintext
17 lines
697 B
Plaintext
# Example: Allow additional ports for specific protocols
|
|
# Copy this file to /etc/squid/conf.d/40-allow-additional-ports.conf to enable
|
|
# WARNING: Opening additional ports can increase security risks
|
|
|
|
# Allow additional safe ports
|
|
# acl Safe_ports port 8080 # http-alt
|
|
# acl Safe_ports port 8443 # https-alt
|
|
# acl Safe_ports port 3000 # common development port
|
|
# acl Safe_ports port 5000 # common API port
|
|
|
|
# Allow additional SSL ports for CONNECT method
|
|
# acl SSL_ports port 8443 # https-alt
|
|
# acl SSL_ports port 3443 # custom ssl
|
|
|
|
# Allow high ports (1025-65535) - DANGEROUS! Can be used to bypass restrictions
|
|
# acl Safe_ports port 1025-65535
|
|
# acl SSL_ports port 1025-65535 |