Hacker News new | past | comments | ask | show | jobs | submit login

We built something similar at both Uber and Snap. Thanks for sharing this link to an open source equivalent! I wish it had existed a few years ago when I had looked. Oh well!



> "We built something similar at both Uber and Snap. Thanks for sharing this link to an open source equivalent! I wish it had existed a few years ago when I had looked. Oh well!"

Why not just use a firewall? The technology has been around since the 80s?


Not parent but often it is hard to control layer 3 in modern cloud hosting scenarios. Therefore layer 7 approaches such as this one dominate.


Yeah, exactly.

If you're running on AWS (EC2, Lambda, ECS, EKS, etc), for example, you can query `http://169.254.169.254/latest/meta-data/` and it'll return a valid AWS access token. (That's how attaching IAM permissions to an EC2 box works.)

That's being replaced with v2[0] but, at the time when I was building these SSRF proxies, that didn't exist.

Beyond that case, it's also pretty common to have sidecar processes running on the same machine in modern Kubernetes deployments. Having an additional firewall proxy is too expensive for certain high performance environments, so it's commonly assumed that traffic to sidecars is trusted. (Mutual TLS is being used more frequently now, but that's non-trivial to deploy because key management is a PITA)

[0]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/configur...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: