Open robertlogos opened 1 year ago
@robertlogos : The current version of globaleaks always implement HTTPS.
Please ensure that your proxy is connecting to port 443 or 8443 of the server running globaleaks
Thanks for your feedback Giovanni, I understand it as a design principle (It's a pity because it prevents the use of GL in certain use case scenarios) but since there are still references to https_enabled as decision criterion in the code, it would be very usefull to have them removed for a full HTTPS-only understanding.
Thank you @robertlogos
Which are the scenarios that you consider are no longer possible?
Regarding the refereces to https_enabled you are right there are some parts to be updated. Will proceed right away. Thank you for pointing this out
The original scenario which caused the problem: GL running behind a gateway which handles certs and cyphered traffic (SSL termination) with the traffic between gateway and GL in plain HTTP.
User ------ [HTPS] ----- Gateway ----- [HTTP] ----- GlobaLeaks
This worked before the version upgrade thanks to the https_enabled flag logic. It would be very usefull to have HTTP as an option, even for testing and development purposes.
@robertlogos : Are you still encountering issued?
do you think this ticket could be closed or would you like to advice some software improvements on this matter?
What version of GlobaLeaks are you using?
4.13.15
What browser(s) are you seeing the problem on?
All
What operating system(s) are you seeing the problem on?
Linux
Describe the issue
After upgrading from 4.11.5 to 4.13.15 a GL installation that runs behind a gateway (the gw handles certs and SSL traffic termination; traffic from gw to GL is only HTTP) gets into infinite https redirection loop which causes browser error.
Found the root cause in backend/globaleaks/rest/api.py where the https_enabled flag is no longer checked for the should_redirect_https() function. Patching it avoids the loop problem but still can't log into the admin area.
4.13.15
4.11.5
Proposed solution
Allow HTTP only installations attending the https_enabled flag for testing purposes or architectures where certs and SSL traffic is handled by other components of the architecture.