Bläddra i källkod

move non-vpn block up, only local requests are allowed by non-vpn clients

tags/v0.14.2
Jonathan Cobb 4 år sedan
förälder
incheckning
86c0334178
1 ändrade filer med 4 tillägg och 4 borttagningar
  1. +4
    -4
      bubble-server/src/main/resources/packer/roles/mitmproxy/files/bubble_conn_check.py

+ 4
- 4
bubble-server/src/main/resources/packer/roles/mitmproxy/files/bubble_conn_check.py Visa fil

@@ -210,15 +210,15 @@ def next_layer(next_layer):
bubble_log('next_layer: enabling passthru for LOCAL server='+server_addr+' regardless of security_level='+security_level+' for client='+client_addr)
check = FORCE_PASSTHRU

elif is_sage_request(server_addr, fqdns):
bubble_log('next_layer: enabling passthru for SAGE server='+server_addr+' regardless of security_level='+security_level+' for client='+client_addr)
check = FORCE_PASSTHRU

elif is_not_from_vpn(client_addr):
bubble_log('next_layer: enabling block for non-VPN client='+client_addr+', fqdns='+str(fqdns))
bubble_activity_log(client_addr, server_addr, 'conn_block_non_vpn', fqdns)
next_layer.__class__ = TlsBlock

elif is_sage_request(server_addr, fqdns):
bubble_log('next_layer: enabling passthru for SAGE server='+server_addr+' regardless of security_level='+security_level+' for client='+client_addr)
check = FORCE_PASSTHRU

elif security_level == SEC_OFF or security_level == SEC_BASIC:
bubble_log('next_layer: enabling passthru for server='+server_addr+' because security_level='+security_level+' for client='+client_addr)
check = FORCE_PASSTHRU


Laddar…
Avbryt
Spara