-
Notifications
You must be signed in to change notification settings - Fork 67
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Code contains malvare #1
Comments
Same for me, maybe it because the container has no authorization even if you add user according to instruction. |
Sounds worrisome. Could you provide steps to reproduce? I'm not intimate with Dante internals (and even not that much as a user of Dante). If you submit a PR fixing something I'd be glad to assist. |
@wernight , i'm not old friend of Dante too. Sorry, i didn't catch logs and already removed this code installation |
I think that this is due to the configuration of the dante itself. |
Do you, guys, use authentication with it? Because socks5 without auth is very dangerous. |
Same for me. Digitalocean sends me an abuse mail from 3rd party company which email-DoS by my droplet. |
My hosting provider informed me that spam email is being sent from my host. Only this container was launched on the host. |
Dante wrongly configured gives something like access to the our LAN and malicious users may send request pretending to be coming from your machine. I do agree that the container should be made safe by default if possible. I don't even recall where I got the default https://github.com/wernight/docker-dante/blob/master/sockd.conf, must have been from the default install. This is likely where the cause is, and eventhough it's meant to be customized, it's clearly unsafe by default based on these reports here. I'm willing to accept PR or delegate the project to another. |
there is no malware in this dockerfile... starting a server on the public internet listening on the common socks proxy port of 1080 = host found and used by people looking for open socks proxies... ie don't start public accessible socks proxies on default ports... this container is perfect for a docker-compose setup or wanting to have a socks proxy somewhere without the overhead of ssh and the whole however it is a socks proxy that allows devices to connect to it and use it to access other hosts - proceed accordingly... aka "warning, boiled hot water is hot and may cause severe burns" sticker on kettle/hot water boiler |
Installed this one on two different servers. Used only by myself. At both cases container made DoS attack and spawed on emails
The text was updated successfully, but these errors were encountered: