Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Caddy Community container mounts (and uses) nextcloud data volume #46

Open
Bubbelb opened this issue Jul 26, 2024 · 0 comments
Open

Caddy Community container mounts (and uses) nextcloud data volume #46

Bubbelb opened this issue Jul 26, 2024 · 0 comments

Comments

@Bubbelb
Copy link

Bubbelb commented Jul 26, 2024

Steps to reproduce

  1. Install Nextcloud-AIO with Caddy Community container
  2. Inspect mounted volumes
  3. See the Nextcloud-AIO-data volume mounted on the Caddy container

Expected behavior

I wold like to see mounting of the nextcloud datadir would not be needed.

Actual behavior

Mounted

Host OS

Debian (RaspberryPI-OS)

Nextcloud AIO version

9.3.0

Current channel

Latest

Other valuable info

Since a reverse proxy, like Caddy in this case, is somewhat the first line of defence to external threats, seen from an application perspective, it strikes me as odd/unwelcome to have the complete Nextcloud Data dir mounted in that container.

I know the Nextcloud Datadir is actively used by Caddy to read some configuration settings, but cant that be solved in an other way?

Of course it's debatable how much a security risk this is, or even if it's a security risk at all, but it's not unthinkable that this can fairly easily result in exposure of the complete Nextcloud Datadir.
For example: One can have a custom Caddy config in /data/caddy-imports that (inadvertently) exposes the Nextcloud Datadir to the internet.

Maybe a way out of this would be a separate volume, that can be used for config files, like the geoblocking part. This volume can then be mounted as an external mount in Nextcloud and used as a stand-alone volume in Caddy, or at any other place needed.

I hope this helps making AIO even more secure.

Thank you, Bas Bleeker

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant