0

Is this a good approach to preventing the leakage of secrets?

Say I had a simple setup where Alice holds the secret to access Bob, and Charlie has basic shell access to Alice (with a different auth method). Charlie echoing "$BOB_SECRET" should fail. But when he http POST https://bob.server before the packet leaves the network card it will have additional http headers attached such that the request succeeds.

If this is a good approach, I suppose I could use mitmproxy, envoy or traefik to implement…

4
  • Welcome to the community. Why did you think that this traffic cannot be inspected? Commented Aug 21, 2024 at 18:02
  • A -> B; B-> C. B adds a secret. A never sees it. Commented Aug 24, 2024 at 19:08
  • And gets no response? Commented Aug 25, 2024 at 11:50
  • C can send a response back to A indirectly going through B first. Commented Aug 25, 2024 at 20:06

0

You must log in to answer this question.

Start asking to get answers

Find the answer to your question by asking.

Ask question

Explore related questions

See similar questions with these tags.