jehan, A safer option would be to use a dev cas instance that is only accessible to subnets and VPN pools used only by the developers. As long as it's mostly stable (99% uptime), devs would be rarely inconvenienced. This assumes that you have a full dev infrastructure (LDAP, databases, etc). Another option: name the laptop such that locally running applications have a url that is similar to your institution url, and also set up a self signed certificate for that url (root, intermediate, and one terminal cert for every subdomain). If your institution issues the certs instead (doing something like https://letsencrypt.org/ for non publicly accessible machines), then this approach could be pushed to all devs. I can see a publicly available localhost service being a target for ne'er-do-wells. You can tighten up your service Id regex by escaping operator characters to eliminate look-alike urls: https://.*\.our-domain\.fr/.*
Note I added a '.' before the '*' assuming that your regex was hastily created and not indicative of the one being used. Ray ________________________________ From: cas-user@apereo.org <cas-user@apereo.org> on behalf of jehan procaccia <jehanpr...@gmail.com> Sent: 12 July 2024 01:49 To: CAS Community <cas-user@apereo.org> Subject: [cas-user] Security concern allowing 127.0.0.1 (localhost) as allowed serviceID Hello developers ask us to allow serviceID of type https://localhost/* or https://127.0.0.1/* in order to allow them to develop on their local machine ans test locally . As system and network administrators we are afraid that this opening of localhost serviceID might allow the entire world ( all Internet connected device and hence hackers !) to access our CAS server, allowing them for example to brute force the web login interface or whatever other mischief possible . Is this a real security breach to allow serviceID like https://localhost/* , or we are anyway already exposed by our production services which allows https://*.our-domain.fr/* serviceID which could be also used by hackers if the spoof our urls ? thanks for your security advice regarding this question . -- - Website: https://apereo.github.io/cas - Gitter Chatroom: https://gitter.im/apereo/cas - List Guidelines: https://goo.gl/1VRrw7 - Contributions: https://goo.gl/mh7qDG --- You received this message because you are subscribed to the Google Groups "CAS Community" group. To unsubscribe from this group and stop receiving emails from it, send an email to cas-user+unsubscr...@apereo.org<mailto:cas-user+unsubscr...@apereo.org>. To view this discussion on the web visit https://groups.google.com/a/apereo.org/d/msgid/cas-user/f278051d-a428-4232-8ccc-ac0bf042ff81n%40apereo.org<https://groups.google.com/a/apereo.org/d/msgid/cas-user/f278051d-a428-4232-8ccc-ac0bf042ff81n%40apereo.org?utm_medium=email&utm_source=footer>. -- - Website: https://apereo.github.io/cas - List Guidelines: https://goo.gl/1VRrw7 - Contributions: https://goo.gl/mh7qDG --- You received this message because you are subscribed to the Google Groups "CAS Community" group. To unsubscribe from this group and stop receiving emails from it, send an email to cas-user+unsubscr...@apereo.org. To view this discussion on the web visit https://groups.google.com/a/apereo.org/d/msgid/cas-user/YT3PR01MB9946C3ADBD3B570E52E60F15CEA62%40YT3PR01MB9946.CANPRD01.PROD.OUTLOOK.COM.