New Case Study:See how Anthropic automated 95% of dependency reviews with Socket.Learn More
Socket
Sign inDemoInstall
Socket

bluemix-secure-gateway

Package Overview
Dependencies
Maintainers
5
Versions
23
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

bluemix-secure-gateway - npm Package Compare versions

Comparing version 4.3.2 to 4.3.3

2

package.json
{
"name": "bluemix-secure-gateway",
"version": "4.3.2",
"version": "4.3.3",
"dependencies": {

@@ -5,0 +5,0 @@ "request": ">=2.40.0"

@@ -125,9 +125,38 @@ # bluemix-secure-gateway

* `clientPort` - This will be a cloud destination. This is the port the client will listen on for an incoming connection.
* `protocol` - The protocol of the destination, one of TCP, UDP, TLS, HTTP, or HTTPS. The default is TCP.
* `TLS` - One of serverside, mutualauth, or none. Defaults to none. Is only compatible with the TLS protocol.
* `protocol` - (Required) The protocol of the destination, one of TCP, UDP, TLS, HTTP, or HTTPS.
* `TLS` - (Required) One of serverside, mutualauth, or none. Defaults to none. Is only compatible with the TLS protocol.
* `sni` - Server name for the SNI (Server Name Indication) TLS extensions.
* `enable_client_tls` - Enable TLS for the final outbound connection to the destination. Expected to be a Boolean. Defaults to false.
* `client_tls` - Either mutualauth or none. Is only compatible with enable_client_tls true. Defaults to none.
* `enable_client_tls` - (Required) Enable TLS for the final outbound connection to the destination. Expected to be a Boolean.
* `client_tls` - (Required) Either mutualauth or none. Is only compatible with enable_client_tls true.
* `private` - Whether iptable rules will be enforced on the cloud host:port connection point. Not supported for cloud destinations. Must be a boolean. Defaults to false.
**Deprecation Notice:**
As of version 4.3.0 the fields are now required: `TLS`, `enable_client_tls`, `client_tls`.
Secure endpoint stand foremost as Secure Gateway's mission and we felt that defaulting
to insecure protocols put our API users at risk. The choice is up to you as the user now
to decide which protocol you want to leverage when creating your destination.
That being said the Secure Gateway Team would like to see users securing their
entry points in the cloud with TLS Mutual auth in order to ensure that only the traffic
you expect should enter your Secure Gateway tunnel and then your network.
As an example one can create a Cloud to Onprem destination that secures the Cloud
entry point with Mutual TLS with the following configuration:
```json
{
"desc": "Mutual Auth Secured Entrypoint to Onprem",
"ip": "my.onprem.destination",
"port": 9000,
"protocol": "TLS",
"TLS": "mutualauth",
"enable_client_tls": false,
"client_tls": "none"
}
```
Note, this only secures the cloud entry point, and in order to secure the final
path from the Secure Gateway client to the final destination one would need to
set `enable_client_tls` to `true`, and `client_tls` to `"mutualauth"`.
### Updating a Destination

@@ -134,0 +163,0 @@ ```javascript

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc