Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

There's a couple things that I think are worth digging into with this post and the grandparent:

- If a LB is a place where all traffic is going through, it does become a higher value target. Saying that they are not hacked feels very anecdotal. - It is possible to have a LB which forwards TLS connections and does not need to MitM other connections. There are tradeoffs in it, but this is entirely possible. I had a writeup of my own on it over here: https://er4hn.info/blog/2023.02.18-tls-load-balancer/

hlandau, would love to read your article on comparing different auth schemes when you have that written up.



I'll email you when I publish it. Until then you may enjoy: https://www.devever.net/~hl/auth




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: