CCAI : Cloudron Custom App Installer
-
Authentication would be good. Probably not a good idea to normalise the act of entering admin creds onto another cloudron instance, it's an invitation for bad actors
-
Authentication would be good. Probably not a good idea to normalise the act of entering admin creds onto another cloudron instance, it's an invitation for bad actors
@nostrdev totally agree
The issue is I'm unsure about the approach strategically in terms of keeping the "hosted as a service" URL open and easy to make use of.
I can easily add http basic auth or use Cloudron proxyauth but communicating those creds has a raft of issues.
I can add proper user registration, but it kinda goes against the original principles of it being an anonymous utility. I don't really want to be maintaining user records or responsible for them, and it's a pain for users to create yet another username and password for this (because obviously they should not be using Cloudron login details).
Maybe I can add some kind of automated short duration one time code delivered by SMS or email. Doesn't help much but maybe one blocker to scripts without a person behind it.
Ideally auth would be handled best by the app being within the AppStore, but that's not in my hands.
Any clever ideas gratefully received.
Otherwise I might have to bite the bullet and implement a user registration system. -
I have thought deeply about adding auth or anti-bot measures.
My current conclusion is that anything I add (captcha, Cloudflare Turnstile, user registration in-app or via Keycloak) is going to :
- reduce the utility of this as a hosted app for easy use by those who don't want to install it themselves
- impact anyone who chooses to deploy the app to their own Cloudron with extra dependencies.
So at this point "the juice is not worth the squeeze".
I have however :- added some rate-limiting for catalogue entry deletions
- added static text to recommend using a dedicated cloudron user for use with this app
I will think about creating a locked-down version with auth for those who want to deploy it to their own Cloudron, while leaving the hosted version w/o auth (basically my risk on the catalogue, because the actual app installation process is secure already).
Hopefully once Cloudron 9 is out and settled down, the version with proper auth can make it suitable for App Store inclusion, and I will retire the open hosted-as-a- service version.
I will review this later, but leaving it here for now pending further ideas.
-
Serving this online seems incredibly risky and inviting users to enter their credentials on a random website seems setting a very wrong example.
If you don't want to deal with antibot measures etc, you could package it as a tauri app for example. But now you are a packaged app developer and distributor.
-
Serving this online seems incredibly risky and inviting users to enter their credentials on a random website seems setting a very wrong example.
If you don't want to deal with antibot measures etc, you could package it as a tauri app for example. But now you are a packaged app developer and distributor.
@ruihildt it’s not about not wanting to. It’s about how far to go and I’ve opened up that discussion.
I have already put some antibot measures in some places. Adding some additional rate-limiting this evening.
I am very open to discussing how much further to go.
If you have any specific suggestions, I will gladly implement them (working on a 1-time authorisation. But frankly 2FA handles that much better anyway).I agree it’s not ideal, but I don’t feel it’s that risky.
It uses exactly the same security that Cloudron uses.
So if it is insecure, then by definition Cloudron is insecure.
As always, all Cloudron users should :- have secure long passwords
- use 2FA
- ideally follow the recommendation to create a dedicated special purpose user and change its password after each use.
No login creds are stored - code is open for inspection to confirm that.
My clear preference is for this app to be in the AppStore so I can take down my site.
If the Cloudron community prefer this to be taken down or locked down further, I will happily do so.The app and the site are just a response to the 100’s of requests for an easier way to add apps.
-
New version : v4.3.2 (git.cloudron.io updated)
Added optional Cloudflare Turnstile support.
Default : not enabled
Edit /app/data/.env to enable and add your config keysThe 'hosted-as-a-service` ccai.appx.uk is now running with Turnstile for anti-bot protection.
If you install this to your own Cloudron, you can choose to run without Turnstile or to enable it.Why Cloudflare Turnstile ?
- easiest / best non-google captcha type anti-bot
- free account with generous free-tier usage
- minimal code dependencies to simplify app building
Beyond this, it would need a user registration or failed login rate limiter.
-
New version : v4.3.2 (git.cloudron.io updated)
Added optional Cloudflare Turnstile support.
Default : not enabled
Edit /app/data/.env to enable and add your config keysThe 'hosted-as-a-service` ccai.appx.uk is now running with Turnstile for anti-bot protection.
If you install this to your own Cloudron, you can choose to run without Turnstile or to enable it.Why Cloudflare Turnstile ?
- easiest / best non-google captcha type anti-bot
- free account with generous free-tier usage
- minimal code dependencies to simplify app building
Beyond this, it would need a user registration or failed login rate limiter.
@timconsidine said in CCAI : Cloudron Custom App Installer:
Cloudflare Turnstile
We had a thread here about CAPTCHA alternatives quite a while ago. One issue with Cloudflare is that it is unfortunately rapidly becoming a single choke-point for the whole internet. I ran a quick AI search for Free Software alternatives to proprietary Turnstile. This is what was suggested:
Several open source alternatives to Cloudflare Turnstile exist, focusing on privacy-friendly bot protection, spam prevention, and user verification without relying on proprietary services. These often use proof-of-work (PoW) mechanisms to verify legitimacy invisibly or with minimal user friction, similar to Turnstile's approach. They are typically self-hostable, allowing full control and avoiding central choke points. Below is a list of notable options, including key features and implementation details.
ALTCHA
Description: A privacy-first CAPTCHA alternative that uses PoW to protect websites, APIs, and forms from spam and bots without tracking users. It's designed for seamless integration and escalates to code challenges only for high-risk cases.
Key Features: Frictionless verification, WCAG 2.2 AA accessibility compliance, support for 50+ languages, no cookies or fingerprinting, and optional Sentinel for advanced threat detection (e.g., rate limiting, ML-based analysis).
How it Works: The widget runs a PoW challenge in the background; if solved, it generates a token for server validation. Self-hostable via Docker, AWS, Azure, or Kubernetes.
Licensing and Cost: MIT license for the core (fully open source and free); Sentinel is commercial for enterprise needs.
Advantages over Turnstile: Smaller bundle size (30 kB vs. 85+ kB), faster load times (0 ms when bundled), and stricter privacy compliance (GDPR, HIPAA, etc.) with no data leakage.mCaptcha
Description: A no-nonsense, PoW-based CAPTCHA system emphasizing user experience and privacy, acting as a drop-in replacement for traditional CAPTCHAs like reCAPTCHA.
Key Features: Seamless UX without image puzzles, robust against NAT users (no IP reliance), API-compatible with reCAPTCHA/hCaptcha, and focused on making bot attacks computationally expensive.
How it Works: Clients solve adjustable PoW challenges; the backend verifies them. It's fully automated and doesn't contribute to third-party ML training.
Licensing and Cost: AGPL for the core, with client libraries under permissive free software licenses; entirely free and open source.
Advantages over Turnstile: Fully self-hosted with no external dependencies, stronger emphasis on not profiling users, and libre software ethos.Cap
Description: A lightweight, modern PoW CAPTCHA using SHA-256 hashes, designed for speed and simplicity as a direct alternative to Turnstile.
Key Features: Invisible and floating modes, standalone REST API for any language/framework, customizable difficulty, and WASM solvers for web/Node.js.
How it Works: The widget generates and solves challenges via Web Workers; the server validates them. Supports checkpoints for progressive verification.
Licensing and Cost: Apache 2.0 license; fully open source and free.
Advantages over Turnstile: Tiny size (12 kB widget), no tracking/fingerprinting, lower error rates, and higher customizability (full backend/frontend tweaks).Anubis
Description: A Web AI Firewall utility that weighs connections with PoW challenges to block scrapers, bots, and DDoS attacks before they reach your site.
Key Features: Heuristic-based bot detection, customizable rules/policies, non-JS challenge support, and integration as a reverse proxy.
How it Works: Responds to requests with a JS (or non-JS) PoW program; only solved challenges grant access. Tunable difficulty makes scraping unprofitable.
Licensing and Cost: Open source (repository on GitHub); free to use and self-host.
Advantages over Turnstile: Explicitly targets AI scrapers and bots, supports broader heuristics beyond PoW, and has been used to mitigate real DDoS incidents.mosparo
Description: A rule-based spam protection tool for online forms, functioning like an email spam filter rather than a traditional CAPTCHA.
Key Features: Checks form data against custom rules, honeypot fields for bot detection, accessibility compliance, and multi-language support.
How it Works: Integrates into forms to validate submissions server-side based on patterns/rules; blocks spam without user-visible challenges.
Licensing and Cost: Open source under a permissive license; free and self-hostable via Docker.
Advantages over Turnstile: Less intrusive (no challenges for legitimate users), focuses on content analysis over behavior, and fully accessible for screen readers/keyboards.Procaptcha
Description: A privacy-focused verification tool redefining CAPTCHA with unique security approaches, often listed as an open source option for bot protection.
Key Features: Emphasizes privacy and security without conventional puzzles; details are limited but include freemium elements for scaling.
How it Works: Uses alternative verification methods (potentially PoW or similar); self-hostable with open components.
Licensing and Cost: Open source with freemium model (free tier available).
Advantages over Turnstile: Open source core allows modifications, though less detailed comparisons are available. -
I’m not a fan of Cloudflare - just put it in as fastest way to address a possible vulnerability.
But proof of work is often a pain for users.
I feel there are only 2 good solutions :
Cloudron re-write as an official utility (resolves authentication much more neatly)
CCAI adds user registration
I’m thinking what direction to take it in if not adopted/rewritten