Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Bookmarks
  • Search
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

Cloudron Forum

Apps | Demo | Docs | Install
  1. Cloudron Forum
  2. Feature Requests
  3. Turn off IP logging

Turn off IP logging

Scheduled Pinned Locked Moved Feature Requests
logs
16 Posts 8 Posters 926 Views 8 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • nichu42N Offline
    nichu42N Offline
    nichu42
    wrote on last edited by girish
    #1

    Hi there,

    This may have been asked before, but I couldn't find it via search:
    I have found the setting for my main (public) application Mastodon, but Cloudron / nginx / whatever also keeps IP addresses in logs, correct?
    Is it possible to turn off logging of IP-addresses Cloudron-wide?

    Matrix: @nichu42:blueplanet.social

    1 Reply Last reply
    1
    • girishG girish moved this topic from Support on
    • girishG Offline
      girishG Offline
      girish
      Staff
      wrote on last edited by
      #2

      Currently, there is no option for this since it's hardcoded to log IP addresses. Can you tell us why one would want to turn this off though?

      nichu42N T 2 Replies Last reply
      1
      • girishG girish

        Currently, there is no option for this since it's hardcoded to log IP addresses. Can you tell us why one would want to turn this off though?

        nichu42N Offline
        nichu42N Offline
        nichu42
        wrote on last edited by
        #3

        @girish I'm trying to follow recommendations from the German Foundation for Data Protection (Stiftung Datenschutz) regarding GDPR-conformity.
        See https://stiftungdatenschutz.org/praxisthemen/datenschutz-bei-mastodon/datenschutzfreundliche-konfiguration (German)

        Matrix: @nichu42:blueplanet.social

        1 Reply Last reply
        1
        • girishG Offline
          girishG Offline
          girish
          Staff
          wrote on last edited by
          #4

          @nichu42 Ah ok. So, from the page, "Therefore, it makes sense to either completely deactivate this logging and only activate it if necessary (error analysis) or to delete the log files as soon as possible" . FWIW, the logs are removed in 14 days - https://docs.cloudron.io/system/#logs . If that fits your definition of "as soon as possible" 🙂

          nichu42N 1 Reply Last reply
          2
          • girishG girish

            @nichu42 Ah ok. So, from the page, "Therefore, it makes sense to either completely deactivate this logging and only activate it if necessary (error analysis) or to delete the log files as soon as possible" . FWIW, the logs are removed in 14 days - https://docs.cloudron.io/system/#logs . If that fits your definition of "as soon as possible" 🙂

            nichu42N Offline
            nichu42N Offline
            nichu42
            wrote on last edited by
            #5

            @girish Okay, thanks for the clarification. I guess 14 days is something I can work with. Though I'd still prefer not to log IP addresses at all (or at least truncated).

            Matrix: @nichu42:blueplanet.social

            1 Reply Last reply
            1
            • necrevistonnezrN Offline
              necrevistonnezrN Offline
              necrevistonnezr
              wrote on last edited by necrevistonnezr
              #6

              Just to be clear (there’s sooo much confusion out there about the GDPR): There‘s no requirement to turn off IP logging or any fixed limit how long to keep such logs. The cited article is one, rather extreme position.
              As a service-provider (Mastodon instance) you have a „legitimate interest“ to keep such logs for the necessary time for debugging, identifying spam, fraud, hate speech and the likes. „Necessary“ depends on your setup and risk profile. One can even be required to keep logs for a while to effectively address such issues if they surface regularly.
              https://www.termsfeed.com/blog/gdpr-log-data/ gives a good overview on the basics.

              1 Reply Last reply
              3
              • girishG girish

                Currently, there is no option for this since it's hardcoded to log IP addresses. Can you tell us why one would want to turn this off though?

                T Offline
                T Offline
                tomw
                wrote on last edited by
                #7

                @girish I am helping a small group of exiled human rights activists here in the EU and would like to provide them with a Matrix/Synapse server on my Cloudron for their internal communications.

                They work specifically on human rights abuses in their home country, which is an authoritarian regime outside the EU with a track record of attempting to identify exile activsts and punishing their families in the authoritarian country for their activities.

                The activists are concerned that if the authoritarian regime gained access to the server, the stored IP addresses could be used to identify them.

                Maybe this is all too hot for Cloudron to handle, but for this risk profile it would be really nice if I could disable IP logging, so that the activists could use the server without information that could lead back to their real world identities being stored there.

                BrutalBirdieB girishG 2 Replies Last reply
                1
                • T tomw

                  @girish I am helping a small group of exiled human rights activists here in the EU and would like to provide them with a Matrix/Synapse server on my Cloudron for their internal communications.

                  They work specifically on human rights abuses in their home country, which is an authoritarian regime outside the EU with a track record of attempting to identify exile activsts and punishing their families in the authoritarian country for their activities.

                  The activists are concerned that if the authoritarian regime gained access to the server, the stored IP addresses could be used to identify them.

                  Maybe this is all too hot for Cloudron to handle, but for this risk profile it would be really nice if I could disable IP logging, so that the activists could use the server without information that could lead back to their real world identities being stored there.

                  BrutalBirdieB Offline
                  BrutalBirdieB Offline
                  BrutalBirdie
                  Partner
                  wrote on last edited by
                  #8

                  @tomw
                  There is always the option of extra "security" measures like using a VPN for hiding your IP.
                  And there are VPN providers which do not even need an account or identification for the payment.
                  e.g. https://mullvad.net/en where you could send a letter with X money and the generated account ID to pay in advance. (or pay via. Crypto).

                  Generally speaking, the described concern is more about education on OPSEC.
                  There are great people at https://www.ccc.de/en/ who would help you to regard all of these topics. 🙂

                  Like my work? Consider donating a drink. Cheers!

                  1 Reply Last reply
                  2
                  • T tomw

                    @girish I am helping a small group of exiled human rights activists here in the EU and would like to provide them with a Matrix/Synapse server on my Cloudron for their internal communications.

                    They work specifically on human rights abuses in their home country, which is an authoritarian regime outside the EU with a track record of attempting to identify exile activsts and punishing their families in the authoritarian country for their activities.

                    The activists are concerned that if the authoritarian regime gained access to the server, the stored IP addresses could be used to identify them.

                    Maybe this is all too hot for Cloudron to handle, but for this risk profile it would be really nice if I could disable IP logging, so that the activists could use the server without information that could lead back to their real world identities being stored there.

                    girishG Offline
                    girishG Offline
                    girish
                    Staff
                    wrote on last edited by girish
                    #9

                    @tomw I think for absolute anonymous communication the product has to be built from the ground up with this in mind. Logs are just one place where the IP is logged. Many apps also store IP and login related information in the databases, caches (in fact, cloudron itself does this to track previous login attempts). I think that use case is best served using other products.

                    @BrutalBirdie even with a VPN, if you have access to the server, you can change the frontend and backend of the app in creative ways. Maybe the frontend sends some browser fingerprint, the backend can be changed to dump raw password etc. Anything is possible if you have access to the server. I doubt such a product exists though.

                    T 1 Reply Last reply
                    1
                    • robiR Offline
                      robiR Offline
                      robi
                      wrote on last edited by robi
                      #10

                      Perhaps it's time to consider running the apps they use on Tails OS https://tails.net or use it to front the Cloudron system.

                      Conscious tech

                      1 Reply Last reply
                      1
                      • girishG girish

                        @tomw I think for absolute anonymous communication the product has to be built from the ground up with this in mind. Logs are just one place where the IP is logged. Many apps also store IP and login related information in the databases, caches (in fact, cloudron itself does this to track previous login attempts). I think that use case is best served using other products.

                        @BrutalBirdie even with a VPN, if you have access to the server, you can change the frontend and backend of the app in creative ways. Maybe the frontend sends some browser fingerprint, the backend can be changed to dump raw password etc. Anything is possible if you have access to the server. I doubt such a product exists though.

                        T Offline
                        T Offline
                        tomw
                        wrote on last edited by
                        #11

                        @girish I hear what you're saying. At the same time, given that all requests to the various apps pass through nginx (if we just consider apps running on port 80/443 for now), isn't there an opportunity here to obfuscate the IP addresses with a fairly simple nginx config change?

                        VPN is certainly a good idea for these users too.

                        girishG 1 Reply Last reply
                        0
                        • jadudmJ Offline
                          jadudmJ Offline
                          jadudm
                          wrote on last edited by jadudm
                          #12

                          A huge +1 to what @girish said: you and your friends need to think about what it means to secure yourself against a hostile nation-state.

                          (You might just strike the word "hostile," and leave "nation-state" unadorned.)

                          https://revealnews.org/article/how-to-stay-safe-online-a-cybersecurity-guide-for-political-activists/

                          https://antigravitymagazine.com/feature/digital-security-for-activists/

                          and other similar articles (look for authoritative sources in this space where possible -- those seem "OK" but are only a start) are going to help you game out just how paranoid you need to be. And in this case, "paranoid" means "what do we have to do to keep people out of jail and, possibly, alive?" It is a level of paranoia I do not typically ever operate at, and I suspect, neither do you. (That's not a slam... just that most of us don't operate there on a day-to-day basis.)

                          For a lighter (but still not really wrong) take, James Mickens is always a potential inspiration:

                          https://www.usenix.org/system/files/1401_08-12_mickens.pdf

                          Although it is a light-hearted take, Mickens is getting at just how complex cybersecurity is. You're exploring a space where the consequences of failure/poor choices are going to cost your friends dearly. This is more than just a "simple nginx config change" that you need to make in order to create a secure communications space for people who might be targeted by their home country's internal police/intelligence forces. You need to think about your threat vectors front-to-back, as this is about more than just the tech. It's operational security from the start to end.

                          Or: XKCD's comic "Security" now applies:

                          https://xkcd.com/538/

                          If your solution is susceptible to someone being beaten with a wrench to yield enough secrets and access to unlock all of the comms and, in doing so, expose everyone else in the comms ring, you're doing it wrong.

                          I use Cloudron on a Dell 7040 I bought on eBay.

                          T 1 Reply Last reply
                          2
                          • jadudmJ jadudm

                            A huge +1 to what @girish said: you and your friends need to think about what it means to secure yourself against a hostile nation-state.

                            (You might just strike the word "hostile," and leave "nation-state" unadorned.)

                            https://revealnews.org/article/how-to-stay-safe-online-a-cybersecurity-guide-for-political-activists/

                            https://antigravitymagazine.com/feature/digital-security-for-activists/

                            and other similar articles (look for authoritative sources in this space where possible -- those seem "OK" but are only a start) are going to help you game out just how paranoid you need to be. And in this case, "paranoid" means "what do we have to do to keep people out of jail and, possibly, alive?" It is a level of paranoia I do not typically ever operate at, and I suspect, neither do you. (That's not a slam... just that most of us don't operate there on a day-to-day basis.)

                            For a lighter (but still not really wrong) take, James Mickens is always a potential inspiration:

                            https://www.usenix.org/system/files/1401_08-12_mickens.pdf

                            Although it is a light-hearted take, Mickens is getting at just how complex cybersecurity is. You're exploring a space where the consequences of failure/poor choices are going to cost your friends dearly. This is more than just a "simple nginx config change" that you need to make in order to create a secure communications space for people who might be targeted by their home country's internal police/intelligence forces. You need to think about your threat vectors front-to-back, as this is about more than just the tech. It's operational security from the start to end.

                            Or: XKCD's comic "Security" now applies:

                            https://xkcd.com/538/

                            If your solution is susceptible to someone being beaten with a wrench to yield enough secrets and access to unlock all of the comms and, in doing so, expose everyone else in the comms ring, you're doing it wrong.

                            T Offline
                            T Offline
                            tomw
                            wrote on last edited by
                            #13

                            @jadudm so let me get this straight...because switching off IP address logging is not sufficient to protect against a determined nation-state actor, we're just going to leave it switched on?

                            Earlier on, @girish asked why one would want to turn off IP logging. I have given a very good reason.

                            Let's turn the question around: what business do I have logging the IP addresses of human rights activists on my server? Why do I need to collect this information?

                            jadudmJ 1 Reply Last reply
                            0
                            • T tomw

                              @girish I hear what you're saying. At the same time, given that all requests to the various apps pass through nginx (if we just consider apps running on port 80/443 for now), isn't there an opportunity here to obfuscate the IP addresses with a fairly simple nginx config change?

                              VPN is certainly a good idea for these users too.

                              girishG Offline
                              girishG Offline
                              girish
                              Staff
                              wrote on last edited by
                              #14

                              @tomw said in Turn off IP logging:

                              isn't there an opportunity here to obfuscate the IP addresses with a fairly simple nginx config change?

                              You can try adjusting the logs at /etc/nginx/nginx.conf per https://docs.nginx.com/nginx/admin-guide/monitoring/logging/ and see if it suits your needs. Currently, the nginx log file is overwritten on a Cloudron update. But it's a start to not log the IPs altogether. The apps also learn about the client IPs from X-Forwarded-* headers in /etc/nginx/application/* .

                              But as mentioned, we haven't tested this from a security point of view at the platform level. Let us know what you find 🙂

                              1 Reply Last reply
                              1
                              • jdaviescoatesJ Offline
                                jdaviescoatesJ Offline
                                jdaviescoates
                                wrote on last edited by
                                #15

                                Given the context, it's probably also worth noting that it's currently technically not really possible for Matrix to fully implement GDPR's Right of Erasure. See https://matrix.org/legal/privacy-notice/

                                That doesn't mean it isn't GDPR compliant, it is because they've made the technical limitations clear in that link above.

                                I use Cloudron with Gandi & Hetzner

                                1 Reply Last reply
                                0
                                • T tomw

                                  @jadudm so let me get this straight...because switching off IP address logging is not sufficient to protect against a determined nation-state actor, we're just going to leave it switched on?

                                  Earlier on, @girish asked why one would want to turn off IP logging. I have given a very good reason.

                                  Let's turn the question around: what business do I have logging the IP addresses of human rights activists on my server? Why do I need to collect this information?

                                  jadudmJ Offline
                                  jadudmJ Offline
                                  jadudm
                                  wrote on last edited by
                                  #16

                                  @tomw Apologies; I wasn't trying to suggest you shouldn't do this. I was only trying to emphasize that there is an entire system/chain that leads to your server.

                                  You might have:

                                  • The nation-state working in tandem with local (or, are they state-owned?) ISPs to implement man-in-the-middle cert attacks, so that attempts to securely connect to your server are actually plain-text.
                                  • The nation state, working with ISPs to compromise/log all traffic through DNS servers.
                                  • ...

                                  https://www.cisa.gov/news-events/alerts/2015/04/30/securing-end-end-communications

                                  is an article that speaks to some of the kinds of things that you might have to do to begin securing end-to-end communications.

                                  Ultimately, I really don't know. I'm just suggesting---YMMV, etc.---that this sounds like something with high stakes.

                                  I wish you and your colleagues all the best of luck.

                                  PS. https://www.cjr.org/tow_center_reports/guide_to_securedrop.php looks interesting as well. Again, it doesn't apply directly to your case, but speaks to the broad spectrum of design considerations that go into architecting and delivering secure systems, where "systems" means "a combination of technology and people."

                                  I use Cloudron on a Dell 7040 I bought on eBay.

                                  1 Reply Last reply
                                  2
                                  Reply
                                  • Reply as topic
                                  Log in to reply
                                  • Oldest to Newest
                                  • Newest to Oldest
                                  • Most Votes


                                  • Login

                                  • Don't have an account? Register

                                  • Login or register to search.
                                  • First post
                                    Last post
                                  0
                                  • Categories
                                  • Recent
                                  • Tags
                                  • Popular
                                  • Bookmarks
                                  • Search