@Teiluj said in N8N Security:
Would this obfuscate the n8n frontend, at least partially?
Yes, but security via obscurity is useless.
@jorrg said in N8N Security:
So the only thing that I presume would change that if some automated scraper comes passing by my IP asking: "Do you run N8N?" my server would answer: "Please log in with your cloudron details" instead of "Sure I am running this N8N version"
If your IP is scraped it will not even reply with N8N but would return Cloudron.
They would need to know the subdomain of your N8N Cloudron app, which is also possible from e.g. the SSL/TLS certificate if wildcard is not used.
Example for cloudron.io https://www.merklemap.com/search?query=cloudron.io&page=0
Anything that is publicly accessible in the World Wide Web is subjected to access attempts.
And again, if N8N would use the custom OIDC plugin, the brute force would just move to a new target, the OIDC login.
We are planning to add per app IP-Whitelisting.
With that, apps could be gated behind e.g.: the Cloudron VPN app.
This would be a reliable way to block public access.