@@ -52,6 +52,8 @@ The trap will be triggered when a domain that matches a honeytoken is resolved (
Eg: someone resolves `mycanary1.domain` and this query reaches our gocanary resolver through NS delegation, i.e. domain is in reality subdomain.domain and domain nameservers delegate resolution of subdomain to our host
Beware that the remote ip will be typically the resolver that the client is using and not the IP of the potential attacker.
## HTTP and HTTPS
The trap will be triggered when a URL that has either a token is defined that matches the last path component or the first component of the hostname.
...
...
@@ -60,9 +62,9 @@ Eg: A request is made to `http://mycanary1.myhost.domain/whatever` or a requ
## Running
Gocanary is a single binary that accepts command line options. Gocanary also reads a config file (default `config.yaml`) where the same parameters that can be passed as arguments might be predefined.
Gocanary is a single binary that accepts command line options. Gocanary also reads a config file (default `config.yaml`) where the same parameters that can be passed as arguments might alternatively be defined.
It is intended to be run as `root` (to be able to bind to default DNS and WEB ports) and will drop privileges to `nobody` and sandbox file access using landlock (https://docs.kernel.org/userspace-api/landlock.html)
Alternatively can be run as nonroot and changing the different ports, and then using iptables/nftables to redirect traffic to it.
It would be possible to run as nonroot and changing the different ports, and then using iptables/nftables to redirect traffic to it.
All configuration options can be defined in config.yaml. Example:
...
...
@@ -109,7 +111,7 @@ Flags:
The easiest way to run this is with docker compose.
The leanest way is to download the gocanary artifact and then use the `docker-compose-inline.yml`
The leanest way is to download the gocanary from the releases page and then use the `docker-compose-inline.yml`
The most compatible way to run is using the `docker-compose-with-build.yml`, which will compile and run the project.
In all cases the compose file will need to be edited to at least bind only the public IPs and also to specify certificate options when using https support.
Except for the docker-compose-inline the compose file will need to be edited to at least bind only the public IPs and also to specify certificate options when using https support.