top | item 45678801

(no title)

mads_quist | 4 months ago

Never host your test environments as Subdomains of your actual production domain. You'll also run into email reputation as well as cookie hell. You can get a lot of cookies from the production env if not managed well.

discuss

order

lucideer|4 months ago

This. I cannot believe the rest of the comments on this are seemingly completely missing the problem here & kneejerk-blaming Google for being an evil corp. This is a real issue & I don't feel like the article from the Immich team acknowledges it. Far too much passing the buck, not enough taking ownership.

Gormo|4 months ago

It's true that putting locks on your front door will reduce the chance of your house getting robbed, but if you do get robbed, the fact that your front door wasn't locked does not in any way absolve the thief for his conduct.

Similarly, if an organization deploys a public system that engages in libel and tortious interference, the fact that jumping through technical hoops might make it less likely to be affected by that system does not in any way absolve the organization for operating it carelessly in the first place.

Just because there are steps you can take to lessen the impact of bad behavior does not mean that the behavior itself isn't bad. You shouldn't have restrict how you use your own domains to avoid someone else publishing false information about your site. Google should be responsible for mitigating false positives, not the website owners affected by them.

kevincox|4 months ago

Both things can be problems.

1. You should host dev stuff and separate domains.

2. Google shouldn't be blocking your preview environments.

a456463|4 months ago

Yes they could do better, but who appointed Google "chief of web security"? Google can eff right off.

mads_quist|4 months ago

Yep. Still I feel bad for them.

breakingcups|4 months ago

There's quite a few comments of people having this happen to them when they self-host Immich, the issue you point out seems minor in comparison.

bcye|4 months ago

I think immich.app is the production domain, not cloud?

lucideer|4 months ago

.cloud is used to host the map embedded in their webapp.

In fairness, in my local testing sofar, it appears to be an entirely unauthenticated/credential-less service so there's no risk to sessions right now for this particular use-case. That leaves the only risk-factors being phishing & deploy environment credentials.