Currently Akkoma doesn't have any proper mitigations against BREACH, which exploits the use of HTTP compression to exfiltrate sensitive data. (see: https://akkoma.dev/AkkomaGang/akkoma/pulls/721#issuecomment-11487) To err on the side of caution, disable gzip compression for now until we can confirm that there's some sort of mitigation in place (whether that would be Heal-The-Breach on the Caddy side or any Akkoma-side mitigations). |
||
|---|---|---|
| .. | ||
| apache | ||
| caddy | ||
| freebsd/rc.d | ||
| init.d | ||
| netbsd/rc.d | ||
| nginx | ||
| openbsd | ||
| akkoma-mongooseim.cfg | ||
| akkoma.service | ||
| akkoma.supervisord | ||
| akkoma.vcl | ||