Description
Bug description
This morning I received a notification of new service open on a production machine that no human accessed in months:

In other words, NetData exposed a web service to the public Internet without anyone configuring it! Not only that, but accessing the said port on the production alias exposes the whole dashboard anonymously! WHAT IS GOING ON?!
The dashboard exposes every detail of the machine, it's services, internal name, EVERYTHING!
Our config is completely default, no changes whatsoever:
cat /etc/netdata/netdata.conf
# netdata configuration
#
# You can get the latest version of this file, using:
#
# netdatacli dumpconfig > /etc/netdata/netdata.conf
#
# You can also download it using:
#
# wget -O /etc/netdata/netdata.conf http://localhost:19999/netdata.conf
# or
# curl -o /etc/netdata/netdata.conf http://localhost:19999/netdata.conf
The same applies to netdatacli dumpconfig
--it's completely untouched.
Expected behavior
NetData should NOT expose the whole dashboard to the public internet on any machine, and certainly not allow "Skip and see the dashboard anonymously" feature.
Who in their right mind thought it was a good idea to default to fully open?
Steps to reproduce
- Install NetData
- See all your internal details harvested
- Despair
Screenshots
No response
Error Logs
No response
Desktop
OS: [e.g. iOS]
Browser [e.g. chrome, safari]
Browser Version [e.g. 22]
Additional context
NetData often bombards with notifications about server load being over 90% and going down hundreds of times per day, never learning to see the behavior is normal.
But send an email saying "Your dashboard is anonymously exposed to the public internet"? Never! Why bother with that?