Security
Token
There is no security token.
Firewall
main
Name
Security enabled
Stateless
Configuration
Key | Value |
---|---|
provider | security.user.provider.concrete.app_user_provider |
context | main |
entry_point | App\Security\KbinAuthenticator |
user_checker | App\Security\UserChecker |
access_denied_handler | (none) |
access_denied_url | (none) |
authenticators | [ "two_factor" "remember_me" "App\Security\KbinAuthenticator" "App\Security\FacebookAuthenticator" "App\Security\GoogleAuthenticator" "App\Security\GithubAuthenticator" "App\Security\KeycloakAuthenticator" ] |
Listeners
Listener | Duration | Response |
---|---|---|
Symfony\Component\Security\Http\Firewall\ChannelListener {#723 -map: Symfony\Component\Security\Http\AccessMap {#722 …} -logger: Monolog\Logger {#783 …} -httpPort: 80 -httpsPort: 443 } |
0.00 ms | (none) |
Symfony\Component\Security\Http\Firewall\ContextListener {#706 -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\TokenStorage {#1017 …} -sessionKey: "_security_main" -logger: Monolog\Logger {#783 …} -userProviders: Symfony\Component\DependencyInjection\Argument\RewindableGenerator {#705 …} -dispatcher: Symfony\Component\EventDispatcher\Debug\TraceableEventDispatcher {#747 …} -registered: false -trustResolver: Scheb\TwoFactorBundle\Security\Authentication\AuthenticationTrustResolver {#780 …} -sessionTrackerEnabler: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage::enableUsageTracking(): void {#703 …} } |
0.13 ms | (none) |
Symfony\Component\Security\Http\Firewall\AuthenticatorManagerListener {#584 -authenticatorManager: Symfony\Component\Security\Http\Authentication\AuthenticatorManager {#595 …} } |
0.00 ms | (none) |
Scheb\TwoFactorBundle\Security\Http\Firewall\TwoFactorAccessListener {#582 -twoFactorFirewallConfig: Scheb\TwoFactorBundle\Security\TwoFactor\TwoFactorFirewallConfig {#842 …} -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …} -twoFactorAccessDecider: Scheb\TwoFactorBundle\Security\Authorization\TwoFactorAccessDecider {#581 …} } |
0.03 ms | (none) |
Symfony\Component\Security\Http\Firewall\AccessListener {#579 -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …} -accessDecisionManager: Symfony\Component\Security\Core\Authorization\TraceableAccessDecisionManager {#937 …} -map: Symfony\Component\Security\Http\AccessMap {#722 …} } |
0.00 ms | (none) |
Symfony\Component\Security\Http\Firewall\LogoutListener {#786 -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …} -options: [ "csrf_parameter" => "_csrf_token" "csrf_token_id" => "logout" "logout_path" => "app_logout" ] -httpUtils: Symfony\Component\Security\Http\HttpUtils {#841 …} -csrfTokenManager: Symfony\Component\Security\Csrf\CsrfTokenManager {#1015 …} -eventDispatcher: Symfony\Component\EventDispatcher\Debug\TraceableEventDispatcher {#747 …} } |
0.00 ms | (none) |
Authenticators
No authenticators have been recorded. Check previous profiles on your authentication endpoint.
Access Decision
affirmative
Strategy
Access decision log
# | Result | Attributes | Object | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | DENIED | ROLE_USER | null |
||||||||||||||||||||||||
|
|||||||||||||||||||||||||||
2 | DENIED | moderate | App\Entity\Post {#1610 +user: App\Entity\User {#265 …} +magazine: Proxies\__CG__\App\Entity\Magazine {#1581 …} +image: null +slug: "Quick-question-about-DNS-and-DoH-that-I-thought-about" +body: """ Quick question about DNS and DoH that I thought about after reading this post:\n \n <https://packmates.org/@silvereagle@furry.engineer/111176886781705659>\n \n Wouldn't it make sense for Firefox or another third party to bundle and transparently forward all DoH requests to cloudflare so that:\n \n A) Cloudflare doesn't know who made what request due to not knowing the origin\n \n B) Firefox doesn't know who made what request due to TLS\n \n #Infosec #Privacy \n CC: @privacyguides@lemmy.one """ +lang: "en" +commentCount: 6 +favouriteCount: 1 +score: 0 +isAdult: false +sticky: false +lastActive: DateTime @1697394342 {#1639 : 2023-10-15 20:25:42.0 +02:00 } +ip: null +tags: [ "infosec" "privacy" ] +mentions: [ "@privacyguides@lemmy.one" ] +comments: Doctrine\ORM\PersistentCollection {#1584 …} +votes: Doctrine\ORM\PersistentCollection {#1580 …} +reports: Doctrine\ORM\PersistentCollection {#1583 …} +favourites: Doctrine\ORM\PersistentCollection {#1672 …} +notifications: Doctrine\ORM\PersistentCollection {#1669 …} +children: [] -id: 167 -bodyTs: "'/@silvereagle@furry.engineer/111176886781705659':17 'anoth':26 'b':56 'bundl':30 'cc':70 'cloudflar':38,42 'dns':4 'doesn':43,58 'doh':6,35 'due':50,65 'firefox':24,57 'forward':33 'infosec':68 'know':45,53,60 'made':47,62 'make':21 'origin':55 'packmates.org':16 'packmates.org/@silvereagle@furry.engineer/111176886781705659':15 'parti':28 'post':14 'privaci':69 'privacyguides@lemmy.one':71 'question':2 'quick':1 'read':12 'request':36,49,64 'sens':22 'third':27 'thought':9 'tls':67 'transpar':32 'wouldn':18" +upVotes: 0 +downVotes: 0 +ranking: 1696459971 +visibility: "visible " +apId: "https://packmates.org/users/Wander/statuses/111177300119130735" +editedAt: null +createdAt: DateTimeImmutable @1696430971 {#1743 : 2023-10-04 16:49:31.0 +02:00 } +"title": 167 } |
||||||||||||||||||||||||
|
|||||||||||||||||||||||||||
3 | DENIED | edit | App\Entity\Post {#1610 +user: App\Entity\User {#265 …} +magazine: Proxies\__CG__\App\Entity\Magazine {#1581 …} +image: null +slug: "Quick-question-about-DNS-and-DoH-that-I-thought-about" +body: """ Quick question about DNS and DoH that I thought about after reading this post:\n \n <https://packmates.org/@silvereagle@furry.engineer/111176886781705659>\n \n Wouldn't it make sense for Firefox or another third party to bundle and transparently forward all DoH requests to cloudflare so that:\n \n A) Cloudflare doesn't know who made what request due to not knowing the origin\n \n B) Firefox doesn't know who made what request due to TLS\n \n #Infosec #Privacy \n CC: @privacyguides@lemmy.one """ +lang: "en" +commentCount: 6 +favouriteCount: 1 +score: 0 +isAdult: false +sticky: false +lastActive: DateTime @1697394342 {#1639 : 2023-10-15 20:25:42.0 +02:00 } +ip: null +tags: [ "infosec" "privacy" ] +mentions: [ "@privacyguides@lemmy.one" ] +comments: Doctrine\ORM\PersistentCollection {#1584 …} +votes: Doctrine\ORM\PersistentCollection {#1580 …} +reports: Doctrine\ORM\PersistentCollection {#1583 …} +favourites: Doctrine\ORM\PersistentCollection {#1672 …} +notifications: Doctrine\ORM\PersistentCollection {#1669 …} +children: [] -id: 167 -bodyTs: "'/@silvereagle@furry.engineer/111176886781705659':17 'anoth':26 'b':56 'bundl':30 'cc':70 'cloudflar':38,42 'dns':4 'doesn':43,58 'doh':6,35 'due':50,65 'firefox':24,57 'forward':33 'infosec':68 'know':45,53,60 'made':47,62 'make':21 'origin':55 'packmates.org':16 'packmates.org/@silvereagle@furry.engineer/111176886781705659':15 'parti':28 'post':14 'privaci':69 'privacyguides@lemmy.one':71 'question':2 'quick':1 'read':12 'request':36,49,64 'sens':22 'third':27 'thought':9 'tls':67 'transpar':32 'wouldn':18" +upVotes: 0 +downVotes: 0 +ranking: 1696459971 +visibility: "visible " +apId: "https://packmates.org/users/Wander/statuses/111177300119130735" +editedAt: null +createdAt: DateTimeImmutable @1696430971 {#1743 : 2023-10-04 16:49:31.0 +02:00 } +"title": 167 } |
||||||||||||||||||||||||
|
|||||||||||||||||||||||||||
4 | DENIED | moderate | App\Entity\Post {#1610 +user: App\Entity\User {#265 …} +magazine: Proxies\__CG__\App\Entity\Magazine {#1581 …} +image: null +slug: "Quick-question-about-DNS-and-DoH-that-I-thought-about" +body: """ Quick question about DNS and DoH that I thought about after reading this post:\n \n <https://packmates.org/@silvereagle@furry.engineer/111176886781705659>\n \n Wouldn't it make sense for Firefox or another third party to bundle and transparently forward all DoH requests to cloudflare so that:\n \n A) Cloudflare doesn't know who made what request due to not knowing the origin\n \n B) Firefox doesn't know who made what request due to TLS\n \n #Infosec #Privacy \n CC: @privacyguides@lemmy.one """ +lang: "en" +commentCount: 6 +favouriteCount: 1 +score: 0 +isAdult: false +sticky: false +lastActive: DateTime @1697394342 {#1639 : 2023-10-15 20:25:42.0 +02:00 } +ip: null +tags: [ "infosec" "privacy" ] +mentions: [ "@privacyguides@lemmy.one" ] +comments: Doctrine\ORM\PersistentCollection {#1584 …} +votes: Doctrine\ORM\PersistentCollection {#1580 …} +reports: Doctrine\ORM\PersistentCollection {#1583 …} +favourites: Doctrine\ORM\PersistentCollection {#1672 …} +notifications: Doctrine\ORM\PersistentCollection {#1669 …} +children: [] -id: 167 -bodyTs: "'/@silvereagle@furry.engineer/111176886781705659':17 'anoth':26 'b':56 'bundl':30 'cc':70 'cloudflar':38,42 'dns':4 'doesn':43,58 'doh':6,35 'due':50,65 'firefox':24,57 'forward':33 'infosec':68 'know':45,53,60 'made':47,62 'make':21 'origin':55 'packmates.org':16 'packmates.org/@silvereagle@furry.engineer/111176886781705659':15 'parti':28 'post':14 'privaci':69 'privacyguides@lemmy.one':71 'question':2 'quick':1 'read':12 'request':36,49,64 'sens':22 'third':27 'thought':9 'tls':67 'transpar':32 'wouldn':18" +upVotes: 0 +downVotes: 0 +ranking: 1696459971 +visibility: "visible " +apId: "https://packmates.org/users/Wander/statuses/111177300119130735" +editedAt: null +createdAt: DateTimeImmutable @1696430971 {#1743 : 2023-10-04 16:49:31.0 +02:00 } +"title": 167 } |
||||||||||||||||||||||||
|
|||||||||||||||||||||||||||
5 | DENIED | ROLE_ADMIN | null |
||||||||||||||||||||||||
|
|||||||||||||||||||||||||||
6 | DENIED | ROLE_MODERATOR | null |
||||||||||||||||||||||||
|