All I mean is that I don't think it is a good idea to store a sudo-capable password in an instance of Node-RED connected to the Internet. At least with sudo, you can control quite exactly what a user is allowed to do passwordless. Putting a password into Node-RED is just another avenue of attack.
I agree in general but, as mentioned, passwordless sudo is quite fine-grained, its just that most of us are too lazy to configure it in detail
Again, it would be better to have a separate instance of node-red that couldn't easily be accessed from the Internet to do anything sensitive.
That is, of course, generally true. However the risk levels aren't the same. Having an internal-only server, especially if well-configured, reduces risks still further.
nope! Well, not quite true in fact. My server CAN be accessed from the Internet. BUT, only when I turn the server feature on via a completely separate secure route, then I can remote network to the server using one of the afore mentioned cloud services. Once I'm done, I turn the external access off again. Mostly, I never need external access. But if I ever needed to use Node-RED to provide an Internet-facing web service, it would at least be protected by Cloudflare first, then my router firewall, then a server firewall, then a reverse proxy providing authentication and authorisation. And I would probably still run it on a separate instance of Node-RED. That sounds like a lot of faff, but actually isn't that hard to do.
In fact, I'd likely run the external facing services all on a locked-down Pi and leave my home server internal-only with a very limited interface between the Pi and the server. And I would periodically do an auto-compare of settings between the Pi and a known good config.
But given that All I really need to do is check if the home server is working properly - more accurately, get it to tell me if something is wrong. All I generally need is Telegram with a couple of simple commands that let me turn on/off external remote networking, query the running apps and turn on/off a few lights.
Hmm, I think it is in line with what I'd expect really. My stance has always been that it isn't really Node-RED's job to worry too much about security, that's best left to more specialist tools. What is there is for simple use in my view. Though I do know that some organisations have done security testing. But Node-RED is a general purpose compute environment and it is fairly easy to mess up the security on such a beast. Harder on a tool designed to be the gateway to your systems.
Ah, well that's a conversation for another day. Session expiry, JWT, websocket security, etc are things that also need care and attention if exposing one's systems to 7 billion people (and probably 10's of millions of bots).
Yes, there is still much to be done to try and simplify that. I made a start with some of the documentation for uibuilder but it is a complex subject and certainly hard to put into bite-sized pieces. I still shudder at some of the junk put out on Internet blog posts. Though it is generally getting better.
Not really, a similar thing happened last time. Someone spots a new hole and word gets round. Or it could be a single actor who discovered a hole and then searched for exposed servers. Not really that hard.