-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature: restrict access to LAN only #110
Comments
Publicly accessible installations found with Censys (all without scanners connected): |
Thanks for the information! |
I've now pushed a version (b3fc1e9) that implements an access list which can be used to restrict access to certain IPs, and IP ranges. |
Thanks, that looks good. However more and more ISPs are starting to serve IPv6, the address in which are globally routed on each device. That means there's no easy way to fill the IPv6 range in a static text file, it would require modification for every ISP IPv6 range, and the default installations would most probably reject LAN access over IPv6 in this case, which is not perfect. That's why I wrote:
In the meaning that the daemon should enumerate IP addresses which are currently assigned to the interface and create access list based on it. |
I think I understand your problem but I don't see how I could solve it by enumerating network IPs and masks. If the IP is public, wouldn't the mask allow public access as well? I have to admit I'm not familiar with how IPv6 works. |
Let's say I have
Just as if the server have |
It's done, thank you for your input! |
Great, thanks! |
Unfortunately, the current implementation seem to be buggy.
|
Another issue, although not directly related to this feature, is that AirSane does not support network interface modification events. |
That's a great suggestion, I'll see what I can come up with. |
I tried to address the above issue by adding a mutex. I didn't see much opportunity for a concurrency issue, though. |
First of all, thanks for such a beautiful software! I've converted my Samsung MFP from 2005 into a driverless networked printer+scanner, and it works perfectly fine!
Current AirSane version does not support IP-level access control, which may be a security issue due to rather widespread IPv6 connectivity with 'real' addresses. CUPS has 'allow LAN access only' convenient checkbox, it would be great to have the same functionality in AirSane without nginx/other web front-end.
It should be implemented by enumerating IP addresses on the interfaces and allowing access by the network segment and its mask.
Thanks.
The text was updated successfully, but these errors were encountered: