-
-
Notifications
You must be signed in to change notification settings - Fork 40
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Feature Request] Secure Blikvm further: whitelisted ip's support #213
Comments
For external BliKVM exposure we recommend Tailscale. |
I am not opposed to multi-layered security. |
For Tailscale to work, do I have to either install a Tailscale client on my host PC (not an option for me), or put KVM behind a VPN router suporting Wireguard, which is not something I plan on doing. Any issues with port forwarding? It requires neither of the sw installation, or a VPN enabled router. To secure kvm in this scenario, ip whitelisting is a feature necessary to further protect the system. Hope this makes sense and it should not be difficult to do I think. If you can point me to the server code that handles user requests, I can contribute too. |
No issues per se, just to be aware the port forwarding elevates security risks. You will need
FYI - I added separate request for the feature not yet available. Am I missing anything? |
These are in separate GitHub requests. |
Problem Description
only allows blikvm to accept requests from a whitelisted ip's to secure kvm further, esp. in port forwarding scenarios.
Proposed Solution
Make server code change so that it only allows blikvm to accept requests from a whitelisted ip's to secure kvm further, esp. in port forwarding scenarios.
Alternatives Considered
None
Additional context
This helps further secure Blikvm
The text was updated successfully, but these errors were encountered: