[GH-ISSUE #143] Whitelisting IPs to bypass authentication mechanisms #8072

Closed
opened 2026-04-30 03:30:44 -05:00 by GiteaMirror · 3 comments
Owner

Originally created by @miloschwartz on GitHub (Feb 1, 2025).
Original GitHub issue: https://github.com/fosrl/pangolin/issues/143

Originally assigned to: @oschwartz10612, @miloschwartz on GitHub.

Discussed in https://github.com/orgs/fosrl/discussions/11

Originally posted by fr34kyn01535 January 7, 2025
Similar to how authentik allows trusted networks, it would be cool if we could whitelist networks that are trusted and bypass auth.
While most users don't have a fixed IP to whitelist I came up with a second idea here:
It would actually be quite cool if we can automatically select newt tunnel nodes / sites to whitelist, and their WAN address is added to that whitelist.

Originally created by @miloschwartz on GitHub (Feb 1, 2025). Original GitHub issue: https://github.com/fosrl/pangolin/issues/143 Originally assigned to: @oschwartz10612, @miloschwartz on GitHub. ### Discussed in https://github.com/orgs/fosrl/discussions/11 <div type='discussions-op-text'> <sup>Originally posted by **fr34kyn01535** January 7, 2025</sup> Similar to how authentik allows trusted networks, it would be cool if we could whitelist networks that are trusted and bypass auth. While most users don't have a fixed IP to whitelist I came up with a second idea here: It would actually be quite cool if we can automatically select newt tunnel nodes / sites to whitelist, and their WAN address is added to that whitelist. </div>
GiteaMirror added the new feature label 2026-04-30 03:30:44 -05:00
Author
Owner

@scroguard commented on GitHub (Feb 6, 2025):

to add to this - within other proxy packages i heavily make use of only allowing internal networks to access certain resources. it's a great additional step along with authentication to minimize the scope of who can access the proxied resource. being able to have something like "allow connections from specified private ip ranges, and deny the rest" would be very useful.

<!-- gh-comment-id:2641270093 --> @scroguard commented on GitHub (Feb 6, 2025): to add to this - within other proxy packages i heavily make use of only allowing internal networks to access certain resources. it's a great additional step along with authentication to minimize the scope of who can access the proxied resource. being able to have something like "allow connections from specified private ip ranges, and deny the rest" would be very useful.
Author
Owner

@synologyy commented on GitHub (Feb 9, 2025):

The same as an access list as in npm for WireGuard ip connections

Image

<!-- gh-comment-id:2646091510 --> @synologyy commented on GitHub (Feb 9, 2025): The same as an access list as in npm for WireGuard ip connections ![Image](https://github.com/user-attachments/assets/c6a35dd7-640d-455a-ac57-c574d9f4ec5c)
Author
Owner

@miloschwartz commented on GitHub (Feb 13, 2025):

Added in 1.0.0-beta.13

<!-- gh-comment-id:2657654859 --> @miloschwartz commented on GitHub (Feb 13, 2025): Added in [1.0.0-beta.13](https://github.com/fosrl/pangolin/releases/tag/1.0.0-beta.13)
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: github-starred/pangolin#8072