feat: implement access list management with CRUD operations and IP testing
- Added API integration for access lists including listing, creating, updating, deleting, and testing IPs against access lists. - Created AccessListForm component for creating and editing access lists with validation. - Developed AccessListSelector component for selecting access lists with detailed display of selected ACL. - Implemented hooks for managing access lists and handling API interactions. - Added tests for AccessListSelector and useAccessLists hooks to ensure functionality. - Enhanced AccessLists page with UI for managing access lists, including create, edit, delete, and test IP features.
This commit is contained in:
@@ -17,7 +17,16 @@ CaddyProxyManager+ (CPM+) includes optional, high-value security integrations to
|
||||
Uses [Coraza](https://coraza.io/), a Go-native WAF, with the **OWASP Core Rule Set (CRS)** to protect against common web attacks (SQL Injection, XSS, etc.).
|
||||
|
||||
### 3. Access Control Lists (ACL)
|
||||
Allows you to define IP allow/block lists to restrict access to your services.
|
||||
Restrict access to your services based on IP addresses, CIDR ranges, or geographic location using MaxMind GeoIP2.
|
||||
|
||||
**Features:**
|
||||
- **IP Whitelist**: Allow only specific IPs/ranges (blocks all others)
|
||||
- **IP Blacklist**: Block specific IPs/ranges (allows all others)
|
||||
- **Geo Whitelist**: Allow only specific countries (blocks all others)
|
||||
- **Geo Blacklist**: Block specific countries (allows all others)
|
||||
- **Local Network Only**: Restrict to RFC1918 private networks (10.x, 192.168.x, 172.16-31.x)
|
||||
|
||||
Each ACL can be assigned to individual proxy hosts, allowing per-service access control.
|
||||
|
||||
### 4. Rate Limiting
|
||||
Protects your services from abuse by limiting the number of requests a client can make within a specific time frame.
|
||||
@@ -65,12 +74,80 @@ environment:
|
||||
- CPM_SECURITY_WAF_MODE=enabled
|
||||
```
|
||||
|
||||
### Rate Limiting & ACLs
|
||||
### ACL Configuration
|
||||
|
||||
| Variable | Value | Description |
|
||||
| :--- | :--- | :--- |
|
||||
| `CPM_SECURITY_ACL_MODE` | `disabled` | (Default) ACLs are turned off. |
|
||||
| | `enabled` | Enables IP and geo-blocking ACLs. |
|
||||
| `CPM_GEOIP_DB_PATH` | Path | Path to MaxMind GeoLite2-Country.mmdb (auto-configured in Docker) |
|
||||
|
||||
**Example:**
|
||||
```yaml
|
||||
environment:
|
||||
- CPM_SECURITY_ACL_MODE=enabled
|
||||
```
|
||||
|
||||
### Rate Limiting Configuration
|
||||
|
||||
| Variable | Value | Description |
|
||||
| :--- | :--- | :--- |
|
||||
| `CPM_SECURITY_RATELIMIT_MODE` | `enabled` / `disabled` | Enable global rate limiting. |
|
||||
| `CPM_SECURITY_ACL_MODE` | `enabled` / `disabled` | Enable IP-based Access Control Lists. |
|
||||
|
||||
---
|
||||
|
||||
## ACL Best Practices by Service Type
|
||||
|
||||
### Internal Services (Pi-hole, Home Assistant, Router Admin)
|
||||
**Recommended**: **Local Network Only** ACL
|
||||
- Blocks all public internet access
|
||||
- Only allows RFC1918 private IPs (10.x, 192.168.x, 172.16-31.x)
|
||||
- Perfect for: Pi-hole, Unifi Controller, Home Assistant, Proxmox, Router interfaces
|
||||
|
||||
### Media Servers (Plex, Jellyfin, Emby)
|
||||
**Recommended**: **Geo Blacklist** for high-risk countries
|
||||
- Block countries known for scraping/piracy monitoring (e.g., China, Russia, Iran)
|
||||
- Allows legitimate users worldwide while reducing abuse
|
||||
- Example countries to block: CN, RU, IR, KP, BY
|
||||
|
||||
### Personal Cloud Storage (Nextcloud, Syncthing)
|
||||
**Recommended**: **Geo Whitelist** to your country/region
|
||||
- Only allow access from countries where you actually travel
|
||||
- Example: US, CA, GB, FR, DE (if you're North American/European)
|
||||
- Dramatically reduces attack surface
|
||||
|
||||
### Public-Facing Services (Blogs, Portfolio Sites)
|
||||
**Recommended**: **No ACL** or **Blacklist** only
|
||||
- Keep publicly accessible for SEO and visitors
|
||||
- Use blacklist only if experiencing targeted attacks
|
||||
- Rely on WAF + CrowdSec for protection instead
|
||||
|
||||
### Password Managers (Vaultwarden, Bitwarden)
|
||||
**Recommended**: **IP Whitelist** or **Geo Whitelist**
|
||||
- Whitelist your home IP, VPN endpoint, or mobile carrier IPs
|
||||
- Or geo-whitelist your home country only
|
||||
- Most restrictive option for highest-value targets
|
||||
|
||||
### Business/Work Services (GitLab, Wiki, Internal Apps)
|
||||
**Recommended**: **IP Whitelist** for office/VPN
|
||||
- Whitelist office IP ranges and VPN server IPs
|
||||
- Blocks all other access, even from same country
|
||||
- Example: 203.0.113.0/24 (office), 198.51.100.50 (VPN)
|
||||
|
||||
---
|
||||
|
||||
## Testing ACLs
|
||||
|
||||
Before applying an ACL to a production service:
|
||||
|
||||
1. Create the ACL in the web UI
|
||||
2. Leave it **Disabled** initially
|
||||
3. Use the **Test IP** button to verify your own IP would be allowed
|
||||
4. Assign to a non-critical service first
|
||||
5. Test access from both allowed and blocked locations
|
||||
6. Enable on production services once validated
|
||||
|
||||
**Tip**: Always test with your own IP first! Use sites like `ifconfig.me` or `ipinfo.io/ip` to find your current public IP.
|
||||
|
||||
---
|
||||
|
||||
|
||||
Reference in New Issue
Block a user