Skip to content
Choose a tag to compare

Add support for allowed IP ACLs

@alexellis alexellis released this
· 6 commits to master since this release
Choose a tag to compare

Changelog for 0.9.1:

HTTP, TCP servers and the fileserver all gain a new flag to specify a list of IPs and / or CIDRs which may access the control and data plane of the server end of the tunnel.

IP allowed lists, aka IP whitelists are an often-requested security feature by corporate users however, they do not replace authentication and are not bullet-proof. Beware of IP spoofing for the source address of packets.

The default allow list is which corresponds to any valid IP address.

Container image:

Read the blog post / tutorial: Restrict your tunnels with IP allow lists

Example usage:

inlets fileserver --allowed-ips

inlets tcp server --allowed-ips

inlets http server --allowed-ips \

If you are using a reverse proxy or container network in front of inlets, then you may need to implement your list there instead of via the inlets binary.

Generated by Derek