This does even not really work... I connect with box via open VPN and it blocks the 10.x.x.x ip address reange....
It does work.
There are three levels:
1. Local access (=
same subnet) is always allowed even if no login/pass is set (But if you enable auth, it will require auth).
2. VPN access (=
any subnet from
private address space)
can be allowed to access w/o password (But if you enable auth, it will require auth).
3. External access non-optionally requires a login/pass to be set.
VPN access is disabled by default, just go to Extensions -> OpenWebif and toggle the setting "Enable access from VPNs" (or whatever it gets translated to) to "yes".
If set to "yes" VPNs count as local network, if set to "no" VPNs are treated the same way as external networks.
I decided to treat VPNs as external by default because the IPv4 address exhaustion has led to funny constructs as a remedy, e.g. smaller providers using private address space for their customers (Instead of the address space reserved for CGN).
Also if you share access with your neighbour(s) using a triangle router setup (Main router plus a cascaded router for each neighbour) will result in other people accessing from private address space.
And to stop the discussion about login/pass:
I know that a login "root:root" doesn't make it much any more secure.
The security gain comes from disabling the remote access in default setup and putting a landmark "Hm, why do they want me to set a pass here?".
Users are still able to set crap like "root:root" but they can not say anymore they haven't been warned.
Software by itself can not create security, we only stopped handing them the rifle for shooting their feet.
And it gives us the chance to tell them:
Do not open the ports - especially not port 80/http - using simple port forwarding
at all!
Use a VPN or ssh tunneling instead!
You have been warned, from here on continue on your own risk!
Edited by SpaceRat, 27 November 2016 - 11:11.