I have BI running on a Win10 box, and for the most part I've got everything humming along smoothly. I have Stunnel set up for HTTPS webUI access on my LAN. I have now set up a VPN gateway on my network that can talk to my BI server's subnet. That is all working fine - I can VPN in from work, navigate to BI's address with HTTPS, see my cams - all good, working as expected.
Naturally, the next step when exposing a server to the world is to ensure that it is secure, and even more importantly, make sure we can detect if (when) something worms its way past the VPN and starts hammering away at my BI login.
This is where stuff stops working as expected.
When I log into BI directly to the unsecured HTTP address (bypassing Stunnel directly to BI), I can see each of the user logins and their respective source IP addresses. This is as expected. If I see a suspect IP and block it using the "Limit Access by IP Address" function, it blocks it. All good. See screenshot "bi_http.png" which shows two logins and their respective IPs.
When I log into BI using the secured HTTPS address (translating thru Stunnel), I can see each user login, but their source IP address is the same as the server address!! At first this was 127.0.0.1 (localhost), the Stunnel default (and perfectly fine for my use). So, based on the best advice offered on Stunnel.org and roughly 3 hours scouring this very forum, I changed my stunnel config file to specify my host's actual IP. Unsurprisingly this did not solve the problem at all - The users still all show up under the same IP, but that IP is now the host IP I entered into the config file. This is equally useless for identifying intruder's IP. The biggest issue with that obviously is that I (and BI) cannot ban IPs, automatically or manually, because it would be banning its own localhost IP, causing all sorts of problems. See screenshot "bi_https.png" which shows the two logins appearing as the localhost IP.
I have searched for hours and it appears I am the only person on the planet experiencing this issue with Stunnel or BI.
Am I screwed? Does using Stunnel permanently nuke any ability to manage (or even view!) connections in BI, thereby making literally all of BI's Advanced Web Server tools pretty much useless?
Meaningful bits of Stunnel config:
debug = info
output = stunnel.log
[blue-iris]
accept = 443
connect = 81
cert = stunnel.pem
Naturally, the next step when exposing a server to the world is to ensure that it is secure, and even more importantly, make sure we can detect if (when) something worms its way past the VPN and starts hammering away at my BI login.
This is where stuff stops working as expected.
When I log into BI directly to the unsecured HTTP address (bypassing Stunnel directly to BI), I can see each of the user logins and their respective source IP addresses. This is as expected. If I see a suspect IP and block it using the "Limit Access by IP Address" function, it blocks it. All good. See screenshot "bi_http.png" which shows two logins and their respective IPs.
When I log into BI using the secured HTTPS address (translating thru Stunnel), I can see each user login, but their source IP address is the same as the server address!! At first this was 127.0.0.1 (localhost), the Stunnel default (and perfectly fine for my use). So, based on the best advice offered on Stunnel.org and roughly 3 hours scouring this very forum, I changed my stunnel config file to specify my host's actual IP. Unsurprisingly this did not solve the problem at all - The users still all show up under the same IP, but that IP is now the host IP I entered into the config file. This is equally useless for identifying intruder's IP. The biggest issue with that obviously is that I (and BI) cannot ban IPs, automatically or manually, because it would be banning its own localhost IP, causing all sorts of problems. See screenshot "bi_https.png" which shows the two logins appearing as the localhost IP.
I have searched for hours and it appears I am the only person on the planet experiencing this issue with Stunnel or BI.
Am I screwed? Does using Stunnel permanently nuke any ability to manage (or even view!) connections in BI, thereby making literally all of BI's Advanced Web Server tools pretty much useless?
Meaningful bits of Stunnel config:
debug = info
output = stunnel.log
[blue-iris]
accept = 443
connect = 81
cert = stunnel.pem