I saw this very old discussion: https://forum.directadmin.com/threads/restrict-admin-access-to-administrator-ip-s.14468/.
However, the number of people disagreeing with this idea is baffling (not surprising since it's 2008), considering how widespread this practice of restricting things to specific IP addresses for security has been.
I tried the solution of adding checking if the $caller_ip matches in all_pre.sh, however, that is not ideal as it lets you log in, just does not perform any functions + it breaks a lot of other stuff, such as JetBackup (all of my backup jobs started failing once I saved that script).
I'm looking for a solution that only applies to the login page of DA at 2222, not to every post request.
So, the question is, how do we prevent any login attempts on the DA login page with the username "admin" if the request is not from a specific set of IPs set by the server administrator?
This is an important feature, as it would reduce the attack surface significantly, right?
However, the number of people disagreeing with this idea is baffling (not surprising since it's 2008), considering how widespread this practice of restricting things to specific IP addresses for security has been.
I tried the solution of adding checking if the $caller_ip matches in all_pre.sh, however, that is not ideal as it lets you log in, just does not perform any functions + it breaks a lot of other stuff, such as JetBackup (all of my backup jobs started failing once I saved that script).
I'm looking for a solution that only applies to the login page of DA at 2222, not to every post request.
So, the question is, how do we prevent any login attempts on the DA login page with the username "admin" if the request is not from a specific set of IPs set by the server administrator?
This is an important feature, as it would reduce the attack surface significantly, right?