[GH-ISSUE #742] ACL by IP address #542

Open
opened 2026-05-07 00:25:16 +02:00 by BreizhHardware · 3 comments

Originally created by @xylle on GitHub (May 23, 2023).
Original GitHub issue: https://github.com/binwiederhier/ntfy/issues/742

💡 Idea
i would like to make ACL by ip address ou network address.

💻 Target components
ntfy server

Originally created by @xylle on GitHub (May 23, 2023). Original GitHub issue: https://github.com/binwiederhier/ntfy/issues/742 :bulb: **Idea** i would like to make ACL by ip address ou network address. :computer: **Target components** ntfy server
Author
Owner

@binwiederhier commented on GitHub (May 23, 2023):

I don't hate the idea, which is the best compliment you'll get from me.

Do you have thoughts on how the CLI and web app would look like?

<!-- gh-comment-id:1559871711 --> @binwiederhier commented on GitHub (May 23, 2023): I don't hate the idea, which is the best compliment you'll get from me. Do you have thoughts on how the CLI and web app would look like?
Author
Owner

@xylle commented on GitHub (May 24, 2023):

I didn't really think about the problem.
I imagine make a bypass of the authentication according to the IP address or the network of the client.
Don't change anything for the rest.

Thank you for the compliment, I am a fan of this style of compliment.

<!-- gh-comment-id:1561547581 --> @xylle commented on GitHub (May 24, 2023): I didn't really think about the problem. I imagine make a bypass of the authentication according to the IP address or the network of the client. Don't change anything for the rest. Thank you for the compliment, I am a fan of this style of compliment.
Author
Owner

@waltmck commented on GitHub (Apr 26, 2025):

I am also interested in this feature---my specific use-case is that I want all of the devices on my VPN subnet to be able to push/listen from NTFY without worrying about distributing a shared key. I need to expose NTFY publicly in order to use UnifiedPush, but there is no way I could find to set more restrictive permissions for out-of-network IPs than for in-network IPs.

The easiest way to add my desired functionality is probably a listen-http-trusted config field that functions like listen-http except it does not check passwords. In my case, I would set listen-https to my server's public network IP and listen-http-trusted to my server's VPN IP.

<!-- gh-comment-id:2832499489 --> @waltmck commented on GitHub (Apr 26, 2025): I am also interested in this feature---my specific use-case is that I want all of the devices on my VPN subnet to be able to push/listen from NTFY without worrying about distributing a shared key. I need to expose NTFY publicly in order to use UnifiedPush, but there is no way I could find to set more restrictive permissions for out-of-network IPs than for in-network IPs. The easiest way to add my desired functionality is probably a `listen-http-trusted` config field that functions like `listen-http` except it does not check passwords. In my case, I would set `listen-https` to my server's public network IP and `listen-http-trusted` to my server's VPN IP.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/ntfy#542
No description provided.