Jump to content

Proxy path whitelisting


Go to solution Solved by sh0rty,

Recommended Posts

Posted

Greetings.

I come to you today because I am having issues connecting to my instance through the Android application.

My proxy is currently Pangolin, which offers authentication before being able to access the URL. As with many other mobile applications, the use of api's requires me to whitelist certain URL-paths, as they do not support authenticating in the proxy first.

This leads me to the following: What are the least amount of whitelistings needed, to be able to authenticate and use the app on mobile?

You can read the Pangolin documentation on other applications here having guides:
https://docs.fossorial.io/Pangolin/bypass-rules

 

Thank you in advance.

Posted

Hello Re4mstr,

** This is an auto reply **

Please wait for someone from staff support or our members to reply to you.

It's recommended to provide more info, as it explain in this thread:


Thank you.

Emby Team

Posted

Hi, I would think /emby and everything underneath as well as /embywebsocket

Posted
9 hours ago, Luke said:

Hi, I would think /emby and everything underneath as well as /embywebsocket

Hi,

Thanks for the answer, and I landed on this solution yesterday after some more testing.

The issue I have with this, is that in the browser, if I just append /emby to my base url, I bypass the auth.

I hoped there were a less "wildcard" approach.

  • Thanks 1
  • 1 month later...
Posted (edited)
On 6/5/2025 at 10:20 AM, Re4mstr said:

Hi,

Thanks for the answer, and I landed on this solution yesterday after some more testing.

The issue I have with this, is that in the browser, if I just append /emby to my base url, I bypass the auth.

I hoped there were a less "wildcard" approach.

Late to the Party. But at least these are the ones I needed to whitelist for having everything in the app functional and having Pangolin 2FA/Passkey login in the Web Browser. Perhaps Luke can elaborate if something is not necessary. 

IMG_20250803_221737.thumb.jpg.c3fffa82ba93c301ce019851d881f94c.jpg

Edited by sh0rty
Posted

Yikes, that looks like it's going to be painful. I would just whitelist /emby/*

Posted (edited)
5 hours ago, Luke said:

Yikes, that looks like it's going to be painful. I would just whitelist /emby/*

🤣 When whitelisting /emby/*, also the web login bypasses Pangolin Login page. But it could be easier mate 😉:

 

Edited by sh0rty
  • 5 months later...
Re4mstr
Posted
On 8/3/2025 at 10:20 PM, sh0rty said:

Late to the Party. But at least these are the ones I needed to whitelist for having everything in the app functional and having Pangolin 2FA/Passkey login in the Web Browser. Perhaps Luke can elaborate if something is not necessary. 

IMG_20250803_221737.thumb.jpg.c3fffa82ba93c301ce019851d881f94c.jpg

This is great, I am now only missing the top right "user menu" button (profile pic) from the app on mobile...

Thanks for this, though, guess I'll look through the API docs to figure out what more needs whitelisted to get the menu up.

  • Like 1
  • Solution
sh0rty
Posted (edited)
1 hour ago, Re4mstr said:

This is great, I am now only missing the top right "user menu" button (profile pic) from the app on mobile...

Thanks for this, though, guess I'll look through the API docs to figure out what more needs whitelisted to get the menu up.

Meanwhile things changed on the server it seems. This is working for me now:

image.png.24d5d55267e68aa09ee3db41c3f105e4.png

Edited by sh0rty
  • Thanks 1
Re4mstr
Posted

Appreciate it, Sh0rty. Everything works as far as I can tell.

I'll make sure to submit this to the Pangolin Docs as soon as possible.

Marking this as solved for now.

  • Like 1
  • Thanks 1
sh0rty
Posted (edited)
3 hours ago, Re4mstr said:

Appreciate it, Sh0rty. Everything works as far as I can tell.

I'll make sure to submit this to the Pangolin Docs as soon as possible.

Marking this as solved for now.

This whole clingy opening paths thing would not be necessary if Emby apps would support custom proxy headers. But this dream will never come true I guess.

Feel free to give the proposal an upvote:

 

Edited by sh0rty
  • Like 1
dede1337
Posted

any updates about this?

sh0rty
Posted

These are the current rulesets needed for path based auth bypass. Feel free leave a reaction in the linked thread two posts above, if you also feel the need of header auth to finally ditch the following path exclusions.

image.png.b435d9cedf2ac0de51a8b553a557c281.png

  • Like 1
  • 1 month later...
Posted

@sh0rty

If it opens up so many paths, does it even make sense anymore?

Posted
9 hours ago, Babatom said:

@sh0rty

If it opens up so many paths, does it even make sense anymore?

Just for the feeling that the WebUI access is protected. An attacker would need to know that he need to use the Android App. But that's it. That's why I created the Feature Request for custom headers which would make the bypass rules obsolete.

  • Like 2

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...