Secure connection REQUIRED - but

Hi guys.

ChuckPa told me to start a thread regarding SSL regarding Secure Connections and REQUIRED settings.

See the post here :slight_smile:

Since the announcement - My LG W8 dont seem to work anymore with secure connections enabled.

Chuck PA was so kind to inform me to change Settings -> Advanced -> Allow Insecure Connections is set to Always

So far so good - and its working just fine.

But my question to Plex team is:

If the server is set to REQUIRED - why is it that this setting cant ignore LAN devices. I cant find any option. I know I can use Preferred - but I dont want that. :slight_smile:
I dont want preferred since I want my remote streaming to be required to make sure of that streaming is secured.

Would be great to have an option to set REQUIRED - LAN devices unsecure … or something. Why even bother with secure on LAN?

2 Likes

Because there are no guarantees whatsoever that the device is truly and actually on the local network. Even if it presents a local IP address to the server.

Thanks for yours reply @OttoKerner

But to be honest - it doesnt make sense that we users cant choose to use Required external and none Secure when on LAN.

If I want Required - im forced to buy a new product like an Apple tv, Chromecast etc to use Secure connections , just because I want Required enabled externally? :confused:

Our tv is 3-4 years old . Kinda sad not being able to use plex app on the tv now that its there :slight_smile:

1 Like

Completely agree with everyone here, i have this issue too. Why can’t a simple comparison being made between the IP address of Plex server and device. If both are 192.168.xxx.xxx or have similar external IP address, allow insecure access.

1 Like

If I’m understanding you correctly, remotely spoofing same-subnet source addresses doesn’t really work. It’s not a viable way to impersonate or eavesdrop on TCP connections. The Internet would fall apart if it was.

The current recommendation - Secure connections: Preferred - means that HTTPS → HTTP downgrade attacks may sometimes be possible. That’s a downside to opportunistic encryption.

Some clients have an On same network as server option. That’s a reasonable setting, and I believe it’s the default on modern desktop clients (?) - but I haven’t looked at TVs or set-top boxes.

I agree that a similar option would make sense on the server. I’d encourage making this into a feature suggestion post!

1 Like

Thanks @OPPOP and @Volts for your support here.

@OttoKerner can you add this thread to Feature Request?

1 Like

Personally I’d settle for an Advance/Hidden server setting that allows me to specify LAN IP addresses that can access the server with secure connections disabled. Would let my older LAN based devices continued access.

I think you can edit the original and change it into a #feature-suggestions post yourself.


Another complicated option is to use a reverse proxy. This could be used externally to enforce whatever security you want, while allowing lower levels internally.

Thanks @Volts but I dont know how to? :slight_smile:

I have searched that thread, and it seems that other users asked for this feature as well, but all threads seems dead and closed. ?

This topic was automatically closed 90 days after the last reply. New replies are no longer allowed.