GLaDOSDan wrote:
I believe this is not the case.
If you trigger the whitelist email from a.a.a.a, then access it via b.b.b.b, it will only whitelist a.a.a.a. b.b.b.b will never be given access.
Edit: Also if you're worried about someone sniffing traffic between Linode and your email provider's servers, you have a much bigger problem than whitelist emails.
Firstly, I just did it, so it is the case at least here. I admit I have not done extensive testing, but I am confident about the process for this instance. I attempted to log in from a new location, got the "not whitelisted" notice, grabbed the link from my e-mail (from the new location), and whitelisted my account from that new location. I will try this again this evening from a third IP to verify.
Secondly, maybe you should explain why you're so dismissive of packet sniffing network traffic to get the url out of an e-mail? It's a well known technique, available to the public, and I can't think of any reason it wouldn't be applicable here. Just because only a specific portion of the network topology would be able to sniff the packets at a certain point in transmission doesn't make it good security to ignore the hole.
EDIT: I think maybe you misunderstood the process I highlighted above, but I concur that your assertion is correct in the first part of your message. It is, however, unrelated to the problem I'm highlighting. If a.a.a.a triggers the whitelist notice, a.a.a.a can whitelist itself using the link from the e-mail. That is the problem with which I am concerned.