Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Firewalling #128

Open
bentterp opened this issue Sep 5, 2018 · 7 comments
Open

Firewalling #128

bentterp opened this issue Sep 5, 2018 · 7 comments
Labels
backlog Will be done whenever someone has time enhancement New feature or request

Comments

@bentterp
Copy link
Contributor

bentterp commented Sep 5, 2018

As you are in control of the Wifi providing access to the environment you can also know the public ip used to access the instances.

Given that, use AWS security groups to restrict access to the servers.

@bentterp
Copy link
Contributor Author

bentterp commented Sep 5, 2018

... in addition to the EC2 ipranges from the region, since you're using public IP for access betweeen ansible nodes

@mglantz
Copy link
Collaborator

mglantz commented Sep 5, 2018

Good suggestion, thanks @bentterp

@bentterp
Copy link
Contributor Author

bentterp commented Sep 5, 2018

@mglantz thanks.

I can't do the ansible for it but the ip-ranges can be obtained like this

curl -s https://ip-ranges.amazonaws.com/ip-ranges.json | jq -r '.prefixes[] | select(.service=="EC2") | select(.region=="eu-west-1") | .ip_prefix'

and for the conference roon wifi just curl http://checkip.amazonaws.com

@teemu-u
Copy link
Contributor

teemu-u commented Sep 5, 2018

This is one option.
I would prefer making it so, that "Client systems" would not have public ip and would be reached via AWS internal ip/dns and limiting access to those hosts only from tower.
No matter which route we decide to take, this requires alot of refactoring.
Putting this to backlog.

@teemu-u teemu-u added enhancement New feature or request backlog Will be done whenever someone has time labels Sep 5, 2018
@bentterp
Copy link
Contributor Author

bentterp commented Sep 5, 2018

you'll still need to have student access to both giltlab and tower servers so they need public IP open and accessible.

Creating an AWS security group for this using the ipranges and public ip of conference center is not that hard, and then you simply attach that security group to all the instances.

@mstrahlert
Copy link

This suggestion would exclude those who are forced to use corporate VPNs.

@bentterp
Copy link
Contributor Author

bentterp commented Sep 6, 2018

This is true if the VPN cannot be disabled or configured with split tunneling. But the alternative which we saw yesterday was that a lot of students simply didn't have access to the unfiltered servers.

IMNSHO, there should be little need of corporate VPN during a roadshow training. If the contents of your laptop are so sensitive that you need to have an always-on-filter-everything VPN, then consider using another laptop for going to conventions etc.

If you're deploying the exercise yourself for internal trainings, then you can of course whitelist your company's ip-adresses.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backlog Will be done whenever someone has time enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

4 participants