New bastion server for ssh/gateway subdomains
Notes from tech meeting on 2022-08-29
- new
ssh.ucc.asn.au
bastion server, notmotsugo
- preferably with enhanced logging and MFA
No child items are currently assigned. Use child items to break down this issue into smaller parts.
Link issues together to show that they're related. Learn more.
Activity
- James Arcus added great-to-have label
added great-to-have label
- Owner
Maybe time for another Open Based Secure Distribution instance? https://youtu.be/watch?v=-tOJpFMKRu0
- Owner
An opportunity to rebuild the
fail2ban
config, at least for that host, and on a new version:- allow an IP after successful auth? MFA? port-knock? https://www.the-art-of-web.com/system/fail2ban-action-whitelist/
- testing: https://www.the-art-of-web.com/system/fail2ban-filters/
- versions: https://tracker.debian.org/pkg/fail2ban
- Owner
Within, initially - an entry point FROM outside TO inside, to be a replacement
ssh.ucc.asn.au
We haven't deliberately blocked all the other servers by and large, but a dedicated-to-purpose bastion would mean:
- we could channel a lot of remote access through that point and look more suspiciously at other direct traffic
- even block a lot of it by default?
- and wait for a successful auth and a fail2ban "allow" to enable access from a new remote network?
- even block a lot of it by default?
- we could channel a lot of remote access through that point and look more suspiciously at other direct traffic
- Nick Bannon assigned to @zixty
assigned to @zixty
- Nick Bannon assigned to @dylanh333 and unassigned @zixty
assigned to @dylanh333 and unassigned @zixty
- Nick Bannon assigned to @zixty and unassigned @dylanh333
assigned to @zixty and unassigned @dylanh333
- Owner
@zixty , @dylanh333 , @i2n2z expressed interest in building a service that uses MFA
- Owner
- @bird - we could use a hand!
- Stretch goal:
- A successful MFA auth could also be used to self-service temporarily allowlist/un-
fail2ban
other services/servers? as in #51 (comment 396)
- A successful MFA auth could also be used to self-service temporarily allowlist/un-
- Owner
Running a genuine upstream OpenBSD server would have saved us from:
- https://security-tracker.debian.org/tracker/CVE-2024-3094
- https://security-tracker.debian.org/tracker/CVE-2024-6387
...of course, we may have been behind far enough to have been exposed to more likely bugs instead?
- Owner
@mtearle : https://bsd-cloud-image.org/ with cloud init magic might be a good place to start....
Edited by Nick Bannon - Owner
The 2FA/MFA part is being tracked in #73 , though it may have different implementations on *BSD and Linux distros.
This bug is to track the building of a config-managed? bastion host, and yes, we would like enhanced logging and MFA.
Edited by Nick Bannon