Ingress03¶
Purpose¶
This system provides an incoming IPv4 TLS and HTTP proxy using nginx to share one public IPv4 address for multiple services on Infra03.
Application Links¶
No direct links, applications run on other systems.
Administration¶
System Administration¶
Primary: Jan Dittberner
Secondary: None
Application Administration¶
Application |
Administrator(s) |
---|---|
nginx |
Contact¶
Additional People¶
No additional people have sudo access on that machine.
Basics¶
Physical Location¶
This system is located in an LXC container on physical machine Infra03.
Logical Location¶
- IP Internet:
- IP Intranet:
- IP Internal:
- IPv6:
- MAC address:
00:ff:8f:34:8c:dd
(eth0)
See also
See Network
Monitoring¶
- internal checks:
- external checks:
DNS¶
Name |
Type |
Content |
---|---|---|
ingress03.cacert.org. |
IN A |
213.154.225.249 |
ingress03.cacert.org. |
IN AAAA |
2001:7b8:616:162:3::10 |
See also
Operating System¶
Debian GNU/Linux 11 Bullseye
Services¶
Listening services¶
Port |
Service |
Origin |
Purpose |
---|---|---|---|
22/tcp |
ssh |
ANY |
admin console access |
25/tcp |
smtp |
local |
mail delivery to local MTA |
80/tcp |
http |
ANY |
nginx reverse proxy |
443/tcp |
https |
ANY |
nginx SNI proxy |
5665/tcp |
icinga2 |
monitor |
remote monitoring service |
465/udp |
syslog |
local |
syslog port |
Running services¶
Service |
Usage |
Start mechanism |
---|---|---|
cron |
job scheduler |
systemd unit |
dbus-daemon |
System message bus |
systemd unit |
Exim |
SMTP server for local mail submission |
systemd unit |
icinga2 |
Icinga2 monitoring agent |
systemd unit |
openssh server |
ssh daemon for remote administration |
systemd unit |
Puppet agent |
configuration management agent |
systemd unit |
rsyslog |
syslog daemon |
systemd unit |
Connected Systems¶
Outbound network connections¶
Security¶
SSH host keys¶
Algorithm |
Fingerprints |
---|---|
RSA |
|
DSA |
- |
ECDSA |
|
ED25519 |
|
See also
Risk assessments on critical packages¶
The Puppet agent package and a few dependencies are installed from the official Puppet APT repository because the versions in Debian are too old to use modern Puppet features.
Critical Configuration items¶
The system configuration is managed via Puppet profiles. There is no configuration items outside of the CAcert Git repository cacert-puppet.
Tasks¶
Adding a new forward entry¶
Add an entry to the profiles::sniproxy::forwarded
item in
hieradata/nodes/ingress03.yaml
in CAcert Git repository cacert-puppet and adjust
the firewall configuration on Infra03. You will need to request DNS
changes from the critical team if you want to switch an existing service to use
the SNI proxy service.
Changes¶
Planned¶
None
System Future¶
No plans
Additional documentation¶
See also