Proxyout

Purpose

This system provides an outgoing http/https proxy for controlled access to external resources like APT repositories and code repositories. The decision to setup this system has been made due to often changing IP addresses of external repositories that lead to update problems on several other machines.

Administration

System Administration

Todo

find an additional admin

Application Administration

Application

Administrator(s)

Squid

Jan Dittberner

Contact

Additional People

No additional people have sudo access on that machine.

Basics

Physical Location

This system is located in an LXC container on physical machine Infra02.

Logical Location

IP Internet:

None

IP Intranet:

None

IP Internal:

10.0.0.201

IPv6:

2001:7b8:616:162:2::201

MAC address:

00:16:3e:15:b8:8c (eth0)

See also

See Network

Monitoring

internal checks:

Monitoring checks for proxyout.infra.cacert.org

DNS

Todo

setup DNS records (in infra.cacert.org zone)

Operating System

  • Debian GNU/Linux 11 Bullseye

Services

Listening services

Port

Service

Origin

Purpose

22/tcp

ssh

ANY

admin console access

25/tcp

smtp

local

mail delivery to local MTA

3128/tcp

http

internal

squid http/https proxy

5665/tcp

icinga2

monitor

remote monitoring service

Running services

Service

Usage

Start mechanism

cron

job scheduler

systemd unit cron.service

dbus-daemon

System message bus daemon

systemd unit dbus.service

Exim

SMTP server for local mail submission

systemd unit exim4.service

icinga2

Icinga2 monitoring agent

systemd unit icinga2.service

openssh server

ssh daemon for remote administration

systemd unit ssh.service

Puppet agent

configuration management agent

systemd unit puppet.service

rsyslog

syslog daemon

systemd unit rsyslog.service

Squid

Caching and filtering http/https proxy for internal machines

systemd unit squid.service

Connected Systems

Outbound network connections

  • Infra02 as resolving nameserver

  • Emailout as SMTP relay

  • Puppet (tcp/8140) as Puppet master

  • .debian.org Debian mirrors

  • apt.puppetlabs.com as Debian repository for puppet packages

  • HTTP and HTTPS servers specified in the squid configuration

Security

SSH host keys

Algorithm

Fingerprints

RSA

SHA256:TfsDuQ2tuWnTlpLnFILxlZa+IOpC97QmxDAlGgCa0/I, MD5:1e:8e:1d:06:a5:fa:d6:08:95:e9:68:fb:ae:16:24:8f

DSA

-

ECDSA

SHA256:d79XAVk0pspIVoI7i4ffohM7PjaBMJdh1J4yv+4Z5ms, MD5:74:70:63:b9:3e:6b:9f:a2:34:0e:9a:92:77:dd:93:73

ED25519

SHA256:26yiJUT3NfqpFDLgAgXSsRL7ppMiIpNqKmfDiMxpAqc, MD5:43:0d:1e:ec:1b:5f:c3:84:38:c7:75:b7:be:3c:1b:d4

Non-distribution packages and modifications

The Puppet agent package and a few dependencies are installed from the official Puppet APT repository because the versions in Debian are too old to use modern Puppet features.

Risk assessments on critical packages

Squid is a proven http and https proxy installed from distribution packages with low risk.

The system uses third party packages with a good security track record and regular updates. The attack surface is small due to the tightly restricted access to the system. The puppet agent is not exposed for access from outside the system.

Critical Configuration items

The system configuration is managed via Puppet profiles. There should be no configuration items outside of the CAcert Git repository cacert-puppet.

Tasks

Adding ACLs to Squid

Add required lines to the profiles::squid::acls item in Hiera data for node proxyout.

Changes

Planned

Todo

Change all infrastructure hosts to use this machine as APT proxy to avoid flaky firewall configurations on infra02.

System Future

  • No plans

Additional documentation

References