Proxyout¶
Purpose¶
This system provides an outgoing http/https proxy for controlled access to external resources like APT repositories and code repositories. The decision to setup this system has been made due to often changing IP addresses of external repositories that lead to update problems on several other machines.
Application Links¶
This machine has no externaly exposed URLs.
Administration¶
System Administration¶
Primary: Jan Dittberner
Secondary: None
Todo
find an additional admin
Application Administration¶
Application |
Administrator(s) |
---|---|
Squid |
Contact¶
Additional People¶
No additional people have sudo access on that machine.
Basics¶
Physical Location¶
This system is located in an LXC container on physical machine Infra02.
Logical Location¶
- IP Internet:
None
- IP Intranet:
None
- IP Internal:
- IPv6:
- MAC address:
00:16:3e:15:b8:8c
(eth0)
See also
See Network
Monitoring¶
- internal checks:
DNS¶
Todo
setup DNS records (in infra.cacert.org zone)
See also
Operating System¶
Debian GNU/Linux 11 Bullseye
Services¶
Listening services¶
Port |
Service |
Origin |
Purpose |
---|---|---|---|
22/tcp |
ssh |
ANY |
admin console access |
25/tcp |
smtp |
local |
mail delivery to local MTA |
3128/tcp |
http |
internal |
squid http/https proxy |
5665/tcp |
icinga2 |
monitor |
remote monitoring service |
Running services¶
Service |
Usage |
Start mechanism |
---|---|---|
cron |
job scheduler |
systemd unit |
dbus-daemon |
System message bus daemon |
systemd unit |
Exim |
SMTP server for local mail submission |
systemd unit |
icinga2 |
Icinga2 monitoring agent |
systemd unit |
openssh server |
ssh daemon for remote administration |
systemd unit |
Puppet agent |
configuration management agent |
systemd unit |
rsyslog |
syslog daemon |
systemd unit |
Squid |
Caching and filtering http/https proxy for internal machines |
systemd unit |
Connected Systems¶
Outbound network connections¶
Security¶
SSH host keys¶
Algorithm |
Fingerprints |
---|---|
RSA |
|
DSA |
- |
ECDSA |
|
ED25519 |
|
See also
Non-distribution packages and modifications¶
The Puppet agent package and a few dependencies are installed from the official Puppet APT repository because the versions in Debian are too old to use modern Puppet features.
Risk assessments on critical packages¶
Squid is a proven http and https proxy installed from distribution packages with low risk.
The system uses third party packages with a good security track record and regular updates. The attack surface is small due to the tightly restricted access to the system. The puppet agent is not exposed for access from outside the system.
Critical Configuration items¶
The system configuration is managed via Puppet profiles. There should be no configuration items outside of the CAcert Git repository cacert-puppet.
Tasks¶
Adding ACLs to Squid¶
Add required lines to the profiles::squid::acls
item in Hiera data for node
proxyout.
Changes¶
Planned¶
Todo
Change all infrastructure hosts to use this machine as APT proxy to avoid flaky firewall configurations on infra02.
System Future¶
No plans
Additional documentation¶
See also