-
-
Notifications
You must be signed in to change notification settings - Fork 11
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Restrict SSH to all VMs from VPN #4196
Comments
I would say puppet and VPN VMs should still be accessible via VPN. Should be possible to access them publicly when VPN is broken but by default shouldn't the same principals apply as the other VMs? |
|
Update: VPN need a bit of work:
=> tested manually with success, incoming PRs to persist and generalize |
Update: VPN routes are ready! Let's go with the 3 AWS machines |
|
Following CVE-2024-6387 (OpenSSH), we can improve the safety of the Jenkins Infra by restricting the inbound SSH connections on our VMs to only restricted subsets.
It would allow limiting the brute force attacks and other issues like this CVE. Of course it is not an absolute protection but it adds another layer of safety.
We have 4 kinds of VMs with different restrictions to apply (or already there):
AWS (CloudBees) account VMs:
pkg
(hosting pkg.origin.jenkins.io and updates.jenkins.io)census
(hosting census.jenkins.io)usage
(hosting usage.jenkins.io)DigitalOcean VMs:
archives
(hostingarchives.jenkins.io
)Azure private VMs:
Azure public VMs:
The text was updated successfully, but these errors were encountered: