summaryrefslogtreecommitdiff
path: root/docs/systems/proxyout.rst
blob: f48d76ec39b4795dfb657c02018e991c1ff20e65 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
.. index::
   single: Systems; Proxyout

========
Proxyout
========

Purpose
=======

This system provides an outgoing http/https proxy for controlled access to
external resources like APT repositories and code repositories. The decision
to setup this system has been made due to often changing IP addresses of
external repositories that lead to update problems on several other machines.

Application Links
-----------------

This machine has no externaly exposed URLs.

Administration
==============

System Administration
---------------------

* Primary: :ref:`people_jandd`
* Secondary: None

.. todo:: find an additional admin

Application Administration
--------------------------

+-------------+---------------------+
| Application | Administrator(s)    |
+=============+=====================+
| Squid       | :ref:`people_jandd` |
+-------------+---------------------+

Contact
-------

* proxyout-admin@cacert.org

Additional People
-----------------

* None

Basics
======

Physical Location
-----------------

This system is located in an :term:`LXC` container on physical machine
:doc:`infra02`.

Logical Location
----------------

:IP Internet: None
:IP Intranet: None
:IP Internal: :ip:v4:`10.0.0.201`
:IPv6:        :ip:v6:`2001:7b8:616:162:2::201`
:MAC address: :mac:`00:16:3e:15:b8:8c` (eth0)

.. seealso::

   See :doc:`../network`

.. index::
   single: Monitoring; Proxyout

Monitoring
----------

:internal checks: :monitor:`proxyout.infra.cacert.org`

DNS
---

.. index::
   single: DNS records; Proxyout

.. todo:: setup DNS records (in infra.cacert.org zone)

.. seealso::

   See :wiki:`SystemAdministration/Procedures/DNSChanges`

Operating System
----------------

.. index::
   single: Debian GNU/Linux; Buster
   single: Debian GNU/Linux; 10.0

* Debian GNU/Linux 10.0

Applicable Documentation
------------------------

The system is managed by :doc:`puppet`. The puppet repository is browsable at
https://git.cacert.org/gitweb/?p=cacert-puppet.git;a=summary.

Services
========

Listening services
------------------

+----------+---------+----------+----------------------------+
| Port     | Service | Origin   | Purpose                    |
+==========+=========+==========+============================+
| 22/tcp   | ssh     | ANY      | admin console access       |
+----------+---------+----------+----------------------------+
| 25/tcp   | smtp    | local    | mail delivery to local MTA |
+----------+---------+----------+----------------------------+
| 3128/tcp | http    | internal | squid http/https proxy     |
+----------+---------+----------+----------------------------+
| 5665/tcp | icinga2 | monitor  | remote monitoring service  |
+----------+---------+----------+----------------------------+

Running services
----------------

.. index::
   single: cron
   single: dbus
   single: exim
   single: icinga2
   single: openssh
   single: puppet
   single: rsyslog
   single: squid

+----------------+--------------------------+----------------------------------+
| Service        | Usage                    | Start mechanism                  |
+================+==========================+==================================+
| cron           | job scheduler            | systemd unit ``cron.service``    |
+----------------+--------------------------+----------------------------------+
| dbus-daemon    | System message bus       | systemd unit ``dbus.service``    |
|                | daemon                   |                                  |
+----------------+--------------------------+----------------------------------+
| Exim           | SMTP server for          | systemd unit ``exim4.service``   |
|                | local mail submission    |                                  |
+----------------+--------------------------+----------------------------------+
| icinga2        | Icinga2 monitoring agent | systemd unit ``icinga2.service`` |
+----------------+--------------------------+----------------------------------+
| openssh server | ssh daemon for           | systemd unit ``ssh.service``     |
|                | remote administration    |                                  |
+----------------+--------------------------+----------------------------------+
| Puppet agent   | configuration management | systemd unit ``puppet.service``  |
|                | agent                    |                                  |
+----------------+--------------------------+----------------------------------+
| rsyslog        | syslog daemon            | systemd unit ``rsyslog.service`` |
+----------------+--------------------------+----------------------------------+
| Squid          | Caching and filtering    | systemd unit ``squid.service``   |
|                | http/https proxy for     |                                  |
|                | internal machines        |                                  |
+----------------+--------------------------+----------------------------------+

Connected Systems
-----------------

* :doc:`blog`
* :doc:`board`
* :doc:`bugs`
* :doc:`cats`
* :doc:`email`
* :doc:`emailout`
* :doc:`git`
* :doc:`ircserver`
* :doc:`jenkins`
* :doc:`lists`
* :doc:`monitor`
* :doc:`motion`
* :doc:`proxyin`
* :doc:`puppet`
* :doc:`svn`
* :doc:`test`
* :doc:`translations`
* :doc:`web`
* :doc:`webstatic`

Outbound network connections
----------------------------

* :doc:`infra02` as resolving nameserver
* :doc:`emailout` as SMTP relay
* :doc:`puppet` (tcp/8140) as Puppet master
* .debian.org Debian mirrors
* apt.puppetlabs.com as Debian repository for puppet packages
* HTTP and HTTPS servers specified in the squid configuration

Security
========

.. sshkeys::
   :RSA:     SHA256:TfsDuQ2tuWnTlpLnFILxlZa+IOpC97QmxDAlGgCa0/I MD5:1e:8e:1d:06:a5:fa:d6:08:95:e9:68:fb:ae:16:24:8f
   :ECDSA:   SHA256:d79XAVk0pspIVoI7i4ffohM7PjaBMJdh1J4yv+4Z5ms MD5:74:70:63:b9:3e:6b:9f:a2:34:0e:9a:92:77:dd:93:73
   :ED25519: SHA256:26yiJUT3NfqpFDLgAgXSsRL7ppMiIpNqKmfDiMxpAqc MD5:43:0d:1e:ec:1b:5f:c3:84:38:c7:75:b7:be:3c:1b:d4

Non-distribution packages and modifications
-------------------------------------------

The Puppet agent package and a few dependencies are installed from the official
Puppet APT repository because the versions in Debian are too old to use modern
Puppet features.

Risk assessments on critical packages
-------------------------------------

Squid is a proven http and https proxy installed from distribution packages
with low risk.

The system uses third party packages with a good security track record and
regular updates. The attack surface is small due to the tightly restricted
access to the system. The puppet agent is not exposed for access from outside
the system.

Critical Configuration items
============================

The system configuration is managed via Puppet profiles. There should be no
configuration items outside of the Puppet repository.

Tasks
=====

Adding ACLs to Squid
--------------------

Add required lines to the ``profiles::squid::acls`` item in Hiera data for node
proxyout.

Changes
=======

Planned
-------

.. todo:: Change all infrastructure hosts to use this machine as APT proxy to
          avoid flaky firewall configurations on :doc:`infra02`.

System Future
-------------

* No plans

Additional documentation
========================

.. seealso::

   * :wiki:`Exim4Configuration`

References
----------

* http://www.squid-cache.org/