Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Do full security audit #206

Open
bburns opened this issue Dec 16, 2022 · 3 comments
Open

Do full security audit #206

bburns opened this issue Dec 16, 2022 · 3 comments
Labels
enhancement New feature or request infrastructure Anything related to the surrounding tools and infrastructure

Comments

@bburns
Copy link
Contributor

bburns commented Dec 16, 2022

No description provided.

@MRIIOT
Copy link
Contributor

MRIIOT commented Dec 17, 2022

What type of audits are required?

@bburns bburns changed the title security audit do full security audit Dec 17, 2022
@bburns
Copy link
Contributor Author

bburns commented Dec 17, 2022

i don't know too much about the topic, but some ideas -

-block unused ports
-block non-localhost ip addr access?
-audit our adapter, meter, relay Dockerfiles and build procedures
-what kind of schedule to rebuild docker images at client installations? monthly? automate eventually
-passwords - we tend to re-use pws across a client install, and for root access(?) - better way?
-postgres - make a user, give permissions to access certain tables/views

eg oxbox ports -

[pi@001-oxbox ~/ladder99/ladder99-ce]
$ ./list
NAMES       STATUS                 PORTS
adapter     Up 3 hours
agent       Up 4 weeks             0.0.0.0:5000->5000/tcp, :::5000->5000/tcp
backup      Up 4 weeks
dozzle      Up 4 weeks             0.0.0.0:8080->8080/tcp, :::8080->8080/tcp
grafana     Up 4 weeks             0.0.0.0:3000->3000/tcp, :::3000->3000/tcp
meter       Up 4 weeks
mosquitto   Up 4 weeks             0.0.0.0:1883->1883/tcp, :::1883->1883/tcp
nodered     Up 4 weeks (healthy)   0.0.0.0:1880->1880/tcp, :::1880->1880/tcp
pgadmin     Up 4 weeks             0.0.0.0:5050->5050/tcp, :::5050->5050/tcp
portainer   Up 4 weeks             8000/tcp, 9443/tcp, 0.0.0.0:9000->9000/tcp, :::9000->9000/tcp
postgres    Up 4 weeks             0.0.0.0:5432->5432/tcp, :::5432->5432/tcp
relay       Up 4 weeks
traefik     Up 4 weeks             0.0.0.0:80->80/tcp, :::80->80/tcp, 0.0.0.0:443->443/tcp, :::443->443/tcp

see also #183

@tukusejssirs tukusejssirs added enhancement New feature or request infrastructure Anything related to the surrounding tools and infrastructure labels Dec 22, 2022
@tukusejssirs tukusejssirs changed the title do full security audit Do full security audit Dec 22, 2022
@tukusejssirs
Copy link
Contributor

I am not quite sure if this issue should be labelled as enhancement or bug, as it is related to both.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request infrastructure Anything related to the surrounding tools and infrastructure
Projects
None yet
Development

No branches or pull requests

3 participants