Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Blocking external traffic from nodes not on Digital Ocean #20

Closed
josegonzalez opened this issue Jul 5, 2016 · 6 comments · Fixed by #31 or #33
Closed

Blocking external traffic from nodes not on Digital Ocean #20

josegonzalez opened this issue Jul 5, 2016 · 6 comments · Fixed by #31 or #33

Comments

@josegonzalez
Copy link

I have a use case where I need to have services listening on an external interface so that I can properly reference them across each server. In AWS, you could simply have the interface be 0.0.0.0 and block all traffic that is not within the security group attached to an instance.

In the ideal case, we could block all traffic that isn't coming from any of our instances IPs and then just use a jumpbox when attempting to access those servers. Perhaps a second chain like droplan-external-peers could be used in this case?

@tam7t
Copy link
Owner

tam7t commented Jul 19, 2016

I've considered adding support for the public interface (instead of/in addition to) the private interface, but most use cases I've come up with could be solved by just using the private interface and dropping all traffic on the public side (except for a jump/ingress box). Is there something preventing you from listening on 0.0.0.0 and adding a rule to drop traffic on the public iface?

@josegonzalez
Copy link
Author

There are cases where software might explicitly bind to the external interface or not understand how to use the internal interface for tunneling. In my case, it would be a vpn box whose OSS solution only allows public ip usage, and thus wouldn't work as well if we dropped all traffic on the public iface.

@tam7t
Copy link
Owner

tam7t commented Aug 12, 2016

I'm thinking about a flag PUBLIC_INTERFACE=true environment variable to tell droplan to maintain adroplan-peers-public chain. Do you think that would work for your usecase?

@josegonzalez
Copy link
Author

Would I need to run droplan twice in that case?

@tam7t
Copy link
Owner

tam7t commented Oct 16, 2016

@josegonzalez This took a while, but release 1.2.0 adds a PUBLIC=true option that will only allow traffic from your other droplets, in addition to blocking traffic on the private interface if one exists.

@josegonzalez
Copy link
Author

<3

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants