Hi,

Le 2015-03-08 11:57, Mohammad alizadeh a écrit :
Hi experts,
I have a security issue in my last Openstack deployment.
As an enforced security policy, my Datacenter firewall blocks every ssh
requests except those sent to one valid IP address(specific machine in
DMZ). So, by this rule  customers can not access to their instances via
ssh. Is there a way to allow customers to connect to their instances
remotely via ssh? How can I use this single ssh-allowed machine to
connect customers to their instances via ssh?(maybe using VPN or other
techniques)?

A dedicated VPN box could be a solution, but requires more ports open on your DMZ firewall and a bit of work to get server as well as clients running.

You can also setup additional accounts on the box that has SSH allowed and let customers use those as a jump-box.
From there they may reconnect to their own boxes.

They may automate it a bit by putting something similar to the following in their .ssh/config

Host VM_HOST
  ProxyCommand ssh JUMP_BOX -W %h:%p

This approach has security implications, as your customers technically have access to your server's shell. You may restrict that by allowing only the ssh command in their public_key entry of .ssh/authorized_keys (on jump-box). This may require some more work as in http://binblog.info/2008/10/20/openssh-going-flexible-with-forced-commands/. Also they need to use ssh keys.

Finally, if only one IP is allowed through your firewall, I guess that the security guys want to prevent entry. Thus circumventing the rule by proxying the connections does not look like the best way to go. Maybe re-evaluating customer needs with the security team would help finding a better solution to the problem.

HTH.

--

Ahmed R.

_______________________________________________
OpenStack-operators mailing list
[email protected]
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators

Reply via email to