ho-ansible / ansible

Playbooks and config for remote administration
1 stars 0 forks source link

sslh multiplexing #57

Closed seanho00 closed 7 years ago

seanho00 commented 7 years ago

SSL/TLS on port 443 is the only transport that can consistently get through firewalls, e.g., hotel Wi-Fi. Consider running all public-facing services through sslh multiplexing?

Or perhaps keep ssh separate on non-standard port, so ansible can still get in if sslh breaks?

May impact #56

seanho00 commented 7 years ago

Or maybe just keep VPN servers and web servers separate; I have plenty of VPSes to use. Tinc can stay on its default port for most hosts,and run on 443 on the VPN hosts.