Closed xmonader closed 1 week ago
blocked on specs from @delandtj
Thinking about this,
zos
housekeeping can be brokenzos
bridge?)only traffic to router is allowed
- we don'need to do anything for this because it is the default behavior
he whitelists for outgoing traffic come from a github repo which is signed by us,
dns
to make http works
mycelium
is not restrictedNow a question : What use is a vm if it doesn't have Internet (because a few whitelisted hosts can hardly be called 'Internet')? In essence, we are defining 'Something' but still have no clue of WHAT we want to obtain. Saying that a VM can not be abused for 'hacking' and have a feature request for 'restrict outgoing traffic' doesn't cover the slightest bit of what is really necessary. Most of it is more policy than implementation. Policy :
I'm sure I'm already missing a whole slew of cases, but we need to find them all, define policy and then code something, not the other way around.
Good points @delandtj.Also if all users go through KYC maybe this outgoing traffic restriction is not as necessary for the farmers+grid's security.
Well, i thought that the brief specs in the issue description was a result of some discussions, but looks like it was not.
I have some questions:
why we need to make restrictions?
Also if all users go through KYC maybe this outgoing traffic restriction is not as necessary for the farmers+grid's security.
Yes, it certainly helps
Rather than creating policy about what to restricts, this is my thought:
As I understand, we won't go forward with this as KYC fixes lots of this issue.
@sabrinasadik or @xmonader If you could please confirm and close the issue if possible. Thanks.
status quo: no need to do any sort of allowed / denied lists given that KYC is enforced, the only concern is local lan security
Great. Any link to the local lan security so I can track on gitea? Thanks.
restricted outgoing network, only traffic to router is allowed (we get router info over DHCP, auto config) default whitelisted outgoing web traffic (can be turned off by farmer), which means VM's can only go to whitelisted services (https) and web domains (can be with filter e.g. *.ubuntu.com), this to make sure people cannot use our VM's for e.g. hacking the whitelists for outgoing traffic come from a github repo which is signed by us, this gets reloaded every hour
check with @delandtj