cdr:vms:web-server

Web Server

Our front-facing public webserver. You're literally connected to this server right now, as you're on our wiki.

  • IP: 128.205.44.157
  • IP: 192.168.0.21 (Red Team Network)
  • Reverse DNS: net-def.cse.buffalo.edu
  • vCenter Cluster: MAIN
  • vCenter Datastore: cdr-iscsi1

Access to this server is controlled via our central authentication server.

As this machine is dual-homed, we have additional firewall rules on it. Below is the (saved) IPTables rules.

/etc/iptables/rules.v4
# Generated by iptables-save v1.4.21 on Mon Feb 19 17:37:45 2018
*filter
:INPUT DROP [15:1067]
:FORWARD ACCEPT [0:0]
:OUTPUT DROP [0:0]
:fail2ban-ssh - [0:0]
-A INPUT -p tcp -m multiport --dports 22 -j fail2ban-ssh
-A INPUT -i lo -j ACCEPT
-A INPUT -p tcp -m tcp --dport 22 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT
-A INPUT -p udp -m udp --dport 123 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT
-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A OUTPUT -o lo -j ACCEPT
-A OUTPUT -d 128.205.32.55/32 -p tcp -m tcp --dport 25 -j ACCEPT
-A OUTPUT -p tcp -m tcp --dport 53 -j ACCEPT
-A OUTPUT -p udp -m udp --dport 53 -j ACCEPT
-A OUTPUT -p tcp -m tcp --dport 80 -j ACCEPT
-A OUTPUT -p udp -m udp --dport 123 -j ACCEPT
-A OUTPUT -p tcp -m tcp --dport 443 -j ACCEPT
-A OUTPUT -d 192.168.0.50/32 -j ACCEPT
-A OUTPUT -d 128.205.44.172/32 -p udp -m udp --dport 1514 -j ACCEPT
-A OUTPUT -d 128.205.44.172/32 -p tcp -m tcp --dport 80 -j ACCEPT
-A OUTPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A OUTPUT -d 192.168.15.200/32 -p tcp -m tcp --dport 8080 -j ACCEPT
-A OUTPUT -d 192.168.13.138/32 -p tcp -m tcp --dport 22 -j ACCEPT
-A fail2ban-ssh -j RETURN
COMMIT
# Completed on Mon Feb 19 17:37:45 2018

fail2ban is installed, protecting against SSH bruteforce attacks. Don't mess up a login multiple times, as your IP will be banned.

  • cdr/vms/web-server.txt
  • Last modified: 2018/03/12 06:54
  • by jamesdro