cdr:vms:web-server

ubnetdef

Our front-facing public webserver. You're literally connected to this server right now, as you're on our wiki.

  • IP: 128.205.44.157
  • IP: 192.168.0.21 (Red Team Network)
  • Reverse DNS: net-def.cse.buffalo.edu
  • vCenter Cluster: UBNetDef / LEGACY
  • vCenter Datastore: cdr-iscsi1

Accounts on this machine is manually controlled.

As this machine is dual-homed, we have additional firewall rules on it. Below is the (saved) IPTables rules.

/etc/iptables/rules.v4
# Generated by iptables-save v1.4.21 on Fri Mar 24 01:42:12 2017
*filter
:INPUT DROP [1:36]
:FORWARD ACCEPT [0:0]
:OUTPUT DROP [1:84]
-A INPUT -i lo -j ACCEPT
-A INPUT -p tcp -m tcp --dport 22 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT
-A INPUT -p udp -m udp --dport 123 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT
-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A OUTPUT -o lo -j ACCEPT
-A OUTPUT -p tcp -m tcp -d 128.205.32.55 --dport 25 -j ACCEPT
-A OUTPUT -p tcp -m tcp --dport 53 -j ACCEPT
-A OUTPUT -p udp -m udp --dport 53 -j ACCEPT
-A OUTPUT -p tcp -m tcp --dport 80 -j ACCEPT
-A OUTPUT -p udp -m udp --dport 123 -j ACCEPT
-A OUTPUT -p tcp -m tcp --dport 443 -j ACCEPT
-A OUTPUT -d 128.205.44.172/32 -p udp -m udp --dport 1514 -j ACCEPT
-A OUTPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
COMMIT
# Completed on Fri Mar 24 01:42:12 2017

fail2ban is installed, protecting against SSH bruteforce attacks. Don't mess up a login multiple times, as your IP will be banned.

  • cdr/vms/web-server.1491942806.txt.gz
  • Last modified: 2017/04/11 20:33
  • by jamesdro