ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Linux Lab Project: Building a Linux Jump Box

    Scheduled Pinned Locked Moved IT Discussion
    centos 7sshserverjumpboxprojectsjump serverlinuxjump stationntg labscale hc3centosunixscale
    56 Posts 14 Posters 16.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • wirestyle22W
      wirestyle22 @travisdh1
      last edited by

      @travisdh1 said in Linux Lab Project: Building a Linux Jump Box:

      @wirestyle22 said in Linux Lab Project: Building a Linux Jump Box:

      @scottalanmiller said in Linux Lab Project: Building a Linux Jump Box:

      Correct, that's one option. Or you could use it in additional to the other security layers for even more security. By having the jump box layer of security you can, for example, restrict all remote access to protocols like SSH or RDP to have to originate from a single source.

      Would the jumpbox also be a single point of failure though?

      Well sure, but how long is it going to take to restore? A jumpbox should be a minimal install of "pick your favorite distribution". Shouldn't be more than a couple minutes to restore it.

      Yeah. Figured I'd ask though to see how people responded

      1 Reply Last reply Reply Quote 0
      • JaredBuschJ
        JaredBusch @travisdh1
        last edited by

        @travisdh1 said in Linux Lab Project: Building a Linux Jump Box:

        @wirestyle22 said in Linux Lab Project: Building a Linux Jump Box:

        @scottalanmiller said in Linux Lab Project: Building a Linux Jump Box:

        Correct, that's one option. Or you could use it in additional to the other security layers for even more security. By having the jump box layer of security you can, for example, restrict all remote access to protocols like SSH or RDP to have to originate from a single source.

        Would the jumpbox also be a single point of failure though?

        Well sure, but how long is it going to take to restore? A jumpbox should be a minimal install of "pick your favorite distribution". Shouldn't be more than a couple minutes to restore it.

        Well, assuming you have all your private keys backed up and such.

        Better solution would be to have backups and restore one.

        1 Reply Last reply Reply Quote 2
        • scottalanmillerS
          scottalanmiller @black3dynamite
          last edited by

          @black3dynamite said in Linux Lab Project: Building a Linux Jump Box:

          How would a jump box used when access a Windows environment? Would I need to setup a jump box with a desktop environment like xfce or windows manager like i3. And then use something like Remmina to remote into a Windows Admin box to manage Servers and such.

          • SSH same as Linux if you want.
          • PowerShell Remoting
          • or RDP on the OS of your choice. Jump box could be Windows too.
          1 Reply Last reply Reply Quote 0
          • scottalanmillerS
            scottalanmiller @RamblingBiped
            last edited by

            @RamblingBiped said in Linux Lab Project: Building a Linux Jump Box:

            @black3dynamite said in Linux Lab Project: Building a Linux Jump Box:

            How would a jump box used when access a Windows environment? Would I need to setup a jump box with a desktop environment like xfce or windows manager like i3. And then use something like Remmina to remote into a Windows Admin box to manage Servers and such.

            You could setup SSH tunneling and just do secure RDP sessions over SSH. No desktop environment required on your jumpbox.

            http://www.linuxjournal.com/content/ssh-tunneling-poor-techies-vpn

            Or use Guacamole which handles that for you.

            1 Reply Last reply Reply Quote 0
            • scottalanmillerS
              scottalanmiller @wirestyle22
              last edited by

              @wirestyle22 said in Linux Lab Project: Building a Linux Jump Box:

              @scottalanmiller said in Linux Lab Project: Building a Linux Jump Box:

              Correct, that's one option. Or you could use it in additional to the other security layers for even more security. By having the jump box layer of security you can, for example, restrict all remote access to protocols like SSH or RDP to have to originate from a single source.

              Would the jumpbox also be a single point of failure though?

              For access, yes. But loss of access is not a production impact. And jump boxes are stateless so totally trivial to make redundant.

              1 Reply Last reply Reply Quote 1
              • JaredBuschJ
                JaredBusch @scottalanmiller
                last edited by JaredBusch

                @scottalanmiller said in Linux Lab Project: Building a Linux Jump Box:

                First you would create users and SSH keys and then deploy them to the other boxes that you wish to connect to. This is the core of what makes the Jump Box a Jump Box. This is standard SSH key setup, nothing unique to a Jump Box.

                Did you ever make a good write up on creating users and SSH keys? If so, I cannot find it.

                I mean, I know how to make and use keys in general. But detail here would be good.

                1. Write up for creating the users on the jump box and getting their SSH keys.
                2. Write up for pushing users and keys to other systems that said jump box will be allowing access.
                3. Write up for control of said access.
                  1. Bob and Jill have access to Jump Box.
                  2. Bob has Access to servers 1 & 2.
                  3. Jill has access to server 2 & 3.
                JaredBuschJ 1 Reply Last reply Reply Quote 1
                • JaredBuschJ
                  JaredBusch @scottalanmiller
                  last edited by

                  Additional steps that are often interesting are to add two factor authentication to the Jump Box, such as Google Authenticator.

                  Anyone know a solid guide for adding Google auth to Fedora before I just google one up in the morning?

                  black3dynamiteB 1 Reply Last reply Reply Quote 1
                  • black3dynamiteB
                    black3dynamite @JaredBusch
                    last edited by black3dynamite

                    @JaredBusch said in Linux Lab Project: Building a Linux Jump Box:

                    Additional steps that are often interesting are to add two factor authentication to the Jump Box, such as Google Authenticator.

                    Anyone know a solid guide for adding Google auth to Fedora before I just google one up in the morning?

                    This might help getting you started. Although it's based on CentOS using yum instead dnf.
                    https://mangolassi.it/topic/6174/lab-project-2fa-with-google-authenticator/2

                    NerdyDadN 1 Reply Last reply Reply Quote 0
                    • NerdyDadN
                      NerdyDad @black3dynamite
                      last edited by

                      @black3dynamite That's because Centos is still using yum and not dnf yet.

                      1 Reply Last reply Reply Quote 0
                      • JaredBuschJ
                        JaredBusch @JaredBusch
                        last edited by

                        @JaredBusch said in Linux Lab Project: Building a Linux Jump Box:

                        @scottalanmiller said in Linux Lab Project: Building a Linux Jump Box:

                        First you would create users and SSH keys and then deploy them to the other boxes that you wish to connect to. This is the core of what makes the Jump Box a Jump Box. This is standard SSH key setup, nothing unique to a Jump Box.

                        Did you ever make a good write up on creating users and SSH keys? If so, I cannot find it.

                        I mean, I know how to make and use keys in general. But detail here would be good.

                        1. Write up for creating the users on the jump box and getting their SSH keys.
                        2. Write up for pushing users and keys to other systems that said jump box will be allowing access.
                        3. Write up for control of said access.
                          1. Bob and Jill have access to Jump Box.
                          2. Bob has Access to servers 1 & 2.
                          3. Jill has access to server 2 & 3.

                        I know that @scottalanmiller has mentioned in another thread that he has a script to push this all out (question 2). I can only assume that the script has some controls to tell you which server so shove the key and user logon to (question 3).

                        1 Reply Last reply Reply Quote 1
                        • 1
                        • 2
                        • 3
                        • 3 / 3
                        • First post
                          Last post