Re: Restrict SSH to local network only except for Git users?

2023-07-26 Thread Stephen Wiley


You might consider keeping your repo in an web/http directory for pulling and
having your other users submit patches to you via eg email. That way you don't
need ssh exposed to the public internet at all.
That's how I have my self hosted git repos set up anyway.

On Thu, Jul 27, 2023 at 09:24:56AM +0900, lain. wrote:
> I have a pretty nifty network setup that allows me to host from home via
> WireGuard.
> But there's one thing I'm struggling with.
> Because for security reasons, I made it impossible for people outside
> the network to connect via SSH, but for Git to function properly, I need
> to allow SSH only for git@(DOMAIN) or git@(PUBLIC IP), and redirect that
> to my home network so they can do stuff like "git pull", "git push", and
> all the other fancy stuff.
> 
> My pf.conf rules look like this:
> > pass in quick on wg0 proto tcp from 192.168.0.0/24 to any port 22
> > pass in on $externalinterface proto tcp from any to $externalip port 22 
> > rdr-to $internalip
> > block in quick on egress proto tcp from any to any port 22
> 
> And my sshd_config:
> > AllowUsers lain@192.168.0.0/24
> > AllowUsers git@(DOMAIN)
> > AllowUsers git@(PUBLIC IP)
> 
> Where exactly am I doing wrong here?



Re: Restrict SSH to local network only except for Git users?

2023-07-26 Thread Aaron Mason
On Thu, Jul 27, 2023 at 10:28 AM lain.  wrote:
>
> I have a pretty nifty network setup that allows me to host from home via
> WireGuard.
> But there's one thing I'm struggling with.
> Because for security reasons, I made it impossible for people outside
> the network to connect via SSH, but for Git to function properly, I need
> to allow SSH only for git@(DOMAIN) or git@(PUBLIC IP), and redirect that
> to my home network so they can do stuff like "git pull", "git push", and
> all the other fancy stuff.
>
> My pf.conf rules look like this:
> > pass in quick on wg0 proto tcp from 192.168.0.0/24 to any port 22
> > pass in on $externalinterface proto tcp from any to $externalip port 22 
> > rdr-to $internalip
> > block in quick on egress proto tcp from any to any port 22
>
> And my sshd_config:
> > AllowUsers lain@192.168.0.0/24
> > AllowUsers git@(DOMAIN)
> > AllowUsers git@(PUBLIC IP)
>
> Where exactly am I doing wrong here?

I suspect you're overthinking this.

Rather than preventing access altogether, turn off password
authentication and use SSH keys for authentication - for the git
accounts, change the shell to git-shell if you haven't already. That
way, bad faith actors can try all they want, they ain't gettin' in
unless they get a hold of someone's key, and even if they do, it's
likely a git key and the shell (barring any security vulns in git)
will prevent them from doing anything not git related.

-- 
Aaron Mason - Programmer, open source addict
I've taken my software vows - for beta or for worse



Restrict SSH to local network only except for Git users?

2023-07-26 Thread lain.
I have a pretty nifty network setup that allows me to host from home via
WireGuard.
But there's one thing I'm struggling with.
Because for security reasons, I made it impossible for people outside
the network to connect via SSH, but for Git to function properly, I need
to allow SSH only for git@(DOMAIN) or git@(PUBLIC IP), and redirect that
to my home network so they can do stuff like "git pull", "git push", and
all the other fancy stuff.

My pf.conf rules look like this:
> pass in quick on wg0 proto tcp from 192.168.0.0/24 to any port 22
> pass in on $externalinterface proto tcp from any to $externalip port 22 
> rdr-to $internalip
> block in quick on egress proto tcp from any to any port 22

And my sshd_config:
> AllowUsers lain@192.168.0.0/24
> AllowUsers git@(DOMAIN)
> AllowUsers git@(PUBLIC IP)

Where exactly am I doing wrong here?


Re: JH7110 - VF2

2023-07-26 Thread Stuart Longland VK4MSL

On 27/7/23 03:26, develo...@robert-palm.de wrote:

Saw some commits for the JH7110.

I flashed the latest RISCV snapshot miniroot73.img to an SD card and 
plugged it into the VF 2. Couldn't boot unfortunately.


Commits on a master branch don't retrospectively magic their way into a 
previous release.

--
Stuart Longland (aka Redhatter, VK4MSL)

I haven't lost my mind...
  ...it's backed up on a tape somewhere.



JH7110 - VF2

2023-07-26 Thread developer

Saw some commits for the JH7110.

I flashed the latest RISCV snapshot miniroot73.img to an SD card and  
plugged it into the VF 2. Couldn't boot unfortunately.


Is that already possible ?
Or am I doing it wrong and there anything else to do than flashing the image ?



Re: RISCV mailing list

2023-07-26 Thread Theo de Raadt
develo...@robert-palm.de wrote:

> Zitat von Theo de Raadt :
> 
> > develo...@robert-palm.de wrote:
> >
> >> I suggest a mailing list for the RISCV arch.
> >>
> >> Ok?
> >
> >
> > It will be as popular and useful as the other per-architecture lists,
> > meaning -- it is the wrong approach.
> 
> Understand. Thanks.
> 
> In consequence the other arch lists should be dropped as there is not
> much traffic anyway?

this is more like a who cares



Re: RISCV mailing list

2023-07-26 Thread developer

Zitat von Theo de Raadt :


develo...@robert-palm.de wrote:


I suggest a mailing list for the RISCV arch.

Ok?



It will be as popular and useful as the other per-architecture lists,
meaning -- it is the wrong approach.


Understand. Thanks.

In consequence the other arch lists should be dropped as there is not  
much traffic anyway?






Re: RISCV mailing list

2023-07-26 Thread Theo de Raadt
develo...@robert-palm.de wrote:

> I suggest a mailing list for the RISCV arch.
> 
> Ok?


It will be as popular and useful as the other per-architecture lists,
meaning -- it is the wrong approach.



RISCV mailing list

2023-07-26 Thread developer

I suggest a mailing list for the RISCV arch.

Ok?