ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Linux Lab Project: Building a Linux Jump Box

    IT Discussion
    centos 7 ssh server jumpbox projects jump server linux jump station ntg lab scale hc3 centos unix scale
    14
    56
    15.8k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • wirestyle22W
      wirestyle22
      last edited by wirestyle22

      @scottalanmiller said in Linux Lab Project: Building a Linux Jump Box:

      Correct, that's one option. Or you could use it in additional to the other security layers for even more security. By having the jump box layer of security you can, for example, restrict all remote access to protocols like SSH or RDP to have to originate from a single source.

      Would the jumpbox also be a single point of failure though?

      travisdh1T scottalanmillerS 2 Replies Last reply Reply Quote 0
      • travisdh1T
        travisdh1 @wirestyle22
        last edited by

        @wirestyle22 said in Linux Lab Project: Building a Linux Jump Box:

        @scottalanmiller said in Linux Lab Project: Building a Linux Jump Box:

        Correct, that's one option. Or you could use it in additional to the other security layers for even more security. By having the jump box layer of security you can, for example, restrict all remote access to protocols like SSH or RDP to have to originate from a single source.

        Would the jumpbox also be a single point of failure though?

        Well sure, but how long is it going to take to restore? A jumpbox should be a minimal install of "pick your favorite distribution". Shouldn't be more than a couple minutes to restore it.

        wirestyle22W JaredBuschJ 2 Replies Last reply Reply Quote 2
        • wirestyle22W
          wirestyle22 @travisdh1
          last edited by

          @travisdh1 said in Linux Lab Project: Building a Linux Jump Box:

          @wirestyle22 said in Linux Lab Project: Building a Linux Jump Box:

          @scottalanmiller said in Linux Lab Project: Building a Linux Jump Box:

          Correct, that's one option. Or you could use it in additional to the other security layers for even more security. By having the jump box layer of security you can, for example, restrict all remote access to protocols like SSH or RDP to have to originate from a single source.

          Would the jumpbox also be a single point of failure though?

          Well sure, but how long is it going to take to restore? A jumpbox should be a minimal install of "pick your favorite distribution". Shouldn't be more than a couple minutes to restore it.

          Yeah. Figured I'd ask though to see how people responded

          1 Reply Last reply Reply Quote 0
          • JaredBuschJ
            JaredBusch @travisdh1
            last edited by

            @travisdh1 said in Linux Lab Project: Building a Linux Jump Box:

            @wirestyle22 said in Linux Lab Project: Building a Linux Jump Box:

            @scottalanmiller said in Linux Lab Project: Building a Linux Jump Box:

            Correct, that's one option. Or you could use it in additional to the other security layers for even more security. By having the jump box layer of security you can, for example, restrict all remote access to protocols like SSH or RDP to have to originate from a single source.

            Would the jumpbox also be a single point of failure though?

            Well sure, but how long is it going to take to restore? A jumpbox should be a minimal install of "pick your favorite distribution". Shouldn't be more than a couple minutes to restore it.

            Well, assuming you have all your private keys backed up and such.

            Better solution would be to have backups and restore one.

            1 Reply Last reply Reply Quote 2
            • scottalanmillerS
              scottalanmiller @black3dynamite
              last edited by

              @black3dynamite said in Linux Lab Project: Building a Linux Jump Box:

              How would a jump box used when access a Windows environment? Would I need to setup a jump box with a desktop environment like xfce or windows manager like i3. And then use something like Remmina to remote into a Windows Admin box to manage Servers and such.

              • SSH same as Linux if you want.
              • PowerShell Remoting
              • or RDP on the OS of your choice. Jump box could be Windows too.
              1 Reply Last reply Reply Quote 0
              • scottalanmillerS
                scottalanmiller @RamblingBiped
                last edited by

                @RamblingBiped said in Linux Lab Project: Building a Linux Jump Box:

                @black3dynamite said in Linux Lab Project: Building a Linux Jump Box:

                How would a jump box used when access a Windows environment? Would I need to setup a jump box with a desktop environment like xfce or windows manager like i3. And then use something like Remmina to remote into a Windows Admin box to manage Servers and such.

                You could setup SSH tunneling and just do secure RDP sessions over SSH. No desktop environment required on your jumpbox.

                http://www.linuxjournal.com/content/ssh-tunneling-poor-techies-vpn

                Or use Guacamole which handles that for you.

                1 Reply Last reply Reply Quote 0
                • scottalanmillerS
                  scottalanmiller @wirestyle22
                  last edited by

                  @wirestyle22 said in Linux Lab Project: Building a Linux Jump Box:

                  @scottalanmiller said in Linux Lab Project: Building a Linux Jump Box:

                  Correct, that's one option. Or you could use it in additional to the other security layers for even more security. By having the jump box layer of security you can, for example, restrict all remote access to protocols like SSH or RDP to have to originate from a single source.

                  Would the jumpbox also be a single point of failure though?

                  For access, yes. But loss of access is not a production impact. And jump boxes are stateless so totally trivial to make redundant.

                  1 Reply Last reply Reply Quote 1
                  • JaredBuschJ
                    JaredBusch @scottalanmiller
                    last edited by JaredBusch

                    @scottalanmiller said in Linux Lab Project: Building a Linux Jump Box:

                    First you would create users and SSH keys and then deploy them to the other boxes that you wish to connect to. This is the core of what makes the Jump Box a Jump Box. This is standard SSH key setup, nothing unique to a Jump Box.

                    Did you ever make a good write up on creating users and SSH keys? If so, I cannot find it.

                    I mean, I know how to make and use keys in general. But detail here would be good.

                    1. Write up for creating the users on the jump box and getting their SSH keys.
                    2. Write up for pushing users and keys to other systems that said jump box will be allowing access.
                    3. Write up for control of said access.
                      1. Bob and Jill have access to Jump Box.
                      2. Bob has Access to servers 1 & 2.
                      3. Jill has access to server 2 & 3.
                    JaredBuschJ 1 Reply Last reply Reply Quote 1
                    • JaredBuschJ
                      JaredBusch @scottalanmiller
                      last edited by

                      Additional steps that are often interesting are to add two factor authentication to the Jump Box, such as Google Authenticator.

                      Anyone know a solid guide for adding Google auth to Fedora before I just google one up in the morning?

                      black3dynamiteB 1 Reply Last reply Reply Quote 1
                      • black3dynamiteB
                        black3dynamite @JaredBusch
                        last edited by black3dynamite

                        @JaredBusch said in Linux Lab Project: Building a Linux Jump Box:

                        Additional steps that are often interesting are to add two factor authentication to the Jump Box, such as Google Authenticator.

                        Anyone know a solid guide for adding Google auth to Fedora before I just google one up in the morning?

                        This might help getting you started. Although it's based on CentOS using yum instead dnf.
                        https://mangolassi.it/topic/6174/lab-project-2fa-with-google-authenticator/2

                        NerdyDadN 1 Reply Last reply Reply Quote 0
                        • NerdyDadN
                          NerdyDad @black3dynamite
                          last edited by

                          @black3dynamite That's because Centos is still using yum and not dnf yet.

                          1 Reply Last reply Reply Quote 0
                          • JaredBuschJ
                            JaredBusch @JaredBusch
                            last edited by

                            @JaredBusch said in Linux Lab Project: Building a Linux Jump Box:

                            @scottalanmiller said in Linux Lab Project: Building a Linux Jump Box:

                            First you would create users and SSH keys and then deploy them to the other boxes that you wish to connect to. This is the core of what makes the Jump Box a Jump Box. This is standard SSH key setup, nothing unique to a Jump Box.

                            Did you ever make a good write up on creating users and SSH keys? If so, I cannot find it.

                            I mean, I know how to make and use keys in general. But detail here would be good.

                            1. Write up for creating the users on the jump box and getting their SSH keys.
                            2. Write up for pushing users and keys to other systems that said jump box will be allowing access.
                            3. Write up for control of said access.
                              1. Bob and Jill have access to Jump Box.
                              2. Bob has Access to servers 1 & 2.
                              3. Jill has access to server 2 & 3.

                            I know that @scottalanmiller has mentioned in another thread that he has a script to push this all out (question 2). I can only assume that the script has some controls to tell you which server so shove the key and user logon to (question 3).

                            1 Reply Last reply Reply Quote 1
                            • 1
                            • 2
                            • 3
                            • 3 / 3
                            • First post
                              Last post