Replies: 5 comments 7 replies
-
From #642:
This is totally legitimate, of course, though I do think that this would greatly benefit the project, as it would make it much easier to get into. Multiple people (such as me) seem to be interested in running public lighthouses, but are unsure about how to do so. Support in this area would be great as I really think such a community would be highly beneficial to the Nebula project as a whole. |
Beta Was this translation helpful? Give feedback.
-
Just to clarify, my main question here is about security and sandboxing the ip addresses rather than a Nebula public instance. I’m aware of the IP clash issue, but I’m hoping to get some thoughts from the devs on the subnet isolation idea and any security implications I may have overlooked. |
Beta Was this translation helpful? Give feedback.
-
If you limit users to subnets, eventually we will run out of IPs. IMO this is not an easy job at all. |
Beta Was this translation helpful? Give feedback.
-
nebula-lighthouse-service gets around a few of the issues mentioned by:
Logs on the public lighthouse will show all certificate names and IP addresses which might be a concern. |
Beta Was this translation helpful? Give feedback.
-
Thanks to some help from the Nebula guys on the slack channel, here is an outline of how to create clusters of devices in their own private network all from the same lighthouse, but without ability to access each other. Note that this doesn't resolve all the issues. There can still be IP clashes, and this doesn't solve all the issues for a potential public lighthouse, but it is a process for certificate sandboxing that could be part of the puzzle and provides one way to isolate groups of devices in a tamper proof way: Generate CAs:
Lighthouse:
Devices: Device1:
Device2:
Lighthouse example:
Device 1 example:
Device 2 example:
|
Beta Was this translation helpful? Give feedback.
-
There was a question in an issue about public lighthouses:
#642
I was curious about the security implications of this and any ways to mitigate them. Firewall rules could be used along with groups to isolate each ip, but would there still be a risk of ddos or other threats? What about if each was also given it’s own subnet with /32? I’m trying to understand the different implications.
Beta Was this translation helpful? Give feedback.
All reactions