Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Restrict access to Jenkins Server by default #76

Open
PaulDuvall opened this issue May 17, 2016 · 4 comments
Open

Restrict access to Jenkins Server by default #76

PaulDuvall opened this issue May 17, 2016 · 4 comments
Assignees

Comments

@PaulDuvall
Copy link
Contributor

Restrict access to a non-existent IP Address by default and require the user to enter their /32 IP as a parameter.

@jeffb-stell
Copy link

255.255.255.255/32 is a good IP for this (never matches, doesn't throw errors in APIs)

@vrivellino
Copy link
Contributor

FWIW, AWS suggest 127.0.0.1/32 when you need to limit egress on security groups defined in CloudFormation. If, for whatever reason, AWS were to allow broadcast traffic in a VPC, 255.255.255.255/32 would match it. Where as the loopback netblock should never be seen outside of the loopback device.

PS: Hope all is well over at Stelligent. ;)

@akuma12 akuma12 self-assigned this Jan 6, 2017
@akuma12
Copy link

akuma12 commented Jan 6, 2017

I created a pull request that fixes this issue. It restricts all inbound SSH rules to only the creator's IP Address at the /32 range. Should web access on port 8080 be restricted as well? That's an easy change.

@PaulDuvall
Copy link
Contributor Author

@akuma12 Yes, thanks. Btw, I'll be creating a new issue to remove the need for Jenkins and use CodeBuild, but we'll get to it when we can :-)

@cplee cplee mentioned this issue Jan 7, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

4 participants