Keeping it on the list for future reference.
First, my second switch finally arrived today, so I'm close to
switching the jitsi server from Comcast to Frontier, once I'm happy
I've done whatever I'm going to do with all the below, although I'm
sure I'll continue to play with configuration for a while.
The goal here is to get the jitsi server moved over, but also have me
able to ssh into it from my main desktop or my laptop anywhere I am,
but block any other ssh access. Note that if I'm home, I always have
direct, physical access to the box, and it is a convenience, not a
necessity, so losing access if I'm on the road is not going to be a
disaster.
On 2024.04.01 08:19, Rudy S wrote:
> Hello Jack,
> I can help you with the ssh.
> But I have a few different ways of getting the IP address if you want.
I'm not sure any of this is necessary. Up to now, all my boxes are
behind a single public IP, and I've been using ddclient as a dynamic
DNS client to update NameCheap's DNS for
meet.ostroff.xyz. I have
migrated ddclient to run on the jitsi box itself. It was not trivial,
as that Ubuntu system is using an older version than I had running on
my Gentoo box, so there was some minor change needed in the config
file, but it's working fine. I'm toying with creating a domain entry
for the IP of the Eero router, but at least for now, I don't need any
incoming connections to anything there. I had briefly thought to
restrict incoming ssh to the jitsi server to that IP, but that won't
help me if I'm on the road, so I don't see any point right now.
>
> On my jump box I have a script that runs once a day that grabs the IP
> address and put’s it in a txt file.
> I am sure I can write something that will send you the file using ssh
> from Jitsi server to your ip or web address.
> I never got it to work, where it would send an email. Maybe Bob can
> help in this way.
> Then each day on a 2nd script it will send the ip to you so you know
> what it is and if it changed.
>
> I would not open the port 22, but I would change it to something like
> 1022
Given I assume "they" will be doing port scans anyway, what extra
security does this actually give me? Just more to remember to type
when I need to get in.
>
> $ ssh -p 1022 yourname@ipaddress or web address
>
> But what I would do is, when I setup shared key, I would add
> encryption to it, not like 1024 but maybe 500 or more
add encryption to what? At the moment, I have my private keys in
~/.ssh on all the relevant boxes - the jitsi server and my main desktop
and laptop. I am not yet using the key of any the computers themselves
as part of the protection, but it's something I'd like to add, if I can
find the right config file syntax (assuming it is possible.)
>
> Also, I am not sure if you have another server or computer, I always
> have 2 computers with shared keys that I able to get in from 2
> different places.
> This way if your main computer breaks, now you are screwed. But if
> you have another server with keys that allow you to get in then you
> always have a back door.
> If you do not have another computer, I can set one up with one of my
> computer. Then if you computer breaks, you just email me to log in
> with your new key and I can add it so you can get back in.
Yes - my main desktop and laptop. I also have my keys on another
desktop in the house. But, given I have easy physical access to the
server, getting locked out isn't really a problem unless the box gets
so compromised, I'd wipe and reinstall anyway.
>
I just copy/pasted from your second message to get everytihg together.
>
> First of all, I kinda got what you were saying about port forwarding
> on you home network. You got it to work and that is great.
Just to recap, the jitsi software requires By default these ports are
TCP/443 and UDP/10000. I thought there were more, but this is all I
can find right now in the docs. I recently added port TCP/22 for ssh.
>
> Jitsi server,
> As that goes, I do not want to tell you how to do it, but give you
> ideas of ways to get it to work.
> If I had to do it, I would put in 2 ethernet cards.
> 1 = I would firewall everything but open only port 443
> 2 = I would firewall everything except for port 22
Why separate cards? Both would end up connecting to the switch between
the ONT and the Eero.
>
> 1 = I could connect directly to the internet.
Yes, that's the current plan - one switch with the ONT, the Eero
router, and the Jitsi server. The other switch is on the LAN side of
the Eero router with all my other wired devices.
> 2 = I would connect a wire to my home network and configure it with a
> static ip. Then when I am done ssh ing in, I would disconnect the
> either net cable and then there is no way anyone can hack in.
That's an interesting approach, but as I now think I'd like to be able
to ssh in from elsewhere, and not just from within my LAN, this would
be unnecessarily restrictive for me.
> If I needed to ssh again, then I would connect the cable for that
> short time. If you do not have 2 cards or 2 ports on your computer, I
> have an extra one that you can take. I even have 10/100 that would
> work great because you are only ssh ing in not transferring files.
If I were going to do this, I could probably also find a USB/ethernet
device.
> Take one of your old 10/100 ports and plug it into it, this way you
> do not have to disconnect your cable each time. All you would have to
> do is pull the plug on the 10/100 switch. Even better connect the
> switch to a surge protector and switch it off when you are not using
> it.
I do need to digest this approach, but still think it's not worth it if
I'm going to allow myself to ssh in from with interwebs. No final
decision here yet. Lots more thinking and talking. Not quite ready
for another working session with you and/or Bob yet. I'll let you know.