Hi,
i don't think im aware enough of your topology but you shouldn't have to expose the salt-master to the universe... by this, i mean that you could allow 4505 and 4506 in your firewall to - from your office subnet to the salt-master external ip
or to the nat ip from your office, usually they do know
the requirement would be to have a static IP from minion side as well as the master
so you don't have to manipulate firewall rules every now then.
If im not wrong, by default salt encrypt the communication between the master and minion using an AES secure key that is rotated each time the salt-master is restarted and / or the minion key is deleted from the salt-key command
other than that you can upgrade the encryption using this param in the master config and the minions as well
# Use TLS/SSL encrypted connection between master and minion.
# Can be set to a dictionary containing keyword arguments corresponding to Python's
# 'ssl.wrap_socket' method.
# Default is None.
#ssl:
# keyfile: <path_to_keyfile>
# certfile: <path_to_certfile>
# ssl_version: PROTOCOL_TLSv1_2
There surely are more hardening options to be considered but out of my head that what i would suggest to look into
Thank you
Nerigal
On 2021-06-23 11:45, Ed Killian wrote:
We have been using salt to provide configuration management within our networks. But now management wants to start using it for our offsite locations and company systems that are located in employee's WFH locations. I'm extremely hesitant to expose salt to the internet but they want to be able to manage these systems even when they aren't connected to our VPN. Is there a safe way to do this or do we need to start looking for a different solution?Thanks.
--
You received this message because you are subscribed to the Google Groups "Salt-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to salt-users+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/salt-users/5528c83a-d6b6-4d7d-a8eb-08c8fab8be7an%40googlegroups.com.
We have been using salt to provide configuration management within our networks. But now management wants to start using it for our offsite locations and company systems that are located in employee's WFH locations. I'm extremely hesitant to expose salt to the internet but they want to be able to manage these systems even when they aren't connected to our VPN. Is there a safe way to do this or do we need to start looking for a different solution?Thanks.
--
and is it possible for you to ask your ISP to be on a static ip for your office / home ?
Nerigal
To view this discussion on the web visit https://groups.google.com/d/msgid/salt-users/67a2588a-8bcd-443a-adbe-2c19ebb9045an%40googlegroups.com.
--
You received this message because you are subscribed to the Google Groups "Salt-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to salt-users+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/salt-users/6bacf675-79b7-de23-33dc-2371646cd902%40gmail.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/salt-users/CAPayrd5deDxDCxT%2BBqqKzLyOpzAskz1%3DvScO34rgqPNFHKpZow%40mail.gmail.com.
We have been using salt to provide configuration management within our networks. But now management wants to start using it for our offsite locations and company systems that are located in employee's WFH locations. I'm extremely hesitant to expose salt to the internet but they want to be able to manage these systems even when they aren't connected to our VPN.
Is there a safe way to do this or do we need to start looking for a different solution?