Hi folks,
just a questions about securing the PVE Web Interface.
As far as I know two methodes are recommended by Proxmox itself:
- 2FA
- Fail2ban
I myself would like to extend this two options a little bit by
tcp 0 0 0.0.0.0:8006 0.0.0.0:* LISTEN 1060/pveproxy
i.e. pveproxy it listening on port 8006 on every ip address of each interface. So my question is how to bind pveproxy to
ALLOW_FROM="10.0.0.1-10.0.0.5,192.168.0.0/22"
DENY_FROM="all"
POLICY="allow"
I think reducing the ALLOW_FROM statement to 127.0.0.1 should fulfill my needs. Do you agree? Or do you think there is a better way to reach my goal, i.e. unbinding port 8006 from all other interface except the lo one?
BTW: Which methods are you using to secure your PVE Web Interface on servers placed in the internet? What are your experiences with it? Do you have other suggestions I didn't mention above?
Thanks in advance and greetinx
moose
just a questions about securing the PVE Web Interface.
As far as I know two methodes are recommended by Proxmox itself:
- 2FA
- Fail2ban
I myself would like to extend this two options a little bit by
- accessing port 8006 just over a tunneled ssh connection and
- to make it unavailable on PVE's offical ip address.
tcp 0 0 0.0.0.0:8006 0.0.0.0:* LISTEN 1060/pveproxy
i.e. pveproxy it listening on port 8006 on every ip address of each interface. So my question is how to bind pveproxy to
- ip address 127.0.0.1 or
- the lo interface only?
ALLOW_FROM="10.0.0.1-10.0.0.5,192.168.0.0/22"
DENY_FROM="all"
POLICY="allow"
I think reducing the ALLOW_FROM statement to 127.0.0.1 should fulfill my needs. Do you agree? Or do you think there is a better way to reach my goal, i.e. unbinding port 8006 from all other interface except the lo one?
BTW: Which methods are you using to secure your PVE Web Interface on servers placed in the internet? What are your experiences with it? Do you have other suggestions I didn't mention above?
Thanks in advance and greetinx
moose