Security: Difference between revisions

From bwCloud-OS
Jump to navigation Jump to search
No edit summary
No edit summary
Line 11: Line 11:


=Ports=
=Ports=
== How can I open a port for access==


By default, a new virtual machine in the bwCloud-OS is initially only accessible from outside only via SSH (Port 22). This is defined in the assigned security group, e.g., default. All other ports are closed, i. e. requests on these ports connot reach the instance. You will find some information about security and open ports [[Network & Security#Security|here]].  
== How do I open a port to allow access to my instance? ==
By default, a newly created virtual machine in bwCloud-OS is initially only accessible from the outside via '''SSH (port 22)'''. This behavior is controlled by the assigned '''security group''', named <code>default</code>. All other ports are '''blocked''' by default — meaning external traffic on those ports '''cannot reach''' the instance.


As soon as the rules of a security group change, these changes take effect for all associated instances. The virtual machines therefore '''do not have to be rebooted'''.
To allow access on other ports (e.g. for web servers or applications), you need to '''add a rule to the relevant security group'''. '''Changes''' to security group rules '''apply immediately''' '''to all instances using that group''' — there's no need to reboot the instance.


=== Example: ===
.
* A Web server needs to be accessible via HTTPS. The corresponding port (Port 443) must be opened n the security group.
----


; The step-by-step instructions explain in detail how to open a port using the Dashboard.
=== Example: Opening Port 443 for HTTPS Access ===
# In the left menu, click '''''Network''''' '''''Security''' '''Groups'''''.. An overview of the currently defined security groups is displayed. The default group is named '''default'''.  
If you're running a web server that should be accessible via '''HTTPS''', you typically need to open '''port 443''' in the security group attached to your instance.
# Click on the button '''''Manage Rules''''' in the corresponding line. An overview of all rules defined for this security group opens.  
 
# If you want to add a new rule, click the button '''''Add Rule'''''. A dialog opens in which you can describe the new rule.  
==== Steps in the [https://dashboard.bw-cloud.org/ Dashboard]: ====
# There are two similar options from the drop-down menu:  
 
## Select the '''''Rule''''' entry ''HTTPS''.
# In the left menu, go to '''Network → Security Groups'''.   → A list of all defined security groups will appear. The default group is named <code>default</code>.
## Select the Custom TCP Rule item. Enter port number 443 in the Port field.  
#* You could also create a new group and assign it to the instance.  
# Find the relevant group (or first add a dedicated one) and click '''Manage Rules'''.   → You’ll see all currently defined rules for that group.
# Click '''Add Rule''' to create a new one.
# In the dialog that appears, choose one of the following:
#* '''HTTPS''' from the '''Rule''' dropdown (automatically fills port 443), or
#* '''Custom TCP Rule''', then manually enter '''443''' in the '''Port''' field.
# In the '''CIDR''' field, specify which IP addresses should be allowed to connect:
#* Use a specific IP range (e.g. <code>192.168.0.0/24</code>) to '''limit access'''
#* Use <code>0.0.0.0/0</code> to allow '''access from anywhere''' (⚠️ '''not recommended''' for sensitive services)
# Set the '''Direction''' of the rule:
#* <code>Ingress</code> = incoming connections (usually what you want)
#* <code>Egress</code> = outgoing connections
# Click '''Add'''.  → The rule will be created and added to the list immediately.
 
==Are some of the ports closed in bwCloud-OS? ==
Yes. In the different bwCloud-OS regions, different regulations apply for the use of the networks, due to the respective data centers of the universities. An individual opening of centrally blocked ports for virtual machines in the bwCloud regions is '''not possible'''.
Further information, also about the individual regions, is listed [[Reference:_Network_–_blocked/allowed_ports.|here]].
 
= SSL Certificates =
 
We do not offer certificates. However, your instance can obtain certificates from other institutions (e.g. Lets Encrypt) using the Cert Bot
 
##
# Your server should not be accessible from everywhere on the internet. The entry in the field "CIDR" restricts the access to a specific network segment. Enter there the IP addresses that should be allowed.
# Your server should not be accessible from everywhere on the internet. The entry in the field "CIDR" restricts the access to a specific network segment. Enter there the IP addresses that should be allowed.
#  In the "Direction" field you can define the direction:  
#  In the "Direction" field you can define the direction:  
## Ingress = Incoming connections  
## Ingress = Incoming connections
## Egress = Outgoing connections  
## Egress = Outgoing connections
# Click '''Add''', and the new rule is created. The page reloads, and the new rule appears in the list.
# Click '''Add''', and the new rule is created. The page reloads, and the new rule appears in the list.
==Are some of the ports closed in bwCloud-OS? ==
==Are some of the ports closed in bwCloud-OS? ==

Revision as of 17:48, 18 October 2025

In a Nutshell
  • By default, VMs in bwCloud-OS are only accessible via SSH (port 22); all other ports are initially closed for security reasons.
  • Additional ports (e.g. HTTPS/443) can be opened via Security Groups in the Dashboard — changes take effect immediately without a reboot.
  • Some ports are centrally filtered in certain regions and cannot be opened manually; details are listed in the port overview.
  • SSL certificates are not provided by bwCloud-OS, but can be obtained via services like Let’s Encrypt.
  • If you suspect a security incident, stop the affected VMs and open a support ticket immediately.


Ports

How do I open a port to allow access to my instance?

By default, a newly created virtual machine in bwCloud-OS is initially only accessible from the outside via SSH (port 22). This behavior is controlled by the assigned security group, named default. All other ports are blocked by default — meaning external traffic on those ports cannot reach the instance.

To allow access on other ports (e.g. for web servers or applications), you need to add a rule to the relevant security group. Changes to security group rules apply immediately to all instances using that group — there's no need to reboot the instance.

.


Example: Opening Port 443 for HTTPS Access

If you're running a web server that should be accessible via HTTPS, you typically need to open port 443 in the security group attached to your instance.

Steps in the Dashboard:

  1. In the left menu, go to Network → Security Groups. → A list of all defined security groups will appear. The default group is named default.
    • You could also create a new group and assign it to the instance.
  2. Find the relevant group (or first add a dedicated one) and click Manage Rules. → You’ll see all currently defined rules for that group.
  3. Click Add Rule to create a new one.
  4. In the dialog that appears, choose one of the following:
    • HTTPS from the Rule dropdown (automatically fills port 443), or
    • Custom TCP Rule, then manually enter 443 in the Port field.
  5. In the CIDR field, specify which IP addresses should be allowed to connect:
    • Use a specific IP range (e.g. 192.168.0.0/24) to limit access
    • Use 0.0.0.0/0 to allow access from anywhere (⚠️ not recommended for sensitive services)
  6. Set the Direction of the rule:
    • Ingress = incoming connections (usually what you want)
    • Egress = outgoing connections
  7. Click Add. → The rule will be created and added to the list immediately.

Are some of the ports closed in bwCloud-OS?

Yes. In the different bwCloud-OS regions, different regulations apply for the use of the networks, due to the respective data centers of the universities. An individual opening of centrally blocked ports for virtual machines in the bwCloud regions is not possible. Further information, also about the individual regions, is listed here.

SSL Certificates

We do not offer certificates. However, your instance can obtain certificates from other institutions (e.g. Lets Encrypt) using the Cert Bot

  1. Your server should not be accessible from everywhere on the internet. The entry in the field "CIDR" restricts the access to a specific network segment. Enter there the IP addresses that should be allowed.
  2. In the "Direction" field you can define the direction:
    1. Ingress = Incoming connections
    2. Egress = Outgoing connections
  3. Click Add, and the new rule is created. The page reloads, and the new rule appears in the list.

Are some of the ports closed in bwCloud-OS?

Yes. In the different bwCloud-OS regions, different regulations apply for the use of the networks, due to the respective data centers of the universities. An individual opening of centrally blocked ports for virtual machines in the bwCloud regions is not possible. Further information, also about the individual regions, is listed here.

SSL Certificates

We do not offer certificates. However, your instance can obtain certificates from other institutions (e.g. Lets Encrypt) using the Cert Bot.

Security Incidents

What do I do if I fear I've been hacked?

If your own VMs are behaving "strangely", it may be that they have been hacked. In this case, please follow these steps:

  1. Log in to the OpenStack Dashboard
  2. Stop the affected instances - do not delete!
  3. Submit a ticket Important information:
  • Which instances are possibly affected?
  • How can the strange behaviour be described?
  • Which measures have already been implemented?
  • We will contact you as soon as possible to clarify the situation.

Does the bwCloud-OS operations group check the running instances, for example, through so-called penetration tests?

No, the running instances are not checked for open ports or other characteristics. However, the entire bwCloud operating environment is monitored - for example, network monitoring covers current upstream and downstream traffic. If the network traffic here changes abruptly, significantly and atypically beyond normal levels, this is checked at the node and OpenStack monitoring level.

However, we do not look inside the virtual machines!