Security: Difference between revisions
No edit summary |
No edit summary |
||
| Line 53: | Line 53: | ||
= SSL Certificates & Secure Services = | = SSL Certificates & Secure Services = | ||
== Can I get SSL/TLS certificates via bwCloud-OS? == | |||
No, bwCloud-OS does '''not''' provide '''SSL/TLS certificates.''' However, you can obtain certificates directly from public providers like '''Let’s Encrypt''' using tools such as '''Certbot''', which can be installed and run on your instance. | |||
This allows you, for example, to enable '''HTTPS''' for services running on your VM. Don't forget to open the necessary ports (e.g., 443) using [[Security#Security Groups - Open a port for access|security group rules]]! | |||
=Security Incidents = | =Security Incidents = | ||
Revision as of 20:00, 18 October 2025
| In a Nutshell |
|
Access Control & Firewall Rules
What network access is allowed by default in bwCloud-OS instances?
By default, a newly created virtual machine in bwCloud-OS is accessible from the outside via:
- SSH (port 22) – for remote login and configuration
- ICMP – to allow basic network diagnostics like
pingandtraceroute
This initial access is explicitly permitted by the automatically assigned security group (named default) in our configuration. This is not a default behavior in OpenStack — it is provided by bwCloud-OS to simplify first-time access for users.
How do I open additional ports for my instance?
By default, a newly created virtual machine in bwCloud-OS is initially only accessible from the outside via SSH (port 22) and ICMP. All other inbound traffic is blocked by default — meaning external traffic on those ports cannot reach the instance.
To allow access on other ports (e.g. for web servers or applications), you need to add a rule to the relevant security group. Changes to security group rules apply immediately to all instances using that group — there's no need to reboot the instance.
Example: Opening Port 443 for HTTPS Access
If you're running a web server that should be accessible via HTTPS, you typically need to open port 443 in a security group attached to your instance.
Steps in the Dashboard:
- In the left menu, go to Network → Security Groups. A list of all defined security groups will appear.
- Recommended: Consider creating a dedicated security group (e.g. named
https-access), and assign the group to your instance using the option Edit Security Groups in the instance menu before the next step.
- Recommended: Consider creating a dedicated security group (e.g. named
- Find the relevant group and click Manage Rules. You’ll see all currently defined rules for that group.
- Click Add Rule to create a new one.
- In the dialog that appears, choose one of the following:
- HTTPS from the Rule dropdown (automatically fills port 443), or
- Custom TCP Rule, then manually enter 443 in the Port field.
- In the CIDR field, specify which IP addresses should be allowed to connect:
- Use a specific IP range (e.g.
192.168.0.0/24) to limit access - ⚠️ Using
0.0.0.0/0would allow access from any IPv4 address,::/0from any IPv6 address.
- Use a specific IP range (e.g.
- Set the Direction of the rule:
Ingress= incoming connections (usually what you want)Egress= outgoing connections
- Click Add. The rule will be created and added to the list immediately.
Are some ports blocked in bwCloud-OS?
Yes. Some ports are centrally blocked in certain bwCloud-OS regions due to specific network policies at the participating university data centers. An individual opening of centrally blocked ports in a bwCloud-OS region for virtual machines is not possible.
For more details — including which ports are affected in each region — see this overview.
SSL Certificates & Secure Services
Can I get SSL/TLS certificates via bwCloud-OS?
No, bwCloud-OS does not provide SSL/TLS certificates. However, you can obtain certificates directly from public providers like Let’s Encrypt using tools such as Certbot, which can be installed and run on your instance.
This allows you, for example, to enable HTTPS for services running on your VM. Don't forget to open the necessary ports (e.g., 443) using security group rules!
Security Incidents
What do I do if I fear I've been hacked?
If your own VMs are behaving "strangely", it may be that they have been hacked. In this case, please follow these steps:
- Log in to the OpenStack Dashboard
- Stop the affected instances - do not delete!
- Submit a ticket Important information:
- Which instances are possibly affected?
- How can the strange behaviour be described?
- Which measures have already been implemented?
- We will contact you as soon as possible to clarify the situation.
Does the bwCloud-OS operations group check the running instances, for example, through so-called penetration tests?
No, the running instances are not checked for open ports or other characteristics. However, the entire bwCloud operating environment is monitored - for example, network monitoring covers current upstream and downstream traffic. If the network traffic here changes abruptly, significantly and atypically beyond normal levels, this is checked at the node and OpenStack monitoring level.
However, we do not look inside the virtual machines!