Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Trying to figure out how to lock down my CI runners as much as possible.

Trying to figure out how to lock down my CI runners as much as possible.

Scheduled Pinned Locked Moved Uncategorized
24 Posts 8 Posters 59 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • azonenberg@ioc.exchangeA azonenberg@ioc.exchange

    @bencc @whitequark This is a closed system and I already have an in house TLS PKI for other reasons. I have no problem doing a MITM CA if that's the way to do it.

    bencc@morehammer.ukB This user is from outside of this forum
    bencc@morehammer.ukB This user is from outside of this forum
    bencc@morehammer.uk
    wrote last edited by
    #21

    @azonenberg @whitequark possibly that's more work to set up, but doesn't rely on the entire software stack obeying http_proxy/https_proxy env vars for success. I'd not expect 100% there, so possibly MITM would be more reliable. Plus you get find out anything bundles its own CA list...

    azonenberg@ioc.exchangeA 1 Reply Last reply
    0
    • bencc@morehammer.ukB bencc@morehammer.uk

      @azonenberg @whitequark possibly that's more work to set up, but doesn't rely on the entire software stack obeying http_proxy/https_proxy env vars for success. I'd not expect 100% there, so possibly MITM would be more reliable. Plus you get find out anything bundles its own CA list...

      azonenberg@ioc.exchangeA This user is from outside of this forum
      azonenberg@ioc.exchangeA This user is from outside of this forum
      azonenberg@ioc.exchange
      wrote last edited by
      #22

      @bencc @whitequark i only intend to do git clones and nothing else

      1 Reply Last reply
      0
      • azonenberg@ioc.exchangeA azonenberg@ioc.exchange

        Trying to figure out how to lock down my CI runners as much as possible.

        They need to be able to reach out to GitHub to HTTPS check out the source code, but I can't easily add a firewall rule for "can only clone this one repo from github".

        Ideas beyond "open port 443 outbound to the entire internet"?

        lluad@mastodon.ieL This user is from outside of this forum
        lluad@mastodon.ieL This user is from outside of this forum
        lluad@mastodon.ie
        wrote last edited by
        #23

        @azonenberg Can you use ssh instead of https for the checkout? Seems it might be easier to lock down to only authorized connections.

        azonenberg@ioc.exchangeA 1 Reply Last reply
        0
        • lluad@mastodon.ieL lluad@mastodon.ie

          @azonenberg Can you use ssh instead of https for the checkout? Seems it might be easier to lock down to only authorized connections.

          azonenberg@ioc.exchangeA This user is from outside of this forum
          azonenberg@ioc.exchangeA This user is from outside of this forum
          azonenberg@ioc.exchange
          wrote last edited by
          #24

          @lluad I ideally want to limit to specific repositories so i think https mitm/stripping proxy is the only viable route here

          1 Reply Last reply
          1
          0
          • R relay@relay.infosec.exchange shared this topic
          Reply
          • Reply as topic
          Log in to reply
          • Oldest to Newest
          • Newest to Oldest
          • Most Votes


          • Login

          • Login or register to search.
          • First post
            Last post
          0
          • Categories
          • Recent
          • Tags
          • Popular
          • World
          • Users
          • Groups