Don't expose our OpenLDAP user management server to the public internet #80

Closed
opened 2021-12-20 22:43:52 +00:00 by a · 1 comment
Owner

Currently, we have port 389 which is used by OpenLDAP exposed to the internet, so that the hostname matches the one in the TLS certificate and so we can use the OpenLDAP server with a possible future VPS (for exovpn for instance). However, it's probably not good for security to export port 389 so one possible solution could be to resolve exozy.me to localhost in the /etc/hosts file.

Currently, we have port 389 which is used by OpenLDAP exposed to the internet, so that the hostname matches the one in the TLS certificate and so we can use the OpenLDAP server with a possible future VPS (for exovpn for instance). However, it's probably not good for security to export port 389 so one possible solution could be to resolve `exozy.me` to `localhost` in the `/etc/hosts` file.
a added the
bug
help wanted
security
labels 2021-12-20 22:43:52 +00:00
a self-assigned this 2021-12-20 22:43:52 +00:00
a added this to the (deleted) project 2021-12-20 22:43:52 +00:00
Author
Owner

Alright, I added exozy.me to the /etc/hosts file and now our ping time is insane since it goes directly to localhost 😃!

Alright, I added `exozy.me` to the `/etc/hosts` file and now our ping time is insane since it goes directly to `localhost` 😃!
a closed this issue 2021-12-20 22:48:29 +00:00
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: exozyme/exozyme#80
No description provided.