|
|
Message-ID: <20150111153710.GA23534@gremlin.ru>
Date: Sun, 11 Jan 2015 18:37:10 +0300
From: gremlin@...mlin.ru
To: owl-dev@...ts.openwall.com
Subject: Re: Re: [owl-users] Owl 3.1-stable
On 2015-01-11 17:55:08 +0300, croco@...nwall.com wrote:
>> We could do exactly the opposite: make Owl smaller.
>> That means, out-of-a-box it could be just a virtualization host
>> (VPS+VDS) with SSH access and build system, and other packages
^^^^^^^
>> could be installed (yes, I'd write this word here) from several
>> repositories.
> let me second this. Owl with its minimalistic ideology can be
> of a certain value in the role of a hardware node that runs all
> the services inside VZ containters.
... and KVMs: many people need virtualization for non-Linux systems.
For now, I've built and tested the Qemu for Owl: it requires nothing
special for building, and VDSes could be controlled using either
SSH|RDP|whatever, or via Qemu monitor (`man qemu`, look for -monitor
parameter, like: -monitor unix:${HOME}/vm/${VM}.sock,server,nowait
and try nc -U ${HOME}/vm/${VM}.sock).
> BTW, in most situations there's only one ip address, and it takes
> some effort to setup such system, with OpenVZ containter and static
> NAT for public ports.
That's why I've introduced the ability to override the configuration
with a /etc/rc.d/rc.network script in recently published owl-startup
package: that allows creating the in-host LAN (with simple brctl) and
even join several such LANs together via cables and switches.
> We can perhaps add value to the out-of-a-box system if we automatize
> this kind of setup, may be with another module added to our 'setup'
> utility: it could ask the user which private subnet (s)he wants to
> use, e.g., 10.177.178.0/24,
Then:
brctl addbr lan
ip link set dev lan up
ip address add 10.177.178.123/24 dev lan
and:
vzctl set 12345 --ipadd 10.177.178.234
> then let the user create OpenVZ containers, assign them addresses
> (both from the private range and outside of it, in case there are
> more than 1 ip) and specify what external ports to forward, and
> where, and whether should containers be able to access Internet
> on they own (being NAT'ed via the main address of the system).
I use another approach: besides all these, the HTTP and HTTPS are
NATed inside of a separate OpenVZ VPS running nginx - which, in
turn, forwards incoming requests to destination OpenVZ VPS or KVM
VDS, or just responds with static cointent from its' cache.
> Such module can even be able to preserve the iptables' rules that
> fall outside of its scope.
The idea of "preserving rules" for netfilter is stupid and dangerous:
it must be fully configured on every change (so, it has no "start" or
"stop" calls - only "restart"). Some people may like going to their
servers physically (by feet), but not me - instead, I always use
/etc/rc.d/rc.firewall.test && sleep 5m && /etc/rc.d/rc.firewall
Obviously, all my /etc/rc.d/rc.firewall scripts start with
iptables -t filter -F
iptables -t filter -X
iptables -t nat -F
iptables -t nat -X
iptables -t filter -P INPUT ACCEPT
iptables -t filter -P OUTPUT ACCEPT
iptables -t filter -P FORWARD DROP
iptables -t filter -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT
--
Alexey V. Vissarionov aka Gremlin from Kremlin <gremlin ПРИ gremlin ТЧК ru>
GPG: 8832FE9FA791F7968AC96E4E909DAC45EF3B1FA8 @ hkp://keys.gnupg.net
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.