-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[WIP] Config Cleanup #56
Conversation
https://askubuntu.com/questions/1212868/iptables-restricting-access-by-time How about this? This could also help us get rid of the act of manually opening/closing the game network |
What exactly do you mean by that? If I recall correctly, using |
For my understanding, is the initialization with a default account (arkime:arkime) no longer necessary when using anonymous mode? |
I gave this some though, we might want to use the hcloud firewall for this. We could use the firewall to block SSH traffic and delete that once the game starts. To prevent the teams from accessing the vulnbox over the VPN, we could use a rule on the gateways that we need to manually remove once the game starts. |
We would need to adjust the MASQUERADE rule to avoid masquerading traffic from the own team so that we could then use the source IP in the firewall on the vulnbox |
I think a simple |
* reformat files for ansible-lint * more ansible-lint * run GH action when merging into config cleanup * add ansible-lint workflow * fix ansible-lint workflow * add github actions workflow to publish image on push to main * update Dockerfile to ubuntu:24.04 * fix issue with pipefail in sh * fix ansible typo * inject docker dependency into ansible * try fixing failing CI * update packer workflow
TODOs:
local 0.0.0.0
appears to be working for only one of the 2 addresses? cc @ldruschk )prevent teams from reaching the vulnboxes before the game starts(see Make password only avaiable after the game starts EnoCTFPortal#57)PermitRootLogin yes
on vulnboxRelated Issues: