-
Notifications
You must be signed in to change notification settings - Fork 93
Description
Production setups of OpenCRVS should not be exposed to the public internet. If we assume there are countries who have nothing besides a VPS to install OpenCRVS on, what should our recommendations be for the following issues
Ideal scenario:
Government IT provides and manages a VPN client and credentials for all end-users of OpenCRVS. Implementation team receives an the source IP address from IT and it's used when defining requirements for data center level networking.
No Government provided VPN:
Implementation team installs Wireguard as per our reference implementation to either on their QA server or a dedicated VPS.
- What are the risks using QA as the VPN server?
- Is our current Wireguard server correctly configured and secure enough?
- Is wg-easy and its admin UI the right approach?
Firewalling not possible outside the VPS
@n1koo what's your take on how typical this would be in tier 2+ data centers?
- How would we hide the server so that it could. only be accessed through a VPN? Could we use Cloudflare for this and how much of that could be automated?
Current networking diagram
Source file: https://drive.google.com/file/d/1rJP6ZZxkL158cdtiZfLf5515M_cw2LhM/view?usp=drive_link

Metadata
Metadata
Assignees
Labels
Type
Projects
Status