Skip to content

Consolidate VPN & networking approach #6498

@rikukissa

Description

@rikukissa

Production setups of OpenCRVS should not be exposed to the public internet. If we assume there are countries who have nothing besides a VPS to install OpenCRVS on, what should our recommendations be for the following issues

Ideal scenario:
Government IT provides and manages a VPN client and credentials for all end-users of OpenCRVS. Implementation team receives an the source IP address from IT and it's used when defining requirements for data center level networking.

No Government provided VPN:
Implementation team installs Wireguard as per our reference implementation to either on their QA server or a dedicated VPS.

  • What are the risks using QA as the VPN server?
  • Is our current Wireguard server correctly configured and secure enough?
  • Is wg-easy and its admin UI the right approach?

Firewalling not possible outside the VPS
@n1koo what's your take on how typical this would be in tier 2+ data centers?

  • How would we hide the server so that it could. only be accessed through a VPN? Could we use Cloudflare for this and how much of that could be automated?

Current networking diagram

Source file: https://drive.google.com/file/d/1rJP6ZZxkL158cdtiZfLf5515M_cw2LhM/view?usp=drive_link
Image

Metadata

Metadata

Assignees

Type

No type

Projects

Status

Completed

Milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions