Anyway, attempt number 2, but now a bit shorter.
So, Ive used roughly this guide to setup my hardened XFS reflink Veeam repo on Ubuntu 20.4 LTS: https://nolabnoparty.com/en/veeam-v11-h ... lity-pt-1/
I'm blown away on how well this works in our tests. We see better performance then on out ReFS repo's in the shorts tests we did(few weeks), but now I notice something strange. It could be user error. It could be that I'm missing some knowledge here.
But like in the guide, Veeam user was in sudo group for a while during the installation, then I removed it.
I've also setup my firewall rules like this:
Code: Select all
ufw default deny incoming
ufw default deny outgoing
ufw allow in 6162/tcp
ufw allow out 6162/tcp
ufw allow in 2500:3300/tcp
ufw allow out 2500:3300/tcp
In VeeamEnvironmentSvc.log I noticed these kind of messages:
Code: Select all
[CFirewallInvoker] Invoke result: 0 Status: active
[24.01.2022 10:48:48.971] <140487124694848> fir |
[24.01.2022 10:48:48.971] <140487124694848> fir | To Action From
[24.01.2022 10:48:48.971] <140487124694848> fir | -- ------ ----
[24.01.2022 10:48:48.971] <140487124694848> fir | [ 1] 2500:3300/tcp ALLOW IN Anywhere
[24.01.2022 10:48:48.971] <140487124694848> fir | [ 2] 2500:3300/tcp ALLOW OUT Anywhere (out)
[24.01.2022 10:48:48.971] <140487124694848> fir | [ 3] 22 ALLOW IN 10.1.3.141
[24.01.2022 10:48:48.971] <140487124694848> fir | [ 4] 6162/tcp ALLOW IN Anywhere
[24.01.2022 10:48:48.971] <140487124694848> fir | [ 5] 6162/tcp ALLOW OUT Anywhere (out)
[24.01.2022 10:48:48.971] <140487124694848> fir | [ 6] 2500:3300/tcp (v6) ALLOW IN Anywhere (v6)
[24.01.2022 10:48:48.971] <140487124694848> fir | [ 7] 2500:3300/tcp (v6) ALLOW OUT Anywhere (v6) (out)
[24.01.2022 10:48:48.971] <140487124694848> fir | [ 8] 6162/tcp (v6) ALLOW IN Anywhere (v6)
[24.01.2022 10:48:48.971] <140487124694848> fir | [ 9] 6162/tcp (v6) ALLOW OUT Anywhere (v6) (out)
[24.01.2022 10:48:48.971] <140487124694848> fir | Filter out firewall rules which is missing 'ALLOW IN' and contain 'v6'
[24.01.2022 10:48:48.971] <140487124694848> fir | '2501/tcp' is not found in rules table
[24.01.2022 10:48:48.971] <140487124694848> fir | [CFirewallInvoker] Invoke: ufw allow in proto tcp to 0.0.0.0/0 port 2501 comment Veeam rule 2ea3f314-eb60-4eb6-9743-f53796b1411b
[24.01.2022 10:48:48.971] <140487124694848> | Creating child process: ufw with arguments: allow, in, proto, tcp, to, 0.0.0.0/0, port, 2501, comment, Veeam rule 2ea3f314-eb60-4eb6-9743-f53796b1411b
[24.01.2022 10:48:49.047] <140487124694848> fir | [CFirewallInvoker] Invoke result: 0 Rule added
[24.01.2022 10:48:49.047] <140487124694848> fir | Filter out firewall rules which is missing 'ALLOW OUT' and contain 'v6'
[24.01.2022 10:48:49.047] <140487124694848> fir | '2501/tcp' is not found in rules table
[24.01.2022 10:48:49.047] <140487124694848> fir | [CFirewallInvoker] Invoke: ufw allow out proto tcp to 0.0.0.0/0 port 2501 comment Veeam rule 2ea3f314-eb60-4eb6-9743-f53796b1411b
[24.01.2022 10:48:49.047] <140487124694848> | Creating child process: ufw with arguments: allow, out, proto, tcp, to, 0.0.0.0/0, port, 2501, comment, Veeam rule 2ea3f314-eb60-4eb6-9743-f53796b1411b
[24.01.2022 10:48:49.123] <140487124694848> fir | [CFirewallInvoker] Invoke result: 0 Rule added
[24.01.2022 10:48:49.123] <140487124694848> fir | [CFirewallController] Open 2501 port ok.
[24.01.2022 10:48:50.324] <140487124694848> | Change OOM for pid 251608 to 10 score
[24.01.2022 10:48:50.334] <140487124694848> fir | [CFirewallController] Check firewall availability
Code: Select all
ufw status numbered
Status: active
To Action From
-- ------ ----
[ 1] 2500:3300/tcp ALLOW IN Anywhere
[ 2] 2500:3300/tcp ALLOW OUT Anywhere (out)
[ 3] 22 ALLOW IN xxxx TEMP rule
[ 4] 6162/tcp ALLOW IN Anywhere
[ 5] 6162/tcp ALLOW OUT Anywhere (out)
[ 6] 2501/tcp ALLOW IN Anywhere # Veeam rule 2ea3f314-eb60-4eb6-9743-f53796b1411b
[ 7] 2501/tcp ALLOW OUT Anywhere (out) # Veeam rule 2ea3f314-eb60-4eb6-9743-f53796b1411b
[ 8] 2503/tcp ALLOW IN Anywhere # Veeam rule 2ea3f314-eb60-4eb6-9743-f53796b1411b
[ 9] 2503/tcp ALLOW OUT Anywhere (out) # Veeam rule 2ea3f314-eb60-4eb6-9743-f53796b1411b
[10] 2504/tcp ALLOW IN Anywhere # Veeam rule 2ea3f314-eb60-4eb6-9743-f53796b1411b
[11] 2504/tcp ALLOW OUT Anywhere (out) # Veeam rule 2ea3f314-eb60-4eb6-9743-f53796b1411b
[12] 2505/tcp ALLOW IN Anywhere # Veeam rule 2ea3f314-eb60-4eb6-9743-f53796b1411b
[13] 2505/tcp ALLOW OUT Anywhere (out) # Veeam rule 2ea3f314-eb60-4eb6-9743-f53796b1411b
[14] 2506/tcp ALLOW IN Anywhere # Veeam rule 2ea3f314-eb60-4eb6-9743-f53796b1411b
[15] 2506/tcp ALLOW OUT Anywhere (out) # Veeam rule 2ea3f314-eb60-4eb6-9743-f53796b1411b
[16] 2500:3300/tcp (v6) ALLOW IN Anywhere (v6)
[17] 2500:3300/tcp (v6) ALLOW OUT Anywhere (v6) (out)
[18] 6162/tcp (v6) ALLOW IN Anywhere (v6)
[19] 6162/tcp (v6) ALLOW OUT Anywhere (v6) (out)
Code: Select all
groups veeam
veeam : veeam veeamgroup
And now the issue: that seems to work and it shouldn't(but like I said, maybe i'm missing something).
If veeam user somehow has root(or a lot) permissions necessary to add firewall rules, it could also for example change the server time and delete all immutable backups, right?
My understanding was that something like this would not be possible.
What am I missing here?