Skip to main content

Webmin

Webmin from https://webmin.com/

  • installed onto host system via 3rd party apt repository
  • installs and auto-configured for start at boot-time
  • OOB installation listens on all interfaces https://<ip>:10000
    • post install modify the /etc/webmin./miniserv.conf 
    • we will only listen on internally accessible networks
    • we will disable SSL 
    • we will reverse proxy via nginx proxy manager https to http:10000
Notable changes for /etc/webmin/miniserv.conf

port=10000
sockets=172.22.20.1:*
ssl=0
no_ssl2=1
bind=172.22.22.1
ipv6=0
no_tls1_1=1
webprefixnoredir=1
no_tls1=1
no_ssl3=1

 

 

 


Tailscale VPN from https://tailscale.com/ 

    configures a host interface tailscale0  installs auto-start for tailscale daemon /etc/systemd/system/multi-user.target.wants/tailscaled.service
    starts service at boot allocating IP address 100.100.69.2 to the tailscale0 nic attaches tailscale0 nic to the shared VPN 
      makes accessible 100.100.69.X addresses makes the HOST available as an exit node

      configured to use account pkswansea@outlook.com via the admin console via https://login.tailscale.com/admin 

      pngtree-banner-with-important-icon-vector-picture-image_7826342-244127159.png

      The server SSH service running on port 69 isonly exposed on the tailscale0 interface via the IP 100.100.69.2 once the daemon has started via /etc/systemd/system/ssh-after-tailscale.service and can only be accessed when connected to a valid VPN client

      #!/bin/bash
      while ! ip addr show tailscale0 | grep -q "inet ";

      do
          sleep 10
      done
      systemctl start ssh