Skip to content

docs: add list of destinations for outbound firewall rules to allow installing/updating on a DMZ #149

Open
@Peulleieoyukino

Description

@Peulleieoyukino

What do you want to see?

I think that, to help admins install Revolt on restricted environment, we should include a list of the outgoing servers used to install and update the container and help create Firewall/proxy rules.

Here is all that I gathered so far, Caddy being missing due to local certificate use on my end:

The format is Source | Destination | Protocol | Port [notes]

Revolt Server | docker.io | TCP | HTTPS/443 [allows docker to be installed]
Revolt Server | ghcr.io | TCP | HTTPS/443 [Front end to get the resources]
Revolt Server | github.com | TCP | HTTPS/443 [may not be useful, to confirm]
Revolt Server | download.docker.com | TCP | HTTPS/443 [Content server]
Revolt Server | registry-1.docker.io | TCP | HTTPS/443 [May be geographic, and implies registry-2 and so on may exist]
Revolt Server | pkg-containers.githubusercontent.com | TCP | HTTPS/443 [Content server]
Revolt Server | production.cloudflare.docker.com | TCP | HTTPS/443 [Content server]

The container doesn't seem to need any outbound access. (Caddy aside to dynamically generate the certificate)

Notes:
I do not recommend to resolve DNS records the destinations, as IPs can change over time.
They are better used as aliases resolved frequently by the firewall to dynamically update them.
IPv4 only, some of them didn't returned AAAA records on my end.
And of course you need rules to allow access to the DNS (port UDP 53 or 853), timeserver (UDP 123) the update repository (FTP or HTTP or HTTPS), all of them being infrastructure/distribution dependant

Metadata

Metadata

Assignees

No one assigned

    Labels

    enhancementNew feature or request

    Type

    No type

    Projects

    Status

    🆕 Untriaged

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions