Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Inclusion of a P2S VPN #2345

Open
1 of 5 tasks
mattwestby opened this issue Jan 6, 2025 · 4 comments
Open
1 of 5 tasks

Inclusion of a P2S VPN #2345

mattwestby opened this issue Jan 6, 2025 · 4 comments
Labels
enhancement New functionality that should be added to the Safe Haven

Comments

@mattwestby
Copy link

✅ Checklist

  • I have searched open and closed issues for duplicates.
  • This is a request for a new feature in the Data Safe Haven or an upgrade to an existing feature.
  • The feature is still missing in the latest version.
  • I have read through the documentation.
  • This isn't an open-ended question (open a discussion if it is).

🍓 Suggested change

To include the ability to use a VPN to connect to the TRE. This was a feature in V4 to manage the VMs but this request would be for a researcher to connect to the TRE via a VPN client which would make the security requirement of knowing your IP address redundant as the vpn would provide the security.

🚂 How could this be done?

Include a VPN gateway in the deployed infrastructure. I did a poc with this but couldnt get the DNS to work correctly so that when you enter the url of the TRE it still resolved publicly.

@mattwestby mattwestby added the enhancement New functionality that should be added to the Safe Haven label Jan 6, 2025
@JimMadge
Copy link
Member

JimMadge commented Jan 6, 2025

I think this is a good idea, and would be a common use case.

I believe @helendduncan and @craddm have set up a TRE (in an ad-hoc way) to be accessible from an institutional VPN. That sounds a bit different to what you are suggesting @mattwestby, as in it is access the TRE only from an existing VPN rather than the TRE has its own VPN. @helendduncan, @craddm any input/advice?

@jemrobinson
Copy link
Member

Azure VPN Gateway can be quite expensive. We also never got the OpenVPN P2S connection to work reliably, although this may have improved recently.

@mattwestby: Is there an advantage in using the Azure VPN (which would use your Entra credentials to authenticate) as a step in front of the Guacamole dashboard (which already uses Entra to authenticate) over simply allow-listing all IP addresses?

@craddm
Copy link
Contributor

craddm commented Jan 7, 2025

We do say that Tier 2 allows access from only specific IP addresses ("connections to the in-browser remote desktop can only be made from an agreed set of IP addresses"), so if that isn't quite true it's not quite the full Tier 2.

Like James, I'm not sure there's much advantage to provisioning an Azure VPN alongside the SRE when it'll use the same credentials anyway, particularly if the intent is for the VPN to allow connections from anywhere without allowlisting specific IP addresses. It'd make the SRE comply with the letter of Tier 2, but not sure it adds much in practice. The only advantage is people who don't have access to the VPN can't see the Guacamole dashboard at all. But in practice it mostly just means they'd have to login the same way twice, which just seems redundant.

If the VPN is accessible with a different set of credentials (e.g. it's an institutional VPN) that's a different matter, but that would be outside our remit and not something we should be setting up as part of the SRE.
That then serves as an additional way of validating who is able to access the TRE, in that only people who have access to an organisation's network can get on that VPN.

@mattwestby
Copy link
Author

mattwestby commented Jan 7, 2025 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New functionality that should be added to the Safe Haven
Projects
None yet
Development

No branches or pull requests

4 participants