Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
bluemix-secure-gateway
Advanced tools
The Secure Gateway SDK for IBM Cloud contains a set of javascript wrapper APIs for Secure Gateway REST calls to the IBM Cloud Secure Gateway service.
The Secure Gateway SDK for IBM Cloud contains a set of javascript wrapper APIs for Secure Gateway REST calls to the IBM Cloud Secure Gateway service.
To be used in conjunction with the Secure Gateway for IBM Cloud accounts and other services.
You can develop javascript applications with this SDK, nodejs is required.
The SDK can be initialized with the following command:
var sdk = require('bluemix-secure-gateway');
Once the SDK has been initialized, we can set the defaults for an environment. Default options that can be set include:
basepath
- The basepath of the Secure Gateway Service REST API.Region | basepath |
---|---|
US South (Default) | sgmanager.us-south.securegateway.cloud.ibm.com |
US East | sgmanager.us-east.securegateway.cloud.ibm.com |
United Kingdom | sgmanager.eu-gb.securegateway.cloud.ibm.com |
Germany | sgmanager.eu-de.securegateway.cloud.ibm.com |
Sydney | sgmanager.au-syd.securegateway.cloud.ibm.com |
rscGrp
- The IBM Cloud Resource Group ID for the Secure Gateway Service being accessed.apiKey
- The IBM Cloud apikey of user who has Secure Gateway instance manage permission. Customer can get apiKey via IBM Cloud UI by signing in to IBM Cloud and select Manage>Access (IAM)>API KeysiamEndpoint
- The IBM IAM Endpoint of the environment you are working with. Default value is https://iam.cloud.ibm.comvar env = sdk.defaults ({
'username': <IBM Cloud user name>,
'password': <IBM Cloud password>
})
Deprecation Notice: If you did not migrate your instances from Cloud Foundry org/space to Resource Group yet, please use bluemix-secure-gateway v4.4.0 with different set of default value as below:
basepath
- The basepath of the Secure Gateway Service REST API. (refer to above table for the base path inforamtion)orgID
- The IBM Cloud Organization ID for the Secure Gateway Service being accessed. This is only required if creating or listing gateways.spaceID
- The IBM Cloud Space ID for the Secure Gateway Service being accessed. This is only required if creating, describing, or listing gateways.username
- A IBM Cloud username which is in the Org and Space provided. This is only needed if creating, describing, or listing gateways.password
- The IBM Cloud password associated with the IBM Cloud username provided.token
- An authentication token retrieved from IBM Cloud SSO. This can be used in place of the username and password and must be associated with the Org and Space provided.var env = sdk.defaults ({
'username': <IBM Cloud user name>,
'password': <IBM Cloud password>
})
env.createGateway(options, function(error, gateway))
Options:
desc
- (Required) A description of this gateway. Must be a String.enf_tok_sec
- Whether to require the security token when connecting the client. Must be a boolean. Defaults to true.token_exp
- Number of days until the associated security token expires. Defaults to 90 (enter 0 for never expiring).On success, a gateway object is returned. Use the destination functions on this gateway to manage the destinations under this gateway.
env.getGateway(options, function(error, gateway))
Options:
id
- The Gateway ID, this is accessible from the Secure Gateway UI or the list callsecurityToken
- The Gateway Security TokenReturns a gateway object on success.
env.listGateways (options, function(error, array))
Options:
type
- (optional) Either enabled
or disabled
.Returns an array of all gateways associated with the org and space on success.
gateway.regenAuthorization(function(error, gateway))
Returns the updated gateway object.
gateway.updateGateway(options, function(error, gateway))
Options:
desc
- Updated description of the gatewayenabled
- Enable or disable the gateway. Should be a Booleanenf_tok_sec
- Whether to require the security token when connecting the client. Must be a boolean.regen_token
- Whether to regenerate the associated security token. Defaults to false. Must be a boolean.token_exp
- Number of days until the associated security token expires. Defaults to 90. Ignored if regen_token is false or not provided.gateway.deleteGateway(function(error))
Deletes the gateway and returns an error if one occurred.
Creating and managing destinations is done by calling the functions below on the gateway object returned from the gateway functions.
gateway.createDestination(options, function(error, destination))
Options:
desc
- (Required) A description of the destination. This must a be a String.ip
- (Required) The hostname or ip of the destination.port
- (Required) The port of the destinationclientPort
- This will be a cloud destination. This is the port the client will listen on for an incoming connection.protocol
- (Required) The protocol of the destination, one of TCP, UDP, TLS, HTTP, or HTTPS.TLS
- (Required) One of serverside, mutualauth, or none. Defaults to none. Is only compatible with the TLS protocol.sni
- Server name for the SNI (Server Name Indication) TLS extensions.enable_client_tls
- (Required) Enable TLS for the final outbound connection to the destination. Expected to be a Boolean.client_tls
- (Required) Either mutualauth or none. Is only compatible with enable_client_tls true.private
- Whether iptable rules will be enforced on the cloud host:port connection point. Not supported for cloud destinations. Must be a boolean. Defaults to false.compressData
- Whether the compression of the request data is enabled or not. Must be a boolean. Defaults to true.timeout
- Connection timeout in seconds. To enable the timeout, define a non-zero integer (minimum 1, maximum 180). 0 means disable the timeout.rejectUnauth
- whether the client reject any connection to the destination which is not authorized with the list of supplied CAs. Must be a boolean. Defaults to true.Deprecation Notice:
As of version 4.3.0 the fields are now required: TLS
, enable_client_tls
, client_tls
.
Secure endpoint stand foremost as Secure Gateway's mission and we felt that defaulting
to insecure protocols put our API users at risk. The choice is up to you as the user now
to decide which protocol you want to leverage when creating your destination.
That being said the Secure Gateway Team would like to see users securing their entry points in the cloud with TLS Mutual auth in order to ensure that only the traffic you expect should enter your Secure Gateway tunnel and then your network.
As an example one can create a Cloud to Onprem destination that secures the Cloud entry point with Mutual TLS with the following configuration:
{
"desc": "Mutual Auth Secured Entrypoint to Onprem",
"ip": "my.onprem.destination",
"port": 9000,
"protocol": "TLS",
"TLS": "mutualauth",
"enable_client_tls": false,
"client_tls": "none"
}
Note, this only secures the cloud entry point, and in order to secure the final
path from the Secure Gateway client to the final destination one would need to
set enable_client_tls
to true
, and client_tls
to "mutualauth"
.
gateway.updateDestination(options, function(error, destination))
Options:
id
- (Required) ID of the destination to updatedesc
- A description of the destination. This must a be a String.enabled
- Enable or disable the destination. Should be a Boolean.ip
- The hostname or ip of the destination.port
- The port of the destination.clientPort
- The port the client will listen on for an incoming connection for cloud destinations. If sent to an on-premises destination, an error will be returned.protocol
- The protocol of the destination, one of TCP, UDP, TLS, HTTP, or HTTPS. The default is TCP.TLS
- One of serverside, mutualauth, or none. Defaults to none. Is only compatible with the TLS protocol.sni
- Server name for the SNI (Server Name Indication) TLS extensions.enable_client_tls
- Enable TLS between the client and the final destination. Expected to be a Boolean.client_tls
- Either mutualauth or none. Is only compatible with enable_client_tls true.private
- Whether iptable rules will be enforced on the cloud host:port connection point. Not supported for cloud destinations.compressData
- Whether the compression of the request data is enabled or not. Must be a boolean. Defaults to true.timeout
- Connection timeout in seconds. To enable the timeout, define a non-zero integer (minimum 1, maximum 180). 0 means disable the timeout.rejectUnauth
- whether the client reject any connection to the destination which is not authorized with the list of supplied CAs. Must be a boolean. Defaults to true.gateway.listDestinations(options, function(error, array_of_destinations))
Options:
enabled
- Whether to only include enabled or disabled destinations. Should be a Boolean. If not specified all destinations will be returned.Returns all destinations associated with the gateway
gateway.getDestination(options, function(error, destination))
Options:
id
- ID of the destination to be retrievedgateway.deleteDestination(options, function(error))
Options:
id
- ID of the destination to be deletedgateway.uploadDestinationCert(options, function(err, destination))
Options:
id
- ID of the destination these certificates belong to.server_cert_filepath
- Filepath of the server cert to be uploadedclient_cert_filepath
- Single filepath or an array of up to 6 filepaths of the client certs to be uploadeddest_cert_filepath
- Filepath of the certificate the client should use to identify itself for TLS purposesdest_key_filepath
- Filepath of the key the client should use to identify itself for TLS purposesgateway.downloadDestinationCerts(options, function(err[, array_of_objects]))
Options:
id
- ID of the destination whose certs are to be downloadedfilepath
- Filepath where the zip file should be saved. If none provided, response will be an array of objects {name, contents} instead of a zipgateway.downloadCertsByName(options, function(err[, array_of_objects]))
Options:
id
- ID of the destination these certificates belong to.filenames
- String of filenames separated by spaces or an array of filenamesfilepath
- Filepath where the zip file should be saved. If none provided, response will be an array of objects {name, contents} instead of a zipgateway.deleteDestinationCerts(options, function(err, destination))
Options:
id
- ID of the destination these certificates belong to.filenames
- String of filenames separated by spaces or an array of filenamesgateway.generateDestinationCerts(options, function(err))
Options:
id
- ID of the destination to generate cert and key forclient
- Whether the generated cert and key are for destination-side TLS Mutual Auth (determined by destination properties enable_client_tls
and client_tls
) or for server side TLS Mutual Auth (determined by destination properties protocol
and TLS
). False will generate for server side TLS Mutual Auth, true will generate for destination-side TLS Mutual Auth. Should be a boolean. Default to false.This generates a cert and key for a TLS: Mutual Auth destination on either destination side or server side.
gateway.addIPTableRule(destination_id, options, function(err))
Destination must be set to private in order to add and enforce iptable rules. If you want to set multiple rules at once, you can send an array of options.
Options:
src
- IP to allow to connect. If no src or src_range provided, all IPs will be allowed for this rule.src_range
- Range of IPs (using the form 1.1.1.1-2.2.2.2
) to allow (src and src_range cannot be sent in the same object).spt
- Port or range of ports to allow (using the form 5000:5005
for a range). If none provided, all ports will be allowed for this rule.app
- Desired ID to associate with the rule. If used, any other rule given the same ID will overwrite this onegateway.removeIPTableRule(destination_id, options, function(err))
Destination must be set to private in order to add and enforce iptable rules. Rules may be removed all at once or one at a time (via individual calls). If removing individually, these values should match exactly what was provided when adding them. Options:
src
- IP to match for removal.src_range
- Range of IPs (using the form 1.1.1.1-2.2.2.2
) to allow match for removal (src and src_range cannot be sent in the same object).spt
- Port or range of ports to match for removal (using the form 5000:5005
for a range).all
- Must be a boolean. If true, will remove all iptable rules associed with the destination. Defaults to false.env.exportService([filepath,] function(error[, gateways]))
Exports the gateways and their destinations as a JSON object. If a filepath is provided, a <filepath>/service.config
file will be written containing the response (NOTE: this will overwrite any existing file with the same name). Otherwise, the response will be returned as the second argument of the callback. The downloaded file can be used with the env.importService
function to recreate the gateways and destinations.
env.importService(filepath, function(error, array))
Filepath is the path to the service.config file from an exported service. This imports the gateways and their destinations into the org/space specified in the defaults. On success, an array of gateway objects will be returned.
gateway.exportGateway([filepath,] function(error[, gateway]))
Exports the gateway and its destinations as a JSON object. If a filepath is provided, a <filepath>/<gateway_id>.gateway
file will be written containing the response (NOTE: this will overwrite any existing file with the same name). Otherwise, the response will be returned as the second argument of the callback. The downloaded file can be used with the env.importGateway
function to recreate the gateway and destinations.
env.importGateway(filepath, function(error, gateway))
Filepath is the path to the *.gateway file from an exported gateway. This imports the gateway and its destinations into the org/space specified in the defaults. On success, a gateway object will be returned.
gateway.exportDestination(options, function(error[, destination]))
Exports the destination as a JSON object. If a filepath is provided, a <filepath>/<destiantion_id>.destination
file will be written containing the response (NOTE: this will overwrite any existing file with the same name). Otherwise, the response will be returned as the second argument of the callback. The downloaded file can be used with the gateway.importDestination
function to recreate the destination.
Options:
id
- (Required) ID of the destination to export.filepath
- Location to write the <id>.destination
file.gateway.importDestination(filepath, function(error, destination))
Filepath is the path to the *.destination file from an exported destination. This imports the destination into the gateway. On success, the imported destination will be returned as a JSON object.
gateway.getClientList(function(err, client_id_array))
Returns an array of objects {id, version} that are currently connected to the gateway.
gateway.getClientStatus(client_id, function(err, status))
Returns Connected
or Disconnected
for the specified client ID.
Note: This is only supported for clients >= v1.4.2
gateway.disconnectClients(client_id_array, function(err))
gateway.getDisconnectedClients(function(err, client_id_array))
Returns an array of objects {id, disconnectedAt} containing up to the last 10 clients that disconnected from the gateway.
gateway.getClientLogs([options,] function(err, logs))
Returns an object keyed by the clientID that contains a warnings object and an errors object. Each of these objects contain log messages keyed by timestamp (e.g., {warnings: {<timestamp>:<message>}}
)
Options:
clientID
- Specific client ID to return the logs fortype
- Either warn
or error
, only that type of log will be returnedenv.getInstallerList(function(err, array_of_descriptions))
Returns an array of objects {description, url} for each installer we currently offer.
FAQs
The Secure Gateway SDK for IBM Cloud contains a set of javascript wrapper APIs for Secure Gateway REST calls to the IBM Cloud Secure Gateway service.
The npm package bluemix-secure-gateway receives a total of 14 weekly downloads. As such, bluemix-secure-gateway popularity was classified as not popular.
We found that bluemix-secure-gateway demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 6 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.