Aproxy Subordinate Charm
| Channel | Revision | Published | Runs on |
|---|---|---|---|
| latest/stable | 7 | 17 Oct 2025 | |
| latest/stable | 4 | 14 Oct 2025 | |
| latest/edge | 10 | 27 Oct 2025 | |
| latest/edge | 9 | 27 Oct 2025 |
juju deploy aproxy
Deploy universal operators easily with Juju, the Universal Operator Lifecycle Manager.
Platform:
Security overview
The aproxy subordinate charm installs and manages the aproxy snap and configures nftables rules to transparently intercept outbound TCP traffic and forward it through an upstream proxy. Because the charm manipulates low-level system networking and handles traffic redirection, security considerations are critical.
Risks
This section outlines known risks and suggested good practices for users to minimize the associated risk.
Privileged operations
The charm uses snap to install and configure the aproxy snap, which requires system-level permissions.
It directly invokes nftables to configure firewall and redirection rules. Incorrect or malicious configurations could:
-
Break system networking.
-
Open the system to denial-of-service conditions.
-
Allow unintended traffic redirection.
Good practices
-
Deploy the charm only on trusted workloads where network interception is expected and approved.
-
Ensure only administrators with appropriate permissions can change charm configuration (
juju config). -
Regularly audit nftables rules on systems where this charm is deployed.
Proxy reachability
The charm validates whether the configured upstream proxy (proxy-address) is reachable. If it is not, the unit enters a BlockedStatus.
If a misconfigured or malicious proxy is set, sensitive traffic could be redirected to an unintended endpoint.
Good practices
-
Always configure the charm with a trusted proxy endpoint.
-
Use allowlists and monitoring to detect if traffic is being routed unexpectedly.
Traffic interception
The charm transparently intercepts outbound traffic, which can include sensitive user or application data.
By design, intercepted traffic is redirected through aproxy, which in turn forwards it to an upstream proxy. This may impact confidentiality if the proxy operator is not trusted.
Good practices
-
Use this charm only in environments where a transparent proxy is a compliance or policy requirement.
-
Ensure that TLS interception (if enabled upstream) is disclosed, audited, and compliant with local regulations.
nftables cleanup
On charm removal or stopping, the nftables rules are flushed. If the cleanup fails, stale rules may persist, leaving the system in an insecure or degraded state.
Good practices
-
Validate nftables rules after stopping or removing the charm.
-
Integrate nftables state checks into monitoring systems.
Information security
Data confidentiality: All outbound TCP traffic is routed through aproxy to an upstream proxy. This makes the proxy a critical point for inspecting, logging, or potentially leaking sensitive data.
Availability: If the upstream proxy is unavailable, the charm blocks network access by design (meaning the traffic redirection fails), which could cause outages for applications depending on outbound connectivity.
Integrity: nftables rules are automatically managed by the charm. Manual changes to nftables may conflict with charm behavior, leading to inconsistencies in rule enforcement.