On Thu, Aug 6, 2009 at 4:28 PM, Corey<co...@bitworthy.net> wrote: > On Thursday 06 August 2009 01:19:35 Robert Raschke wrote: >> On Thu, Aug 6, 2009 at 8:52 AM, Corey <co...@bitworthy.net> wrote: > <snip> >> > That wasn't a rhetorical question. Why bother locking your door? >> > >> > Any intruder worth his weight in salt can circumvent such a simple >> > security mechanism with ease. >> >> Why lock your door, when you're living in a gated community? >> > > A few possible answers: > > Because I'm convinced that multiple redundant layers of security is > most effective. > > Because I _don't_ live in a gated community. > > Because anyone can hop a fence, the silly pathetic lock (password) on > my front door (auth server) is my last line of defense; and it will be > immediately and clearly obvious that someone broke in because... well.. > they _broke_ in (turned off and dismantled the server)... they didn't > just walk in without further ado (began issuing commands as hostowner > on the open terminal) and leave without immediate and clear evidence > (no broken/missing case, no powered off server and missing drives, etc) > > >> Your cpu/auth/filesystem machines can be somewhere safe, with as much >> physical safety as you need (physical barriers are much easier to set up >> and administer that electronic ones). If all is set up properly, you will >> never have to touch those machines again. Unless the machines break and >> you need to look at the hardware. >> > > Meanwhile, here on terra firma, I would like to be able to have my > Plan 9 servers sitting on a rack in a common affordable co-lo somewhere. > > > I think the actual root of the situation, is simply that Plan 9 currently > tends to reside within domains with much more strict and secure > or trustworthy environments vs. being prevalent within the sphere of > the great unwashed masses of the industry where strong physical > security is either unobtainable, unaffordable, and/or unreliable at best. > > _Within_such_environments_, simple passwords remain an effective and > proven means of _deterrent_ from the most common, random, unforeseen > encounters that may occur on a near every day situation. > > > The phone guys have to enter the server room - you trust them with bootes? > > Various contractors have to enter the server room - you trust them with > bootes? > > The sysadmin forgets to lock the door to the server room before heading > out for lunch - you trust all your visitors, customers, affiliates and > employees with a terminal sitting at a bootes prompt? > > The hosting provider has all number of people walking in and out of the > server room constantly, every day - you trust each and every one of these > random unknown people with a bootes prompt to your co-lo'd cpu server? > > Now here's the important part -- in each of these cases (those are just a few, > it doesn't take much of an imagination - or much actual experience - to come > up with countless more), the _real_ concern is _not_ over that rare motivated, > focused, risk-taking bad guy with a plan who's come prepared with a > screwdriver and usb rootkit and assorted bootdisks... the concern is all the > ad-hoc opportunistic, curious and/or malicious passer-by's, armed with > nothing more than their fingers, who just might take up the chance to goof > around with that open terminal connected to the server. > > I have a much higher level of trust that X person won't walk off with or > dismantle a server vs. the level of trust I have that X person won't execute > commands on an open terminal. It's really quite simple. > > If your servers aren't under you direct control, and they're not guaranteed > continually locked behind a bio-metrically secured room under constant video > surveillance - then you don't have physical security. > > If you don't operate within a contained, peer-based trusted environment (lab, > research center, spec. dept., etc), then you don't have physical security. > > Most of the industry at large... does _not_ have trusted physical security. > > And if you don't have trusted physical security, then an open terminal is > beyond the pale of recklessness. > > Passwords make an excellent form of _additional_deterrent_ under the sort > of lowest common denominator environment that tends to comprise the > industry at large. (from AnyTec, to Bob's coffee house, to Standford & Son's > automotive repair, to The Law Offices Of Larry H. Parker, to Data Entry Inc.) > > I honestly can't believe that this is even up for debate! <grin> > > It's just bizarre. >
Oh, if we're just protecting against people wandering by who are obviously there by mistake--since we're discounting anyone coming prepared for serious maliciousness--how about just not having a terminal connected to your file server? My cpu/auth/file servers don't have anything connected except an ethernet cable and a remote serial console. Oh, sure, there's a crash cart over in the corner that you could drag over and plug in, but you've decided that we're only talking about opportunists who see a prompt and decide to type some stuff, so it's not a problem. The whole friggin' point of a colo is that you trust the people running it--also, that they don't leave terminals connected to every single one of their hundreds of customer machines. It's a locked room in a corporate building... this ain't your little brother banging on keys (a far more realistic reason for password-protecting a cpu server, if you're going to be dumb enough to leave the head attached). I have a Plan 9 server sitting in a lab at my university. Over the last 2+ years, it has been in the same place, powered on, connected to a keyboard, mouse, and monitor. The only deterrent to unauthorized users has been that I keep the monitor off, and in those 2 years I have not found a single sign that anyone has so much as touched the keyboard, much less done "rm -r /" or whatever it is you're afraid of. I'm afraid you'll have to forgive me if I find the probability of someone improperly accessing your headless colo'd box rather low. I invite you, though, to create some form of logging protection system for the box. Put the box in a colo, and then in 3 years send us your logs. I guess we'll see how many people tried to get into your cpu server. John -- "Object-oriented design is the roman numerals of computing" -- Rob Pike