On Thursday 06 August 2009 17:01:30 John Floren wrote:
> On Thu, Aug 6, 2009 at 4:28 PM, Corey<co...@bitworthy.net> wrote:
<snip>
> > I honestly can't believe that this is even up for debate!  <grin>
> >
> > It's just bizarre.
>
> Oh, if we're just protecting against people wandering by who are
> obviously there by mistake--since we're discounting anyone coming
> prepared for serious maliciousness--how about just not having a
> terminal connected to your file server?
>

Ok, that's reasonable. Especially when considering the idea that, 
apparently, once a Plan 9 cpu/auth/fs server has been set up, there's 
no reason to require further periodic access to its terminal.

Removing the Plan 9 server's terminal peripherals is equivalent to - and
follows the same exact line of reasoning for - implementing a password 
for said server's terminal.

i.e. - both techniques increase the level of difficulty and effort and
inconvenience one must suffer through before gaining unauthorized
access to a hostowner prompt.

In light of this, I'm still unconvinced that a terminal password is totally
without merit. At least with a password, I don't force trusted admins
to lug out the peripherals.


> My cpu/auth/file servers don't
> have anything connected except an ethernet cable and a remote serial
> console. Oh, sure, there's a crash cart over in the corner that you
> could drag over and plug in, but you've decided that we're only
> talking about opportunists who see a prompt and decide to type some
> stuff, so it's not a problem.
>

True.


> The whole friggin' point of a colo is that you trust the people
> running it--
>

I have direct experience as a contractor where I have entered
many a co-lo; and was unimpressed with their security to say the least.
I had constant and easy access to a large number of nameless servers,
it's a nobrainer to access keyboard/monitor pairs in many of these places.

Interestingly enough - that simple, worthless password prompt is what 
made it effectively impossible to do anything with said servers. It was easy
for me to reach keyboards; but would have been risky and difficult - and
would have had _zero_ plausible deniability - to pop a chassis and snag 
hard drives.


> I have not found a single sign that anyone has so much as touched the
> keyboard, much less done "rm -r /" or whatever it is you're afraid of.
>

I'm afraid of all the same things you're afraid of - all the same reasons
why authentication is necessary when accessing the server remotely.

As far as I'm concerned, physical access to the terminal is no different
than remote access. I differentiate between the server's terminal and the
server's chassis, though they are often within reaching distance of each
other. 

To conflate the terminal with the server, as Plan 9 servers apparently
do, is a lazy and unnecessary abstraction in my mind.


> I'm afraid you'll have to forgive me if I find the probability of
> someone improperly accessing your headless colo'd box rather low.
>
> I invite you, though, to create some form of logging protection system
> for the box. Put the box in a colo, and then in 3 years send us your
> logs. I guess we'll see how many people tried to get into your cpu
> server.
>

The co-lo situation was just one example. I agree the risk is sleight -
after all, there are _lots_ of servers in a co-lo. So what's the chances
of _mine_ getting abused?

On Thursday 06 August 2009 17:17:19 John Floren wrote:
> A note, please don't take this as a flame. 
>

Not at all! It's good to hear others experiences and conclusions.


Cheers,

Corey


Reply via email to