The traffic is sniffer traffic. It wouldn't be a network for guests, or
public, it would be both.


On Fri, May 23, 2014 at 2:45 PM, Daan Hoogland <daan.hoogl...@gmail.com>wrote:

> H Marcus,
>
> You are raising more questions here
> The traffic is just user data isn't it? Why a new traffic type? Or are
> you forking the data and then considering the fork another type?
>
> thanks,
> Daan
>
>
> On Fri, May 23, 2014 at 5:53 PM, Marcus <shadow...@gmail.com> wrote:
> > Perhaps it should be a separate traffic type, if we go the route of
> piping
> > it through to another network. I've also found a network_details table
> that
> > seems to be unused.
> >
> >
> > On Thu, May 22, 2014 at 9:04 AM, Marcus <shadow...@gmail.com> wrote:
> >
> >> Yet another vector
> >>
> >>
> >> On Thu, May 22, 2014 at 8:07 AM, Erik Weber <terbol...@gmail.com>
> wrote:
> >>
> >>> What prevents root from revealing and using the domain admin api /
> secret
> >>> Key?
> >>>
> >>> Erik
> >>> 22. mai 2014 15:54 skrev "Marcus" <shadow...@gmail.com> følgende:
> >>>
> >>> > I've always viewed the permissions to be additive, if a domain admin
> has
> >>> > the ability to set up network sniffing on the VPC I'd imagine the
> root
> >>> > admin should be able to as well. Although perhaps not. Even though
> they
> >>> > have unfettered access to destroy all vms, networks, zones, the root
> >>> admin
> >>> > may not have access to the VM hosts, and may not already have access
> to
> >>> the
> >>> > VMs themselves if the root passwords are not known. This would
> >>> introduce a
> >>> > vector whereby a root admin without host access could spin up a
> network
> >>> and
> >>> > vm for a tenant and see their traffic where they'd normally only be
> >>> able to
> >>> > if they had access to the root passwords of the tenant's instances or
> >>> the
> >>> > hosts. I imagine the overwhelming majority of root admins have host
> or
> >>> > network access, but not all. In the end I'm not sure such an
> untrusted
> >>> user
> >>> > should be a root admin, as there are many other attack vectors (such
> as
> >>> > downloading a tenant's volume). Perhaps I'm missing the point.
> >>> >
> >>> > It would certainly be easier to implement from an orchestration
> >>> perspective
> >>> > on the router. The collection could happen on the router, but the
> >>> storage
> >>> > of the packet data probably not, and for the analysis it seems kind
> of
> >>> > dangerous to run more user-accessible tools on a system that is
> >>> supposed to
> >>> > be locked down.  Especially since it would likely be a web service of
> >>> some
> >>> > sort running on the public interface. IDS software setup and
> >>> maintenance is
> >>> > pretty involved, I'm not sure the CS community would be interested in
> >>> > maintaining that. We generally promote the virtual router as an
> >>> appliance,
> >>> > and so I think we'd need to maintain that software install on the
> >>> router.
> >>> > These (along with the migration issues) are the reasons why I was
> >>> leaning
> >>> > toward a 'sniffer net', where the users could have what they'd
> normally
> >>> > have in a datacenter with a 'port mirror', and they can decide how to
> >>> > collect and analyze the data.
> >>> >
> >>> >
> >>> > On Thu, May 22, 2014 at 2:34 AM, Daan Hoogland <
> daan.hoogl...@gmail.com
> >>> > >wrote:
> >>> >
> >>> > > Marcus, you mention a permission issue that triggers the though:
> >>> > > should a root admin be allowed? I think not. This brings up extra
> >>> > > requirements on the IAM, does it?
> >>> > >
> >>> > > I would implement the functionality on the router.
> >>> > >
> >>> > > On Thu, May 22, 2014 at 6:42 AM, Marcus <shadow...@gmail.com>
> wrote:
> >>> > > > I really like the lower overhead of just port mirroring from one
> of
> >>> the
> >>> > > > router's interfaces to an instance interface host-side, but I
> really
> >>> > > > dislike the affinity it creates between the router and the
> listener,
> >>> > and
> >>> > > > all of the complications it creates for host maintenance and
> >>> > migrations.
> >>> > > It
> >>> > > > may also require that whomever creates a network or vms on a
> network
> >>> > with
> >>> > > > this permission be a domain admin, since it has the ability to
> see
> >>> > > > everything on the wire for the whole VPC.
> >>> > > >
> >>> > > >
> >>> > > > On Wed, May 21, 2014 at 4:25 PM, Marcus <shadow...@gmail.com>
> >>> wrote:
> >>> > > >
> >>> > > >> Hi guys,
> >>> > > >>    Not sure if this has been discussed before, but we are
> getting
> >>> > > feature
> >>> > > >> requests for an IDS or packet-sniffing/monitoring capability. I
> >>> have a
> >>> > > >> prototyped idea of how to do this (manual config), but would
> like
> >>> some
> >>> > > >> input.
> >>> > > >>
> >>> > > >> We create a network offering or network capability/detail that
> is
> >>> > > >> specifically a 'sniffer net'. This would be relatively simple,
> and
> >>> > just
> >>> > > do
> >>> > > >> two things:
> >>> > > >>
> >>> > > >> 1) when network is added to VPC, spin up a simple daemon on the
> VPC
> >>> > > router
> >>> > > >> that does traffic mirroring (netsniff-ng or daemonlogger are
> debian
> >>> > > >> packages) from the public interface to the 'sniffer net'
> interface.
> >>> > > >>
> >>> > > >> 2) disables mac learning on the bridges created for the sniffer
> >>> net,
> >>> > so
> >>> > > >> that an IDS system can come up in this net and see all of the
> >>> mirrored
> >>> > > >> traffic. It wouldn't handle making the IDS appliance, that would
> >>> be up
> >>> > > to
> >>> > > >> the customer, it would simply create a network that enables
> traffic
> >>> > > >> monitoring for the VPC.
> >>> > > >>
> >>> > > >> I think we'd prefer any VMs brought up in this network to live
> on
> >>> the
> >>> > > same
> >>> > > >> host as the router for performance reasons, but that's probably
> >>> not an
> >>> > > >> immediate requirement. I dislike the idea of trying to run an
> >>> actual
> >>> > > >> capture saved to the VPC router, or an IDS software on the VPC
> >>> router
> >>> > > that
> >>> > > >> would need to be updated.
> >>> > > >>
> >>> > > >> We could also run traffic mirroring from the VPC router's
> interface
> >>> > > >> directly to another VM's interface, host side (daemonlogger -i
> >>> vpcintf
> >>> > > -o
> >>> > > >> idsintf), but it would need to be on the same host.
> >>> > > >>
> >>> > > >>
> >>> > > >>
> >>> > > >>
> >>> > >
> >>> > >
> >>> > >
> >>> > > --
> >>> > > Daan
> >>> > >
> >>> >
> >>>
> >>
> >>
>
>
>
> --
> Daan
>

Reply via email to