On Mon, 2020-02-03 at 13:23 +0100, Janne Johansson wrote:
> And refine the risk strategies, since the above conversation seem to be
> centered around the concept of a hacker that
>
> 1. Someone successfully attacks your site over the internet, using your
> outward facing IP A.A.A.A
> 2. Manages to run code on your webserver

That outward facing address A.A.A.A seems to be hidden behind a tor web,
which means the attacker can access a server without knowing its real IP
address. Knowledge of this real IP address may be the ultimate aim of the hack.

> 3. May or may not divinate your internal IP B.B.B.B from that code.

If that address B.B.B.B is an internal IP address, the hacker may not be able
to succeed in the original quest. Note, that the hacker may also find the MAC
address of the device, and all connected devices, which may give away the owner
of the device.

> 4. The communicates information back to a server of their choice, perhaps
> using a third (external) ip C.C.C.C or not

This appears to be the crucial part. If the hacker can initiate connections from
the hacked device, the public facing IP address is prone to discovery.

Therefore I propose the following solution:

1. Put the potentially vulnerable device behind a firewall. The firewall 
forwards
    requests to the device and back, but allows no outgoing connections from the
    protected device to the firewall or beyond.

2. Lock down the vulnerable device. If the device does not allow changing its 
MAC
    address, patch the kernel to report something else. Also make sure, that 
your
    vulnerable device creates no logs. Make sure, that the user account running
    the potentially vulnerable application can not write to any directory, from
    which executables can be started or dynamic libraries can be linked against.

3. Barriers are only effective, if they are properly defended. Your firewall 
must
    monitor and reliably unusual network activity from the vulnerable host, and 
shut
    down all network connections, if suspicious stuff happens. Consider a 
configuration,
    in which all disk access goes to a RAM disk, such that a simple reboot 
restores
    normal operation.

4. Obviously, no other device must be in the same network, especially not 
devices,
    which could provide hints about your identity.




Reply via email to