In message <0100016b3e41b455-b95a3601-7822-4541-823a-6230f277bf1b-000000@email.
amazonses.com>, Antonio Leding <t...@leding.net>wrote:

>Security:
>
>With some VMs, you will have complete root-level rights on
>the server and can do what you wish in terms of server security.

Yes.  Quite.  And believe me, I would -never- waste time on or trust in
even the smallest way any VM that I DID NOT have root on.

I already do have one VM "slice", and yes, I do have root on that.

Traditionally, through the past 30+ years, and until quite recently, I've
never placed -any- trust in any machine that I did not have immediate
phsysical proximity to.  And even now, I still view remote cloud servers
with great skepticism, security-wise.  The revelations, over that past
year or so, of the multiple entire *waves* of x86 CPU security flaws...
many of which still remain to be patched... have only underscored and
reinforced my original skepticism.  Having root on a VM is hardly
insurance against anything, and wasn't, even before anyone even knew
about all of these CPU bugs.  How the hell do I know who has access
to my storage volumes if they are in a data center a thousand miles
away from me, being tended by people who I have never even met?

So I approach remote VMs very very cautiously, and unlike various
corporations that have jumped headlong onto the cloud bandwagon with
both feet, I personally put as little of my data as possible on such
things. And even then, you won't catch me putting anything on there that
would cause me real problems if the data were exposed to the entire
planet.

Call me paranoid.  Call me a luddite.  But I sleep soundly at night.

>I understand - and share - your concerns re: cloud-based mail security
>but those issues are manageable if proper infosec is implemented.

I disagree, and I believe that I even have evidence to the contrary.

Anybody working in that same data center, or who has either direct or
remote admin access to the whole thing can image your entire drive
anytime they want.... and perhaps without you even knowing that it
happened.  We all hope that hosting company personnel won't go around
doing this, willy nilly, or in lieu of a court order, but there are no
guarrantees.

Even though I may disagree with you about the security of cloud VMs, I'm
still very glad that you spoke up anyway, because you've made me think
a bit more about the problem I'm trying to solve, and I've just realized
that there may perhaps be a whole different way to skin this cat.

The bottom line is that really, I just want a (another) remote VM *only*
(or primarily) for its static IP address... a static IP that's needed,
generally although not necessarily absolutely, in order to run a mail
server.

Sooooooo... maybe what I really should be trying to figure out is how
I can run a -single- instance of Postfix, down here on my (soon to be
dynamic) end-luser broadband line, and just set up a VM at some fixed
IP address that will be running some sort of a VPN or something that
will just be, in effect, transparently proxying all of the inbound port
25 traffic to my (soon to be dynamic) DSL line.

Will this work?  Is anybody doing this already?  If so, how do I set it
all up?


Regards,
rfg

Reply via email to