Couple things - last one first…

The static —> dynamic mapping…I would dig into what Wietse said earlier…VPN.  
If you merely want to have a static IP just act as basically a front-end for 
your local dynamic setup, then that’s the ticket…

As to the local errant could-tech imaging your HDD, totally agreed…but again, 
manageable via on-disk encryption…

Regardless, I understand your concern\fears re: putting that much faith in a 
location\hardware\people you cannot directly touch\manage\talk-to…makes total 
sense but as I’m sure you’d agree, we all have our varying levels of comfort 
and thresholds…




> On Jun 9, 2019, at 3:58 PM, Ronald F. Guilmette <r...@tristatelogic.com> 
> wrote:
> 
> 
> In message 
> <0100016b3e41b455-b95a3601-7822-4541-823a-6230f277bf1b-000000@email.
> amazonses.com>, Antonio Leding <t...@leding.net>wrote:
> 
>> Security:
>> 
>> With some VMs, you will have complete root-level rights on
>> the server and can do what you wish in terms of server security.
> 
> Yes.  Quite.  And believe me, I would -never- waste time on or trust in
> even the smallest way any VM that I DID NOT have root on.
> 
> I already do have one VM "slice", and yes, I do have root on that.
> 
> Traditionally, through the past 30+ years, and until quite recently, I've
> never placed -any- trust in any machine that I did not have immediate
> phsysical proximity to.  And even now, I still view remote cloud servers
> with great skepticism, security-wise.  The revelations, over that past
> year or so, of the multiple entire *waves* of x86 CPU security flaws...
> many of which still remain to be patched... have only underscored and
> reinforced my original skepticism.  Having root on a VM is hardly
> insurance against anything, and wasn't, even before anyone even knew
> about all of these CPU bugs.  How the hell do I know who has access
> to my storage volumes if they are in a data center a thousand miles
> away from me, being tended by people who I have never even met?
> 
> So I approach remote VMs very very cautiously, and unlike various
> corporations that have jumped headlong onto the cloud bandwagon with
> both feet, I personally put as little of my data as possible on such
> things. And even then, you won't catch me putting anything on there that
> would cause me real problems if the data were exposed to the entire
> planet.
> 
> Call me paranoid.  Call me a luddite.  But I sleep soundly at night.
> 
>> I understand - and share - your concerns re: cloud-based mail security
>> but those issues are manageable if proper infosec is implemented.
> 
> I disagree, and I believe that I even have evidence to the contrary.
> 
> Anybody working in that same data center, or who has either direct or
> remote admin access to the whole thing can image your entire drive
> anytime they want.... and perhaps without you even knowing that it
> happened.  We all hope that hosting company personnel won't go around
> doing this, willy nilly, or in lieu of a court order, but there are no
> guarrantees.
> 
> Even though I may disagree with you about the security of cloud VMs, I'm
> still very glad that you spoke up anyway, because you've made me think
> a bit more about the problem I'm trying to solve, and I've just realized
> that there may perhaps be a whole different way to skin this cat.
> 
> The bottom line is that really, I just want a (another) remote VM *only*
> (or primarily) for its static IP address... a static IP that's needed,
> generally although not necessarily absolutely, in order to run a mail
> server.
> 
> Sooooooo... maybe what I really should be trying to figure out is how
> I can run a -single- instance of Postfix, down here on my (soon to be
> dynamic) end-luser broadband line, and just set up a VM at some fixed
> IP address that will be running some sort of a VPN or something that
> will just be, in effect, transparently proxying all of the inbound port
> 25 traffic to my (soon to be dynamic) DSL line.
> 
> Will this work?  Is anybody doing this already?  If so, how do I set it
> all up?
> 
> 
> Regards,
> rfg

Reply via email to