Marian Marinov wrote:
On Friday 24 October 2008 20:15:10 Leif Nixon wrote:
"B. Vincent Diepeveen" <[EMAIL PROTECTED]> writes:
Now you post here a big story on how your Rocks got hacked. Do i
conclude it correctly the
problem is that you ran a default Rocks kernel?
The basic problem seems to be bad account hygiene.

That's a hard problem. Users will forever be borrowing each other's
accounts, making it difficult to contain security breaches.

But if you build a good infrastructure jailing the users within one directory with access to files that do not affect the underlaing OS you will have better chance of leaving such attacks out of your systems.

Well, there has been a discussion in the past about using chroot jails for security. My current understanding after following these threads a year or more ago, is that chroot jails are not, in fact, designed with security in mind, and shouldn't be relied upon as a security feature. In fact, there were some chroot tunneling exploits posted a while ago that suggest that chroot for security may be as much security theatre as hard-to-guess-say-speak passwords.

A scheme like that is when all of your users are chrooted to their home folders with the OS for each user mounted from a read-only image. This way it becomes harder for attackers to penetrate the OS security.

Harder, possibly.  Impossible?  no.

Also a good security addition will be adding SELinux, RSBAC or GRSecurity to the kernel and actually using any of these.

SElinux has been annoying, even overtly frustrating to use.

The things that bother me are there appear to be real things you can do to secure systems (layers), and there is security theatre. Sadly, most people happily talk about security theatre as if it were real security.

The best statement I have heard about security is that it is a process, not a feature/function. You can't add more security by adding a product. You can by changing they way something is used.

We are in the process of altering how this user uses their cluster. In doing so, we are disabling a number of attack vectors. Does this make their machine more secure? No. It is important to understand, that closing some doors may leave other hidden ones open. So what we try to do is create layers such that in the event we screw up, the damage is contained.


Regards
Marian Marinov
Head of System Operations at Siteground.com
_______________________________________________
Beowulf mailing list, Beowulf@beowulf.org
To change your subscription (digest mode or unsubscribe) visit 
http://www.beowulf.org/mailman/listinfo/beowulf


--
Joseph Landman, Ph.D
Founder and CEO
Scalable Informatics LLC,
email: [EMAIL PROTECTED]
web  : http://www.scalableinformatics.com
       http://jackrabbit.scalableinformatics.com
phone: +1 734 786 8423 x121
fax  : +1 866 888 3112
cell : +1 734 612 4615
_______________________________________________
Beowulf mailing list, Beowulf@beowulf.org
To change your subscription (digest mode or unsubscribe) visit 
http://www.beowulf.org/mailman/listinfo/beowulf

Reply via email to