Moving past TCP in the data center, part 1
Moving past TCP in the data center, part 1
Posted Nov 2, 2022 20:36 UTC (Wed) by MatejLach (guest, #84942)In reply to: Moving past TCP in the data center, part 1 by Cyberax
Parent article: Moving past TCP in the data center, part 1
Is this still the general consensus even after Snowden? I am not saying it's a silver bullet against a dedicated attacker like the NSA, but I'd think that every additional obstacle in the way is going to raise the bar for dragnets just a tiny bit, no?
Posted Nov 2, 2022 21:58 UTC (Wed)
by NYKevin (subscriber, #129325)
[Link] (3 responses)
Posted Nov 2, 2022 22:40 UTC (Wed)
by Wol (subscriber, #4433)
[Link] (2 responses)
Given the breakins and stuff businesses have suffered, yes it's an absolute pain, but it means that if anybody does manage to break in to my laptop, it's now rather harder for them to jump to someone else and break into their laptop, moving up the chain ...
Cheers,
Posted Nov 2, 2022 23:09 UTC (Wed)
by NYKevin (subscriber, #129325)
[Link] (1 responses)
1. 2FA has nothing to do with encryption. 2FA is primarily about stopping phishing, and only used by humans (I was talking about machine-to-machine communication).
Posted Nov 3, 2022 7:56 UTC (Thu)
by Wol (subscriber, #4433)
[Link]
Cheers,
Posted Nov 2, 2022 23:58 UTC (Wed)
by Cyberax (✭ supporter ✭, #52523)
[Link] (6 responses)
So NSA would simply officially ask Amazon to provide them with a covert way to access the data for a specific customer directly using the AWS services.
Posted Nov 3, 2022 9:48 UTC (Thu)
by paulj (subscriber, #341)
[Link] (1 responses)
Minimising the trust and scope of access of what employees can access, to what they need to access for their immediate role, is a good thing, security wise.
Posted Nov 3, 2022 17:31 UTC (Thu)
by Cyberax (✭ supporter ✭, #52523)
[Link]
Posted Nov 23, 2022 22:27 UTC (Wed)
by Rudd-O (guest, #61155)
[Link] (3 responses)
Snowden already revealed this. There are extensive talks on the subject presented by Jacob Applebaum at CCC.
Posted Nov 23, 2022 23:43 UTC (Wed)
by Cyberax (✭ supporter ✭, #52523)
[Link] (2 responses)
You maybe can mirror one port to another, but in an Amazon DC this means nothing. You'll just confuse some random EC2 hardware instance. You won't even be able to do much if you redirect the traffic to an instance that you control, because it's encrypted.
Posted Nov 24, 2022 9:54 UTC (Thu)
by paulj (subscriber, #341)
[Link]
Except the L3 switch ASIC can be programmed to redirect only certain flows to said CPU. They can also be programmed to encap and redirect certain flows to other hosts. Indeed, they can be programmed to mirror packets (but I can't remember if the L3 ASICs commonly used at the super-large DCs can /both/ mirror and encap the same flow - if not, it's just a matter of time till they do).
So:
1. You don't need to analyse the entire data flow on the puny switch CPU, cause the /powerful/ switching ASIC can be programmed to do hardware tcpdumping (basically). Given the CPUs on these switches aren't /that/ puny (low to mid end Xeons), further analysis on host is quite feasible.
Posted Nov 24, 2022 9:56 UTC (Thu)
by paulj (subscriber, #341)
[Link]
I note this is a good counter-argument to your own argument in another sub-thread that intra-DC traffic doesn't need to be encrypted. ;)
Posted Nov 23, 2022 22:26 UTC (Wed)
by Rudd-O (guest, #61155)
[Link]
Google encrypt all its traffic at the Stubby layer.
Moving past TCP in the data center, part 1
Moving past TCP in the data center, part 1
Wol
Moving past TCP in the data center, part 1
2. Unless your laptop is in the same physical building as all of the servers you will be interacting with, and your company has complete autonomy over that building (i.e. you're not leasing it out from someone who might have physical access), you're not using "trusted" lines in the sense I was referencing. I explicitly said this isn't about who owns or leases the lines. It's about who is able to physically touch and interact with the lines.
Moving past TCP in the data center, part 1
Wol
Moving past TCP in the data center, part 1
Moving past TCP in the data center, part 1
Moving past TCP in the data center, part 1
Moving past TCP in the data center, part 1
Moving past TCP in the data center, part 1
Moving past TCP in the data center, part 1
2. Even better, you can just redirect the flow you're interested in to a bigger server by encapping it (the server can resend the flow's packets out again so they're not missed).
Moving past TCP in the data center, part 1
Moving past TCP in the data center, part 1
