On 08/13/2010 09:25 AM, Mark Knecht wrote:
> On Fri, Aug 13, 2010 at 8:25 AM, Enrico Weigelt <[email protected]> wrote:
>> * Paul Hartman <[email protected]> wrote:
>>
>> <snip>
>>
>> Apropos cracked machines:
>>
>> In recent years I often got trouble w/ cracked customer's boxes
>> (one eg. was abused for SIP-calling people around the world and
>> asking them for their debit card codes ;-o). So thought about
>> protection against those scenarios. The solution:
>>
>> Put all remotely available services into containers and make the
>> host system only accessible via special channels (eg. serial console).
>> You can run automatic sanity tests and security alerts from the hosts
>> system, which cannot be highjacked (as long as there's no kernel
>> bug which allows escaping a container ;-o).
>>
>> This also brings several other benefits, eg. easier backups, quick
>> migration to other machines, etc.
>>
>>
>> cu
> 
> Hi Enrico,
>    Since I'm not an IT guy could you please explain this just a bit
> more? What is 'a container'? Is it a chroot running on the same
> machine? A different machine? Something completely different?
> 
>    In the OP's case (I believe) he thought a personal machine at home
> was compromised. If that's the case then without doubling my
> electrical bill (2 computers) how would I implement your containers?

Basically just run VMWare/Virtualbox etc and put the services in there.

That's why I force my kids to use IE in a VM....

No, chroots are NOT the same. They run on the same system.

Reply via email to