Hi John,

Thank you for the comments! And thanks to others as well who
have responded; we'll let the conversation continue longer before
we present anything to Broad IT.

On Sat, Aug 8, 2015 at 5:05 PM, john hood <cg...@glup.org> wrote:
>
> When you say "login server", what exactly do you mean?  Is this a
> bastion host that you can ssh to, and then connect to internal hosts
> from?  (That's what I'll assume here.)
>

It's not a bastion host. As far as I understand, the 'login servers' have
full access to all filesystems/data, programs, etc. that an internal host
would have. I believe it is inside the firewall. It does not run iptables,
so
there may be some kind of device sitting in front of it. The primary
difference between it and an internal host is that it is accessible to the
outside world but imposes strict memory limits on users (10 MB) and
offers just 1 virtualized core. So a user would generally ssh into this and
then connect to an internal host (with more resources). I'm not aware
of any bastion host at the Broad.


> Is the concern here that servers running Mosh could be used as DDoS
> reflectors, or that opening UDP ports would allow Broad-internal hosts
> to be useful for DDoS bots wanting to generate UDP?
>

The team's primary concern is the first issue, which you addressed well.

Best,
Hayden
_______________________________________________
mosh-devel mailing list
mosh-devel@mit.edu
http://mailman.mit.edu/mailman/listinfo/mosh-devel

Reply via email to