Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


Provider can see what customers is doing on vps? - Page 2
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

Provider can see what customers is doing on vps?

2

Comments

  • jlayjlay Member
    edited May 2017

    @ethancedrik said:

    @endlesslhk said:
    I'm just curious.
    In openvz, I heard that providers can see what processes work and content of all files.
    Is it possible in kvm or xen?
    I dont want providers see my sources code.

    If you're scared about this you could go with a big provider like OVH, Vultr, AmazonAWS Compute, Microsoft Azure, where their employees don't have that kind of access and the CEO probably isn't going through the billions of VPSs they have. Azure has a free $200 credit trial but it's like $60/month to renew on their lowest plan, and AmazonAWS compute is also pretty expensive too

    The employees at these larger companies often do have access - how else are they supposed to support the customers? They just don't care what's going on past why you're talking to them. Nobody wants to risk losing their job just to go poking around one of thousands of systems they have access to. Not to mention it's wrong :p

    I'm a Linux SysAd at Rackspace and I work with our enterprise hybrid (dedicated+cloud) customers and even though I surely have access to some sensitive things, it's not worth losing my career/livelihood to go poking around where I shouldn't. I'd be wary of the smaller hosts, which the cheap VPS market is full of.

    Thanked by 1deadbeef
  • rm_rm_ IPv6 Advocate, Veteran

    jiggawattz said: You invented two ludicrous examples and ignored the obvious:

    And you ignored the very part of my message that answers your entire "counterpoint".

  • NeoonNeoon Community Contributor, Veteran

    @Gamma17 said:
    Dedicated server is not 100% safe either, even with encryption, as long as someone has physical acces to server there is no way to be sure...

    Well, just get a cheap old AMD, like FX... they are known for a non backdoored bios.

    Put glue into all ports, PCie Lanes, USB Ports...

    Just enought to let the disk access to power and SATA.

    Encrypt the DIsk, write a bash scripts which ensure if network connection is lost, server will be powered down.

    Use also a non redundant power supply, so non one can switch power without you know it.

    Profit? Of course its not bullet proof for hacker attacks but if someone tries to confiscate it, they gonna have some fun.

  • jiggawattjiggawatt Member
    edited May 2017

    rm_ said: And you ignored the very part of my message that answers your entire "counterpoint".

    No I didn't - because the same logic applies to that as well.

    The host a) can sniff the network and b) has access to the unencrypted part of the disk that has everything needed to establish an SSL session with a remote host supplying the FDE decryption key. LE has a playbook on that as well. Want me to let you in on a shared secret ?

  • serverianserverian Member
    edited May 2017

    @rm_ said:
    So, what your imagination has in mind this time? Wiretapping SATA link (I mean really, using spliced wires and capturing stream data into some device for later decoding)? Useless if disk encryption is used.

    Wiretapping DDR3 traces on the motherboard? (seriously? and expect no stability issues or corruption from the all the parasitic capacitance and reflections in the side connection? just laughable).

    So cut the bullshit already, there are real physical limits to what can be done even with physical access. Your hand-waving of "they can do it anyway" (somehow), just go into a kindergarden with such level of discussion.

    Not saying dedicated is not safer than a VPS but here's some scary stuff for you: https://en.wikipedia.org/wiki/Side-channel_attack :)

  • rm_rm_ IPv6 Advocate, Veteran
    edited May 2017

    jiggawattz said: The host a) can sniff the network and b) has access to the unencrypted part of the disk that has everything needed to establish an SSL session with a remote host supplying the FDE decryption key.

    ADD kid, learn to fucking read.

    rm_ said: that you make available only very briefly

    When you are personally at the console of two servers, enable the HTTPS link for 5 seconds on one, switch windows and fetch the key on the target server, then visually check in the logs of the first one that there has been exactly one access. But feel free to misread or skip over something else in this explanation as well, ffs.

  • MikeAMikeA Member, Patron Provider
    edited May 2017

    Just go with a well known provider if you're worried about your code being stolen. Provider should never access or download client files on a VPS, you should be more worried about cheaper hosts who underpay their staff to incentivize abusing their access.

  • rm_ said: When you are personally at the console of two servers, enable the HTTPS link for 5 seconds on one, switch windows and fetch the key on the target server, then visually check in the logs of the first one that there has been exactly one access.

    No - the host has access to the unencrypted part of the disk containing openssl (or whatever) used to establish this HTTPS session. I'm suggesting that the host can overwrite that package with a compromised version that provides no entropy, thus allowing the host to sniff the aforementioned HTTPS session off the network and decrypt it.

    I have never done it, but I think it can be done practically w/o the customer knowing that she or he has been compromised. SSL only stops man-in-the-middle -- it doesn't stop man-at-the-end.

  • rm_rm_ IPv6 Advocate, Veteran
    edited May 2017

    jiggawattz said: No - the host has access to the unencrypted part of the disk containing openssl (or whatever) used to establish this HTTPS session. I'm suggesting that the host can overwrite that package with a compromised version

    That's called an Evil Maid attack, and is an order of magnitude deeper and more complex invasion -- AND it can be rather trivially detected, unless done really well (i.e. replacing not just OpenSSL, but also things such as md5sum/sha1sum/who knows what other kinds of trip-wire you have implemented, heck, you could run a custom kernel which checks digital signatures of everything). AND requires considerable server downtime (for exploration and deployment) anyway.

    Compared to a VPS which just can be sniffed stealthily all day long, with the entire RAM contents down to the CPU registers and cache.

    that provides no entropy, thus allowing the host to sniff the aforementioned HTTPS session off the network and decrypt it.

    I don't think this is doable in modern day SSL, actually. They can do a number of things via a replaced piece of software, but this particular one sounds unlikely.

  • rm_ said: That's called an Evil Maid attack, and is an order of magnitude deeper and more complex invasion

    I agree with this.

    AND it can be rather trivially detected, unless done really well (i.e. replacing not just OpenSSL, but also things such as md5sum/sha1sum/who knows what other kinds of trip-wire you have implemented). AND requires considerable server downtime (for exploration and deployment) anyway.

    The bootloader can be copied pretty quickly for inspection during a short, "ordinary" downtime - no need to copy the encrypted volume.

    I don't think this is doable in modern day SSL, actually.

    Possibly - I don't know enough about SSL to say. I just remember that Debian weakened their openssl in the mid-2000s.

  • KuJoeKuJoe Member, Host Rep
  • gleertgleert Member, Host Rep

    I totally agree:
    Basically, any reputable provider will not go snooping through client's files just because they are bored.

  • gleert said: any reputable provider will not go snooping through client's files just because they are bored.

    Totally agree. In fact any "reputable provider" is never going to be bored. They've got work to do, which is what makes them reputable.

  • stefemanstefeman Member
    edited May 2017

    What are the justification moments when the host can/should/must check client's VPS? Will any LET host spy on my porn collection?

  • m3gfm3gf Member

    @stefeman said:
    What are the justification moments when the host can/should/must check client's VPS? Will any LET host spy on my porn collection?

    They will definitely spy on you porn collection, they will even give you a free recurring promo to let you keep doing this.

  • @gleert said:

    I totally agree:
    Basically, any reputable provider will not go snooping through client's files just because they are bored.

    What about all the kiddie hosts/summer hosts/one man band hosts which which we have on here.

  • RhysRhys Member, Host Rep

    @asterisk14 said:

    @gleert said:

    I totally agree:
    Basically, any reputable provider will not go snooping through client's files just because they are bored.

    What about all the kiddie hosts/summer hosts/one man band hosts which which we have on here.

    Don't buy from them? Is it really that difficult to understand.

    Thanked by 1KuJoe
  • rm_rm_ IPv6 Advocate, Veteran

    gleert said: any reputable provider will not go snooping through client's files

    Trusting that "oh but they will not" is not a good security paradigm. That's like mailing your usernames and passwords around on postcards, and trusting the post workers and the postman not to read them, because the post is "reputable".

  • KuJoeKuJoe Member, Host Rep

    @asterisk14 said:

    @gleert said:

    I totally agree:
    Basically, any reputable provider will not go snooping through client's files just because they are bored.

    What about all the kiddie hosts/summer hosts/one man band hosts which which we have on here.

    I did say reputable. ;)

    @rm_ said:

    gleert said: any reputable provider will not go snooping through client's files

    Trusting that "oh but they will not" is not a good security paradigm. That's like mailing your usernames and passwords around on postcards, and trusting the post workers and the postman not to read them, because the post is "reputable".

    No, but it's a good first step. Like I put on my website, it's all about how much privacy you need and whether the cost is worth it. For me, I'll gladly pay $1 a month for an OpenVZ VPS to run pings from and if the host wants to look at my Node.js script then that would suck but I wouldn't lose anything because of it (and if they tried to use or sell it I would be sure to make an LET thread about it but I wouldn't lose any sleep over it). It's not worth it for me to host that script on a $2/month KVM VPS so I'd rather go with a host I can trust than fork out more cash.

    Now would I host my WHMCS install on a $10/year OpenVZ VPS? Hell no. Would I host my family photos and tax documents on a VPS where I don't own the hardware? Nope.

  • rm_rm_ IPv6 Advocate, Veteran
    edited May 2017

    KuJoe said: I'll gladly pay $1 a month for an OpenVZ VPS to run pings

    The OP needs to host sensitive source code on the server. Your "running pings" have relevance to this thread ...exactly how?

  • DewlanceVPSDewlanceVPS Member, Patron Provider

    @Cartman said:
    Yes, they can to do that even in KVM or Xen and similar (VMWare...).

    They can easily copy your disk file and add it to their VM. Boot it up with a live CD and mount the partitions inside to access your files. Or they can use the same live CD to reset the root password of their copy of your VM to access it while running all the services and etc.

    If your VM is encrypted it still could be possible but this requires some knowledge because the provider would need to extract the cached decryption keys from RAM and so on to get the key to decrypt their copy of your VM disk.

    So it is possible with a bit more work than usual. And it is actually illegal... Privacy laws and such.

    No need to copy disk, Simply stop VPS and mount it to a directory and check files, etc.. I no longer remember it how to do this but I was did this for recovering my crashed VPS to recover my data instead of wasting time in rebooting with rescue CD.

  • KuJoeKuJoe Member, Host Rep

    @rm_ said:

    KuJoe said: I'll gladly pay $1 a month for an OpenVZ VPS to run pings

    The OP needs to host sensitive source code on the server. Your "running pings" have relevance to this thread ...exactly how?

    It was an example of the risk vs trust.

  • bsdguybsdguy Member

    @jiggawattz said:
    No - the host has access to the unencrypted part of the disk containing openssl (or whatever) used to establish this HTTPS session. I'm suggesting that the host can overwrite that package with a compromised version that provides no entropy, thus allowing the host to sniff the aforementioned HTTPS session off the network and decrypt it.

    I have never done it, but I think it can be done practically w/o the customer knowing that she or he has been compromised. SSL only stops man-in-the-middle -- it doesn't stop man-at-the-end.

    ssl does not stop MITM somehow magically. As for the server the real nightmare is that someone from the provider could get at your private key. Having that he has you by the balls no matter what funny openssl you use.


    To offer a somewhat more constructive line for less experienced users (probably the majority here):

    As the short aŕticle linked by @KueJoe correctly says, there is no such thing as a secure server unless you happen to be nsa, gchq or similar (and btw, even they fuck up sometimes). But that doesn't mean that all is lost and you are fucked no matter what.

    The probably most important factor on your (any users) side is that your data/communication is almost certainly of very low to low medium interest/value. That's important because - like any war, btw - it comes down to a cost,efforts vs value,gain ratio.
    In practical terms that means that the level of safety/security most of us want/need is achievable.

    So let's classify things a bit:

    • openVZ - basically just a pimped up jail administration system. Very likely not only provider admins can fuck you but halfway smart hackers, too because the barrier between VPSs is rather low.

    Security: Minimal. Stay away with anything of any value to you.

    • KVM/XEN - real virtualization. Of course, your provider can still get at pretty much everything. The 2 factors on your side are: that's illegal in most jurisdictions under most circumstances and a decent provider won't risk his reputation doing it. And it's less occasionally simple. Plus, importantly, neighbouring vps on the same node are far better seperated.

    Security: medium. Probably the best compromise in the sub 10$/mo segment.


    Up to here the important differentiator is that provider can look at your stuff without you being able to even notice it

    • dedicated server - the real thing. Of course, the server being many many miles away and provider people (and fbi ...) having physical access but not you this is still not safe and secure in the hard sense but it's dimensionally better than a vps and you have a chance to at least know about things.

    Security: high (for normal users)

    All that said, by far more dangerous than "KVM or dedi?" is how poorly most users are regarding security. So, keep your system up to date, configure it properly, and have a look at your logs from time to time!

    Finally a small hint: If your dedi leasing period comes to an end and you do not intend to stick with your dedi, delete everything yourself!. Do not rely on the provider. Frequent unpleasant events through ebay will tell you why (you don't want someone to buy a 2nd hand hard disk and get your private keys and other sensitive data thrown in for free ...).

  • @KuJoe said:
    Would I host my family photos and tax documents on a VPS where I don't own the hardware? Nope.

    I'd probably be ok with storing that providing I'd heavily encrypted it clientside first, no worse than throwing it on cloud storage.

  • @bsdguy said:

    >

    ssl does not stop MITM somehow magically.

    What do you mean? That's the whole point of SSL, in regards to HTTP traffic. Or do you mean, it doesn't stop people from bypassing it by sniffing at some other point before the traffic gets encrypted?

  • raindog308raindog308 Administrator, Veteran

    KuJoe said: Would I host my family photos and tax documents on a VPS where I don't own the hardware? Nope.

    But what if it was a provider who promised to secure your data with a dragon?

    Not some obese mall cop datacenter guard...I mean an actual Ancient Red Dragon. I know a provider who apparently has them on retainer and uses them to protect their customers' data. It's pretty sweet.

  • KuJoeKuJoe Member, Host Rep

    @raindog308 said:

    KuJoe said: Would I host my family photos and tax documents on a VPS where I don't own the hardware? Nope.

    But what if it was a provider who promised to secure your data with a dragon?

    Not some obese mall cop datacenter guard...I mean an actual Ancient Red Dragon. I know a provider who apparently has them on retainer and uses them to protect their customers' data. It's pretty sweet.

    The photos and documents might look like kindling to the dragon... I would wrap it in a fireproof safe (client-side encryption) first. :D

    Thanked by 1raindog308
  • bsdguybsdguy Member

    @deadbeef said:

    @bsdguy said:

    >

    ssl does not stop MITM somehow magically.

    What do you mean? That's the whole point of SSL, in regards to HTTP traffic.

    In theory. In practice we know that there have been successful MITM attacks.

  • @bsdguy said:

    @deadbeef said:

    @bsdguy said:

    >

    ssl does not stop MITM somehow magically.

    What do you mean? That's the whole point of SSL, in regards to HTTP traffic.

    In theory. In practice we know that there have been successful MITM attacks.

    You're saying that hosting providers have 0-day access to crypto exploits? :D Unless we're in the "they can do anything" zone, which is a conclusion and not an argument, SSL does what it should.

  • @endlesslhk I consider my civil duty to share my porn with my hosting provider.

Sign In or Register to comment.