Update Securing a server rédigé par LaplongeJunior's avatar LaplongeJunior
Assuming such points:
- Ssh must be reachable from the outside on all machines, as admins need to log as root
- All non-root users are assumed "public access", either for public missions or for open-source scripts
- All files restricted to root are assumed "critical data" by default
- Local libraries are considered unable to be secured against root elevation
- No server is added to an existing LAN until it is deemed secured, as such machine would provide an entrypoint into the LAN
Threats against a rented service server: Threats against a rented service server:
Threat 0 : Usability over security Threat 0 : Exploit requirements
0a) Ssh must be reachable from the outside on all machines, as admins need to log as root
Ergo : As all different services may be required in normal circumstances, most machines will have two or more services reachable from the outside 0a) "X active user" is assumed *always* fulfilled, as this requirement is expected to evolve under normal conditions
(In the future, there could be one ssh-only port forwarded machine on the LAN to act as an admin proxy, with other ssh services only available on the LAN) 0b) "minimum N registered users" is assumed fulfilled except exceptional circumstances, as a server is meant to provide more and more services over its lifetime
0b) All non-root users are assumed "public access", either for missions or for open-source scripts 0c) "in the same LAN" is assumed always blocking, as an inter-LAN exploit assumes another machine got breached first
Ergo : close-sourced scripts should use root access 0d) "specific X version" can be easily blocked forever, as patching local libraries is pointless
0c) All files restricted to root are assumed "critical data" by default
Ergo : open-sourced scripts should call a closed-source script, stored on the server, who then will use root privileges to access critical data
Threat 1 : Root access Threat 1 : Root access
1a) Any service can allow to log or lock root with the good vulnerability 1a) Any service can allow to log or lock root with the good vulnerability
... ...
......