I already have some level of MFA: if you are not physically on the wired lab network (wifi is firewalled off) you can't even touch the SSH port on any of my machines without *also* being VPN'd in.
-
-
Replying to @azonenberg
Ah, I tend not to totally rely on network security except for really dumb devices (*cough* IoT *cough*), so my home stuff all has public IPv6 addresses and you can SSH in from anywhere. The subset of really sensitive traffic currently on my home network uses IPsec.
1 reply 0 retweets 3 likes -
Replying to @marcan42
I prefer defense-in-depth. I have a rather complex network segmentation at home with about a dozen different subnets because I have so much SCADA/test equipment (e.g. oscilloscopes with plaintext SCPI interfaces) that doesn't support anything else.
1 reply 0 retweets 1 like -
Replying to @azonenberg @marcan42
But I also don't trust the Chinese IP cams not to phone home, and I want my wife's laptop or our game consoles to have no access to any of that... the list goes on. The VPN also allows IPv4 access to non-ipv6-supporting gear from the outside w/o port forwards.
1 reply 0 retweets 0 likes -
Replying to @azonenberg @marcan42
The VPN also provides a single point of entry. If I have dozens of SSH endpoints reachable from outside, forgetting to patch or misconfiguring any of them provides a potential entry point. With this setup, you need either a VPN pre-auth RCE or a client cert.
1 reply 0 retweets 0 likes -
Replying to @azonenberg
Yeah, I have a ton of VLANs mostly for testing purposes and stuff like that. The core is mostly 4 though, 1) networking equipment (management), 2) "private" network, 3) public/guest network, 4) IoT. Only 2 and 3 are openly routed to the internet, rest of routing is finer grained
2 replies 0 retweets 1 like -
Replying to @marcan42
My firewall domains (not all vlans, some physical interfaces) * internet * networking equipment * lab SCADA * family/guest wifi+wired * lab workstations/servers * DMZ for internet-facing servers * DMZ for internet-facing clients (browsers, irc) * sandbox for development
2 replies 0 retweets 6 likes -
Replying to @azonenberg @marcan42
* security cameras * VPN clients * non-lab SCADA (sump pump monitor etc) All are fully routed. Additionally, VPN IPs are bound to specific certificates to provide a (somewhat weak) additional layer of policy between different clients.
1 reply 0 retweets 5 likes -
Replying to @azonenberg @marcan42
And just about anything that opens a socket to the internet lives on a compartmentalized Xen instance in one of the DMZ. The instance I'm posting from right now, for example, is only used for Facebook and Twitter. The one next door is only used for IRC and Skype.
1 reply 0 retweets 1 like -
Replying to @azonenberg @marcan42
And the DMZ my web *server* is hosted in has no access to any of these boxes, since servers and clients have such different risk profiles.
1 reply 0 retweets 0 likes
That's definitely more paranoid than me. I'm too lazy to maintain multiple OS instances for client-side isolation. Servers are another story. OTOH I've been thinking about dual-purposing my Threadripper buildbox as a workshop desktop via VM (because it's physically convenient).
-
-
Replying to @marcan42
I just run one fullscreen app (browser, mail client, etc) in each VM then SSH forward a VNC server. I can move around a VNC window just like a normal browser window. Over gig/10gig ethernet it's indistinguishable from a local system, fullscreen video etc works fine.
1 reply 0 retweets 0 likes -
Replying to @azonenberg @marcan42
Bonus: it also works very well with the thin client setup I have. I have a mix of ARM SBCs and full x86 boxes scattered around the lab. I can sit down at any one of them and have ~the same session I was working at in the other room. I'd do this even without the security benefits
0 replies 0 retweets 1 like
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.