Answer the question
In order to leave comments, you need to log in
Some info about protecting vps from outside penetration by the owner of the equipment?
Hey! I heard that cool system administrators are able to completely isolate the working space of the system from external interference from the hoster. Figuratively speaking, I want to host a website on a VPS (or do I need a dedicated server?), but I want to prevent hosting from interfering with the OS in any case.
From the side of the external viewer, everything is clear, I know his methods of obtaining illegal access to information, but how can I prevent the hoster from looking into my project?
2) can somehow really rebuild linux so that it does not have a login through the local console from the word at all, but only remotely via ssh? and all that remains is to somehow monitor all the inputs to the server, receiving notifications in telegrams.
I have some knowledge of Linux administration, but here I cannot put together the requirements for the OS.
Most likely, you need to 1) encrypt the drive, right? VeraCrypt/TrueCrypt/etc
3) what to do with the possibility of dumping the RAM, which at this wonderful moment contains the entire axis with all the sensitive processes in open form?
4) please do not litter me, saying "yes, you didn’t give up in the ass to any hoster", I'm not a mother's hakir with paranoia and I know this very well without wits))
It also seemed interesting to do all this not even with the system itself, but with the docker, so that you can safely run the container on any axis and even having access to the axis it would be impossible to get access inside the container (s). Is it real? Though it's basically the same thing. Having access to the host system, you can then sniff the moment of entering the virtual docker with the decrypted password.
Answer the question
In order to leave comments, you need to log in
It’s impossible to fully protect yourself, even a 0day vulnerability was discovered and using secure boot (encryption keys in uefi, self-signed bootloader, encrypted partitions) they allow you to replace the bootloader and steal partition encryption keys from the owner.
But it is possible to make the task so expensive that it will only be dealt with in a targeted manner.
* It is better to keep your services on hardware that is completely available to you and not on a virtual machine, since a virtual machine gives a hoster a lot of opportunities for free.
* you will have to raise the hypervisor yourself, so that the hoster does not do it, it is more difficult to raise your hypervisor in the simulation, and this can be tracked by a benchmark
* partition encryption, not even discussed
* modify grub and the bootloader in the initramfs in a non-trivial way, change the method of booting and controlling the system (meaning booting over the network with entering a password to an encrypted disk via ssh)
unfortunately the bootloader is the weakest part of protection, replacing it with his own (modifying yours) an attacker can introduce a stealer of passwords, encryption keys, etc. into it, and the actual method of detecting it will determine the cost of hacking.
Changing the boot process will require the attacker to disassemble your code, this is a huge job, which can be further complicated if the bootloader is new (obfusified in a new way) each time. Of course, the initramfs and vmlinuz files should be downloaded over the network, there is nothing for them to lie with the hoster, anyway, they should be different every time (grub can tftp / http, don’t care that it’s an unencrypted channel, it doesn’t matter here).
Additionally, enter process control in memory in the initramfs, if something changes (other sizes of memory areas in / proc / pid / smap for example) then sound the alarm / send on the wrong track.
* if possible, any activation of the server must be performed only personally (trusted person) using a special bootable USB flash drive (which does not have all the necessary information, but which allows the owner to connect remotely and enter it, for example, from a laptop right there)
* the latest amd has some memory encryption, just for virtual machines and hoster protection - AMD SEV, I also saw a discussion and patches for qemu in which memory encryption was simulated - the performance will certainly be below the baseboard, but the hot reload trick with a memory dump will no longer work.
3) what to do with the possibility of dumping the RAM, which at this wonderful moment contains the entire axis with all the sensitive processes in open form?
2) can somehow really rebuild linux so that it does not have a login through the local console from the word at all, but only remotely via ssh? and all that remains is to somehow monitor all the inputs to the server, receiving notifications in telegrams.
I'm not my mother's hakir with paranoia
It also seemed interesting to do all this not even with the system itself, but with the docker, so that you can safely run the container on any axis and even having access to the axis it would be impossible to get access inside the container (s). Is it real?
but how to prevent the hoster from looking into my project?
Ask yourself why a hoster needs to look into your project.
To answer this question - to work in the hoster's TP and understand that you don't need to look into each of the thousands of virtual machines ...
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question