[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [cobalt-security] RAQ3 vulnerabilities



Hi Jeff,

Don't worry about your signal-to-noise ratio. :-)

Put in a floppy.  Reboot from the floopy.  The floppy has a kernel that
sends the system out to the 'net to upload rootkits, trojans, etc.

Actually not hard at all for a "standard" system with a floppy drive.

If it boots from floppy and/or you bring/find a keyboard and a monitor and/or know the BIOS password (or how to break it).

Nope, but with a RaQ it is way easier. You don't even have to bring a floppy... Just two fingers. That is what's different than with most other servers.

Easy.  You can do it from the front panel.  How do you think the CD-Rom
restore works?

I know, I know... ;-)

Many hosting companies, especially the inexpensive ones, just have open
RaQs of machines.

I colo expensive. :-)
Just went there recently. Had to ID myself and all. All very pleasantly, but very strict.

...and we had access to every system in there for over
an hour.

Yikes.

The VP had the system moved to another colocation center post haste.

I can imagine, yes. Good call on his part.

When we colocate systems we put them all into one locked cabinet (locked
front and back by the way; always check the back).  However, if you come
in to work on your system colocated with us you do have access to all
the systems in the same cabinet <frown>.  The only way to do that is to
rent an entire cabinet, and now you're talking big money.

The back is locked. Doors electronically protected.

Tell me about it. I had to race to the colo facility once because of what turned out to be a hardware failure. It was inflicted because someone in the same rack with me probably bumped into something or the other.

Such is life, thanks... Nico

P.S. Thanks to everyone for all the input on this matter.