Linode Forum
Linode Community Forums
 FAQFAQ    SearchSearch    MembersMembers      Register Register 
 LoginLogin [ Anonymous ] 
Post new topic  Reply to topic
Author Message
PostPosted: Sun Jul 27, 2008 3:46 pm 
Offline
Senior Newbie

Joined: Sun Jul 27, 2008 2:36 pm
Posts: 5
Hi there - I've read some posts about this topic, but not getting completely clear on this:

Is my linode's backend network connection visible to other linodes on the backend network? I.e. could a rogue linode user scan all 192.168.x.x backend IPs for open ports, memcache daemons, MySQL servers with no root password etc. and potentially wreak havoc?

If so, can I configure iptables to prevent that?

Thanks for your input,
Markus


Top
   
PostPosted: Sun Jul 27, 2008 8:16 pm 
Offline
Senior Member
User avatar

Joined: Mon Dec 10, 2007 4:30 pm
Posts: 341
Website: http://markwalling.org
basilisk wrote:
Is my linode's backend network connection visible to other linodes on the backend network? I.e. could a rogue linode user scan all 192.168.x.x backend IPs for open ports, memcache daemons, MySQL servers with no root password etc. and potentially wreak havoc?


Yes, just like they could with your public address.

basilisk wrote:
If so, can I configure iptables to prevent that?


Yes, just like you can with your public interface.


Top
   
 Post subject:
PostPosted: Sun Jul 27, 2008 9:21 pm 
Offline
Senior Newbie

Joined: Sun Jul 27, 2008 2:36 pm
Posts: 5
Thanks - so I'd then be wondering how other users handle that in practice, as things look a bit different on the backend than on the public interface, for example memcached has no built-in password protection, and you can't tunnel it as that would slow it down quite significantly.

So would IP filtering be the method of choice there, or are there other options? Filtering by specific IPs would of course require that whenever I add/remove nodes to my cluster that I add/remove rules from every other node's ip tables. Or can I get an IP range and then filter by mask?


Top
   
 Post subject:
PostPosted: Sun Jul 27, 2008 11:24 pm 
Offline
Newbie

Joined: Wed Jul 23, 2008 10:18 am
Posts: 4
You could use IPSec with AH and a "require" policy. If you've got the time and the expertise.

Or any other VPN solution, if you don't mind the overhead of encryption you don't need.


Top
   
 Post subject:
PostPosted: Mon Jul 28, 2008 4:50 am 
Offline
Junior Member

Joined: Wed May 21, 2008 5:34 am
Posts: 46
Website: http://www.eve-razor.com/forum
Location: Austin, Tx
a start would be to deny all traffic from the internal nic but your own friendly ip, then move onto content filters/rules


A VPN tunnels is a ok idea, but mildly overkill.


Top
   
 Post subject:
PostPosted: Mon Jul 28, 2008 8:50 am 
Offline
Senior Member
User avatar

Joined: Mon Dec 10, 2007 4:30 pm
Posts: 341
Website: http://markwalling.org
The bridges on the hosts filter traffic to only allow your node to see traffic intended for it (to prevent you from going promiscuous).


Top
   
Display posts from previous:  Sort by  
Post new topic  Reply to topic


Who is online

Users browsing this forum: No registered users and 2 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum

Search for:
Jump to:  
RSS

Powered by phpBB® Forum Software © phpBB Group