jkfritcher wrote:
In addition to firewalling your private interfaces, I would also suggest using something like IPSec in transport mode between the machines so that the traffic can't be snooped upon.
If you are concerned about snooping, I'd go with tunnel mode - transport mode only encrypts the payload, so the original header on each packet is unchanged, which can be useful information to snoopers. I tend to use OpenVPN for such tunneling, but that's just personal preference.
To be honest though, I'm not sure that snooping is even a risk in this sort of setup?
I presume the main network network infrastructure is purely switched, so traffic will only show up on the host's interface that contains the target Linode and no other hosts. So that immediately shrinks the pool of possible snoopers immensely. But of course, only the individual Linode should see the traffic as passed on via the host barring a Linode cracking into the hypervisor which seems unlikely.
It's not like individual Linodes are on common, non-switched segments. I'd think attacks would have to be directed at specific Linode addresses and not by passive monitoring.
-- David