Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Subjunctive
Sep 12, 2006

✨sparkle and shine✨

dougdrums posted:

That still qualifies as reachable from the internet though. I keep the backups for my business in a deposit box. I remeber one place where they just had a zip file on the dc and were like, "yeah of course we keep backups!"

Yes, but that isn’t a backup server. How would you configure things such that the server is both useful and not transitively reachable from the Internet?

Adbot
ADBOT LOVES YOU

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
Have two of them (that is, configure a system for backups, and keep another version offline). Drop off a copy on my way home. Maybe use a third party too.

dougdrums fucked around with this message at 12:49 on Feb 14, 2019

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Drop off a server? (I like the “on my way home” backup rotation strategy for a mail provider’s data, though.)

RFC2324
Jun 7, 2012

http 418

Subjunctive posted:

Yes, but that isn’t a backup server. How would you configure things such that the server is both useful and not transitively reachable from the Internet?

I like tape robots. Backup completes, robot pulls the tape and drops it in a bin that gets sent to iron mountain daily/weekly.

Proteus Jones
Feb 28, 2013



Subjunctive posted:

How do we know that I t was directly reachable from the internet? They could have pivoted from something else they compromised, no?

I think it's a fair assumption to make if the attacker was burning down servers as they went (which is what the narrative has implied). Regardless, the backup server obviously had access to the Internet, since whatever exploit that was used was able to create an outbound reverse SSH tunnel.

Say they had a DMZ and the backup server was behind that. Whatever host he used to bounce his attack off of, it still shouldn't have been able to make an inbound connection across that line. Like I said, that doesn't even touch the fact the backup server had direct outbound access to the Internet.

I honestly can't think of any good reason to let a backup server be able to get to the Internet other than laziness in design or operation.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

RFC2324 posted:

I like tape robots. Backup completes, robot pulls the tape and drops it in a bin that gets sent to iron mountain daily/weekly.

Sure, there are lots of ways to rotate media to distant storage. That’s not the same as the backup server that generates those media being unreachable from the internet transitively. (It also puts constraints on your restore options.)

You could write exactly the same tweet in the presence of a tape robot.

RFC2324
Jun 7, 2012

http 418

Subjunctive posted:

Sure, there are lots of ways to rotate media to distant storage. That’s not the same as the backup server that generates those media being unreachable from the internet transitively. (It also puts constraints on your restore options.)

You could write exactly the same tweet in the presence of a tape robot.

The question asked was how to make a backup server useful and the data is not at risk from the internet. A properly managed tape library addresses that.

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)

Subjunctive posted:

Drop off a server? (I like the “on my way home” backup rotation strategy for a mail provider’s data, though.)

Yeah no poo poo, I was clearly just giving an example for my case. You store a copy on media somewhere safe, regardless of scale. It's not exactly a novel concept.

Thanks Ants
May 21, 2004

#essereFerrari


Even if it's a mounted NFS volume (through an ACL that only allows NFS traffic) that your backup server writes to, and that volume has snapshot policies and/or is replicated somewhere else and you don't store the AWS keys in someone's home folder out of laziness, that's still an improvement

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)

Subjunctive posted:

Sure, there are lots of ways to rotate media to distant storage. That’s not the same as the backup server that generates those media being unreachable from the internet transitively. (It also puts constraints on your restore options.)

You could write exactly the same tweet in the presence of a tape robot.

You still have the previous version if your backup server gets hosed. It's a redundancy. You have to assume (like in this case) that if it's hooked up, it's at risk.

You can keep a backup server live and restrict traffic, there's nothing wrong with that. You shouldn't stake your whole business on it being hosed though. The maersk/petya case is a good example.

dougdrums fucked around with this message at 13:14 on Feb 14, 2019

Potato Salad
Oct 23, 2014

nobody cares


RFC2324 posted:

The question asked was how to make a backup server useful and the data is not at risk from the internet. A properly managed tape library addresses that.

What is "proper" in your experience? Any rotating tape library configured & managed by TCP/IP can get attacked

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

RFC2324 posted:

The question asked was how to make a backup server useful and the data is not at risk from the internet. A properly managed tape library addresses that.

That’s not the question I asked, and I don’t see it elsewhere. The assertion I was questioning was that the backup server itself should not be transitively reachable from the internet, which means that it can’t receive data over the network from an internet-connected host, right?

I’ve seen red team reports of attackers pivoting from a DMZ’d host to internal networks by using exploits against internal desktops that had accessed services in the DMZ. Transitivity is powerful. Similarly of attackers sabotaging the backup system (by loving with encryption key management IIRC) and waiting through a full rotation before wiping things.

If your data scale and restore SLA are compatible, then tape rotation can reduce risk, but it can’t eliminate it. I’ve worked at places where (a part of) the backup infrastructure is literally shipping-crate sized clusters of hard drives paired to each sub-DC. Tape really isn’t an option, especially if you want to have automated restore validation across multiple time scales.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

dougdrums posted:

You still have the previous version if your backup server gets hosed.

You might indeed, but the quoted tweet is about the backup server itself getting hosed, no?

dougdrums posted:

You store a copy on media somewhere safe, regardless of scale.

Your notion of scale is pretty unimaginative. Where do you think gmail’s cold backup lives that isn’t transitively reachable?

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
I agree it's not necessary to take it offline transitively. If transporting physical media is impractical, you should at least back it up with a third party.

Most places aren't google.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

dougdrums posted:

I agree it's not necessary to take it offline transitively. If transporting physical media is impractical, you should at least back it up with a third party.

I’m not sure why it matters that it’s a separate organization that owns the second tier of storage. Why is that better than just having your own infrastructure in some place that doesn’t share much physical risk? It seems worse to me, from the perspective of coordinating policies and monitoring, but I haven’t thought about that aspect a lot. The places I’ve worked that consisted physical transport impractical all just had their own servers “far enough” away to match their risk appetite and budget.

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
Fair enough, most of the people I used to work with were likely to gently caress something up, or they didn't have the resources to maintain it otherwise. Either way it reduces the risk of your business being burned to the ground in a few hours time. You can't eliminate it totally. If you've got the resources to maintain it, no reason not to. Hence why I [meant to say] "maybe".

Having offline media is still useful even if you don't make copies frequently.

dougdrums fucked around with this message at 13:35 on Feb 14, 2019

Proteus Jones
Feb 28, 2013



Subjunctive posted:

The assertion I was questioning was that the backup server itself should not be transitively reachable from the internet, which means that it can’t receive data over the network from an internet-connected host, right?

Correct.

The backup server should reach out to the DMZ host, but not be accessible in the reverse direction. You should be doing a pull for backup operations.

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
Yeah I think I've might of misread you in my morning state, The way I have mine set up personally is to make outbound ssh connections to the stuff I need backed up, and restrict it to those specific hosts. All inbound is dropped.

I might gently caress it up, or there's some other hereto unknown vulnerability, so I keep copies offline. I have no idea how many users they had.

dougdrums fucked around with this message at 13:53 on Feb 14, 2019

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Proteus Jones posted:

Correct.

The backup server should reach out to the DMZ host, but not be accessible in the reverse direction. You should be doing a pull for backup operations.

That sounds Internet-connected to me? “Go the wrong way through the supposedly-one-way firewall” is why every toolkit has a billion ways to create a tunnel back to the C2. If anything can create a connection into both isolated networks, an attacker can pivot by exploiting that thing (transitively). This is not an uncommon thing when attacking a network that isn’t vulnerable to last year’s top 5 issues.

One of the red team reports I read at a previous job involved pivoting off of a conference room controller tablet, and using it for persistence. There are two kinds of connected: connected if the attacker is good enough or gets lucky, and airgapped. The connection doesn’t even need to be synchronous: we used to deal with attacks over store-and-forward UUCP!

Proteus Jones
Feb 28, 2013



Subjunctive posted:

That sounds Internet-connected to me? “Go the wrong way through the supposedly-one-way firewall” is why every toolkit has a billion ways to create a tunnel back to the C2. If anything can create a connection into both isolated networks, an attacker can pivot by exploiting that thing (transitively). This is not an uncommon thing when attacking a network that isn’t vulnerable to last year’s top 5 issues.

One of the red team reports I read at a previous job involved pivoting off of a conference room controller tablet, and using it for persistence. There are two kinds of connected: connected if the attacker is good enough or gets lucky, and airgapped. The connection doesn’t even need to be synchronous: we used to deal with attacks over store-and-forward UUCP!

I get what you're saying and I did make an assumption on the backup being nakedly available.

However, in this specific instance, they still should have not been able to create that reverse ssh tunnel. Allowing your backup server to touch things in the DMZ is not the same as allowing it out to the Internet. And yes, they probably could have created a relay system if they were able to exploit the backup pull session, but that's not what was in the tweet.

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
Are we talking about someone manually making a copy and then walking it over to an airgapped machine? Yeah that's dumb I'd agree. I think the confusion was when I said it shouldn't be connected to the internet, I meant there should be backups on physical media somewhere. In vfemail's case (which boasted the extra security as a feature), I don't think they had enough users to make it impractical, or they could do incremental backups or something. Just seems like they were playing with fire.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Here’s why I worry so much about transitivity, as a concrete example. It’s been long enough and there was some public reporting, so I feel ok talking about it

When I managed Facebook mobile, we had a developer’s machine go nuts, and eventually we found that someone had landed a payload on it which was continuously searching the file system for files with certain strings in them and trying to map the network. This machine lived on the corp network, which was obviously “unreachable” from the internet. Unrouted addresses, proxies and firewalls that all pointed outwards, the usual stuff.

What we eventually discovered was that someone had:

- found a site that got a lot of traffic from facebook.com addresses (in this case a mobile developer documentation/community site)
- compromised its web site
- built a payload specialized for our environment (developer laptop layout, network naming conventions, etc)
- found/bought a zero-day Java exploit
- served that payload only to facebook.com visitors

They didn’t get anything out of it, mostly because the payload wasn’t actually set up right for our world, but they got to run code where they “couldn’t get to”, through a very competently administered “one way” network connection.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Proteus Jones posted:

but that's not what was in the tweet.

Indeed, there’s not much in the tweet. In my opinion there isn’t enough to judge them as incompetent, which is why I commented in the first place. (That and the pervasive sentiment that secure and reliable backup of internet connected systems has a straightforward and universal solution. Working in complex, targeted environments humbles you!)

When something doesn’t make sense to me, my first assumption is that there’s a piece of context that I’m missing. That’s why I ask a lot of earnest questions, which unfortunately people sometimes take as passive-aggressive trolling. I don’t know if the attempted connection back even worked—as in my example above, payloads and attackers often try things that don’t play out.

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
Oh yeah, like I would consider my backup server scheme above to be connected to the internet, regardless of how it's configured. I mean like physically connected, there's a non-zero chance of it communicating to and from the outside world, Bulgaria, 300 lb guy in new jersey, whatever.

Fwiw I did red team stuff and had plenty of people argue that I could not possibly had access to a host without internal help/abusing the scope because it was "not connected to the internet". It didn't matter because I did it from the parking lot anyways.

The point I was making with that tweet was that rm just unlinks files. I assumed that they already had total control of their stuff through some unknown exploit beforehand.

dougdrums fucked around with this message at 14:39 on Feb 14, 2019

Methylethylaldehyde
Oct 23, 2004

BAKA BAKA
So knowing all this, what would be an appropriate backup strategy for a mail host that might end up being the target of a state level actor with a handful of zero days? Assume that losing 24 hours of data is allowable, and a 7 day restore period is reasonable.

A tape library that's able to do Disk to Disk to Tape would be my go-to, main storage takes snapshot, snapshot gets published to a new NFS share, share is copied to disks attached to the library, snaphot gets written to tape, tape gets shoved in a box, box sits on a shelf. Restores are spot tested on tape deck on desk attached to an air gapped desktop machine.

Judge Schnoopy
Nov 2, 2005

dont even TRY it, pal
Microsegment the firewall rules between all servers. Backup server is allowed to vms on the backup ports only. Then you have a higher tier management endpoint with separate credentials that can reach the backup machine on 3389, 22, whatever minimal access you need, but not from anywhere else.

An identity-based firewall helps too, limiting traffic from the backup server to the backup service account. Also limiting access to the backup server to a high-tier backup admin account.

While the server is still technically internet accessible, it would take 3-4 hops and numerous credential pivots to get there, assuming the attacker knows the infrastructure enough to get through the inbound maze.

Potato Salad
Oct 23, 2014

nobody cares


Most small/medium lovely, resource-limited IT shops probably would get most benefit using third party off-site backup providers with no administrative rights in the provider's environment.

Let's face it, most businesses exclusively running their own backup infrastructure all out of the same network and auth spaces as their servers or managing backups in S3 buckets with lazy, reused passwords aren't hardened against total overnight wipeout.

Potato Salad fucked around with this message at 16:02 on Feb 14, 2019

CLAM DOWN
Feb 13, 2007




If you don't have backups in a different physical location with distinct access methods, rights, and credentials, they're not backups. This is pretty elementary.

Klyith
Aug 3, 2007

GBS Pledge Week

Subjunctive posted:

Your notion of scale is pretty unimaginative. Where do you think gmail’s cold backup lives that isn’t transitively reachable?

When protecting yourself from attacks by a state-level actor, it certainly helps to *be* a state-level actor.


But anyways, google uses tape backups.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Klyith posted:

When protecting yourself from attacks by a state-level actor, it certainly helps to *be* a state-level actor.


But anyways, google uses tape backups.

Is that still the case for everything? FB made a big shift in media for photo backup in 2015, but I haven’t kept up with anyone really.

Even at the time I didn’t know how to interpret "we store another copy of the most important data on digital tape”. Does that mean they can fully restore gmail if everything online is wiped? I wonder who I can ask...

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...

Subjunctive posted:

Is that still the case for everything? FB made a big shift in media for photo backup in 2015, but I haven’t kept up with anyone really.

Even at the time I didn’t know how to interpret "we store another copy of the most important data on digital tape”. Does that mean they can fully restore gmail if everything online is wiped? I wonder who I can ask...

The NSA?

Subjunctive
Sep 12, 2006

✨sparkle and shine✨


My contacts there are stale, sadly. Maybe Russia!

BlankSystemDaemon
Mar 13, 2009



Subjunctive posted:

Is that still the case for everything? FB made a big shift in media for photo backup in 2015, but I haven’t kept up with anyone really.

Even at the time I didn’t know how to interpret "we store another copy of the most important data on digital tape”. Does that mean they can fully restore gmail if everything online is wiped? I wonder who I can ask...
Part of why everyone uses tapes is that there is a whole industry built around automating the handling of tapes; everything about the process can be and has been automated (tape silos have existed since the mid-70s), and nowadays store in excess of 2 exabytes in remarkably little space.

EDIT: Was trying to remeber the space they take up, but failed. :(

BlankSystemDaemon fucked around with this message at 22:07 on Feb 14, 2019

Klyith
Aug 3, 2007

GBS Pledge Week

Subjunctive posted:

Is that still the case for everything? FB made a big shift in media for photo backup in 2015, but I haven’t kept up with anyone really.

Even at the time I didn’t know how to interpret "we store another copy of the most important data on digital tape”. Does that mean they can fully restore gmail if everything online is wiped? I wonder who I can ask...

Beats the hell out of me, but there are more recent references than that 2013 article so I guess so? Evidently tapes have continued to improve in storage density even though HDs are losing steam. And yes they restored from tape back in 2011 when a bug in their FS wiped a few tens of thousands of gmail accounts.


I feel like "everything online" starts getting very fuzzy when you're talking about the massive operations like google and facebook. Like I remember a different article about google's arrays of cheap hardware servers talking about having lots of spares, 'cause their cheap junk is less reliable than real servers. And their spares periodically boot up and synch data, then shut down again.

"RAID is not a backup"... Well, maybe you just haven't made it redundant enough. Hold my beer.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Klyith posted:

"RAID is not a backup"... Well, maybe you just haven't made it redundant enough. Hold my beer.

Yeah, and a benefit of hot replicas is that you can also use them as capacity. To one person it’s an aggressively-populated CDN, and to another person it’s part of a tight-SLA DR strategy.

wolrah
May 8, 2006
what?

CLAM DOWN posted:

If you don't have backups in a different physical location with distinct access methods, rights, and credentials, they're not backups. This is pretty elementary.

I've always liked the 3-2-1 rule, as in your data is not fully safe unless you have at least 3 independent (as in not directly linked like RAID or cloud sync) copies, in 2 different physical locations, 1 of which is offline.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

CLAM DOWN posted:

If you don't have backups in a different physical location with distinct access methods, rights, and credentials, they're not backups. This is pretty elementary.

Nah, it just matches a different availability/threat model. Depends on how hard it is to reacquire the data and how important the data is, too.

Absurd Alhazred
Mar 27, 2010

by Athanatos
https://twitter.com/matthew_d_green/status/1097332682189619200

Don't undermine your own crypto.

Kerning Chameleon
Apr 8, 2015

by Cyrano4747
I guess the laws of mathematics did trump the laws of Australia in the end.

Adbot
ADBOT LOVES YOU

geonetix
Mar 6, 2011


We’ll see about that in court!

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply