[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-users] RE: If a DomU was compramised..



Matthew Law wrote:
> On Thu, May 20, 2010 4:47 pm, Vern Burke wrote:
>> Anything is possible, but I think it's unlikely. Given the number of VMs
>> on Amazon, if this was a real problem, we'd have seen it long before
>> this.
>>
>> Most likely way to get hacked is still what it's always been, lousy admin
>> practices.
> 
> I agree with Vern although I would go as far as to say that even with
> exceptionally good security and admin practices in place I think that if
> someone really wants to get in and has the skill, they will, eventually.
> 
> Buy more insurance! :-P
> 
> Cheers,
> 
> Matt
> 
> 
> _______________________________________________
> Xen-users mailing list
> Xen-users@xxxxxxxxxxxxxxxxxxx
> http://lists.xensource.com/xen-users

Just as an aside, we also use ossec-hids (client/server setup) for any
host that has the potential for being compromised (web servers,
generally, but others apply).  I've not done this for our Dom0's,
however, because the only access to them is administrative.  (ssh from
about 3 addresses)


-- 
--
Steven G. Spencer, Network Administrator
KSC Corporate - The Kelly Supply Family of Companies
Office 308-382-8764 Ext. 231
Mobile 308-380-7957

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.