TIP: Click on subject to list as thread! ANSI
echo: aust_avtech
to: Rod Gasson
from: Bob Lawrence
date: 2004-06-13 13:54:10
subject: Locking Windows

DD> If you're serious about the Linux box being a router/firewall
DD> only take a look at one of the single diskette router
DD> distributions of it (LRP or Freesco or such). These boot from a
DD> wite protected floppy, load inot a RAM drive and run from
DD> there. If something odd happens, just reboot and it
DD> automatically runs a "clean" copy.

> I've thought of that, but it's not such a big deal with these
> fast CPUs and drives. I can run a backup for the entire drive in
> 3 minutes.

RG> I think you are missing the point Bob.

 The only advantage of the CD and RAM is that it is impossible to
corrupt the CD. You can still corrupt the RAM... which you can fix by
switching it off and startign again. My POINT, was that I can do the
same thing with a backup in 3 minutes... reformat the corrupted
drive and reload the whole thing. A few years ago, with slow hard
drives that would have been a major morning's work. Today, it is a
mere 3-minute's work.

 That's something else that surprised me, btw. This new computer has
a CD burner, and I can burn a CD in 4 minutes!

RG> For several years our firewall/router was the same machine as
RG> our Web, FTP and Email servers. Although it did a pretty good
RG> job, it wasn't the most secure system in the world because IF
RG> someone happened to compromise our firewall box they instanlty
RG> had access to all the other services running on the machine. In
RG> contrast, a dedicated firewall/router offers yet another level
RG> of protection.. In order to access our other machines, a hacker
RG> would first need to compromise the firewall and _then_ they'd
RG> need to do even more 'work' in order to gain access to the
RG> actual servers. The firewall box itself doesn't have ANYTHING
RG> on it other than the firewall code itself (and an SSH server
RG> for admin purposes). Oh, the SSH server is only accessable from
RG> within our own network. 

 I agree with this approach entirely. Until you mentioned that you
had a hardware firewall, I was talking about software firewalls. 
Linux or not, those are still vulnerable. Your aproach is fireproof.

RG> It ISN'T just a matter of the time it takes to recover from a
RG> backup that is an issue, because on a production machine ANY
RG> backup is always going to be a little out of date. No big deal
RG> for most home users, but a very big issue for those of us
RG> running online webstores, etc.

 I am talking about *ME*, running a PC which has to be totally
secure if I connect to the net. Once I set up my Linux server, it will
never change... all the changes will take place on theprotected
Windowsmachine. If I lose a bit of mail... stiff. This latest
discussion was over the use of a CD-booted Linux for improved
security. For me, there is no advantage in that.

RG> We perform daily, weekly and monthly backups (fully automated
RG> of course) and even recovering from a daily backup file (due to
RG> hardware failure) takes a LOT longer than '3 minutes' if/when
RG> we have to manually restore orders, etc that are up to 24 hours
RG> old.

 I'm not advocating that you change your system to mine. Why do you
expect me to change *my* system to yours?

Regards,
Bob


--- BQWK Alpha 0.5
* Origin: Precision Nonsense, Sydney (3:712/610.12)
SEEN-BY: 633/104 260 262 267 270 285 640/296 305 384 531 954 1042 690/734
SEEN-BY: 712/610 848 774/605 800/221 445
@PATH: 712/610 640/531 954 633/260 267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.