• 0 Posts
  • 172 Comments
Joined 2 years ago
cake
Cake day: June 9th, 2023

help-circle






  • The scenario OC stated is that if the attacker has access to the user on the server then the attacker would still need the sudo password in order to get root privileges, contrary to direct root login where the attack has direct access to root privileges.

    So, now i am looking into this scenario where the attack is on the server with the user privileges: the attacker now modifies for example the bashrc to alias sudo to extract the password once the user runs sudo.

    So the sudo password does not have any meaningful protection, other then maybe adding a time variable which is when the user accesses the server and runs sudo







  • You do not even need a port based firewall when the server is open on the internet.

    When you configure the software to not have unnecessary open ports over the internet connected interface then a port based firewall is providing zero additional security.

    A port based firewall has the benefit that you can lock everything down to the few ports you actually need, and do not have to worry about misconfigured software.

    For example, something like docker circumvents ufw anyway. And i know ppl that had open ports even tho they had ufw running.






  • Just a simple hole renders them useless. The only method to reconstruct them from there would be any kind of SEM or AFM which would still take weeks to months to years depending on the size/density of the drives.

    Even just opening them up and smacking the disks would be sufficient

    Next time just encrypt them.


  • ShortN0te@lemmy.mltoSelfhosted@lemmy.worldLatest Watchtower fork?
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    2 months ago

    Just because there is no update does not mean there are security vulnerabilities to worry about, or do you have a specific one that is not fixed?

    The attack vector seems very narrow to me. It checks the container registry downloads the containers and runs some docker commands.

    It has no interface, so in order to attack it you either have to compromise the container registry (but then it would be easier to compromise the containers you download) the secure connection used to download the containers (https is quite stable) or something on the server side.

    Also the project does not really look that abundant to me.

    EDIT: So i have not checked this, but watchtower is probably using docker for most steps anyway? So basically the only thing that could be attacked is via the notifications watchtower is sending?