[ Date Index ] [ Thread Index ] [ <= Previous by date / thread ] [ Next by date / thread => ]
On 08/08/13 21:51, bad apple wrote:
On 08/08/13 21:35, Mark Evans wrote:I may be missing the point here but if the snapshot has a security defect embedded in it (known or more likely unknown at present) then surely you are loading the same defect every time you boot the VM snapshot. So eventually someone will discover said defect and exploit it and your snapshot. IMO the older the snapshot the more vulnerable it becomes. True the trojan dies when the machine is switched off, but it can be re-installed the second the machine is turned on again using the exact same security hole, given that the snapshot faithfully reproduces good and bad code alike every time its started. If I understand these bots correctly once they infect a machine they call home to momma, failure to report in regularly would get an instant re-infection attempt from the "controller" using the same technique. DHCP might help here if your ip changes between reboots, but even this isn't that helpful as ISP's use ranges of IP's that are well known to crackers and users alike (whois). My DHCP IP address hasn't changed since the ISP's last crash although my firewall/gateway has been rebooted numerous times since then. Surely it would be better to keep your security fixes up to date even if you run the risk of introducing new issues in the process? At least that way you are keeping the crackers target moving. Or perhaps you are suggesting keeping the snapshot updated with latest security patches? Now that might make more sense (to me), but then keeping control of that process introduces admin headaches. All I know is nothings safe in the world of IT. Safety is an illusion. You develop an unhealthy? paranoia if you spend too much of your life working with computers. I guess what I am really saying is don't get comfortable with the idea that a snapshot running on a VM makes you cracker proof. |
-- The Mailing List for the Devon & Cornwall LUG http://mailman.dclug.org.uk/listinfo/list FAQ: http://www.dcglug.org.uk/listfaq