LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 02-09-2015, 08:34 AM   #1
Ulysses_
Senior Member
 
Registered: Jul 2009
Posts: 1,303

Rep: Reputation: 57
Use of a VPS so its provider cannot see site being browsed


A fully-featured browser is used in a VPS. The video/graphics output is shown on my local PC.

Is there anything that can be done to make it extremely difficult for the provider of the VPS to see the output graphics of the browser?

Is there anything that can be done to hide the IP and domain name of the site too, that the browser is browsing?
 
Old 02-09-2015, 09:23 AM   #2
smallpond
Senior Member
 
Registered: Feb 2011
Location: Massachusetts, USA
Distribution: Fedora
Posts: 4,140

Rep: Reputation: 1263Reputation: 1263Reputation: 1263Reputation: 1263Reputation: 1263Reputation: 1263Reputation: 1263Reputation: 1263Reputation: 1263
A vps, including the frame buffer for its graphics, is just a process running on a host. So there isn't much that can be hidden from someone on the host who is determined. Even if you run the browser remotely the host could still record the packets and reconstruct the session. Access to the guest means access to things like ssh keys also. You can make it harder but I don't think you could be 100% safe.
 
Old 02-09-2015, 10:26 AM   #3
Ulysses_
Senior Member
 
Registered: Jul 2009
Posts: 1,303

Original Poster
Rep: Reputation: 57
What are the commonest tools the provider would use if they wanted to read the frame buffer, the ssh keys and packets? Anything that beats such tools is good enough for me.

Can't the frame buffer be remote, located in my PC? With remote control software, where is the frame buffer?

Last edited by Ulysses_; 02-09-2015 at 10:27 AM.
 
Old 02-15-2015, 05:29 AM   #4
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
The V in VPS stands for virtual meaning your server isn't a "ring 0" process to start with. Since you can not "see" anything below your own process level the only logical conclusion is you have no control whatsoever. If that irks you enough to spend cash then IMHO the only way to go is (colocating) your own properly secured physical server.
 
Old 03-27-2015, 04:04 PM   #5
Ulysses_
Senior Member
 
Registered: Jul 2009
Posts: 1,303

Original Poster
Rep: Reputation: 57
Could use vmware in the VPS. And the guest could be OpenBSD or Windows so linux tools running in the host do not work. And the VM could use full disk encryption so its disk image cannot be modified without invalidating it.

If a VPS is set up this way and everyone here is given full control (ie I tell you the root password) but NOT tell you the password of the guest root, nor the FDE passphrase, what can you guys do to break into the VM, in order to find out what site it is connecting to through TOR?

You can't reconstruct the session by recording the packets because TOR is used.

You can't mess with the vmware disk image without damaging it - it is encrypted by the guest (full disk encryption).

You can't attach to processes in the guest with debugging tools because you cannot see individual guest processes, not to mention they are OpenBSD or Windows processes.

You can't use the vmrun backdoor because you do not know the guest passwords.

You can't use a keylogger because no keyboard is being used in the VPS - I am connecting to the VM, with RDP or X through SSL/TLS.

What can you do? And crucially, what can I do as a countermeasure?

Last edited by Ulysses_; 03-27-2015 at 05:22 PM.
 
Old 03-28-2015, 06:14 AM   #6
TobiSGD
Moderator
 
Registered: Dec 2009
Location: Germany
Distribution: Whatever fits the task best
Posts: 17,148
Blog Entries: 2

Rep: Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886
Quote:
Originally Posted by Ulysses_ View Post
If a VPS is set up this way and everyone here is given full control (ie I tell you the root password) but NOT tell you the password of the guest root, nor the FDE passphrase, what can you guys do to break into the VM, in order to find out what site it is connecting to through TOR?
I would just wait until you start the VM, at that moment the disk is accessible and the VPS hoster can make an image of it. You can make it harder, but you can't prevent that the VPS hoster get access to everything on the machine. There is nothing that you can do about it but (as unSpawn already said) not using a VPS, but a dedicated server instead.
 
Old 03-28-2015, 07:55 AM   #7
Ulysses_
Senior Member
 
Registered: Jul 2009
Posts: 1,303

Original Poster
Rep: Reputation: 57
How would you decrypt the image that you would make? Remember the vmware VM uses full disk encryption. It is as if a laptop with FDE has been stolen. Your only chance is a ram dump. You would need to develop special software to find where in the ram dump the encryption key resides, but VPS hosters are not developers.

Last edited by Ulysses_; 03-28-2015 at 08:30 AM.
 
Old 03-28-2015, 08:42 AM   #8
TobiSGD
Moderator
 
Registered: Dec 2009
Location: Germany
Distribution: Whatever fits the task best
Posts: 17,148
Blog Entries: 2

Rep: Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886
Quote:
Originally Posted by Ulysses_ View Post
How would you decrypt the image that you would make? Remember the vmware VM uses full disk encryption. It is as if a laptop with FDE has been stolen. Your only chance is a ram dump. You would need to develop special software to find where in the ram dump the encryption key resides, but VPS hosters are not developers.
If the VM is running access to the encrypted disk image is already granted. Nothing is preventing the provider from making a snapshot of the complete VM at this state, so that the problem of a missing password or keyfile simply doesn't exist.
 
Old 03-28-2015, 08:50 AM   #9
Ulysses_
Senior Member
 
Registered: Jul 2009
Posts: 1,303

Original Poster
Rep: Reputation: 57
Ram could be encrypted too I just found out, in an OpenBSD VM:

Quote:
the OpenBSD Swap Encryption mechanisms ... does not actually encrypt physical memory but uses physical memory as a swap structure, forcing page faults and encrypting/decrypting data in resolution.
http://security.stackexchange.com/a/8299
 
Old 03-28-2015, 09:19 AM   #10
TobiSGD
Moderator
 
Registered: Dec 2009
Location: Germany
Distribution: Whatever fits the task best
Posts: 17,148
Blog Entries: 2

Rep: Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886
Still, the encryption keys have to be stored in RAM or CPU registers and it is no problem at all for a VPS host to get those keys.
 
Old 03-28-2015, 09:27 AM   #11
Ulysses_
Senior Member
 
Registered: Jul 2009
Posts: 1,303

Original Poster
Rep: Reputation: 57
You haven't addressed that not everybody is a developer. VPS hosters are usually not. It is not trivial to find the keys.

When novelty wears out, maybe there will be off-the-self software to break OpenBSD's ram encryption by finding the key, but not for a while, and not for low value targets like my rear.
 
Old 03-28-2015, 11:06 AM   #12
TobiSGD
Moderator
 
Registered: Dec 2009
Location: Germany
Distribution: Whatever fits the task best
Posts: 17,148
Blog Entries: 2

Rep: Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886
Quote:
Originally Posted by Ulysses_ View Post
You haven't addressed that not everybody is a developer. VPS hosters are usually not.
VPS hosters usually employ some developers, so I wouldn't rely on that. Anyways, a security concept that relies on the attacker not being a developer or that a key is hard to find (security by obscurity) is a broken security concept.
 
Old 03-28-2015, 04:40 PM   #13
Ulysses_
Senior Member
 
Registered: Jul 2009
Posts: 1,303

Original Poster
Rep: Reputation: 57
With this rationale TOR is broken security because it relies on three nodes not colluding with each other.

And when you visit your bank site, you rely on no one being interested in doing MITM on your connection.

Last edited by Ulysses_; 03-28-2015 at 04:42 PM.
 
Old 03-29-2015, 05:39 AM   #14
TobiSGD
Moderator
 
Registered: Dec 2009
Location: Germany
Distribution: Whatever fits the task best
Posts: 17,148
Blog Entries: 2

Rep: Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886
Tor is broken security, since you have to trust the first and last server in the chain to not be compromised. And yes, when doing online banking you have to make sure that you are not victim of a man in the middle attack.
Security by obscurity was never and will never be safe.
 
Old 03-29-2015, 01:02 PM   #15
Ulysses_
Senior Member
 
Registered: Jul 2009
Posts: 1,303

Original Poster
Rep: Reputation: 57
The fact that TOR and almost all security used worldwide is broken is off-topic when additions to TOR are being looked for. Additions to TOR might as well be just as imperfect as TOR. Nothing to lose.

Last edited by Ulysses_; 03-29-2015 at 01:08 PM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
[SOLVED] Site not available after migrating to VPS bartdevriendt Linux - General 4 06-30-2014 08:09 AM
LXer: Three college students build a health provider search site in six weeks LXer Syndicated Linux News 0 02-10-2014 01:01 PM
Looking for VPS Provider recommendations in the USA manyrootsofallevil Linux - Server 2 08-18-2011 04:34 AM
Anonymity provider can trace you, or site being visited? Ulysses_ Linux - Security 5 03-28-2011 12:33 PM
Best VPS provider with Slackware? mkoco Slackware 2 03-06-2010 12:03 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 02:14 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration