• 0 Posts
  • 16 Comments
Joined 1 year ago
cake
Cake day: July 7th, 2023

help-circle
  • In a centralized management scenario, the central controlling service needs the ability to control everything registered with it. So, if the central controlling service is compromised, it is very likely that everything it controlled is also compromised. There are ways to mitigate this at the application level, like role-based and group-based access controls. But, if the service itself is compromised rather than an individual’s credentials, then the application protections can likely all be bypassed. You can mitigate this a bit by giving each tenant their own deployment of the controlling service, with network isolation between tenants. But, even that is still not fool-proof.

    Fundamentally, security is not solved by one golden thing. You need layers of protection. If one layer is compromised, others are hopefully still safe.


  • If we boil this article down to it’s most basic point, it actually has nothing to do with virtualization. The true issue here is actually centralized infra/application management. The article references two ESXi CVE’s that deal with compromised management interfaces. Imagine a scenario where we avoid virtualization by running Kubernetes on bare metal nodes, and each Pod gets exclusive assignment to a Node. If a threat actor has access to the Kubernetes management interface, and can exploit a vulnerability to access that management interface, it can immediately compromise everything within that Kubernetes cluster. We don’t even need to have a container management platform. Imagine a collection of bare-metal nodes managed by Ansible via Ansible Automation Platform (AAP). If a threat actor has access to AAP and exploit it, it then can compromise everything managed by that AAP instance. This author fundamentally misattributes the issue to virtualization. The issue is centralized management and there are significant benefits to using higher-order centralized management solutions.









  • First, let’s assume we’re all intelligent people here and not be condescending.

    I am not saying it’s not possible to view high resolution content at 25 mbps. I am saying that certain content just can’t encode at full fidelity at 25 mbps. In my experience, high action scenes with tons of entropy to encode do not compress well. And those scenes degrade and become muddy or pixelated at lower bitrates. Do you need it for the entire stream? No. But sadly, to save on bandwidth many streaming services also severely limit how much buffering their clients will do.

    Even all this said. We’re talking about 10’s of megabits of difference. Significant portions of the world have managed to offer gigabit internet to practically everyone in their jurisdiction. And yet, we’re here in the dark ages with 25/3. And sure, you could say “American has significantly more rural areas, those customers are hard to serve.” But, I’ve got family in coal-country West Virginia that have gigabit fiber. There are no technical hurdles. These companies just don’t want to upgrade their infrastructure.






  • Annoying yes, but I’d argue that’s likely the simplest and most performant approach. At best (IPTables NAT), you’d be adding in an extra network hop to your SMB connections which would effect latency, and SMB is fairly latency sensitive especially for small files. And at worst (Traefik), you’d adding in a user-space layer 7 application that needs to forward every bit of traffic going over your SMB connection.



  • I have a feeling routing SMB traffic through Traefik is going to be a performance and latency nightmare. Is your TrueNAS VM’s network interface bridged to your home network? If so, use a static IP and just have clients connect directly. If not, your best bet is likely iptables NAT to forward a port from your Proxmox servers IP to the TrueNAS VM.