So in the case of a "network" setup for "fsx" - the network admin would authorise nodes to access the "fsx" network (I would suggest based on
their application to join the network) - and de-authorise them when they leave the network.
We are still strangers here, but we are a list of known strangers and we can identify who is doing something in appropriate on the network and
take action if that is deemeed the right response.
But at the same time,
our conversations and traffic is encrypted from the outside world.
Anybody outside of the network cant get to our systems and do stuff
(which is the script kiddies reference I made when I started this thread).
Another incredibly powerful feature of ZeroTier is the ability to
tap the entire network regardless of how widely distributed its
nodes are.
Is there a way to prevent this?
I dont see this as an issue, it would be no differnet to tcpdump -ni eth0:
Anybody outside of the network cant get to our systems and do stuff
(which is the script kiddies reference I made when I started this thread).
So you propose everything should happen within the VPN? No open BBS / binkp ports to the real Internet?
So in the case of a "network" setup for "fsx" - the network admin would authorise nodes to access the "fsx" network (I would suggest based on
their application to join the network) - and de-authorise them when they leave the network.
-1
We are still strangers here, but we are a list of known strangers and we can identify who is doing something in appropriate on the network and
take action if that is deemeed the right response.
-1
there are other ways for encryption, which fit the FTN model better.
Another incredibly powerful feature of ZeroTier is the ability to
tap the entire network regardless of how widely distributed its
nodes are.
Is there a way to prevent this?
I dont see this as an issue, it would be no differnet to tcpdump -ni eth0:
I was not aware that you can monitor all of my fsxnet traffic with a tcpdump on your side.
For a corporate network this is obviously a feature, but in our use case I would call it a security flaw.
# We could choose to 'secure' the network using something like
ZeroTier
I used ZeroTier and it's quite easy to setup and works, but I
dislike the idea to use a commercial provider for the basic
infrastructure. FTN is DIY.
You dont have to use "a provider" with ZeroTier.
I run a ZeroTier network that is independant of "zerotier" (the provider) itself.
While you may argue that you "find" me through their root server (which
is the default) - it doesnt "have" to operate that way. I can populate a "moon" that you "orbit" around (their terms, not mine) so that zerotier
can be turned off and our connection still works.
I know ZeroTier were working on personal "roots" so that this moon thing has a less of a value (and they are no longer a sudo dependancy). (I
havent kept up with it recently though.)
The other good thing, with ZeroTier, you dont necessarily provide anybody on the network (who needs to be authorised if it is configured to do so), to see everything on all ports. You can firewall it to a certain extent
(at the network layer), such that only specific ports are permitted on
the network. (I did setup the FSX zerotier network this way.) (You could also have your own running firewall as well if you wanted.)
Is it completely independent?
Wikipedia tells me: "Virtual networks are created and managed using a ZeroTier controller. Management is done using an API,
proprietary web-based UI (ZeroTier Central), open-source web-based or CLI alternative. Using root servers other than those hosted by
ZeroTier Inc. is *impeded* by the software's license.
Can I configure the ports or has the admin the power to change the rules at will?
Is it possible to use ZeroTier in a really decentralized way?
Is it completely independent?
Yes - https://www.zerotier.com/manual/#4_4
Wikipedia tells me: "Virtual networks are created and managed using
a ZeroTier controller. Management is done using an API, proprietary
web-based UI (ZeroTier Central), open-source web-based or CLI
alternative. Using root servers other than those hosted by ZeroTier
Inc. is *impeded* by the software's license.
It seems illogical to impede the use of their roots via the software license, when their documentation tells you how to do it (via moons).
Can I configure the ports or has the admin the power to change the
rules at will?
The owner of the network controls the ports for the network. But you with
a (virtual) interface to the network can apply your OS level firewalling
- in the same way you may want to firewall one host from another on the same ethernet network.
Is it possible to use ZeroTier in a really decentralized way?
Yes, I believe so - even though I've not actually tried it with any
system not connected to the internet.
[...]
If zerotier
shuts down their root servers, you will still continue to function if you have my moon configured.
Another incredibly powerful feature of ZeroTier is the ability to tap the entire network regardless of how widely distributed its
nodes are. Using the tee ability within a flow rule essentially copies every frame sent/received by nodes on the network and sends it
to a node of your choice such as an IDS or full packet capture solution such as Moloch.
from: https://blog.reconinfosec.com/locking-down-zerotier/
see also: https://www.zerotier.com/2016/08/31/capability-based-security-for-virtual-networks/
headline "Global Rules and Security Monitoring"
Is there a way to prevent this?
It's still kind of centralized (your moon).
While still a "VPN" - it is still semi public, so you still have obligations. Their are people you dont know on the network - but not
*anybody* - the network "admin" can choose to "authorise" (or not) those requesting to join it.
So in the case of a
Any VPN has to have some sort of a hub. Even ZeroTier. At least with OpenVPN it's open source, and we could customize it to how we
see fit and we need
not announce which port or which protocol type we decide to use.
The root nodes in this case would be hubs. There needs to be a central point within each network to host and serve the proper
security certs. Even with OpenVPN, a point/node would still be able to see another point/node within the private IP network. That
The root nodes in this case would be hubs. There needs to be a central point within each network to host and serve the proper
security certs. Even with OpenVPN, a point/node would still be able to see another point/node within the private IP network.
That
So no.
Like web serving - the DNS server has nothing to do with the SSL exchange that occurs when you "A" and the server "C" when you are
browsing a secure website.
Sysop: | Gary Ailes |
---|---|
Location: | Pittsburgh, PA |
Users: | 132 |
Nodes: | 5 (0 / 5) |
Uptime: | 109:36:02 |
Calls: | 733 |
Files: | 2,171 |
Messages: | 81,483 |