Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


Do providers have access to customer files? (vps)
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

Do providers have access to customer files? (vps)

Hello,

Did any of you ever wonder how much privacy you got as customer related to data you store on your vps?

I know that I did.

Recently i heard from my friend who provides all kinds of hosting services
that it is possible to get & view data from a customer vps without having to know the customer's login information.

If i remember correctly he said that this is possible in XEN, KVM, OpenVZ the only virtualization this wasnt possible in is VMWare.

Can anyone confirm this? if this is true then how can we prevent the providers from obtaining personal/sensitive data from out of our vps? would encrypting the HDD work?

«1

Comments

  • vzctl enter

    And the host can browse your vps if it is openvz.

    So yes, it is possible.

    I'm not sure how it works with KVM and XEN. But there are always ways to see what you are doing and get data from your vps.

    Thanked by 1Mark_R
  • NeoonNeoon Community Contributor, Veteran
    edited December 2013

    OpenVZ, one mouse click. KVM they need to mount your disk, when it's entcrypted would be harder. Theoretically they could get your key for ssh login from the memory and could login into your machine also KVM.

    Thanked by 1Mark_R
  • @Infinity580 said:
    OpenVZ, one mouse click. KVM they need to mount your disk, when it's entcrypted would be harder. Theoretically they could get your key for ssh login from the memory and could login into your machine also KVM.

    So basicly, in OpenVZ its like a inbuild Feature in the virtualization software
    what about XEN and KVM?

  • VMWare ESXi is not immune to this. Same ballpark as KVM/XEN. Snapshot image, remount in new VM, enjoy.

  • If the provider has physical access to your nodes they can get in.

    Debian 7 wont let you get into single user mode without a root password (Ironic if you need to reset your root password). This only is good for a KVM/Xen VPS though.

  • @Mark_R said:
    what about XEN and KVM?

    If a disk can be mounted it can be accessed so the answer is yes.

  • @tchen said:
    VMWare ESXi is not immune to this. Same ballpark as KVM/XEN. Snapshot image, remount in new VM, enjoy.

    Yes but what i dont get is how they can bypass the login

    it makes me think that the virtualization software has a buildin bypass feature to gain access without login details.

  • Mark_R said: Yes but what i dont get is how they can bypass the login

    They don't have to. Just imagine:

    Open your computer case, pull the HDD out, plug it on another computer via USB or whatever, access the files.

    It's the same thing really, you can just mount a VM disk image as a second drive just like if it was a physical drive.

    Thanked by 1Mark_R
  • It means user have no privacy

  • mikhomikho Member, Host Rep

    Basicly it is easy on every virtualization technique used, only the steps are different.
    Which reminds me of a cade where one of my customers vm in vmware wouldn't start because of no free space. Mount the diskimage to another running vm and remove some files. Then unmount and start original vm.
    Easy as pie. :)

  • @instatech said:
    It means user have no privacy

    That's why it is important to choose a trusted provider.

    Thanked by 2ryanarp tux
  • I doubt whatever is being hosted is top secret. Get off your high horse, and accept that your data can be seen unless you colo your hardware.

    Even with colo, someone can get into your cage.

    Thanked by 1vRozenSch00n
  • perennateperennate Member, Host Rep

    You might as well encrypt the virtual disk since there's no reason not to, as its easy these days (if you're installing through ISO). Still they can dump memory.

  • @vRozenSch00n said:
    That's why it is important to choose a trusted provider.

    Like BuyMyVM

    Thanked by 2Mark_R darkshire
  • Casius said: Like BuyMyVM

    :P :P :P

  • shovenoseshovenose Member, Host Rep

    Thing is, I think I'm not only speaking for myself but any hosting company with a decent amount of customers but we have better things to do than snoop in your VPS.

  • Mark_RMark_R Member
    edited December 2013

    @DrJinglesMD said:
    I doubt whatever is being hosted is top secret. Get off your high horse, and accept that your data can be seen unless you colo your hardware.

    Even with colo, someone can get into your cage.

    I obviously know that my data can be seen smartass

    that doesnt change the fact that i wanna try to make it harder to be accessable for the provider.

    Thanks @agonyzt

    that answered it for me.

    What software would you guys recommend to encrypt the HDD in a way that the provider would have to spend alot of time in decrypting in order to access it?

    Debian seems to come with a encrypt entire disk LVM feature upon installing its OS
    is that something that would work and make it real hard for the provider?

    I need something that does this encrypting realtime.

  • @Mark_R said:

    Encrypting the hard disk is an option during the installation/partitioning of most Linux flavours these days. Ensure you install via ISO on KVM or XEN HVM

  • @Mark_R

    All your questions are already discussed in these threads:

    It's possible to create a relatively secure VPS using full disk encryption on KVM virtualization but if your node gets rebooted, your VPS won't be online until it's mounted.

    Thanked by 2Mark_R TheLinuxBug
  • @Atomic7 said:
    Mark_R

    All your questions are already discussed in these threads:

    It's possible to create a relatively secure VPS using full disk encryption on KVM virtualization but if your node gets rebooted, your VPS won't be online until it's mounted.

    Looks like i got some reading to do.

    If in the meantime someone comes up with new ways of protecting vps data

    feel free to share it!

  • AnthonySmithAnthonySmith Member, Patron Provider
    edited December 2013

    Xen/KVM/VMWare/OpenVZ it takes all of 10 seconds at the most if you wanted to access customer data, this applies to shared hosting as well.

    If a DC wanted to access the data on a physical server a power cycle and live boot disk and 60 seconds later they have access.

    So yeah if your worried encrypt, if your extra worried colo with a pre encrypted hardened server.

    However I would like to say that as a host, the only time customer data is accessed is on request e.g. I fried my OS can you get some files for me, or if malicious or criminal intent is suspected and even then it is not to look through your stuff it is to pin point any issues.

    Granted it is more effort and more obvious on KVM/Xen if a host has been snooping where as with OpenVZ there is zero separation of data, essentially your VPS exists as a directory on the host node so literally no trace is left and no effort required and in 99% of cases you will find you cant encrypt on OpenVZ.

    Thanked by 2Mark_R hanru
  • AnthonySmith said: So yeah if your worried encrypt, if your extra worried colo with a pre encrypted hardened server.

    And if you are extra worried after that, take pills :) Or change your business.

    Thanked by 1AnthonySmith
  • Mark_RMark_R Member
    edited December 2013

    the only thing that makes me think twice about encrypting my vps
    is the resources it will take, it probably will slow down my vps due the active decryption and eats extra HDD space.

    it wont be a budget vps anymore if i choose todo this because i will have to upgrade it again.

  • AnthonySmithAnthonySmith Member, Patron Provider

    @Mark_R sure it puts overhead on but honestly the impact is minimal so minimal in fact that if the performance difference was actually of any real concern you would not be using a VPS to begin with :)

  • jnguyenjnguyen Member
    edited December 2013

    If you don't trust providers with data, buy your own hardware and build your own datacenter.

    Simple as that.

    Even then, there's always going to be someone that can access your data at will -- Law enforcement.

  • @GreenValueHost said:
    If you don't trust providers with data, buy your own hardware and build your own datacenter.

    Simple as that.

    If that was a option i would've done it already

    but thanks for your "input"

  • @Mark_R said:
    but thanks for your "input"

    You're complaining for a completely useless cause then.

    Providers need access to your data to assist you in cases where you lock yourself out, suspicions are raised that you're hosting illegal material, etc.

  • Mark_RMark_R Member
    edited December 2013

    GreenValueHost said: You're complaining for a completely useless cause then.

    Providers need access to your data to assist you in cases where you lock yourself out, suspicions are raised that you're hosting illegal material, etc.

    I'm not complaining, read the thread before posting sherlock.

    I also know that i never want my provider to access my stuff
    if i lock myself out or anything i always format my vps and just reinstall it
    but this i didn't need todo yet because i know what im doing.

    If you still dont get the intention of this thread then i suggest you read the main post again

  • GreenValueHost said: Providers need access to your data to assist you in cases where you lock yourself out, suspicions are raised that you're hosting illegal material, etc.

    That's why we, as users, need a trustworthy providers that we can entrust our personal information, credit card information, and data.

    Not a 14 years old kid that get hacked more than 5 times in a row, trying to sell VPS. :)

Sign In or Register to comment.