Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    How much of a security concern is virtuallization

    Scheduled Pinned Locked Moved General pfSense Questions
    51 Posts 13 Posters 4.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • N
      netblues @provels
      last edited by

      @provels said in How much of a security concern is virtuallization:

      AWSAzure

      Nobody seen that??

      We get checkpoint on aws, fortigate on aws, pfsense on aws. All of them essentially virtualized.

      As for the nuclear plant auditors. Well, if a simple kvm switch is a threat, how about supply chain exploits. Can they spell Solawinds?

      bmeeksB 1 Reply Last reply Reply Quote 0
      • bmeeksB
        bmeeks @netblues
        last edited by bmeeks

        @netblues said in How much of a security concern is virtuallization:

        how about supply chain exploits. Can they spell Solawinds?

        They have pages of rules about securing the supply chain to go along with everything else 🙂. The cyber rule in the Code of Federal Regulations takes up about 1/3 of a page of text. Their regulatory guideline for implementing that 1/3 page of text is 105 pages long. The actual plan we had to create and provide them describing how we secured things was several hundred pages in length.

        I'm old school as I stated earlier, but I predict someone is going to eventually have a really bad day with cloud-based firewalls. Firewall vendors are out to sell what the market thinks it wants -- not necessarily to provide constructive cybersecurity advice.

        1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          Yeah when you consider 'cloud' based virtualisation a different set of concerns arise. Not least of which is that some malicious actor could be on the same host as the firewall.

          N 1 Reply Last reply Reply Quote 0
          • NightlySharkN
            NightlyShark
            last edited by

            Just a thought, but I think that if any netgate product was to be put in the backbone of a bank's metro net, that would be TNSR... And, of course, not in a VM. And I say metro net, because I find it hard to imagine that any bank would use plain-old internet to VPN its internal systems.

            Also, of course it's fine for the home / SO server (and family/security) net.

            The problems and tradeoffs come when you find yourself somewhere in the middle. An accounting firm with 30+ employees, maybe? What to do there? I think bare-metal. Just for the ease of service. Box breaks, you get there with another box, install pfsense, maybe transfer some surviving hardware, download the config and all the while, nothing else broke. The same is true for all other mission-critical services. If you had set those systems as VMs in the same box, no matter how balling, if that one box gets a cold, oh mama.

            On the other end of the scale, the server-farm scale, is where virtualization starts to make sense again, but not for firewalls. Rather for the 100's of different, ever changing workloads.

            And a question, if you use PCIe passthrough (IOMMU or better) to pass a multiport NIC to PfSense, how can that be dangerous? You can even have the hypervisor off the net entirely.

            S N 2 Replies Last reply Reply Quote 0
            • S
              starcodesystems @MakOwner
              last edited by

              @MakOwner said in How much of a security concern is virtuallization:

              @starcodesystems said in How much of a security concern is virtuallization:

              I don't have a problem using ESXI for Pfsense.

              Matter of fact, our UPS system at headend went down, INOP, at the same time the power company was switching over to LNG generators. We had about 3 months of hell with loss or power to the facility, sometimes 3, 4 times per day and in quick succession.

              I'm also running Harmonic NMX system for DVB-T2 system which uses Windows 2000, and they said it can't be done. Here again, because of what it is, no other VM's are running on that server, and here again with all the power loss and rebooting, like i said sometimes, 2, 3 times a day, I have to take my hat off to Vmware and their hypervisor. No problems, no issues. Comes right back up and look, I actually have fingernails again!

              And this is why I have a love/hate relationship with VMware.
              I'm in an area with especially sketchy power -- I get as more over voltage spikes than we get power loss events. I and the delivery provider know why, they just haven't been sued enough to fix it <sigh>.
              I'm a bigger threat to stability changing stuff in VMware than my hardware and filesystems are.

              Backups, backups, backups and practice your recovery!

              Hmm, we get that too, and we have replaced Laser Printer after Laser Printer, and Timeclock after Timeclock, until we put Furman AC-215A Compact Power Conditioner with Auto-Resetting Voltage Protection in the wall first, and then the UPS (not for Laser Printers) into the Furman. We have not had any issues at at since.

              1 Reply Last reply Reply Quote 0
              • S
                starcodesystems @NightlyShark
                last edited by

                @NightlyShark said in How much of a security concern is virtuallization:

                Just a thought, but I think that if any netgate product was to be put in the backbone of a bank's metro net, that would be TNSR... And, of course, not in a VM. And I say metro net, because I find it hard to imagine that any bank would use plain-old internet to VPN its internal systems.

                Also, of course it's fine for the home / SO server (and family/security) net.

                The problems and tradeoffs come when you find yourself somewhere in the middle. An accounting firm with 30+ employees, maybe? What to do there? I think bare-metal. Just for the ease of service. Box breaks, you get there with another box, install pfsense, maybe transfer some surviving hardware, download the config and all the while, nothing else broke. The same is true for all other mission-critical services. If you had set those systems as VMs in the same box, no matter how balling, if that one box gets a cold, oh mama.

                On the other end of the scale, the server-farm scale, is where virtualization starts to make sense again, but not for firewalls. Rather for the 100's of different, ever changing workloads.

                And a question, if you use PCIe passthrough (IOMMU or better) to pass a multiport NIC to PfSense, how can that be dangerous? You can even have the hypervisor off the net entirely.

                I think the Banks will use something like Cisco. I don't see then using anything like Pfsense or Vyos unless we're talking about Community Banks / Credit Unions. This 'big boys' know they're a target and risk analysis on past events, dictates their current and future policies, and they need a company that they can point their fingers at and know action will be taken and implemented across the entire industry, and they know Cisco is their guy, and IPv6 will point them straight to your NAT'less device MAC Address. They love it!

                M NightlySharkN JKnottJ 3 Replies Last reply Reply Quote 0
                • M
                  michmoor LAYER 8 Rebel Alliance @starcodesystems
                  last edited by

                  @starcodesystems said in How much of a security concern is virtuallization:

                  I think the Banks will use something like Cisco. I don't see then using anything like Pfsense or Vyos unless we're talking about Community Banks / Credit Unions.

                  pfSense is used very heavily in U.S. government agencies and Amazon (warehouses).
                  That said, I see where you are coming from in that regard but it all depends on threat analysis. Maybe its a better fit for a Palo at a banking system because they generally don't mind that a firewall calls out to a vendors cloud to pull down updates/threat prevention sigs etc.. Other places are a bit more sensitive to what leaves their network and don't want a chatty firewall. Just all depends on what is the risk.

                  Firewall: NetGate,Palo Alto-VM,Juniper SRX
                  Routing: Juniper, Arista, Cisco
                  Switching: Juniper, Arista, Cisco
                  Wireless: Unifi, Aruba IAP
                  JNCIP,CCNP Enterprise

                  1 Reply Last reply Reply Quote 0
                  • NightlySharkN
                    NightlyShark @starcodesystems
                    last edited by

                    @starcodesystems Hahaha, if only it was possible to hack a bank from home and have your mac be a concern these days... I miss those days, early 2000. 2002, when I got my first PC.

                    1 Reply Last reply Reply Quote 0
                    • N
                      netblues @NightlyShark
                      last edited by

                      @NightlyShark

                      The thing is that banks don't dig and install dark fiber themselves. And even metro eth is still shared with other people.
                      What happens is segregation of control.
                      In critical systems, they rent (e.g.) an mpls vpn from a carrier. The carrier offers and maintains its own routers at the banks edge creating the vpn, and the bank has its own boxes , run by their own admins implementing their own vpn's on top of the carrier vpn.
                      And usually they opt for different vendors, so they dont get the same 0 day exploits.

                      Good luck with the packet size mtu though :)

                      1 Reply Last reply Reply Quote 0
                      • N
                        netblues @stephenw10
                        last edited by

                        @stephenw10 said in How much of a security concern is virtuallization:

                        Yeah when you consider 'cloud' based virtualisation a different set of concerns arise. Not least of which is that some malicious actor could be on the same host as the firewall.

                        Thankfully is very very difficult to know who your neighbors are.

                        1 Reply Last reply Reply Quote 0
                        • JKnottJ
                          JKnott @starcodesystems
                          last edited by

                          @starcodesystems said in How much of a security concern is virtuallization:

                          and IPv6 will point them straight to your NAT'less device MAC Address.

                          Only if you configure it that way. You can base your consistent address on either the MAC address or a random number. With SLAAC, random numbers are always used for outgoing connections.

                          PfSense running on Qotom mini PC
                          i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                          UniFi AC-Lite access point

                          I haven't lost my mind. It's around here...somewhere...

                          NightlySharkN 1 Reply Last reply Reply Quote 0
                          • NightlySharkN
                            NightlyShark @JKnott
                            last edited by

                            @JKnott Won't stop them from knowing the prefix, though.

                            JKnottJ 1 Reply Last reply Reply Quote 0
                            • JKnottJ
                              JKnott @NightlyShark
                              last edited by

                              @NightlyShark

                              Yep, and each /64 contains 18.4 billion, billion addresses, so it will take a while to find something to attack.

                              PfSense running on Qotom mini PC
                              i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                              UniFi AC-Lite access point

                              I haven't lost my mind. It's around here...somewhere...

                              NightlySharkN 1 Reply Last reply Reply Quote 0
                              • NightlySharkN
                                NightlyShark @JKnott
                                last edited by

                                @JKnott Yeah, but, you ISP knows you have the whole prefix...

                                JKnottJ 1 Reply Last reply Reply Quote 0
                                • JKnottJ
                                  JKnott @NightlyShark
                                  last edited by

                                  @NightlyShark

                                  And how much of a risk is that? I get 256 /64s from my ISP. They'd have to monitor your traffic to see what addresses are in use. How is that any different from them monitoring your IPv4 traffic? The risk is unlikely to come from your ISP. It's from someone else. With IPv4, it's easy to scan through the entire address range, looking for something to attack. The IPv6 address space is so sparsely populated, that would be a big waste of time. Remember, a single /64 contains as many addresses as the entire IPv4 address space squared!

                                  PfSense running on Qotom mini PC
                                  i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                                  UniFi AC-Lite access point

                                  I haven't lost my mind. It's around here...somewhere...

                                  NightlySharkN 1 Reply Last reply Reply Quote 0
                                  • NightlySharkN
                                    NightlyShark @JKnott
                                    last edited by

                                    Dear @JKnott , read the conversation again... Specifically:

                                    @NightlyShark said in How much of a security concern is virtuallization:

                                    @starcodesystems Hahaha, if only it was possible to hack a bank from home and have your mac be a concern these days... I miss those days, early 2000. 2002, when I got my first PC.

                                    1 Reply Last reply Reply Quote 0
                                    • First post
                                      Last post
                                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.