Hacker News new | past | comments | ask | show | jobs | submit login
Datacenter Security: A Cautionary Tale from Last.fm (garrett.co.uk)
59 points by danw on March 12, 2009 | hide | past | favorite | 15 comments



Having just been burgled last week (my flat, not my data centre) and lost 3 laptops, including a precious macbook pro, to it, I can certainly relate to the feeling of insecurity.

After I was burgled I was reminded of a chinese proverb, that goes along the lines of: "A room full of jade and gold, nothing can guard it." The point of it is that if people know you have lots of precious stuff in your room, you won't be able to stop them from breaking in eventually.

In my case, my laptops were visible from the street while I worked (my home office faces the street), even though I normally close the curtains in the evening, and that was probably the determining factor in drawing the burglars in. They only needed to notice the laptops once and then keep hanging around until they saw an opportunity.

As far as data centres are concerned, qualified thieves will obviously know for a fact that there's good stuff to be had there. If you do have such expensive, custom equipment, perhaps the only thing you can do to protect yourself is to disguise it as something else. You can't disguise the whole data centre, but you can disguise racks.

One possible way to do this on a large scale would be to render the server cabinets opaque, so that there is no way to identify the high-price ones from the lower price ones. This would make it harder for the thieves to "do business", so to speak, so they may head elsewhere because it's just not convenient.


I'm not sure if it's intentional, but the data center we use in Sheffield looks like an absolute tip from the outside. Just looks like your average inner city, run down, squatter filled mess. Inside it's another story though, so I think you can disguise a data center!


i'm curious as to how the black market on something like this would work. my knowledge is limited on the chips themselves, but they seem like something that would likely only be purchased by companies serving a high volume of traffic (thereby making the chips hard to sell on the black market because of the reluctance of large companies to deal with second hand goods of questionable origin).


The market for Cisco equipment is large and diverse (not just Web 2.0s but ISPs, enterprises, universities, etc.), there are plenty of vendors of used Cisco equipment, and given the economic collapse more people are buying used equipment. In particular, the Cisco 6500 is a very popular family of switches.


Cisco frowns upon purchasing second hand equipment from "unlicensed" vendors. They claim that their software is non-transferable meaning that you technically don't own any of the IOS that comes with used routers. So if you need an upgrade or security update you are basically screwed until you fork over a ton of money.

http://www.cisco.com/en/US/prod/hw_sw_relicensing_program.ht...


But the thieves weren't stealing the routers - they were stealing parts to go in the routers.


The most valuable cards are the supervisor modules, which are the ones which actually run the IOS. But I wouldn't be surprised if the Cisco licensing agreements apply to all their cards.

All the cards have some pretty clever distributed forwarding smartness in them.


Isn't their software the Linux operating system? Or are we talking about something else?


I've never heard of IOS having anything to do with Linux. Cisco owns Linksys now, and most (all?) Linksys routers are based on Linux, but that's no secret.

Cisco branded products run some form of IOS, and IOS has always been Cisco secret sauce. A few years ago, some IOS source code was stolen and parts were made public. I think if any of it contained Linux kernel code the Internet would have erupted into fury.

On a somewhat related point, Juniper JunOS is based on a BSD variant (FreeBSD I think), but there is no way to know how much is BSD and how much was developed by Juniper. It's a consequence of the BSD license.


Plenty of cash strapped small companies need to push lots of bits around, no? Especially if they're 1/3 to 1/2 of retail


The most interesting thing to me was: "They were taken to court ___the following day___ and pled guilty, sentencing to follow."

That's pretty speedy, but I guess it shows how little I know about the UK judicial system / government.


Believe me, I was surprised as you are :).

(I wrote the article)


As a network neophyte, what are the "cards" they are talking about in the article?


The line cards in the Cat6k. The Cat6k is Cisco's flagship product, a layer-3 switch. By itself, it's an refrigerator-sized empty chassis. Add a "SUP" card to it, which is roughly the shape of an oblong pizza box, and you have something you can run Cisco's OS on. Plug line cards into it and you have places to plug networking cables of varying types. The line cards themselves have processors and various ways of interfacing to the backplane in the chassis.


routers like that are expandable with different cards (think 1" thick 20x15" cards) to interface with different hardware. you can swap them in and out on the fly to add more connections, replace failed cards, etc.

you can buy the router as just a chassis with no cards in it, which means it's fairly useless. depending on your particular network setup, you install the cards to support it.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: