advice on grsecurity use to solve remote access use issues..
Posted: Fri Aug 03, 2007 9:23 pm
First some background information. I have a large amount of servers, around one thousand of them, that are geographically dispearsed and on different providers networks. They are firewalled off with the exception of a few jump hosts that are allowed to connect over ssh, four of them to be exact. A few people have access to the jump hosts in order to run scripts that reload the services being provided by the remote servers. They also have the ability to ssh out to the servers and sudo to root and do work. I want to try to prevent someone from making a mistake and taking out all the servers at once or the possibility that someone might actually want to do that on purpose. I have been brainstorming on ways to do this. Limiting only two of the jump hosts to a set of servers so they would have to have access to both sets and dividing the team that works on things. I also thought about trying to limit the amount connections to the remote servers over time. Some sort of time based acl. What I want in the end is the ability to run automated commands across all the servers but at the same time prevent them from taking out the service. If one of the commands that you want them to be able run in an automated fassion has the ability to take out the service if ran across all the hosts at once how can you safely limit that or limit them from sshing to the boxes and rebooting it with sudo reboot. I was hoping some people might have some creative ways or just blatantly obvious uses for grsecurity's acl's or socket restrictions that would work. Any ideas?