Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> This is hardly reducing the attack surface compared to a good distro with the usual userspace.

Run `tcpdump -n 'tcp and port 80'` on your frontend host and you'll still see PHP exploit attempts from 15 years ago. Not every ghost who knocks is an APT. A singleton Go binary running on a Linux kernel with no local storage is objectively a smaller attack surface than a service running in a container with /bin/sh, running on a vhost with a full OS, running on a physical host with thousands of sleeping VMs—the state of many, many websites and APIs today.



> is objectively a smaller attack surface

No, you have to understand what is really part of the attack surface and what the attacker wants.

For example, on a properly built system with a single application running with its own user the attacker might have no practical benefit at all in doing a privilege escalation to root.

> running on a physical host with thousands of sleeping VMs

This is a strawman. A shared hypervisor opens another attack surface and was not part of the discussion.


Look, my friend, we will have to disagree on this. What exploits will attack this setup from the front? A Linux networking or other syscall RCE, a Go compiler intrinsic RCE, a vulnerability in the app code, or a vulnerability in a third party library. All of which exist in the common OS-hosted scenario, in addition to everything else, plus you have both your container and your OS to worry about (e.g. openssl).

EDIT: Anyway, I'd like to thank Mr. Bogdanov and his client for sharing this story—it's just fascinating.


Sounds like a pretty nice way to get around having to constantly patch minor CVEs in base OS/distributions to maintain compliance - cut out the OS entirely.


No, it's not. You can deploy a very minimal Linux while also keeping the services that are actually good for security, like logging, IDS/IPS, certification compliance tooling, monitoring.

Unless you are running unnecessary daemons exposed on the Internet, 99% of the attack surface is from your application and the kernel itself.

Both parts that you can't remove.


> This is a strawman. A shared hypervisor opens another attack surface and was not part of the discussion.

Not to worry. When the ghosts knock, you just have to remind them that their attack is out of scope /s




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: