Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Christ, that's depressing. I'm not much of a web guy, didn't know you could do this. Thanks for sharing...


Not that depressing. Audit your current web server configurations. You can dump the in-memory representation generally. Diff it with the on disk representation, and bam. Instant canary. If you're worried about a tainted on disk version, do the integrity check against a version invisible to the outside net.

Also, redeploy configs and reload on the regular, and you essentially force an actor to get an active foothold on your system to re-exploit and persist the compromise.

It's not impossible to defend yourself against these types of things if you're vigilant. You can also script your deployment to the point where you can nuke your site from orbit with minimal impact, and reestablish it. It's all about your threat model.

But yes. Things like nginx, apache & co are remarkably comprehensive in the things you can configure them to do. I find that my most dreaded part of standing up a new service is inevitably writing the load balancer/host web server configs.

No computing is 100% fire and forget safe though.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: