Today we announce that we have completely removed all traces of disks being used by our VPN infrastructure!

  • Carlos Solís@communities.azkware.net
    link
    fedilink
    English
    arrow-up
    34
    arrow-down
    9
    ·
    1 year ago

    From what I read in the article, there is still one part of the boot sequence that does require some sort of storage: the part where the bootloader fetches the network boot image and verifies it against the checksum signature. But I think that can be performed by booting from a pendrive and then removing it. The problem will come if law enforcement gets a hold of said pendrive…

    • Deconceptualist@lemm.ee
      link
      fedilink
      English
      arrow-up
      75
      ·
      1 year ago

      Why would that be a problem? A boot image should only contain the commands to get the main system started after POST. It shouldn’t contain any kind of logs, traffic data, or user data. In fact it should be read-only.

    • ikidd@lemmy.world
      link
      fedilink
      English
      arrow-up
      25
      ·
      1 year ago

      PXE boot will TFTP the boot image into RAM and carry on from there. You shouldn’t need any storage on your device.

      • Carlos Solís@communities.azkware.net
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        4
        ·
        1 year ago

        I’m aware of PXE, but in order to do so you need either of:

        • the boot image supplying server being in the same intranet as the rest of the other servers, or
        • some sort of method to point the diskless server to the correct external IP address to listen to

        Since the first mode is probably too unsafe, that leaves us with the second mode. Either the operator memorizes a specific IP address and types it into the BIOS each time the server is rebooted, or the IP address (and possibly the checksum of the image) are stored in a single-use pendrive that the operator carries. I wonder which of these two methods is used in this case.

        • Kangie@lemmy.srcfiles.zip
          link
          fedilink
          arrow-up
          4
          ·
          1 year ago

          PXE is automagic being basically kind of hacky extension to DHCP stuff.

          If PXE is enabled the machine will automatically find it via a DHCP relay on the network.

          the boot image supplying server being in the same intranet as the rest of the other servers … Since the first mode is probably too unsafe, that leaves us with the second mode.

          Why do you think that’s unsafe?

        • sixCats@lemmy.dbzer0.com
          link
          fedilink
          arrow-up
          3
          ·
          1 year ago

          I’ve never done this, but I believe server network cards can be configured for PXE automatically so

          Bios -> network card -> PXE over network

          So the storage is in the bios config, and then I guess the network card has its own kind of bios?

          • Carlos Solís@communities.azkware.net
            link
            fedilink
            arrow-up
            1
            arrow-down
            2
            ·
            1 year ago

            So there is still one single damning piece of information stored in the servers after all - the IP address to fetch the PXE boot image from. But hey, if Mullvad finds a way to strip even that out of the servers, that’d be great

    • mub@lemmy.ml
      link
      fedilink
      arrow-up
      14
      ·
      1 year ago

      Boot Drive could be immutable and not contain any form of log?

    • meseek #2982@lemmy.ca
      link
      fedilink
      arrow-up
      10
      arrow-down
      2
      ·
      1 year ago

      Destroy the drive. That’s what Apple does and how they get around the whole “we need a backdoor” problem. When no one can access the server, no more problems.

      • Carlos Solís@communities.azkware.net
        link
        fedilink
        arrow-up
        1
        arrow-down
        1
        ·
        1 year ago

        Something tells me that they have a stack of single-use drives so that each time a server needs to reboot for some reason, they write a boot loader in one from their central headquarters, walk back to the server room, use the device to boot the server, and finally hammer the everliving bejeezus out of the thumb drive juuuuust in case. Hopefully they don’t have to reboot that often!