ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    ZeroTier & Security

    Scheduled Pinned Locked Moved IT Discussion
    15 Posts 7 Posters 1.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • scottalanmillerS
      scottalanmiller @notverypunny
      last edited by

      @notverypunny said in ZeroTier & Security:

      Point 2 - L2 switches can be sniffed via span / mirror ports

      Yes, but like sniffing encrypted traffic on a switch, sniffing ZT traffic is useless.

      1 Reply Last reply Reply Quote 0
      • scottalanmillerS
        scottalanmiller @notverypunny
        last edited by

        @notverypunny said in ZeroTier & Security:

        As an IT pro you wouldn't connect your endpoints directly to someone else's L2 switch without due-diligence / NDA etc etc etc legalese necessary for colo and datacenter setups due to Point 2

        As an IT pro I do every day, all day. It's called the WAN connection from the ISP. And we do it without any concern because the traffic is encrypted. Sniffing by the ISP is of no concern at all.

        I'd have zero problems sharing a switch with someone from a security perspective as there's no valuable data going on the switch that someone can see.

        If you need a colo or ISP to sign an NDA (colo is an ISP to its customers) then you have a problem and should never be running those computers.

        1 Reply Last reply Reply Quote 0
        • scottalanmillerS
          scottalanmiller @stacksofplates
          last edited by

          @stacksofplates said in ZeroTier & Security:

          If it's encrypted, what's the concern with using it?

          Ding ding ding.

          1 Reply Last reply Reply Quote 0
          • scottalanmillerS
            scottalanmiller @stacksofplates
            last edited by

            @stacksofplates said in ZeroTier & Security:

            There's also nothing stopping you from doing everything over HTTPS/SSH/whatever over zerotier. I just don't see the issue.

            Right, ZT, like all VPNs (as always the rules are general) should never carry unencrypted traffic unless it's of no value (someone's YouTube videos I guess). The VPN should only provide handling / tunneling, not the base security. If used properly, VPNs increase protection not decrease it. But they aren't a replacement for the necessary security that you should already have to make the traffic safe on the WAN or, for that matter, on a LAN.

            You shouldn't be running unencrypted traffic even on a LAN that has no routing to the Internet. It's just reckless and pointless... why do that?

            1 Reply Last reply Reply Quote 1
            • scottalanmillerS
              scottalanmiller @notverypunny
              last edited by

              @notverypunny said in ZeroTier & Security:

              They (ZT) also make the claim that data is E2E encrypted, "and can't be read by roots or anyone else"

              They have to do this. If they didn't they would be such a massive point of attack as compromising their controllers would give unlimited access to tons of companies.

              1 Reply Last reply Reply Quote 0
              • 1
                1337 @notverypunny
                last edited by

                @notverypunny

                If you assume that being connected to an ZeroTier network is the same as having the host sitting directly on the internet, you'll be fine.

                That is the basic premise of the zero trust security model - assuming that the network is hostile.

                IRJI scottalanmillerS 2 Replies Last reply Reply Quote 2
                • IRJI
                  IRJ @1337
                  last edited by

                  @pete-s said in ZeroTier & Security:

                  @notverypunny

                  If you assume that being connected to an ZeroTier network is the same as having the host sitting directly on the internet, you'll be fine.

                  That is the basic premise of the zero trust security model - assuming that the network is hostile.

                  Yes this ^

                  1 Reply Last reply Reply Quote 1
                  • notverypunnyN
                    notverypunny
                    last edited by

                    Thanks for the input everyone, it's pretty much in line with my own thoughts on the subject. In case it wasn't clear, the points outlined in my initial post were a simplification / summation of the arguments that I've previously come up against with regards to using ZT for anything more than a hobbyist type of setup.

                    1 Reply Last reply Reply Quote 0
                    • scottalanmillerS
                      scottalanmiller @1337
                      last edited by

                      @pete-s said in ZeroTier & Security:

                      @notverypunny

                      If you assume that being connected to an ZeroTier network is the same as having the host sitting directly on the internet, you'll be fine.

                      That is the basic premise of the zero trust security model - assuming that the network is hostile.

                      Ding ding, exactly. It's a connectivity tool, not a security tool. The security has to be provided normally. Any ZT provided security, is purely extra.

                      1 1 Reply Last reply Reply Quote 0
                      • 1
                        1337 @scottalanmiller
                        last edited by

                        @scottalanmiller said in ZeroTier & Security:

                        @pete-s said in ZeroTier & Security:

                        @notverypunny

                        If you assume that being connected to an ZeroTier network is the same as having the host sitting directly on the internet, you'll be fine.

                        That is the basic premise of the zero trust security model - assuming that the network is hostile.

                        Ding ding, exactly. It's a connectivity tool, not a security tool. The security has to be provided normally. Any ZT provided security, is purely extra.

                        Yes, and when it comes to security ZeroTier, as any other VPN, shows up as a virtual network adapter. So you can apply the OS' firewall like you could on any network adapter.

                        And the ZeroTier network itself also has some limited L2 rules to control the traffic, similar to a switch. It lacks tcp sessions and other things though so it's not like a real router/firewall.

                        There is also the possibility to connect ZeroTier to a compatible firewall and not the host directly.

                        S 1 Reply Last reply Reply Quote 2
                        • S
                          scotth @1337
                          last edited by

                          @pete-s said in ZeroTier & Security:

                          @scottalanmiller said in ZeroTier & Security:

                          @pete-s said in ZeroTier & Security:

                          @notverypunny

                          If you assume that being connected to an ZeroTier network is the same as having the host sitting directly on the internet, you'll be fine.

                          That is the basic premise of the zero trust security model - assuming that the network is hostile.

                          Ding ding, exactly. It's a connectivity tool, not a security tool. The security has to be provided normally. Any ZT provided security, is purely extra.

                          Yes, and when it comes to security ZeroTier, as any other VPN, shows up as a virtual network adapter. So you can apply the OS' firewall like you could on any network adapter.

                          And the ZeroTier network itself also has some limited L2 rules to control the traffic, similar to a switch. It lacks tcp sessions and other things though so it's not like a real router/firewall.

                          There is also the possibility to connect ZeroTier to a compatible firewall and not the host directly.

                          I'm running OPNSense at home and have the plugin working and connected to a client's PC's from my house.

                          Works great.

                          1 Reply Last reply Reply Quote 1
                          • 1 / 1
                          • First post
                            Last post