ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    ZeroTier & Security

    IT Discussion
    7
    15
    943
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      scottalanmiller @notverypunny
      last edited by

      @notverypunny said in ZeroTier & Security:

      As an IT pro you wouldn't connect your endpoints directly to someone else's L2 switch without due-diligence / NDA etc etc etc legalese necessary for colo and datacenter setups due to Point 2

      As an IT pro I do every day, all day. It's called the WAN connection from the ISP. And we do it without any concern because the traffic is encrypted. Sniffing by the ISP is of no concern at all.

      I'd have zero problems sharing a switch with someone from a security perspective as there's no valuable data going on the switch that someone can see.

      If you need a colo or ISP to sign an NDA (colo is an ISP to its customers) then you have a problem and should never be running those computers.

      1 Reply Last reply Reply Quote 0
      • S
        scottalanmiller @stacksofplates
        last edited by

        @stacksofplates said in ZeroTier & Security:

        If it's encrypted, what's the concern with using it?

        Ding ding ding.

        1 Reply Last reply Reply Quote 0
        • S
          scottalanmiller @stacksofplates
          last edited by

          @stacksofplates said in ZeroTier & Security:

          There's also nothing stopping you from doing everything over HTTPS/SSH/whatever over zerotier. I just don't see the issue.

          Right, ZT, like all VPNs (as always the rules are general) should never carry unencrypted traffic unless it's of no value (someone's YouTube videos I guess). The VPN should only provide handling / tunneling, not the base security. If used properly, VPNs increase protection not decrease it. But they aren't a replacement for the necessary security that you should already have to make the traffic safe on the WAN or, for that matter, on a LAN.

          You shouldn't be running unencrypted traffic even on a LAN that has no routing to the Internet. It's just reckless and pointless... why do that?

          1 Reply Last reply Reply Quote 1
          • S
            scottalanmiller @notverypunny
            last edited by

            @notverypunny said in ZeroTier & Security:

            They (ZT) also make the claim that data is E2E encrypted, "and can't be read by roots or anyone else"

            They have to do this. If they didn't they would be such a massive point of attack as compromising their controllers would give unlimited access to tons of companies.

            1 Reply Last reply Reply Quote 0
            • 1
              1337 @notverypunny
              last edited by

              @notverypunny

              If you assume that being connected to an ZeroTier network is the same as having the host sitting directly on the internet, you'll be fine.

              That is the basic premise of the zero trust security model - assuming that the network is hostile.

              I S 2 Replies Last reply Reply Quote 2
              • I
                IRJ @1337
                last edited by

                @pete-s said in ZeroTier & Security:

                @notverypunny

                If you assume that being connected to an ZeroTier network is the same as having the host sitting directly on the internet, you'll be fine.

                That is the basic premise of the zero trust security model - assuming that the network is hostile.

                Yes this ^

                1 Reply Last reply Reply Quote 1
                • N
                  notverypunny
                  last edited by

                  Thanks for the input everyone, it's pretty much in line with my own thoughts on the subject. In case it wasn't clear, the points outlined in my initial post were a simplification / summation of the arguments that I've previously come up against with regards to using ZT for anything more than a hobbyist type of setup.

                  1 Reply Last reply Reply Quote 0
                  • S
                    scottalanmiller @1337
                    last edited by

                    @pete-s said in ZeroTier & Security:

                    @notverypunny

                    If you assume that being connected to an ZeroTier network is the same as having the host sitting directly on the internet, you'll be fine.

                    That is the basic premise of the zero trust security model - assuming that the network is hostile.

                    Ding ding, exactly. It's a connectivity tool, not a security tool. The security has to be provided normally. Any ZT provided security, is purely extra.

                    1 1 Reply Last reply Reply Quote 0
                    • 1
                      1337 @scottalanmiller
                      last edited by

                      @scottalanmiller said in ZeroTier & Security:

                      @pete-s said in ZeroTier & Security:

                      @notverypunny

                      If you assume that being connected to an ZeroTier network is the same as having the host sitting directly on the internet, you'll be fine.

                      That is the basic premise of the zero trust security model - assuming that the network is hostile.

                      Ding ding, exactly. It's a connectivity tool, not a security tool. The security has to be provided normally. Any ZT provided security, is purely extra.

                      Yes, and when it comes to security ZeroTier, as any other VPN, shows up as a virtual network adapter. So you can apply the OS' firewall like you could on any network adapter.

                      And the ZeroTier network itself also has some limited L2 rules to control the traffic, similar to a switch. It lacks tcp sessions and other things though so it's not like a real router/firewall.

                      There is also the possibility to connect ZeroTier to a compatible firewall and not the host directly.

                      S 1 Reply Last reply Reply Quote 2
                      • S
                        scotth @1337
                        last edited by

                        @pete-s said in ZeroTier & Security:

                        @scottalanmiller said in ZeroTier & Security:

                        @pete-s said in ZeroTier & Security:

                        @notverypunny

                        If you assume that being connected to an ZeroTier network is the same as having the host sitting directly on the internet, you'll be fine.

                        That is the basic premise of the zero trust security model - assuming that the network is hostile.

                        Ding ding, exactly. It's a connectivity tool, not a security tool. The security has to be provided normally. Any ZT provided security, is purely extra.

                        Yes, and when it comes to security ZeroTier, as any other VPN, shows up as a virtual network adapter. So you can apply the OS' firewall like you could on any network adapter.

                        And the ZeroTier network itself also has some limited L2 rules to control the traffic, similar to a switch. It lacks tcp sessions and other things though so it's not like a real router/firewall.

                        There is also the possibility to connect ZeroTier to a compatible firewall and not the host directly.

                        I'm running OPNSense at home and have the plugin working and connected to a client's PC's from my house.

                        Works great.

                        1 Reply Last reply Reply Quote 1
                        • 1 / 1
                        • First post
                          Last post