Tessian wrote:Sine: You're wrong. VPNs are IN NO WAY OS specific! That's just flat out wrong. SSH is to RDP if you really want to make a comparison, SSH is not to VPN. Are SSH tunnels and SSL VPN tunnels similar? Very. But VPNs are a lot more better protected, flexible, and powerful than SSH is alone.
I didn't say that it was OS-specific, but that it was generally done that way, since SSH is more of a text-based protocol. Sure, at my work, I VPN to the network and then SSH into the box. But, that's because I'm on a Windows laptop going into a network that has lots of Windows servers, and SSH just doesn't work as well.
However, a lot of college networks are old-school UNIX with dumb terminals that hit an X server, or command-line based utilities on various servers. They don't need a VPN at all. Everything can be managed with SSH alone. It doesn't make it any less secure.
Tessian wrote:Nobody EVER said you use a DMZ model to hide security holes; any company with a semi-competent security program regularly scans for and patches vulnerabilities both internally and externally. The reason FOR a DMZ is that IF that server gets compromised at least it's still restricted to what it can reach on the internal network.
Ummm...if somebody gets into your VPN, they are in your network. Yes, they need to get the IPs, UN/PWs, etc., but there could be weak or common passwords in the system and you can still do a lot of damage just being in the network itself. (Sniffing, spamming, DoS, etc.)
Tessian wrote:If one of your 100 servers on the internet gets compromised your internal network is fucked. If all your internet systems are inside a DMZ that is properly ACLed then you are at a much lower risk. As I said: IT'S ALL ABOUT RISK. What's less risky and easier to maintain? 1 VPN server on the internet, or 100 servers on the internet? You have to keep them all secure and patched yes, but the risk of exposure and compromise is much less.
See? You said what I thought you'd say. "What's easier to maintain"? None of your servers should be any different than the rest, in terms of how and when you patch them. If all of the SSH servers are on the latest version, and the passwords are secure, there's no problem.
Tessian wrote:It's whole purpose is to provide a secure gateway into your network and is MUCH more hardened than any normal Unix server. The only way to compromise a VPN is to either a) attack a vulnerability in its transport mechanism such as middle-manning the SSL connection, or b) having a crappy VPN admin who didn't properly secure it.
How the hell is this different than SSH? Your a and b pretty much sums up the only ways to compromise a SSH daemon. You think they didn't think about making "Secure SHell" secure? VPN is a SSL tunnel into the network, and SSH is a SSL tunnel to a server shell. It's about the same fucking difference!
Tessian wrote:Most of this is moot, however, because if your company handles credit card transactions (and I can assume that an ISP would do this) then you MUST be certified by PCI-DSS. PCI is the set of 12 security controls that the credit card industry has said you MUST adhere to in order to do business with them.
Heh, I knew you would bring that up. Yeah, I'm pretty familiar with PCI myself. We went through some network reorganization for that a year or so ago. (Our mail servers and some web servers needed to be DMZed.)
Look, I'm not saying that a DMZed network isn't secure. I'm just saying that SSH is not some glass protocol that somebody can bang lightly to break in. A properly managed network of servers on SSH can be just as secure as a DMZed network.