Feeds

The policy that helped Anonymous hack AAPT

How vigilant is your host or public cloud provider?

Top three mobile application threats

Anonymous' theft of data from a dormant AAPT server might not have been possible had the telco used a different host.

AAPT has said the Cold Fusion server Anonymous accessed was, essentially, forgotten. In its un-patched state it was therefore easy meat.

One question the Anonymous incident therefore raises is just why the server was there at all. El Reg suspects that's been asked rather tersely within the halls of AAPT, and expects that the IT department there has probably not admitted that servers get lost all the time.

If you doubt that's a fact, consider the evergreen market for network discovery tools that scour a network and report back with a list of every piece of attached kit. Consider, too, the phenomenon of virtual machine sprawl, which raises its head when IT departments summon oodles of virtual machines into existence and then forget them.

Lost servers on a LAN aren't a big deal. But the Anonymous/AAPT incident shows hosted servers rather raise the stakes.

Which is why we decided to ask several hosting and cloud providers what they do when they see an orphaned server. Telstra, Optus and AWS have not responded to those queries.

But Melbourne IT, where AAPT's server resided, has, explaining its stance as follows:

In Melbourne IT’s hosting environment there are either active servers or decommissioned servers. Customers use their servers for different purposes, whether they be production environments, testing environments or disaster recovery services. Some servers could be kept on standby by customers for business continuity or for changing project demands; others exist for regulatory compliance where data needs to be stored for a certain number of years.

How customers decide to use their servers can change from month to month or year to year. How often the content on those servers is updated, or what content is stored on those servers, is at the customer’s discretion. Given such a wide range of usage by our customers, the concept of a ‘dormant server’ does not exist.

Therefore all active servers are treated as active unless we have received notice from the customer to decommission the service (or Melbourne IT decommissions the server due to a breach of contract by the customer). Decommissioned servers are removed from the active server pool and the data is erased.

In other words, if you forget about a server hosted at Melbourne IT and keep paying for it, the company will run it forever.

That's a contrast to the policy at Macquarie Telecom's public cloud outfit Ninefold, where Chairman and Co-Founder Peter James told us a rather different regime operates.

“If no activity has taken place for three calendar months, we contact the customer prior to the third month to indicate there has been no activity and that account closure is pending,” he wrote. “Then, at the customer’s request, their account is open or closed.”

Given the near-inevitability of the occasional absent-minded server loss, it therefore seems that being a customer of an outfit with a policy like Ninefold's is probably preferable to working with the kind of policies in place at Melbourne IT. ®

High performance access to file storage

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Inside the Hekaton: SQL Server 2014's database engine deconstructed
Nadella's database sqares the circle of cheap memory vs speed
BOFH: Oh DO tell us what you think. *CLICK*
$%%&amp Oh dear, we've been cut *CLICK* Well hello *CLICK* You're breaking up...
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.