243
submitted 10 months ago by floofloof@lemmy.ca to c/technology@lemmy.ml
all 47 comments
sorted by: hot top controversial new old
[-] Moonrise2473@feddit.it 124 points 10 months ago

What's the point of primary and secondary backups if they can be accessed with the same credentials on the same network

[-] CrateDane@feddit.dk 16 points 10 months ago

They weren't normally on the same network, but were accidentally put on the same network during migration.

[-] snaptastic@beehaw.org 7 points 10 months ago

What’s the correct way to implement it so that it can still be automated? Credentials that can write new backups but not delete existing ones?

[-] Haui@discuss.tchncs.de 30 points 10 months ago

I don’t know if it is the „correct“ way but I do it the other way around. I have a server and a backup server. Server user can‘t even see backup server but packs a backup, backup server pulls the data with read only access, main server deletes backup, done.

[-] VerifiablyMrWonka@kbin.social 14 points 10 months ago

For an organisation hosting as many companies data as this one I'd expect automated tape at a minimum. Of course, if the attacker had the time to start messing with the tape that's lost as well but it's unlikely.

[-] Moonrise2473@feddit.it 3 points 10 months ago

It depends what's the pricing. For example ovh didn't keep any extra backup when their datacenter took fire. But if a customer paid for backup, it was kept off-site and was recovered

It might be even pretending to be a big hosting company when they're actually renting a dozen deds from a big player, much cheaper than maintaining a data center with 99.999% uptime

[-] rentar42@kbin.social 7 points 10 months ago

Fundamentally there's no need for the user/account that saves the backup somewhere to be able to read let alone change/delete it.

So ideally you have "write-only" credentials that can only append/add new files.

How exactly that is implemented depends on the tech. S3 and S3 compatible systems can often be configured that data straight up can't be deleted from a bucket at all.

[-] IWantToFuckSpez@kbin.social 6 points 10 months ago* (last edited 10 months ago)

A tape library that uses a robot arm https://youtu.be/sYgnCWOVysY?t=30s

Backups that are not connected to any device are not susceptible to being overwritten and encrypted by malware.

[-] reflex@kbin.social 3 points 10 months ago* (last edited 10 months ago)

A tape library that uses a robot arm
https://youtu.be/sYgnCWOVysY?t=30s

Or like that vault in Rogue One?

[-] PipedLinkBot@feddit.rocks 0 points 10 months ago

Here is an alternative Piped link(s): https://piped.video/sYgnCWOVysY?t=30s

https://piped.video/sYgnCWOVysY?t=30s

https://piped.video/1RUWtaOzVPg

Piped is a privacy-respecting open-source alternative frontend to YouTube.

I'm open-source, check me out at GitHub.

[-] PipedLinkBot@feddit.rocks 1 points 10 months ago

Here is an alternative Piped link(s): https://piped.video/sYgnCWOVysY

https://piped.video/sYgnCWOVysY

Piped is a privacy-respecting open-source alternative frontend to YouTube.

I'm open-source, check me out at GitHub.

[-] Moonrise2473@feddit.it 1 points 10 months ago

i use immutable objects on backblaze b2

from command line using their tool is something like b2 sync SOURCE BUCKET

and from the bucket setting disable object deletion

also borgbase allows this, backups can be created but deletions/overwrites are not permanent (unless you enabled them)

[-] hunt4peas@lemmy.ml 62 points 10 months ago

Time and time again, data hosting providers are proving that local backups not connected to the internet are way better than storing in the cloud.

[-] hardypart@feddit.de 39 points 10 months ago

The 3-2-1 backup strategy: "Three copies are made of the data to be protected, the copies are stored on two different types of storage media and one copy of the data is sent off site."

[-] theshatterstone54@feddit.uk 9 points 10 months ago

How would that work in practice? 1 medium offsite, and 2 mediums on-premises?

[-] hardypart@feddit.de 3 points 10 months ago
[-] humancrayon@sh.itjust.works 2 points 10 months ago

This is the way.

[-] IWantToFuckSpez@kbin.social 12 points 10 months ago* (last edited 10 months ago)

Any redundant backup strategy uses both. They both have inherent data loss risks. Local backups are great, but unless you store them in a bunker they are still at risk to fire, theft, vandalism and natural disasters. A good backup strategy stores copies in at least three locations. Local, off-site and the cloud. Off-site backups are backups you can physically retrieve. Like tapes stored in a vault in another city.

[-] MaxPower@feddit.de 33 points 10 months ago* (last edited 10 months ago)

Now that you mention fucking incompetence, I need to verify my 3-2-1 backup strategy is correctly implemented. Thanks for the reminder, CloudNordic and AzeroCloud!

[-] Ecstatic_equilibrium@kbin.social 24 points 10 months ago
[-] Hamartiogonic@sopuli.xyz 13 points 10 months ago

People literally pay these guys to not screw up this one thing.

[-] IonAddis@lemmy.world 23 points 10 months ago

Danish hosting firms CloudNordic and AzeroCloud have suffered ransomware attacks, causing the loss of the majority of customer data and forcing the hosting providers to shut down all systems, including websites, email, and customer sites.

[-] zacher_glachl@lemmy.world 21 points 10 months ago

Other people's computers. Never forget.

[-] digdilem@lemmy.ml 15 points 10 months ago

I feel really bad for everyone involved - customers and staff. The human cost in this is huge.

Yes, there's a lot of criticism of backup strategies here, but I bet most of us who deal with this professionally have knowledge of systems that would also be vulnerable to malicious attack, and that's only the shortcomings we know about. Audits and pentesting are great, but not infallable and one tiny mistake can expose everything. If we were all as good as we think we are, ransomware wouldn't be a thing.

[-] snailtrail@lemmy.world 5 points 10 months ago

I think that people generally overestimate how much money tech companies like this one actually make. Their profits are tiny. A lot of the time, tech companies run on investment money, and can't actually turn a profit. They wait for the big acquisition or IPO payday. So if you think you're actually gonna get 100k off them, good luck. Sometimes they're barely keeping the lights on.

[-] Treczoks@kbin.social 10 points 10 months ago

Put all the data in the cloud, they said. It will all be save and handled by professionals!

[-] chris@l.roofo.cc 8 points 10 months ago

That's what you call an epic blunder.

[-] President_Pyrus@feddit.dk 7 points 10 months ago

It is a company destroying blunder.

[-] exu@feditown.com 6 points 10 months ago

I think they're aware of that

Martin Haslund Johansson, the director of Azerocloud and CloudNordic, stated that he does not expect customers to be left with them when the recovery is finally completed.

[-] Moonrise2473@feddit.it 10 points 10 months ago

The customers are already lost:

  1. pay the expensive ransom, if the bad actor gives them the decryption key, customers are relieved but still pissed, will take the data and move to somewhere else with a big FO. Go out of business.

  2. don't pay the ransom, customers are pissed and move to somewhere else with a big FO. Go out of business.

[-] Fizz@lemmy.nz 7 points 10 months ago

If you fuck up that badly you shouldn't be allowed to operate in that industry.

[-] papalonian@kbin.social 8 points 10 months ago

Problem is that you have to work in the industry to fuck up that badly.

[-] CrateDane@feddit.dk 6 points 10 months ago

They're a small company, they'll probably just go bankrupt.

[-] DeprecatedCompatV2@programming.dev 1 points 9 months ago

I wonder why they can't/won't pay.

this post was submitted on 24 Aug 2023
243 points (99.6% liked)

Technology

33707 readers
118 users here now

This is the official technology community of Lemmy.ml for all news related to creation and use of technology, and to facilitate civil, meaningful discussion around it.


Ask in DM before posting product reviews or ads. All such posts otherwise are subject to removal.


Rules:

1: All Lemmy rules apply

2: Do not post low effort posts

3: NEVER post naziped*gore stuff

4: Always post article URLs or their archived version URLs as sources, NOT screenshots. Help the blind users.

5: personal rants of Big Tech CEOs like Elon Musk are unwelcome (does not include posts about their companies affecting wide range of people)

6: no advertisement posts unless verified as legitimate and non-exploitative/non-consumerist

7: crypto related posts, unless essential, are disallowed

founded 5 years ago
MODERATORS