🌨️ 💻
llama?
Can’t even get HL3 on an alternate timeline.
I need to compile my kernel… by hand with tools from beige-age computing.
Are you running redundant routers, connections, ISPs…etc? Compromise is part of the design process. If you have resiliency requirements redundancy will help, but it ratchets up complexity and cost.
Security has the same kinds of compromises. I prefer to build security from the network up, leveraging tools like VLANs to start building the moat. Realistically, your reverse proxy is likely battle tested if it’s configured correctly and updated. It’ll probably be the most secure component in your stack. If that’s configured correctly and gets popped, half the Internet is already a wasteland.
If you’re running containers, yeah technically there are escape vectors, but again your attacker would need to pop the proxy software. It’d probably be way easier to go after the apps themselves.
Do something like this with NICs on each subnet:
DMZ VLAN <-> Proxy <-> Services VLAN
Double NIC on the proxy. One in each VLAN.
One of my favorite CS memories was on LAN at quakecon.
1v10. The enemy team just killed 9 of us. I’m the last person up. Demolished them. A couple close moments, but caught almost everyone of them in 1v1s.
After I kill 10 people in a single fucking round, on LAN mind you, some prick on their team types “lucky” in all chat.
I was fucking furious.
So sure enough the very next round my team gets shit on. 1v10 again. I, again, wipe the fucking floor with them. 10 down.
I just stood up and screamed.
fix it again op