What about xen?Even if OpenVZ wasn't as transparent as it is, you are running your stuff on someone else's hardware - the host can pretty much do what they want (e.g. with KVM, they can just copy your disk and mount it, or read your RAM).
On XEN/KVM you could run CryptFS if you have a CPU that has AES features. A host could still dig through your memory to find your hashing key but that's going pretty HAM to get at your stuff.What about xen?
I do not think my hosts will have reason to do this but found it interesting and worrisome to as I did not know previously.
+1 to that., whenever we need to access a customers container we ask for written permission in the form of a ticket.
In short, yes - the vps provider can enter and view the 'content' of their client's vps's in most cases. OpenVZ is one that is far easier for the admins (or sadly, hackers how may break into the master node) to then jump in and view your data.I read that it is easy to enter vps without permission with openvz if you are the host. Is there anyway to stop this so they must ask first?
You should really read the horror stories more often.To be fair, I'm sure your host has better things to do then vzctl into your container
Wasn't this the same with ChrisK and Avante?You should really read the horror stories more often.
You have more than a few on WHT where admins start to browse peoples data for reasons to boot them.
The sz1 guy got busted going into someones container as well and was why the whole 'DDOS LE into the ground' war started.
Francisco
I'm not sure if he went into anyones server/etc, the only mix up i've seen with him was with the whole clamhost story.Wasn't this the same with ChrisK and Avante?
Or was that simply limited to Minecraft servers?
Ahh found one.I'm not sure if he went into anyones server/etc, the only mix up i've seen with him was with the whole clamhost story.
Francisco
I'll give him the 'young & dumb' benefit since the amount of complaints we hear these days is minimal and his companies keep on the right track.Ahh found one.
http://i.imgur.com/hhne2jz.jpg
http://i.imgur.com/D3WNY5w.jpg
Ehh that was 2012 though. Who knows.
Anyways, basically the summary of the topic is "lolno"
Fair enough, although if they are utilizing their time to pry open client'sYou should really read the horror stories more often.
You have more than a few on WHT where admins start to browse peoples data for reasons to boot them.
The sz1 guy got busted going into someones container as well and was why the whole 'DDOS LE into the ground' war started.
Francisco
This above all else. If you flip the coin and look at it from the providers point of view; what are you doing on/with your VM that makes you want to hide from me (the provider) so badly? Will the police be knocking on my door and at the DC's door simultaneously wanting to confiscate equipment?If you're having to find a way to keep a provider out of your hosted VM, then you should look into other providers who are trustworthy, or rethink your strategy (think dedicated servers).