WikiPrint - from Polar Technologies

Needs attention:

Running the malware

Infrastructure security

Revisit the firewall rules on router to prevent leakage channels. Absolute minimum set of services should be allowed from testbed -> users/boss/etc.

Isolation from other experiments

Control net separation

Storage and Leakage

Primary goals are to allow vetted users to access the malware safely and prevent unauthorized users from gaining access.

Leakage of binaries

Some belt-and-suspenders support to prevent leakage is to export NFS shares read-only:

Storage

Where/how we store it depends on how large it is. Steve is looking into this.

Policy Issues

Miscellaneous

Updates will probably be done via HTTPS with a client certificate. This depends on the GA guys.

How will we annotate the experiment file to let the testbed know this needs special treatment (i.e., read-only mounts, copy encryption key/token to box)?