if it were stolen?
if it were stolen?
I have a question, if my ZM server were stolen and then since he does not have any access to the ZM web page nor the linux login itself, is it possible that the thief take the hard disc out and then swap it to his server as slave secondary HD and then get all the events images out? can it be done?
thanks.
thanks.
-
- Posts: 5111
- Joined: Wed Jun 08, 2005 8:07 pm
- Location: Midlands UK
yep you must keep the machine secure, as a std install then images are stored and 'could' be retrived. Im sure you could encrypt it someway but if you have access to the machine its all defeatable
James Wilson
Disclaimer: The above is pure theory and may work on a good day with the wind behind it. etc etc.
http://www.securitywarehouse.co.uk
Disclaimer: The above is pure theory and may work on a good day with the wind behind it. etc etc.
http://www.securitywarehouse.co.uk
-
- Posts: 59
- Joined: Wed Nov 22, 2006 11:26 am
- Location: Bucks, UK
Re: if it were stolen?
As others have said, it can be done. I must admit, though, that my main concern with the Zoneminder system being stolen, is that i would lose the images recorded of the thief! To this end, there is an FTP filter that will automatically FTP events "off site", so that they can be viewed even if the main system goes missing.ynn wrote:can it be done?
I am not too worried that the thief might be able to see the images... what sort of things are you recording on your cameras that you wouldn't want anyone else to see???? You haven't set up an IR camera in the bedroom perchance?
-
- Posts: 6
- Joined: Wed Mar 24, 2010 1:51 pm
-
- Posts: 59
- Joined: Wed Nov 22, 2006 11:26 am
- Location: Bucks, UK
Like I mentioned, there is an FTP filter that will save all your images off to a remote location (which could just be an external NAS attached to your network in another location).
Or alternatively, you could install Zoneminder onto an external USB connected disk... and house that disk in this puppy.
http://www.sentrysafe.com/products/prod ... aspx?s=278
The USB disk sits inside the safe but is still powered and accessible to the remote server. The Safe can be bolted to the floor or wall, so the thief has to be quite committed to take your hard disk with him!
Or alternatively, you could install Zoneminder onto an external USB connected disk... and house that disk in this puppy.
http://www.sentrysafe.com/products/prod ... aspx?s=278
The USB disk sits inside the safe but is still powered and accessible to the remote server. The Safe can be bolted to the floor or wall, so the thief has to be quite committed to take your hard disk with him!
Also most theifs will boot up the pc looking for password and other stuff saved So this may be of interest also for prey to work you might also want to have a autologin user with minimal permission so they can go looking for password giving prey time to act.
http://preyproject.com/
Also small camera hiding behind a bay might be a nice idea too.
another simple idea is simple a cam above the pc that auto emails you. And attache the pc the the wall with a security lock.
http://preyproject.com/
Also small camera hiding behind a bay might be a nice idea too.
another simple idea is simple a cam above the pc that auto emails you. And attache the pc the the wall with a security lock.
One caution about requiring a password for an encrypted fs - if you do this, ensure your system and power are 100% stable. No point having cctv at all if the zm box is waiting at boot with a password prompt...
I think most thieves, when confronted with a linux server that prompts for a user/login will just fence it or try and install windows on it. Chance of them having the knowledge and determination to get it up and running is pretty small as they wouldn't really know what it does (unless you wrote CCTV server all over the case) - unless it's an inside job ofc. (My experience may be influenced by the poor quality of the thieving element in our locality, ymmv.)
gr8bytehuntr - yes, a remote disk hidden either locally or very far away is a very workable solution. The only caveat is that you need to do your bandwidth calcs very carefully as speed is going to be an issue with I/O on a busy server.
I think most thieves, when confronted with a linux server that prompts for a user/login will just fence it or try and install windows on it. Chance of them having the knowledge and determination to get it up and running is pretty small as they wouldn't really know what it does (unless you wrote CCTV server all over the case) - unless it's an inside job ofc. (My experience may be influenced by the poor quality of the thieving element in our locality, ymmv.)
gr8bytehuntr - yes, a remote disk hidden either locally or very far away is a very workable solution. The only caveat is that you need to do your bandwidth calcs very carefully as speed is going to be an issue with I/O on a busy server.
-
- Posts: 6
- Joined: Wed Mar 24, 2010 1:51 pm
-
- Posts: 10
- Joined: Sat Sep 23, 2017 5:05 am
Re: if it were stolen?
Use cloud storage. That way the thief would have to steal the entire cloud to take your footage.
-
- Posts: 113
- Joined: Tue Jul 27, 2010 6:36 am
Re: if it were stolen?
Using crypttab and fstab and a non-secure encryption key, the mounting of the encrypted drive can be fully automated. The thief would need to be more sophisticated to figure out what was going on to access the zoneminder data. If they boot up, they won't see it because they don't know the user logins and can't get access. If they mount it as a second drive, then it remains encrypted and they would have to figure out the fstab and cryptab stuff.
Keeping the non-secure encryption key on a different machine defeats the thieif's attempts to see the info. rc.local would be used to fetch the key (e.g.,, mount remote fs) and then mount the encrypted drive. fstab cannot be used to automate because fstab issues mount commands asynchronously at boot time. With fstab it cannot be assured that the remote file system is present before attempting to mount the encrypted drive. rc.local, on the otherhand, runs just before the run level changes such as run level 0 (booting) or 6 (rebooting) changing to multi or single user.
Keeping the non-secure encryption key on a different machine defeats the thieif's attempts to see the info. rc.local would be used to fetch the key (e.g.,, mount remote fs) and then mount the encrypted drive. fstab cannot be used to automate because fstab issues mount commands asynchronously at boot time. With fstab it cannot be assured that the remote file system is present before attempting to mount the encrypted drive. rc.local, on the otherhand, runs just before the run level changes such as run level 0 (booting) or 6 (rebooting) changing to multi or single user.
Re: if it were stolen?
I have a filter simply email me images to a gmail or other web account. Needs regular cleanup though.
But the other stuff about passwords and your privacy etc. Yeah that still sucks and something needs to mitigate.
But the other stuff about passwords and your privacy etc. Yeah that still sucks and something needs to mitigate.