Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
FlapYoJacks
Feb 12, 2009

https://twitter.com/bread_berries/status/1122286859680268289?s=21

Adbot
ADBOT LOVES YOU

FlapYoJacks
Feb 12, 2009

evilweasel posted:

telling you to make sure to run routine antivirus checks





on your samsung smart tv

You don't need to run antivirus if your TV isn't connected to the internet.

FlapYoJacks
Feb 12, 2009

BangersInMyKnickers posted:

how do you stop your tv from connecting to the internet when the wifi will automatically attach to any open ssid in range, which is a thing some of them do (samsung)

You can disable the wifi on their TV's I think. I have an LG TV and I just went to network -> wifi -> disable.

FlapYoJacks
Feb 12, 2009
:psyduck:

FlapYoJacks
Feb 12, 2009
https://twitter.com/mikko/status/1140597386835877888?s=21

FlapYoJacks
Feb 12, 2009
Lol holy poo poo.

https://nvd.nist.gov/vuln/detail/CVE-2019-12450

quote:

file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1 does not properly restrict file permissions while a copy operation is in progress. Instead, default permissions are used.

That's been there since 2007 and was just fixed a few weeks ago.

FlapYoJacks fucked around with this message at 22:45 on Jun 23, 2019

FlapYoJacks
Feb 12, 2009

mystes posted:


I just feel the need to point out that if you eliminated all patents you would have to fund pharma research directly but that wouldn't be a bad thing.

lmao we already do.

FlapYoJacks
Feb 12, 2009
Oh good; my new bank's online password system is hosed.

Passwords must be <= 15 characters long
Passwords cannot contain spaces or any of the following invalid characters: : * ! ; | / '

Guess who probably isn't sanitizing input and/or storing passwords in plain text or just MD5'ing them/and or both? :shepicide:

FlapYoJacks
Feb 12, 2009
I remember using links to get the Nvidia drivers for Slackware some 15 years ago. :allears:

FlapYoJacks
Feb 12, 2009
HOO loving BOY!

SADDLE UP BOYS! It's time for ~*~*SECURITY AUDIT*~*~ SEASON!

The company doing the audit? They want our AWS server private keys.

What the gently caress? Why do you ask?
Because they use Alienvault which needs a private key!
Fine I say, how about YOU generate a private key and give us your public key, then I can add you to the authorized_key's of our servers.
The result is the email chain so far:


Coworker 1 posted:

Hi Boss and Fuckhead,

Starting Friday, Nov 8, Coworker 1 is going to work on inserting the SSH Master key to all the instances and provide a progress status early next week.

Instead of us generating a private key and insecurely sending it to you, can you generate your key pair and send it to us the public one?
We will start inserting it as soon as next week.

Some dumb fuckhead posted:

Hi Coworker 1,

I'll get a key pair set up for you. We'll work on sending you the private key securely since MY COMPANY should manage the key per your
policies.
IT Security Advisory - Director of Security Operations

Some dumb fuckhead posted:

Hi Coworker 1,

Actually, You should generate the key. That way you can test that it works properly on the first host before you start rolling it out to
all your hosts. Please go ahead and generate your key pair and I will work with you on getting the private key to us securely. Thanks!

Some dumb fuckhead

coworker 1 posted:

Fuckhead and co,

I think unless I hand someone the generated private key on a USB drive, I'm not sure how I feel about the security of passing private
keys around... after all, isn't that like, security 101? "don't send private keys over anything that is even remotely untrusted?" ??

I'll be ssh-keygen'ing a test public/private key pair to do the testing anyway (and PPK is pretty venerable and there aren't any
pitfalls here), so we aren't going in blind. I just don't like passing a credential with access to literally the entire company's
assets over an undecided, possibly insecure channel that we don't control.

Can you amend your plan to assuage my paranoia, please? ??

Some dumb fuckhead posted:

Hi Coworker 1,

The simple way to send a private key securely, without a USB drive, is to zip the key up with a password and then you can upload to our
secure dropbox location where only approved personnel can upload/download. That's the way you currently transfer documents with
us. The password can be sent to us via text. That should satisfy the secure transportation of private key concerns.

Some dumb fuckhead

coworker 1 posted:

I'll proceed with the buildout, in the meantime, Boss, can you weigh in here?

Some dumb fuckhead posted:

Hi Coworker 1,

I've included Some dumb fuckhead 2 in this conversation. This should be short. You can work with Some dumb fuckhead 2 on installing the key credentials into AlienVault without the key having to leave MY COMPANIES network since he has access to Alienvault to set up the credentials.

MY BOSS posted:

Why is the Private Key being shared? Isn’t the whole point of the public-private key pair is to provide a key (the public one) that can
withstand being sent over insecure or untrusted channels….

Some dumb fuckhead posted:

Hi BossMan,


AlienVault needs credentials to be able to log into an AWS host so that it can perform an authenticated scan. This can be in the form of a password or an RSA private key. Once we enter the key I can't retrieve the key from Alienvault so it's a one time input.

I don't need to have the private key sent to me. We can open up a RingCentral meeting and someone could input it for me in the UI and
we'd be good to go or SDF2 could do it since he's done it before. Coworker 2 can also do it but I did not teach him how to create credentials yet.
Either way works for me.

coworker 1 posted:

Can Alienvault generate the private key and then export the public key? That would be the ideal method (and doesn't seem out of the
realm of possibility, because it's literally just running ssh-keygen). Who puts the key into the system is immaterial, private keys
should ideally not move. That's kind of a breach of how PPK is meant to be used.

If there's no correct way to do this thing with Alienvault, is there a more security-conscious way we can do your scan?

Some dumb fuckhead posted:

Hi Coworker 1,

The answer is no to AlienVault generating the key. The connection to AlienVault is over HTTPS so the connection will be secure. As for
inputting the key, by having a MY COMPANIES employee put in the key removes extra steps of having the key to be moved too far from home
base. To be honest, I'm not seeing why this is an issue considering the connection will be encrypted and a one-time entry without the chance
for retrieval. If you'd like I can set up a meeting with Coworker 2 and we can do this over a screen share while he's logged into AlienVault.

Coworker 1 posted:

Not seeing why sharing a private key is an issue is a very concerning statement to hear.

I didn't set up the encryption. I don't know if the HTTPS connection in question uses HSTS. Granted, the chance of the key being
compromised through these methods are low, but would you take the chance with the key to the entirety of the company assets? If you're
not so sure, then imagine it were the keys to your identity on the line. Wouldn't you want to use the tried and true method set forth
by the PPK scheme, instead of trying to wrap an inherently insecure process with layers of security instead?

In short - PPK provides a method to do what you're trying to do. This is not it. This is compromising our security to prove that we
are secure. I am no auditor, but I imagine if I went up to a security auditor and said 'we give private keys out,' I'd fail my
audit faster than a moped at a drag race.

BOSS/Coworker 2, if you give the go-ahead to go with this method, I'll abide by your decision, but I strongly advise against it.


me posted:

Also, not to sound uncouth, but I thought this might be a test.

If we give the keys, do we fail the audit immediately? I know if I were
the auditor, I probably would.

Some dumb fuckhead posted:

Not a test. We aren't auditors. We're on your side.

FlapYoJacks fucked around with this message at 00:58 on Nov 8, 2019

FlapYoJacks
Feb 12, 2009
I have now included my entire team in on this. It's fantastic.

Even better:

The same dumb fuckhead posted:

That's what I've been trying to explain to you all. Having you generate the key would remove a step from transferring it to me. Either way you will have to upload the private key to AlienVault. The account that you use the key on should just have sudo privileges so you can limit what parts of the system it has access to. I can send the public key to Coworker 1 if that will work.

FlapYoJacks
Feb 12, 2009
I responded with a not-so politically correct response:

me posted:

ssh-keygen is available on all major operating systems.

I highly suggest you generate a private/public keypair with that and then use the generate private key in the private key field.

After that, you can send us your public key that was generated and we can add it to our servers.

If you aren't able to do that, I would be more than happy to google the instructions and provide some links that show examples for whatever platform you are currently using.

Me

FlapYoJacks
Feb 12, 2009

CommieGIR posted:

This is the correct response. Its insane that they are asking you to transfer a private key around. Like, do they not understand why its called a private key?

I have no idea. They also asked for IAM admin access.

FlapYoJacks fucked around with this message at 01:09 on Nov 8, 2019

FlapYoJacks
Feb 12, 2009

mystes posted:

Honestly if they don't understand this part already and they're supposed to be doing a security audit you're hosed anyway.

They are so blindingly stupid I don't even know where to begin. At this point we are including the CTO so he can give his personal OK on this.

The other problem they don't seem to grasp is that every server has a different private key (because I'm not a god damned moron.) So either we give them 20+ private keys, or we change the private key on all of our servers to THE SAME PRIVATE KEY.

FlapYoJacks
Feb 12, 2009

MononcQc posted:

lmao get you an audit company that knows their poo poo, they have proven they're not competent enough to help you and whatever poo poo they run would be a liability

Audit companies are all poo poo. I haven't ran into a single one that is competent.

A year ago we were going to have an audit on a new product, so I purposefully put selinux in permissive mode just to see if they caught it. They did not.

When I asked them why, the "lead security expert" stammered for a bit and then said "The scanner doesn't scan for SELinux."

They are all so dumb and bad.

FlapYoJacks
Feb 12, 2009
So far this morning the Auditors have yet to respond back to us on the email chain. :allears:

FlapYoJacks
Feb 12, 2009

prisoner of waffles posted:

“this is so unreasonable we think you’re trying to get us to fail the audit by agreeing to it” is great and hilarious

It’s hilarious and also very true. I think they got upset at that.

FlapYoJacks
Feb 12, 2009
The conclusion is this: we were forced to create a user on each server of which we will dump their public key. Once the audit is done we will remove the user immediately along with their lovely key. And I do mean immediately. We will be logged into the server while the audit is being ran, and will be deleting the user IMMEDIATELY as soon as they are done.

FlapYoJacks
Feb 12, 2009

Cocoa Crispies posted:

SecFuck M/T v18.3.11 - “fail the audit by agreeing to it”

FlapYoJacks
Feb 12, 2009

refleks posted:

how many C-levels did you get to sign off on this poo poo so its not your rear end on the line

3

FlapYoJacks
Feb 12, 2009

The CEO, the CTO, and the CSIO

FlapYoJacks
Feb 12, 2009
The previous security audit said our embedded devices had to be encrypted. Auto decryption was just fine though. :v:

FlapYoJacks
Feb 12, 2009
Fun fact! I disabled SELinux on one of the servers just to see if these NEW auditors would pick up on it.

NOPE

FlapYoJacks
Feb 12, 2009
I will be asking them why they are incompetent in... not fireable offensive terms.

FlapYoJacks
Feb 12, 2009

Partycat posted:

My read out of this all is that they arent intended to audit security as an all encompassing dictionary definition thing.

Some groups are in depth enough they do better jobs than others instead of just scanning ports and fingerprinting but theres some complexity to the whole thing that.... well

if they werent meant to find it , as good as your intentions are setting traps for them may not look great.

lmao. Since when is checking for SELinux a "trap?"

FlapYoJacks
Feb 12, 2009

Partycat posted:

If they should be looking for it then they suck. It not then ...?

Of course they can never really tell you because youre supposed to fail first or they dont know. one of the two.

lol. Why wouldn't they be looking for it?

FlapYoJacks
Feb 12, 2009

Trabisnikof posted:

"because you don't get an audit to find security issues, you get an audit to pass it" - mgmt

I mean, it's not like one of the most common security issues for any CentOS/RHEL server ever that idiots disable SELinux just because it's slightly inconvenient or anything.

Can't check for it all!

FlapYoJacks
Feb 12, 2009

Blinkz0rz posted:

you're missing the point. why do you think you had an audit in the first place? i'll give you a hint: it doesn't have anything to do with anyone being concerned about security.

I'm well aware it's just for ISO compliance, even so, it's trash and they should feel bad.

FlapYoJacks
Feb 12, 2009

Plorkyeran posted:

the single use of strlen in the codebase is getting the length of a string literal as part of computing the size of a buffer which that string literal (and other things) will be copied into. strlen is the correct function to call for that.

It is not because it's not C++.

FlapYoJacks
Feb 12, 2009
https://arstechnica.com/information-technology/2020/01/researchers-find-serious-flaws-in-wordpress-plugins-used-on-400k-sites/

quote:

Researchers find serious flaws in WordPress plugins used on 400k sites

The highest-impact flaw is an authentication bypass vulnerability in the InfiniteWP Client, a plugin installed on more than 300,000 websites. It allows administrators to manage multiple websites from a single server. The flaw lets anyone log in to an administrative account with no credentials at all. From there, attackers can delete contents, add new accounts, and carry out a wide range of other malicious tasks.



That's a lol.

FlapYoJacks
Feb 12, 2009

Captain Foo posted:

You should have been ejected banned from the conference immediately

FlapYoJacks
Feb 12, 2009

Shaggar posted:

Microsoft authenticator is the only auth app anyone should use

Even better, Microsoft Authenticator is 100% compatible with the Google Authenticator.

FlapYoJacks
Feb 12, 2009

Shaggar posted:

goog auth is just totp which Microsoft auth supports but Microsoft auth also supports push which is superior.

I do like push. It's quite convenient.

FlapYoJacks
Feb 12, 2009

apseudonym posted:

Is your baseline here C++ or something?

Modern C++ is good op.

FlapYoJacks
Feb 12, 2009
Some green go-getter asked if we could install ssh on our ECUs. :allears:

FlapYoJacks
Feb 12, 2009
The thought of a brand new car ECU having ssh is just amazing to me.

FlapYoJacks
Feb 12, 2009
SECFUCK TIME!

I got emails from SpaceX! I am not employed by SpaceX, but I do work on Buildroot which SpaceX uses!

- My name and all of the other Buildroot developers have emails attached to many of the packages SpaceX is using.
- Their email scraper probably didn't filter out emails not ending in SpaceX
- All of the Buildroot maintainers/developers now have every engineer who is working on Starlinks email address lmao.

FlapYoJacks
Feb 12, 2009

mystes posted:

It's very weird that a car company that makes cars where the wheels are routinely misaligned, water leaks in the first time it rains, and random parts fall off the car can't get crypto right.

Actually it kind of is. Tesla is supposedly a software company that happens to produce cars. As such, their software should in theory be better than their manufacturing.

But this is Tesla lmao.

FlapYoJacks
Feb 12, 2009

haveblue posted:

what does TTP mean here?

"The TTP project" of course

Adbot
ADBOT LOVES YOU

FlapYoJacks
Feb 12, 2009
Buy an oem license from eBay for $10? The EU courts ruled they are legal afaik.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply