Linode Forum
Linode Community Forums
 FAQFAQ    SearchSearch    MembersMembers      Register Register 
 LoginLogin [ Anonymous ] 
Post new topic  Reply to topic
Author Message
 Post subject:
PostPosted: Fri Mar 02, 2012 12:48 pm 
Offline
Newbie

Joined: Fri Apr 02, 2010 11:02 am
Posts: 4
OverlordQ wrote:
Guspaz wrote:
OverlordQ wrote:
compizjoe wrote:
I does sound like a simple case of slightly bad wording. They've informed people about exactly what has happened, and they did so quickly.


No they didn't, they put up a posting on status.linode.com. If there's a serious security breach, they should reach out to me, I shouldn't have to check that site every day to make sure somebody didn't hack in again.


According to their investigation, you were not affected by the breach; they did reach out to affected customers. As they say in that post.

Would you also expect to be notified when Billy Joe Bob's linode suffers from a host disk failure, even though you don't know him and don't have any linodes on his host?


No, because that doesn't affect me. The failure to protect critical management infrastructure does.


Exactly, spot on. I need full details on whether this has anything to do with Linode's control panel. I don't want a Vaserv scenario.


Top
   
 Post subject:
PostPosted: Fri Mar 02, 2012 1:29 pm 
Offline
Senior Newbie

Joined: Sat Apr 18, 2009 11:33 pm
Posts: 7
I agree with this. I would like to get this kind of notifications in the same way I get the notifications when I don't pay (i guess they have my email address)

I really love linode but I don't have a better place to go.

But what I really need is the removal of the root password change from the interface and api's.
If I lose it or forget it... Shame on me. Nobody should be able to change it...period.

We need to be sure that nobody can change that not even linode.
If I can do it from an interface then any will (authorize/unauthorized).


Top
   
 Post subject:
PostPosted: Fri Mar 02, 2012 1:40 pm 
Offline
Junior Member

Joined: Wed Jul 27, 2011 8:34 pm
Posts: 31
Website: http://eschercms.org
pic.micro23 wrote:
But what I really need is the removal of the root password change from the interface and api's.
If I lose it or forget it... Shame on me. Nobody should be able to change it...period.


I agree with this 100%.

_________________
Got Escher? | @artagesw


Top
   
 Post subject:
PostPosted: Fri Mar 02, 2012 2:28 pm 
Offline
Senior Member
User avatar

Joined: Sun Dec 27, 2009 11:12 pm
Posts: 1038
Location: Colorado, USA
This is why I store my coinbits in an old Canopic jar hidden behind the washer in the basement. Lets see Linode (authorized or not) find them there.


Top
   
 Post subject:
PostPosted: Fri Mar 02, 2012 6:01 pm 
Offline
Senior Newbie

Joined: Mon Aug 15, 2011 12:58 am
Posts: 10
zunzun wrote:
I think it is entirely appropriate - and in your case, necessary.


Really ? Wow. Personal attacks for simply being critical that loyal Linode customers should have been better notified about a major security incident that directly affects them.

This is officially the worst forum I've been to in years.


Top
   
 Post subject: Too busy to notice...
PostPosted: Fri Mar 02, 2012 6:37 pm 
Offline
Senior Member
User avatar

Joined: Tue Mar 17, 2009 5:11 am
Posts: 129
Location: UK
A few months ago a similar thing happened at Hetzner, and even though I wasn't directly affected, all customers were advised to change their passwords etc. as a precaution.

Just connecting a computer to the internet is a security risk.

If succesful hacking happens to the bods as NASA, then why do some people assume that Linode, or any other hoster is immune?


Top
   
 Post subject:
PostPosted: Fri Mar 02, 2012 7:30 pm 
Offline
Senior Member
User avatar

Joined: Tue Aug 17, 2004 11:37 pm
Posts: 262
Website: http://www.our-lan.com
WLM: nf@our-lan.com
Location: Brisbane, Australia
artagesw wrote:
pic.micro23 wrote:
But what I really need is the removal of the root password change from the interface and api's.
If I lose it or forget it... Shame on me. Nobody should be able to change it...period.


I agree with this 100%.


You understand that this is just a "nice" feature right? if someone has access to your linode manager account, they can just reboot the node into single user mode, open lish, reset the password and reboot.

Or boot into finnix and do the same thing.

Yes this feature makes it convenient and easier, but its not a security issue.

_________________
ServerAdmin - www.our-lan.com
"Diplomacy is the art of saying nice doggy whilst looking for a really big stick"
"In my experiece, any attempt to make any system idiot proof will only challenge God to make a better idiot"


Top
   
 Post subject:
PostPosted: Fri Mar 02, 2012 7:32 pm 
Offline
Newbie

Joined: Fri Mar 02, 2012 5:42 am
Posts: 3
taligent wrote:
zunzun wrote:
I think it is entirely appropriate - and in your case, necessary.


Really ? Wow. Personal attacks for simply being critical that loyal Linode customers should have been better notified about a major security incident that directly affects them.

This is officially the worst forum I've been to in years.


+1

Being rash is one thing, but attacking another person personally shouldn't be accepted (and definitely not endorsed!) by the Linode community. Making wild and potentially hurtful speculations about one's personal life or social status is unacceptable behavior (more so if all he did was demand being informed about security breaches that could easily have compromised his own Linodes.)


Top
   
 Post subject:
PostPosted: Fri Mar 02, 2012 8:12 pm 
Offline
Junior Member

Joined: Fri Apr 22, 2011 11:53 pm
Posts: 29
jk4736 wrote:
taligent wrote:
zunzun wrote:
I think it is entirely appropriate - and in your case, necessary.


Really ? Wow. Personal attacks for simply being critical that loyal Linode customers should have been better notified about a major security incident that directly affects them.

This is officially the worst forum I've been to in years.


+1

Being rash is one thing, but attacking another person personally shouldn't be accepted (and definitely not endorsed!) by the Linode community. Making wild and potentially hurtful speculations about one's personal life or social status is unacceptable behavior (more so if all he did was demand being informed about security breaches that could easily have compromised his own Linodes.)


Think of them as rabid apple fanboys. You attack the product, you get attacked.

In any case, what happened to Linode is SEVERE. I agree an email should have been sent out to ALL clients notifying us of the breach instead of those affected.

Why? It DOES affect ALL of us, not only the 8 that was breached. They had master root access, who knows what they could've done to the rest they didn't have time to dig through?


Top
   
 Post subject:
PostPosted: Fri Mar 02, 2012 8:18 pm 
Offline
Senior Member
User avatar

Joined: Tue Nov 24, 2009 1:59 pm
Posts: 362
They didn't have root access.
They had "support representative" access.
If your linode hasn't been rebooted, if your linode's root password hasn't been changed, you haven't been affected.

_________________
rsk, providing useless advice on the Internet since 2005.


Top
   
 Post subject:
PostPosted: Fri Mar 02, 2012 8:29 pm 
Offline
Junior Member

Joined: Fri Apr 22, 2011 11:53 pm
Posts: 29
rsk wrote:
They didn't have root access.
They had "support representative" access.
If your linode hasn't been rebooted, if your linode's root password hasn't been changed, you haven't been affected.


Hence, if they emailed us explaining in more detail what happened and what did not happen. We would be more informed and less likely to be upset.


Top
   
 Post subject:
PostPosted: Fri Mar 02, 2012 9:14 pm 
Offline
Senior Member

Joined: Fri Jan 20, 2012 11:19 am
Posts: 100
I think for such a critical issue, an email notification, even if only pointing to the official "Linode Status Updates" entry, would be in order.

I would much prefer to hear that my provider has had a security breach directly by email from the provider themselves. Or who knows, maybe we'll get that email after the audit has been done.

One also has to consider the unnecessary panic such an announcement might cause among customers.

_________________
If all else fails, reboot...
PHP Tutorials and MySQL Tutorials


Top
   
 Post subject:
PostPosted: Fri Mar 02, 2012 10:15 pm 
Offline
Senior Member
User avatar

Joined: Fri Jan 02, 2009 11:31 am
Posts: 141
Website: http://faroutscience.com
Location: Texas / Kansas
The Chinese have reportedly hacked the JPL. Everyone is vulnerable. I heard about the breech on Slashdot. That is ok, evidently the staff was already working on the situation.

I'm sure they will do as well as they have in the past.

fos


Top
   
 Post subject:
PostPosted: Fri Mar 02, 2012 10:19 pm 
Offline
Junior Member

Joined: Thu Mar 22, 2007 1:39 am
Posts: 23
rsk wrote:
They didn't have root access.
They had "support representative" access.
If your linode hasn't been rebooted, if your linode's root password hasn't been changed, you haven't been affected.


I love Linode. I really do. I've been a personal customer for many years. I no longer have my own Linode, but still manage about a dozen or so for clients.

I find the above statement confusing. How does 'support representative' access allow access to 8 unrelated accounts (ie - different account holders, different accounts, probably different datacenters), yet not allow access to all other accounts?

To me, and probably to others, if the intruder(s) can attack 8 independent Linodes, then they can attack them all.

Perhaps the Linode team can clarify this?

Also - rumor has it that it was an inside job. Was this the case?

I agree with the sentiment that more information on exactly what happened is needed.


Top
   
 Post subject:
PostPosted: Fri Mar 02, 2012 10:41 pm 
Offline
Senior Newbie

Joined: Fri Mar 02, 2012 8:53 am
Posts: 5
rainkid wrote:
I find the above statement confusing. How does 'support representative' access allow access to 8 unrelated accounts (ie - different account holders, different accounts, probably different datacenters), yet not allow access to all other accounts?

To me, and probably to others, if the intruder(s) can attack 8 independent Linodes, then they can attack them all.

Perhaps the Linode team can clarify this?

Also - rumor has it that it was an inside job. Was this the case?

I agree with the sentiment that more information on exactly what happened is needed.


As far as I can tell from the information given, normal support level login credentials were used. In other words, no exploit of any kind (Except the human kind) was used, which means they are able to see exactly who was affected through the logs. Yes, the person could in theory have attacked all the nodes, but he or she didn't. There's nothing that needs clarifying about this part specifically, there's no risk of repeat with the same credentials, and nobody else was affected or can be affected in the future as a result of this specific hack.

While a more comprehensive report certainly will be interesting to read, there's no more immediate information that Linode needs to give, the question you asked has already been answered by the official information given. (Or an answer is possible to infer easily).

As far as inside job goes, that would be interesting to know but ultimately doesn't matter that much right now. It's the kind of thing that will be interesting to read in a more comprehensive report of the incident.


Top
   
Display posts from previous:  Sort by  
Post new topic  Reply to topic


Who is online

Users browsing this forum: No registered users and 8 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum

Search for:
Jump to:  
RSS

Powered by phpBB® Forum Software © phpBB Group