-
Notifications
You must be signed in to change notification settings - Fork 156
Potential security flaw #116
Comments
Please check you have changed all the default passwords on your Minera system, there are at least 3 passwords to be changed before exposing it to the Internet:
After done that you can expose it to Internet but as precaution I'd change the default SSH config to not permit password access, allowing the access based only on SSH Key. (you can check something like this: http://www.cyberciti.biz/faq/how-to-set-up-ssh-keys-on-linux-unix/) |
All of these steps had been done prior to web exposure. Unless they scrubbed their tracks very well, only the web account appears to have been compromised. |
mmm, probably best try is to look at web server logs and minera ones. Could you find something bad? Without info is really hard for me understand what happened there. |
It would probably be better if you didn't store the password in plaintext in the database. |
Well, yes I could try to crypt it but understanding what's the problem could be helpful too. It's really strange they can get the password from the DB, I mean they probably could do that only accessing the controller by SSH, so probably there are a flaw before that. |
Just out of curiosity have you run Minera does not perform package updates. This is to me considered out of scope of a mining controller and comes under the scope of OS maintenance. |
I already had the same problem the second time. I had all 3 passwords changed all updates recorded, etc. But it is now for the second time happened that the same person has hacked my system. My Pi is also accessible via the Internet. How was it possible to search for it ?? It must be something've looked certain. He had a pool of selected works not even correct. I do not know me like this with Linux. Would it help if I provide the image? |
As far as I know there are 4 passwords that needs to be changed : usernames
address VqSPcvUXVc2tg9sFSKHS8kKGNNZXYTG5sx is on http://www.simplemulti.com/stats/VqSPcvUXVc2tg9sFSKHS8kKGNNZXYTG5sx database as a high fluctuating worker. that is something that needs to be adressed instantly I think. br 2014-12-04 13:47 GMT+01:00 ronakevolution notifications@github.com:
|
@ronakevolution if you can make an image from your hacked SD and tell me where to download it, that could be really helpful! If you can't, please look at logs and send me something (in PM please to "michele AT befree DOT it"):
|
I am currently running penetration tests against Minera to see if anything in the software is allowing this to happen. I won't claim that my box is unbreakable but the security is significantly greater on it than the average ubuntu machine. I have analyzed the system and there are no traces of a user having gained access to it. Also, the user identified above is the same user that changed my rig. |
You can stop investigating I just found the security holes on Minera. |
@danarmstrong I have pushed the fix in the developing branch (0de8c8a). I think I will release it on master branch within the next major release, I hope to do it next week. I'm going to warn forum users too. Thanks to point me there. |
Thank you for fixing this issue. I'm sure many people will rest easy knowing that a fix is coming soon. |
This is fixed by 0.4.0. |
I've had my minera system exposed to the internet for a while and over the last week I've noticed that my settings have been altered numerous times to point to a different pool with someone else's worker information. I changed the Minera password each time I noticed it and ran checks on my system security and Minera appears to be the only culprit. For the time being I have pulled it off of the internet and will see if I can find out how the breach is occurring.
The text was updated successfully, but these errors were encountered: