Well, After long and hard thought on this (approximately 30 seconds), I have the following suggestion:
Each team account (could apply to accounts with just one machine as well) should have 2 passwords. A master password that could be used on the web pages to manage exponents on all team machines, and also a per-machine password (could be automatically generated when a new machine gets an exponent). There's really no reason I can think of why a password would be required to have a machine join a team, is there? I mean, someone could sign their machine up to some team and reserve a bunch of exponents with no intention of working on them, but hey, someone could do that anyway right now by just setting up their own team... So a team account "master password" could unreserved exponents on any machine, and then the "machine password" could be used to work with exponents for only that one machine. Well, at any rate, that would keep individual team members from wreaking havoc by this shared password scheme currently in place, while still allowing a team leader to unreserve exponents or do other things from the web page. Just a thought, and again, this is just my 30-second attempt to come up with an idea. I'm sure it can and will be improved upon. Aaron (aka "I'm-not-a-hacker-I'm-a-math-geek") > -----Original Message----- > From: [EMAIL PROTECTED] [mailto:mersenne-invalid- > [EMAIL PROTECTED]] On Behalf Of George Woltman > Sent: Tuesday, February 12, 2002 12:29 PM > To: [EMAIL PROTECTED] > Subject: Re: Mersenne: Missing assignement > > Hi all, > > At 08:10 PM 2/12/2002 +0100, Ignacio Larrosa Caņestro wrote: > >In my personal account report of yesterday could be read: > > > >Assignment overdue check-in is set at 60.0 days (0.0 days to expire) > >But now this exponent is missing. How is it possible?? > > OK, the cat is out of the bag..... > > In late January, one of the more productive teams was hacked. > Prime95/Primenet has some security holes. One of these holes > is that a team must make its password public for new members to join. > > Someone exploited this hole. This loser thought it would be "cute" to > unreserve all the team's exponents (a few hundred) via the manual web > pages. Brad & Scott patched the manual forms and embarked on > implementing a more permanent solution. A week ago, they struck again > using prime95 itself to again unreserve some of the team's exponents. > > Unfortunately, rather than hurting the team, the hacker ended up hurting > ordinary users. The server reassigned all the unreserved exponents. > Since the team's computers had a head start on these exponents they are > likely to finish them first. When they report a result, your assignment > will > "disappear" from the active assignments list. GIMPS, of course, can use > your result for double-checking. > > Brad/Scott have now changed server so that none of this team's exponents > can be unreserved. They are still working on making this feature > available > to all teams to prevent this in the future. > > Brad & Scott are better able to comment on this, but I think that this is > the first hacker attack on the reservation system. There have been many > denial of service attacks and attempts at defacing the web pages (don't > people have better things to do with their time?) > > Are there other security holes? Yes. For obvious reasons I don't know if > we should discuss these in a mailing list. Beefing up security costs time > and > money. These are limited resources in an all-volunteer, not-for-profit, > zero-revenue project. We'll try to do the best we can given our > limitations. > > Always remember.... > > GIMPS is just for fun, > George _________________________________________________________________________ Unsubscribe & list info -- http://www.ndatech.com/mersenne/signup.htm Mersenne Prime FAQ -- http://www.tasam.com/~lrwiman/FAQ-mers