On 12 Feb 2002, at 13:21, Aaron Blosser wrote: > After long and hard thought on this (approximately 30 seconds), I have > the following suggestion: > > Each team account (could apply to accounts with just one machine as > well) should have 2 passwords. > > A master password that could be used on the web pages to manage > exponents on all team machines, and also a per-machine password (could > be automatically generated when a new machine gets an exponent).
That sort of works - but it's messy, and makes it hard for an individual team member to unreserve an exponent for some legitimate reason. A better solution is to have every PrimeNet client identified in three ways: system id, user name & team name. Team name blank means the user is not a participant in any team. The password is associated with the user name, not the team. Now the user can do what the hell (s)he likes with his/her own assignments, but cannot bugger up assignments belonging to other team members. A side effect of implementing this is that team members can desert (maybe joining a different team) even in the middle of an assignment, so team total CPU time could not be computed by simply adding the CPU time contributed by current members. Instead it would be neccessary to keep seperate running totals for each named team, adding the contribution from each completed assignment to whichever team the user is currently attatched to (instead of, or as well as, to the individual user?) as and when results are submitted. > > In late January, one of the more productive teams was hacked. > > Prime95/Primenet has some security holes. One of these holes > > is that a team must make its password public for new members to join. > > > > Someone exploited this hole. This loser thought it would be "cute" to > > unreserve all the team's exponents (a few hundred) via the manual web > > pages. Brad & Scott patched the manual forms and embarked on > > implementing a more permanent solution. A week ago, they struck again > > using prime95 itself to again unreserve some of the team's exponents. > > > > Unfortunately, rather than hurting the team, the hacker ended up > hurting > > ordinary users. The server reassigned all the unreserved exponents. > > Since the team's computers had a head start on these exponents they > are > > likely to finish them first. When they report a result, your > assignment > > will > > "disappear" from the active assignments list. GIMPS, of course, can > use > > your result for double-checking. So there's no loss at all, for LL assignments. > > > > Brad/Scott have now changed server so that none of this team's > exponents > > can be unreserved. They are still working on making this feature > > available > > to all teams to prevent this in the future. As I pointed out above, there may be legitimate reasons for an individual team member to unreserve their own assignments. > > > > Brad & Scott are better able to comment on this, but I think that this > is > > the first hacker attack on the reservation system. There have been > many > > denial of service attacks and attempts at defacing the web pages > (don't > > people have better things to do with their time?) I think _every_ web site sees attempts to do such things. Some morons apparently consider operational, undefaced web sites in the same way as graffiti artists see a blank wall. Expect also to see sustained probing to find any of the large number of known vulnerabilities in software and/or insecure misconfigurations common to various web servers. Regards Brian Beesley _________________________________________________________________________ Unsubscribe & list info -- http://www.ndatech.com/mersenne/signup.htm Mersenne Prime FAQ -- http://www.tasam.com/~lrwiman/FAQ-mers