Mersenne: Preventing hacks

2002-02-12 Thread Aaron Blosser

Well,

After long and hard thought on this (approximately 30 seconds), I have
the following suggestion:

Each team account (could apply to accounts with just one machine as
well) should have 2 passwords.

A master password that could be used on the web pages to manage
exponents on all team machines, and also a per-machine password (could
be automatically generated when a new machine gets an exponent).

There's really no reason I can think of why a password would be required
to have a machine join a team, is there?  I mean, someone could sign
their machine up to some team and reserve a bunch of exponents with no
intention of working on them, but hey, someone could do that anyway
right now by just setting up their own team...

So a team account master password could unreserved exponents on any
machine, and then the machine password could be used to work with
exponents for only that one machine.

Well, at any rate, that would keep individual team members from wreaking
havoc by this shared password scheme currently in place, while still
allowing a team leader to unreserve exponents or do other things from
the web page.

Just a thought, and again, this is just my 30-second attempt to come up
with an idea.  I'm sure it can and will be improved upon.

Aaron (aka I'm-not-a-hacker-I'm-a-math-geek)

 -Original Message-
 From: [EMAIL PROTECTED]
[mailto:mersenne-invalid-
 [EMAIL PROTECTED]] On Behalf Of George Woltman
 Sent: Tuesday, February 12, 2002 12:29 PM
 To: [EMAIL PROTECTED]
 Subject: Re: Mersenne: Missing assignement
 
 Hi all,
 
 At 08:10 PM 2/12/2002 +0100, Ignacio Larrosa CaƱestro wrote:
 In my personal account report of yesterday could be read:
 
 Assignment overdue check-in is set at 60.0 days (0.0 days to expire)
 But now this exponent is missing. How is it possible??
 
 OK, the cat is out of the bag.
 
 In late January, one of the more productive teams was hacked.
 Prime95/Primenet has some security holes.  One of these holes
 is that a team must make its password public for new members to join.
 
 Someone exploited this hole.  This loser thought it would be cute to
 unreserve all the team's exponents (a few hundred) via the manual web
 pages.  Brad  Scott patched the manual forms and embarked on
 implementing a more permanent solution.  A week ago, they struck again
 using prime95 itself to again unreserve some of the team's exponents.
 
 Unfortunately, rather than hurting the team, the hacker ended up
hurting
 ordinary users.  The server reassigned all the unreserved exponents.
 Since the team's computers had a head start on these exponents they
are
 likely to finish them first.  When they report a result, your
assignment
 will
 disappear from the active assignments list.  GIMPS, of course, can
use
 your result for double-checking.
 
 Brad/Scott have now changed server so that none of this team's
exponents
 can be unreserved.  They are still working on making this feature
 available
 to all teams to prevent this in the future.
 
 Brad  Scott are better able to comment on this, but I think that this
is
 the first hacker attack on the reservation system.  There have been
many
 denial of service attacks and attempts at defacing the web pages
(don't
 people have better things to do with their time?)
 
 Are there other security holes?  Yes.  For obvious reasons I don't
know if
 we should discuss these in a mailing list.  Beefing up security costs
time
 and
 money.  These are limited resources in an all-volunteer,
not-for-profit,
 zero-revenue project.  We'll try to do the best we can given our
 limitations.
 
 Always remember
 
 GIMPS is just for fun,
 George

_
Unsubscribe  list info -- http://www.ndatech.com/mersenne/signup.htm
Mersenne Prime FAQ  -- http://www.tasam.com/~lrwiman/FAQ-mers



Re: Mersenne: Preventing hacks

2002-02-12 Thread bjb

On 12 Feb 2002, at 13:21, Aaron Blosser wrote:

 After long and hard thought on this (approximately 30 seconds), I have
 the following suggestion:
 
 Each team account (could apply to accounts with just one machine as
 well) should have 2 passwords.
 
 A master password that could be used on the web pages to manage
 exponents on all team machines, and also a per-machine password (could
 be automatically generated when a new machine gets an exponent).

That sort of works - but it's messy, and makes it hard for an 
individual team member to unreserve an exponent for some 
legitimate reason.

A better solution is to have every PrimeNet client identified in three 
ways: system id, user name  team name. Team name blank 
means the user is not a participant in any team. The password is 
associated with the user name, not the team. Now the user can do 
what the hell (s)he likes with his/her own assignments, but cannot 
bugger up assignments belonging to other team members.

A side effect of implementing this is that team members can desert 
(maybe joining a different team) even in the middle of an 
assignment, so team total CPU time could not be computed by 
simply adding the CPU time contributed by current members. 
Instead it would be neccessary to keep seperate running totals for 
each named team, adding the contribution from each completed 
assignment to whichever team the user is currently attatched to 
(instead of, or as well as, to the individual user?) as and when 
results are submitted.

  In late January, one of the more productive teams was hacked.
  Prime95/Primenet has some security holes.  One of these holes
  is that a team must make its password public for new members to join.
  
  Someone exploited this hole.  This loser thought it would be cute to
  unreserve all the team's exponents (a few hundred) via the manual web
  pages.  Brad  Scott patched the manual forms and embarked on
  implementing a more permanent solution.  A week ago, they struck again
  using prime95 itself to again unreserve some of the team's exponents.
  
  Unfortunately, rather than hurting the team, the hacker ended up
 hurting
  ordinary users.  The server reassigned all the unreserved exponents.
  Since the team's computers had a head start on these exponents they
 are
  likely to finish them first.  When they report a result, your
 assignment
  will
  disappear from the active assignments list.  GIMPS, of course, can
 use
  your result for double-checking.

So there's no loss at all, for LL assignments.
  
  Brad/Scott have now changed server so that none of this team's
 exponents
  can be unreserved.  They are still working on making this feature
  available
  to all teams to prevent this in the future.

As I pointed out above, there may be legitimate reasons for an 
individual team member to unreserve their own assignments.
  
  Brad  Scott are better able to comment on this, but I think that this
 is
  the first hacker attack on the reservation system.  There have been
 many
  denial of service attacks and attempts at defacing the web pages
 (don't
  people have better things to do with their time?)

I think _every_ web site sees attempts to do such things. Some 
morons apparently consider operational, undefaced web sites in 
the same way as graffiti artists see a blank wall. Expect also to 
see sustained probing to find any of the large number of known 
vulnerabilities in software and/or insecure misconfigurations 
common to various web servers.

Regards
Brian Beesley
_
Unsubscribe  list info -- http://www.ndatech.com/mersenne/signup.htm
Mersenne Prime FAQ  -- http://www.tasam.com/~lrwiman/FAQ-mers