Re: news from my hacked box

2020-04-10 Thread Rudolf Leitgeb
> Yes could be, he has a "social engineering" approach to people. He places 
> people and
> himself on the same level of machines. Then he searches vulnerability on 
> persons.
> He makes extensive use of corruption to take advantage on his personal war. 
> From this
> point of view also a vpn provider could be very vulnerable because as many 
> people know
> vpn providers are not big rich companies.

You would use a VPN to escape the claws of your own government, but not the 
claws of
some corrupt individual in your country. Therefore I see no reason, why you 
would use
a VPN, and its required software to use it would just increase your attack 
surface.

> About authorities it would be my next step when I'll find proofs of what I'm 
> saying.
> Because as you saw the first thing they think it will be "this guy is 
> paranoid".

That's the great benefit of virtual machines with snap shoting: unless the 
"evil hackers"
can not only control your running system, but can also break through the 
boundaries set
by your virtual machine, you have reasonable ways to collect evidence. Just 
create snaps
whenever your system feels strange, and you can inspect these snapshots at a 
later, more
convenient moment. You can also perform comparisons between snap shots.

> Yes I thought to try to use vm on linux, but you know the linux kernel is 
> hole with some
> code around.

Yes, they say all kinds of nasty stuff about linux, but overall it works well, 
and the
vast majority of public facing servers run linux.

Your best bet will probably be some kind of variety of systems: linux, windows, 
freebsd,
maybe throw some openbsd into the pool. if "evil hackers" have to check your 
system first,
and probably throw some non-working exploits at it before breaking through, 
then you have
a good chance of catching them in the act. make your setup as unpredictable as 
you can,
and "they" will leave undeniable traces.

Once you have these traces, you can probably learn more about the hacker's 
methods and
develop a strategy to get rid of them for good.

PS: It would probably attract more helpful talent here, if people had reason to 
assume,
that your efforts serve some common goal and are not some private quest for 
free security
consulting. Care to share, why you think your computers are under attack?



Re: news from my hacked box

2020-04-09 Thread Cord


> > change target. Then a victim that describe a situation outside of this 
> > schema most
> > probably will be classified as a paranoid or a troll.
>
> Do you have reason to believe, that this evil person has control over your 
> hardware
> deliveries? Do you have some procurement process in place, which guarantees, 
> that this
> person can not intercept and xompromise such a shipment? To which extent 
> would you
> trust authorities to protect you?
>

Yes could be, he has a "social engineering" approach to people. He places 
people and himself on the same
level of machines. Then he searches vulnerability on persons. He makes 
extensive use of corruption
to take advantage on his personal war. From this point of view also a vpn 
provider could be
very vulnerable because as many people know vpn providers are not big rich 
companies.
Also often they operate in a grey area where users are hackers, p2p downloader
and so on. Then if someone offer them something like $5000 to log the traffic 
of someone
most probably they accept. From this point of view "security" is a word with a 
really
wide meaning.
And in addition to this he uses the typical techniques of social engineering to 
manipulate
people. I use the word "he" but it's clear that is an organization.
But now we are off topic.
About authorities it would be my next step when I'll find proofs of what I'm 
saying.
Because as you saw the first thing they think it will be "this guy is paranoid".
Or they'll tell me: "of course! you have to clean cookies and cache on your 
edge!"


> Once this is done: what is your attack surface? What are the applications 
> facing the
> big bad internet?

I haven't server, I just use chrome+unveil, ping, sometimes speedtest-cli.
I think I can exclude all the usb device as media infection. I don't know if
the dhclient could have some bug... what remain is the vpn decryption with 
aes256 and
a 4096 key and decrypt https. I also tried without success wireguard as vpn 
software
with chacha20 as algorithm that someone say to be more robust/fast than 
aes256gcm.
I think we can exclude decrypt openvpn/wireguard but I'm not so skilled to be 
sure.
What remain is also something installed in some chip with the firmware.
And yes, of course I run openvpn as root.


Do you have to run public facing services? Is there a way to restrict
> the level of "public"? DO you have to run applications which connect to 
> random servers
> on the internet? Have you thought about running these in a virtual machine 
> with snap
> shoting enabled, which allows you to return to a known safe state?

Yes I thought to try to use vm on linux, but you know the linux kernel is hole 
with some code around.
As I know the openbsd vmm doesn't support graphic, isn'it ?




Re: news from my hacked box

2020-04-08 Thread Rudolf Leitgeb
> yes exactly, I know who is the attacker and he has really great of resources 
> and power.
> Most probably he is responsible of the death of a guy in my country.
> Many people have preconceived ideas about security and about the attackers.
> Many people think that an hacker is pushed by money or some kind of interest 
> and
> attack just people that he doesn't know. If the attacker fail with a target 
> he just
> change target. Then a victim that describe a situation outside of this schema 
> most
> probably will be classified as a paranoid or a troll.

Do you have reason to believe, that this evil person has control over your 
hardware
deliveries? Do you have some procurement process in place, which guarantees, 
that this
person can not intercept and xompromise such a shipment? To which extent would 
you
trust authorities to protect you?

Once this is done: what is your attack surface? What are the applications 
facing the
big bad internet? Do you have to run public facing services? Is there a way to 
restrict
the level of "public"? DO you have to run applications which connect to random 
servers
on the internet? Have you thought about running these in a virtual machine with 
snap
shoting enabled, which allows you to return to a known safe state?



Re: news from my hacked box

2020-04-08 Thread Cord


> "Cord" claims, that people with great resources are out there to get his boxes
> hacked. Obviously I can not verify his claim.
>
yes exactly, I know who is the attacker and he has really great of resources 
and power.
Most probably he is responsible of the death of a guy in my country.
Many people have preconceived ideas about security and about the attackers.
Many people think that an hacker is pushed by money or some kind of interest and
attack just people that he doesn't know. If the attacker fail with a target he 
just change
target. Then a victim that describe a situation outside of this schema most 
probably will be
classified as a paranoid or a troll.
But the truth is pretty different, an attacker could be anyone that has enough 
resources and can
be pushed by many reasons, hate, jealousy or other. The attacker could be 
someone that
doesn't know anything about security but he has enough money to pay someone. 
The complexity
of the attack depends of how much money he has and of the target.







Re: news from my hacked box

2020-04-08 Thread Cord
> security, like OpenBSD works on. Anyone that says anything can be hacked 
> without
> qualification, loses any respect from me, atleast for that moment. Even 
> browsers

"qualification" is very relative word... there are perfect unknown around 
internet
that are high qualified guys.

>
> To the OP. I apologise if you are not but to me I thought you are/were a 
> Troll.
> If not then I would consider what you posted from the point of view of a 
> Vulcan.

Someone should consider the idea of create a pattern to recognize a troll.
And I don't understand you say that my post looks from Vulcan.. also what have 
done
the NSA looks come from Vulcan but certainly it's true.

> Did you even consider pxeboot as a vector, if installing from a cafe? HW bios
> defaults are often atrocious, unlike OpenBSD defaults!

I'm very skeptic about pxe because is disabled on my bios and also the attacker 
couldn't
predict the cafe where I'd go. I chosen the cafe randomly in a big city.

> p.s. A web browser that is rarely exploitable is perfectly possible. It would
> require some breaking re-design and likely removal if not severe limitations 
> on
> js, for a start though. I'm guessing wasm will not go the right way to fix js.
> Perhaps infosec could chime in on improving was but then they would be hurting
> their own income streams!! Annoying!

Now I'm running an iso from a usb stick and it seems ok but the most thing I 
miss on openbsd is
tool or documentation for forensics analysis. For example now  I could mount
the disk and make some checking on the kernel, if there are something that it 
should not
stay there, or "alien" (from Vulcan) kernel module installed. I think also 
would be very useful some
driver to dump the ram and analyze it from tools like volatily.
It seems that something is moving for freebsd:
https://github.com/volatilityfoundation/volatility/blob/freebsd_support/FreeBSD-Support-README.md
I think this depends of the idea that openbsd is absolutely secure and it's 
like a peripheral
firewall that defend only the perimeter of a net. Then because openbsd is 
unbeatable then there aren't
any forensic instruments. My idea is that secure means also check the integrity 
of what is installed.





Re: news from my hacked box

2020-04-08 Thread Kevin Chadwick
On 2020-04-08 18:02, Rudolf Leitgeb wrote:
> A public facing server with ftp, http, smtp and sshd would have had to be 
> patched
> in regular intervals to remain reasonably secure.

False, even though you have lowered the bar from "anything/everything is 
hackable".

httpd and libressl have done quite well despite talking over http to anyone and
dealing with crappy interfaces like ASN.1 for TLS.

You missed the point. If your interface requires authentication first, like ssh
then that is good, it has a good record.

If your interface requires auth in a simple format and is a very simple
interface after that fact. Then you will find examples of devices and services
that have never been hacked, even without the layers of defence of sshd, though
you are free to have some of them!

ergo the mantra of anything is hackable is bullshit, largely spread by pen
testers and fuzzers. There isn't much to fuzz when auth of a simple key is
required up front.

Most hacks occur by inside users not remote and that is a whole other matter but
that does not mean that anything is hackable. "everything is hackable" is FUD



Re: news from my hacked box

2020-04-08 Thread Rudolf Leitgeb
> OpenSMTPD does not listen to the internet, by default and even if you do set 
> it
> to, it only affected certain configurations.

A server, which does not listen to the outside is pretty useless, don't
you think? I did not bring up opensmtp, because it is particularly bad,
quite to the contrary: even in very hardened systems bugs happen. You can
patch these bugs and have a reasonable secure system, but it's an ongoing
effort, not something you do just once.

> How the heck sshd has such as good security record, considering all that it
> does, interface wise, is rather astounding. I guess a remotely critical bug 
> may
> be found there one day, but it does not affect my point!

sshd has a good security record on openbsd, but even with sshd there were
problems on other platforms, not caused by the core sshd or the openbsd team,
but nonetheless a real issue.

Closely related to openssh was openssl, which had a gaping hole that became
known just a few years ago. I was not so much shocked about the fact, that
there was a security hole in openssl, but how really stupid and unnecessary
this whole issue was, what a stupid feature actually caused this bug to be
deployed on so many platforms.


Again, this is nothing specific to OpenBSD, but let's not delude outselves,
that one can rollout some server and leave it as it is for years to come.


> If your project, like most could; has made sane design choices for simple
> interfaces then it certainly can be made very secure, remotely unhackable is
> easier than you think for a modest project.

A public facing server with ftp, http, smtp and sshd would have had to be 
patched
in regular intervals to remain reasonably secure. Add a content management 
service
to this configuration, and these "regular intervals" turn into very frequent
occurrances. This is valid for low profile stuff, though. If you are something
high profile, like a bank, it's a constant and ongoing effort to deal with 
hackers
of all flavors.

Cheers,

Rudi



Re: news from my hacked box

2020-04-08 Thread Kevin Chadwick
On 2020-04-08 12:08, Rudolf Leitgeb wrote:
>> I believe that is false too.
> You're kidding, yes? Did you somehow miss the opensmtp hole?
> 
> https://poolp.org/posts/2020-01-30/opensmtpd-advisory-dissected/

OpenSMTPD does not listen to the internet, by default and even if you do set it
to, it only affected certain configurations.

Is it hard to write a secure mail server, sure. Look at exims bugs.

If your project, like most could; has made sane design choices for simple
interfaces then it certainly can be made very secure, remotely unhackable is
easier than you think for a modest project. You cannot take the easy road 
though.

How the heck sshd has such as good security record, considering all that it
does, interface wise, is rather astounding. I guess a remotely critical bug may
be found there one day, but it does not affect my point!



Re: news from my hacked box

2020-04-08 Thread Rudolf Leitgeb
> True if you consider physical attacks and for most hardware, otherwise mostly
> false. Anything can be hacked is also one of my biggest annoyances as a mantra
> from "infosec", that gets more money than it deserves in comparison to real
> security, like OpenBSD works on.

We know from Snowden, that supply chain attacks are a common thing. If someone
can modify the hardware sent to certain people on your list, then operating
system security is no longer the most pressing concern.

"Cord" claims, that people with great resources are out there to get his boxes
hacked. Obviously I can not verify his claim.

And I stand by my statement: ordering a computer and setting it up with a secure
operating system is insufficient to maintain control over your server.

I do concur with your assessment, that 99% of concerned people are way to
unimportant to attract any government attacks. These 99% certainly include me.
Attacking a server always comes with a risk of discovery, therefore I do not
believe, that these agencies conduct mass hacks of random servers.

> > Even OpenBSD had a remote root hole just a few weeks ago.

> I believe that is false too.

You're kidding, yes? Did you somehow miss the opensmtp hole?

https://poolp.org/posts/2020-01-30/opensmtpd-advisory-dissected/

Cheers,

Rudi




Re: news from my hacked box

2020-04-08 Thread Kevin Chadwick
On 2020-04-07 18:21, Rudolf Leitgeb wrote:
> You have no chance defending your desktop against each and every attacker, no 
> matter
> which operating system you have running. 

True if you consider physical attacks and for most hardware, otherwise mostly
false. Anything can be hacked is also one of my biggest annoyances as a mantra
from "infosec", that gets more money than it deserves in comparison to real
security, like OpenBSD works on. Anyone that says anything can be hacked without
qualification, loses any respect from me, atleast for that moment. Even browsers
take some skill/time to hack and a modern browser is anakin to putting the Death
Star exhaust port in the hangar of a Mon Calamari Cruiser.

Even OpenBSD had a remote root hole just
> a few weeks ago.

I believe that is false too.

To the OP. I apologise if you are not but to me I thought you are/were a Troll.
If not then I would consider what you posted from the point of view of a Vulcan.

Did you even consider pxeboot as a vector, if installing from a cafe? HW bios
defaults are often atrocious, unlike OpenBSD defaults!

p.s. A web browser that is rarely exploitable is perfectly possible. It would
require some breaking re-design and likely removal if not severe limitations on
js, for a start though. I'm guessing wasm will not go the right way to fix js.
Perhaps infosec could chime in on improving was but then they would be hurting
their own income streams!! Annoying!



Re: news from my hacked box

2020-04-07 Thread Rudolf Leitgeb
> I understand you perfectly but there are some points I want highlight:
> Then there is a huge number of hacked site and hackaed desktop out there. 
> Many people
> didn't know that their pc or phone is not under their control anymore.
> The new frontier of hacking is espionage. None want be discovered.

Hacking for espionage is not exactly a new trend.

> 2) Sometime the old schema to pull out evidence of hacking are not valid 
> anymore.
> For example if you are Edward Snowden all that little and subjective things 
> that are not
> important for a common person become very important because the context is 
> very
> different.

You have no chance defending your desktop against each and every attacker, no 
matter
which operating system you have running. Even OpenBSD had a remote root hole 
just
a few weeks ago. Even if your operating system is impeccable, the code running 
on
your mother board and your network card is probably anything but. It's no 
wonder,
that professional services still rely on air gaps to protect their most valuable
assets against compromise.

Note: professional crypto services deploy their algos on dedicated hardware, 
not on
random personal computer systems. Low security means, that stuff runs on an 
FPGA,
high security stuff runs on discrete logic.

Going to a professional crypto outfit still doesn't buy you much, if that crypto
outfit turns out to be owned and controlled by a government agency.

To make a long story short: there is no such thing as a system, which is secure 
out
of the box. If you think, that your system is actively exploited, revert it 
back to
a known, secure state, wait for the exploit to hit you again, and have a network
sniffer ready to figure out, how the exploit works.

PS: Since you referred to Edward Snowden: the exploits published by him and 
later
by wikileaks were not really breathtakingly innovative. Do not expect to find a
completely new attack procedure in your investigation, whatever turns up.

PPS: Like others, I have seen quite a few computer systems with "evil viruses", 
that
turned out to have faulty memory or a failing hard disk. I expect you ran a 
complete
offline check of your hardware before you started suspecting foul play. Yes?



Re: news from my hacked box

2020-04-05 Thread Cord


>
> "Theo de Raadt" dera...@openbsd.org wrote:
>
> > Cord openbs...@protonmail.com wrote:
> >
> > > You are free to believe or not to believe, but you are not free to insult 
> > > me.
> > > Is that clear ?
> >
> > Or what.. you'll throw your tinfoil hat at them?
>
> Haven't you yet been diagnosed w/ ODD? :)
>
> Cord: you're prolly being overly paranoid, and your assertions are
> somewhat vague. Many people here have trouble dealing w/ that, me
> included. Thus: please excuse us if we cannot give you the answers
> you seek. What mecan say is that some of the problems you
> identified are a natural consequence of the unreliability of IP.
>

I understand you perfectly but there are some points I want highlight:
1) the old times of webdeface or hackers that want show the insecurity of 
software or website are past.
today the vast majority of hacking world is submerged. None want leave trace or 
leave evidences.
Then there is a huge number of hacked site and hackaed desktop out there. Many 
people didn't know that their pc or phone is not under their control anymore.
The new frontier of hacking is espionage. None want be discovered.

2) Sometime the old schema to pull out evidence of hacking are not valid 
anymore.
For example if you are Edward Snowden all that little and subjective things 
that are not important for a common person become very important because the 
context is very different.
If you are an important entrepreneur and you see that the projects you're 
working and that are in your pc now are exactly the same that are producting 
your competitor,  then you become very suspicious. If this happens many times 
you're  absolutely sure that your projects were been exfiltrated from your pc. 
BUT THERE ARE NOT EVIDENCES. And for privacy reason you don't want explain 
yourself and you become vague. Of course those are just examples. Now, in my 
opinion, because you (not you, but who reply to email like mine) don't know who 
I am and you can't contextualize, the best choice you have is just reply the 
best way you can. Without judgement. If you don't know, you don't reply.

3) Today security is a huge business, times are very changed. If someone find a 
remote kernel bug in openbsd what does he do ? Does He write a message to  
dera...@openbsd.org or run away to sell it in the dark web for $50,000 ? If 
someone find a remote bug in the linux kernel, does he send an email to the 
full disclosure mailing list or sell it to any government espionage agency ?
Times are changed, many bug are still there, you don't know and many people 
have huge interests to not discover it.
The same concept is valid also for new vector attack, new exploiting technique, 
new hiding technology, new code manipulation and so on. Money and power means 
do not disclosure, keep it secret.


> No reason to be a jerk, though.
>

Without a doubt

> HTH,
>




Re: news from my hacked box

2020-04-05 Thread Cord



> Cord openbs...@protonmail.com wrote:
>
> > You are free to believe or not to believe, but you are not free to insult 
> > me.
> > Is that clear ?
>
> Or what.. you'll throw your tinfoil hat at them?

of course, my hat is deadly!



Re: news from my hacked box

2020-04-05 Thread Cord
> > I found something that in my opinion are nearly evidences.
>
> What exactly are trying to prove here?
>
> > For those who doesn't know my story please read past messages:
> > https://marc.info/?a=15535526152=1=2
>
> I think I know you from before. You're the guy claiming to be hacked
> over and over again, right?
>

I'm the guy you find at the link, I'm not other guy. I use only this email for 
the openbsd misc ml.


> > Well, as I said previously my laptop was been hacked then I bought a new 
> > laptop because my suspicious are that the uefi or other firmware was been 
> > hacked (I reinstalled openbsd various
> > iwm0 with vpn download: 0,46 mbit/s upload: 0,55 mbit/s
> > iwm0 without vpn download: 0,50 mbit/s upload: 2,53 mbit/s
> > urtwn0 with vpn download: 20,88 mbit/s upload: 8,49 mbit/s
> > urtwn0: without vpn download: 24,83 mbit/s upload 9,27 mbit/s
>
> What exactly is strange here? Two different cards behave differently.
>

The bandwidth of 0,50 mbit is not normal. I have one router and I'm the only 
user.
Then or the driver is crap (I don't think so) or the card is broken (I tried a 
live linux and it works well) or there some configuration that limit the 
bandwidth.

> > iwm0: round-trip min/avg/max/std-dev = 18.761/6372.615/72372.495/14987.007 
> > ms
> > urtwn0: round-trip min/avg/max/std-dev = 24.068/36.489/878.218/48.120 ms
>
> The thing I find funny is that you insist on being spied on or somehow
> hacked, you act tin-foil paranoid to the point of changing your laptop
> because of some unexplained behavior, yet you use Speedtest.net and
> CloudFlare DNS. Are you trolling or delusional?
>

The thing I find funny is that in world full to the brim of vulnerabilities, 
the NSA that intercept entire country,
vulnerability on the bios/uefi,
and rootkit (this video is five years old 
https://www.youtube.com/watch?v=sNYsfUNegEA and this one that is a firmware 
worm that infect thunderbolt device which infect and other laptop 
https://www.youtube.com/watch?v=Jsdqom01XzY)
or  nic firmware rootkit (https://cryptome.org/2014/02/nic-ssh-rootkit.htm),
vulnerability on cpu, or on the GSM protocols 
(https://www.youtube.com/watch?v=-wu_pO5Z7Pk) ,
openbsd developer paid to insert backdoor on ipsec stack 
(https://lwn.net/Articles/419865/),
vendor, like apple, that pay until $1 milion for a remote kernel exploit, 
government that make cyber warfare and spies whitehouse candidate,
Encryption algorithm that are bugged since 1995 and are removed only in 2015 
(https://en.wikipedia.org/wiki/RC4#Security)
and so on.. I can continue
And you say I'm paranoid ?
LOL I say you are living in some kind of fantasy world!
enjoy https://www.youtube.com/watch?v=1i8XVQ2pswg



> > As I know the traffic shaping is configured by pf with pf.conf, the 
> > following is my pf.conf (I'm sorry I'm not a genius of pf):
> > ---/etc/pf.conf
> > if="urtwn0"
> > #if="iwm0"
om
> > block drop in on ! lo0 proto tcp to port 6000:6010
> > block drop out log proto {tcp udp} user _pbuild
> > block log quick on $if
> >
>
> Neither am I, but aren't there supposed to be some rules that pass
> traffic inbound to your interface?
>

LOL

> > Other strange things that happens on my laptop are the following:
> >
> > 1.  sometimes my openvpn (2 times on 5) fail authentication even I use a 
> > saved file authentication data and pass it the data with --auth-user-pass 
> > /my/path/pass
> > Then in my opinion it's impossible fails the authentication.
> >
>
> Not really. OpenVPN is a temperamental piece of software that doesn't
> like firewalls very much. In edge cases, it likes to fail, especially if
> you use UDP
>

I don't use UDP

> > 2.  sometimes KeePassXC fails authentication on random site. If I copy the 
> > password and paste it by hand it works.
>
> Both autotype and browser plugins are dependent on so many different
> technologies to work like they should. Like before, it's easy for things
> to go wrong in edge cases.
>

never happens in recent 10 years.

> > 3.  and of course there are people that can spy me and modify suggested 
> > videos on youtube. Please do not comment this because I know it's very 
> > subjective.
>
> Same as before. Tinfoil hat paranoia yet you still use YouTube?
>

What is tinfoil ? and what's wrong in youtube ?


> > As I said previously in my opinion there is 0day on how is implemented the 
> > tcp/ip stack in the kernel.
> > And the vulnerability can be exploited by a mitm attack from the home 
> > router.
> > Thank you Cord.
>
> And the proof is where? You are providing sparse information, impossible
> PF configuration files, and anecdotal "evidence" that can be easily
> attributed to user error. Instead of trying to explore how programs
> you're using work, you blame OpenBSD. The only thing you make evident is
> your lack of analytical approach to problem solving and ignorance of the
> mailing list rules. Where is dmesg output? What HW are you using? What
> browser? What router?
>
> Please take 

Re: news from my hacked box

2020-04-03 Thread Henri Järvinen
On Thu, Apr 02, 2020 at 10:26:36PM +0200, Kristjan Komlosi wrote:
> The thing I find funny is that you insist on being spied on or somehow
> hacked, you act tin-foil paranoid to the point of changing your laptop
> because of some unexplained behavior, yet you use Speedtest.net and
> CloudFlare DNS. Are you trolling or delusional?

Looks like a troll and a longer he get fed, the longer he keeps going.

-- 
Henri Järvinen



Re: news from my hacked box

2020-04-02 Thread Kristjan Komlosi



On 4/1/20 10:25 PM, Cord wrote:
> Hi,
> I found something that in my opinion are nearly evidences.
What exactly are trying to prove here?

> For those who doesn't know my story please read past messages:
> https://marc.info/?a=15535526152=1=2
I think I know you from before. You're the guy claiming to be hacked
over and over again, right?

> Well, as I said previously my laptop was been hacked then I bought a new 
> laptop because my suspicious are that the uefi or other firmware was been 
> hacked (I reinstalled openbsd various times)
> The old laptop had a wifi usb dongle to connect to the wifi router.
> Now the new laptop has a wifi chip that works properly on opnebsd.
> The inner IF is iwm0.
> And I discovered differences on wifi performance between the on board IF and 
> the old usb dongle.
> Of course the tests were been made from exactly the same physical place.
> The following are the results (I used speedtest-cli):
> iwm0 with vpn download: 0,46 mbit/s upload: 0,55 mbit/s
> iwm0 without vpn download: 0,50 mbit/s upload: 2,53 mbit/s
> urtwn0 with vpn download: 20,88 mbit/s upload: 8,49 mbit/s
> urtwn0: without vpn download: 24,83 mbit/s upload 9,27 mbit/s
What exactly is strange here? Two different cards behave differently.

> The following are the results pinging 8.8.8.8 with -c 500:
> 500 packets transmitted, 500 packets received, 0.0% packet loss
> iwm0: round-trip min/avg/max/std-dev = 18.761/6372.615/72372.495/14987.007 ms
> urtwn0: round-trip min/avg/max/std-dev = 24.068/36.489/878.218/48.120 ms
> 
The thing I find funny is that you insist on being spied on or somehow
hacked, you act tin-foil paranoid to the point of changing your laptop
because of some unexplained behavior, yet you use Speedtest.net and
CloudFlare DNS. Are you trolling or delusional?

> As I know the traffic shaping is configured by pf with pf.conf, the following 
> is my pf.conf (I'm sorry I'm not a genius of pf):
> ---/etc/pf.conf
> if="urtwn0"
> #if="iwm0"
> dns="{8.8.8.8}"
> myvpn="{x.x.x.x, x.x.x.x, x.x.x.x, x.x.x.x, x.x.x.x}"
> weird="{239.255.255.250, 224.0.0.1}"
> pany="{udp, tcp}"
> set skip on tun0
> set skip on lo
> set block-policy drop
> set loginterface $if
> block quick inet6
> block quick on $if from any to $weird
> pass quick proto icmp
> pass out quick on $if proto $pany from $if to $dns
> pass out quick on $if proto udp from $if to $myvpn
> pass out quick on $if proto tcp from $if to my01-other-vpn.com
> pass out quick on $if proto tcp from $if to my02-other-vpn.com
> pass out quick on $if proto tcp from $if to my03-other-vpn.com
> block drop in on ! lo0 proto tcp to port 6000:6010
> block drop out log proto {tcp udp} user _pbuild
> block log quick on $if
> --
Neither am I, but aren't there supposed to be some rules that pass
traffic inbound to your interface?

> Other strange things that happens on my laptop are the following:
> 1) sometimes my openvpn (2 times on 5) fail authentication even I use a saved 
> file authentication data and pass it the data with --auth-user-pass 
> /my/path/pass
> Then in my opinion it's impossible fails the authentication.
Not really. OpenVPN is a temperamental piece of software that doesn't
like firewalls very much. In edge cases, it likes to fail, especially if
you use UDP.

> 2) sometimes KeePassXC fails authentication on random site. If I copy the 
> password and paste it by hand it works.
Both autotype and browser plugins are dependent on so many different
technologies to work like they should. Like before, it's easy for things
to go wrong in edge cases.

> 3) and of course there are people that can spy me and modify suggested videos 
> on youtube. Please do not comment this because I know it's very subjective.
Same as before. Tinfoil hat paranoia yet you still use YouTube?

> 
> As I said previously in my opinion there is 0day on how is implemented the 
> tcp/ip stack in the kernel.
> And the vulnerability can be exploited by a mitm attack from the home router.
> Thank you Cord.

And the proof is where? You are providing sparse information, impossible
PF configuration files, and anecdotal "evidence" that can be easily
attributed to user error. Instead of trying to explore how programs
you're using work, you blame OpenBSD. The only thing you make evident is
your lack of analytical approach to problem solving and ignorance of the
mailing list rules. Where is dmesg output? What HW are you using? What
browser? What router?

Please take the list seriously or go away.



RE: news from my hacked box

2020-04-02 Thread zeurkous
Haai,

"Theo de Raadt"  wrote:
> Cord  wrote:
>
>> You are free to believe or not to believe, but you are not free to insult me.
>> Is that clear ?
>
> Or what.. you'll throw your tinfoil hat at them?

Haven't you yet been diagnosed w/ ODD? :)

Cord: you're prolly being overly paranoid, and your assertions are
  somewhat vague. Many people here have trouble dealing w/ that, me
  included. Thus: please excuse us if we cannot give you the answers
  you seek. What mecan say is that some of the problems you
  identified are a natural consequence of the unreliability of IP.

No reason to be a jerk, though.

HTH,
 
 --zeurkous.

-- 
Friggin' Machines!



Re: news from my hacked box

2020-04-02 Thread Cord
You are free to believe or not to believe, but you are not free to insult me.
Is that clear ?


Sent with ProtonMail Secure Email.

‐‐‐ Original Message ‐‐‐
On Thursday 2 April 2020 03:01, Anders Andersson  wrote:

> On Wed, Apr 1, 2020 at 10:29 PM Cord openbs...@protonmail.com wrote:
>
> > Hi,
> > I found something that in my opinion are nearly evidences.
> > For those who doesn't know my story please read past messages:
> > https://marc.info/?a=15535526152=1=2
> > Well, as I said previously my laptop was been hacked then I bought a new 
> > laptop because my suspicious are that the uefi or other firmware was been 
> > hacked (I reinstalled openbsd various times)
> > The old laptop had a wifi usb dongle to connect to the wifi router.
> > Now the new laptop has a wifi chip that works properly on opnebsd.
> > The inner IF is iwm0.
> > And I discovered differences on wifi performance between the on board IF 
> > and the old usb dongle.
> > Of course the tests were been made from exactly the same physical place.
> > The following are the results (I used speedtest-cli):
> > iwm0 with vpn download: 0,46 mbit/s upload: 0,55 mbit/s
> > iwm0 without vpn download: 0,50 mbit/s upload: 2,53 mbit/s
> > urtwn0 with vpn download: 20,88 mbit/s upload: 8,49 mbit/s
> > urtwn0: without vpn download: 24,83 mbit/s upload 9,27 mbit/s
> > The following are the results pinging 8.8.8.8 with -c 500:
> > 500 packets transmitted, 500 packets received, 0.0% packet loss
> > iwm0: round-trip min/avg/max/std-dev = 18.761/6372.615/72372.495/14987.007 
> > ms
> > urtwn0: round-trip min/avg/max/std-dev = 24.068/36.489/878.218/48.120 ms
> >
> > As I know the traffic shaping is configured by pf with pf.conf, the 
> > following is my pf.conf (I'm sorry I'm not a genius of pf):
> > ---/etc/pf.conf
> > if="urtwn0"
> > #if="iwm0"
> > dns="{8.8.8.8}"
> > myvpn="{x.x.x.x, x.x.x.x, x.x.x.x, x.x.x.x, x.x.x.x}"
> > weird="{239.255.255.250, 224.0.0.1}"
> > pany="{udp, tcp}"
> > set skip on tun0
> > set skip on lo
> > set block-policy drop
> > set loginterface $if
> > block quick inet6
> > block quick on $if from any to $weird
> > pass quick proto icmp
> > pass out quick on $if proto $pany from $if to $dns
> > pass out quick on $if proto udp from $if to $myvpn
> > pass out quick on $if proto tcp from $if to my01-other-vpn.com
> > pass out quick on $if proto tcp from $if to my02-other-vpn.com
> > pass out quick on $if proto tcp from $if to my03-other-vpn.com
> > block drop in on ! lo0 proto tcp to port 6000:6010
> > block drop out log proto {tcp udp} user _pbuild
> > block log quick on $if
> >
> > --
> >
> > Other strange things that happens on my laptop are the following:
> >
> > 1.  sometimes my openvpn (2 times on 5) fail authentication even I use a 
> > saved file authentication data and pass it the data with --auth-user-pass 
> > /my/path/pass
> > Then in my opinion it's impossible fails the authentication.
> >
> > 2.  sometimes KeePassXC fails authentication on random site. If I copy the 
> > password and paste it by hand it works.
> > 3.  and of course there are people that can spy me and modify suggested 
> > videos on youtube. Please do not comment this because I know it's very 
> > subjective.
> >
> > As I said previously in my opinion there is 0day on how is implemented the 
> > tcp/ip stack in the kernel.
> > And the vulnerability can be exploited by a mitm attack from the home 
> > router.
> > Thank you Cord.
>
> Hello Cord, and thank you for the interesting messages.
>
> Just a thought: Do you have any wall paintings, and have you noticed
> something different about them since you got hacked?
>
> You see, I once talked to a man at the local library who was looking
> for literature about computer viruses and he mentioned that the virus
> had somehow spread out from the USB ports in his computer onto his
> paintings, which had now become dull and grey. His family told him
> that he was imagining things and refused to help him, that's why he
> was at the library to search for information.
>
> If your computer has been hacked, maybe it is by the same virus.
>
> Kind regards,
> 

Re: news from my hacked box

2020-04-02 Thread Theo de Raadt
Cord  wrote:

> You are free to believe or not to believe, but you are not free to insult me.
> Is that clear ?

Or what.. you'll throw your tinfoil hat at them?



Re: news from my hacked box

2020-04-01 Thread Anders Andersson
On Wed, Apr 1, 2020 at 10:29 PM Cord  wrote:
>
> Hi,
> I found something that in my opinion are nearly evidences.
> For those who doesn't know my story please read past messages:
> https://marc.info/?a=15535526152=1=2
> Well, as I said previously my laptop was been hacked then I bought a new 
> laptop because my suspicious are that the uefi or other firmware was been 
> hacked (I reinstalled openbsd various times)
> The old laptop had a wifi usb dongle to connect to the wifi router.
> Now the new laptop has a wifi chip that works properly on opnebsd.
> The inner IF is iwm0.
> And I discovered differences on wifi performance between the on board IF and 
> the old usb dongle.
> Of course the tests were been made from exactly the same physical place.
> The following are the results (I used speedtest-cli):
> iwm0 with vpn download: 0,46 mbit/s upload: 0,55 mbit/s
> iwm0 without vpn download: 0,50 mbit/s upload: 2,53 mbit/s
> urtwn0 with vpn download: 20,88 mbit/s upload: 8,49 mbit/s
> urtwn0: without vpn download: 24,83 mbit/s upload 9,27 mbit/s
>
> The following are the results pinging 8.8.8.8 with -c 500:
> 500 packets transmitted, 500 packets received, 0.0% packet loss
> iwm0: round-trip min/avg/max/std-dev = 18.761/6372.615/72372.495/14987.007 ms
> urtwn0: round-trip min/avg/max/std-dev = 24.068/36.489/878.218/48.120 ms
>
> As I know the traffic shaping is configured by pf with pf.conf, the following 
> is my pf.conf (I'm sorry I'm not a genius of pf):
> ---/etc/pf.conf
> if="urtwn0"
> #if="iwm0"
> dns="{8.8.8.8}"
> myvpn="{x.x.x.x, x.x.x.x, x.x.x.x, x.x.x.x, x.x.x.x}"
> weird="{239.255.255.250, 224.0.0.1}"
> pany="{udp, tcp}"
> set skip on tun0
> set skip on lo
> set block-policy drop
> set loginterface $if
> block quick inet6
> block quick on $if from any to $weird
> pass quick proto icmp
> pass out quick on $if proto $pany from $if to $dns
> pass out quick on $if proto udp from $if to $myvpn
> pass out quick on $if proto tcp from $if to my01-other-vpn.com
> pass out quick on $if proto tcp from $if to my02-other-vpn.com
> pass out quick on $if proto tcp from $if to my03-other-vpn.com
> block drop in on ! lo0 proto tcp to port 6000:6010
> block drop out log proto {tcp udp} user _pbuild
> block log quick on $if
> --
>
> Other strange things that happens on my laptop are the following:
> 1) sometimes my openvpn (2 times on 5) fail authentication even I use a saved 
> file authentication data and pass it the data with --auth-user-pass 
> /my/path/pass
> Then in my opinion it's impossible fails the authentication.
> 2) sometimes KeePassXC fails authentication on random site. If I copy the 
> password and paste it by hand it works.
> 3) and of course there are people that can spy me and modify suggested videos 
> on youtube. Please do not comment this because I know it's very subjective.
>
> As I said previously in my opinion there is 0day on how is implemented the 
> tcp/ip stack in the kernel.
> And the vulnerability can be exploited by a mitm attack from the home router.
> Thank you Cord.

Hello Cord, and thank you for the interesting messages.

Just a thought: Do you have any wall paintings, and have you noticed
something different about them since you got hacked?

You see, I once talked to a man at the local library who was looking
for literature about computer viruses and he mentioned that the virus
had somehow spread out from the USB ports in his computer onto his
paintings, which had now become dull and grey. His family told him
that he was imagining things and refused to help him, that's why he
was at the library to search for information.

If your computer has been hacked, maybe it is by the same virus.

Kind regards,
Anders



news from my hacked box

2020-04-01 Thread Cord
Hi,
I found something that in my opinion are nearly evidences.
For those who doesn't know my story please read past messages:
https://marc.info/?a=15535526152=1=2
Well, as I said previously my laptop was been hacked then I bought a new laptop 
because my suspicious are that the uefi or other firmware was been hacked (I 
reinstalled openbsd various times)
The old laptop had a wifi usb dongle to connect to the wifi router.
Now the new laptop has a wifi chip that works properly on opnebsd.
The inner IF is iwm0.
And I discovered differences on wifi performance between the on board IF and 
the old usb dongle.
Of course the tests were been made from exactly the same physical place.
The following are the results (I used speedtest-cli):
iwm0 with vpn download: 0,46 mbit/s upload: 0,55 mbit/s
iwm0 without vpn download: 0,50 mbit/s upload: 2,53 mbit/s
urtwn0 with vpn download: 20,88 mbit/s upload: 8,49 mbit/s
urtwn0: without vpn download: 24,83 mbit/s upload 9,27 mbit/s

The following are the results pinging 8.8.8.8 with -c 500:
500 packets transmitted, 500 packets received, 0.0% packet loss
iwm0: round-trip min/avg/max/std-dev = 18.761/6372.615/72372.495/14987.007 ms
urtwn0: round-trip min/avg/max/std-dev = 24.068/36.489/878.218/48.120 ms

As I know the traffic shaping is configured by pf with pf.conf, the following 
is my pf.conf (I'm sorry I'm not a genius of pf):
---/etc/pf.conf
if="urtwn0"
#if="iwm0"
dns="{8.8.8.8}"
myvpn="{x.x.x.x, x.x.x.x, x.x.x.x, x.x.x.x, x.x.x.x}"
weird="{239.255.255.250, 224.0.0.1}"
pany="{udp, tcp}"
set skip on tun0
set skip on lo
set block-policy drop
set loginterface $if
block quick inet6
block quick on $if from any to $weird
pass quick proto icmp
pass out quick on $if proto $pany from $if to $dns
pass out quick on $if proto udp from $if to $myvpn
pass out quick on $if proto tcp from $if to my01-other-vpn.com
pass out quick on $if proto tcp from $if to my02-other-vpn.com
pass out quick on $if proto tcp from $if to my03-other-vpn.com
block drop in on ! lo0 proto tcp to port 6000:6010
block drop out log proto {tcp udp} user _pbuild
block log quick on $if
--

Other strange things that happens on my laptop are the following:
1) sometimes my openvpn (2 times on 5) fail authentication even I use a saved 
file authentication data and pass it the data with --auth-user-pass 
/my/path/pass
Then in my opinion it's impossible fails the authentication.
2) sometimes KeePassXC fails authentication on random site. If I copy the 
password and paste it by hand it works.
3) and of course there are people that can spy me and modify suggested videos 
on youtube. Please do not comment this because I know it's very subjective.

As I said previously in my opinion there is 0day on how is implemented the 
tcp/ip stack in the kernel.
And the vulnerability can be exploited by a mitm attack from the home router.
Thank you Cord.