Bitcoin Forum
May 28, 2024, 02:43:39 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Cloudflare  (Read 1308 times)
Roy Badami (OP)
Hero Member
*****
Offline Offline

Activity: 563
Merit: 500


View Profile
December 03, 2013, 12:35:49 AM
 #1

I notice that bitcoinarmory.com is using Cloudflare.  Since an unauthorized change of DNS to point to Cloudflare was implicated in the recent attack on bitcointalk, it would be nice to have confirmation from etotheipi that bitcoinarmory.com is supposed to be using Cloudflare.

roy
etotheipi
Legendary
*
Offline Offline

Activity: 1428
Merit: 1093


Core Armory Developer


View Profile WWW
December 03, 2013, 09:25:21 PM
 #2

Indeed, we are using cloudflare.  Although it looks like all cloudflare sites are being blocked in China, so we are discussing internally if there's another way to handle this.

Haven't heard much about what happened with the forums, anyone got a link?

Founder and CEO of Armory Technologies, Inc.
Armory Bitcoin Wallet: Bringing cold storage to the average user!
Only use Armory software signed by the Armory Offline Signing Key (0x98832223)

Please donate to the Armory project by clicking here!    (or donate directly via 1QBDLYTDFHHZAABYSKGKPWKLSXZWCCJQBX -- yes, it's a real address!)
Roy Badami (OP)
Hero Member
*****
Offline Offline

Activity: 563
Merit: 500


View Profile
December 03, 2013, 10:52:07 PM
Last edit: December 03, 2013, 11:12:32 PM by Roy Badami
 #3

https://bitcointalk.org/index.php?topic=354565.0 and also https://bitcointalk.org/index.php?topic=354365.0 (EDIT: actually probably got those the wrong way round - the second thread there has more info.  There may well be other thread in the Meta forum. EDIT: Also https://bitcointalk.org/index.php?topic=354570)

The main story is that someone compromised the bitcointalk.com account at the domain registrar, and then changed the nameservers so they could mount a man-in the-middle attack on the forums.  (I haven't seen any details of what they actually did, if it is known, but my personal guess would be that they intended to harvest passwords in the hope that some people would use the same credentials on online wallets or exchanges.)

The interesting detail is that the attackers used Cloudflare to host their mitm site.  Cloudflare does some (slightly controvertial) SSL hackery whereby they automatically get GlobalSign to issue a cert on your behalf when you sign up with them (techically they include your domain in the subjectAltName extension of one of their server's certs).  They'll present your site as SSL to the web at large using that GlobalSign cert even if you don't bother to implement SSL yourself (or if you only use a self-signed cert).

No doubt you agree to this in the small print when you sign up with them, and of course, once an attacker controlls your DNS, they can trivially obtain a cert by hand in half an hour or so, using any of the dozens of providers that just validate domain ownership by checking you can respond to a mail to admin@domain.com or some such.... But the Cloudflare solution makes things very easy for lazy hackers wanting to spoof an SSL site :-)

roy

Roy Badami (OP)
Hero Member
*****
Offline Offline

Activity: 563
Merit: 500


View Profile
December 03, 2013, 11:03:27 PM
Last edit: December 03, 2013, 11:16:39 PM by Roy Badami
 #4

Out of curiosity, do they [China] block Cloudflare port 80, too, or only Cloudflare port 443?
oakpacific
Hero Member
*****
Offline Offline

Activity: 784
Merit: 1000


View Profile
December 06, 2013, 06:20:26 AM
 #5

Out of curiosity, do they [China] block Cloudflare port 80, too, or only Cloudflare port 443?

Both http and https not working.

Most Chinese Armory users would be skillful enough to use proxies or VPN, but that open them up to the danger of MITM attack.

https://tlsnotary.org/ Fraud proofing decentralized fiat-Bitcoin trading.
bitpop
Legendary
*
Offline Offline

Activity: 2912
Merit: 1060



View Profile WWW
December 19, 2013, 03:06:10 PM
 #6

You should be pgping the downloads anyway

omegaflare
Sr. Member
****
Offline Offline

Activity: 331
Merit: 250


View Profile
December 20, 2013, 07:34:43 PM
 #7

You should be pgping the downloads anyway

What the hell are you talking about? This has nothing to do with verifying Armory setup files with PGP. Wrong thread?

goatpig
Moderator
Legendary
*
Offline Offline

Activity: 3668
Merit: 1347

Armory Developer


View Profile
December 20, 2013, 08:41:03 PM
 #8

You should be pgping the downloads anyway

What the hell are you talking about? This has nothing to do with verifying Armory setup files with PGP. Wrong thread?

In the context that you download Armory through a  VPN or a proxy, or anything remotely critical for that matter, you should verify you got what you expected with PGP.

I think his comment was that regardless of how you acquired Armory, you should check it against the provided signature, which is good practice.

bitpop
Legendary
*
Offline Offline

Activity: 2912
Merit: 1060



View Profile WWW
December 21, 2013, 06:34:35 AM
 #9

You should be pgping the downloads anyway

What the hell are you talking about? This has nothing to do with verifying Armory setup files with PGP. Wrong thread?

I thought the context was the cloudflare attack on this site which redirected it through another server and harvested cookies. Op states cloudflare attack, which could mean switched out downloads. My answer was pgp. I think it was relevant no?

Otherwise, why would op be concerned how the site is served if he didn't mean compromised setup files.

bitpop
Legendary
*
Offline Offline

Activity: 2912
Merit: 1060



View Profile WWW
December 21, 2013, 06:35:33 AM
 #10

PS please use incapsula instead.

Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!