Bitcoin Forum
April 25, 2024, 12:15:09 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 [44] 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 »
  Print  
Author Topic: [Emergency ANN] Bitcoinica site is taken offline for security investigation  (Read 224549 times)
DeathAndTaxes
Donator
Legendary
*
Offline Offline

Activity: 1218
Merit: 1079


Gerald Davis


View Profile
May 16, 2012, 07:22:22 PM
 #861


2) If you are serious about security, don't advertise your genius ideas.


On the contraire, if your solution is proven and tested, you shouldn't be afraid of sharing it with the public. "Security by obscurity" is just laughable, and the source of problems like the one Bitcoinica is going through perhaps. Let's bet that nobody knows where our server is, or how we secure it. Let's just bet!

+1.

WEP was a closely guarded secret and busted wide open.  The implementation details of SHA-256 are public knowledge and the algorithm remains secure today.  If your "security" relies on the attacker not knowing "how it works" you have already failed.  Eventually the attacker will know and the house of cards will come crumbling down.   

Obviously some common sense applies.  Certain elements (ports, keys, certs, API commands, db schemas, etc) should remain secret but if you feel the need to hide the general concept well you are doing something wrong.
1714004109
Hero Member
*
Offline Offline

Posts: 1714004109

View Profile Personal Message (Offline)

Ignore
1714004109
Reply with quote  #2

1714004109
Report to moderator
1714004109
Hero Member
*
Offline Offline

Posts: 1714004109

View Profile Personal Message (Offline)

Ignore
1714004109
Reply with quote  #2

1714004109
Report to moderator
1714004109
Hero Member
*
Offline Offline

Posts: 1714004109

View Profile Personal Message (Offline)

Ignore
1714004109
Reply with quote  #2

1714004109
Report to moderator
Whoever mines the block which ends up containing your transaction will get its fee.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
coinft
Full Member
***
Offline Offline

Activity: 187
Merit: 100



View Profile
May 16, 2012, 07:25:10 PM
 #862

I am honestly flabbergasted how financial companies holding hot reserves keep using Rackspace, Linode, Amazon EC2, etc...

These "web 2.0 geeks" need to learn how to secure your system old school, like old bags like me do.

We have constantly 6 figures on our API enabled auto exchanger. Maybe because the reserves are actually ours, and do not hold client's funds we actually give a shit about keeping it secure?

Kids, here is how you secure a financial server:

- Get a BARE METAL dedicated server.
- Install Debian 6 on an ENCRYPTED LVM through KVM. Don't get your server at a hoster that does not allow you to install bare metal.
- update/safe-upgrade
- Generate SSH key pair. Leave only public on server....
- Disable SSH login with password
- Install firewall, only leave absolutely necessary ports open.
- Keep backups of your SSH key on encrypted drives, wualla, etc. This should be the only access to your server.

And there you have it ... break in on that ... not even the idiots working at the hosting company (or authorities getting your drives for that matter) will be able to get your info, your client's info, or your money for that matter.

Rackspace and the "cloud" is not there for servers holding 6 figures. It is unbelievable to me that after the break in on linode (which shouldn't have happened in the first place) neither Bitcoinica or Intersango took this as their absolute first priority.


The "cloud" is fine for your latest playing around project. But for financial matters, it is nothing more than glorified shared hosting.

Attack vectors:

- The idiots at the hosting company, or anyone getting access, can try a cold boot attack against your server. Bare metal isn't enough by far for physical security.

- You call them idiots, but they can at least take your site down easily, for damaging rep.

- Those guys can also reroute your traffic for man in the middle attacks vs your clients -- do you believe they will not click through SSL security warnings?

- If you login via ssh, I hope you got the server key and enabled strict checking, to avoid man in the middle attacks. You should consider something stronger than mere software keys too. Require 2 persons, or at least std 2 factor auth. And you need remote logging to another secured system for a verifyable audit trail.

- I hope you do debian security updates more often than you update your sig, which still advertises transfers to bitcoinica.

- Bragging about your server on the net while calling ISP employees idiots is a bad idea.

Free advice.

-coinft.

kokjo
Legendary
*
Offline Offline

Activity: 1050
Merit: 1000

You are WRONG!


View Profile
May 16, 2012, 07:32:16 PM
 #863

WEP was a closely guarded secret and busted wide open.
NO IT WAS NOT.
the RC4 algoritm was until 1994. WEP was first used 1999. 5 years after the inner working of RC4 was discovered.
It was first in 2001 that the FMS-attack was done, that made it possible to crack RC4, and therefor WEP.

"The whole problem with the world is that fools and fanatics are always so certain of themselves and wiser people so full of doubts." -Bertrand Russell
tvbcof
Legendary
*
Online Online

Activity: 4592
Merit: 1276


View Profile
May 16, 2012, 07:34:27 PM
 #864


If you don't have a solution which obscures necessary weaknesses behind solutions which provide some degree of opacity, you probably have a somewhat primitive solution.  Of course you lose this advantage if you blather on about how you've done things.  Just sayin...


Well I will respectfully disagree with that Smiley, but to each its own I guess. If you apply the tools properly, no obscurity is needed. Case in point: Bitcoin. The cryptographical principles that make bitcoin secure are completely open source, and published everywhere, for everybody to see, tinker, and to break.

Can I steal your Bitcoins by breaking the cryptographic mechanism that protect your private key? NO.


I agree with your assessment of how to make a rational choice of tools (and realized that in doing so, I've already neglected to practice what I preach to some extent.)  But there is a big difference between choosing tools and choosing how, exactly, to glue them together.

I don't really need to paint a neon sign on my deployments to enjoy the benefit have having skilled attackers work on the tools I have chosen.


sig spam anywhere and self-moderated threads on the pol&soc board are for losers.
muyuu
Donator
Legendary
*
Offline Offline

Activity: 980
Merit: 1000



View Profile
May 16, 2012, 08:00:11 PM
 #865

DeathAndTaxes and aurumxchange both seem to be bright chaps but my main concern is different:

The course of action absolutely doesn't follow logically from what appear to be the reasons behind the hacks, both alleged and inferred.

"So, we've totally fixed the codebase, we have fantastic security standards in place. We just got our mail p0wned. Therefore... we are going to rebuild the codebase?"

So... not just there's nothing said about changing that mail policy instead of "improving the mail server", why are you rebuilding at all if the code-base and server are so solid and well secured?

Not that I'd put a Satoshi in Bitcoinica again, but wtf?

GPG ID: 7294199D - OTC ID: muyuu (470F97EB7294199D)
forum tea fund BTC 1Epv7KHbNjYzqYVhTCgXWYhGSkv7BuKGEU DOGE DF1eTJ2vsxjHpmmbKu9jpqsrg5uyQLWksM CAP F1MzvmmHwP2UhFq82NQT7qDU9NQ8oQbtkQ
padrino
Legendary
*
Offline Offline

Activity: 1428
Merit: 1000


https://www.bitworks.io


View Profile WWW
May 16, 2012, 09:06:52 PM
 #866

I've experienced much the same in my professional life and seen many hundred of thousands, if not millions of dollars being invested to "secure" a system (using the term in the abstract) without a comprehensive understanding of the system from end-to-end. I make a great living helping commercial and govt. customers address issues and generally the breakdown isn't that one person is or isn't an expert at everything but rather a lack of understanding with respect to what they do and do not know.

Many people, including those that "secured" Bitcoinica have a certain focus area that does not seem to extend into the OS, physical security, access mechanisms, etc. and while quite valuable as a component of a comprehensive solution they are not a solution in themselves and that is the fundamental breakdown.  I don't think this latest theft and the subsequent work to address will ultimately fix anything unless they bring in additional consultants that can provide a end-to-end plan to access and address the system, software, processes, etc...

1CPi7VRihoF396gyYYcs2AdTEF8KQG2BCR
https://www.bitworks.io
Bitcoinica Consultancy
Newbie
*
Offline Offline

Activity: 14
Merit: 0


View Profile
May 16, 2012, 09:37:22 PM
 #867

the claims process should be finished tonight. It took long because we did not want to use a 3rd party service such as Wufoo for obvious security reasons.
phorensic
Hero Member
*****
Offline Offline

Activity: 630
Merit: 500



View Profile
May 16, 2012, 09:42:07 PM
 #868

I am honestly flabbergasted how financial companies holding hot reserves keep using Rackspace, Linode, Amazon EC2, etc...

These "web 2.0 geeks" need to learn how to secure your system old school, like old bags like me do.

We have constantly 6 figures on our API enabled auto exchanger. Maybe because the reserves are actually ours, and do not hold client's funds we actually give a shit about keeping it secure?

Kids, here is how you secure a financial server:

- Get a BARE METAL dedicated server.
- Install Debian 6 on an ENCRYPTED LVM through KVM. Don't get your server at a hoster that does not allow you to install bare metal.
- update/safe-upgrade
- Generate SSH key pair. Leave only public on server....
- Disable SSH login with password
- Install firewall, only leave absolutely necessary ports open.
- Keep backups of your SSH key on encrypted drives, wualla, etc. This should be the only access to your server.

And there you have it ... break in on that ... not even the idiots working at the hosting company (or authorities getting your drives for that matter) will be able to get your info, your client's info, or your money for that matter.

Rackspace and the "cloud" is not there for servers holding 6 figures. It is unbelievable to me that after the break in on linode (which shouldn't have happened in the first place) neither Bitcoinica or Intersango took this as their absolute first priority.


The "cloud" is fine for your latest playing around project. But for financial matters, it is nothing more than glorified shared hosting.
I like the cut of your jib  Wink
marcus_of_augustus
Legendary
*
Offline Offline

Activity: 3920
Merit: 2348


Eadem mutata resurgo


View Profile
May 16, 2012, 10:02:01 PM
 #869


Attack vectors:

- The idiots at the hosting company, or anyone getting access, can try a cold boot attack against your server. Bare metal isn't enough by far for physical security.

- You call them idiots, but they can at least take your site down easily, for damaging rep.

- Those guys can also reroute your traffic for man in the middle attacks vs your clients -- do you believe they will not click through SSL security warnings?

- If you login via ssh, I hope you got the server key and enabled strict checking, to avoid man in the middle attacks. You should consider something stronger than mere software keys too. Require 2 persons, or at least std 2 factor auth. And you need remote logging to another secured system for a verifyable audit trail.

- I hope you do debian security updates more often than you update your sig, which still advertises transfers to bitcoinica.

- Bragging about your server on the net while calling ISP employees idiots is a bad idea.

Free advice.

-coinft.


Of course no system can be 100% secure unless you have sole physical access to the server, and then there are other worries as well. I am just saying. From having a Rackspace VM holding 100K to my solution, there is a whole lot more security, and as you point on your post, the attack vectors need to be substantially more sophisticated than breaking into an IMAP account.

I wasn't calling my ISP guys idiots by the way, I was just talking generically. Our app server is neither hosted nor collocated. The rest of our infrastructure is.


aurumXchange ... I'm sure that live security testing of your set-up can be arranged if needs be ...

btcgoldsilver
Member
**
Offline Offline

Activity: 63
Merit: 10


Bitcoins Gold Silver


View Profile
May 16, 2012, 10:03:15 PM
 #870

Bitcoinica is still in its infancy, its not that long ago that it was a small project developed by a 17 year old programmer. I take my hat off to Zhoutong coming up with this idea, I think Bitcoin is better for it.  

Personally I think a bit of leeway can be given and bitcoinica are (in my opinion) being fair with customers, assuming they do what they have stated they will do.

The security concerns are valid though if we are to take bitcoinica seriously going forward it has to prove that it is taking security very seriously itself. A compromised email server leading to all that theft seems extremely amateurish at best.

The person who described how to lock down and secure a financial server made good points, I hope bitcoinica will listen to the advice being offered by the community


16ZodW6mxFkmxrCy5MSii7PLJ6VdfNknue
defxor
Hero Member
*****
Offline Offline

Activity: 530
Merit: 500


View Profile
May 16, 2012, 10:21:59 PM
 #871

Regarding "omg it's been four days you have my money i will contact the authorities":

15 odd years or so someone abused my VISA to buy software on the Internet. Back then my main card was still a debit card, connected to the bank account I used for paying bills and where I got my pay check automatically deposited.

They cleaned me out. When I contacted the bank they were very understanding, they investigated the purchases and found it was quite obvious I hadn't done them.

The estimate they gave me until I'd have the money back in my account was 3-6 months. No interest.

Perspective.
datafish
Donator
Full Member
*
Offline Offline

Activity: 129
Merit: 100


Swimming in a sea of data


View Profile
May 16, 2012, 11:11:37 PM
 #872

The estimate they gave me until I'd have the money back in my account was 3-6 months. No interest.

Perspective.

Also, where are these whiners planning to put their money where they stand to safely earn a significant amount of interest in a few days or weeks?  Tell me, I'd like to invest there myself.
teflone
Hero Member
*****
Offline Offline

Activity: 770
Merit: 500


You're fat, because you dont have any pics on FB


View Profile
May 16, 2012, 11:12:12 PM
 #873

Regarding "omg it's been four days you have my money i will contact the authorities":

15 odd years or so someone abused my VISA to buy software on the Internet. Back then my main card was still a debit card, connected to the bank account I used for paying bills and where I got my pay check automatically deposited.

They cleaned me out. When I contacted the bank they were very understanding, they investigated the purchases and found it was quite obvious I hadn't done them.

The estimate they gave me until I'd have the money back in my account was 3-6 months. No interest.

Perspective.


I dont think the people give a shit what happened to you..


Perspective...

For Canadians by Canadians: Canada's Bitcoin Community - https://www.coinforum.ca/
ArticMine
Legendary
*
Offline Offline

Activity: 2282
Merit: 1050


Monero Core Team


View Profile
May 16, 2012, 11:15:40 PM
Last edit: May 16, 2012, 11:27:27 PM by ArticMine
 #874


2) If you are serious about security, don't advertise your genius ideas.


On the contraire, if your solution is proven and tested, you shouldn't be afraid of sharing it with the public. "Security by obscurity" is just laughable, and the source of problems like the one Bitcoinica is going through perhaps. Let's bet that nobody knows where our server is, or how we secure it. Let's just bet!

How very true. The main strength of Bitcoin is that all the security is FLOSS (Free Libre Open Source Software) and yet is an extremely secure system. Now compare this with the multi billion dollar DRM industry, which is entirely based on security by obscurity using propriety software. With DRM the "security" is usually cracked by some teenager who in the process also makes an utter fool out of some multi billion dollar corporation or trade group. This however does not prevent many very deep pockets from paying for the security by obscurity snake oil.

Concerned that blockchain bloat will lead to centralization? Storing less than 4 GB of data once required the budget of a superpower and a warehouse full of punched cards. https://upload.wikimedia.org/wikipedia/commons/8/87/IBM_card_storage.NARA.jpg https://en.wikipedia.org/wiki/Punched_card
disclaimer201
Legendary
*
Offline Offline

Activity: 1526
Merit: 1001


View Profile
May 16, 2012, 11:16:41 PM
 #875

Regarding "omg it's been four days you have my money i will contact the authorities":

15 odd years or so someone abused my VISA to buy software on the Internet. Back then my main card was still a debit card, connected to the bank account I used for paying bills and where I got my pay check automatically deposited.

They cleaned me out. When I contacted the bank they were very understanding, they investigated the purchases and found it was quite obvious I hadn't done them.

The estimate they gave me until I'd have the money back in my account was 3-6 months. No interest.

Perspective.


Don't give them any ideas. If coins and money are returned to us I believe the matter will turn out to be good for bitcoin. -If- You guys are already discussing about securing other btc ventures this way and are helping each other. Since trust is everything online the issue has to be resolved if any bitcoin enterprise is to have a future. Trust is time-sensitive online, much more than with a credit card company. So, you have days at most to return funds and calm customers if you ever want to have a chance at milking that cash-cow again. Don't get me wrong, Bitcoinica could still be a scam IMO as in their business model didn't work out and they threw the anchor with a staged theft before it'd be too late to hold the status quo. Of course, this is all speculation since I can hardly prove it. It would be a semi-moral solution though rather than having shit really hit the fan and becoming totally insolvent. Let's hope I'm wrong.
tvbcof
Legendary
*
Online Online

Activity: 4592
Merit: 1276


View Profile
May 16, 2012, 11:46:07 PM
 #876


2) If you are serious about security, don't advertise your genius ideas.


On the contraire, if your solution is proven and tested, you shouldn't be afraid of sharing it with the public. "Security by obscurity" is just laughable, and the source of problems like the one Bitcoinica is going through perhaps. Let's bet that nobody knows where our server is, or how we secure it. Let's just bet!

How very true. The main strength of Bitcoin is that all the security is FLOSS (Free Libre Open Source Software) and yet is an extremely secure system. Now compare this with the multi billion dollar DRM industry, which is entirely based on security by obscurity using propriety software. With DRM the "security" is usually cracked by some teenager who in the process also makes an utter fool out of some multi billion dollar corporation or trade group. This however does not prevent many very deep pockets from paying for the security by obscurity snake oil.

+1

It's kind of difficult to tell if we are looking more at a 'reading' or more at a 'comprehension' problem here.  But it's hard to care that much either.


sig spam anywhere and self-moderated threads on the pol&soc board are for losers.
DiabloD3
Legendary
*
Offline Offline

Activity: 1162
Merit: 1000


DiabloMiner author


View Profile WWW
May 17, 2012, 01:44:20 AM
 #877

...
Kids, here is how you secure a financial server:
...

Here's another couple of ideas:

1) Don't follow anyone's cookie-cutter solutions...particularly if they are good ones (because if they are, they will be popular.)

2) If you are serious about security, don't advertise your genius ideas.



No, virtually every secure server uses those concepts.

This is what I do: I disable root login locally AND through ssh (local root disable is borderline security through obscurity though, you have to know the l/p of people who can su before you can cause any real damage), and I disable ssh login with passwords (key only), and I also use keys with passphrases only (so even if they steal the key from me physically, they can't use it).

Installing a firewall (ie, a handful of iptables rules) is somewhat overkill, you should only be running software that can be told to listen on specific IPs (ie, listen locally only). iptables kills network performance, so only use it if you must.

Running the actual httpd/db/maild/etc on a vm that itself is stored on an encrypted image is rather popular. You can boot the machine and do basic maintenance on the VM (ie, back up everything), but you can't start it or read the image unless you have the passphrase. Its basically a ghetto way of doing LOM cheaply, especially if your VM has its own IP and the host isn't masquerading for the VM.

Bare metal over VPS only stops one single attack: host reading VM memory. Which, for financial things, is worth it for some people.

Having your own hardware coloed instead of leasing a dedi is not going to increase security: others still have causal physical access to your rack, so you'll need to rent your own locked cage if you want to take paranoia the whole 9 yards.

casascius
Mike Caldwell
VIP
Legendary
*
Offline Offline

Activity: 1386
Merit: 1136


The Casascius 1oz 10BTC Silver Round (w/ Gold B)


View Profile WWW
May 17, 2012, 02:01:58 AM
 #878

How about just ... Not keeping bitcoins on the server?

How bad would it be if all non-trivial withdraws needed up to 24h to be done manually?  Where the platform issued pgp signed and encrypted withdrawal requests that were reviewed and performed manually, offsite?

Companies claiming they got hacked and lost your coins sounds like fraud so perfect it could be called fashionable.  I never believe them.  If I ever experience the misfortune of a real intrusion, I declare I have been honest about the way I have managed the keys in Casascius Coins.  I maintain no ability to recover or reproduce the keys, not even under limitless duress or total intrusion.  Remember that trusting strangers with your coins without any recourse is, as a matter of principle, not a best practice.  Don't keep coins online. Use paper or hardware wallets instead.
DiabloD3
Legendary
*
Offline Offline

Activity: 1162
Merit: 1000


DiabloMiner author


View Profile WWW
May 17, 2012, 02:51:16 AM
 #879

How about just ... Not keeping bitcoins on the server?

How bad would it be if all non-trivial withdraws needed up to 24h to be done manually?  Where the platform issued pgp signed and encrypted withdrawal requests that were reviewed and performed manually, offsite?

Well, with any site that needs to send bitcoins back out you need whats known as a hot wallet, ie, a wallet that ONLY has enough to do day to day business... you setup your software to send excess coins to a cold wallet (offline or otherwise hidden on another machine), and message you if you need to manually transfer from cold to hot.

No one has $90k worth of coins in their hot wallet.

imsaguy
General failure and former
VIP
Hero Member
*
Offline Offline

Activity: 574
Merit: 500

Don't send me a pm unless you gpg encrypt it.


View Profile WWW
May 17, 2012, 02:58:44 AM
 #880

No one has $90k worth of coins in their hot wallet.

*anymore

Coming Soon!™ © imsaguy 2011-2013, All rights reserved.

EIEIO:
https://bitcointalk.org/index.php?topic=60117.0

Shades Minoco Collection Thread: https://bitcointalk.org/index.php?topic=65989
Payment Address: http://btc.to/5r6
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 [44] 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!