Friday, 2012-03-02

*** nowen (~nowen@adsl-74-176-212-133.asm.bellsouth.net) has joined #wikid13:49
*** laszlof (~laszlof@wookie.tvog.net) has joined #wikid21:42
laszlofHey nick, saw your message on linkedin21:42
nowenhey21:42
nowenhow's it going?21:42
laszlofpretty well, I resigned from ASO at the end of last year21:42
noweni figured21:42
laszlofbeen running my own development company since then, doing pretty well.21:43
nowennice21:43
laszlofI was getting more and more micro-management over me at ASO, was starting to get annoying21:44
nowenwhat kind of stuff are you doing?21:44
nowensounds like you should be an entrepreneur ;)21:44
laszlofindeed.21:44
laszlofMostly PHP development, a do a lot of WHMCS based stuff these days21:44
laszlofalong with some larger projects with a atlanta based lending company21:45
nowenis WHMCS very popular?21:45
laszlofprobably one of the most popular billing platforms for web hosts21:45
nowenphp-based?21:45
laszlofyes21:45
laszlofI've done quite a few sites that have absolutely no web hosting products as well, with WHMCS in the backend21:46
laszlofits very customizable21:46
laszlofand even though its encoded, its very developer friendly21:46
laszloflots of hooks and a pretty good API21:46
nowencool21:47
nowenatlanta-based customers or all over?21:47
laszlofworld-wide21:47
laszlofi think I only have 1 customer I work with thats atlanta based.21:47
nowenyeah, that internet thing might just work out21:47
laszlofmost of them are in europe, australia, etc.21:47
nowendid you see the linode news?21:48
laszlofno?21:48
laszlofwow21:49
nowenhttp://bitcoinmedia.com/compromised-linode-coins-stolen-from-slush-faucet-and-others/21:49
laszlofyeah, reading now on theregister21:49
laszlofI'm skeptical on the scope of the attack21:51
laszlofthey seem to indicate it was targetted at only 8 clients. I find that highly unlikely21:51
nowenyeah, why stop there?21:51
laszlof"All activity by the intruder was limited to a total of eight customers, all of which had references to "bitcoin". The intruder proceeded to compromise those Linode Manager accounts,"21:52
laszlof"The portal does not have access to credit card information or Linode Manager user passwords."21:52
laszlofso they were able to gain access to the customers manager accounts21:53
laszlofbut the portal doesnt contain that info21:53
laszlof...21:53
laszlofthey better be damn sure no credit card data was accessible by the breach. Failing to notify visa of an intrusion is grounds for massive fines and revokation of any merchant accounts21:54
nowenyep21:54
laszlofI think its like, $50K per card, or something like that21:54
laszlofits a lot.21:54
laszlofsome reports say $70K, another one I'm reading says $228K21:56
nowenouch21:58
nowenyeah, so I thought about ASO today when I saw that21:59
laszlofyeah, we've been there. Fortunately the card data was never stolen22:00
laszlofAt least not that we knew about.22:00
laszlofthey're using a VPN and 2 factor on everything now. it would be nearly impossible for someone to hack it.22:01
nowenare the customer service reps using 2FA?22:02
laszlofyes22:02
laszlofeverything is restricted to the VPN IP address.22:02
laszlofwhich requires 2FA22:02
laszlofplus, the billing login as well as several other key systems use 2FA as well22:02
laszlofyou'd have to crack the 2 factor on the VPN, then do the same for any system you're trying to get into22:02
laszlofand only a few people have access to the DB server that hosts the billing data22:03
laszlofthat requires being on the VPN, SSHing to a specific "central" server, and then ssh'ing to the DB box. none of which use static passwords. its either 2 factor or ssh keys22:04
laszlofbefore I left I was implementing required password changes ever 60 days22:04
laszloffor anything that required a static password22:04
laszloflike email, etc.22:04
laszlofeven root passwords on all the servers are rotated every X amount of hours22:05
nowenhmm - seems like requiring 2fa would easier for some of that22:05
laszlofnot possible22:06
laszlofcpanel doesnt support 2 factor (yet)22:06
nowenugh, that's right22:06
laszlofthats pretty much the only reason for root passwords in the first place22:06
laszlofeverything else is done with keys22:07
nowenyeah.  you could put 2fa on sudo22:07
laszlofthats probably a bit overkill. We just have a script setup on our "central" servers that lets specific user accounts ssh to the shared servers as root22:08
laszlofand everything from there is logged22:08
laszlofremotely logged, even :)22:08
laszlofafter the last breakin, I built a syslog server to store everything22:08
laszlofI'm not sure what they're doing now. I was pretty much the only one who gave 2 shits about security22:09
laszlofeven though I was a developer, I was doing the job of our CTO a lot of the time22:09
laszlofmmm. think I'm going to make bacon wrapped pork tenderloin medallions tonight22:11
nowendamn, that sounds good22:14
laszlofi made some a few weeks ago, they were awesome22:14
nowenentrepreneuring must agree w/ you :)22:14
laszlofI'm doing much better than I expected. :)22:15
laszlofit pretty much blew up once I got my business up and running22:16
nowengood stuff22:17
nowenwe're expecting a couple of big deals to close soon.  will be nice22:17
laszlofeven been doing some mobile app development, HTML5/CSS3/javascript22:18
noweninteresting22:22
nowenif you figure out a way to better store private keys, let me know. I think our html5 token gets wiped when the cache is cleared22:23
laszlofonly 2 methods22:24
laszloflocalstorage and whatever that sql thing is they have22:24
nowenis there a potential for a WHMCS/WiKID tie in?22:24
laszlofI dont think you can store on the filesystem unless you use a native app22:25
nowenyeah, too bad22:25
laszlofnah, this was for a medical company22:25
laszlofa data entry app for their nurses that sync's data to quickbase22:25
nowenok - time for me to head home22:45
nowenstay in touch laszlof!22:46
laszlofwill do22:46
nowenlater!22:46
*** nowen has quit (Quit: Leaving.)22:47

Generated by irclog2html.py 2.11.0 by Marius Gedminas - find it at mg.pov.lt!