tech-team

RocketChat ID: 4xBSWiLiQjEDjp5Gp


2,194 total messages. Viewing 100 per page.
Prev | Page 4/22 | Next

Vincent TX @PF-4354

That is a fantastic idea actually, but only if we have users login in from the website. Otherwise we would just get spam submissions

Jake AR @PF-3320

They have to log in to get into victory, right?

Vincent TX @PF-4354

Yup

Vincent TX @PF-4354

Sorry I was thinking of the main site for some reason

Jake AR @PF-3320

Also if we can make honeypots for infiltrators that's be helpful

Jake AR @PF-3320

Like a download all users data button

Vincent TX @PF-4354

LMAO

Jake AR @PF-3320

Or a bit more subtle

Vincent TX @PF-4354

Maybe like a hidden admin panel

Vincent TX @PF-4354

That you can get to fairly easily

Jake AR @PF-3320

Yea

Vincent TX @PF-4354

Some proactive defense

Vincent TX @PF-4354

I like that for after we get everything secure

Jake AR @PF-3320

It'd let us know to keep an eye on someone

Jake AR @PF-3320

That's like the screenshot notifier

Vincent TX @PF-4354

Priorities

- Create Test droplet from current rocketchat instance
- Update to latest version, confirm stable, and install updates on production
- Once stable, change activism upload procedure
- Create honeypot for bad actors on victory site

Jake AR @PF-3320

We also need to get off the app

Matthew MN @PF-6495

The app be can use a WAF rule

Vincent TX @PF-4354

Can we do that asap?

Matthew MN @PF-6495

Setup mod security in front of nginx

Vincent TX @PF-4354

I don't care if users lose access, we can sort that out

Matthew MN @PF-6495

Write a custom rule with the OWASP rule set given

Jake AR @PF-3320

I can also do it by blocking all API calls that aren't local or from specific server

Jake AR @PF-3320

Via cloudflare rule. Browser uses sockets not api

Jake AR @PF-3320

That'd also block anyone from API raiding us, but we can also put limits on API calls I believe

Vincent TX @PF-4354

Lets do that, that is better than doing it at the server layer. We would be hitting it before it even gets to the server

Vincent TX @PF-4354

Jake when can you do that?

Jake AR @PF-3320

Thomas will have to since I don't have access to the almighty dns settings

Benjamin WI @PF-8943

Hey one other item to add, probably first on the list, can someone make sure everyone in this chat is active in the group and also not planning on leaving PF please?

Vincent TX @PF-4354

Ok I can work with him if you tell me what needs to change @Jake AR

Jake AR @PF-3320

Screenshot_20211207-151122_Chrome.jpg

Screenshot_20211207-151122_Chrome.jpg
Jake AR @PF-3320

I am not active, but I am always reachable. Thomas can get a hold of me anytime.

Vincent TX @PF-4354

Everyone else is active here

Vincent TX @PF-4354

I removed Victor

Matthew MN @PF-6495

Did Victor get any keys?

Jake AR @PF-3320

Let me mock up the cloudflare rule. It's pretty easy if I remember

Jake AR @PF-3320

Victor probably did

Matthew MN @PF-6495

For which servers?

Jake AR @PF-3320

To at least victory

Jake AR @PF-3320

I am not sure, it was a long time ago

Matthew MN @PF-6495

I think the main RC server was rekeyed after Paul was removed

Vincent TX @PF-4354

Victor does not have access anymore. He only had access to victory for UI changes. Rotate keys when you can and its good.

Jake AR @PF-3320

Add all this to the list or edit it and pin it

Jake AR @PF-3320

Screenshot_20211207-151458_Chrome.jpg

Screenshot_20211207-151458_Chrome.jpg
Jake AR @PF-3320

Screenshot_20211207-151328_Chrome.jpg

Screenshot_20211207-151328_Chrome.jpg
Jake AR @PF-3320

We could test this first.

Vincent TX @PF-4354

Jake are you adjusting these now or just showing us?

Jake AR @PF-3320

We already limited API calls to 10 a min

Jake AR @PF-3320

Just showing

Vincent TX @PF-4354

Ok

Jake AR @PF-3320

But we could limit it 0 I think except for admins and bots

Vincent TX @PF-4354

I like that, does the typical user ever make an API call?

Vincent TX @PF-4354

Just when using the app right?

Jake AR @PF-3320

Which are the accounts the scripts use when doing API calls.

Jake AR @PF-3320

Yea, however, Victory probably does too

Matthew MN @PF-6495

Victory uses the RC API to authenticate

Jake AR @PF-3320

I assume auth API is allowed otherwise how could it rate limit

Jake AR @PF-3320

Does anyone know the exact API call victory uses?

Jake AR @PF-3320

When I do, someone other than me will have to test app victory.

Matthew MN @PF-6495

I would have to check when I get at my computer

Jake AR @PF-3320

Mobile browser should work

Matthew MN @PF-6495

I can try hitting it

Matthew MN @PF-6495

Thomas shut down the droplet

Jake AR @PF-3320

Victory?

Benjamin WI @PF-8943

@Jake AR Can we add 2 more items to the list. #1 would be a decoder script so they don't have to manually calculate the "code" values. #2 would be a post upgrade "test script" that outlines how we test the customizations. (you can determine the priority for those)

Jake AR @PF-3320

I thought someone wrote a debug script and uploaded it somewhere for us

Matthew MN @PF-6495

The compute script is linked above

Matthew MN @PF-6495

I double check it by hand via wolfram alpha

Matthew MN @PF-6495

Quick question too since we removed Victor is he trustworthy in your opinions? I have not worked too much with him.

Vincent TX @PF-4354

He only ever worked with Paul from my knowledge on one particular project for the UI on victory. I have never worked with him personally or met him.

Vincent TX @PF-4354

He has essentially been AFK in here for months which is the exact opposite of what we need

Matthew MN @PF-6495

Agreed

Matthew MN @PF-6495

We should rekey victory

Matthew MN @PF-6495

I suspect he is likely not a bad actor since the number script has been caught people. Antifa would avoid putting their own guys at risk.

Matthew MN @PF-6495

In a side note of the server compromise theory they wouldn’t place infiltrators if they had god mode so go speak

Vincent TX @PF-4354

Absolutely

Vincent TX @PF-4354

They would sit back and do things like Vincent did last night. Just make fun of us.

Jason NY @PF-3527

Someone please create a google doc or cryptpad with our goals, to-do list, MOP, and information we have already gathered.

Vincent TX @PF-4354

I will take care of it

Matthew MN @PF-6495

I should ask Carter MO to try and meet Victor since that is his area

Benjamin WI @PF-8943

One more task, to add to the list @Jake AR . Last night late, me and Thomas were in a meeting room, basically nobody else on mumble. I swear I saw a "Victor.AB" or "Victor AB" come in to the lobby, go green, then immediately disconnect. I just want to throw that out there, if there is something you can check on that it might be worth making sure any old accounts are totally wiped and any connections terminated. I think it was like 11:30pm CST last night.

Benjamin WI @PF-8943

It was like 2 seconds, flashed up, went green and then the person was gone.

Vincent TX @PF-4354

I just unauthenticated all accounts that havn't logged in for 25+ days

Benjamin WI @PF-8943

Looking at the directory, could have been Vincent AZ, but I swear it was AB at the end. Anyway just throwing it out there.

Vincent TX @PF-4354

I can check the mumble logs I think

Benjamin WI @PF-8943

Thanks for all the effort guys, I appreciate it, I know Thomas appreciates it although he may not say it. This team is awesome, and has continually improved over the years. Things that were "impossible" are now in production. If you guys ever need anything related to tech junk, infrastructure, IT job / career related things just reach out to Uncle Ben.

Thomas @thomas

I'll need to review this before we go too far into any projects or changes. The biggest priority was checking the server security. That was done well. If we want to update the server with associated tasks that's good too. However, I don't want to be running any huge changes while there's so much still in the air.

Jason NY @PF-3527

No plans for big changes as far as I know. Just need to update everything to most recent version so that we can’t be exploited against as easily.

Jake AR @PF-3320

Thanks Vincent, I don't have mumble admin access

Vincent TX @PF-4354

Thank you Jason

Thomas @thomas

@Jason NY I assume I can turn V.pf.us back on and all that?

Vincent TX @PF-4354

Let's take a look at this stuff and determine who can take what

Jake AR @PF-3320

I believe we have never been exploited through a lack of a security update, not saying we shouldn't update,but rather I'd put it at the bottom of priorities esp since it has the greatest effect on server uptime

Jake AR @PF-3320

Rekeying all severs would be good though, should do that occasionally anyways

Vincent TX @PF-4354

I will work on the following when Thomas gets back
- Create test droplet, start update procedure with some help from Jake hopefully if he has done it before.
- Remove API access via ccloudflare

Vincent TX @PF-4354

@Jason NY What on this list interests you

Jason NY @PF-3527

Unless @Matthew MN objects to turning it on, I don’t see why not.

Jason NY @PF-3527

I can do both of those

Vincent TX @PF-4354

I mean the cryptpad list

2,194 total messages. Viewing 100 per page.
Prev | Page 4/22 | Next