Jake AR

@PF-3320 RocketChat ID: 6AZpoAX3J8Pbm3aNr


653 total messages. Viewing 100 per page.
Prev | Page 4/7 | Next

Sounds good

That is so weird. Can you try it on your PC and phone browser

Screenshot_20211214-141211_Chrome.jpg

Screenshot_20211214-141211_Chrome.jpg

Should look like this

Thanks for testing this out I know others are having similar problems so if we figured this out then it would help everybody

You can do both

Did you still get the error? Did you used to be able to get into victory before? Has anything changed like which phone you're using or browser?

Interesting. Maybe there's something else going on here. The last thing is can you try using a different browser like Chrome on your computer or on your phone using incognito tab.

I saw. I just tried and it worked for me. Using any VPN?

I tried mine with vpn and no issue

Thanks for your help I think I got quite a bit of information I'm going to look at the logs and check with some other users. I'll let you know

@Vincent TX do you have another user that's having the same problem with victory? I was working with Jim ma and he is still having the problem and I can't figure out why.

Also can someone send me the new key for victory through tg or something. I want to know if I can check the logs and see if they're getting errors when they try to log in

Is protonmail even good anymore?

Also this morning the website was attacked.

Screenshot_20211214-154756_Gmail.jpg

Screenshot_20211214-154756_Gmail.jpg

Screenshot_20211214-154843_Gmail.jpg

Screenshot_20211214-154843_Gmail.jpg

@Thomas you can check cloudflare to see if there was an increase in any attacks as well

I got the alerts around 7:30 a.m. so maybe it lines up if that's not normal traffic at 9:00 a.m.

The IP address is from Florida 97.104.113.240. I'll look through rocket chat to see if that matches a user

Lmao

You need to mumble instructions right

Screenshot_20211214-155548_Chrome.jpg

Screenshot_20211214-155548_Chrome.jpg

our systems were tested and survived. But we're still in their crosshairs it seems

Yea it's not hard for them to find the subdomains. Is there any sort of system that we should have in place like what we have for the WordPress website that checks and blocks XSS and stuff. I guess we're just relying on rocket chat being built well right?

That might be something to consider

RIP

Does that require the server to be able to communicate to an outside server

Or is it just showing information to the user

Okay. @Vincent TX Let's add looking into a WAF possibly cloudflare for the rocket chat servers

You're welcome. Anyone else you hear that's having problems with victory have them message me

That might not be a bad idea. Victory isn't really too dangerous. Since it is hard coded and only does one thing which is authenticates the user I'm not sure how that could be exploited

I think at worst they could log in as a different user but they would see the same exact thing, right?

Are we thinking they could get in the middle?

Yea, if it's an infiltrator we will definitely catch him

Yea lol probably

It's dated attack

I mean luck and skill

Our servers are locked down well. Idk about victory as much tbh

But we should be doing more.

I agree. @Vincent TX let's add that ^ and log analysis for attacks and vulnerabilities to cryptpad

Don't wanna lose any of these good ideas.

Cool, maybe that's something you can head up on

Sure. For the sake of time. I think it may be helpful to just clone the server and do the step updates because and we don't have to transfer all of the uploads and all the custom scripts and everything else that has got it working to this point. Not looking forward to getting everything back to this current state, even though it'd be a good exercise for documentation on worst case scenarios

@Thomas we need to coordinate sometime this evening for me to remove a couple security features on the main rocket chat server so you can create a snapshot and then I'll turn them back on. I don't believe this is a huge risk because all it's doing is enabling passwords to ssh into server.

That's what we did last time and I think they cleared the keys with the clone because the concept of cloning snapshots I guess is to clone everything but the keys

So since we couldn't log in with a password since the security settings were cloned as well we had no way of getting into it

All right just let me know so I can change the settings right beforehand

That'll be fine

Either now or after we make the clone we should try the cloudflare firewall settings to see if it'll block the app

This

We'll just have to communicate to people through rocket chat what the new Mumble server is

You can go ahead with the cloudflare firewall rules update.

Also the WordPress plugins are supposed to update regularly and I get alerts if they don't

Also WordPress updates too

Seems to have done it on Android

Screenshot_20211214-172006_RocketChat.jpg

Screenshot_20211214-172006_RocketChat.jpg

Says waiting for network and won't let you message

Screenshot_20211214-172032_RocketChat.jpg

Screenshot_20211214-172032_RocketChat.jpg

When you try to log in it gives this error

Well that was easy

Now we find out who has been following instructions

Do we think this is a good idea to also do for the vetting server? Or do we tell the applicants that they can use the app and we need to start phasing out those instructions

The vetting server has working user hash script so it would benefit by having the apps disabled

Yeah I just checked the code it looks good.

We'll see what Thomas wants to do since I don't know if they're supposed to use the app or not

You have to do the same cloudflare firewall rule but for Patriot front us

@Matthew MN suggested we take victory down entirely

I think at 8cst and message Vincent

I think just general concern that it is not secure without a WAF. I am not sure how big of a risk victory being up is

I think we should leave it up and work on getting a WAF for all domains in near future

We dont have a timeline.

Screenshot_20211214-174756_Chrome.jpg

Screenshot_20211214-174756_Chrome.jpg

That's what this tasks is. This really isn't related to the API but more detecting and blocking any attacks

Yea. We'll look for a solution soon

@Vincent TX sorry to keep asking me to add stuff but let's add "log monitor for vulnerabilities and atracks with something like greylog"

Now that rock attack is entirely based in the browser I think we can increase the cloudflare security. Like when you go to the WordPress website from an out of us IP it does this

Screenshot_20211214-175103_Chrome.jpg

Screenshot_20211214-175103_Chrome.jpg

We could do this for both the rocket chat servers and victory from anyone who has an outside of us IP or for any location. It would make it a lot harder to DDos or hammer our api

We can add that as a task as well to strengthen the cloudflare protection On all servers @Vincent TX

Yea me too

You might have to whitelist on cloudflare the victory server so when the victory server tries to communicate with the main server it doesn't have to wait for cloudflare

Nginx and rocketchat

Mostly nginx

Is it possible to run greylog on the same server that it's monitoring

So we can sort of just keep everything contained, then if there is any issues we can have it send messages to the rocket chat server and then just delete any personal identifying information

Since you have some experience with it can you do custom scripting with it like say a log entry comes in and I'm looking for a certain endpoint and I want to process something with the IP address

I don't mind long lists as long as priorities are set.

We're just changing a lot of stuff right now and things are coming up that I don't want us to just forget about

I was wondering if I need to write something custom to monitor the logs because I want to know when someone joins a channel or the server and what IP they're using and what the user agent is and if they go to a different channel I want to do something with that too

I was going to write some crazy regular expressions for each added line to the log file and just try to monitor it somehow

@Thomas let us know when pf.us has the same cloudflare firewall changes done on it so we can mark it off our list

Cool, well I'll have to kind of work on this one together. What I think would be most ideal is if we had a central channel that all of these logs were processed and then put into so I could go into this channel and rock a chat and search for a user's name and it would tell me when he joined the channel and when he joined a different channel what IP address he was using it'll be hashed and the same thing for Mumble so we'll know when he joined Mumble and if it was with the same IP

So if you ever suspect someone we can just search their name and we'll get a whole report of all their activity

Log out of what

Hmmm just open up an incognito tab

Tested and it looks like it went through

It looks like cloudflare charges $20 a month for WAF per domain. Maybe some of us can look into other options but so far that seems probably the easiest to implement since we're already using it

@Vincent TX another.... Thing to add to the list of tasks is we need to determine the process for backing up the server just in case we lose our host. Do we back up messages and channels or just usernames and passwords and if so where is that stored, etc

653 total messages. Viewing 100 per page.
Prev | Page 4/7 | Next