Sysadmin

Knusper , in Microsoft leaks 38TB of private data via unsecured Azure storage

Gotta love these kind of news. There’s always these hypothetical discussions of clouds being insecure and companies generally just ignore that, because clouds are theoretically, sometimes cheaper.

And then every now and then, half the internet leaks out of one of these clouds and everyone’s like, holy crap, and then companies go back to generally just ignoring that, because clouds are theoretically, sometimes cheaper.

TheCee ,
@TheCee@programming.dev avatar

Unfortunately nobody in charge has seen consequences for their decision to save a few theoretical nickels, so far. But then again, a lot of software/IT related stuff would look completely different, if anybody did.

Knusper ,

Yeah, with the GDPR, you could theoretically get sued for using inappropriate technologies, but unless a proper expert committee officially declares Azure et al unsalvagable, you can always say, you thought you were using safe technologies.

sep ,

I do not think anyone belive clouds are cheaper. For a stable workload probably 2x as expecive. Especially when you also count the new finops department you need to know what you are actually paying for in the cloud.

What cloud do give is virtualy infinite capacity, infinite scale out performance, instant availabillity and scaleabillity up to a global presence, no up-front cost, no tear down cost, bragging rights, no long running contracts and api’s for EVERYTHING.

Edit: I did see you write theoretically ;)

x3i ,

Let me add another important point: outsourcing responsibility. In case of a data breach, you have someone to sue and you don’t need a whole internal team to be up to date on the latest security topics. Instead, they just have to be able to manage the web interface (not saying that is easy, just less subject to changes)

Default ,

Ding ding ding. It’s all about outsourcing accountability as much as possible. Always need a finger to point at if things go wrong.

XTornado ,

Given the average company I believe the cloud being more secure, of course they can shoot themselves d in the foot in the cloud as well but that wouldn’t be the cloud being insecure. The cheaper part… not sure if I would agree, it is more simple and easier to manage than your own physical hardware and all that entails, unless you require very little, that’s for sure.

Nighed , in Microsoft leaks 38TB of private data via unsecured Azure storage
@Nighed@sffa.community avatar

The exposed data included backups of personal information belonging to Microsoft employees, including passwords for Microsoft services, secret keys, and an archive of over 30,000 internal Microsoft Teams messages originating from 359 Microsoft employees.

In an advisory on Monday by the Microsoft Security Response Center (MSRC) team, Microsoft said that no customer data was exposed, and no other internal services faced jeopardy due to this incident.

jmcs ,

Wait, they stored passwords in plain text?

possiblylinux127 ,
@possiblylinux127@lemmy.zip avatar

Possibly or as a weak hash

elbarto777 ,

Always have done so.

🧑‍🚀🔫

clearedtoland ,

This is like the evolution of the “loss” meme. Gave me a chuckle.

raspberriesareyummy ,

Microsoft said that no customer data was exposed

Sure, we’ll just take your word for it, buddies. Cheers. /laughs in Linux

Random_user ,

You can use Linux and still have a Microsoft account.

Sinthesis ,

Microsoft owns GitHub. The blast radius for this could be severe.

raspberriesareyummy ,

Yeah, but the naivety of people believing in secure clouds needs to die. So if this helps, I’m all for it.

deegeese , in Cloudflare Unveils Free Privacy-Friendly Replacement to the Annoying CAPTCHA System
@deegeese@sopuli.xyz avatar

CAPTCHAs have been broken for quite a while now.

Google’s reCAPTCHA in particular is terrible and I fail it about half the time trying to guess what it thinks counts as part of a bicycle or not.

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

I always found it kind of ironic that the tool used to prevent robot traffic, CAPTCHA, is also used as a data source train robots.

I don’t want you getting through this lock, so I’m going to sit you down and meticulously teach you how to get through this lock…

Ragdoll_X ,
@Ragdoll_X@lemmy.world avatar

What’s even more ironic is that we basically don’t need human data anymore to create AI that classify objects or detect their boundaries. With algorithms like DINO we don’t even need labeled data at all, you just throw images at it and it learns on its own.

Google spent all this time collecting data through CAPTCHAs to train AI and now it might as well be obsolete.

JWBananas ,
@JWBananas@startrek.website avatar

Have you de-Googled or something? They only really nail you when you don’t have a signed-in Google account with real-world web usage, particularly if your connection originates from a flagged IP.

deegeese ,
@deegeese@sopuli.xyz avatar

Oh yes, how dare I visit a website without letting Google track me. Better block the user with a fake test in the name of security.

Rhaedas ,
@Rhaedas@kbin.social avatar

Some VPNs will definitely trigger reCaptcha, even if signed on to Google. I just have to hop over to another IP and suddenly everything is fine again.

veroxii ,

I’ve noticed I get the stupid recaptha way more since I swapped to Firefox. Even though I’m logged in to a Google account.

jonne ,

I get it a lot when I’m using our work VPN (which shows up as an AWS IP address). I guess if you’re using a VPN or a less reputable ISP you’ll probably get stung more often.

ugjka ,
@ugjka@lemmy.world avatar

They are broken because AI is better at solving these capthcas than humans. They are only stopping those spammers who can’t afford a gpu to break these catchas

NegativeLookBehind , in Microsoft leaks 38TB of private data via unsecured Azure storage
@NegativeLookBehind@kbin.social avatar

📎 “It looks like you’re trying to steal terabytes worth of data. Here, let me just give it to you!”

TheChefSLC ,

Lol! I used to pin him to my desktop. I loved having him for some reason…

KairuByte , (edited ) in You have a organizational identity right?
@KairuByte@lemmy.dbzer0.com avatar

Why would anyone ever use self signed certs? Buy a cheap ass domain, and use LetsEncrypt to get a free cert.

Sallp ,
@Sallp@lemmy.world avatar

If it is for internal only, self signed is a lot easier.

nickwitha_k ,

So is using “pass” as the password to all of your sensitive systems. Still not best, or even good practice.

JWBananas ,
@JWBananas@startrek.website avatar

Are you conflating self-signed and untrusted?

Self-signed is fine if you have a trusted root deployed across your environment.

nickwitha_k ,

Correct. If using actual pki with a trusted root and private CA, you’re just fine.

I took the statement to mean ad-hoc self-signed certs, signed by the server that they are deployed on. That works for EiT but defeats any MitM protection, etc.

KairuByte ,
@KairuByte@lemmy.dbzer0.com avatar

Hard disagree. As long as you have any machine with internet access it’s trivial, even more so if you can use DNS challenge.

SomeKindaName ,

You’re absolutely correct. For self hosting at home I use cloudflare for DNS challenges.

Caddy is also amazing at making things even simpler.

KSPAtlas ,
@KSPAtlas@sopuli.xyz avatar

Also probably no sysadmin uses it, but the Gemini protocol requires the use of a self signed cert

krellor ,

I use self signed certs for thinclient authentication. Generate self signed cert, load into AWS workspaces, sign device certs with root, and only machines that have the cert installed and pass the username password prompt will get through the AWS service broker. I can't see how using a CA signed cert helps me in any meaningful way. If I lose trust in the cert, I revoke it myself from the service.

nickwitha_k ,

Use of a CA (private CA would be my thought in this case) gives you greater ability to manage certs without needing to manually revoke and the ability to verify authenticity. You’re already doing most of the work to run a private CA, TBH. Just, instead of signing from the machine, you add your private CA’s intermediate cert to the trusted CAs on your hosts, and generate CSRs on your new hosts for your CA to sign.

Signing from the machine that uses a cert gives it greater authority and increases the “blast radius” if it gets compromised.

krellor ,

I do have a private ca service running on an internal ec2 instance, but all the AWS workspaces broker checks is if the device cert being passed by the thinclient was signed by one of the two signing certs you've loaded into the service, so the private ca itself still doesn't manage revocation in this case.

I do appreciate the suggestion. My main goal in sharing this use case was to show folks that there are many places certificate are used that let's encrypt isn't geared up to solve. Other examples are things like signing Microsoft API requests, etc.

Anyway, have a great day!

nickwitha_k ,

Oh fun. Thanks for sharing! Have a great day, yourself!

Fal ,
@Fal@yiffit.net avatar

Self signed certs are more secure. You don’t have to trust the whole CA chain

partyparrot ,

[Thread, post or comment was deleted by the author]

  • Loading...
  • Fal ,
    @Fal@yiffit.net avatar

    but they fix a lot more problems than they cause

    I didn’t say anything that disagrees with this. CAs are nice and convenient. They do this by expanding the chain of trust to a lot more people, hence making them less secure.

    Sure if you can’t securely manage your cert, that’s a problem. But that doesn’t mean let’s less secure

    Shadow ,
    @Shadow@lemmy.ca avatar

    Mtls across a large number of machines. I run my own CA and intermediates on hashicorp vault.

    For end user services, yes LE.

    KairuByte ,
    @KairuByte@lemmy.dbzer0.com avatar

    At the point of running your own CA with infrastructure in place to support it, I wouldn’t really call that “self signing.”

    I get that it technically is, since you’re not going through an external CA, but really it’s like calling a companies Datacenter “self hosted” because it’s on their own hardware. Technically the truth, but not what is generally meant. 😜

    Sandbag ,

    What’s LE?

    Shadow ,
    @Shadow@lemmy.ca avatar

    Let’s encrypt

    Gigan , in New Windows driver blocks software from changing default web browser
    @Gigan@lemmy.world avatar

    Windows can go fuck itself, I’m sick of their shit. Teams kept opening links in Edge even though it’s not my default browser. Found out that Teams specifically has a setting to ignore the default browser and use Edge anyway. The fuck is that about?

    Then I wanted to turn off the web search in the Start menu and I had to do a fucking RegEdit! They’re making it more and more complicated to not use their services, where’s the anti-trust regulations when you need them?

    wizardbeard ,
    @wizardbeard@lemmy.dbzer0.com avatar

    This is the norm. They have settings in Group Policy for a lot of this (sans the teams opening in edge, that is absolutely utter horseshit).

    The regedit you did (and most regedits to “fix” stupid default settings) is a manual version of the GP setting to just disable web search in the start menu.

    If you don’t use Windows with a Pro license, and you stay with Windows, next time buy a Pro license from a bulk OEM Pro License seller for cheap (or look up the latest way to spoof licensing and get it for free), and get access to Group Policy. It’s effectively Control Panel/Settings menu on steroids for corporate sysadmins.

    I swear that 80% of peoples complaints with Windows can be handled with Group Policy. Shit that it’s locked away from the average user, but the average user literally can’t tell the difference between web browsers if you make the shortcuts have the same icon.

    hemko ,

    Honestly, don’t buy Windows license. If you insist using that piece of malware, at least allow yourself a little bit of decency and just “pirate” it

    BombOmOm , (edited )
    @BombOmOm@lemmy.world avatar

    I swear that 80% of peoples complaints with Windows can be handled with Group Policy.

    One shouldn't have to go into the Group Policy screens just to restore basic functionality like 'use my default browser' and 'stop searching the web when I am searching my computer' and 'stop sending all my actions to your servers'. There is a reason people have been telling others to use Linux, rather than continue to put up with Microsoft's crap.

    CrayonRosary ,

    Install Pro or Enterprise, or Tiny10 and then go here and run the Power Shell script: https://massgrave.dev/

    And choose the first option. Takes a minute but then you'll be fully activated. If you don't trust the script, download it and check it yourself.

    Then you can use the Group Policy editor to turn a bunch of crap off that Home users aren't allowed to. I use Winaero Tweaker to edit all these things with a UI. It works even on the Home edition except for the few settings that require the Group Policy.

    DagonPie , in fuck Adobe and fuck their licensing
    @DagonPie@kbin.social avatar

    As someone that had to deal with adobe for 5 years for an 800 person studio. Fuck Adobe. For the rest of forever.

    Xepher , in Leaving VMware? Consider these 5 FOSS hypervisors • The Register

    The list for those that don’t want to read the whole article:

    1. Proxmox
    2. XCP-ng
    3. OpenNebula
    4. SUSE Harvester
    5. Oracle VM VirtualBox
    Dyskolos ,

    Thanks, but… Wow, who would’ve thought it’s the other major contenders.

    possiblylinux127 OP ,
    @possiblylinux127@lemmy.zip avatar

    Thanks

    Davel23 ,

    I like Virtualbox, use it myself in several instances but I would never consider it a replacement for VMware.

    ikidd ,
    @ikidd@lemmy.world avatar

    Virtualbox is painfully non-performant compared to anything KVM based.

    BigDanishGuy ,

    I use VirtualBox right now. My daily driver windows 10 guest is so slow, that pushing the start button comes with a 20s wait. Looking at the performance monitor while this is happening, nothing pops outs as the culprit. Plenty of resources left.

    I’ve always sworn to VirtualBox, but I’m going to ask my boss for a workstation pro license next time I see him.

    henfredemars ,

    Not even an honorable mention for QEMU?

    kylian0087 ,

    What i miss honnestly is KVM.

    lud ,

    I don’t know about the others but proxmox uses KVM.

    kylian0087 ,

    Ahh I didnt know that honnestly. never really used proxmox my self. thought it was its own thing. I do know that openstack ussage it as well.

    GewoehnlicherHamster ,

    I can relly recommend proxmox. Some years ago we switched from a 60.000€ dell VMWare Storage/Server-Setup to a three Host proxmox Setup for about half the price (to be fair, add 5-10k for Setup for our local Linux Team because we did not know much about proxmox). Mainly because we were able to place one of the Hosts in our Warehouse (connected with 10g Fiber) so there theoretically will be no harm to our production in case of water/fire/whatever in the server room because the one system can instantly take over (after some learning it works Like a Charm). I had some concerns regarding ceph, but for us it has proven Rocksolid, even while we had some real weird Switch issues it always recovered fast and without issues as soon as the connection was there. A big issue were the licensing terms for Microsoft products because with three amd-systems you have a lot of cores to buy licenses for - so we had a good excuse to substitute and cut out some products that only supported Windows environments.

    capt_wolf , in Microsoft leaks 38TB of private data via unsecured Azure storage
    @capt_wolf@lemmy.world avatar

    Microsoft said that no customer data was exposed.

    Well then, let’s break out the popcorn, this should be fun!

    Nighed ,
    @Nighed@sffa.community avatar

    As long as the data they lost doesn’t get more details, that get more detail that gets customer data… or anorher signing key…

    snooggums ,
    @snooggums@kbin.social avatar

    I am so glad that Microsoft always tells the truth so we can just take them at their word. It would be totally different if they had a history of lying and doing shady stuff.

    Sabata11792 ,
    @Sabata11792@kbin.social avatar

    That's what they all say before the customer data leak disclosure.

    Bishma , in Microsoft leaks 38TB of private data via unsecured Azure storage
    @Bishma@discuss.tchncs.de avatar

    Did Microsoft officially stop caring about security or is this more of a fad, like when everything was tiles for a while?

    Broken_Monitor ,

    We gotta give them a reason to care before they will do anything about it. How many companies have suffered major data breaches over the past 5 years with basically no consequences?

    possiblylinux127 ,
    @possiblylinux127@lemmy.zip avatar

    Just leave Microsoft

    Oh wait, everything depends on windows. Boy we have created a monster

    Broken_Monitor ,

    I can, but it would take a lot of effort to do so. I will look into it, but a lot of my video games still rely on Windows. However, for MS to change and care it would require a mass exodus on the corporate level, which will never happen.

    Nighed ,
    @Nighed@sffa.community avatar

    The more staff a company has, the more chance of mistakes/idiots.

    They should have scans to pick a lot of this up though.

    Zeth0s ,

    To be fair Microsoft has never cared much about security. See the windows server (a relatively niche os on servers) second entry in this stat: statista.com/…/major-operating-systems-targeted-b….

    It is just that nowadays this kind of issues are more in the news because of “russian cyber criminals”, while in the past no one really cared.

    Not that I complain… Visibility is actually a good thing

    LUHG_HANI ,
    @LUHG_HANI@lemmy.world avatar

    It’s not relatively niche on SMBs though. It’s a major target so it’ll always get hit.

    Zeth0s , (edited )

    It’s far less common than linux oses… In any type of servers, including data storages. It is THE major target because it is a bad OS, nowadays primarily used by companies that haven’t a good IT for file shares used by tech illiterates easily victims of social engineering attacks. It’s a explosive combination that results in that stat… Practically 100 % of successful ransomware attacks on servers is on windows servers, despite overall being much less used than competitors

    The_Mixer_Dude ,

    If you think that’s bad check out Apple right now

    quarksbarandgrill ,

    please, explain

    The_Mixer_Dude ,

    See Pegasus

    DarkDarkHouse ,
    @DarkDarkHouse@lemmy.sdf.org avatar

    That’s not an explanation

    The_Mixer_Dude ,
    DarkDarkHouse ,
    @DarkDarkHouse@lemmy.sdf.org avatar

    Yeah, neither is that.

    The_Mixer_Dude ,
    DarkDarkHouse ,
    @DarkDarkHouse@lemmy.sdf.org avatar

    Just more links. Come on.

    The_Mixer_Dude ,

    How many links do you need?

    satanmat , in But we used it at my last job!

    Get three envelopes….

    Yeah that’s a shirt move on his part to not bring you in. I can’t believe that his boss allowed it to go through

    housepanther ,
    @housepanther@lemmy.goblackcat.com avatar

    Glad the big boss sided with OP though!

    Tangent5280 ,

    Hi, what does the expression “Get three envelopes” mean in this context?

    MaxVerstappen ,
    Numenor ,

    A fellow had just been hired as the new sysadmin of a large high tech corporation. The sysadmin who was leaving met with him privately and presented him with three numbered envelopes. “Open these if you run up against a problem you don’t think you can solve,” he said.

    Well, things went along pretty smoothly, but six months later, there a major DoS attack against the infrusture and he was really catching a lot of heat. About at his wit’s end, he remembered the envelopes. He went to his drawer and took out the first envelope. The message read, “Blame your predecessor.”

    The sysadmin went to his superiors and tactfully laid the blame at the feet of the previous admin because of bad security. Satisfied with his comments, management responded positively, he sorted it all out, got the servers running again and the problem was soon behind him.

    About a year later, the company was again experiencing a major outage, combined with serious hacking problems. Having learned from his previous experience, the sysadmin quickly opened the second envelope. The message read, “Blame the cloud hosts.” This he did, and the company quickly rebounded.

    After several consecutive months of no downtime, the servers once again acted up. The admin went to his office, closed the door and opened the third envelope.

    The message said, “Prepare three envelopes.”

    some_guy ,

    I thought I recognized where this would go: Traffic [2000]

    reddig33 , in ICANN proposes creating .INTERNAL domain

    .local already exists. More idiocy from ICANN.

    pupbiru ,
    @pupbiru@aussie.zone avatar

    .local exists for a very specific reason and it’s not meant to be used by regular DNS… people use it for alternate things, but it’s reserved for mDNS

    if .internal were to be added, we could start using that instead of overloading!

    LordCrom ,

    .local is a bad choice especially if you have any MAC hosts on the network.

    There is an RFC about that, but I’m too sleepy to goook it up

    surewhynotlem , in Broadcom closes $69 billion VMware deal after China approval

    Next week’s news: broadcom increases the price of VMware licenses ten fold and halts all feature development.

    Source: they did it to Symantec. Broadcom is where tech goes to be milked to death.

    FailBait ,

    They do that on their own. VMWare would blow up every deal we tried working with Dell, and our account reps told us everyone in Dell despised the VMWare account teams. The company that struggles to make a shit that doesn’t suck?

    And that’s why we’re switching to OpenStack next year…

    mo_ztt , in Windows feature that resets system clocks based on random data is wreaking havoc
    @mo_ztt@lemmy.world avatar

    Informative article but it meanders about for way too long.

    • In some circumstances, Windows resets its clock based on the ServerUnixTime field of incoming TLS handshakes, for reasons that are not completely clear
    • OpenSSL puts random numbers in ServerUnixTime
    • Problem!
    • Disable via HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesW32TimeSecureTimeLimits

    See? That didn’t take long.

    flambonkscious ,

    So does that mean one needs to run NTP as well as the domain-based time sync, for when the donation based one fails?

    Seems weird. I wonder why they’re so cagey about it

    mo_ztt ,
    @mo_ztt@lemmy.world avatar

    Their official advice is to disable STS when using NTP.

    As for the explanation, I think it was just an example of bad decisions compounding on themselves.

    • Oh no, it’s difficult to sync time because the secure communication layer doesn’t work when our time is already out of sync. That’s okay, we’ll use a totally other dubious mechanism instead of fixing that.
    • Oh no, the dubious mechanism is giving us bad results sometimes. That’s okay, we’ll introduce weird heuristics to attempt the impossible problem of determining whether the dubious mechanism’s output is trustworthy.
    • Oh no, the heuristic fails sometimes. That’s okay, “We agree that the overall direction of technology with the adaption of TLS v1.3 and other developments in this area could make Secure Time Seeding decreasingly effective over time, but we are not aware of any bugs arising from their use. This technology direction also makes heuristic calculation of time using SSL/TLS far less attractive when compared to deterministic, secure time synchronization.”
    0v0 , in What non-evil DNS server do you recommend?

    Quad9, a Swiss public benefit, not-for-profit foundation. Main address is 9.9.9.9.

    beeng ,

    TIL, danke!

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • [email protected]
  • All magazines