amuck-landowner

Search results

  1. Aldryic C'boas

    SolusVM database dump, what is in a full dump file

    I can't stop hearing "Huge... tracts of land" now <_< 
  2. Aldryic C'boas

    SolusVM database dump, what is in a full dump file

    Ahahahaha, bloody hell.  A node with 300GB of "physical" RAM?  Must be one hell of a chassis :P
  3. Aldryic C'boas

    SolusVM database dump, what is in a full dump file

    Sorry sir, I don't have the DB.  I'm sure it'll turn up eventually though.
  4. Aldryic C'boas

    SolusVM database dump, what is in a full dump file

    @ Welp... wasn't originally gonna say anything.  But I have a new query for those of you that were curious about his claims that "there was no more oversell". SELECT nodes.nodeid, nodes.name, COUNT(vservers.vserverid) as vservers, SUM(vservers.ram)/1073741824 AS ram FROM nodes, vservers WHERE...
  5. Aldryic C'boas

    HOW-TO: Protect from recent SolusVM exploits.

    There's a reason I chose to use my full name here (and WHT) as opposed to just 'Aldryic'.
  6. Aldryic C'boas

    HOW-TO: Protect from recent SolusVM exploits.

    I agree fully. And while I doubt we'll do the pubkey offload, what we're planning on doing with Stallion2 is setting a random root pass on the node, and not sending it via email/etc. The New VPS email will simply instruct the client to login, set a root pass for the VM, and then continue use...
  7. Aldryic C'boas

    HOW-TO: Protect from recent SolusVM exploits.

    Never was a fan of replacing one line of code with... 28. All you're needing is a random alphanumeric, which PHP cannot easily provide (And then you have to screw with php blocks in smarty, never fun). Generating a random number, then md5/SHA'ing that to 'randomize' it further with...
  8. Aldryic C'boas

    HOW-TO: Protect from recent SolusVM exploits.

    Nah, by all means go for it :P I wouldn't have posted it publicly if I didn't want folks to use it :3 General rule for my code is - if I post it publicly, anyone can use it as they see fit.
  9. Aldryic C'boas

    ChicagoVPS / CVPS Hacked. New SolusVM exploit? (Content Restored) [PT. 1/2]

    He means that the source of the claim is untrustworthy, and should not be taken at face value just because of the situation at hand.
  10. Aldryic C'boas

    HOW-TO: Protect from recent SolusVM exploits.

    We generate a random, uneditable password when any order is placed, correct. Primarily to force clients to set a new root password themselves afterward (unless they actually want to remember a random string &lt;_&lt;) as a security precaution. That's not a module/etc setting though - just a...
  11. Aldryic C'boas

    HOW-TO: Protect from recent SolusVM exploits.

    Root passes are viewable? O_o That is straight-up disastrous - they're either storing root passes in plaintext, or merely displaying the WHMCS 'password' field (also plaintext), which is absolutely useless after running `passwd` on the VM (like people should be doing).
  12. Aldryic C'boas

    HOW-TO: Protect from recent SolusVM exploits.

    Hah, nice. Looks like they've made some major improvements (as far as options, at least) on the module. Only reference I had was the module we worked with a couple years back that just threw this big nasty blob into the client area; no ability to enable/disable certain features.
  13. Aldryic C'boas

    HOW-TO: Protect from recent SolusVM exploits.

    Does the SolusVM WHMCS plugin allow changes to rootpass/hostname/etc? If so, you may want to try and disable that, just in case they're not sanitizing input <_<
  14. Aldryic C'boas

    RamNode Down?

    &amp;nbsp; That's perfect, thanks. He only made one attempt? Edit, Unrelated: I guess I'm gonna have to break down and start using a 'proper' browser... links is butchering the hell out of the BBCode and quote attempts <_<
  15. Aldryic C'boas

    RamNode Down?

    If you would, make a text file of Robert's attempts to try it against you, please. I'm putting together similar information for Nick, as I believe he's going to pursue a criminal case on this. (You also might want to grep your logs for the googlecode bit I mentioned before).
  16. Aldryic C'boas

    RamNode Down?

    Assuming he didn't do the actual hit to begin with.  On a more amusing note, someone has been trying to use the http://code.google.com/p/slowhttptest/ tool from a couple different VPSes (I'll be emailing the providers shortly) to try and slam the exploit link with us.  Stallion doesn't have this...
  17. Aldryic C'boas

    RamNode Down?

    His affiliation with the LulzSec group (and other unsavories), to put it shortly.  From http://www.guardian.co.uk/technology/2011/jun/24/lulzsec-irc-leak-the-full-record : I tend to take issue with someone actively trying to turn negative attention towards our network.  There are other reasons...
  18. Aldryic C'boas

    RamNode Down?

      Pretty much the only sensible move the kid has made.  joepie and his ilk are exactly the sort you _avoid_ if you're trying to run a legitimate business.
  19. Aldryic C'boas

    RamNode Down?

    There's no doubt at all that Robert Clarke (the real kid, not the imposter(s)) was the one that attempted to run the exploit on us as well.  By his own admission (visible in his Twitter timeline, until he locked his account from public view a few minutes ago) he was "testing a bunch of...
  20. Aldryic C'boas

    RamNode Down?

    His service with us was ended due to an unrelated matter.  Privacy policy prevents me from going any more into detail on that.. but it had nothing to do with this :P 
Top
amuck-landowner