I'm on buf17 and still down. Guess they're not going in order (or my node was trashed worse).BUF19 as far as I can remember
As we finish up installing the new VPS' on the final machines I wanted to give an update. Within the next 5 hours, all OpenVZ VPS' should be installed and completed ready for you to restore.
We still have a few Xen machines that had severe damage to them, we are still going to working on them and will be ready tomorrow. I will make a decision tonight about compesation and release another email in the morning. We would like to thank everyone once again for all your patience.
Here at ChicagoVPS we want to ensure this will never happen again in the future. We are in the progress of working closely with a security firm for a complete audit over our infrastructure.
Thank you
The ChicagoVPS Team
"completed ready for you to restore" ???As we finish up installing the new VPS' on the final machines I wanted to give an update. Within the next 5 hours, all OpenVZ VPS' should be installed and completed ready for you to restore.
We still have a few Xen machines that had severe damage to them, we are still going to working on them and will be ready tomorrow. I will make a decision tonight about compesation and release another email in the morning. We would like to thank everyone once again for all your patience.
Here at ChicagoVPS we want to ensure this will never happen again in the future. We are in the progress of working closely with a security firm for a complete audit over our infrastructure.
Thank you
The ChicagoVPS Team
Who wants to bet they mean SolusVM's audit? Also, you'd think the security firm would have told them not to restore using the leaked root passwords.We are in the progress of working closely with a security firm for a complete audit over our infrastructure.
srichter, on 22 Jun 2013 - 04:07 AM, said: Quote We are in the progress of working closely with a security firm for a complete audit over our infrastructure.
Saw that and got really worried."completed ready for you to restore" ???
So .. no news about the backups at alll? :/
Use solus console to login then change password and key.ok so vps is back up but this is troubling: my ssh client is not warning me that the server's fingerprint has changed so I assume it matches what it was before the hack. However, I also cannot log in using ssh keys so not everything is the same (and I can't seem to log in using passwords either...). Can anyone provide some insight?
Yes, once solusvm is up again I'll just be wiping the install completely, but I still don't understand the current behavior.Use solus console to login then change password and key.
So basically they lied about everything, thanks Chris, and they have zero backups and we are on our own! That's fine but they should have said that to begin with and I wouldn't have trusted their TOS saying they "had" backups. So now I've been lying to my customers this entire time saying the company had backups of some and they might get it ha ha ha Thanks a lot cVPS.As we finish up installing the new VPS' on the final machines I wanted to give an update. Within the next 5 hours, all OpenVZ VPS' should be installed and completed ready for you to restore.
We still have a few Xen machines that had severe damage to them, we are still going to working on them and will be ready tomorrow. I will make a decision tonight about compesation and release another email in the morning. We would like to thank everyone once again for all your patience.
Here at ChicagoVPS we want to ensure this will never happen again in the future. We are in the progress of working closely with a security firm for a complete audit over our infrastructure.
Thank you
The ChicagoVPS Team
The slices that are back up use whatever password *solusvm* has for you (nothing restored - they reinstalled over my chicago slice that was back down). So the password is whatever the hacked file says it is, ironically. IE if you changed your password using "passwd" they don't have it, so they couldn't reset it to that password, and they *didn't* reset all passwords even though they should; and I agree, I am not actually using these slices until I can reimage a fresh install on and change the password *immediately*. If you want to see what they brought up, dig up the initial email from when they provisioned you and it should have the password that is currently on the slice. Not sure why your key didn't change though - all of mine did; that might be a client issue on your end with it not alerting you.ok so vps is back up but this is troubling: my ssh client is not warning me that the server's fingerprint has changed so I assume it matches what it was before the hack. However, I also cannot log in using ssh keys so not everything is the same (and I can't seem to log in using passwords either...). Can anyone provide some insight?
I don't think it's a client issue. The last write to my ~/.ssh/known_hosts was about a month ago, I've visually confirmed the fingerprint in ~/.ssh/known_hosts and the new one presented to me match, and my client alerts me if I change a key on a different server.Not sure why your key didn't change though - all of mine did; that might be a client issue on your end with it not alerting you.