RIP CBMHost

Author Topic: RIP CBMHost  (Read 4163 times)

The full keys were never obtained
They might as well have been. The key.dat files were stolen and Ipqµarx proved that it was totally possible for the full keys to be obtained from them.


rip legopepper's dogfight
nooo
my plane skills will start to diminish again D:

They might as well have been. The key.dat files were stolen and Ipqµarx proved that it was totally possible for the full keys to be obtained from them.
Cowboy already proved that only the first few characters were obtained from it.
I find it highly unlikely that all of those keys were hijacked yet none of them have reported suspicious activity yet.

Ahem, what? There was nothing fake about it. There was a huge security hole (The webserver had global read access) and someone exploited it to obtain the key.dat files of everyone using the service. Then, presumably using a method which was later discovered by Ipqµarx, they were able to reverse the hashing on the key files either by knowing the server's mac address, or had enough of the key.dat files to use an algorithm to narrow down possible hashes and then brute force it effectively.
This is 100% accurate, except for mentions of hashing, which are not used in keydat generation at all. It's a simple combination of 2 things, one which can be easily obtained and the other one which is a bit harder to get. It's already publicly available on the forums if you look around for it.

Cowboy already proved that only the first few characters were obtained from it.
I find it highly unlikely that all of those keys were hijacked yet none of them have reported suspicious activity yet.
Ahem, it was the last 3 characters that were shown. Not the first couple. It's possible to algorithmically generate the first 5, but the last 2 are actually the hardest to get, and the only way to get it without manually contacting the auth server is through the attack that I found. In other words, if they have the last 2 they have the rest as well. So yes, it is entirely possible that they got the full keys without actually using them.

It was bound to happen eventually, having to get so many donations every month would stop working eventually.


It was a fun time, and I'm glad I could run along Cowboy and help him. It was always a pleasure to provide support, even from the silliest of questions. 2012-2015. I'd say that's a pretty good run.

rip... i was so sad to get the email

http://nooooooooooooooo.com/

My heart is sad. Thanks for giving me the opportunity to host my own server and being awesome about it.

And are you absolutely sure that:
  • You can't make this a paid service rather than shutting it down?
  • You can't have someone else take over the service?
  • You can't find any other way to keep this up T-T?

http://nooooooooooooooo.com/

My heart is sad. Thanks for giving me the opportunity to host my own server and being awesome about it.

And are you absolutely sure that:
  • You can't make this a paid service rather than shutting it down?
  • You can't have someone else take over the service?
  • You can't find any other way to keep this up T-T?
This.


stopped visiting after every time i went on the slots were full

more like the fake key hijack
as i quote and badspot said himself
http://forum.blockland.us/index.php?topic=269222.0
Quote
The keys in the cropped screenshot are the actual users keys, not generated.
http://forum.blockland.us/index.php?topic=269222.msg7964862#msg7964862
maybe this is why people didn't want to donate to your "service", you can stop playing a huge security hole in your system as a whole big scheme
either way no matter how many digits of keys were leaked and i dont know if they were the full keys but this is still a huge security hole nonetheless, and it was CBMHost at fault
« Last Edit: March 20, 2015, 09:09:36 PM by Bin »

I'm on that list and I can confirm they are not generated