Security holes question.

**I'm posting here for some clarification on security issues related to the debate going on in another thread about a server hack resulting from someone installing a bad template.**

If a modification/template has a vulnerability in it, how does it become a server security hole unless someone knows that you are running dolphin and you have a vulnerable item installed?

Barring a hacker finding your dolphin install by some other method, wouldn't there need to be some method of broadcasting the wherabouts of the intended victim server after vulnerable items are installed?

Isn't there some method of protection/notification when random files are trying to make outbound connections.

Quote · 5 Mar 2009

designer2 this questions is pretty simple in regards to the thread your talking about.  In that thread, an individual uploaded a template to his site, that was intentionally designed for "Dolphin" that he did not obtain from the original creator of the template.  In this instance, he obtained it from a pirated software site. 

 

The individuals who passed the template around, installed their own code into the template knowing it would get installed on dolphin sites because that is what it was advertised for.  Therefore they were able to exploit the dolphin script with the site owners permission.  Templates are comprised of various types of files, css, php, java, flash & image files.  Any one of these can contain hacks that open the door and invite other sites in, moving right past any security the server has set up on it.

 

It does not matter how well you secure a server, if you place a code in your script giving permission everytime someone clicks on a page for it to do certain things then the security will assume that the human who wrote the program knows what they're doing and simply follow the order to allow it to happen.  Now, I haven't seen the exact template in question, though I would love to see it, but I am familiar with the modpack being passed around and it is nothing more than a ton of hacks designed to exploit previous versions of dolphin and place commands within the servers root section that allows it to cross from site to site in a shared environment.

 

You can attempt to secure your server from outbound connections by using the following:

 

mod_evasive

Bruteforce

mod_security

portsentry

 

But there is still no guarantee that it will stop everything.  In addition, if you do use those programs you run the risk of disabling your own RMS connections and other items that you do want running on your site, which means you have to create exceptions lists to allow them to run.

 

Now look at it this way, my site runs 482 Radio Stations and each needs it's own access to a seperate site to pull the streaming data.  Now I could set up 482 exceptions to allow them to run, but then we have the issue of Global Videos installed on the site and there is no quick way to do those exceptions as the list is constantly changing as to what is available. 

 

So the question becmes how do you set it up to protect it and manage to hold back the hackers without disabling the full site and/or it's features?  In the end, dolphin and the server settings do a pretty good job of this, but it's not perfect and never will be.  Creating an exceptions list is a daunting task and would require an actual human checking every single link, and that is nearly impossible for a site owner to do when you turn on the number of options some of our sites run. 

 

The best form of protection is to learn coding and what your looking for, check each mod before you install and pay attention to what your doing.  Spend time on your site and talk to as many people who join as you can, this is easier when the site is small, not so easy as it grows. 

 

Wish we had an easier way, but so as long as we have people who think they deserver free stuff then we will have people who will try to hack and beat up servers.

Quote · 5 Mar 2009

Thanks for explaining. I'm no coder beyond basic modding :)...but I can see what you mean... if there need to be connections, writing exceptions could be a huge/impossible task.

The client I am working with currently doesn't need RMS so I will look into setting up the security you mentioned on this job.

mod_evasive

Bruteforce

mod_security

portsentry

Thanks!

Quote · 5 Mar 2009

Be cautious with these items as if you do not set them up correctly they can cause all Ray items to not work, even those that don't use RMS.  You will need to modify the ray/modules/.htaccess file in order to allow them to make their connections still.

 

I strongly recommend you install 1 at a time, get it fine tuned to where it will work for you and then install the next and tune it.  If you install them all at once you will not know what is causing what and it will be a guessing game when it comes to tuning them.

 

 

Quote · 5 Mar 2009

Good advice, thanks!

.. just finished setting up cron and MYSQL scripts incremental backups ...that took a bit to figure out ...hopefully I'll sort the rest in time.

Quote · 5 Mar 2009

Also set up a virus scan for the entire site, something like clamav works great in a server environment and the host should do that for you.

Quote · 5 Mar 2009
 
 
Below is the legacy version of the Boonex site, maintained for Dolphin.Pro 7.x support.
The new Dolphin solution is powered by UNA Community Management System.