foone , Englisch
@foone@digipres.club avatar

FUN FACT:
if you build electronic devices which contain a raspberry pi in them, consider what will happen if one of them gets thrown out.
someone might open them up, stick the microSD card in them into a reader, and open up that tantalizing "apps.json" file which has YOUR GOD DAMN AWS KEYS? IN UNENCRYPTED PLAIN TEXT?

lucasmz ,
@lucasmz@hachyderm.io avatar

@foone I wonder if TPM helps here

mark ,
@mark@mastodon.fixermark.com avatar

@foone But SD cards are that form factor specifically so you can smash them to powder so easily!

griibor ,
@griibor@mas.to avatar

@foone damn, where do you keep finding this cool e-junk?

foone OP ,
@foone@digipres.club avatar

@griibor A local e-waste place that my roommate has access to

scruss ,
@scruss@xoxo.zone avatar

@foone sure beats the collection of mediocre MP3s and two full-res DVD movie rips I found on a Raspberry Pi-based advertising interactive I used to maintain

adorfer ,
@adorfer@chaos.social avatar

@foone the RPI platform was never meant to be in a remote location. there is no TPM and providing USB based tokens is really hard to carry over remote dist-upgrades... speaking of dist-upgrades on RPI....

robert ,
@robert@irrelevant.me.uk avatar

@foone
Things are getting better.. I used to find database dumps featuring md5('123456') all over the place. https://blog.irrelevant.com/2011/07/data-breach.html?m=1
Only one result in Google today..

cdamian ,
@cdamian@rls.social avatar

@foone "someone"

waldi ,
@waldi@chaos.social avatar

@foone Can you get AWS to revoke published keys, similar to the way CA are supposed to do it?

stormy ,
@stormy@furry.engineer avatar

@foone I'm pretty sure Google is starting to take a more proactive stance on leaked keys but you can probably still find newly minted ones in GitHub every five minutes. Same is true for the other cloud providers.

StarkRG ,
@StarkRG@myside-yourside.net avatar

@foone Email them back to the company with the subject line "I think you dropped your keys"

schrockwell ,
@schrockwell@mastodon.social avatar

@foone Funner fact: I accidentally did this with an Electron app. It packaged up my local .env file in the release. Imagine my surprise finding a .txt on my S3 instance from a well-meaning user.

foone OP ,
@foone@digipres.club avatar

it has been zero days since foone has opened up some old tech and accidentally gotten information she was not supposed to have.

foone OP ,
@foone@digipres.club avatar

It was literally the first file I opened

momo ,
@momo@social.linux.pizza avatar

@foone
Wait, wait, let me grab a bucket of popcorn first! This gonna be good!

Serene117 ,
@Serene117@mastodon.world avatar

@foone what was in it?

foone OP ,
@foone@digipres.club avatar

I did a little more searching. This raspi was running balenaOS which is a docker-containers-on-raspi thing.

Fun fact: If you pass environment options to a docker image you're building, they get stored in the config.v2.json file for that container!

So there's ANOTHER COPY OF THE AWS KEYS HERE!

eaton ,
@eaton@phire.place avatar

@foone i'm imagining planning meetings in which engineers ask, "Realistically, what are the odds any of us will work here when that bill comes due?”

foone OP ,
@foone@digipres.club avatar

anyway this is what I have:
https://www.linkedin.com/pulse/ari-introduces-wellness-detector-jonathan-burke/

Good news: That company/product doesn't seem to be active anymore. So these keys have almost certainly expired and been invalidated. I'm just gonna assume that and not check because I don't want to get in trouble for "hacking"

eaton ,
@eaton@phire.place avatar

@foone "wellness status: 403”

kastor ,
@kastor@shelter.moe avatar
iDave ,
@iDave@mastodon.me.uk avatar

@foone for a brief, glorious moment, I thought they were some kind of Next Gen Dreamcast Visual Memory Units.

jleedev ,
@jleedev@mastodon.sdf.org avatar

@foone just pipe them into github, it'll automatically cast remove curse on them

montar ,
@montar@mastodon.social avatar

@foone publish those keys.

gothodile ,
@gothodile@furs.social avatar

@foone reminded of the time I did infosec for [worldwide retail store] and how we would find AWS keys stored in plaintext on NETWORK SHARES every damn week.

llewelly ,
@llewelly@sauropods.win avatar

@foone a whale of a leak?

JLab8 ,

@foone counterpoint - if you have the device legitimately, you're supposed to have all the information within.

  • Alle
  • Abonniert
  • Moderiert
  • Favoriten
  • random
  • haupteingang
  • Alle Magazine