Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


SolusVM Audit Update - Page 2
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

SolusVM Audit Update

24

Comments

  • @mpkossen said:
    I'm really surprised Cloudmin isn't used by many providers. It's really undervalued and underestimated IMHO.

    Pricing for the paid version is very high. Quoted prices on website are per VPS

    Cloudmin 100 Instance Annual License $549.00

  • mpkossenmpkossen Member
    edited June 2013

    @ShardHost said:
    Pricing for the paid version is very high. Quoted prices on website are per VPS

    >

    Cloudmin 100 Instance Annual License $549.00

    It's not cheap, that's right. But on the other hand, how does it compare to Solus on an annual basis? I'd be interested in the numbers. I'm not too familiar with Solus' pricing.

    Also, from their shop (https://www.virtualmin.com/catalog/cloudmin/100):

    Please note: If you have enough virtual machines to make this product useful, you likely qualify for the Virtualmin Partner program, which provides significant discounts. Please contact us, so we can save you some money.

    So it may just get better ;-)

    Edit: just noticed that 250 VMs is $749/year. That brings down the price considerably compared to the above.

  • MaouniqueMaounique Host Rep, Veteran
    edited June 2013

    Solus is some 9 dollars per node. You cannot compare that with cloudmin.
    A node can host 100+ VMs if very large, while on cloudmin that would be at least 300 usd a year and in solus is 108. 3 times cheaper.
    Agreed, on smaller nodes, it might be worth it.

    On top of pricing, cloudmin is not that well tested, i found some serious problems with it while experimenting, but it looks promising.
    If they lower the price, it might be more widely used and will likely solve the problems that still exist.

  • @Maounique said:
    On top of pricing, cloudmin is not that well tested, i found some serious problems with it while experimenting, but it looks promising.
    If they lower the price, it might be more widely used and will likely solve the problems that still exist.

    I've been running with Xen for a while and never ran into any issues. Of course, no software is perfect and my experience with Cloudmin is limited. Never ran into problems with my service with Prometeus, though.

    I don't think they will lower the price, except when you have a large amount of servers. Not sure what kind of discount you will get, though.

    Even if it is more expensive, it may be just worth the investment. In my experience, its way more stable than SolusVM, has more features, doesn't invade your host node like SolusVM does and runs on many kinds of Linux/BSD.

  • MaouniqueMaounique Host Rep, Veteran

    If it runs on many kinds of unixes, that is debatable, i installed first on debian and found out it is not compatible with xen-pv that way, was insisting in hvm all the time.
    Then on ubuntu had other issue i dont remember, so only centos 5 worked out of the box with the xen kernel and all issues solved which is likely because they dont use it on other platforms much.
    We did investigate the possibility to get low pricing, they were not interested, probably we are not big enough.

  • jbilohjbiloh Administrator, Veteran

    Very worrying.

  • Tight lockdown, just turned into tight shutdown. My goodness

  • Its pretty easy to fix all these exploits that have been published, Fix em, backup, and hope for the best.

  • AlexBarakovAlexBarakov Patron Provider, Veteran

    Just locked out our solusvm completely.

    Hugely disappointed with them. On the other side, I was right in WHT - there are exploits in their whmcs modules as well.

  • Awmusic12635Awmusic12635 Member, Host Rep

    Couldn't this latest one be solved with a simple .htaccess ip restriction?

  • Reported to Soluslabs.

  • Response from soluslabs:

    Hi,

    Yes, We are working on this. Patch will be ready within couple of minutes

    I would suggest to disable the API from solusvm until our senior admin confirmation about the patch.

    Thanks

  • @fileMEDIA and then they need a patch to patch the patch. After last time they broke the fqdn, I don't have hopes of their patches.

  • just .htaccess the module directory as users do not need access to it.

    Thanked by 1anyNode
  • @FRCorey said:
    just .htaccess the module directory as users do not need access to it.

    Been doing this right from the start. Solus still needs to fix their stuff and would help them understand their "audits" are failing.

  • vldvld Member

    @FRCorey said:
    just .htaccess the module directory as users do not need access to it.

    This will NOT stop this vulnerability. rootpassword.php or other other vulnerable files are in root directory.

  • Awmusic12635Awmusic12635 Member, Host Rep
    edited June 2013
  • All the files have this vuln, not just rootpassword.php

  • Awmusic12635Awmusic12635 Member, Host Rep

    @Spencer

    Which is why I ip restricted the module folder and did this for the rest:

    http://pastebin.com/1hXjhn71

  • Awmusic12635Awmusic12635 Member, Host Rep

    I am just attempting to cover everything

  • Nick_ANick_A Member, Top Host, Host Rep

    So many people texted, emailed, or messaged me when the new one came out... Marginally funny but really just leaves me uneasy to ever turn this panel back on.

    RamNode - now fully managed by default.

  • SpiritSpirit Member

    @Nick_A said:
    RamNode - now fully managed by default.

    Ha, ha :) Ok, it's not funny but I can FEEL your "screw everything #(%?$"#%&/" tone here.

  • @Nick_A said:
    RamNode - now fully managed by default.

    Ill have to take advantage of that!

  • @Nick_A so are you going to OS install/re-install, those crap too?
    Oh my....

  • perennateperennate Member, Host Rep

    I have a VPS with Front Range Hosting and I'm a bit concerned. They said they added .htaccess to the "module directory", but their module is still accessible. And if they meant the /modules/ directory, clearly direct access to that directory is not needed (and actually wouldn't work) in the exploit, which sends the data to /rootpassword.php (which looks to be still accessible). Or is there something I'm missing?

  • Nick_ANick_A Member, Top Host, Host Rep

    @MorningIris said:
    Nick_A so are you going to OS install/re-install, those crap too?
    Oh my....

    No other choice if I want to keep existing clients happy and bring new ones in.

  • @Nick_A well, your servers are so well maintained that I never even have to open a ticket yet, so that's a plus..

  • BK_BK_ Member
    edited June 2013

    @Nick_A I completely forgot to mention, and I'm sure you've heard it numerous times, but let me say it before I forget: massive kudos on how you dealt with the situation.

  • EvoEvo Member

    At least, this exploit was not that obvious.

Sign In or Register to comment.