Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


Dedicatserver.ro aka Astimp IT Solution SRL silently logging into the customer server - Page 5
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

Dedicatserver.ro aka Astimp IT Solution SRL silently logging into the customer server

1235716

Comments

  • @dedicatserver_ro said:

    @alexvolk said: I don't trust a word from you) for what you're doing with your customer's servers.

    You literally lost your trust forever and keep your garden clean, also

    • again , why are you still my client ??

    I am asking for this host to be banned as well, what an incredibly shitty thing to do and answer.

  • @Stryp said:
    We're almost at pentaposting levels

    @default might speed up a little bit?

    @LTniger said:
    What an awkward situation. Let us get back to the Borta problem?

    I thought @dedicatserver_ro was helping Borta's problems?

    @starbetrayer said:
    I am asking for this host to be banned as well, what an incredibly shitty thing to do and answer.

    What actions are made to dodgy hosts at LET @raindog308 @jbiloh?

  • jbilohjbiloh Administrator, Veteran

    @alexvolk said: What actions are made to dodgy hosts at LET @raindog308 @jbiloh?

    Generally I leave the policing of offers in the very capable hands of our moderation team.

    Since I acquired LowEndBox and LowEndTalk we've really increased our policing of providers published on LowEndBox and those asking for Provider tags on LowEndTalk. That said it's still not a perfect process and we continue to improve.

    Thanked by 1alexvolk
  • MaouniqueMaounique Host Rep, Veteran

    We ask for the root password to make sure we have proof of the explicit permission when the customer asks us to do something

    @starbetrayer said: I alwqays though this host was shitty.

    I didn't even know about them until they shat in cociu threads. Then I saw how shitty they are.

    Thanked by 1jsg
  • This is how the provider thinks when he shat on cociu

  • @jbiloh said:

    @alexvolk said: What actions are made to dodgy hosts at LET @raindog308 @jbiloh?

    Generally I leave the policing of offers in the very capable hands of our moderation team.

    Since I acquired LowEndBox and LowEndTalk we've really increased our policing of providers published on LowEndBox and those asking for Provider tags on LowEndTalk. That said it's still not a perfect process and we continue to improve.

    You are totally not at fault here, it is not you that logged into the VPS of a client without authorization and lied about it.

    Thanked by 1Thundas
  • cociucociu Member

    @dedicatserver_ro is the best provider in Romania , you can store any porn because hi will see it and will masturbate. This is wat i want to tell only because is one of the active customer in all my threads. So go go go go buy his service , you will share your porn pics with them. Cheers.

  • deankdeank Member, Troll
    edited July 2021

    Translation: Alex was removed because his account had no porn.

    Edit: Shame on you, Alex. If you call yourself a man, have some porn.

  • @deank said:
    Translation: Alex was removed because his account had no porn.

    Edit: Shame on you, Alex. If you call yourself a man, have some porn.

    Sorry, my porn collection was involucrated two months ago...

    Thanked by 1intovps
  • deankdeank Member, Troll

    So, in the end, it all comes down to cociu.

    Thanked by 1alexvolk
  • How many tb of porn was that, sad cociu lost all that precious porn.

  • it's clear the meaning porn and masturbate
    cociu thanx

  • MaouniqueMaounique Host Rep, Veteran
    edited July 2021

    Next time Alex will store his porn at Francisco, lesson learnt.

  • coldcold Member

    @estnoc said:

    @cold said:
    NEVER trust or do business with Romanians....for them customers are not that important as money are, they don't even give a shit about bad reputation or bad feedback...

    big words,big words,chap. i know plenty of very honest romanians who are up to their promises for many years already. at least with me. to name some, m247 ro, nx-data and voxility guys. So, please dont call all romanians by bad names. there are lots of excemptions (majority) to those questionable folks we see threads almost weekly here at LET. like in any other country.

    well im also a Romanian guy, who left romania because of the good business people..u named 3 good I can name u 3 only here on LET who don't give a fuck.. only try to take customers money but don't hold up what they promise or treat customers nice. But I'm happy to hear that u know good Romanians, there a lot of them...but most not business people.

    Thanked by 1estnoc
  • NeoonNeoon Community Contributor, Veteran

    aaa> @cociu said:

    @dedicatserver_ro is the best provider in Romania , you can store any porn because hi will see it and will masturbate. This is wat i want to tell only because is one of the active customer in all my threads. So go go go go buy his service , you will share your porn pics with them. Cheers.

    Thanked by 1dahartigan
  • @Ahfaiahkid said:
    How many tb of porn was that, sad cociu lost all that precious porn.

    Thanked by 1Thundas
  • DPDP Administrator, The Domain Guy

    This sneakiness is not something that's to be taken lightly. Snooping around a customer's node for no apparent reason and then try to cover up the act by clearing .bash_history is downright dodgy and unprofessional.

    The provider should be banned without a doubt.

    But let's leave this to @FAT32 to discuss internally with @raindog308 and the other mods.

  • SirFoxySirFoxy Member
    edited July 2021

    @cociu said:
    @dedicatserver_ro is the best provider in Romania , you can store any porn because hi will see it and will masturbate. This is wat i want to tell only because is one of the active customer in all my threads. So go go go go buy his service , you will share your porn pics with them. Cheers.

    very inspirational thank u cociu

    the frog is night

    Thanked by 1dahartigan
  • So when will @dedicatserver_ro's provider tag be changed to 'shady provider' ?
    Another one joins the Hall of Shame.

  • Herein lies another validation for installing CSF, which I always configure to notify of console and root access. If I'm awake/online when it happens, then I can immediately monitor and/or take action.

    I involucrated an Indian Support Rep from eeyoukayhost (ain't gonna advertise the proper spelling) when he/she accessed without permission. Within a week, I had changed the UK provider for my main VPS. More recently, a provider needed to reboot a VPS, after some planned (network/node - can't remember) maintenance. They took it upon themselves to login, allegedly to check that it was up & running properly - rather than just ask. It was fine, I had the situation under control without their help, on the unmanaged service. I cancelled the VPS the same day.

    Thanked by 1dahartigan
  • @thedp said:
    This sneakiness is not something that's to be taken lightly. Snooping around a customer's node for no apparent reason and then try to cover up the act by clearing .bash_history is downright dodgy and unprofessional.

    The provider should be banned without a doubt.

    But let's leave this to @FAT32 to discuss internally with @raindog308 and the other mods.

    I agree 107 percent :-)

  • @AlwaysSkint said:
    Yet another validation for NOT using a provider's ISO/cloud-init for 'production' systems. Fine to use for test/network checking/settings but always build a server from minimal ISO and official sources. Yup, it's more time/effort but at least you get to decide disc layout/type and what is installed eg. backdoor ssh keys.

    [EDIT: typo fixed :p ]

    What? No. The lesson learned is to change root password.

  • @dedicatserver_ro said: from his home PC

    Do you even have any claim for that, be careful now, don't stumble over your own toes again ;)
    FAT32, who has always been impartial and fair in my opinion, has cleared that air. I understand that alex does not wish to expose any identifiable information either, therefor I see his censorship to be just.

    Do you REALLY need to login to a customers server/vps/container/dog to see if its sending out abusive traffic? Its almost like you don't even monitor your network. But yet so apt to 'history -c' after you're done spying on your customers without their consent.

    I'd rather trust my idling to a guy who loses his mangos and gets divorced from his turtles after some wind and rain.

  • @AlwaysSkint said:
    Herein lies another validation for installing CSF, which I always configure to notify of console and root access. If I'm awake/online when it happens, then I can immediately monitor and/or take action.

    I involucrated an Indian Support Rep from eeyoukayhost (ain't gonna advertise the proper spelling) when he/she accessed without permission. Within a week, I had changed the UK provider for my main VPS. More recently, a provider needed to reboot a VPS, after some planned (network/node - can't remember) maintenance. They took it upon themselves to login, allegedly to check that it was up & running properly - rather than just ask. It was fine, I had the situation under control without their help, on the unmanaged service. I cancelled the VPS the same day.

    Please share that more recent provider (PM if you prefer)

  • jsgjsg Member, Resident Benchmarker

    @cold said:
    NEVER trust or do business with Romanians....for them customers are not that important as money are, they don't even give a shit about bad reputation or bad feedback...

    @amadex1337 said:
    What are Somali Pirates in the sea, that are Romanians on the internet.

    What are inmates in a mental asylum, that are cold and amadex1337 on the internet.

    @yoursunny said:
    How to login to a server without leaving any trace?
    Asking for a friend.

    Not the way @dedicatserver_ro did ...

    @all

    @AlwaysSkint got it right. At the very minimum never use a system as robo-installed by a provider. Always install the OS yourself from official distro sources, if you know how to do that.

    Plus: always assume that any data on a machine that isn't yours is not really private, although a decent provider will respect privacy unless he has solid reasons to suspect a VPS being used for ill purpose or against TOS/AUP.

    Thanked by 1AlwaysSkint
  • @TimboJones said: What? No. The lesson learned is to change root password.

    That's a given: no-one with any bit of commonsense leaves the password, as assigned by a provider. In fact, given they should be using a minimal ISO to build a production server, it won't be stored anywhere in the provider's files (WHM, Solus, whatever).

    Thanked by 1jsg
  • @dedicatserver_ro said:
    for the good intent members:

    • every ISP is monitoring the traffic and looks at what happens in that traffic, if not the seller at the first hop then the provider in the next hop

    Fuck, that's just fucking stupid. There's a difference between watching who comes and goes from outside a house on public property, but you, you silly fuck, went right into the house without home owner knowing or giving permission.

  • AlwaysSkintAlwaysSkint Member
    edited July 2021

    @dahartigan said: Please share that more recent provider (PM if you prefer)

    Only some clues as to the provider: a Southern County of England known for creamed tea (and luncheon meat in Oz), selling Web services.
    With the benefit of hindsight, I may have forgotten to change the password on that particular nameserver, though I don't think so, given my previous posts.

    [Me said]Your policy conflicts with the normal: the expectation is you ask permission to access customer servers PRIOR to logging in via a console. This protects both parties. It is of particular importance where unmanaged services are being utilised.
    Had I not been monitoring for such activity, like presumably many, I wouldn't have been made aware of your bypassing of OS security.
    I do suggest that you review your practice in this matter; what is acceptable/expected of a managed service doesn't apply where customers are availing of an unmanaged service.

    [Support said]When xxxxxx was purchased by xxxxx any unmanaged service became managed. We didn't bypass any security. we used the VNC panel and then used your password which is stored on our backend this is an industry standard for anyone using whmcs as a billing/management system. all we get upon accessing vnc is a screen with no logged in user. All we then did was ping google and log out. We didn't access any data or proceed to check. Like explained on chat earlier we just checked that there was a connection in and out and that your password was working due to the issues we faced when restoring the vps's. We had to get virtualizor (softaculous) to access the host node and they applied a bug fix out of our control to help with the process. It is not normal that we access anyones VPS and we certainly don't have the power to bypass any passwords because KVM doesn't support that feature. We are very sorry you feel this way but i hope you can understand the reasoning why and the process of how we accessed the system.

    (The above reply is a tad contradictory and I know that in vmware, where the supplier didn't supply a console to the end user, they got root access. I don't know the ins & outs of Solus, virtualizor etc.)

    [Edited for formatting. And typos!]

    Thanked by 1dahartigan
  • MaouniqueMaounique Host Rep, Veteran
    edited July 2021

    @jsg said: always assume that any data on a machine that isn't yours is not really private

    1. Which is not on your premises which can only be accessed with a warrant;
    2. Which does not run any proprietary stuff (or even open source but without the ability to remove some apps or with changes you have no way to check for), even if it is yours;
    3. Which has no known vulnerability nor running some closed source shit or drivers and even then...;
    4. Which is not on an isolated network and only communicating fully encrypted with a fairly trusted other end.

    There are other issues but we get into too complicated things.

  • jsgjsg Member, Resident Benchmarker
    edited July 2021

    @AlwaysSkint said:

    [Support said]When xxxxxx was purchased by xxxxx any unmanaged service became managed. We didn't bypass any security. we used the VNC panel and then used your password which is stored on our backend this is an industry standard

    So, on top of being intruders they are stupid too? Storing users/customers passwords in clear text (or even slightly encrypted) is one of the riskiest and most dangerous things one can do. For that alone they deserve to be beat up and shamed publicly.

    Should it be true that WHMCS does not store good quality (min. SHA-256) hashes of user/customer passwords but clear text (or slightly encrypted) then the password known to (and possibly given by) the provider must be changed immediately after first login to the VPS!

    Btw: The following is the very minimum protocol that is acceptable:
    client - (password) -> provider, then provider side creating password hash using same salt as stored in password DB/file, then provider side comparing that hash to hash stored in password DB/file.

    Much better version: client side - (password hash) -> provider, then provider side comparing that hash to hash stored in password DB/file.

    Really professional and secure schemes go even beyond that and e.g. (1) provider provides (secret) salt 1 for password hash and salt 2 for future encryption salting, (2) upon each login provider provides sufficiently large random number which then is used for (3) client sending encrypted user name and password hash to server side which then (4) looks up user name and compares password hash. (Note: (1) to (3) serve 2 purposes: (a) encryption, and (b) randomization to make wire analysis much harder by transmitting each time wildly varying data for one and the same user name/password).

Sign In or Register to comment.