Feeds

ProfitBricks budget cloud in SECURITY FAIL

Security pro spanks upstart's floppy policies

Beginner's guide to SSL certificates

Startup cloud company ProfitBricks has been lashed by a security researcher for some security screw-ups discovered after it revamped its prices to undercut Amazon Web Services.

In a telephone call on Friday, ProfitBricks cofounder Andreas Gauger confirmed that the masterimage of one of his company's Linux images had been built on an internet-facing computer, and that the company was going to inspect all available OS images for any net nasties that may have crept in.

The security howlers were highlighted by Kenneth White, who told The Register on Thursday that after hearing about ProfitBricks massive price reduction earlier in the week he began investigating the cloud, and stumbled on some serious problems.

White found that the 6.3 CentOS image had apparently been built on a public internet-facing computer.

"The fact that the equivalent of a trusted 'gold master' OS image was originally built on a public-facing box is unfathomable to me," White said via email. "Imagine if you put a naked Windows XP/WIn 7 box on the internet and *then* ran Windows update, over the course of two days. Would you trust that build to hold your sensitive data?"

ProfitBricks has acknowledged the problem, and Gauger described it as a "human error." ProfitBricks is putting measures in place to make sure it doesn't happen again, he said, stating that "in the future we will enforce the security policy more".

The company is inspecting all existing images, he said. "We are going through all the images now and making sure they don't have any vulnerabilities. ... certainly we have now to go through all the images and take some time and make sure no vulnerabilities [are] in them." On Sunday, ProfitBricks confirmed in a blog post that the images were fine.

Upon further investigation, White also flagged a number of alarming (in)security measures in place on the cloud. Some of the perceived flaws include the fact ProfitBricks generates root passwords for each Linux instance and emails the password to the account owner, that there isn't a way to push public SSH keys and go password-less pre-boot, that there is no firewall in place on instances by default, and that to gain console access to the VM through the ProfitBricks GUI you need to install Java on your laptop.

"It's just madness to send passwords and to have everything enabled by default on the hostile web," White said.

These policies jar with those present in the major clouds of Google and Amazon, for example, both of which have instances start in a secure non-listening state, with the admin opening up access manually.

Both companies also use keys rather than passwords which is far, far more secure. This means Amazon never need create or send a password to an admin, and instead through the use of key pairs an instance can be secured with risk distributed across both Amazon and the admin.

"On the other side here – for SSH, I think we can change this as soon as possible," Gauger said. "We are working on a signup process anyway right now. I hope we can get this into this project."

In the blog post on Sunday, ProfitBricks confirmed that moving to a private-public key pair is scheduled for a September 2013 release. However, the title of the post – "ProfitBricks and Transparency" – rather neatly leaves out any words likely to get a security-conscious admin to click, or indeed draw any kind of attention at all. ®

Beginner's guide to SSL certificates

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Do you spend ages wasting time because of a bulging rack?
No more cloud-latency tea breaks for you, users! Get a load of THIS
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.