Someone scans the internet for NC/OC instances

Before starting some case with lawyers (like mentioned in the link above) I would prefer to collect the actual resulting problems with that checks and discuss if the benefits are worth these problems. Same thing with the existence of the mentioned status.php and the possibility to check the nc instance with it for good or bad reasons.

In the end Nextcloud GmbH has the possibility to make their decision considering the community opinion. Wanted or not that means an opened discussion, but as these two topics exist now it is opened anyway. So make the best out of it ;).

It is a marketing campaign to raise the installation count of Nextcloud.
In the case of the BSI, it is the misuse of an authority for private purposes.

I’m a bit surprised by this. Surely advertising software versions through a publicly available page is a poor security practice?

Not really, the other way around it would be security through obscurity.

But shouldn’t we usually take steps to ensure that the version information of our web stack is concealed, as far as possible? I thought this was good practice.

It seems at the very least like something that should be opt-in…

My guess is that it was meant as a nice gesture but devs didn’t really think things through and also communicated it badly.

But shouldn’t we usually take steps to ensure that the version information of our web stack is concealed, as far as possible? I thought this was good practice.
It seems at the very least like something that should be opt-in…

AFAIK certain services that use the API depend on it. Also I don’t think it really changes anything, most automated attacks don’t care about that and just brute force all the vulnerabilities ranging from newest to oldest.

Intentionally hiding version numbers is only security through obscurity and not really super useful.

If it helps it’s trivial to get the WordPress version a site runs generally also, which Google recently leveraged to send site console messages to admins informing them to upgrade from an insecure version.

I haven’t noticed these in my logs, but I might look for them now :slight_smile:

I’d have thought that security through obscurity is inadequate in itself, but not of zero value.

WTF? If a software company needs a federal agency to notify you about updates what does that tell about their update notification and update procedures? And if this were an advertisement for ownCloud users, this would be really really poor…

1 Like

I followed the German thread very lightly with imperfect translations. What exactly happens with this letter? Who are the providers who get it and what are they expected to do?

Nothing happened so far and in my opinion there is also no chance/reason that it will.

The results of the status.php scan were for germany forwarded to the german federal office for internet security (BSI) and they informed the respective ISP to inform at last the nextcloud operator.

So some people interpreted this as “attack” where actually just the anyway opened status.php was scanned. So in my opinion there is no chance (and also no reason) to harm Nextcloud GmbH in a legal way.
Also it is criticized that the federal office is used for private purpose in this case. But actually the BSI states on there website: “The BSI protects the networks of the Confederation; But it is also aimed at commercial and private providers such as users of information technology.” So it explizit also handles private providers and as nextcloud/owncloud is growing it becomes a more important share of public and private used web services. I don’t know what other “privat” cases the BSI normally deals with, but at least there is some argument that they could also use their possibilities to force nextcloud/owncloud operators to do security updates.

But of course so far I would also always prefer a transparent way of doing such and let people make their own decision about if/when they want to do their updates/security hardening. Of course some well published information about all that security topics should be there, which IS on docs.nextcloud.com and here in the forum.

I hope I got everything right so far :stuck_out_tongue:.

Except that you could be freaked out and just remove such hard-to-upgrade software.

I really don’t understand the purpose of this bizarre action, if you really worry about users and their setups, you could provide an online check like ssllabs for the SSL setup except very specific for Nextcloud. With your server address and an empty account, they can check the webdav functionalities (litmus test) and the version.

2 Likes

Here’s the email our provider got, apparently they sent lists of Own/Nextcloud instances to all providers. Not sure who sent the email, my provider won’t tell me that because multiple customers are involved. I removed the Nextcloud email address to protect against spambots etc.

http://pastebin.com/XPhxpUva

My main issue with this is that the abuse process is meant for actual abuse. Sending spam or hacking attempts things like that. Not patching your software is simply not abuse. If every software developer starts doing this providers are going to be very busy very quickly.

It would be great if Nextcloud stops this practice.

I really don’t understand the purpose of this bizarre action, if you really worry about users and their setups, you could provide an online check like ssllabs for the SSL setup except very specific for Nextcloud. With your server address and an empty account, they can check the webdav functionalities (litmus test) and the version.

I suppose this stuff is mainly targeted at users that wouldn’t even use an extra service like this because the either dont care or dont know. It’s not that hard to follow new releases. I mean: do you really want to know that you are running an old version if you are running an old version ;D?

Other actions could include:

  • Automatic updates (people will kill you)
  • Update nagging like showing popups to people every day for out of date installations

Problem in the past, update notification didn’t work all the time. When new updates were released, it was completely unknown if or when your update notification would trigger an update (so it’s not possible to tell if the notification stuff is working or not).

  • Automatic updates are a bit critical, but if updates happen to be very stable why not offering people to do this (wordpress can do it).
  • If you have a very old unsupported version, I wouldn’t mind an option to be set manually in the config-file that you need to enable this. This still gives you the option to run the old version in a local network. But if you have a public setup, you can’t say that you didn’t know.

If you have a very old unsupported version, I wouldn’t mind an option to be set manually in the config-file that you need to enable this. This still gives you the option to run the old version in a local network. But if you have a public setup, you can’t say that you didn’t know.

I don’t think it really matters how old the software is. Think of a version 10.0.1 which could have a very seriousy flaw which is fixed in 10.0.2 (the latest version in that case). So essentially you’d need to implement some sort of “Am I the latest version phone home functionality” which could ofc be opted out

There is far more going on with an app like Nextcloud than just SSL stating that a check with ssllabs in anyway validates anything but basic security.
With all the Libs, apps and code any version is highly likely to contain exploits, or at least exploits to be found.

I am not sure if making the version number available is a good idea at all, opensource is about choice and choice of version you run, choice of what sources you make available and choice over what is publicly on show.

Forced obsolescence and shaming are not about choice and not what Opensource in my books is really about.

I jumped on the Nextcloud bandwagon because I was really pleased to see some of my previous reservations about Owncloud seem to be dispelled.
I am starting to get worried again, as for me there does some to be some very strange and dubious decisions being made that don’t fit my vision of efficient user led software development and the benefits of the crowd.

I have used various OpenSource platforms and scanning and being targeted is common, happens on Wordpress, Joomla, Oxwall… Depends on the plugins, some plugins deliberately advertise your site, so Nextcloud is not alone.

Security through obscurity in terms of not publicly bearing all on the internet of what you are and what you use for a vast number of Nextcloud users who do very much fit into the category of (Too small, No profit to attack / hack, not worth the effort) and also less technically competent to have rapid version upgrading and updating.

You don’t sell support by telling the internet the versions being run by users, WTF!

This could be an option and by default it should be off.

3 Likes

I understand your frustration and its perfectly fine to vent it :wink:

However

I am not sure if making the version number available is a good idea at all, opensource is about choice and choice of version you run, choice of what sources you make available and choice over what is publicly on show.

I asked around and it’s needed for using the correct routes for public sharing and syncing.

Apart from that you are mixing things up. FOSS is about being able to change the source code and has nothing to do with buttons and options.

Patching software doesnt really have anything to do with planned obsolescence :wink: It’s not shaming, it’s the BSI helping you people that they could be subject to attacks. They probably know more than us and maybe automated attacks are already under way.

As an analogy: Samsung warning their customers that their phones could explode so they should return it and get a replacment for free is a good idea right?

This could be an option and by default it should be off.

Right, you could request that feature in the issue tracker where disabling support for the sync client would also turn off the status.php

1 Like

For anyone interested: I’ve dug a bit into the topic and facts and compiled a few things:

  • Scanning was conducted by an unrelated third party (in France if you look at the IPs)
  • The BSI contacted you guys in order to prevent you from automated attacks
  • Re-phrasing “please update your instance” to “please buy support from us” is a bit silly :wink: The BSI decided to help you out because they think it was important based on the information they had.
  • Openly propagating the version number looks bad at first but it essentially doesn’t change the attack surface. It’s in fact completely irrelevant for attackers because these attacks usually brute force vulnerabilities (it’s in fact easier to program it in that way and more effective).

Nothing to see here, move along, keep your stuff up to date, be lucky that this was not an attack :wink:

1 Like

For anyone interested: I’ve dug a bit into the topic and facts and compiled a few things:

  • Scanning was conducted by an unrelated third party (in France if you look at the IPs)

The Nextcloud scan page and their email address was posted in the email I haven’t received any response denying involvement so I’m pretty sure it has been Nextcloud.

  • The BSI contacted you guys in order to prevent you from automated attacks

They contacted the providers with a abuse complaint, not the people running the sofware. These complaints are not taken lightly by most, in one instance a provider threatened to blackhole the server if I did not resolve the issue asap.

  • Re-phrasing “please update your instance” to “please buy support from us” is a bit silly :wink: The BSI decided to help you out because they think it was important based on the information they had.

Agreed, although a marketing rep closing the discussion in the other thread likely brought that on.

  • Openly propagating the version number looks bad at first but it essentially doesn’t change the attack surface. It’s in fact completely irrelevant for attackers because these attacks usually brute force vulnerabilities (it’s in fact easier to program it in that way and more effective).

Nothing to see here, move along, keep your stuff up to date, be lucky that this was not an attack :wink:

I agree you need to keep your software up to date, however in the real world it does not work this simple all the time. We generally maintain a set update schedule and only divert if there is a serious issue. Some random software developer or agency does not get to decide this by attempting to force my hand hitting my provider with abuse complaints while noting actually happened.