I know, I know, clickbaity title but in a way it did. It also brought in the situation in the first place but I’m just going to deliberately ignore that. Quick recap:

  1. I came home at 3pm from the city, my internet at home didnt work.
  2. checked multiple devices, phones worked out of wifi, I figured I need to restart the router
  3. I login to the router and it responds totally normal but my local network doesnt. (Its always dns, I know)
  4. I check the router log and see 100s of login attempts over the past couple of days.
  5. I panic and pull the plug, try to get into my server by installing an old monitor, works, many errors about dns
  6. Wife googles with her phone, seems I had https login from outside on and someone found the correct port, its disabled now
  7. Obviously, local network still down, I replug everything and ssh into the server which runs pihole as dns
  8. pihole wont start dns, whatever I do
  9. I use history and find I "chmod 700"ed the dns mask directory instead of putting it in a docker volume…
  10. I check the pihole.log, nothing
  11. I check the FTL log, there is the issue
  12. I return it to 777, everything is hunky dory again.

Now I feel very stupid but I found a very dangerous mistake by having my lan fail due to a less dangerous mistake so I’ll take this as a win.

Thanks for reading and have a good day! I hope this helps someone at some day.

  • carzian@lemmy.ml
    link
    fedilink
    English
    arrow-up
    92
    ·
    8 months ago

    Did you expose your router login page to the open internet? How’d they get access? Why are you chmoding anything to be 777?

    • haui@lemmy.giftedmc.comOP
      link
      fedilink
      English
      arrow-up
      16
      arrow-down
      5
      ·
      8 months ago

      There was an option that I had enabled years before and forgotten so yes, I didnt know but it was, on some obscure port.

      And yes, pihole in docker makes its files be 777 which is pretty disgusting, I know. Thats why I tried to make it 700 and broke my whole network.

      • lungdart@lemmy.ca
        link
        fedilink
        English
        arrow-up
        53
        arrow-down
        1
        ·
        8 months ago

        Doubt. You probably need to set the file owners in your volume to the same user running in the container.

        • haui@lemmy.giftedmc.comOP
          link
          fedilink
          English
          arrow-up
          4
          arrow-down
          15
          ·
          8 months ago

          You can doubt all you want. I changed it from 777 to 700 and back again because it broke. Couldnt find the user in the container immediately. Will probably just migrate it to a volume and be done with it.

          • prettybunnys@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            8
            ·
            8 months ago

            So we’ve poked a hole in your knowledge here unless this super popular open source software really requires 777 on those files and everyone has collectively just been ok with it.

      • 1984@lemmy.today
        link
        fedilink
        English
        arrow-up
        22
        arrow-down
        1
        ·
        8 months ago

        I think you are still learning… What you say doesn’t make sense, so I think you may have misunderstood what happened.

        • haui@lemmy.giftedmc.comOP
          link
          fedilink
          English
          arrow-up
          4
          arrow-down
          20
          ·
          8 months ago

          Imo we are all constantly learning. Otherwise we stagnate. What I say makes perfect sense, you just dont get it. So let me explain it again, in more detail:

          I was going through my docker compose files to sanitize them and upload them to my private forgejo instance.

          While doing that I found a directory in my filesystem, a remnant of the early days of my server where my knowledge was severely more limited, that was a docker volume mapped to a regular directory, something I wouldnt do today for something like this.

          It was owned by root:root and had 777 permissions which is a bad idea imo. So I changed it to 700 since I dont think I had any other users in group root and others, well.

          Nothing bad happened, until today when my unattended backups triggered a restart at noon and the tragedy started. I put it back for now to 777 but I‘ll try and integrate it in a real docker volume which resides in the docker folders.

          • Auli@lemmy.ca
            link
            fedilink
            English
            arrow-up
            14
            ·
            edit-2
            8 months ago

            Well I’m running Pihole in docker and don’t have 777 on anything.

              • Domi@lemmy.secnd.me
                link
                fedilink
                English
                arrow-up
                9
                ·
                edit-2
                8 months ago

                I don’t run Pi-hole but quickly peeking into the container (docker run -it --rm --entrypoint /bin/sh pihole/pihole:latest) the folder and files belong to root with the permissions being 755 for the folder and 644 for the files.

                chmod 700 most likely killed Pi-hole because a service that is not running as root will be accessing those config files and you removed their read access.

                Also, I’m with the guys above. Never chmod 777 anything, period. In 99.9% of cases there’s a better way.

                • haui@lemmy.giftedmc.comOP
                  link
                  fedilink
                  English
                  arrow-up
                  6
                  arrow-down
                  1
                  ·
                  8 months ago

                  Thanks for checking that. I will change the permissions accordingly and restart pihole to check if it works. Probably later today.

      • Possibly linux@lemmy.zip
        link
        fedilink
        English
        arrow-up
        43
        arrow-down
        1
        ·
        8 months ago

        Because you don’t have a way to know what’s been compromised. Take your data only and make sure to verify nothings been tampered with.

        Trust me it will be better in the long run.

        • haui@lemmy.giftedmc.comOP
          link
          fedilink
          English
          arrow-up
          3
          arrow-down
          25
          ·
          8 months ago

          Yeah, I dont feel like setting up a whole cloud infrastructure on a hunch. I‘m running like 15 different services and they are all compartmentalized. It would take weeks to reset all this. So far nobody got anywhere from what I can see.

            • haui@lemmy.giftedmc.comOP
              link
              fedilink
              English
              arrow-up
              3
              arrow-down
              7
              ·
              8 months ago

              Wow, a lot of people would set up a new server because of intrusion attempts in a log i guess. If I did that in a job I‘d get fired for doing nothing else but resetting everything every week.

              As an admin, you have to keep the CTO from using „master“ or „admin“ as the ssh password on a production server. Just so you know what level of stupidity makes the big bucks out there.

              • prettybunnys@sh.itjust.works
                link
                fedilink
                English
                arrow-up
                3
                ·
                8 months ago

                As an admin I’d question why the CTO has a login on a production server.

                You would do well listening more when you ask for advice.

                • lando55@lemmy.world
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  8 months ago

                  For Chiefly reasons of course. Now whether or not that server is active in the cluster is another matter entirely, but hey if it makes him/her feel important /shrug

      • Lem453@lemmy.ca
        link
        fedilink
        English
        arrow-up
        9
        ·
        8 months ago

        If you have everything on docker compose migrating to another host is pretty easy. I could probably migrate my 11 stacks of 36 containers in 2 to 3 hrs

          • lando55@lemmy.world
            link
            fedilink
            English
            arrow-up
            3
            ·
            8 months ago

            Figure ~45 minutes to run to the liquor store for a decent single malt, another ~25 minutes for the pizza rolls, quick power nap, wake up and redeploy. That’s about 2 hours.

            • Lem453@lemmy.ca
              link
              fedilink
              English
              arrow-up
              4
              ·
              8 months ago

              Pretty much this. Lot of padding in those numbers or waiting for some manual things to install etc

        • haui@lemmy.giftedmc.comOP
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          1
          ·
          8 months ago

          If everything works well, I could probably do that too. But I‘ve had too many obscure little things happen that 10x the amount of time needed so I always plan for the worst case.

          Also, my point was that people are being massively overreacting due to the fact that my logs showed signs of attacks, not intrusion.

          I run many servers and the commercial ones I am much more slow and careful with. Every public facing service has attacks in their logs and I deal with them. I know what experience you guys have but its not hosting public services.

          the arrogance with which people suggest someone is incompetent is baffling. Not talking about you but quite a number of comments where condescending af.

          Thanks for the advice with ansible. I might actually give this a go.

      • surewhynotlem@lemmy.world
        link
        fedilink
        English
        arrow-up
        5
        ·
        8 months ago

        Why would I start fresh?

        If they had access to a machine, the first thing you do is install some kind of root kit so you can get access again later. This could be as small as modifying an existing binary to do things it isn’t supposed to do.

        If they didn’t access any machine, your fine.

        • haui@lemmy.giftedmc.comOP
          link
          fedilink
          English
          arrow-up
          1
          ·
          8 months ago

          Thanks for elaborating. I appreciate it. To my knowledge, nobody had access to the network or the machine.

    • haui@lemmy.giftedmc.comOP
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      13
      ·
      8 months ago

      The owner was root and still is. I changed from 777 to 700 which broke everything. Sorry if that wasnt clear. I will switch to a docker volume to avoid having this crap in my hone folder in the future.

    • gaylord_fartmaster@lemmy.world
      link
      fedilink
      English
      arrow-up
      34
      ·
      8 months ago

      All you have to do to avoid this is just not open any ports except one for something like wireguard, and only access your network using it externally, and you will never have this problem.

      • haui@lemmy.giftedmc.comOP
        link
        fedilink
        English
        arrow-up
        8
        ·
        8 months ago

        Exactly. It wasnt on purpose either. I thought there was an additional layer of security, gullible as I was 5 yrs ago. They made it seem like there was.

    • lando55@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      8 months ago

      One of my home servers was popped once, they stuck a new MOTD on there to let me know how foolish I was and I haven’t made that mistake since. So… yay greyhat?

  • wise_pancake@lemmy.ca
    link
    fedilink
    English
    arrow-up
    9
    ·
    8 months ago

    I’ve adopted a policy of always ebetering my password wrong the first time.

    It started by accident.

      • wise_pancake@lemmy.ca
        link
        fedilink
        English
        arrow-up
        4
        ·
        8 months ago

        They can’t swipe your password if it’s wrong

        They could of course enter it on the target website and see it’s wrong though, so this only works against the crappiest phishing attempts

        • Auli@lemmy.ca
          link
          fedilink
          English
          arrow-up
          2
          ·
          8 months ago

          Except how are the swiping your password if it’s https? Unless your being phished but don’t see how that would help because they could just get your second password.

  • Decronym@lemmy.decronym.xyzB
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    8 months ago

    Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I’ve seen in this thread:

    Fewer Letters More Letters
    DNS Domain Name Service/System
    Git Popular version control system, primarily for code
    VPN Virtual Private Network
    VPS Virtual Private Server (opposed to shared hosting)

    4 acronyms in this thread; the most compressed thread commented on today has 11 acronyms.

    [Thread #616 for this sub, first seen 20th Mar 2024, 00:15] [FAQ] [Full list] [Contact] [Source code]