I know for my Access, i use a key ... i do not keep my cloud active, thats about the only thing disabled actually... service with them on EC2 is great to, VPS has no plain text pass, all of those have keyfile, then you have to convert the keyfile using putty , i guess the key could maybe be grabbed and ofcourse if they can access account and download the file, if the user is *still* using that.... i know my cloud service is off by default, so i wonder how this affects users on the amazon-management console ec2/free service.. i assume that cloud has to be active to be exploited... right?
On 7 November 2011 10:32, Jeffrey Walton <[email protected]> wrote: > On Sun, Nov 6, 2011 at 6:27 PM, Ivan . <[email protected]> wrote: >> http://www.crn.com/news/cloud/231901911/researchers-uncover-massive-security-flaws-in-amazon-cloud.htm;jsessionid=kT0u8aBKblF5Y14-kIidtA**.ecappj03 >> > "We had free access to all customer data, including authentication > data, tokens, and even plain text passwords," said RUB researcher > Mario Heiderich. "It's a chain reaction. A security gap in the complex > Amazon shop always also directly causes a gap in the Amazon cloud." > > Its very alarming that the passwords are stored in the plain text. It > speaks volumes to their security posture and [lack of] abilities. > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
