Install Steam
login
|
language
简体中文 (Simplified Chinese)
繁體中文 (Traditional Chinese)
日本語 (Japanese)
한국어 (Korean)
ไทย (Thai)
Български (Bulgarian)
Čeština (Czech)
Dansk (Danish)
Deutsch (German)
Español - España (Spanish - Spain)
Español - Latinoamérica (Spanish - Latin America)
Ελληνικά (Greek)
Français (French)
Italiano (Italian)
Bahasa Indonesia (Indonesian)
Magyar (Hungarian)
Nederlands (Dutch)
Norsk (Norwegian)
Polski (Polish)
Português (Portuguese - Portugal)
Português - Brasil (Portuguese - Brazil)
Română (Romanian)
Русский (Russian)
Suomi (Finnish)
Svenska (Swedish)
Türkçe (Turkish)
Tiếng Việt (Vietnamese)
Українська (Ukrainian)
Report a translation problem
You say that the IPCPassword was set, this is good, but it depends what it was, because if somebody set password as "asf" or something similar then the hacker could've simply guessed it right.
I'll take a deeper look if I see any way to actually skip providing IPCPassword to authorize the requests, but I doubt that this is possible. Rather I suspect misconfiguration or user's neglect.
Also, https://github.com/JustArchiNET/ArchiSteamFarm/wiki/IPC directly states that:
For example, IPCPassword will protect nothing if somebody configured his reverse-proxy to supply it automatically. Or if somebody configured ASF to trust nginx in known networks and he didn't protect his nginx against anti-bruteforce then attacker could've brute-forced the password through IP spoofing. There are a lot of factors, from what I observed majority of people do not give a single crap about security of their public ASF instances, it's easier to blame some unknown "exploit" rather than its own misconfiguration, neglecting to read the wiki and doing things right.
Of course if somebody has any proof or hint for me that ASF has a security issue which allows an attacker to skip the need of providing IPC password to every /Api endpoint, then I'll be welcome to hear it (while doing my own investigation), but for now I doubt in such possibility.
The fact that people are running insecure IPC instances is very common, I found it myself in https://github.com/JustArchiNET/ASF-ui/issues/1461 and as part of ASF V5.1.2.X I'm implementing additional measures to protect people from (their own) stupidity - but this isn't any security exploit in ASF, this is a particular misconfiguration that ASF will hopefully prevent automatically, and only a particular one too, not all possible.
It's very possible that people were not using IPCPassword at all, e.g. due to https://github.com/JustArchiNET/ASF-ui/issues/1481 issue (which is not really ASF's problem). This is also why I said multiple times that IPCPassword is the bare minimum, people using reverse-proxies to access ASF should at least have their own basic auth on top of it, which they didn't have.
As of now, I suspect that people used ASF-ui to modify global ASF config and had their IPCPassword removed, as per ASF-ui issue #1481 linked above.
They can claim anything they want to, I didn't find any way to skip a requirement of IPCPassword to access any ASF endpoint withot prior authentication, and I won't analyze specific setups to find what mistakes the user has made that lead to him getting hacked, that's what you pay security forensics for. There are a lot of possibilities what user could do wrong, some of them I listed in my post above. Until somebody presents me with a valid reproduction or proof that I'm wrong and it's possible to skip IPCPassword with proper configuration, I'll have to assume that it's user's neglect - especially considering we have linked issue that could be the root cause of that.
And this is on top of the fact that user didn't set up ANY additional security as ASF wiki strongly recommended when exposing IPC to the public. Even nginx basic auth would've stopped that.
Also released patched ASF version.