Author Topic: C# Aurora v1.12.0 Patch  (Read 45691 times)

0 Members and 1 Guest are viewing this topic.

Offline GhostIsGone

  • Chief Petty Officer
  • ***
  • G
  • Posts: 30
  • Thanked: 2 times
Re: C# Aurora v1.12.0 Patch
« Reply #45 on: December 14, 2020, 01:41:27 PM »
I got an AV hit as well, a checksum would be really nice here  ;D
 

Nick White

  • Guest
Re: C# Aurora v1.12.0 Patch
« Reply #46 on: December 14, 2020, 05:15:35 PM »
For some reason, Windows defender seems to think there is a virus within the patch.  It says CyrptoInserter.
 

Offline Nori

  • Bug Moderators
  • Lt. Commander
  • ***
  • Posts: 234
  • Thanked: 42 times
  • Discord Username: Nori Silverrage
  • Bronze Supporter Bronze Supporter : Support the forums with a Bronze subscription
    2021 Supporter 2021 Supporter : Donate for 2021
Re: C# Aurora v1.12.0 Patch
« Reply #47 on: December 15, 2020, 01:11:29 PM »
For some reason, Windows defender seems to think there is a virus within the patch.  It says CyrptoInserter.
That's just defender being irritating and giving a false positive. If you check VirusTotal it only has one engine detect anything, which is pretty standard.
https://www.virustotal.com/gui/file/c068f21569ba2b73d63d742471ea17cbbfdd1ba279f1e25313fec8c718c60e86/detection

Unfortunately small projects like this tend to have the occasional issue with false positives.
To tell defender to ignore and let you download you can check this out:
https://www.ghacks.net/2017/11/23/how-to-handle-failed-downloads-virus-detected-issues-on-windows-10/
 

Offline csandazoltan

  • Able Ordinary Rate
  • Posts: 4
  • Discord Username: csandazoltan#5467
Re: C# Aurora v1.12.0 Patch
« Reply #48 on: December 25, 2020, 04:11:53 AM »
I will not disable my antivirus, i have burnt myself with "false positives" before.
No offense but i don't know any of you!
I think the developer should address this, either modifying or providing an official checkshum to check whether it is an official release or it has some malicious inject.
 

Offline Zap0

  • Captain
  • **********
  • Posts: 405
  • Thanked: 503 times
Re: C# Aurora v1.12.0 Patch
« Reply #49 on: December 25, 2020, 10:24:59 AM »
People still use antivirus in 2020?

You can just upload the file to virustotal yourself, it'll hash the file and check it against their DB to see if it was already checked. If it wasn't, it'll take a few moments to upload and run their checks.

That said, if you downloaded the file from elsewhere than this forum it's a good idea to do that check, there absolutely are malicious "mirror" sites out there that distribute malware pretending it's the download you want. Though identifying those is pretty easy and I doubt Aurora sees enough traffic for it to be worth it.
 

Offline Nori

  • Bug Moderators
  • Lt. Commander
  • ***
  • Posts: 234
  • Thanked: 42 times
  • Discord Username: Nori Silverrage
  • Bronze Supporter Bronze Supporter : Support the forums with a Bronze subscription
    2021 Supporter 2021 Supporter : Donate for 2021
Re: C# Aurora v1.12.0 Patch
« Reply #50 on: December 25, 2020, 02:57:05 PM »
I will not disable my antivirus, i have burnt myself with "false positives" before.
No offense but i don't know any of you!
I think the developer should address this, either modifying or providing an official checkshum to check whether it is an official release or it has some malicious inject.
Here ya go, the file direct checked by 83 AV services and not one positive.
https://www.virustotal.com/gui/url/f01b12b08e25c9e21af057bf2aca1ae34c6001fa0ce9349628caa887e7153449/detection
 
The following users thanked this post: csandazoltan

Offline Droll

  • Vice Admiral
  • **********
  • D
  • Posts: 1704
  • Thanked: 599 times
Re: C# Aurora v1.12.0 Patch
« Reply #51 on: December 25, 2020, 07:23:57 PM »
I will not disable my antivirus, i have burnt myself with "false positives" before.
No offense but i don't know any of you!
I think the developer should address this, either modifying or providing an official checkshum to check whether it is an official release or it has some malicious inject.
Here ya go, the file direct checked by 83 AV services and not one positive.
https://www.virustotal.com/gui/url/f01b12b08e25c9e21af057bf2aca1ae34c6001fa0ce9349628caa887e7153449/detection

https://www.virustotal.com/gui/file/da25edb9a0a092ceef5b4a14b3edb23b5e1a33ae2b6e4e741c8eb0f0312d171f/detection

Looks like theres 1 hit now
 

Offline QuakeIV

  • Registered
  • Commodore
  • **********
  • Posts: 759
  • Thanked: 168 times
Re: C# Aurora v1.12.0 Patch
« Reply #52 on: December 26, 2020, 02:49:51 AM »
We should certainly not disregard the possibility that someone actually managed to get into the forum database and add something spicy to the aurora executable sometime after Steve uploaded it.  I too am in favor of an MD5 (well, strictly if we want to be secure we should use something other than MD5 since thats been cracked, so a careful hacker could cover their tracks fairly easily compared to a SHA hash or something).
 

Offline db48x

  • Commodore
  • **********
  • d
  • Posts: 641
  • Thanked: 200 times
Re: C# Aurora v1.12.0 Patch
« Reply #53 on: December 26, 2020, 12:27:07 PM »
We should certainly not disregard the possibility that someone actually managed to get into the forum database and add something spicy to the aurora executable sometime after Steve uploaded it.  I too am in favor of an MD5 (well, strictly if we want to be secure we should use something other than MD5 since thats been cracked, so a careful hacker could cover their tracks fairly easily compared to a SHA hash or something).

MD5 can't just be cracked; that's not really a big concern. I could go into all the details, but suffice it to say that while it is a concern, it's not a very big concern.

The real concern is that if someone can replace the executable with one that has a virus or malware, then they could also just replace the hash that shows up on the page with the hash of the infected executable.

Still, here are the SHA-256 sums of all the rar files I've downloaded:

Code: [Select]
d3bb77c8b565b607908d7461f4e00886f6e621d5a273e4d9645666b6608c7647  Aurora1100.rar
61777018f5e39a536285e4cb86cc730d8df323539b1bf4c4e68736b786423bde  Aurora1110.rar
c068f21569ba2b73d63d742471ea17cbbfdd1ba279f1e25313fec8c718c60e86  Aurora1120.rar
bcc799b92516462b58a30184b929fca8137b99e4aada4f4ed7e051f8c64582b5  Aurora120.rar
087ff86db71285eea77c2b19d4524207c03ab32fca2fd9554e3f102fc3e23714  Aurora130.rar
1979034f29b446c69ab6f914a2f10cef9bee4b1323168fedadd70462c139260e  Aurora140.rar
e8f3226f2e786aa04d0b7b84fb5207b831392feb54ee9ab9c14905c5bb159b47  Aurora150.rar
f40f5b1726e933406c61c38d7f916c0d34956041017d7e9ca6ed1cf950dc24c5  Aurora151Full.rar
74937b87cb49b6b272f30c8c3d83d0b436911ca0e2c5009653d2bdc1f861ec84  Aurora151.rar
81eb173a01ef4487ef81adacd20a7d6c3a719fde8bd0572d9b52a57891495873  Aurora161.rar
047332305c98972cb8d3a015d8b18be71cbe8bae466d00aa8a3549de3fc65002  Aurora162.rar
b7791892d8370cc8751f96f2980eaf90b59ec3dd972a525d65df5cf2028c2017  Aurora163.rar
c1d0255971af1272cf8fc3005c5047cd69b2cdc0042c9f9abc0e622f5413b457  Aurora170.rar
f78599b76673245de1331096092008d44ab9e1c692d2cdd8d8d32c58a9ac9318  Aurora171.rar
1c703fb71670118520243f53e8af7ffd172b7914ceb6276c02593f8650780ab1  Aurora173.rar
35e0f1042599b1b3c7f6e5aa3e932a4cf1ae42c8b9f1838bd2cbc93c892cd64a  Aurora180.rar
31fb9dd89a8d942c555570183edd7808936309be810e86103b33f52f2dd8607e  Aurora190.rar
943563d33b1b9a6f097e555a079f4a29bd213fa1d3d01798fb2f491d59c6a099  Aurora192.rar
6f4c00c02facdc5e19935b17783eb5dd41c8aa774dff036081ef91ed3ef34761  Aurora193.rar
4cf957b1f18910508f78cfd0e39c55c02009aefcbde9dd413d1fdcfd07e8920b  Aurora194.rar
1b316b4d2fe2ba684eff4d6c499f3fb5e634aa67f10e1e1edf41799f6bd940c6  Aurora195.rar
9d62c14e7f49b1bcbbfb0a4043355e08f36121d2f6d79c89e48c3c1dfbdcdb0b  AuroraV100.rar

I downloaded each of these the day they were announced, so if any of them are infected by anything then the attacker is really on the ball. But remember, if an attacker can replace the executable on the website then they could just edit this post. It's not likely that I would notice, since I am unlikely check back to this post regularly, or to have memorized the correct hash values. But I just double-checked, and downloading Aurora1120.rar again gives me a file with the same hash as the one I downloaded on day one, so I hasn't been modified. But remember, it is possible for the webserver to be hacked so that it serves different rar files to different people. Maybe the attacker deliberately made it send uninfected rar files to people who had already downloaded the uninfected rar file, and only sends the infected rar file to people who have never downloaded it before. Constant vigilance!

Reasonable paranoia aside, I think this is pretty safe.
 
The following users thanked this post: csandazoltan

Offline Erik L

  • Administrator
  • Admiral of the Fleet
  • *****
  • Posts: 5657
  • Thanked: 372 times
  • Forum Admin
  • Discord Username: icehawke
  • 2020 Supporter 2020 Supporter : Donate for 2020
    2022 Supporter 2022 Supporter : Donate for 2022
    Gold Supporter Gold Supporter : Support the forums with a Gold subscription
    2021 Supporter 2021 Supporter : Donate for 2021
Re: C# Aurora v1.12.0 Patch
« Reply #54 on: December 26, 2020, 01:54:36 PM »
We should certainly not disregard the possibility that someone actually managed to get into the forum database and add something spicy to the aurora executable sometime after Steve uploaded it.  I too am in favor of an MD5 (well, strictly if we want to be secure we should use something other than MD5 since thats been cracked, so a careful hacker could cover their tracks fairly easily compared to a SHA hash or something).

The file is stored completely separate from the forum software and files.

Offline Migi

  • Captain
  • **********
  • Posts: 465
  • Thanked: 172 times
Re: C# Aurora v1.12.0 Patch
« Reply #55 on: December 26, 2020, 06:10:31 PM »
There have been quite a few people comment about the download being flagged as a virus on the Discord.

Reasonable paranoia aside, I think this is pretty safe.
For what it's worth the SHA of 1.12.0 I downloaded a few days ago matches the one in your post.
Unfortunately I'm away from my normal computer so I can't check the files I originally downloaded.

We should certainly not disregard the possibility that someone actually managed to get into the forum database and add something spicy to the aurora executable sometime after Steve uploaded it.  I too am in favor of an MD5 (well, strictly if we want to be secure we should use something other than MD5 since thats been cracked, so a careful hacker could cover their tracks fairly easily compared to a SHA hash or something).

The file is stored completely separate from the forum software and files.
The storage location doesn't affect any modifications made to the file during transit, and only protects the file vs the post to the extent that different passwords are (or should be) needed to affect both areas, although I'd guess there is an admin account somewhere that can affect the whole shabang.
Speaking of passwords are any of them aurora123?   ;D

On a more serious note have you considered adding TLS/SSL for the forums?
That would ensure that communication between the browser and the server is secure and that messages between them cannot be tampered with during transit.
The file path for the 1.12 patch is also on pentarch.org so I think it would also add security during file downloads.


The other thing which could be done is Steve could submit the file to microsoft and ask them to stop treating it as a false positive.
The relevant page is here: https://docs.microsoft.com/en-us/windows/security/threat-protection/intelligence/submission-guide
Obviously that's a bunch of work for him and I don't know how quickly they'll sort it out. It also might need to be done for every new release.
 
The following users thanked this post: Spaceman Spiff

Offline Erik L

  • Administrator
  • Admiral of the Fleet
  • *****
  • Posts: 5657
  • Thanked: 372 times
  • Forum Admin
  • Discord Username: icehawke
  • 2020 Supporter 2020 Supporter : Donate for 2020
    2022 Supporter 2022 Supporter : Donate for 2022
    Gold Supporter Gold Supporter : Support the forums with a Gold subscription
    2021 Supporter 2021 Supporter : Donate for 2021
Re: C# Aurora v1.12.0 Patch
« Reply #56 on: December 26, 2020, 08:14:20 PM »
We should certainly not disregard the possibility that someone actually managed to get into the forum database and add something spicy to the aurora executable sometime after Steve uploaded it.  I too am in favor of an MD5 (well, strictly if we want to be secure we should use something other than MD5 since thats been cracked, so a careful hacker could cover their tracks fairly easily compared to a SHA hash or something).

The file is stored completely separate from the forum software and files.
The storage location doesn't affect any modifications made to the file during transit, and only protects the file vs the post to the extent that different passwords are (or should be) needed to affect both areas, although I'd guess there is an admin account somewhere that can affect the whole shabang.
Speaking of passwords are any of them aurora123?   ;D

No, but that is the combination to my luggage :)

Quote
On a more serious note have you considered adding TLS/SSL for the forums?
That would ensure that communication between the browser and the server is secure and that messages between them cannot be tampered with during transit.
The file path for the 1.12 patch is also on pentarch.org so I think it would also add security during file downloads.
From the host, a dedicated certificate runs $100 a year with a $25 setup fee. See the Donations thread on why that probably won't happen :)

Offline Zap0

  • Captain
  • **********
  • Posts: 405
  • Thanked: 503 times
Re: C# Aurora v1.12.0 Patch
« Reply #57 on: December 27, 2020, 12:54:25 AM »
Can't use Let's Encrypt?
 
The following users thanked this post: QuakeIV, Spaceman Spiff

Offline TheTalkingMeowth

  • Captain
  • **********
  • T
  • Posts: 494
  • Thanked: 203 times
  • Gold Supporter Gold Supporter : Support the forums with a Gold subscription
    2021 Supporter 2021 Supporter : Donate for 2021
    2022 Supporter 2022 Supporter : Donate for 2022
Re: C# Aurora v1.12.0 Patch
« Reply #58 on: December 27, 2020, 02:24:58 PM »
We should certainly not disregard the possibility that someone actually managed to get into the forum database and add something spicy to the aurora executable sometime after Steve uploaded it.  I too am in favor of an MD5 (well, strictly if we want to be secure we should use something other than MD5 since thats been cracked, so a careful hacker could cover their tracks fairly easily compared to a SHA hash or something).

The file is stored completely separate from the forum software and files.
The storage location doesn't affect any modifications made to the file during transit, and only protects the file vs the post to the extent that different passwords are (or should be) needed to affect both areas, although I'd guess there is an admin account somewhere that can affect the whole shabang.
Speaking of passwords are any of them aurora123?   ;D

No, but that is the combination to my luggage :)

Quote
On a more serious note have you considered adding TLS/SSL for the forums?
That would ensure that communication between the browser and the server is secure and that messages between them cannot be tampered with during transit.
The file path for the 1.12 patch is also on pentarch.org so I think it would also add security during file downloads.
From the host, a dedicated certificate runs $100 a year with a $25 setup fee. See the Donations thread on why that probably won't happen :)

Or a self-signed certificate? Not particularly useful for proving identity, but....
 

Offline whollaborg

  • Able Ordinary Rate
  • w
  • Posts: 3
Re: C# Aurora v1.12.0 Patch
« Reply #59 on: December 27, 2020, 05:16:26 PM »
I have tried to run 1. 12 patch but its very sluggish! Also the 1. 11 coloured events are not colored any more.  Strange indeed!