💾 Archived View for cosmic.voyage › Voortrekker › 7-key-compromise.txt captured on 2022-01-08 at 14:13:48.

View Raw

More Information

⬅️ Previous capture (2020-09-24)

-=-=-=-=-=-=-

From: Soloviev, Nikolaos <nikolaos.soloviev@voortrekker.com>
To: Koenraad Gertodtenhaupt <kgertodtenhaupt@ross128-ventures.com>
Cc: Voortrekker Mission Support <voortrekker@expeditionsupport.gov>
Delivered-To: Koenraad Gertodtenhaupt <kgertodtenhaupt@ross128-ventures.com>
Received: from relay7.local.rs001.l4.earthsys.gov
    by inbound-1.exclusiveservices.net
    with ESMTPSA id 772525wpro10k1ex10d5
    for <kgertodtenhaupt@ross128-ventures.com>
Received: from relay4.qec8.ganymede.earthsys.gov
    by relay1.qec2.rs001.l4.earthsys.gov
Received: from qec5.helio.earthsys.gov
    by relay4.qec8.ganymede.earthsys.gov
Received: from qec.sv14417
    by qec5.helio.earthsys.gov
Date: 06 Sep 2421 07:21:11 +0000
Date-Local: 23 Mar 2419 10:45:11 +0000
Content-Type: multipart-alternative;
 boundary="__4gngb4li5euq647g0t9x_15486932_"
MIME-Version: 1.0
Subject: Key compromise

--__4gngb4li5euq647g0t9x_15486932_
Content-Type: text/plain; charset="utf8"

Koenraad: I've attached a new public key from my new keypair,
replacing the one which was leaked.

As to how that happened: Late yesterday I found out one of our
systems engineers did in fact survive, and I asked her to look into
it. Her report, her précis of which I've attached, indicates that
the commands to retrieve my private key from my secure storage came
to Voortrekker via QEC. She couldn't tell where they originated,
other than somewhere in Sol, but she's very definite that they did
come from Sol.

I've included Expedition Support on this message, to the attention
of their analysts. Combining their efforts with those of your own
people, I hope you'll quickly identify the source of this troubling
leak, and I look forward confidently to receiving your confirmation
that no such breach of security can recur.

In the meantime, you understand that I must protect the interests
of the Ross 128 Ventures board and shareholders, as well as my own
people here, and there is no telling what mischief might befall us
next if I do nothing. Accordingly, I've asked my engineer to have
our systems reject commands received via QEC for now. We've kept
read access enabled, so you can still request and receive data from
our systems, but no commands sent from home will be carried out at
this time.

This is a short-term measure only, to be reversed once confidence
in security back home has been restored. As I said before, I look
forward confidently to receiving such confirmation from you soon.

Nikolaos Soloviev
Director of the Board, Voortrekker GmbH
(a wholly owned subsidiary of Ross 128 Ventures, LLC)
nikolaos.soloviev@voortrekker.com

-------------------------------------------------------------------
From: Jennifer Story <jennifer.story@voortrekker.com>
To: Nikolaos Soloviev <nikolaos.soloviev@voortrekker.com>
Date: 23 Mar 2419 06:31:19 +0000
Subject: Re: Private key breach

Short version: It wasn't anyone here. The commands came in via QEC.

Long version:

Our network isn't in great shape since the crash. That's on me -
I've been mostly looking after the sick and injured, not the
systems, and with most of our department gone I guess there wasn't
anyone else doing that either. I should've checked closer.

Anyway. Great shape or no, I didn't think Jim would've left things
in a state where just anybody could get into your account. I
checked anyway, but I didn't find anything suggestive in command
history or logon records. Not even in the audit logs, and as far as
I know, the only one with enough access left to tamper with those
would be me.

Not saying I didn't, boss. I won't ask you to trust me blindly on
something this big. But ask around - I've spent almost all my time
working in the infirmaries we've set up, you'll find plenty of
people who can vouch for my whereabouts almost all the time since
the crash. Five minutes here and there in the head isn't enough
time to do the kind of work it'd take to invisibly tamper with
those logs. So either I'm telling you the truth, or I'm so
implausibly skillful at blackhat stuff that I'm an idiot to be out
here at all instead of back home living large on the billions I
could've stolen without half trying.

Anyway. Nothing I could find to suggest it was any of us, so the
next place to check was QEC logs. Here's what I found:

2419-03-22T21:19:08.119+0000 info [qec:recv]
  New message 1a04892cf9: received from qec1.helio.earthsys.gov
2419-03-22T21:19:08.121+0000 info [qec:recv]
  message 1a04892cf9: encrypted compressed data, 1204 bytes
  message 1a04892cf9: origin header: undefined
  message 1a04892cf9: envelope type header: command script
2419-03-22T21:19:08.124+0000 info [qec:recv]
  message 1a04892cf9: handing off to remote command shell (pid 330918)
2419-03-22T21:19:09.089+0000 audit [fs:enc]
  private store unlocked: nikolaos.soloviev (pid 330918)
2419-03-22T21:19:10.042+0000 audit [fs:enc]
  private store locked: nikolaos.soloviev (pid 330918)
2419-03-22T21:19:13.988+0000 info [qec:send]
  New message 1a04892cfa: from pid 330198
2419-03-22T21:19:13.989+0000 info [qec:send]
  message 1a04892cfa: encrypted compressed data, 2847 bytes
  message 1a04892cfa: destination header: undefined
2419-03-22T21:19:13.994+0000 info [qec:send]
  message 1a04892cfa: sent to qec1.helio.earthsys.gov

(I stripped out the headers where they didn't change.) I know you
don't read computer, boss - this is here for you to send back home.
Because, in people, it means that's where whoever hacked us did it
from Sol. I can't tell who it was - that "origin header: undefined"
means whoever did it didn't identify themselves, which - well, I
won't say it's impossible, obviously it happened. But I don't know
how to do it and, as far as I know, I don't know anyone who does.

Anyway, whoever it was, the commands they sent must've included a
key in your signing chain, because look at those audits from the
encrypted filesystem around 21:19:10. It unlocked your private
filestore and left it that way for almost a second. That's when it
pulled out your key, and who knows what else - we don't normally
run in debug mode because it takes a lot of storage and exposes
PII, so we don't know what other files might've been accessed. I
checked the access times, but didn't see anything from that time
span, because of course I didn't: whoever did this would know we'd
be checking, so they tampered with those too.

I'm about out of ideas, but they've got a lot more engineers who
can look at this back home than we have here. I saw a few people
from my department in the infirmary, but they're all still out, so
for right now all you've got to work with here is me, and I'm just
a junior engineer. Send this stuff home, boss. Maybe they can
figure it out.

If you or they have any more questions I might be able to answer,
you know where to find me - right now, that'll be in the infirmary,
sacked out for a few hours, and then I'm back to looking after the
ill. There's nothing else I can do with this anyway.

Sorry, boss. I'd give you more if I had it. But you need somebody
better than me on this.

Jennifer Story
Support Engineer I, Information Systems Department
SV 14417 Voortrekker
jennifer.story@voortrekker.com / x10219

--__4gngb4li5euq647g0t9x_15486932_
Content-Type: text/plain; charset="utf8"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename=nikolaos-soloviev.asc
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--__4gngb4li5euq647g0t9x_15486932_--