Jump to content

Password manager LastPass goes titsup: Users LOCKED OUT


Ponting

Recommended Posts

Please direct me ??:

Storing credentials at a 3rd party 'service' has always seemed highly undesirable to me - I'd rather keep mine to myself.

There was once a self-hosted app that I knew of which allowed stuff to be stored upon one's own hosting - but I lost track of that one and forgot to try it myself.

1Password can do this.

I looked all through their site and found no references to using one's own hosted space at all...

Thanks.

Link to comment
Share on other sites


  • Replies 33
  • Views 2.9k
  • Created
  • Last Reply

Please direct me ??:

Storing credentials at a 3rd party 'service' has always seemed highly undesirable to me - I'd rather keep mine to myself.

There was once a self-hosted app that I knew of which allowed stuff to be stored upon one's own hosting - but I lost track of that one and forgot to try it myself.

1Password can do this.

I looked all through their site and found no references to using one's own hosted space at all...

Thanks.

How about using KeePass, and then use use BTSync to sync your password database to your devices?

Then on your mobile device, you also need BTSync and KeePassDroid (Android) or MiniKeePass (IOS).

This is probably not the most convenient solution because you have to use a combination of two different softwares, but I think it is a good solution if you don't want 3rd party companies to have your password database.

Link to comment
Share on other sites


Thanks Totoymola.

I use multiple PCs and do not browse with my droid phone at all - so my concerns are as follows:

-Data to be stored on my own hosted space somehow

-Ability to use that data with Firefox, K-Meleon and Palemoon browsers.

-Compatibility with win32 and Linux based apps.

I did use Firefox sync for a short time - but it was really a mess and kept failing so I quit that.

There was another one I used with its roll-your-own-server thing, but that was also hoggy so I quit that too.

In this realm there seem to mostly be apps that are either locally stored or that use their own services.

I always wonder why there is not more stuff made to use one's own hosted space...?

Thanks.

Link to comment
Share on other sites


The only one advantage LastPass held over RoboForm was its compatibility with 64-bit browsers.

However, on the 19th of May 2014, RoboForm released version 7.9.7.5 which introduced compatibility with 64-bit browsers and now I have permanently shifted over to RoboForm - no more dependency on the availability of an internet connection or the LastPass web server/s, for me. tRsCXmU.gif

Link to comment
Share on other sites


  • Administrator

Last time I checked, Lastpass used to work even without an internet connection.

Link to comment
Share on other sites


Last time I checked, Lastpass used to work even without an internet connection.

How? :think:

Link to comment
Share on other sites


  • Administrator

Last time I checked, Lastpass used to work even without an internet connection.

How? :think:

Check this and this. Unless they did something different to Lastpass, it should still work.

Link to comment
Share on other sites


That plugin is just a workaround as it is dependent on the disk cache. However, n00bs might want to argue that it is a solution - not a workaround.

As someone who purges his cache (WRT, every application & program) at system shutdown and also periodically in case the system is continuously on (for XYZ reasons,) I would have no arguments against n00bs especially when it boils down to a security program such as a Password Manager (not limited to LastPass.)

Moral:--

In the absence of internet connectivity, when an Advanced User powers-on his system, he would not be able to login using LastPass - n00bs might not face that issue.

Link to comment
Share on other sites


Update on LastPass Connectivity Errors

Aug 12,2014
At 3:57 Eastern Time this morning, one of the data centers that LastPass relies on went down. Our team immediately took action to migrate LastPass to run entirely on a different data center. As a result, many users experienced connection errors with the LastPass service, and LastPass.com has been intermittently unavailable throughout the morning. We have been engaged with our data center provider the entire time to resolve the issues. Please note this does not impact the security of your data.

We are doing everything we can to mitigate the impact and resolve the situation as quickly as possible, and apologize for the inconvenience caused. We strongly recommend users login through the browser extensions to access their vault, where most users should have access though some may still see warnings that they are in “offline mode”.

We will continue to update our user base and appreciate your patience.

Update: 1:28 pm EST

Though one of our data centers remains completely down, the service is generally stable and should be available to the majority of users (with the exception of login favicons). Some users may see connection errors but should still be able to access their data. We continue to work as quickly as possible to get the service back to 100%.

Update: 4:13 pm EST

Most users should now be able to connect to LastPass browser extensions and LastPass.com without errors, though favicons still may not sync. We continue to closely monitor the situation.



August 13, 2014: Post Mortem of Yesterday’s Outage

As noted in our original post, on August 12th, 2014 a data center that LastPass relies on went down around 4 am Eastern Time. Below, we have outlined the timeline of events as they unfolded at the data center and with the LastPass service at large.

We again sincerely apologize for the inconveniences caused, and want to assure our community we are moving forward stronger than before, as we remain deeply committed to the security and reliability of our service for our users.

Joe Siegrist
CEO of LastPass


Summary of Events

The majority of users were unaffected due to having proper redundancy in place to deal with the loss of a data center, as well as the built-in offline access via the LastPass browser extensions. However, during our efforts to scale at the secondary data center to ensure sufficient capacity at peak of the day, we inadvertently worsened the situation through human error. Our team certainly has takeaways from the experience and will be implementing changes going forward, as detailed in the concluding statements below.

We did receive a full RFO from our data center confirming that the BGP routing table issues affecting other companies yesterday played a role as well. For more, see: http://www.zdnet.com/internet-hiccups-today-youre-not-alone-heres-why-7000032566/

Timeline of Events (EDT)

3:50 am - We detected extreme latency and packet loss between one of our data centers and most major networks, including inter-connectivity with the other data center.

3:54 am - Our monitoring system detected the situation as critical and paged two operators.

4:00 am - We contacted our data center provider regarding the issue we were experiencing with their service.

5:00 am - With no update from our impacted data center provider, we switched from two data centers to run entirely on the second data center and disabled the affected data center.

6:00 am - We noticed IPv6 has suddenly started working at the now-disabled data center, making it clear to us that major networking changes were being made.

7:00 am - Our report was escalated by the impacted data center provider.

8:00 am - We determined that the outage will likely be extended, so we executed on a plan to add some spare machines into load balancing at the second data center to ensure we would have plenty of spare capacity at the peak of the day.

8:15 am - We began to receive alerts of intermittent connectivity issues at our second (now only) data center.

8:30 am - A small percentage of users reported logout errors that prevented them from utilizing offline mode.

9:00 am - We continued trying to work with our impacted data center provider, but received no updates on the situation or information on resolution.

9:30 am - Latency and connectivity issues increased at the second (now only) data center, which we began investigating.

10:00 am - We received acknowledgement from our impacted provider indicating this is a widespread problem, and indicated they would reload the core routers. They noted that it may be an extended outage.

10:30 am - The impacted data center's network went completely down.

12:00 pm - We tracked down the source of an issue at the second data center, in which 3 machines we had added were running at 100Mbps instead of Gigabit (despite having Gigabit cards and being connected to Gigabit switches) and were network saturated.

12:45 pm - We resolved the issue with the 3 additional machines, and fully restored service still running on the second data center only, though favicons remained disabled.

2:15 pm - Impacted provider indicated they were fully online, though those machines remained unreachable for us.

2:30 pm - We authorized the impacted data center staff to reboot our networking equipment, with no effect.

3:30 pm - We discovered the underlying issue with why some users are being logged off immediately after login and resolved.

3:45 pm - Members of our team arrived at the impacted data center, and verified that our networking equipment was still down.

4:15 pm - We completed a swap to spare equipment, bringing the impacted data center back online.

8:45 pm - We completed testing and confirmed that replication to secondary data center looked good, and were fully restored with both data centers active again.

Conclusions & Lessons Learned

As a result of yesterday’s events, we have formed the following key takeaways and action steps:

  • We have moved our status page to be hosted outside our network, since it was inaccessible for periods of time.
  • In an effort to gather more detailed information for our community, we delayed communicating about the situation. Going forward, we will share what information we have, however sparse, and work to update the community from there, via the blog, the status page, our social accounts, and email where appropriate.
  • Our monitoring checks now verify port speed:
for i in `ip addr show | grep UP | egrep -v 'tun[0-9]+:|lo:' | awk -F ': ' '{print $2}'`;do echo -n $i ; ethtool $i | grep "Speed:"; done
  • We are considering moving to another data center provider.
  • In an effort to improve the situation, we worsened it through our actions, and we will be more cautious in taking preventative actions when running on a single data center.
  • We're moving to a hosted model for DNS that includes external service checks.
  • Though we designed some systems to be 'non-critical', such as favicons for sites, we'll be improving our systems to minimize visual disruption during a massive outage.
  • A small number of users were impacted by an inability to access the service offline, we continue to investigate and test this.
  • We will be implementing more disaster and redundancy tests of our systems to better prepare for a catastrophic, single data center scenario.


Source: http://blog.lastpass.com/2014/08/update-on-lastpass-connectivity-errors.html

Link to comment
Share on other sites


Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...