[home]
Search:
 

advanced search
news
mail archives
  including:
  - Firewall 1
  - Firewalls
  - IDS
  - Bugtraq
tsg maillists
  - tsg-announce
  - tsg-discuss
white papers
programs
links
resources
  Osiris Scripts
  MAC address search
  RFC archive
  van Eck Phreaking
  Bernstein Case
about
 
 
old news
 
We Don't Hire Criminals... Sep 4, 2000
grendel
Theres a really interesting article over at SecurityFocus regarding Mark "Phiber Optik" Abene. Mark as you may well know has been a high profile hacker for years and years... He was busted in '92 for hacking Telco computers (He served 10 months jail time). He is currently heading up his own small security company Crossbar Security. He apparently recently was courted for employment by The Corporation Formerly Known as L0pht. As the article goes, Mark was gingerly dismissed as a candidate for employment when they "ran a background check". Regardless of your opinion on the subject of hiring hackers, the article discusses interesting trends in the hacker-gone-corporate world. Sorry Mark, you probably wouldn't have liked working there anyways.:)
SecurityPortal Interviews NTRU's Dan Lieman Sep 4, 2000
gdead
SecurityPortal has a surprisingly technical interview with NTRU's Dan Lieman. NTRU claims to have built a patented public key cryptosystem that has low power and CPU requirements. The cryptosystem, sold as the Tumbler toolkit, uses a series of disposable keys which "reduce the risk of power analysis, timing attacks, and the danger of security breaches due to misplaced, lost, or intercepted keys." There are potentially a lot of applications for a system like this, but I think it needs a bit more of a trial by fire before it starts to be accepted by the crypto community.
Put Your Right Opt-in, Take your Right Opt-out Sep 3, 2000
gdead
I hang out with many security minded folks. We sit around and discuss privacy issues; carnivore is bad, consumer profiling through banner ads it bad, Amazon turning their customer list into a saleable asset is bad. When we get bored of privacy, we'll turn to geekier things, like DVD's. Instantly people pull up a listing of their collection from DVD Tracker, showing how much their collection cost and how cool it is.

How is sending ALL this demographic data to a company like DVD Tracker less evil then having Doubleclick attempt to profile you anonymously? The DVD Tracker data seems much more valuable, yet consumers (nay, even security professionals) are willing to give it all away without a second thought. According to this Washington Post article privacy is all about presentation. Consumers can't stand opt-out programs, but seem more than willing to participate in opt-in deals like DVD Tracker. No matter how you slice it, it's still direct marketing and demographic data-snarfing that helps the companies make more money and us to spend more.
How to Squash New Technology Sep 2, 2000
gdead
The NY Times (login: cpunks/cpunks) explores the the way new technology is dealt with in society. There are many parallels between the introduction of the VCR in the early 80's and the current DeCSS trials (both technologies allowed for copying of copyrighted material). The reaction of the media giants was the same in both cases: sue. Unfortunately the courts are woefully unprepared to deal with emerging technology. The Supreme Court had to learn the intricacies of the "pause" button VCR case:
    The court's uneasiness with the technical aspects of the case was evident in its description of the device under attack. "The pause button, when depressed," Justice John Paul Stevens solemnly found, "deactivates the recorder until it is released."
History has indicated that the early rounds of battles like the DVD battle will go to the giants (ie: DVD-CCA), but in the end David (ie: DeCSS and its supporters) will win out. Let's hope history holds true.
Blaze and Bellovin on Carnivore Sep 2, 2000
gdead
Matt Blaze and Steve Bellovin, two heavyweights in the security industry, have written an article the on problems with Carnivore. Yeah, I know... "another carnivore article." But this one is worth the read (both for content and because Blaze and Bellovin are part of the Open Carnivore Group who hopes to review the Carnivore source). This article has been published in the October Communications of the ACM, and it really dives to the heart of the issue without ranting about "oppressive law enforcement" or other big-brother commentary.
Amazon's Revised Privacy Policy a Scam Sep 1, 2000
pablos
Amazon has reworked its privacy policy to view consumer data as a saleable asset. Check out CNN. Supposedly this type of sale only happens if the company is sold, but it sucks anyway. This kind of revision work further dilutes the use of privacy policies. Sadly, it means we need laws, strict German laws. We also need tools to protect our privacy, and gunz to protect our tools. We also need a way to buy books anonymously.
Security Industry Food Chain Sep 1, 2000
gdead
Red Herring has a piece on the conolidation of companies in the security industry. At the heart of the article is the fact that doing "security work" includes such a broad realm of disciplines (perimeter security, application security, audits, software development, anti-virus, enterprise computing) that the little security firms have a hard time competing. The smaller players in the field must concentrate on one area of expertise and dominate it in order to survive. This intense focus, however, makes those companies "ripe for acquisition."

The author also claims that "Verisign dominates the market"... Verisign owns Network Solutions. With a captive audience of millions of domain holders, Verisign has essentially been given a market through NSI's orginal DoD contract. Now that's a food chain.
The Short(s) of It Aug 31, 2000
curator
As quickly as it arrived, the now infamous Liberty.Crack PalmOS trojan seems to have run it's course, leaving a bunch of pundits to argue about the real risk it posed, the hype it generated, and the future implications it poses. In similar news is the possible DOS against Nokia cell phones that support SMS (Short Message Service), that could cause them to lock up for about a minute, unless the user reseats the battery. Both instances seem to have been over-hyped, which is somewhat understandable given the "firsts" effect. Whatever the real ramifications of the individual instances, they do serve to remind us, that in a world where Information is so very important, anything that may hold, transmit, or analyze that information is a potential target.

Someone has produced a survey of 8,081 SSL-enabled web servers on the Internet showing that 32% of them are either using 40-bit encryption, or expired certificates. Given that kind of rampant insecurity, it's not a wonder that the FTC blames the Internet (seemingly rightly so) for giant increases in identity fraud.

Biometrics: Ostensibly used to deter fraud... Aug 30, 2000
ktsolis
New York recently started requiring electronic fingerprints of welfare recipients and Medicaid applicants. Since New York claimed success in reducing welfare fraud by using biometrics, many other states followed in its path.
However, The New York Times cites numerous studies where there is no strong evidence that biometric fingerprinting has had a statistically significant impact in preventing fraud.

Many people quoted in the article question whether the prime reason for using biometrics is to assure the public that welfare and Medicaid funds are not being squandered. hmmm...
ARIN Makes Security Difficult Aug 30, 2000
gdead
ARIN (The American Registry for Internet Numbers... the people who give out IP address in North and South America) has a new policy regarding named based virtual hosting. Up until now, companies have been able to use IP based virtual hosting as a justification for more addresses from there ISP or from ARIN. ARIN, sensing the lack of IPv4 address space (which is a joke... there is no shortage), will no longer accept IP based hosting as justification for addresses. Web hosters must use named based virtuals if they want more space.

ARIN does make room for exceptions. The one exception that I assume they know about is the fact that SSL does not work on named based virtuals. SSL negotiation happens before the name of the server is agreed upon. SSL based servers must be hosted on IP based servers. While I'm sure ARIN groks this, documenting it for your address request will be a pain in the butt and may hurt the deployment of secure servers in the long run. Another, and far more serious problem, is the ability to control access to servers via router ACL's or firewall rules. With named based virtuals, the only access control you have is in the web server itself. By forcing hosting companies to move to named base virtuals, ARIN has effectively removed 2 of the most important network security tools at a web hosting provider's disposal.

Slashdot now has an article about this.
*more* on 'Hacking the Friendly Skies' Aug 29, 2000
ktsolis
yes, there's more radio hacking of ATC-pilot communications in London than in any other city, and things seem to be getting worse. Which does not mean that we should be very scared (well, at least for now): pilots communicate on a predetermined bank of frequencies over VHF. They are required to repeat all Air Traffic Control instructions, so if a hacker tries to spoof ATC, the spoof is caught when the pilot acks instructions to ATC. Since the pilot has a direct radio line of sight to the tower, it is difficult for the hacker to block the signal without overtly jamming communications.

What I find more interesting is the datalink being used by ATC. Air Traffic Control is using text communications because 1) the ATC VHF band allotment is becoming clogged with voice transmissions 2) it eliminates repetition due to inaccurate voice transmission 3) it provides clearer transmissions (requisite higher frequency communications easily become distorted over oceans). I'm unsure what kind of cryptographic protections are used to protect this datalink. The datalink is supported by ACARS--for a cool link on ACARS, click here
Hacking the Friendly Skies Aug 29, 2000
curator
Britain's version of the FAA, the Civil Aviation Authority (CAA), has posted a general alert in it's safety periodical, warning of the increase in incidents of air traffice controller imposters. The number of incidents, while only three in 1998, grew to 18 last year, and are already at 20 this year. The would be imposters are temporarily hijacking air traffic controller frequencies, and attempting to give pilots faulty instructions. To date, the CAA says none of the attempts have been particular successful, as the imposters usually don't use the right terminology, and any other errors are generally found when the pilot reiterates the instructions back to the tower. Officials do warn though, that given the rapid increase in incidents, the possibility exists of a serious accident.

Read the full story over at ABCNews.

Note to self: When trying to hijack planes, don't start the transmission off with "Hey, Dudes...how's it hangin' ?"

Is it a Browser or a Virus? Aug 29, 2000
gdead
No, I'm not talking about IE. The author of the Arachne browser (full screen graphical browswer for DOS) had to recently refute claims that his software is a virus. According to NewsBytes (via ComputerUser), Arachne users have experienced massive file deletion after installing the browser. The author explains the problem as a conflict with the TEMP environment variable. He assumes that if TEMP pre-exists, it points to actual temporary space on the machine and he can treat it as such (ie: delete all the files in it and treat it as cache). Microsoft, however, ships DOS with TEMP pointing to C:\DOS... definately not the scratch space the author intends. So when an Arachne user installs the browser, their DOS directory gets deleted.

I think he stole this idea from Microsoft. I hear the next version of IE will delete your Netscape directory at install time. ;)
CCTF Data Now Online Aug 29, 2000
gdead
The wait is over. The DefCon Capture the Capture the flag data is now online. The gzip'd dataset is currently over 1.9GB, and may grow depending if we can salvage data off another disk. If anyone would like to mirror the data, please send me the URL so I can link to it. Also, I'm hoping to set up a "Greatest Hits" section containing the more interesting data for educational and humor purposes. So if you find anything neat, drop me a line. What are you waiting for? Get downloading.
First Palm Trojan Reported Aug 28, 2000
gdead
CNet reports that the first ever trojan horse for a Palm has been discovered. A trojan disguised as a cracked version of the for-pay game "Liberty" has been circulating the Net for about a week. The malicious program, once downloaded into the device, attempts to delete all programs stored on the Palm. The strange thing is that the trojan was written by the author of Liberty. He claims it was an exercise in piracy control that was "never supposed to be run outside of the workshop." I'm not sure if that will stand up in a court of law.

Odd how this happened just a month after McAfee released their Palm Pilot antivirus software. ;)
AOL's Public Dick Aug 28, 2000
curator
There's an article over at the Washington Post about a Loudon County, Virginia, investigator who's sole job is dealing with AOL search warrants. You see, since AOL moved to the county in 1996, there have been an increasing number of warrants from around the nation requesting email and other account information from the nationwide ISP. They've got a pretty heinous geometric growth curve going, to the point that Ron Horak's entire job now is to deal with the requests. Already this year, they've had 245 queries.

While I'd like to link criminal tendencies to AOL usage, I think this is probably indicative of the greater trend of online-related crimes and law enforcement's familiarization with the technologies.

MIT Releases PGP Freeware Patch for ADK Vulnerability [Updated] Aug 26, 2000
curator
For users of the freeware versions of PGP 6.5.x (Windows 9x/NT/2000 and Mac OS only), MIT has posted an update that fixes the additional decryption keys vulnerability recently discovered that would allow a malicious individual to intercept a PGP encrypted message an effectively add their key to the list of decryption keys. Get the update now while it's hot.

[Update] NAI has released hotfixes for its commercial (Windows 9x/NT/2000 and Mac OS) PGP for Personal Privacy software.

NSI Loses .Com (again) [UPDATE] Aug 25, 2000
curator
There continue to be emails fired about in response to NSI's temporary loss of the .COM tld on a few of their servers a couple days ago. NSI has sent a further technical description of the actual incident, and there have been a few query/responses from readers of the NANOG list. We've collected (and will continue to collect) the most interesting messages for your perusal.

More Missiles In the Open Source War Aug 25, 2000
curator
Peter Wayner has written an essay on the "Open Source War" for the NY Times (requires free account). It's an interesting article, though it an considered preaching to the choir for TSG members, and probably our readers. While I agree with the statement the author is trying to make, he does seem to be a bit niave and confused at times. For instance, he seems to equate the Napster and DeCSS with the Open Source movement, and open source software with free software in general. He also doesn't say anything about the security issues involved in closed sourceness. There are a few other things I disagree with, but in all, I agree with sentiment and consider it a worthy read.
Yahoo Teams Up with ZixIt Aug 25, 2000
gdead
Yahoo and ZixIt (makers of encrypted mail service ZixMail) are teaming up to give Yahoo Mail users some privacy. The terms of the agreement have not been released according to CNet. Once the service starts up, all Yahoo Mail users users will be able to send encrypted email through ZixIt's SecureDelivery.com site.

What this new partnership really drives home is how mainstream security and encryption are becoming. With systems like Carnivore in the news everyday, and more companies violating consumer privacy, Net users are increasingly security savvy. Now that Yahoo is offering encrypted mail service, you can bet HotMail and other free mailers will as well. In a few years, it may be the norm that more users send encrypted mail than those that don't.
Egg Bank Theft WAS Successful Aug 25, 2000
gdead
It turns out the Egg Bank robbery was actually successful. Initial reports indicated hundreds of thousands of dollars were stolen. Then Egg claimed that no money was actually lost; it was only an attempted robbery. Now it seems like Egg has changed their story. The BBC reports Egg admits to have tens of thousands of dollars stolen, but through very typical, non-technical means. It seems that the robbers attempted to get multiple loans and accounts using fraudulent names and not by breaking Egg's Internet security systems. Thanks to a TSG reader from the UK for keeping us posted on this increasingly confusing story.
DOJ Releases Solicitation For Carnivore Review Aug 24, 2000
curator
Earlier today, the Department of Justice released it's guidelines for the independent contractor review of the FBI's Carnivore software. According to the executive summary, the selected independent body will be charged with answering four major questions:
  1. Assuming proper usage, will the Carnivore system provide investigators with all the information, and only the information, that it is designed and set to provide in accordance with a given court order?
  2. Assuming proper usage, will use of the Carnivore system introduce new, material risks of operational or security impairment of an ISP's network?
  3. Does use of the Carnivore system introduce new, material risks of the unauthorized acquisition, whether intentional or unintentional, of electronic communication information by (i) FBI personnel or (ii) persons other than FBI personnel?
  4. Are the protections built into the Carnivore system, including both audit functions and operational procedures or practices, commensurate with the level of the risks, if any, identified in response to (3) above?

The deadline for the response to the RFP is 06 September 2000, with the draft technical report being due by 17 November 2000. The selected contractor will prepare said report, which DOJ will necessarily modify and censor the report for public release, and is barred from leaking any information not expressly allowed by directive of the DOJ.

Read the executive summary, as well as the full RFP.

But Do We Get Guns? Aug 24, 2000
curator
At a conference on national information infrastructure security, Richard A. Clarke (the NSC's new hacking czar) stated, "By protecting the IT security of your company, you can protect the security of your country." Wow. No pressure folks. In addition to the often stressful job of maintaining IT security for their employing companies, security officers and admins are now being drafted into a new civil defense force (woohoo). Citing a number of multi-national hacks, as well as the two dozen successful hacks against the Air Force last year, Clarke warned that in war time, the country would have to worry about being blackmailed or sabotaged electronically. Additionally, security breeches at private companies are in danger of creating "electronic Exxon Valdez." I can just imagine the tragedy of seeing volunteers hand scrubbing dirty bits off mice, and hosing off routers with high-pressure hot water jets.

To aid in the coming battles, the government is asking corporations to share security information, is looking at sharing "sensitive" information with selected companies, futzing with the Freedom of Information Act to make it more attractive for companies and the government to share such info (danger, will robinson... danger), as well as dropping a few bucks on IT research in unprofitable areas (what would those be?).

No word on how they're planning to stop attacks on their own infrastructure though. Try as we might, nothing shmoo.com is likely to do will keep USAF sites from getting hacked. But at least it's a start.

Possible PGP Flaw Discovered? Aug 24, 2000
rodney
There's buzz around on the 'net that someone has found a flaw in PGP, where ADK subpackets can be transmitted unsigned. Translation: someone can take a PGP message, hack it by adding an unsigned (and therefore unauthenticated) key recovery option, and send it to an unsuspecting victim. Check your usual sources if you want to follow up on this. Just a rumor at this point, but it looks like a sound concern at first blush, and such things should not be ignored.

UPDATE: The Shmoo has been told by sources inside PGP that they ARE aware of the problem. You'll find no information on their web site because they are working the issue and dealing with things in a responsible customer support kind of manner. Wait until later today to look for updated information. Check out the discussion of the flaw on Cryptome or the paper that discusses the flaw.
New DVD Content Protection System on Horizon Aug 24, 2000
gdead
Wired reports on the future of DVD copy protection: watermarking. Watermarking is currently being deployed in DVD audio and should make it into DVD video in the near future. The problem with it's deployment is two competing groups of industry "leaders" can't agree on whose standard to use. And their fear is that the longer they wait, the more non-watermark aware DVD recorders will be sold. These DVD recorders will be able to copy watermarked DVDs while the newer ones won't. With a 12 month deployment cycle, it seems that if they wait much longer, they might as well not do it.

When will these people learn that no matter what mechanism they deploy to protect DVD's, someone will break it. And now the industry is at the point where they have to be backwards compatible with previous players. Solutions to the copy protection problem will only be a patch with limited chance of success.
NSI Loses .Com (again) Aug 23, 2000
gdead
This is almost a repeat of a story from a couple weeks ago. I'll let the message from the NANOG speak for itself:

From: owner-nanog@merit.edu on behalf of Verd, Brad [bverd@netsol.com]
Sent: Wednesday, August 23, 2000 4:19 PM
To: 'nanog@merit.edu'
Subject: ROOT SERVERS ***Important Message Please Read***

This evening it was brought to the attention of the Network Solutions Registry that four of the thirteen root servers were not responding with the NS Set for the COM zone's name servers. The root servers in question were not responsible for the com zone, but in normal operation they would point to the com zone's name servers as a redirect. B.root, j.root, g.root and m.root were the servers in question.


Read the rest...
New U.S. law (HR 3886) might require banks to invade the privacy of customers. Aug 23, 2000
dustin
The International Counter-Money Laundering and Foreign Anticorruption Act of 2000 (HR 3886). The bill, sponsored by Rep. James Leach (R-IA), chairman of the House Banking Committee, passed that panel on June 8 and is headed for a full House vote in September.

According to a Libertarian Party press release "Banks would [be] required to develop customer profiles and report any 'unusual activity' such as large cash deposits or withdrawals to the government -- in effect turning every bank teller into an informer and everyone with a bank account into a criminal suspect."

The Liberterians are often a little melodramtic, but this bears looking into. Incedently U.S. banks would be affected since any of thier customers is potentially in league with Foreign Devil(TM) money launderers.

Thousands Stolen from Egg Bank (Not!) Aug 23, 2000
gdead
The Independent reports that "several hundreds of thousands" of pounds (potentially 1 million USD) has been stolen from Egg Bank in the UK. Egg is a purely electronic bank where all transactions occur over the Net or on the phone. The real kicker is the theft is said to be part of an organised crime ring. Three suspects have been arrested and are currently being questioned. Egg has had a history of security problems, including one incident several months ago where cleartext account passwords were being mailed to customers.

Update: Egg claims no money was actually stolen.

Thanks to a TSG reader who let us know that there was actually no money stolen from Egg. It seems The Independent is a fairly sensationalist rag. Check out this BBC story for a better idea of what happened.
Defeating Online Extortion Aug 22, 2000
curator
Business Week has article on one of an increasing number of cases of extortion aimed at the information and information infrastructures of online businesses. The case in point is that of media company Bloomberg and their recent run-in with a couple thugs. Seems the two alleged criminals decided that since they'd supposedly compromised the Bloomberg network, they'd be happy to share how they did it with the Bloomberg executives for a measly $200,000. Rather than give in to the wouldbe extortionists, the CEO and his executives were able dupe them into meeting a couple London police agents as part of the "negotiations".

This case, and a couple other examples in the article, epitomize the best tactics corporations are taking to combat this kind of terrorism. As stated in the article, dealing with this kind of extortion is quite similar to ye olde "thug and mortar" kidnapping and extortion.

The odd thing is that few of said attacks are publicized, whatever the outcome. The Bloomberg incident ended well, and their tact was atypical in that they let everybody know what happened. Visa did the same, and may have lost customers. As long as customers react poorly to these invasions, even when they're handled properly, it won't be surprising that companies are less than forthcoming. In the end, the article rightfully makes the statement that keeping such attacks secret only reinforces some peoples' views that no one ever gets caught, or that no one else has survived them, or even that there's no strategy for handling them.

Dow Fires Employees for Offensive Email Aug 22, 2000
gdead
In what some are calling a "witch hunt", Dow Chemical is firing employees for sending offensive email through their corporate account. The AP (through CNet) reports that in addition to the 50 employees fired in July, another 40 will be getting the axe this week. While some employees "did not take [the email policy against offensive mail] seriously", others claim to have been unaware. This brings up the critical point that employers must go out of their way to inform employees about IT policies (that is, assuming they have one). If not, an employee can come back at the employer for wrongful termination, leading to all kinds of legal and PR problems. So if you have policies and noone in your company knows about them either a) don't enforce them or b) call a meeting ASAP to fill everyone in.
Hacker Olympics? Aug 22, 2000
gdead
What goes around, comes around. The Olympics aren't very Net friendly, and according to an article on The Age the Net may not be friendly to the Olympics. The International Olympic Committee, IBM, various security companies, and the country of Austrailia are working together in an attempt to secure the Sydney2000 website. Unlike the Olympics, the website is not "assuming goodwill" from it's visitors. There are no details about how the site is secured, but given the amount of horsepower IBM puts behind it, you can bet that they'll have some big iron in front of it. And if they successfully defend the site, it will be great marketing fodder... like IBM needs more money or something.
Where's That Pencil Sharpener Aug 21, 2000
curator
Usability and price often dictate the winners of many battles in the IT industry. We've seen it in operating systems, web browsers and palm devices. There are doubtless more examples of where ease of use, and a lower price have caused a technically inferior product to defeat a technically superior (and generally more complicated and almost always more expensive) product. An article on ZDNet today, says this is beginning to happen in the world of PKI.

Read on...

Herbivores Unite! Aug 21, 2000
curator
In response to statements from the Justice Department that they would put the FBI's Carnivore software to independent review, a group of security experts have banded together to form the OpenCarnivore group. The group is attempting to get the Justice Department to add them to the list of independent testers. As reported in a Wired article the Justice Department may not be paying them any particular attention, and it remains to be seen whether the government will take them up on the offer. As part of their offer, OpenCarnivore has agreed that they wouldn't release the code, nor would they release who wrote the potentially evil software. OpenCarnivore is currently working internally on a document to be forwarded to the Justice Department in hopes of getting the process and review started.

Beyond the attempt to be one of the independent testing groups, the members (which include Mudge, Matt Blaze, Wietse Venema, David Wagner, and several other industry notables) have put together a good site that is, as it says, "a source of factual information and informed opinion about the FBI's Carnivore software. "

Xerox: Free Riding on Gnutella Aug 21, 2000
gdead
NYTimes (login: cypherpunks/cypherpunks I believe) has an article discussing recent research from Xerox regarding the give and take of filesharing. The Xerox paper entitled Free Riding on Gnutella provides an "extensive analysis of user traffic on Gnutella." The findings aren't all that surprising: 15% of the computers on the Gnutella network account for 95% of the shared files, and 70% of all hosts don't share any files at all (damn leeches). Of course the Xerox guys call this phenomenon "The Tragedy of the Digital Commons." Won't RAH be proud. ;)
Internet Privacy Survey Released Aug 21, 2000
gdead
The Pew Internet and American Life Project has released a survey of privacy concerns on the Net. Some rather shocking numbers come out of the survey. According to a sampling of 2,117 folks, 10 percent of Net users block cookies and 5 percent use software "designed to permit anonymous surfing." These numbers seem awfully high. I work with a group of privacy professionals, and I doubt that 5% of them uses anonymizing software or that 10 percent of them block cookies. However, 2,117 Americans can't be wrong, I guess... CNet has the full story.
Analysis of the DeCSS ruling Aug 20, 2000
dustin
I just read the opinion on the case by judge Lewis A. Kaplan. It is disappointing to see the "little guy" (2600) lose and the "big guy" (MPAA) win. However, it is my opinion that the judge made a reasonable descision in the case. He evokes the question, "What if this had been a computer virus?" In that case our sympathies for the defendants evaporate and we would plainly be rooting for the other side. With this thought to help balance my frame of mind, I read the opinion. I believe that based on the current laws, he has interpreted the case in the only way possible and explained his reasoning in a clear and persuasive manner.

Read More...

More on In-Q-Tel Aug 19, 2000
gdead
CNN has more info on the CIA venture capital division, In-Q-Tel. To date, over 300 different businesses have pitched to In-Q-Tel and only 8 have been funded. Of course, with only USD28 million in backing (taxpayer money) they have to be selective lest they run out of cash too soon.
The Standard Interviews Theo de Raadt Aug 18, 2000
gdead
The Standard has a great interview with OpenBSD guru Theo de Raadt. He discusses how OpenBSD came to be, what's wrong with most "audits" of OSS, and OpenBSD's overall goals. The article also states that the DoJ has over 260 copies of OpenBSD installed in their network. The DoJ's choice to use OSS is impressive, especially since closed source products like Trusted Solaris tout themselves as being secure and don't have the "full disclosure of source code" as a potential problem.
Judge Rules for MPAA in DeCSS Case Aug 17, 2000
gdead
The Ruling has arrived, and it is bad. Judge Kaplan ruled against 2600 on all accounts. QOTD from the Judge: "[The Constitution] is not a suicide pact." Ouch... Wired has a story, Slashdot has a few of them (discussion and questions for the EFF lawyers). Try and read the ruling if you get the chance. It's very well written and will help everyone figure out where to go from here.
Secure IOS Configuration Aug 17, 2000
gdead
Working with routers is a black art in many respects. Much of the know-how and best practices are passed along via word of mouth or on lists like NANOG. Over the years you learn a lot of neat tricks and they get copied from config to config as your bring up new routers or change jobs. However, there are very few references on how you should configure a router securely. Most of what I've done in the past is a combination of common sense and some words of advice from gurus. Rob Thomas has released a Secure IOS Template to help people start with a baseline, moderately secure configuration. There's lots of good stuff here including using tcp intercept and CEF reverse path to minimize (D)Dos attacks.
Security Implications of AOL for Linux Leak Aug 17, 2000
gdead
The Washington Post has a piece on AOL's leak of their Linux client "Gamera." AOL has two fears about the leak; That the unauthorized software release is indicative of AOL's overall security, and that reverse engineering this pre-alpha software will give away parts of AOL's security architecture. The first issue is simply a matter of PR. AOL has already released a statement that claims their customer data is still safe. The second is a larger problem, and will require some reactionary measures on AOL's part. Since this was pre-release software, it is assumed there is code that Shouldn't Be There. AOL must now find out what secrets can potentially be learned from agressive reverse engineering and the find a way to minimize the impact of attacks based on that knowledge. Sounds like a fun day in AOL's security division.
Analysis of Firewall-1 Aug 17, 2000
gdead
I deployed and used Checkpoint's Firewall-1 for a couple of years. I unfortunately never had a chance to dive into it and try and break it. Dug Song, Thomas Lopatic, and John McDonald did, and they posted their results to Bugtraq. They outline attacks against FW1's S/Key implementation, problems with the stateful inspection FW1 employs, and lots of other goodies. This is an excellent write-up and a great example of an in-depth security analysis.
To Fully Disclose or Not? Aug 17, 2000
gdead
Marcus Ranum gave a speech at Black Hat this year that is still causing a stir. He publicly announced that he was not in favor of full disclosure security. Ranum claimed it caused more harm than good... a controversial stand to take at a conference such as Black Hat. Weld Pond (special to ZDNet) offers a counterpoint to Ranum's arguement. Weld Pond claims that without full disclosure, the public would never become informed of security problems. This would lead to a dangerous situation where a few, highly talented hackers would cause far more damage than the current breed of script kiddies could ever do. Personally, I think full disclosure is here to stay... it's human nature. The best we can do is try and impose some ethics on the people finding the vulnerablities to make sure they notify vendors first and the public second.
Kurt Cobain's Ghost Hacks into UK Computer Aug 16, 2000
gdead
Man, do I love The Register. They're a great balance of the technical and the fringe. They just put up a story of UK bar manager whose computer was possessed by the ghost of Kurt Cobain. Apparently after she turned her computer off, an image of Kurt appeared and pleaded for her help (and a kiss goodbye). She then turned the computer back on, performed a virus check (none were found) and had the computer exorcised. I wonder if Lloyd's of London/Counterpane offer insurance against supernatural hackers?
Linux degenerates into the mainstream Aug 16, 2000
rodney
This week LinuxWorld (http://www.linuxworldexpo.com) descended into San Jose, California. I guess I expected to see, well, a bunch of Linux merchants and related commerical displays. I was surprised and rather annoyed at what was actually there.

It seems that Linux has gone mainstream, in terms of marketing. Think DefCon meets Madison Avenue. You pay $25 for an exhibit pass, if you don't have a complementary ticket. Even if you pay, you are forced to answer several excessively private questions before the admission shock troops will release your id badge. You walk onto the show floor, and it's a classic "mine is bigger than yours" arrangement of booths. A booth worker in a green lizard suit becons you into the SuSe booth. The noise level is deafening, not from music, or people chatting, but from a blizzard of barkers giving gratuitous lectures at 60 by 60 booths, to seated throngs of catatonic show attendees, presumably who are patiently sleeping through the presentation to get the free T-Shirt.

I start an organized search of the show floor, looking for the interesting exhibits. Usually this means going to the small, 10 by 10 booths, that are typically occupied by startups. There are very few of these, jammed against two edges of the floor. A woman wearing essentially nothing but a fishnet bathing suit and a skillfully printed array of Caldera logos stolls past, as I think about whether I should stare or not, the marketing flack in the standard logowear buttondown shirt next to her gives me a cold look. I wish they'd make up their mind if I should be ashamed of looking at the girl or be ashamed of thinking about ever purchasing the product.

Eventually I work my way across the floor. This is a surreal mix of arcane high geekdom and raw crass marketing. There are grey-bearded techies walking around in t-shirts and socks and sandals. There are kids, probably high-school age hackers, milling about with bags full of skillfully obtained free distribution CD's. There are young innocent looking mainstream professionals wandering around wearing these silly red devil horns that have been carpet bombed across the entire show floor by the BSD folks. Apparently that's not enough to get your attention, they also have the BSD red Demon, another booth worker in a gorilla suit, walking the floor accompanied by a woman in a skimpy red jumpsuit that almost contains her cleavage.

I try talking to some folks in one of the booths. They are booth workers, with the normal booth worker skills and faults (I _hate_ booth works who ignore me when I patiently stand and wait to ask a question.) They try to tell me theirs is the coolest O/S on the show floor, but instead of telling me how good the device driver documentation is (read the source, dude!) or how reliable it is on several different notebook configurations, they try to convince me that their lead amateur's undocumented ad hoc shell script-based packet insertion kludge is better than Red Hat. I point out I'm the customer and this is not impressing me, and they proudly point out they aren't trying to sell me anything as it's open source.

Oh well, Red Hat may suck, but the competion in the Unix/Linux/thingie-ix/*bsd*.* space isn't clearly better, regardless of the number of marketing suits or booth chickies they hire.

Wiretapping Give and Take Aug 16, 2000
gdead
According to a CNet article, a federal judge has struck down many controversial provisions in the Communications Assistance for Law Enforcement Act (CALEA). CALEA has been hotly debated for years and has proven hard to implement due to the speed at which telecommunication technology has advanced over the last decade. The judge scratched out the section that allowed law enforcement to intercept digits that were dialed after a call had been placed (think "creditcard numbers"). However, he upheld the FCC stance that packet switched data could legally have the payload and addressing information separated without violating the suspect's privacy. The judge also left in the clause that requires cell phone companies to provide law enforcement with the cellular antenna a targeted phone is using. This allows law enforcement to track a suspect as they move from cell to cell. The DC Circuit Court has a full copy of the opinion.
Apache-ssl World Writable Webserver Aug 16, 2000
gdead
Trustix posted an advisory about their apache-ssl server to Bugtraq yesterday. Security advisories are a serious issue. But in the day of competing stack protection methods and other highly complex security issues, this one was amusingly simple:

From: Bugtraq List [mailto:BUGTRAQ@SECURITYFOCUS.COM]On Behalf Of Oystein Viggen
Sent: Tuesday, August 15, 2000 2:57 AM
Subject: Trustix security advisory - apache-ssl

Hi

Due to a typo in the rpm spec file for apache-ssl, /usr/sbin/httpsd on a Trustix system will be installed with mode 756 instead of 755, making a binary file that will be run by root world writable. It should not be necessary to explain why this is an extremely bad thing.

[... info on patch location ....]

I'll go stand in a corner with a brown paperbag over my head now...

Humbly,
Oystein


At least it's an easy fix.
Crypto Law Survey Updated Aug 15, 2000
gdead
Bert-Jaap Koops keeps track of crypto laws across the world on his Crypto Law Survey. You can lookup laws that govern specific countries or get an overall picture of how friendly the world is toward encryption (especially interesting is the graphical summary of import and export controls). He just finished his quarterly update so stop by and take a look. BTW: Bert-Jaap and his partner, Simone van der Hof, are looking for ideas on how to make the CLS more user friendly. Visit the page and drop them line. I think an alternate listing based on date rather than country (or in addition to?) would be useful.
Primes and Parties in September Aug 15, 2000
rodney
The RSA patent expires in September. (Exactly when? See our assertion, tell us if you think we're wrong...) We've started gathering information on parties. Visit the RSA Party Planner page for more information. And send us info if you're planning a party. Remember: no large prime numbered arithmetic before driving.
Cryptogram and Bruce's New Book Aug 15, 2000
gdead
Counterpane's July Cryptogram is out and ready for your enjoyment. Bruce Schneier discusses Bluetooth, the SANS "most dangerous flaw" debacle, and lots of reader mail. He also announces his new book, Secrets and Lies - Digital Security in a Networked World. To quote the author - "[Secrets and Lies] discusses the process of security: what the threats are, who the attackers are, and how to live in their world." TSG should be getting a copy of the book soon. Stay tuned for a review.

I find it amusing that the security world always refers to Bruce Schneier simply as "Bruce". He is THE Bruce of the security world. While I as at DefCon, a reporter walked up to me and asked "Is your name Bruce?" I said yes (because it is) and he immediately starts asking me a pile of crypto questions. After a few seconds of confusion, I realized he was looking for Bruce Schneier ie: THE Bruce, not A Bruce like me. I pointed him across the room and sent him towards his real target. The only physical trait we have in common is really long hair. I imagine that was all the description the reporter was given before he started his hunt. It's OK... I don't like reporters anyway.
Training the Preschool Hacker Aug 15, 2000
gdead
Wired has an article on computer use in preschoolers. I have a preschooler myself, and this is something I've thought a lot about. On one side of the coin, you have experts saying that computers help children develop critical thinking skills as well as learning the "basics" such as numbers and letters. On the flip side, opponents will claim that computers make a child antisocial and can stunt their intellectual growth. I think the answer is somewhere in the middle... moderated, interactive exposure to computers can really help a young child out.

How is this security related? ;) Well, some would say the hackerdom is an extention of childhood curiosity. Hackers share many traits with a developing child (this is not meant to be derogatory); The desire to learn more about your environment as it expands from the crib, to your house, to your school, to cyberspace. Now that the next generation is growing up with computers in their crib with them, how does this affect the hacker culture. My son will be computer literate by age 4. Once that happens, how do I control his natural and tenacious curiosity? Do even attempt to control it? He (and others of his generation) will have more technical knowledge by the time he's 14 than most IT workers will have in their life. However, he will have the social and ethical development of a 14 year old. Will this next generation re-define "hacker" and bring it completely mainstream? Or will his generation be exploited for knowledge and work by an older, more corporate world. Check back in a decade and I'll tell you.
Trojans, Personal Firewalls, and Why You Should (tcp) Wrap Everything Aug 14, 2000
gdead
I'm not much on posting articles that are reviews of products, but this one has a point. I have always been a big fan of securing every host on your network, regardless if it lives behind a common firewall. At one of my last jobs, we firewalled and TCPwrapped every host; servers and workstations alike. On top of that, we had a firewall protecting the network at large. Why? Because one of the biggest threats we had to gaurd against was the threat from within the company. 3l33t tech support workers trying to hack into your workstation late at nite, or some angry accounting person attempting to delete the fileserver. Most of the security problems we had were with employees, not outside attackers. Network Computing has an article on the threat from within, as well as a review of 8 or 9 personal use firewalls/IDS. Since we all can't be fortunate enough to run FreeBSD ;) most of the solutions provided are Windows-centric. BTW: Please note that the story is dated "August 21, 2000"... mmm... shmoo-y time warp again.
Verizon Woes Never End Aug 14, 2000
gdead
Verizon (formally Bell Atlantic et al) has been fighting a strike for the last 9 days. To top it off, SecurityFocus reports that a newly deployed customer service app was leaking personal information. The app, which allows users to file trouble tickets with Verizon, sent things like addresses and contact information to the end browser in the scope of a javascript. While the information wasn't displayed directly to the page, all you need to do is view the source in order to see the offending javascript variables. A malicious user could enter any Verizon customer's phone number and get all their personal information back in return. Doh...
Safeway Email Hoax Aug 14, 2000
gdead
It seems that Safeway (the UK supermarket chain, which is now independent of the US "Safeway") had a hoax email sent to 1000's of customers. According to CNet, the email originated from a Safeway internal server, indicating that there was some kind of security breach. Safeway sent an apology email to all their customers indicating that they are "confident that the no personal information was accessed" (Isn't email "personal information"?). The amusing part of this whole thing is the content of the hoax email. It wasn't filled with 3l33t speak from a h4x0r claiming to have 0wn3d j00. The mail stated that Safeway would be raising all it's prices 25%. Customers were then instructed to "piss off" if they didn't like it, and go to another supermarket chain. Subtle misinformation is worse than defacement any day.
Surveillance Counter Measures For Dummies Aug 13, 2000
gdead
Thanks to a Shmoo reader for sending it a link to the Granite Island Group, a company that specializes in surveillance counter measures. Their site contains just about everything you need to know about how bugs work and how to detect them. You must have at least some EE/SigProc background to understand the technical stuff, but the paranoia should be attainable by all. These guys rank right up there with MECO, a supplier of all things fringe.
More Fun than I can Stand Aug 12, 2000
gdead
Due to things way beyond my control, TSG's servers went through an emergency re-location today. We had about 2 hours of downtime during the move, but all seems well now (a big thanks to cowboym for helping out). If you notice anything funny (mail bouncing, high latency, etc) please let us know. Thanks.
The Crypto World is On Fire Aug 11, 2000
gdead
As my crypto friend Yoshi remarked, "The crypto world is on fire [baby, yeah!]". August is conference month for crypto-geeks. USENIX Security in Boulder Aug 14-17th, the Workshop on Cryptographic Hardware and Embedded Systems (CHES) in Worcester, MA Aug 17-18th, and Crypto 2000 in Santa Barbara Aug 20-24th. I hope to go to CHES and report back on interesting goings on. If any Shmoo readers go to USENIX or Crypto 2k and want to tell everyone about it, let me know.

On other, more technical fronts, Yoshi pointed me to an interesting paper - Improved Cryptanalysis of Rijndael. Rijndael is one of the AES canidates, and this paper discusses various reduced round attacks. Interesting stuff, if you're into this kind of thing.
Carnivore Poster Child? Aug 11, 2000
gdead
CNN reports that the FBI has given the go-ahead on NTT's purchase of Verio, a large web hosting firm. After NTT's initial purchase offer in May, the FBI entered a period of "intense negotiations" with the Japanese telco. The FBI was concerned with the ability to perform surveillance on Verio's network once NTT gains control. Apparently NTT and the FBI have struck a handshake deal, and the formal terms of the agreement are still being worked out. I doubt the agreement will have pre-deployed Carnivore boxes at every router, but you never know. ;)
125K Smurf Amps Can't be Wrong Aug 10, 2000
gdead
PullThePlug.Com is at it again. As a follow-up to their January "survey" of smurf amps on the Net, they've done a more comprehensive scan. More networks were probed, but less smurf amps were found. This is A Good Thing. What really surprises me is that only 21 networks responded with more than 256 packets per echo request. A few years ago I could name 20 networks off the top of my head that would send back more than a 1000 packets at a shot. The overall message PullThePlug is trying to get out is, basically, things are getting better but we have a long way to go. Securityfocus has more on the story.
Bad Kitty & the Shmoo Aug 10, 2000
pablos
The Shmoo Group went to DEF CON and made lots of new friends. Check out Bad Kitty in our T-Shirt, the first known pr0n type artistic use of our shirt.
We feel a disturbance in the (anonymous) force, luke... Aug 10, 2000
rodney
Recently, four Mixmaster remailers have dropped offline. One died from RIP (English government Internet Brain Syndrome); one died from quasi-religious harassment; one died from ISP exhaustion, and I can't figure out why the fourth died. The good news is, at least four new ones have popped up. It appears the natural order of things in the Universe is for there to be approximately 12 working Mixmaster remailers. Thanks to Noise (see DefCon speaker list) and others for this information.
Lost: One Dell Laptop. Reward if Found! Aug 10, 2000
gdead
According to AFP, the State Department is now offering a USD 25,000 reward for one of their missing laptops. Not only that, but they are distributing what amounts to "lost dog" fliers to pawn shops and computer stores around the nation. The fliers provide this description - "a black Dell laptop with a five-digit serial number ending in the letter 'Q' located on a sticker in the back near the ports." If you've got a black Dell that matches this description and is NOT state department property, hide it. Someone may steal it in an attempt to get free money ;) In all seriousness, this seems insane. The State Department is going through an awful lot of work to find one laptop... It's been in the wild so long, I cannot imagine why they'd want it back. It's either been buried by the person who stole it, or the data has long since been copied and stored. I would assume their motivation is to actually find out how and why it was stolen and not actually to get the laptop back.
General Purpose Stack Protection Aug 9, 2000
gdead
In my current job I spend a lot of time dealing with software security... in particular I end up in "watercooler" discussions about how to protect data on the stack from being smashed. This is an area of research that has come a long way in the last few years, and it's finally resulting in pratical solutions that apply to more than just Linux on x86. Today an article came across Bugtraq from the boyz at IBM's Tokyo Research Lab about general purpose stack protection. The article attempts to compare several techniques of stack protection, including libsafe and StackGaurd against IBM's new ProPolice. Depending on your environment, and what you're trying to protect, the IBM solution appears to be pretty slick. The authors of ProPolice are attempting to get their stack protection code added to gcc. Go OSS!

Until stack protection gets implmented into gcc however, the burden is on the software developer to write secure code. Check out TSG's SecureCode section to learn how.

Update: John Viega and Tim Hollebeek's followup.
Visa Raises the Bar Aug 9, 2000
gdead
In an attempt to reduce credit card fraud and increase customer confidence in e-commerce, Visa has announced new policies for online merchants. These new rules aren't exactly rocket science (not like deploying a SET CA), but they are a step in the right direction. The rules include running a firewall in front of a host that accepts credit cards, encrypting sensitive information on the wire, and using anti-virus software. Visa intends to announce detailed plans in the next few months and is pushing for worldwide adherence within a year.
EFF's DeCSS Post Trial Brief Aug 9, 2000
gdead
The EFF has posted their Post-Trial Memorandom of Law in the MPAA v. 2600 case. The document summarizes EFF's position and goes so far as to call the DMCA unconstitutional. It also attempts to refute the precedents set forth by the MPAA. I'm not a lawyer, but given the Judge's closing comments and the strength of the EFF's case, I'd say things look promising. I haven't been able to track down the MPAA post trial brief... if anyone knows where it is, please let me know.

Update: Slashdot now has a thread on the brief.
TEMPEST Goes Mainstream Aug 8, 2000
gdead
ZDNet has a fairly comprehensive article on van Eck Phreaking and TEMPEST. It's basically starts out as Intercepting RF for Dummies but really covers all the bases. They even mention the BEMA EM-shielded tents; the tent comes in 3 suitcases and can be erected inside of a hotel room. *poof* Instant protection from the black helicopters in stealth mode pointing big antennas. For more in-depth info on van Eck and TEMPEST, check out the Shmoo TEMPEST pages and the stuff over at Cryptome
All New Episode of "Dumb Dumb Banks" Aug 8, 2000
pablos
So Brian isn't your usual Kevin Mitnick, Social Engineer type, but he was recently playing with Wells Fargo over the phone and this will make you laugh: 1st call, Brian calls Wells Fargo to get his account balance. For some reason, his fiancee (Kaleigh) is the primary account holder, and he's just some secondary name, so they won't give him the balance. Brian hangs up. 2nd call, Brian calls and the woman asks his name, he says "Kaleigh." She asks for his mother's maiden name, and he says "I don't know." This makes her fumble a bit and she asks where he was born, Brian says "I don't know." "You don't know where you were born?" she responds. "No," says Brian. "OoohKaaay." Th woman then proceeds to give him the account balance information! The moral - Next time a guy named Kaleigh calls, make sure he knows where he was born.
Non-Repudiation: Crypto vs. The Law Aug 7, 2000
gdead
At the USENIX Electronic Commerce conference in 1998, there was a great deal of discussion (by folks much smarter than I) about non-repudiation and its definition. On one side of the bar were lawyers claiming repudiation is the "ability to declare a signature [and/or its intent] a forgery" (it's easier for lawyers to define repudiation than non-repudiation). The other side contained developers and cryptographers claiming non-repudiation is "that [which] provides proof of the integrity and origin of data". The middle was a no-man's land of lawyer jokes, bad assumptions and miscommunication. After several hours it became obvious that the "legal guys" and the "tech guys" had totally different ideas of what non-repudiation meant, and there wasn't much hope in merging the two mindsets.

Two years later, these differences are causing much more than heated discussions at conferences. According to an article on FirstMonday, the differing definitions are leading to confusing laws and bad precedent. Without proper education of developers, lawyers, and law makers, the future of digital signatures may be doomed because of this dual definition.
Filesharing Through Netscape Exploit Aug 7, 2000
gdead
Dan Brunleve has discovered how to turn 2 holes in Netscape/Netscape's JVM into a webserver on any client. Dan released BrownOrifice HTTPD, an exploit based on the 2 vulnerablities, just a few days ago and it's already done the rounds on /. and Bugtraq. BrownOrifice turns any version of Netscape into a hidden filesharing system. He's even written a BOHTTPD Spy that will show the world who is sharing what. Kinda of like distributed.net meets cDc meets Napster. I wonder how sharing files via BrownOrifice would stand up to a court of law ;)
Salon Article on Copyrights, Hackers, and The Future Aug 7, 2000
gdead
Salon has an awesome article that discusses the implications the latest lawsuits have on software developers. The scariest part of the article was revelation that regardless of the outcome of the DeCSS/Napster/Scour/Etc cases, developers are censoring themselves and their code in an effort not to get sued. Regardless of the outcome, the creative juices that made the Net what it is today are being stifled by Big Business. Developers are afraid of "losing their businesses, their cars, their homes." This fear doesn't stop at US borders, either. The MPAA and others involved in these lawsuits are multinational corporations who can exert power all over the planet. ... Maybe it's time we all moved to Anguilla (it's basically another planet, right?).
Archimedes is Dead, Long Live Archimedes Aug 6, 2000
gdead
What a way to spend a sunday. TSG's faithful server, archimedes, finally died. I logged in this morning and my shell died with a Sig 11. I logged into another account and discovered the mailq had 550 messages in it, all of which had stopped due to "local mailer died on Signal 13". *sigh* Luckily we had backup hardware. Curator and I spent the next 10 hours moving files around and reconfiguring a new archimedes. At this point, we think most everything is under control (we're still having a little problem with the maillist software, but that should be fixed shortly). If you have ANY problems using the site (404's, 500's, host not found) please let us know ASAP. Thanks. :)
Shmoo in the Media? Aug 5, 2000
heidi
Big Media keeps covering DefCon 8 and Shmoo finally gets a reference. From a ComputerWorld story:
    During the Fifth Annual Black and White Ball, a stunning man drifted by in a long skirt and shoes laced with glowing electro luminescent wire.
Rumor has it that this "stunning man" is Shmoo's very own Pablos. If you'd like to copy Pablos' ball ensemble, he completed the outfit with a sheer black chemise, and fishnet stockings.
Ummm... Duhhh..., or When Not To Use GET Aug 5, 2000
curator
This message came through Bugtraq recently. Basically, it's Authorize.Net's response to someone notifiying them that sending authentication information encoded in the URL via a GET request is a bad thing. They write back claiming that it on the face of it it seems like a security problem, "but upon further explanation, it becomes clear that this is no more an issue than anything else that can be accessed on someone's machine." It's fortunate that these people don't produce e-commerce software. Oh... wait...

As GET requests show up in browser (histories) and web server logs (referrers) this seems most academically a insecure thing. Granted POST requests don't actually encrypt anything, but the information doesn't show up in the browser for any future user to see, nor in some other site's web logs when the user is done using the software.

With policies out there like this, who needs script kiddies.

DNS Still the Weak Link Aug 4, 2000
gdead
This came across NANOG today:

Date: Fri, 4 Aug 2000 16:49:46 -0400
From: "Larson, Matt"
To: "'nanog@merit.edu'"
Subject: Recent issues surrounding g.root-servers.net

Informational message--Recent issues surrounding g.root-servers.net:

On Friday, July 28, g.root-servers.net, operated by DISA, started having trouble reliably loading the com zone. With ICANN's and the DOC's approval, the NSI Registry changed the root zone to replace g.root-servers.net with g.gtld-servers.net in the com, net and org NS RRsets. It was our goal for g.root-servers.net to be answering with current zone data for the full six-day TTL of the com, net and org NS records following the change. That has not proved possible; for example, on Friday morning, August 4, g.root-servers.net loaded and served up a truncated com zone for a few minutes. We have asked DISA to stop loading the com, net and org zones on this server: We believe that it is better for g.root-servers.net to be lame for com, net and org rather than to be giving out bad data.

The change to the root zone reflected in serial number 2000080101 will not be fully seen until the end of the six-day TTL.

Matt Larson
DNS Platform Manager
Network Solutions Registry / www.nsiregistry.com


What this means in laymen terms is one of the core nameservers in the Net claimed (off and on for 6 days) that .com didn't exist. No need to worry about h4x0r's breaking your nameserver or stealing your domain. When the folks at the root/gtld-servers.net screw up, the whole Net can die... And when NSI screws up, you might as well go home and mow your lawn, cause the Net will be chaos.
Thawte Cans PGP Support Aug 4, 2000
pablos
The ill fated PGP support at Thawte has officially met it's fate. While it is unclear whether this means the demise of the entire "Thawte Web of Trust," they won't sign PGP keys any longer. What this really means is that Thawte is merging their CA operations with Verisign's. Verisign has never embraced PGP and this is just one more reason to start looking for a new CA. The Shmoo Group currently recommends TrustCenter, a German CA with good browser support that will sign your PGP Key. Check my key out.

I'd personally like to thank Mark Shuttleworth and Bruce Watermeyer of Thawte for putting the effort in to support PGP in the past.

Take twenty cryptographers and call me in a decade? Aug 3, 2000
rodney
The IETF spend some time at the 'Security Area Directorate Meeting' (SAAG) discussing the use of a new crypto algorithm. Some vendors think DES is still fine. Some folks want an AES candidate now. Personally I think we need multiple algorithms and AES has nothing to do with it. If we build protocols using only one crypto algorithm, and it's Triple DES, we're still vulnerable if there is an attack (like some high school student from Ireland...) discovered tomorrow. We need multiple crypto algorithms, perhaps, and the IETF is lurching towards thinking about this... Stay tuned for next month, which has a triple crypto witching hour, with RSA's patent expiring, AES selected, and NIST comes out with a 2048 bit DSA and associated 256 bit SHA-2 hash algorithm.
Cross-stitch ala Napster Aug 3, 2000
heidi
Apparently the music industry isn't the only one suffering from a Napster-like mentality. For a chuckle or two, check out CNN's story about "underground grannies" who are trading copyrighted needlepoint patterns via the web.

Even though participants in this illicit pattern swapping only number in the hundreds (versus the millions that use Napster), the Needlework industry is so small that a movement such as this could destroy many companies. To quote the CNN story:

    "This strikes at the heart of the needlepoint industry. The people who are doing this seem to have a hacker's mentality," said Jo Weiss, executive secretary of the International Needleart Retailers Guild.
Does the military have your DNA on file? Aug 2, 2000
jpm

For quite some time now - at least since I joined the Army in 1991 - the military has been collecting all sorts of biometrics from service members. Ostensibly for the identification of remains although I won't ever commit a violent crime and expect to get away with it.

Some of this information is from personal experience, and some can be found in Database Nation by Simson Garfinkel (ISBN: 1565926536). The Army has all ten of my fingerprints, a drop of dried blood, and a swab with skin cells floating in a vial of preservative.

For those of you who have served in the military and think its badTM that The Man has a sample of your DNA, you can request that they destroy it. More information can be found at the Armed Forces Repository website.

Q: What do RSA, DeCSS, and Shmoo have in Common? Aug 2, 2000
gdead
Answer: They've all been on t-shirts (and my wife as been on an apron, but that's a different story). In the great tradition of putting crypto onto a t-shirt (raise your hand if you've worn your RSA T-shirt across US borders), Copyleft is selling DeCSS shirts. The general attitude of the law as been "if the crypto is printed on something (ie: a T-shirt) then it's covered under the 1st amendemnt." That's how EFF's Cracking DES got published. However, the MPAA doesn't think that having DeCSS printed on a shirt is protected free speech. They claim the shirt discloses trade secrets, which comes before your right to free speech. To that end, they've added Copyleft to the growing number of defendants in the DeCSS suit. Slashdot and Wired have the stories.

On a less controversial front, TSG has some extra T-shirts left over from DefCon. We'll be happy to sell them for $15 + S/H. If you want one, let us know. (we'll post pics of them soon)
emergency, emergency, everyone to get from streets! Aug 1, 2000
rodney
Representatives of the US and Japanese governments presented proposals to the IETF to provide emergency capabilities for Internet access in times of crisis, such as earthquakes. Old time IETF geeks and Cryptolibertarians look askance at this. On the other hand, listening to the stories about "I Am Alive!" (IAA) systems being used in Japan at recent volcanic emergencies were quite compelling. More information is available at IEPS and IAA.
The Coroner's Toolkit Aug 1, 2000
gdead
After what can best be called a year long closed beta, Dan Farmer and Wietse Venema (of tcp wrappers fame) have released The Coroner's Toolkit (TCT). TCT is designed for "a post-mortem analysis of a UNIX system after break-in". I've used TCT while it was in beta and it was powerful but a bit short on user friendliness. TCT comes with tools to undelete files, recover keys from processes and disk, and dig up (ie: grave rob) a bunch of info from the box. TCT is very useful in the right hands, but the authors will be the first to admit that it's a bit unpolished. But don't let that stop you... download and play with it and make your own opinion.
Cryptome Back up... Basically Jul 31, 2000
gdead
After long, questionable outage, Cryptome is back online, as long as you reference it by IP address. Here's John Young's email:

Date: Mon, 31 Jul 2000 07:48:32 -0400
To: jya@pipeline.com
From: John Young
Subject: Cryptome Update

Cryptome and JYA had an outage last week due to overload
caused by news reports on hot files on the sites, and maybe
some cause not yet known. The sites have been moved to a
faster server accessible by IP addresses until domain names
have been changed:

http://216.167.120.50/ (cryptome.org)

http://216.167.120.49/crypto.htm (jya.com)
CCTF - After the Chaos Jul 31, 2000
gdead
Well, DefCon 8 has come and gone. TSG has sniffed gigabytes of data from the Capture the Flag network and is working on getting the data online. The CCTF didn't go perfectly, tho. Our first capture box (Running OpenBSD with Intel NIC's) was dropping anywhere between 0.5% and 20% of the packets on the wire. After talking with the OpenBSD folks at the Con, we decided it was a hardware issue (bad Intel, bad!) and moved the sniffing activities over to a FreeBSD machine with 3Com NICs. The new machine didn't drop any packets, but due to a misconfiguration of some switches in the network, we only had a partial view for a few hours. To add to the mess, our powerstrip went bad and the machine kept shutting off. But by midday saturday, things were under control. Everyone is heading home today and tonite we should start the post-processing (merging the FreeBSD and OpenBSD captures, mergring and/or splitting some of the logs, and bundling for distribution). This will probably take us a few days due to the size of the data. Check the CCTF page mid-week for a list of hosts that will be serving the data.

I'd like to thank the DC Goons for all the help and support they gave us. They let us in the NOC, kept watch over our boxes, and lended a technical hand when required. You guys rock.
Shmoo, Live from DefCon 8.0 Jul 28, 2000
pablos
Eight Shmoo are at DEF CON (Check out the site, which ADM has just hacked (Stronghold Exploit)). We've got CCTF under control, and we'll bring home lotsa interesting packets.

We've been trying to keep this under wraps for most of the year now, but The Evil Geniuses for a Better Tomorrow will be releasing a public beta of MojoNation. This is a brilliant distributed computing system that crosses Napster like filesharing with a network based RAID5 redundancy and a micropayment cost-recovery system. Be a part of the revolution and go get it now.

Quite the Day in Court Jul 26, 2000
gdead
Napster and 2600 both had big days in court today. Napster has been instructed to stop service at 12a PDT Friday. From the sounds of it, Judge Patel really beat on Napster, claiming the "non-infringing" uses of Napster came as an afterthought. Napster, I assume, will appeal the ruling, and should have more info here late Wednesday night.

The 2600 v MPAA trial ended today. The judge said some encouraging things about the Side of Light. The real shining moment in the case was the testimony of David Touretsky, a CMU prof. The judge seemed to really grasp the issues at hand once he was done... no small feat given the technical nature of this trial. EFF has all the trial docs online.
Kuro5hin.org Taken Down after Application-level DoS Jul 26, 2000
gdead
After 4 days of fighting with a denial of service attack, kuro5hin.org has stopped service. In a note (local copy) on the site a brief summary of the attack is given. The DoS was rather unique in the fact that it attacked Scoop, the application that ran K5 (Scoop was written by rusty, the person who started K5). Most DoS attacks these days are network based and will run against any host or network. This was a very specifc attack aimed at overloading a specific web application. If you've watched the progress on K5 in the last few days, you'll notice that the DoS overloaded various parts of the Scoop system including apache and MySQL... I don't think bandwidth was really ever an issue. Let's hope this attack doesn't give birth to a script kiddie tool that lets anyone take down any Scoop-based site.

On a non-security related note, I'm sad to see K5 go. It was a great site with a very close knit community and lots of great discussion. It will be missed.

Update: Slashdot now has a thread about the K5 DoS.

Another Update:Slash has another thread about this, and Rusty has posted an update on K5 indicating that he'll be bringing the site back up in the future (a month or so).
EPIC and the FBI on Carnivore. And...use at ISPs. Jul 25, 2000
ktsolis
On Monday, The Electronic Privacy Information Center's Mark Rotenburg and Larry Parkinson, general counsel for the FBI, discussed Carnivore on the McNeil-Lehrer Newshour. Parkinson stated that Carnivore is a "surgical tool" and has been in use 25 times over the last two years. The FBI has a statement about Carnivore here.

The Shmoo group called Mindspring last night and to ask them about use of Carnivore at the ISP level. Customer service had been instructed not to discuss the issue. The person we spoke with stated that he had never seen a Carnivore box, but he did hear that one had been installed at Earthlink out in California.
Close Your Eyes When Boarding Jul 25, 2000
gdead
An article on CNN discusses a pilot program for using bionetrics at airports. The Charlotte/Douglas International Airport in North Carolina will be testing a system from EyeTicket that allows for faster boarding by scanning your iris. While I'm all for reducing hassles at airports using groovy kewl technology, there is no way I'm going to let an airline take a picture of my iris (or any other biometric data). EyeTicket claims the data is not tied to any other personal information and that they won't sell the iris database to a third company... ... *sigh* Regardless of their intent, I don't feel comfortable giving someone my biometric data (I think pablos agrees with me on this). Unlike a PIN, password, JavaRing, or even your name, your biometric data can never be changed. Once someone has it, they have your identity, they have "you". No matter what their current motives and security mechanisms are, who knows what may happen down the road. The company you gave your iris to may get bought or hacked, allowing your data to be viewed and used by someone... someone you didn't intend on giving your iris to. And there's little to nothing you can do about it.
Zero Knowledge Releases Linux Freedom Source Jul 24, 2000
gdead
According to a press release from ZeroKnowledge the Linux Freedom client has been GPL'd. ZKS has been promising to release its Freedom code for A Long Time Now(tm). (for those that don't know, Freedom is a software/network system that allows pseudo-anonymous existence on the Net) It's nice to see them finally following through. The code is available from opensource.zeroknowledge.com. A quick browse of the code doesn't reveal anything too interesting (it's a lot smaller than I thought it would be), and I was able to successfully compile it under Mandrake 7.0. Not sure how well it works yet, as I don't have a Freedom account ;)
Route Filter Discussion on Slashdot Jul 24, 2000
gdead
In what promises to be a giant, flailing cluefest, Slashdot has a discussion on ISP's and their route filters. The basic idea is if an ISP filtered out packets that don't have a source address that orginates inside of its network (ie: it was spoofed) then spoofed DoS and other similar attacks would be stopped. This is technically called Ingress Filtering, and there's even an RFC on it. Ingress filtering is a surprising complex topic, and I don't anticipate most of the /. readers grasping it. For a better discussion of this and other large scale network security problems, check out North American Network Operators Group (NANOG - archives). Better yet, don't wait until your ISP fixes things, fix them yourself. Filter out martian addresses and read Cisco's Essential IOS Features Every ISP Should Consider (Cisco specific implementation but with theory that can be applied on any platform).
Capture the Capture The Flag Jul 22, 2000
gdead
The Shmoo Group is going to DefCon next week (well, about half of us are). Besides drinking, we actually have something productive to do while in Vegas. TSG will be capturing the Capture The Flag contest. For those who don't know, CTF is a weekend long hacking contest where uber hackers try and break into various local servers. We will be capturing all that traffic and (hopefully) burning CD's on the spot for those who want the dumps. We will also be posting interesting parts of the capture on the CCTF page once the conference is over.

TSG will also be selling T-shirts and giving away stickers. Buy a t-shirt and help support TSG. Get a free sticker and be the kewlest h4x0r on your block. :)
Weld Pond Writes for ZDNet Jul 21, 2000
gdead
Weld Pond, of L0pht fame (now @Stake), has written an article for ZDNet. The article is a discussion on the use of the term "hacker"; what it meant 10 years ago and what it means now. Interesting (if not cliche) article. But the real news here is the use of an underground author by major news media. Maybe it's an attempt to reduce FUD. Maybe it's a marketing agreement between @Stake and ZDNet. Maybe he hacked ZDNet and posted the story himself ;) Whatever the reason behind the article, seeing his name as a byline on ZDNet's site is just plain weird.
Fair Weather Shorts Jul 20, 2000
gdead
Some odds and ends to report on today... EFF is updating their MPAA v 2600 archives daily as the case continues on in court. The trial transcripts are amazingly interesting, but the court stenographer can't spell "Schneier" (Bruce Snyder == Bruce Schneier). For those of you filtering address space, ARIN is going to begin allocating IP blocks from 65.0.0.0/8 and 66.0.0.0/8. Apple has taken Mac OS X server off of the Apple store. No word as to whether OS X Server is dead, or just on vacation. And according a Wired article, high tech companies are starting to hire Chief Privacy Officers (CPO's) as a reaction to public outcry about privacy violations on the Net.
Disney to buy bankrupt Toysmart's customer list? Jul 19, 2000
ktsolis
Last week, we reported that the bankrupt toy seller Toysmart was preparing a fire sale asset roster including 1) a customer list and 2) a database of personal information of people who visited the website. Toysmart's privacy statement clearly disallows the transfer of this information to third parties. When the FTC caught wind of Toysmart's plans, they quickly filed suit to prevent the bankrupt online toy store from selling this information.

The Toysmart incident poses an question that would likely throw Simson Garfinkel into a rant--does an explicit privacy protection statement still apply if a company goes bankrupt?--but what was shaping up to be an interesting case for the DC privacy cabal may well be diffused. Disney, a 60% owner of Toysmart, has offered to buy the customer information and retire it. And who wouldn't trust Disney? : )
Format Bugs - Paper from Bugtraq Jul 19, 2000
gdead
Yesterday, Pascal Bouchareine posted a paper to Bugtraq that is one of the best explanations of a bug I've seen in years. He thoroughly covers format bugs that most recently led to exploits in BitchX. The paper has lots of gdb output with running commentary on what's happening to the stack while he twists and contorts input. This paper and Aleph One's Smashing the Stack for Fun and Profit are two must reads to really understand what nasty things can happen to your stack. To avoid having writing programs that look like Swiss cheese, see TSG's securecode section.
Digital Commerce Society - Washington DC Jul 18, 2000
gdead
Many moons ago (about 5 years, really) Robert Hettinga started the Digital Commerce Society of Boston. DCSB has monthly lunches at the Harvard Club of Boston where various crypto/finance/geeks give presentations (ie: Rich Salz, Win Treese, and TSG'r rodney). There's also a great list (which I highly recommend sub'ing to) which serves as a distillery of info from cypherpunks, cryptography, poltech, and other misc lists.

DSCB is great... if you're in Boston. If you're not in Boston (who wouldn't want to be) you only get the list and are left out of the great lunches. To that end, the Digital Commerce Society of Washington DC has been started. DCSDC is a "branch" of the DCSB. The idea is to have invitied speakers with food present over some regular time interval in the Washington DC or Northern VA area. If you live in the DC area and are interested in attending, subscribe to the DCSDC list for info on the when, where, why, and how.
DeCSS v MPAA Round 1 Jul 18, 2000
gdead
The 2600 et al v MPAA suit is underway in New York. In a last minute attempt to stay the trial, EFF's lawyers claimed the Judge Kaplan had a conflict of interest due to prior consulting with Time Warner. The Judge denied the stay without arguement. Day one was mostly devoted to Michael Shamos, a CMU faculity and MPAA consultant, who discussed how he was able to copy a DiVX DVD and exchange it on the Internet. The whole process took about 20 hours and a ton of technical expertise. A by product of the cross examination is that Shamos may be violating CMU's Microsoft site license by doing his consulting using CMU's resources. Wired and EFF have all the details. Day two will have Frank Andrew Stevenson discuss his original findings when he was first analyzing CSS.
Dilution of Information in Distributed FileSharing Systems Jul 17, 2000
gdead
Over the last few months, distributed filesharing systems have become a hot topic. Napster is the most notable system system out there, due to its giant user base and the ongoing lawsuits. Napster only shares mp3's, which is either it's biggest drawback or it's largest asset.

Other, more generic clients have appeared in the recent months. Gnutella (released initially by the boyz from Nullsoft who were promptly beaten by AOL, their parent company) was the first client of note. Gnutella was GPL'd after it's false start and a whole hurd of developers have been beefing it up since.

Now there are many different distributed filesharing systems being actively developed...

Read more...

NOTE: This is only slightly security related, but interesting none-the-less.
IBM Funny Money Jul 17, 2000
gdead
This morning I received an email from a worker bee in IBM. It's basically a notification of a bunch of crypto and EC courses IBM is making available online. Here's The Catch (tm):
    Notice: downloading is free, but... most documents require `paying` using IBM Micro Payments demo money
In order to download the courses, you must first download and install the IBM micropayment wallet. You then have to "pay" for the download using fake money from the wallet. This is a very interesting take on getting wallet software deployed. Normally, wallets (and the like) are geared toward consumers or businesses. The attitude is either "download this wallet and your life will be made easier" (consumer) or "have your customers download this wallet and you'll make more money" (business). IBM's ploy is geared toward the geeks, who are a marketing channel of their own ("download this wallet because it's cutting edge and kewl and leet and stuff"). IBM is dangling a carrot... lots of crypto and EC papers of quality... all you need to do is download this whiz-bang gizmo and it's yours. I imagine the hope is the geeks will download it, poke it, play with it, and talk about it... and IBM gets free press and feedback. oh look, I just became part of the cycle... damnit.
2600 DMCA protest Today in New York Jul 17, 2000
ktsolis
When Judge Kaplan moved the the next stage of the Universal City Studios v. 2600 Magazine trial up to July 17th, Emmanuel Goldstein couldn't help but smile: the 2600-hosted HOPE conference has just ended, and 500+ conference-goers are expected to be out protesting from 10:30AM to 5:00PM at 500 Pearl Street in the courtyard of the Court.
a few (semi-)official notes for the protest for those planning to attend:
"No electric sound (megaphones, etc)
We need marshals with red arm bans for interface with the NYPD.
They are not expecting civil disobedience
Signs can not have wood sticks."
July Cryptogram is Out Jul 16, 2000
grendel
This month's edition of Mr. Schneier's Cryptogram is now available. Included in this issue besides the always interesting news and editorials are sensless acts of full disclosure by the CIA, a topic near and dear to the collective Shmoo heart. :)
Space Junk Jul 14, 2000
dustin
NASA has a Java applet that tracks all known satelites in orbit. Check the 3D view. You can click on any of the dots and see it's name and orbit. I had no idea how much trash we had put in space. I also like that you can see where the sun is and where it is night and day.

CERT Advisory: buffer overflow vulnerability in Sony's Aibo robot dog Jul 13, 2000
ktsolis
"The AIBO Sound Controller, when configured to play Britney Spears' "Oops, I Did It Again," will cause AIBO to lift a hind leg and spontaneously leak battery juice on the floor, simulating a urination (female ERS-110 models "squat" during this exploit)." hoot! sure, it's a hoax, but it's a pretty funny one. Some of you may remember the equally humorous Independence Day/April Fools Day CERT advisory.
Mitnick Back in Business Jul 13, 2000
gdead
Kevin Mitnick (the "notorious hacker") has received the go-ahead from his probation officer engage in computer-related activities. In particular, he's landed 2 consulting gigs (one for a TV show and one for an computer security firm), a speaking engagement in LA, and a column in Contentville (I love that name). In the words of his attorney, this is a "180 degree change" in attitude from his probation officer. Several weeks ago, a judge ruled that the probation officer, Larry Hawley, had basically free reign over Mitnick's potential jobs. Hawley had laid down very strict rules that basically forced Mitnick to wait tables. Looks like he'll be making substantially more than a waiter's pay now.

There's no word yet from Hawley about the change of heart. < sarcasm> I'm sure there was no pressure on Hawley from the underground to change Kevin's parole terms

CNN and MSNBC have full coverage.
No Safe Harbor for US Companies? Jul 12, 2000
ktsolis
The European Parliament has voted against the Safe Harbor plan proposed by the European Commission and the US. The decision came as a surprise to those of us who watched from the sidelines as the EC and the US Department of Commerce spent two gruelling years negotiating the plan. The Safe Harbor plan allows US companies to engage in e-commerce in the EU without conforming to strict EU data privacy practices.

Whether the European Parliament perceives the plan as giving too much data leniency to US companies or if they are solely engaging in a power struggle with the EC is unclear.
Lars Ulrich on the Hill - revisited Jul 11, 2000
gdead
The heavy hitters in the digital music battle hit the hill today. CNN and Wired have the stories. The highlites:
  • Today was the first day that the Napster faction was face to face with the recording industry and artists. There are no reports of Lars beating Shawn Fanning (Napster founder) into a pulp in the parking lot... yet.
  • Orrin Hatch (R-Utah), committee chair, played devil's advocate. He claimed that service providers such as Napster are taking advantage of the Digital Millenium Copyright Act. However, he also asked the RIAA president Hilary Rosen if making a copy of a CD onto analog tape to give you your spouse was "fair use" of the CD. She declined to answer.
  • Orrin Hatch admitted to listening to Metallica... and liking it.
Quote of the Day Jul 11, 2000
pablos
I'm on a number of fringe whacko listservs, always looking for a little gem of wisdom. Here's a great quote from the Extropy list in reference to Napsterish disintermediation of the record industry:
Q: How does anyone make money if everything can be pirated so fantastically well?

A: The archives of this list contain many discussions about how artists make money in a world without copyrights. It never ceases to amaze me that people who claim to be creative have such a pathetic lack of imagination for business models, blindly assuming that the standard old method of selling recordings is all there is. - Lee Daniel Crocker "All inventions or works of authorship original to me, herein and past, are placed irrevocably in the public domain, and may be used or modified for any purpose, without permission, attribution, or notification."--LDC

FBI Carnivore = Internet Random Mail Reader? Jul 11, 2000
gdead
The FBI has unleashed their latest Internet sniffing device: Carnivore. It is a black box that they drop onto a net connection (say at an ISP) and snarf traffic. In theory, they're only supposed to listen to traffic to/from the entity they have a warrant for. In practice, it may be more like Pablos' Internet Random Mail Reader. By definition, the FBI will have to inspect every packet on the wire to see if it's one they need. What's done with the packets once they've been inspected is anybody's guess. The scary thing is this system has already been deployed several times in response to a warrant. I wonder who they were actually targeting....

yes, my cynicism runs deep today :)
ToySmart.com Sued Over Privacy Violation Jul 10, 2000
gdead
ToySmart.com, the failed e-toyler majority owned by Disney, is being sued by the FTC. In an effort to raise capital for their failing company, ToySmart.com sold their customer list in a direct violation of their privacy policy. The FTC caught wind of this, and in their eternal fight to defend consumer privacy rights, they filed suit. The most surprising aspect of this is who squealed on ToySmart.com... our friends at TRUSTe. It's nice to see them finally take action to help out consumers.
This Week in Shmoo News: Lars Ulrich on the Hill, EFF DeCSS debate in San Francisco Jul 9, 2000
ktsolis
This Tuesday, Capitol Hill will become the nexus of the online music brawl. Metallica?s Lars Ulrich along with the CEOs of Napster and MP3.com will testify during the Senate Judiciary Committee's hearing entitled "The Future of Digital Music: Is there an Upside to Downloading?"

Meanwhile, on the West Coast, Shmoo readers might want to stop by UC Berkeley's Law School on Monday night. EFF co-founder John Perry Barlow and UC Berkeley's Pam Samuelson will bring attendees up to date on and discuss First Amendment implications of the DeCSS case. The EFF is coordinating the defense of the first trial to be brought under the controversial Digital Millennium Copyright Act which begins on July 17th in New York.
Freedom Blocked by FBI (Part Deux) Jul 6, 2000
pablos
ZeroKnowledge confirmed last Friday that the Federal Bureau of Investigation has been blocking traffic from Freedom servers. The FBI claims this is not intentional. Shmoo has indirectly confirmed this with "a well placed source in the FBI."
Misc. Stuff I Rippped off from Slashdot Today Jul 6, 2000
pablos
Lance Spitzner's "Know Your Enemy" series about script kiddes has been updated with a new "Motives" section. The FBI is meddling with NTT's acquisition of Verio, more from CNN. And the Russians have invented gas powered boots that make you run 25 MPH.
The Shmoo Group Slogan Selection Process (TSGSSP for short) Jul 6, 2000
gdead
In preparations for upcoming festivities where TSG will be handing out paraphernalia (no not that kind of paraphernalia), we're looking for reader feedback on a (possibly) new slogan. If you want to help out, please vote in the box to the right ASAP. Or, if you have an idea for a slogan that isn't there, feel free to write us.

Most of the slogans are self explanatory. However "Your problem is you have goals" may not be. That's a quote from a trip I took with the Real Life Shmoo (TM) while we both worked for an ISP in Alaska. The story of that journey has become euphemistically known as "The Soldotna Story". I'd be happy to tell you all about The Soldotna Story if someone wants to buy a round of beer for TSG at DefCon. Trust me, it's worth it. ;-) Email in your beer offers (brand/brew and size) and I'll get the story posted.
Shmoo Slogans Jul 5, 2000
pablos
Shmoo needs a slogan for the pending sticker project. So far we have:

Half-ass Security Holes

Send us your ideas.

The Scottish-Nike-NSI Connection Jul 5, 2000
heidi
In June, Nike's website was hijacked. A fradulant email to NSI allowed some rogue party to redirect Nike.com traffic to a web hosting company in Scottland. Now the owner of this company (Greg Lloyd Smith who was sued last year by amazon over his ownership of the Amazon.gr domain) is threatening to sue Nike because they won't pay his bill. That's right - he billed Nike for the use of his servers. His claim: Nike did not properly secure its Internet Domain. Of course, Nike points the finger at NSI. And of course, NSI claims they're just a conduit for domains and it couldn't possibly be their fault. Did you follow all that?
Volunteers Needed for Publius Live Trial Jul 4, 2000
heidi
Publius is an attempt at a censorship resistant publishing system created by researchers at AT&T Labs. By using threshold cryptography to distribute chunks of an ecrypted file through the Publius virtual file system, Publius prevents a single entity (aside from the author) from modifying, i.e. censoring, the published information. They are looking for server volunteers for the live trial that will begin at the end of the month. The trial runs 7/28-9/28.
Unofficial xinetd Tutorial Now Available on MacSecurity.org Jul 4, 2000
heidi
Curator announced this earlier today on MacSecurity.org. It's relevant enough to the Shmoo readership that I figured I'd post it here.
    We've finally finished that unofficial xinetd tutorial we promised a while back. It's chock full of information useful for users of all platforms, and includes a section specifically for Mac OS X [Server]. It should have just about everything one would need to get up and running, including installation, configuration, day to day use, and other sundry things. Have a read and remember, comments are welcome.
Dead Dot Coms Selling Allegedly Private Info Jul 2, 2000
pablos
CNet has an article about failed dot coms that firesale databases of personal data collected with a promise of privacy. Some of these crooks are even TRUSTe members.
Freedom Blocked by the FBI Jul 2, 2000
pablos
ZeroKnowledge confirmed last Friday that the Federal Bureau of Investigation has been blocking traffic from Freedom servers. Let the war begin.... http://www.wired.com/news/technology/0,1282,37425,00.html
The Shmoo Group gets Co-opted, Twice. Jul 1, 2000
pablos
A ruthless blow to Osiris, Tripwire has announced some GPL action for the Linux version. The famed Internet Random Mail Reader has a new cousin called EtherPEG which came out of MacHack this year. It sniffs your local network and creates a collage of all the GIF and JPEG traffic it can find. Get a Mac you poser.
Security at Network Solutions Jun 28, 2000
gdead
I just got an email from Networks Solutions(R) (a VeriSign(R) company) that says they're going to require a "security email" from me whenever a domain I control is undergoing a change. What the hell where they doing before? Spinning a magic 8 ball? The first line of the email kills me:
    Security for our customers has always been a top priority at Network Solutions.

HAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHA... hehe... eheheheh.. HAHa.. he.. woo!

I've got a bridge in Brooklyn...
We've Got Your Number (Station) Right Here Jun 28, 2000
curator
First, the old stuff: After two months on the air, our third cipher has remained unsolved, even with the lure of two DVD's. The cipher is admittedly rather, though not unsolvable; it is a monoalphabetic cipher, sans extended ascii characters and thus each character reduced to its 7-bit binary representation, which is then concatenated into a single long string, which is divided into 3-bit binary groups, which are finally converted into the corresponding decimal notation and played to the listener(s). The perl code that generated the cipher text is available, as is the plain text. Again, certainly a rather evil cipher, and in hind sight too large a jump from simplicity of the first two ciphers. This brings us to...

The new stuff: Our fourth cipher returns to a difficulty more in keeping with the spirit of our contest. This one should be much easier than the last, while being incrementally more difficult than the first two. As with our other contests, a DVD (Contact) goes to the first person to break the cipher and give us the plain text. Now, get cracking!

I Feel So... Vulnerable Jun 23, 2000
gdead
*sniff* Yesterday on BugTraq, 2 of my favorite Open Source projects had vulnerablities announced. WuFTP and FreeBSD users take note:

A few years ago, a root level exploit was discovered through the site exec command in WuFTP. A patch as released that was assumed to fix the problem. But according to the post yesterday, the site exec problem still exists. All that's needed to gain root is anonymous access to the ftp server. There is no word on a patch yet.

The FreeBSD Security team announced yesterday that there's a problem in the IP stack of all versions of FreeBSD. Maliciously malformed IP options will cause the kernel to panic and effectively DoS the machine. This is very similar to a vulnerability announced earlier this year in NetBSD. Recommended fix: upgrade to 3.4-STABLE, 4.0-STABLE, or 5.0-CURRENT. For those folks running 2.2, the fix may be a little painful.
"No Such Thing as Crying Wolf?"... My Butt Jun 22, 2000
gdead
I love it when the media publishes self perpetuating articles. CNN has a story entitled When it comes to security, there's no such thing as crying wolf. The basic idea is that even when the media annouces a "major security threat" that ends up being a dud, like the recent Serbian Badman virus, it's better than not saying anything. Translated into news-business speak this really says "If we do a story about anything security related, you better read it. Not only because it generates more hits/money/business/ad revenue/farm animals, but because you may, possibly, somewhat be effected by it sometime later in the near (or not so near) future." So CNN, and the rest of the mass media feel compelled to report on anything and everything security related just to "keep us safe"... isn't that nice? I'm glad they're looking out for us.

What they fail to mention is the fact that this method of reporting will quickly de-sensitize us. "Crying wolf" or issuing alerts when there is no real threat will force people to tune them out (Signal to Noise ratio problems). When a real problem does arise and the public does need to be notified, the media channels will be useless initially because people will perceive it as "just another alert from CNN". To CERT's and NIPC's credit, they've been very good about not jumping on this bandwagon. Granted, they're not media and have in the security industry for years, but it's nice to know that they give more thought to public releases than the press does.
SAFER RIP Jun 22, 2000
gdead
SAFER, a monthly security newsletter published by The Relay Group, hasn't been seen since January. My newsletter first-aid is a little rusty, but I think after 5 months without any vitals, we can declare it dead. The Relay Group seems to be alive and well, but I think they've changed the company's direction... Specificly to payment processing and mobile telecommunications. This new direction apparently doesn't include producing a highly informative, thought-provoking newsletter like SAFER. Maybe TSG will start a newsletter... mmm.. ideas?

Update:Thanks to those that wrote in and corrected me. Safer is still around at http://www.safermag.com/. The archives at siamrelay.com weren't being updated, but the ones at safermag are. I'm dumb :-)
Platform for Privacy Preferences Jun 22, 2000
gdead
According to an article on Wired, the long awaited Platform for Privacy Preferences (P3P for short... I have no idea how this acronym was derived) debuted in New York yesterday. P3P is a protocol developed by the W3C to formalize website privacy policies. P3P enabled software will be able to read the a site's policy and compare it to user preferences. If there's a problem, the user will be notified and can choose not to visit the site, DoS them, launch a rainbow ribbon campaign... whatever they want. Microsoft, AOL, and even the White House applaud P3P as a great step forward for consumer privacy online. Some organizations, however, see P3P as a bad thing; EPIC et al released a report called "Pretty Poor Privacy" in which they basically rip the whole thing to shreads. I'm not sure where I stand yet. I understand EPIC's points, but I think there's potential here (with consumer feedback). There is also the potential that MS and AOL will make this protocol useless for all purposes except for marketing, but I don't think that will happen... maybe.
Hashed Passwords Available to All Users in Mac OS X Jun 20, 2000
gdead
Go-go gadget curator... From his post to MacSec:
    In recent weeks in playing with my new DP4 install, I noticed that I could 'nidump passwd / > /tmp/estupido.txt' as a non-root equivalent user and get a properly formatted BSD passwd file, with the passwd hashes. I thought I had to be mistaken about this as it seems to be a major security problem; maybe the hashes are decoys or something. To this end, I created a couple test accounts, set their passwords to easily guessable values, and created the 'estupido' file. To my (not so much) surprise, crack cracked the easy test accounts in seconds. ...

    As most would argue, allowing non-root users access to passwd hashes on a system is a "bad thing".
Anonymous Publishing with Random Pads Jun 18, 2000
pablos
The Shmoo Group is supporting a nascent method of free speech on the Internet called random pads. The beauty of this scheme is it is very simple to understand and implement, take 20 minutes and learn how it to do it yourself. Eventually, it will work well in conjunction with Freenet or Eternity. Get your pads and tools from Shmoo.
June Crypto-Gram is Out Jun 17, 2000
grendel
The June issue of Bruce Schneier's Cypto-Gram is now available. As always, lots of interesting news and editorials from the crypto front, straight from the mouth of Counterpane's founder. Besides news & editorials, this edition covers the history of DES, hype in the industry, Java and Viruses, and a little protocol called SOAP. Get it while its hot.:)
Courtney Loves Napster Jun 16, 2000
pablos
In case you haven't seen it yet, Salon printed a kick-ass rant/manifesto by Courtney Love about the music industry & her plan to subvert the man. I've managed to completely ignore her entire career, but this is really good stuff. She even curtsey's to Ani who has been doing this all along.
OpenBSD 2.7 Out Jun 16, 2000
grendel
Theo and the other hepcats over at OpenBSD have just released OpenBSD 2.7. It looks like theres been significant advances, additions, and lots of fun crypto:) Mmmmmm encrypted swap space:)
Forbes HOWTO on Bank Hacking Jun 13, 2000
gdead
Forbes has put together an article which is basically "Bank Hacking for Dummies." They explain in 10 easy steps how easy it would be to break into a medium sized bank and run off with USD100million. The catch is you need USD2million in seed capital to get the whole operation off the ground. But technically, the hack isn't that hard, and relatively low risk. It's not shocking (given the current state of most companies' information systems) but it is scary. Be sure to read all the footnotes in the story... My favorite:
    In England, for example, a teller discovered that change-of-address procedures for account holders were not audited by her bank--after all, what's so worrisome about a change of address?--so she simply changed the addresses of various account holders to that of her own when checks were due to be sent out, then changed them back. She operated this scam for 10 years before being caught.
mmm..... perimeter security will only get you so far. :-)
TSG Announces FEMA Project (aka: A Cry for Developers) Jun 13, 2000
gdead
The Shmoo Group is starting work on an open-source firewall management interface called Firewall Enterprise Management and Analysis... FEMA. One of my big "things" is that the best security software in the world can be made useless if it's difficult to manage. Firewalls (esp open-source firewalls) are usually managed with a text editor. This method doesn't really work when you have a dozen machines to manage. I think that non-scalable management the reason there aren't enterprise size deployments of OS firewalls. To try and remedy the situation, TSG has started FEMA, an open, scalable, portable architecture that can control both open and closed source firewalls, as well as serve as a focal point for all their logs. And we need developers ;) We've got 4 developers in-house starting work on the project, but the more the merrier. We're currently in the design phase, and should be moving to implementation in a month or so. If you're interested in helping in any way (or if you just want to join the list and maybe pitch in a thought now and then), check out the FEMA homepage and sign up.
Battlebots Jun 12, 2000
pablos
Last night some Shmoovians went to a real live Battlebots competition. You get a really strange feeling the first time you hear a crowd booing a robot. With a maximum weight of 488 lbs., there is a lot of metal out there getting thrashed. For some time now, I've felt this is a glimpse into the future of sports. Also, it is a glimpse at the future of warfare, if only to see how gleefully people stand behind a wall of Lexan, and send their minions out to fight in their stead. This sort of impersonal diplomacy will reach new heights as information warfare becomes more and more in vogue. From what we saw last night, the best way to secure yourself is with a large gas-powered spike that you can jab into anything you damn well please.
The Powers That Be... Jun 10, 2000
curator
At about 8am AKDST tomorrow morning (Sunday), the Shmoo family of web sites will go down for approximately 8 hours, as our host location has a major electrical refit. We should be back up by late afternoon Sunday.

UPDATE: We're back up. Just thought I'd point out that outages like that should be embraced. Since Shmoo has no banner ads, or sponsors of any type, we're lucky to be able to leach the QoS we've got now. Feel free to contribute if you want to help make Shmoo better. - pablos.

Chain of Custody Destroys CD Universe Case Jun 9, 2000
gdead
According to MSNBC, the evidence in the CD Universe credit card theft case has been made useless. There was a breakdown in the chain of custody, which basically makes the data/disks/logs useless. There were no immediate comments from the companies involved (Network Associates, Kroll O'Gara, and Infowar.com... oh my!). Also mentioned in the article was Cybercash and their ICVerify card processing software. ICV default install isn't very secure. Many merchants don't realize that, leaving themselves open to attack.

If you're at all involved in the security world, I highly recommend Investigating Computer- Related Crime a Handbook for Corporate Investigators by Peter Stephenson. One of the many points he discusses is chain of custody; what it is, how to maintain it, and how important it can be. I'm sure the guys from NA/KG/IWC were familiar with these topics, but mistakes are still made. Read the book and you'll have a better chance if/when you take some 3l33t h4x0r to court.
Privatization of NSA Jun 7, 2000
gdead
First the CIA starts a venture capital firm, now the NSA has announced it will privatize many of it's non-spying computer operations. According to CNN, the NSA is making this move to be able to better adapt to the changing technology world as well as to save money. The NSA projects a savings of USD1 billion over the next 10 years. Several private sector consortiums will bid on the project, which is to be awarded next April. There is no word as to what companies are involved, but the contract is worth an estimated USD5 billion over the next decade. Don't government contracts go to the lowest bidder? I'll do it for 10 bucks if I get free access to Fort Meade. :)
A Virus a Day Keeps the Readers at Bay Jun 7, 2000
gdead
In the wake of the ILOVEYOU virus, the mass media has caught virus fever. The lastest warning, released today, indicates that our cellular phones and PDA's are now under attack. Apparently a new virus released in Spain will randomly send messages to alpha-numeric cells. There are no confirmed reports of the virus actually sending any messages. It appears that it was detected before it could get that far.

So, another virus story that spreads across the media channels like wildfire, and the only damage done is through the hype and hysteria the stories cause. There have been several love bug variant reports that had the same effect; minimal actual damage done to networks, but massive coverage and public disinformation. I think that the news networks are afraid that the next virus that comes across the wire will be "the big one" so they better report on it (for fear someone will beat them to it). Until that mentality dies down due to too many Wolf calls, be ready for more false alarms and FUD.
The Wine's out of the Bottle PGP 7.0 Jun 6, 2000
ktsolis
Last week, someone on the PGP 7.0 Beta program posted the software to alt.security.pgp, and now it's made its way to here.
PGP is most likely peeved at 7.0's early vetting, but what sane company *wouldn't* want more free security-savvy beta testers for a security product?
Caveat Emptor: this is a beta product and should not be considered secure. Those who find problems with the beta are welcome to forward your findings to TSG, and we'll help directly filter your concerns to the PGP Team.
Microsoft Firewall (not a joke) Jun 6, 2000
gdead
According to a story on TechWeb, Microsoft announced today a combined firewall/cache product called Internet Security and Acceleration (ISA) Server 2000. The new server is part of the Windows DNA platform, apparently a nanotechnology MS is going to use to Borg-ify the planet (much like all of this year's TechEd attendees). Unfortunately, I've been really impressed with the *2000 suite of products. Windows 2000 has a lot of potential. They're on the verge of _figuring things out_. Maybe their firewall will be worth while. Let's hope there aren't any root (aka: Administrator) level sploits ala Gauntlet.

I wonder what easter egg they'll bury in the firewall...
HavenCo Media Blitz Jun 5, 2000
pablos
HavenCo announced their existence to the world this weekend and have succeeded in drumming up a full-on media blitz. Even I was interviewed (Check out KRON Channel 4 in San Francisco tomorrow night @ 6:00 pm (GMT-8)) for a shmoo sighting. They'll undoubtedly clip my comments to the most outlandish 3 words they can find. Anyway, their PR frenzy running ragged, and they should be on the cover of every major British paper tomorrow morning. Look for an exclusive cover story in the next Wired.

My view? HavenCo is history in the making. These guys are going way out on a limb to provide the foundation for unadulterated application hosting on the internet. If you've been griping about the taxes, crypto restrictions, surveilence, regulation, or general big brothering anywhere in the world, you have no excuse anymore. Deploy your revolutionary app at HavenCo and take a chance that it will work.

Real Datahaven to Open in an Unreal Country Jun 4, 2000
gdead
In 1968, a retired British army major named Roy Bates took over an anti-aircraft bunker 6 miles off the coast of England and declared it a sovereign nation. He called his new country "Sealand" (like the trucking company that hauls killer whales and dolphins all over North America), and has yet to be confronted by the British. 32 years later, Mr. Bates' "country" is making waves again by being the location of the Internet's first data haven (paging Mr. Stephenson... Mr. Neal Stephenson). According to this article over at the NYT, HavenCo will be opening its doors tomorrow for uber-secure colocation and data protection. According to their AUP, kiddie-porn and SPAM are no-no's, but everything else is fair game. But be ready to pay the price... 1U of rackspace with a whopping 64K of bandwidth will cost you USD1,500 a month. Look out Equinix, here comes HavenCo. Now where did I put my passport and stolen JFK report?
Is Linking to Cryptome.org Illegal? Jun 4, 2000
gdead
Inside has a great article on how linking to sites that post DeCSS (such as Cryptome.org) rides a fine line between 1st Amendment rights and leaking trade secrets. It seems silly... at least to the majority of the Shmoo.com audience. But as Inside points out, judges in the federal court system are decidedly not in my demographics. They're reaching at 500 year old legal straws in an attempt to get a handle on linking and trade secrets and journalism in the new millenium. Due to "hacker hubris" and big money with big lawyers, the judges are currently clamping down on sites like cryptome and 2600. What can you do? Mirror DeCSS wherever you can. Or, if you're like me, wear an Anti-DVD/CCA shirt and walk around your nation's capital while you talk to folks and get the word out... I had a fun Sunday ;)
InTether Unbound Jun 1, 2000
curator
Keeping up with security software releases as we shmoo do, ktsolis came upon a PR release for a company by the name of InfraWorks, which is announcing their new product, InTether. According to the PR release:
"InTether protects the content of files like .mp3, video, software or documents, allowing the sender of information to control the recipient's use, including printing, copying, forwarding and time of destruction. If hacking is attempted, the file self-destructs. Just like Mission Impossible. No other technology can do this."

Nifty sounding stuff I suppose. Unfortunately, it's not very new, at least as a concept. While I won't debate their patent rights, I'm sure their implementation is unique, I debate the quality of the very concepts behind the implementation.

Read on...

Verisign Oversimplifies Signatures Jun 1, 2000
pablos
Verisign has come up with a convoluted scheme that allegedly makes digital signatures a cinch. From Internet News:
"As enterprises move mission-critical, high-value applications to the Internet, they are often forced to make trade-offs between security, privacy and end-user convenience," said Stratton Sclavos, president and chief executive officer of VeriSign. Sclavos said the new technology allows enterprises and end-users to bypass this hurdle.

In case you haven't noticed, most of my postings to shmoo.com are out of exasperation. This is just another example.

ICAT..the one-stop vulnerability database. Jun 1, 2000
ktsolis
A colleague just introduced me to ICAT, a comprehensive CVE-compliant NIST database of vulnerabilities. ICAT characterizes vulnerabilities by over 40 attributes and is linked to databases of ISS X-force, CERT, Security Focus, NT Bugtraq, Bugtraq, and various vendors.
For those of you not familiar with the acronym CVE, it stands for 'Common Vulnerabilities and Exposures'. The CVE is an effort to standardize names for vulnerabilites so that security practitioners can communicate with a common vocabulary (indeed, the CVE folks call their work a 'dictionary' rather than a 'database').
Opening E-mail will be the Downfall of the Internet Jun 1, 2000
gdead
*sigh* According to a report on The Standard, the FBI, DoJ, and SANS have released a top-10 list of Internet security threats. SANS has also independently released a top-5 list of mistakes average computer users make. While I could find no trace of either of these lists on the FBI, DoJ, or SANS websites, I'll take The Standard's word on this. According the top-5 list from SANS, the biggest mistake average computer users make is... *drum roll*: "opening unsolicited e-mail attachments without verifying their source or checking their content" This kind of deviant behavior resulted in the ILOVEYOU virus causing USD6.7billion in damage worldwide. ... right... and I'm a closet Ultra-right wing conservative with NRA stickers all over my car. I'm quite curious how that number was computed.

More to the point, I think the biggest mistake users make is using a mail client that allows scripted languages to run automatically and unchecked leaving their personal workstation crazy vulnerable. Call me nuts, but I'd say the majority of this isn't the users fault.
Isn't Technology Wonderful? May 31, 2000
rodney
I'm sitting in the Seattle Tacoma Airport. In the Borg Bar. I kid you not. "Yes America, there is a real C.J.Borg. ... he's a longtime general manager of operations for Host Marriott Sea-Tac Airport." I see across the hall the Massage Bar. Nothing X-Rated, but it's those massage chair thingies like they have at trade shows. And, of course, I'm sitting here sipping an Alaskan Amber and using my wireless Internet connection to surf the web, from a virtual machine running Windows 98 inside my Linux partition on my notebook PC. Sometimes you have to marvel at the level of technology we have around here. Now, of course, it could be better. They say the next generation of cell phone will be the size of the stem of a wine glass. This will lead to the ultimate in Californian connectivity, the combination wineglass-cell phone. Consider this. Virtual Vineyards, the grand old web site of the digital certificate world (they had the first VeriSign commerical cert for credit card processing) has renamed themselves wine.com. But, they are now also offering real wines. What does it mean to have a real wine from a virtual vineyard? I bought a bottle of this (over the web of course) and the bottle was quite normal looking (not worth $12, but hey, this is internet commerce...) The front was a normal looking label. The back was an exact copy of the web page describing the wine. This leads to our next technological prediction. Add a simple wireless internet access capability, some sort of touch screen like on the handhelds, and you would have the combination wine bottle/web browser.
CERT Says the Strangest Things May 31, 2000
gdead
For the last few years, I've attempted to find rhyme or reason to advisories that CERT releases. They seem to "advise" us on some rather silly things, such as Inconsistent Warning Messages in Netscape Navigator, but totally miss other serious security concerns (IMAP buffer overflows come to mind). According to CERT's FAQ:
    B1. What is a CERT advisory? What alerts does the CERT/CC send?

    A CERT advisory is a document that provides a description of a serious security problem and its impact, along with instructions on how to obtain a patch or details of a workaround.
What's "serious" and what's not is usually up for debate. Don't get me wrong, I think CERT provides a valuable service, but sometimes their decisions are a bit strange. In that vein, yesterday CERT released an advisory on a flaw in PGP v5.0 key generation. Basically, if you create a key in PGPv5.0 in a non-interactive fashion on a machine with /dev/random, PGP will produce a predictable key. "Non-interactive" in this case means you typed "pgpk -g [DSS or RSA] [key-length] [user-id] [timeout] [pass-phrase]" to create your key. I imagine the number of people that used PGP in this manner to produce their key is astronomically small... call me a cynical.
Info.sec.radio.erotic.crypto.girlfriends May 30, 2000
gdead
Info.sec.radio is a live bi-monthly radio broadcast (on the airwaves and on the net) sponsored by SecurityFocus. The most recent edition is quite good. It includes an indepth discussion of power grid security problems as well as an interview with Bruce Schneier of Counterpane fame. So, fire up RealAudio (don't forget to uncheck all the "feedback" mechanisms they have) and listen in.
More Number Station-y Goodness May 27, 2000
gdead
NPR's All Things Considered did a piece on Number Stations on Friday. I didn't hear it, but from what I've read in the Slashdot discussion it was quite good. During the broadcast, a new number station contest was announced by the Conet Project. The contest (unlike the TSG contest) uses real clips from number stations. I'm not sure what the prize is (I can't find reference on their webpage) but it better be good since solving their contest may be impossible. Most folks assume that number stations broadcast using one-time-pads, which if true, would make this an exercise in futility. Course, who knows, maybe they're using 40-bit encryption due to export limitations of shortwave transmissions. ;)

On a different note, there is one week left in the current number station contest that we're running. Curator's last clue makes solving this one much easier, but I'll up the ante anyway. I'll toss in a 2nd DVD ("Omega Code") for the winner. So, tune in and get cracking.
Kevin Poulsen groks NIPC May 26, 2000
ktsolis
In this Security Focus article, Kevin Poulsen gives an interesting historical perspective on critical infrastructure protection and the National Infrastructure Protection Center's efforts to protect the North American power grid.
EFF Comments on DMCA and CSS May 26, 2000
gdead
OK, I've become a Cryptome.Org junkie again. John Young keeps a great handle on the legal/fringe stuff, and the site is definately worth checking every few days.

Today he's posted EFF's comments on the DMCA and CSS for the Copyright Office. It is probably the best explanation of what's wrong with the DMCA in respect to the "copyright control" CSS offers. Some choice quotes:
  • CSS together with the web of laws and contracts around it also eliminate the individual's ability to make noninfringing copies of DVD images
  • EFF is not spending years in court merely to exonerate one or two individuals, or to enable distribution of a limited software prototype. We are here to establish the principle that the anticircumvention provisions cannot be used to eliminate fair use broadly throughout society.
  • While the industry has loudly over-stated any potential harm it might face resulting from digital technology, it quietly looks the other way without mentioning the unprecedented power technology provides to copyright holders to control access and use over creative expression.
The doc is a bit long, but well worth the read. BTW: Check out EFF's website. They've redone it and it looks waaay better than before.
Mitnick Setting Sights Higher than Arby's May 25, 2000
gdead
Part of Kevin Mitnick's probation is a gag order that prevents him from consulting or advising anyone "in any computer-related activity." Since computers are all Kevin is really skilled in, his probation officer suggested he go work at Arby's. But according to a story over at Cryptome.org, he will be attempting to "clarify" his probation in an attempt to get on the lecture circuit.

Kevin initially started the clarification process using his pro bono lawyer, Sherman M. Ellison. But shortly thereafter, he was joined by Floyd Abrams, the 1st Amendment lawyer who became famous in the Pentagon Papers fight in 1971. Mr. Abrams is being paid by a NY publisher by the name of Steven Brill (Brill? like the guy in "Enemy of the State"). Ahh... a publisher. That's the catch. In exchange for such a high powered lawyer, Mr. Brill would like Mitnick to write a column for his soon-to-be-released eCommerce website, Contentville, with a possible eBook deal in the future.

As a side note, I'd like to point out that, IMHO, "Contentville" is one of the dumbest names for a website I have ever heard of. I'm thinking of registering Newsboro.com for my new news site, and maybe even Porndale.com the Shmoo pr0n site.
FBI Files Online May 24, 2000
pablos
FBI files not linked to an active crime investigation are public record since the Freedom of Information Act. I looked myself up and was surprised to see that they not only had my file but they also have a fairly recent color photo of me! Do you have a file at the FBI? To know, check this web site.

Pablos with a script kiddie FBI file? oy, who knew? ; )
On a serious note, what is theCenter2000.com? I'm a little dubious about not only telling them who I am but also giving them access to my FBI file..
-ktsolis
Rant: Getting the Evil out of the Empire.
Low stock prices may help.
May 23, 2000
dustin
As a person who has several contacts in the trenches at Microsoft, I have a unique opportunity to see inside the belly of the beast. The current saga with the Justice Dept. has led to a lot of cheerleading inside Microsoft. A lot of "Hurray for our side" type stuff (and outside as well). All of this posturing really has a net zero effect on productivity. It just changes the text of conversation at the cafeteria and in the halls.

What really makes a difference is the people. In every endeavor there are two kinds of people who can get involved. There is the kind of people you want to work with. You know them. They share your values and your views on software construction. They like lunch at the same place you do and they make your job as fun as it can be. When you are on a team with them, you feel like there is nothing you cannot do.

Then there are the ones who you would shoot if the president gave you a card good for one free murder. These evil beings suck your moral and cause the boss to make poor decisions based on their faulty, but insistent input. They are the albatross around the neck of your project.

Granted, these are polar opposites and most people fall in a continuum along the axis rather than at the extremes. However, the more people you can get from the good side and the fewer from the evil side the better.

The people from the good side have thoughts like these:

  • If I spend another two weeks with this code Version 2.0 will be a breeze.
  • I need to get with the other programmers on this project and think this through.
  • Most meetings are a big waste of time.
  • The testers found 3 bugs in my last section of code. time to re-write.

Evil people think this way:

  • If I only spend a week with this code I will be rewarded for pumping out features.
  • The other programmers on this project are not as smart as me. their input would be meaningless.
  • I want to go to another meeting so I can prove I am smarter than the others.
  • The testers are picking on me. That's not a bug a real user would ever encounter.

In a small startup, you recognize the evil people, route around them, and then fire them.

Microsoft has been a victim of it's own growth. It has a large number of people and quite a few of the evil ones snuck in while uncle Bill was not looking. It's all but impossible to fire a developer. The best you can do is shuffle them off to another group.

There are very few groups without some number of the evil people. Once two or three evil people get together they multiply their evil ways and tread all over the good. I personally think most of the things we think of as evil that Microsoft has done is due, in no small part, to this contingent of bad advisers and cowboy coders.

Microsoft's history of surging stock prices has made it so these people never want to leave, even if they are hated. Some of them even like being hated. (The computer industry is rife with people with strong and unusual personalities.)

The only good thing about these people is that they are rigorously self-centered. If they think the ship is sinking, they will desert like the rats that they are. It has already started to happen. A few more weeks of dropping or neutral stock performance will further weed out these losers.

In the short term Microsoft will perceive a labor shortage and may make the mistake of making it attractive for these folks to stay around. The people they really want to keep are not going to be scared off by a month or two of low stock prices.

In the end, if they can manage to let the jerks leave and not let them back when things improve, they will be left with a better balance of good to evil. Their products will improve and consumer/investor confidence will rise once again. It will, however, take months and years to show the fruits of this culling.

With any luck Microsoft's new tag line this summer will be:

Microsoft, now with 50% less evil!

Liftware - "The Real Thing at an Unreal Price" May 23, 2000
pablos
Apparently I've found my way onto every fringe wacko spam list there is. Liftware appears to be an online software site in Armenia where you can buy the latest Windoze software at prices that are a steal (literally). Autocad 2000 $375, Office 2000 $125. Besides the name, check out some choice lines from their FAQ: "Each cd is custom made," "Do I have to use my 'real' e-mail address? No you don't."
When Firewalls Become More than Firewalls... May 22, 2000
gdead
Trouble with a capital "T" can happen. For a long time, the term "firewall" implied that you had a program or device that could filter on layer 3 and 4 information. As time went on and the firewall business became more competitive, companies were quick to add more bells and whistles. From integration with IDS' to layer 7 inspection and redirection, firewalls now have feature lists that span multiple glossy pages on tables at trade shows.

Well, it seems that this rapid feature creep has finally caught up with NAI. Today they announced a root level compromise in their Gauntlet Firewall (billed as the "World's Most Secure Firewall"). The hole is caused by NAI's integration of CyberPatrol, a content-filtering-pr0n-prevention program, into Gauntlet. The culprit is of course a buffer overflow that allows you to execute shell code at the access level of the firewall, ie: root. This is a Bad Thing(tm). Some companies' only protection against 3l33t h4x0rs is their firewall. Now any script kiddie on the planet can turn a Gauntlet firewall into a jumping off point for further attacks into the protected network and elsewhere on the net. w00t!
Re-Selling MS Software: Mission Impossible May 20, 2000
gdead
There's a great discussion over at Kuro5hin.org about eBay shutting down legal sales of Microsoft software. Even though MS's license clearly states the terms that you can resell their software after purchasing, apparently they don't really intend to allow people to actually sell it. eBay's privacy policy even gives eBay the right to give all information about potential buyers and sellers to MS. Microsoft as been contacting all parties involved in the auctions and informing them that their eBay auction is illegal and will be shut down. Go-go-gadget-monopoly-power.

As a side note, eBay is Trust-e and BBBOn-line certified. As we've seen time and time again, all that means is they have a privacy policy. It makes no claim as to what the policy is. They could state that they're going to sell all your information to the highest bidder, and it makes no difference as long as it's fully documented. I'm kinda speechless after reading all this stuff. It's basically a full violation of consumer trust on every angle.
The highest level domain.... .god May 19, 2000
ktsolis
Joe Baptista, an Internet Sandinista, has reportedly created the .god domain in response to malodorous ICANN/NSI policies.
Choice quote: "Host names should be permanent. They define resources--and not legal jibberish. Legal jibberish can change anytime a judge farts. And we find that sort of thing to cause a certain amount of instability in the net and a bad smell to boot."
Evilness Comes to a Paperclip Near You, or Eeww... Do You Know Where That Paperclip's Been? May 18, 2000
curator
I always thought those damn talking paperclips in Microsoft's Office software were evil. Little did I know...

MS has released a patch to Office 2000 that fixes a demonstrated hole in the Office Assistant discovered by the folks at @stake. The fault lies in an undocumented ActiveX control (read: eeevil) that allows malicious documents (local docs, spreadsheets, html docs, blah, blah, et al.) to use it to change numerous Office and IE settings, most notably the changing of macro security settings. Having stuck a nail through that prophelactic, we can only imagine what kinds of nasty diseases the malfeasant code could give us. There is a demo of the 'sploit at @stake.

Network Solutions in the Doghouse again May 18, 2000
ktsolis
If NSI decides that your domain is being used for "any improper purpose", they may terminate domain name registration services at will, according to a Cnet report. Anyone up for defining "improper purpose"? Don't bother--NSI is the one and only arbiter here per their latest service agreement.
In the Domain Name Buyer's Guide's legal ranking, NSI earned an execrable one out of five stars. The Guide explains how you can easily move from NetSol to another registrar.
Wheelbarrow of Kerberos Sploits May 18, 2000
gdead
A CERT advisory released yesterday outlines potential vulnerablities in 6 programs in the MIT Kerberos distribution. The long and short of it is if you've compiled Kerb5 with Kerb4 support, you've got some _huge_ holes to drive a hacker through, including the ability to remotely gain root level access on your KDC. Kerb4 (almost all rev's) is vulnerable as well. There are patches available, so get them while they're hot.
Mindrover, Guerilla marketing at work. May 17, 2000
dustin
I have lost several evening recently to a game from CogniToy called Mindrover. The premise of the game is cool. You have a small robot vehicle and a mission to complete. You wire up the robot and away it goes. Users can trade bots easily. Whats cooler yet (at least to the Shmooey part of me) is the marketing campaign. It's user driven. They have been to a few trade shows but no big ads anywhere. They concentrate on programming. I wish them luck and I hope other companies are able to use this model as well. I hate flashing banner ads.
OpenSSH 2.1 is out May 17, 2000
grendel
Well, I normally don't like to post software releases to this section, but OpenSSH is just too cool to ignore. It's been out and available for awhile now, but the 2.1 release includes some nice features, like it now supports both ssh1 & ssh2 protocols, in one nice neat package.

From the keyboard of Theo: "the portable release of it is coming together. as you might expect, openbsd 2.7 (shipping soonish, like in 4 weeks or so?) will contain it. ie. patent free ssh."

If you don't already use ssh, get a clue, go get it, turn off telnet.
For you poor souls that have to use Outlook at work. May 16, 2000
jpm
Microsoft has announced that an Outlook security patch is in development. One of the things I find interesting is that you won't be able to receive executables anymore.

You know, I just wish that they would admit that an email client that opens messages without your interaction was a bad idea.

May Cryptogram Newsletter Available May 15, 2000
curator
Mr. Schneier has put up his monthly newsletter this evening. This month, there's a general rant about the bass-ackwardness of trying to cure all our information security problems with magic bullets (applications, devices, chicken sacrifices), rather than treating it as an overall process of risk abatement. He even uses the oft stated (I'm sure I've heard it at least once or twice before), "Security is a process, not a product."

You'll also find notes on the International Cybercrime Treaty, the damnable ILOVEYOU bug/virus/feature, trusted client software (an important part of several engineered obselesence/EOL/limited lifetime usage apps), and Microsoft's lame attempts at Kerberos standards obfuscation.

Happy reading.

3 Year Comparative Study of BugTraq Vulnerabilities May 15, 2000
grendel
The hepcats over at Security Focus have compiled an interesting 3 year statistical comparison of vulnerabilities posted to BugTraq.

"Ever wanted to know which operating systems and applications have the most reported security vulnerabilities? Are there more known vulnerabilities in Windows NT or Linux?"

Check out the BugTraq Vulnerability Database Statistics now.
Online Voting is a Bad Idea May 13, 2000
pablos
Just twiddling a few bits could mean the difference between democracy and a h4x0poly! (I don't mind losing to Cindy or John, but Bob's gonna have to fight me for it.)

Update: Never fear readers, it seems a good dooer has quelled the ego of our most fair and beloved pablos. We trust he shall take this in good stride.

Cybercriminals on Americas Most Wanted May 13, 2000
gdead
So I was sitting around watching America's Most Wanted tonite (don't laugh... I'm currently living in a basically empty apartment with a 7" TV and no cable and only one computer... not much to do) and they had a little special on Cybercriminals. The high points:
  • The Melissa virus caused in excess of $80MM in damage
  • AMW intervied FBI Director Freeh *giggle* a _real_ meeting of the soundbites. Both sides tried to sound dramatic and apocalyptic, but it came out sounding vague and uninformative.
  • Terrorists all over the world are storing their evil plans on the internet for all to see and duplicate
  • They added the h4x0r's that helped mafiaboy in the Feb DDoS attacks to their Most Wanted List. Feel free to call them or visit their website if you overheard mafiaboy and pals in your favorite yahoo chatroom. NOTE: As of 10:45PM EDT, AMW's site is unreachable (as well as other sites in the Teleglobe network). Must be a DoS from all the folks sending in leads on where to stick it.
Foreign Agents Free to Roam State Department May 12, 2000
grendel
This is too much, considering the current state of security affairs in the State Department and a number of other high-profile government agencies.:) Apparently FBI section chief Timothy Bereznay has stated information that leads to the conclusion... *drum roll* foreign agents (aka spies:), under the guise of "news correspondents" were allowed to roam the State Department unescorted. Theres some discrepancy about the FBI actually knowing that said "news correspondents" were in fact spies, and did not notify the State Department. Funny:) Theres some great comments from FBI and State Department personnel pointing fingers in the article from USA Today.
MegaCar! May 11, 2000
grendel
Okay, this isn't exactly security news, but I can justify anything.:) This makes me feel a bit like Michael J. Fox in "Back to the Future".

Marty McFly: Wait a minute, Doc. Ah... Are you telling me you built a time machine... out of a DeLorean?
Doctor Emmet Brown: The way I see it, if you're gonna build a time machine into a car, why not do it with some style?

In other words, every geeks dream car. Mobile security command center anyone? It's 150 kbit/sec connectivity is provided by multihoming 16 GSM modules, an interesting method put together by security company, Data Protect AG. Be warned, the site is heavy on Flash.
Get Shorty May 10, 2000
grendel
There are a number of interesting items in the news today, believe it or not, a couple of them are from Wired.

Token security summit stresses education, no standards, and open communications. A number of ecommerce "players" got together to discuss security recently, with apparently not much valuable out of it except a commitment to share info... well, its a step.[ARTICLE].

Who Loves Ya Baby? Some uncredited person thinks that "the author is a member of the 'GrammerSoft' hacking group, which has links to AMA Computer College (AMACC) in Manila." C'mon, the number of theory's at this point is comical. [ARTICLE]

In an interesting, but not entirely ingenious move, Australian "CrimeNet" publishes australian criminal records online. According to them business is booming, demand for this sort of service is extremely high.[ARTICLE]

On an unrelated to security note, more in the vein of personal rights issues... Napster, in the course of getting sued by butt-rockers Metallica has suspended 317,377 user accounts, heres the statement. Of course theres nothing physically preventing all 317,377 users from signing up all over again.

Finally, for your viewing pleasure, satellite photo's of Area 51:). Theres apparently been some controversy over a number of imaging companies publishing photos of the supposed Black Ops base. You can see them at http://www.terraserver.com/ and http://www.spaceimaging.com/.
ILOVEYOU....not? May 8, 2000
ktsolis
The FBI and the Philippine National Bureau of Investigation rebuffed the amorous proclamation and have arrested a man suspected of being the ILOVEYOU virus author.
Law enforcement officials pinpointed the suspects last Friday but were unable to find a judge over the weekend who would issue a search warrant for the Manila apartment.
The NBI aired the possibility that the suspect might simply be the victim of an infected computer.
Final Hint For Number Station Contest #3 May 4, 2000
curator
Well, here it is three weeks later, and yet still no solution to the cipher. This will be the final hint for this contest. Next week around this time, there'll be a new cipher (perhaps a bit easier), but until then there's still a Contact DVD up for grabs.

    Third/final hint: Whilst digging around in the binary representation of the world of our message, think about ASCII and how it's represented at the binary level. And think about how many bits are in the regulation ASCII set, excluding any of the extended non-standard set.

Now get cracking.

Have they ever heard of PGP? May 3, 2000
rodney
The UK government has announced their intent to require links from all ISP's to MI-5's headquarters for email monitoring, according to news reports. John Gilmore once said "The Internet treats censorship as damage, and routes around it." One wonders also if they've ever heard of PGP or IPsec or other encryption technologies, all of which are available in Europe, thank you very much.

The member of the long-lost southeastern shmoo sub-clan would like to thank the shmoo elders for inviting us to this site ;-)

Phrack 56 is all GUI May 2, 2000
gdead
Phrack 56 is at phrack.com. One would hope that the huge delays between the recent phrack's would greatly increase their quality... but alas, I don't think it's true. P56 is better than the last few, but not as revolutionary as the orginals. And it's all GUI and I think I got some on me (they have a SecurityFocus.com ad on the main page).

On a side note, you may have noticed my absence from the shmoo.com lately. I'm currently on a cross country trip in my truck to a new and wonderful job on the right coast. I'm in a hotel off of I-90 in Idaho right now, and hope to come out of warp in Virginia in about a week. Wish me luck :)
A Short In the System May 2, 2000
curator
What passes for news from around the 'Net:

The Seattle Times has an article that apparently attempts to educate users about the insecurity of their e-mail. Unfortunately, it's a lackluster attempt that fails to educate the user, and even leaves the user with the sense that everything is just fine, unless you're famous. The upshot is that your e-mail is safe with your ISP and eveywhere else because it takes too much to time to read everyone's email. And besides it's bad business, unless you're famous, then you have something to worry about, but can fix it, not by using PGP (or GPG, or any semi-standard solution), but by using some ginchy bit o' software from Cypost. Insert dumbfounded stare here. This is the "meat" of their article. These people can't be on the same plane of existence as the rest of us. In an article entitled "Internet security: Just how safe is your e-mail?", you'd think they'd actually have credible "experts", and some information that users would find useful. Perhaps they'd tell people about corporate e-mail problems and solutions? Encryption standards? The law, maybe? And to make things worse, they say it will be even less of a problem in the future, because there'll be even more e-mail, making it more difficult to browse. Whatever. With information like this spreading around to the general public, it's no wonder the average user doesn't realize the true insecurities of e-mail. Argghhh!

ZDNet has an article about another company proposing to make money from tracking everywhere users go and feeding the boiled down version of it to merchants. The company actually believes that a lot of people will willingly download their software (or free ISP's will require/bundle it), install it, and allow themselves to be tracked, cataloged, and spammed. Apparently, the software also allows the company to track all form submissions, but haven't decided whether they're going to implement that feature yet. Yeah, that's just what we need. Hook me up.

Ok, that was only two of them, and they weren't exactly short, but ...

Number Station Hint #2 For Contest #3 Apr 27, 2000
curator
Two plus weeks into the excitement that is the third TSG number station contest and still no winning solution, so it's time for the next hint. Keep listening and remember that there's a Contact DVD in it for the winner.

    Hint: While delving deeper into the base of the numbers that are broadcast, and the different way those same numbers may be represented, think strings of binary.
Is That Your Quanta I See Before Me? Apr 27, 2000
curator
According to a recent update of American Institute of Physics (AIP) Newsletter, three separate institutions have demonstrated the use of entanglement-based quantum cryptography to encrypt data over long distances and at faster speeds than achievable with non-entangled cryptography. Researchers tested several features of this "most foolproof" quantum cryptography yet, including simulating a snooper in the loop.

Pretty darn cool stuff all things considered. No word of when I'll be able to attach an add-on unit to my Palm though.

Biometric Use Report Released Apr 26, 2000
ktsolis
International Biometric Group has published a report covering trends in use of biometric identification and authentication systems. Finger-scanning wins in the biometric popularity contest at 34% market share, followed by hand geometry (26%), facial recognition (15%), iris and retina scan (11%), speaker verification (11%), and signature verification (3%).

pablos: Sadly, these guys are not Brothers in Arms. Choice quote from their site - "The future will be brighter when the privacy paranoia fades."

Patches are More than Just an Early 80's Fashion Statement Apr 25, 2000
pablos
If you use RedHat, get this patch which supposedly fixes the "Piranha" exploit.
Palm VII banned from National Lab Apr 24, 2000
ktsolis
The San Jose Mercury News reports that Palm VII's have been banned from Lawrence Livermore National Labs. This isn't so surprising; after all, this is the same place where workers and visitors reportedly slip their batteries out of their cell phones when they enter secure areas. No news on whether Ricochet is banned though : )
ZDNet Town Hall Redux Apr 21, 2000
ktsolis
On Thursday morning, ZDNet held a Town Hall meeting to discuss cyberterror and possibilities for government/private sector response.

Though this meeting to foster public discussion of a public problem was itself semi-newsworthy, the government did not unveil any new proposals. Jeffery Hunker, a White House advisor on threats to critical infrastructure, briefly outlined elements of the Clinton administration's National Plan for Information Systems Protection (http://cryptome.org/cybersec-plan.htm) -pointedly labeling it 'Version 1.0'.

One law enforcement official slipped out the back, exasperated at the number of policy wonks in the room. Hacker-turned-government advisor Mudge didn't show, but Gregor Freund of Zone Labs took his place as the technology expert on the panel.

Hunker stressed that though we have not yet seen instances of cyberterror, we should be concerned that China, Russia, and other countries are developing CNA (Computer Network Attack) capability, and that we need to take a proactive stance to protect critical infrastructure. Hunker and the other panelists discussed the need for public/private collaboration to secure the Internet, yet they emphasized that individual citizens must take responsibility to protect themselves.

Members from the audience proposed that government should have a federal 'sandbox' where hackers can legally play-after all, not all 15-year olds can afford a security lab. Hunker seemed interested.

More information on the Town Hall meeting from ZDNet.

All This for a Portscan? Apr 20, 2000
gdead
FreePaul.org has been doing the rounds on all the security sites. Quick overview: Paul (from "FreePaul" and a student at CalPoly) used computer on a CalPoly network to portscan a host outside of the CalPoly network. He claims the portscan was lawful and part of his job as a sysadmin at a local web development shop. CalPoly contends he was violating their AUP and California law.

As Paul's website asks, "why should you care?" Well, because it's damn funny. First of all, Paul has given very little justification as to what he was actually doing (portscanning a cable modem, over and over). His defense is based completely on legal loopholes in CalPoly regulations as well as exploiting the misconduct of CP administration. His site is huge, and contains very little technical information and is mostly pages and pages (and mp3's) of dealings with CalPoly's administration. At this point, he's made the entire CalPoly Judicial Affairs division look like the Keystone Cops and himself the oppressed, poor, knowledge-hungry college student. Regardless if he had bad intent or not, I think he'll get out of most of the charges simply because he was able to confuse the issues beyond recognition. After college, I hear he has a job with Johnnie Cochran....
Number Station Contest Hint Apr 19, 2000
gdead
Well, it's been about a week since we posted the third number station contest, and we still don't have a winner. Looks like curator made a good cipher. Maybe too good, but we'll see. ;) I'll throw out a hint once a week until it's solved to help folks out. There's a free DVD in it for you, so get cracking.

Today's Hint:
Don't think of the numbers in decimal or octal notation. Dive deeper.

Hope this helps. email tsg@shmoo.com if you've solved it. Good luck.
From the Mouths of Anti-Virus Vendors... Apr 18, 2000
gdead
This is a snippet from a discussion on Silicon.com about hiring hackers to do "real" white-hat security work:
    Graham Cluely, senior technical consultant at anti-virus vendor Sophos, said the group [hackers] may find it hard to be accepted in the marketplace. He said: "They may find they need to act in a more corporate way."

    "Who is going to buy software from someone who hides behind a pseudonym like 'Shrieking Radish' or 'Colostomy BagBoy' rather than a real name?" Cluely added.
bash-2.02$ egrep radish /etc/aliases
shriekingradish:gdead
bash-2.02$


[Barry White voice]Oh yeah..[end Barry] From now on, I will be known as ShriekingRadish... email me at ShriekingRadish@shmoo.com

May all your salads be eaten out of black hats.
Mafiaboy Arrested in Conjunction with DDoS Attacks Apr 18, 2000
gdead
According to CNN and a Royal Canadian Mounted Police press release, mafiaboy was arrested in Canada for his involvement in the DDoS attacks against eBay, Yahoo, CNN, et al. There is very little information available currently, as the RCMP has only acknowledged the arrest and said little else. There is a press conference scheduled for 10:30a Montreal time where the Mounties will release more information and answer questions. We'll keep you posted on what happens, and maybe try to send someone there.

BTW: anybody in Montreal want to join The Shmoo Group ;-)
Is Open Source Software a Panacea for Security? Apr 18, 2000
larry
Elias Levy of Security Focus fame has just posted a moderately harsh article about the security problems Open Source Software can have, and how they compare to the problems with closed source software. It seems that the article has gotten a few people's panties in a bunch, including Bruce Perens (from SPI, Debian and countless other OSS projects).

While I don't agree with much of what Elias Levy says in this case, I give him the benifit of the doubt from his many years working with BugTraq (one of the earliest, and best respected, full disclosure security forums) that he's more questioning people's blind faith in OSS as as oftware development method, then then Open Source model its self.

The Reason IMAP Has Not Caught On Apr 17, 2000
gdead
Ask your local admin what they think of IMAP. I'll bet dollars to doughnut's his answer will be "It's really nice to use, and is very flexible, but it's a security hole the size of the Lincoln Tunnel." In the past, I'd say that was very true. For most admins, IMAP == University of Washington's IMAPD server. It is the most fully functional, well known, open source IMAP server out there. And it's historically been chock full of holes. Looking through SecurityFocus' sploits archive digs up at least 4 vulnerabilities in the last 3 years for IMAP-UW. However, in the last year things seemed on the up and up. No new problems, and lots of new features. One would have thought they had the code under control.

My thoughts on IMAP-UW changed drastically this week due to a new thread on bugtraq. It all started with yesterday's post about a vulnerability in the LIST command in the UW server.

    To: BUGTRAQ@SECURITYFOCUS.COM
    Subject: imapd4r1 v12.264
    From: Michal Zalewski
    Newest RH:

    OK nimue IMAP4rev1 v12.264 server ready
    1 login lcamtuf test
    1 OK LOGIN completed
    1 list "" AAAAAAAAAAAAAAAAAAAAAAAAAAA...[yes, a lot of 'A's ;]
    Program received signal SIGSEGV, Segmentation fault.
    0x41414141 in ?? ()

    *sigh*

    Privledges seems to be dropped, but, anyway, it's nice way to get shell access to mail account, maybe grab some data from memory etc.
*sigh* is right. A sploit to get local access of any level is bad, esp with the number of "local root exploits" running around that admins tend not to fix. Maybe the code isn't as solid as I thought.

Of course, the vulnerability gets a response from Mark Cripsin, the author of UW's IMAP. This is where I lose all faith in the system. I'll just quote the good stuff and comment where needed.
    As was indicated, all privileges are dropped at that point. There is nothing that can be done by crashing imapd this way that can not also be done (much easier) by logging in to the UNIX shell.

    This of course assumes that the user has a shell account on the server he's getting his mail from. I'd say that 90% of the time, this is not the case, judging from the work I've done at ISP's and talking with other geeks

    All imapd security efforts have been focused on eliminating root-level security holes. ... There has not been an equivalent effort to eliminate all possible ways to induce imapd or the c-client library to crash when it is in a non-root state. I am not certain that the results would be worth the effort, particularly since there are alternatives, either one of which is sufficient to neutralize the problem:

    If you have a "closed" system (which is the only type of system where this bug matters), a much better solution is to insert the following instruction in routine pw_login() in env_unix.c:
    if (chroot (home ? home : ANONYMOUSHOME)) chroot ("/tmp");

    Not every machine supports "jailed" processes. And of those that do, sometimes having local privs is enough to break out of the jail. chroot solves some problems in normal execution, but if a program can be exploited, a chroot'd jail may not be enough to stop the bad things from happening

    Another important measure is to use StackGuard. I am very surprised at the implication that RedHat doesn't use StackGuard. Is that really true?

    As many on bugtraq pointed out, the whole planet isn't run on Linux, so StackGaurd isn't always an option. Plus, it's best to fix the whole and not rely on the OS to catch your mistake
The moral of the story? If this is the attitude around the UW development team, keep their software away from me. Security is more than just keeping out root level exploits... it's a process. From the high layer design to each strncpy, it needs to be thought of at every level. Relying on admins to build a secure enough system to not be compromised when your software crashes isn't the answer. Assume the admins are monkeys and not trained in the arts of security. Create monkey proof software.

The really unfortunate part of all this is the IMAP-UW server is synonymous with "IMAP" in general. If they continue to develop insecure software, the industry will be reluctant to adopt the IMAP protocol based on the "market leader's" performance. Until UW gets it's act together and starts seriously integrating security into their code, IMAP doesn't have a chance.
Being Enonymously Stupid Is Still Stupid Apr 13, 2000
curator
As if the waters of online privacy weren't muddy enough, a new website promises to rate websites according to the quality of the privacy they ensure. This may sound all well and good, but the ratings system is somewhat specious at best, as stated in an article at Wired. Enonymous's four star rating system while seemingly sending a site's user valuable information about the security of that user's privacy on that site can be quite misleading. As stated in the above article, a number of sites are completely mislabeled and poorly rated, including epic.org, eff.org, slashdot.org, and many others. Other major sites have yet to be cataloged/rated at all. Still others are claimed to have no privacy policy whatsoever, when it is quite plain to see to interested party, especially one who's supposed to be rating a site, that there is one. Even beyond the realm of rating what's stated on the site, what do the raters know of what really happens to our data when it's taken? Who's to say the rated company won't ignore their own stated privacy policies? It's not as if it hasn't already happened.

Some of these problems are somewhat understandable, as the ratings are created by humans, fallible as we are; however, given the great number of errors that exist, it is nearly unforgiveable for a company that claims "strict, objective criteria" and wants to make money off our privacy concerns, to blatantly mislead the public into thinking they're the "privacy standard". And more along those lines, how much do we trust a company who's entire business is based upon making money off our privacy, and who's trying sell a "wallet" and other services that are intimately related to how customers feel about the privacy of a site.

And then there's that insipid name...

Digital Signatures a Threat to Privacy? Apr 12, 2000
larry

According to this article on ZDNet some people think that the current laws getting ready to be passed regarding digital signatures might not be in the best interests of the consumer. Funnily enough the voice quoted is that of Zero Knowledge Systems who have recently patented a system for digital signatures which are capable of only releasing a portion of your credentials to a remote site.

Still I like what I've seen from ZKS so far and some good points are made.

WAPtacular Security Coming To a Phone Near You Apr 11, 2000
gdead
According to a buzzword-compliant report on Wired, mobile phone manufactures Ericsson, Nokia, and Motorola have teamed up in an attempt to make even more money. Even though current Internet phones are relatively unsecure, they claim to have everything under control. The 3 companies believe that the next generation of WAP enabled phones, complete with WTLS (SSL for cell phones) and WIM (strong auth) will make mobile devices "the platform to bridge the virtual and physical worlds of e-business." Silly me, I thought my PC already did that.

As a side note, if you want a fun way to waste a few hours, try and find an available domain name with the term "WAP" in it. Then find one that makes sense.
Internet Number Station Contest too Apr 11, 2000
gdead
The first Internet Number Station contest has been solved. It took 5 hours to fall to "cryptonalysis" (the cipher was simply a conversion from ascii to decimal). Thanks to all those who played and congrats to the winner.

Contest #2 is now running. A new, tougher cipher for this round, but still very solvable. Check out http://www.shmoo.com/numbers/ for links to the new numbers. Tune in, transscribe, and win "Pi" on DVD.

Feedback is always welcome. And thanks for playing :)
Shmoo's Shorts Are Fluffy Apr 10, 2000
gdead
Lots of news today worth mentioning. The Internet Number Station started and finished it's first contest today. TrustedBSD was announced. TBSD is an attempt to build a B1 compliant BSD UNIX. Slashdot interviewed Ian Clarke of FreeNet fame. Some say Ian won't succeed. Others (namely most of the members of TSG) think he's right on target. According to Info-War, many of US West's DSL customers don't set a password on their routers. The end result: 3l337 h4x0r's can take over their routers with a telnet and a smile. Isn't the Internet great?
Announcing the TSG Internet Number Station Apr 10, 2000
gdead
If you're a shortwave radio junkie, you probably already know what the term "number station" means. If you're like me (an Internet geek who's never touched a shortwave radio) then you may not have any idea what a number station is, let alone why they're so cool. In short, the stations are either a complete hoax or the cheapest, best way to send encrypted messages to people all over the world. They've been around since the 40's, and still no one knows exactly what they mean. In the spirit of crypto advocacy, TSG has set up it's own Internet Number Station. We've enciphered a message into numbers and are broadcasting it across the net. If you're the first to break the code, you'll win a free DVD. The first contest is easy, and they'll get harder as new ones start, so play early if you don't want to think too hard. ;)
April 2000 Cypherpunks Mtg. Apr 10, 2000
pablos
The San Francisco Bay Area Cypherpunks meeting was held on Saturday in the sunny courtyard of Stanford's Tressidor Union. Cindy Cohn, the attorney representing Peter Junger in the Junger vs. Daley case, celebrated the Sixth Circuit Court of Appeals recent ruling that yes--source code is protected speech under the First Amendment. The decision calls into question the Clinton Administration's current restrictions on the export of encryption software. Cohn discussed differences in the Bernstein and Junger cases and answered questions regarding the puzzling new (well, as of January) crypto export regulations.

Many of the cypherpunk usual suspects were off attending the Computers, Freedom, and Privacy Conference in Toronto. We hear that they held a meeting on Saturday at the Toronto City Hall--we imagine that we'll hear more from the cavorting conference-goers as they straggle home.

Articles on the Junger case: CNET & Wired

On another note, Cohn and the EFF may soon be launching BXA Watch, a community watchdog organization that will keep an eye on the Bureau of Export Administration. Cohn fears that the BXA might attempt to reintroduce stricter crypto export regulations. Stay tuned.

European Parliament Demands End of Anonymity Apr 7, 2000
larry

Article Stolen from Technocrat: According to this article (in German but Babelfish is your friend) the committee "citizen rights, internal affairs, and law" of the European parliament requires an end to anonymity on the Internet. In a report the committee also suggests that ISPs should be forced to enable the identification of email users and store connection data for up to 3 months.

The recommendations of the parliament are not binding however. The council for justice and internal affairs makes the final decision over the directive.

See also End of Anonymity (in German too) for a more in-depth article.

Census 2000 Afraid of the Internet Apr 7, 2000
gdead
Sick of hearing about the US Census? Well, here's some info that may push you over the edge. According to the Industry Standard, the Census Bureau does "not feel ready to rely on the Internet as a primary means of collection this year". If you have the short form, 5-in-6 households do, you can send your response via the Net. Even though the majority of households are eligible to answer the census online, the Bureau deliberately played down that ability. Their primary concern was protecting the data from hackers, a feat that the government has proven woefully incompetent. But fear not! According to a census official, the Bureau "will unleash a full-fledged online collection effort" for the 2010 census.
Oh God, Don't Encourage Them Apr 6, 2000
gdead
In what I think is a fit of cocaine-induced bravado, IRCNet will be shutdown for more than a day this weekend in order to protest DDoS attacks. To quote the press release:
    The German IRCnet operators have been forced to do this to point out that continuous sabotage by individuals and groups against the IRCnet infrastructure threatens the future of IRCnet and IRC as a whole in Germany.

    ...

    The German IRCnet operators want to show, with this token strike, that the mindless vandalism of individuals and groups is endangering the whole IRC community and ultimately, the future of open Internet services in general. If this behaviour of just a few people continues it will gradually lead to the loss of a historic and popular Internet culture.
*sigh* They don't even need the 3l337 script kiddies to DoS them... they'll do it themselves. I think the "popular Internet culture" is more than just open and cooperative services. It's standing up to adversity and overcoming the problems that are presented... not caving in to them. By shutting there doors in protest, even for a short time, IRCNet stops legitimate users from accessing their service and forces them to go elsewhere. Plus it re-inforces the folks attacking the servers, showing them that they can get results above and beyond what there initial DoS was trying to accomplish.

To me, this boils down to "negotiating with terrorists," which is some thing I'm convinced you shouldn't do. By acknowledging their existance and purpose, you just fan the flames, and open the door to larger and meaner attacks down the road. To all those users of IRCNet looking for a place to go, check out NewNet, a very open and democratic network who won't bend to hackers.
Enigma Thief Arrested, No Machine... Yet Apr 6, 2000
gdead
According to Wired, a suspect in last week's hoist of one of the world's last Enigma machines has been arrested and released on bail. Very few details of the 50 year old suspect have been given to the public, with no word on possible motivations. There is a feeling that the machine is still on Bletchley Park grounds, possibly outdoors. A herd of British police officers have returned to the Bletchley museum in an attempt to find it before the evil island weather destroys it. Anybody know of any conversion kits for IBM Selectric's so they can emulate an Enigma?
Cyber Patrol ban list published on the Web Apr 5, 2000
null
Get it while it's hot. Amusing reading, to say the least.
Crypto Regs One Step Closer to Death Apr 5, 2000
gdead
The 6th District Court of Appeals declared yesterday that crypto source code is a method of speech and is covered by the First Admendment. w00t! There ruling was in response to Peter Junger's suit against the Fed regarding his book Computers and the Law. This ruling is also in harmony with the 9th District's ruling in the Bernstein case. So now with appelate courts on boths sides of the nation agreeing crypto source code is protected by the 1st Amendment, it shouldn't be long before all regs regarding source are torn down... I'll buy the beer when that happens.
NATO Pooches It Apr 4, 2000
pablos
NATO is blaming a leaked classified document on a "virus." Apparently the public perception of viruses being omnipotent is just too hard to resist for media spinsters. I've never seen a press release that said "NATO Fucked Up." The interesting part of this article is:
    "Sources also suggest that the document was posted to a Usenet group, but was quickly deleted by a Ministry of Defence autobot, a software agent that autodeletes questionable Usenet postings from the servers of Usenet-enabled Internet service providers (ISPs) around the world."

Sounds like Scientologists. Oh yeah, Riccochet works great in the SeaTac airport.

ECC2K 108bit Cracked Apr 4, 2000
gdead
After 4 months and 76% of the keyspace, the Ceritcom ECC 108bit Challenge has been solved. The ECDL Project will give USD8,000 to the Apache folks and keep 2K for themselves. If you're running the client, you can stop now. The EDCL Project has recommendations for that spare CPU time: ECMNET which aims to find new factors of Cunningham numbers, and CABAL773, a project to factor some _giant_ number that eats up a ton of RAM.
More Info on CIA Venture Capital Apr 4, 2000
gdead
The CIA's venture capital wing, In-Q-Tel, is in the news again. To quote the MSNBC article: "In-Q-Tel's mission: to invest in high-tech start-ups that will help the spy agency regain the edge in gizmos and gadgets that it once held over the private sector." So far In-Q-Tel has been pitched to by more than 500 start-ups, but only invested in 8. And, not surprisingly, those companies are security related. If you'd like to pitch your idea to the fed, check out In-Q-Tel's website and sell your soul^H^H^H^Hsubmit your business plan.
Call For Papers: ACM Con for Computer and Communication Security Apr 4, 2000
gdead
Got a brain? Want to go to Athens? Then submit a paper for the 7th annual ACM Convention for Computer and Communication Security. The con will be the first week of November, and abstracts are due by April 30th. Topics range from IDS to steganography to database security. So get a paper ready, talk to your advisor/boss/figurehead and contribute something.
What was the FBI Thinking? Apr 3, 2000
gdead
By now, I'm sure most of you have heard of the 911 virus. The FBI released a warning about the virus on April 1 (no foolin') which SANS picked up and fired out to their lists. After reading about the "threat" this virus posed, I wondered why such a big deal was made of this slowly propogating, not-so-dangerous program. Apparently, I wasn't alone. This story from InternetNews echos some of my feelings. Basically, the FBI cried wolf. While a program that will randomly dial 911 and delete your harddrive at the end of the month is a Bad Thing, this particular one wasn't really a threat. The program replicates itself across open Windows shares, but it's a DOS batch file that must actually be executed in order to do it's damage. I guess it will fool the "oh-I-wonder-what-this-program-is" crowd, but not many others. I think someone at the Fed got a bit scared on April Fool's and jumped the gun on this one.
Enigma Machine Stolen Apr 3, 2000
gdead
The BBC reports that one of the 3 remaining Enigma machines were stolen. This one was located at Bletchley Park in the UK, where Alan Turing did much of his work. Apparently the machine was worth £100,000, but in the words of Mastercard, the value to the crypto industry is "priceless". So, if someone approaches you on the street offering a "genuine" Enigma machine, be a good netizen... kick them in the knees, pick up the machine, and run to Scotland Yard.
Hacking the MIT Tunnels Mar 31, 2000
gdead
The Boston Globe has an article on how students at MIT routinely "hack" into the tunnels under the campus. They "hack" in the historical terms... "interrogating the environment, and learning from it." According to sources (my boss, an MIT almost-grad) this has been going on for years. Lets hope the new-found attention doesn't put a halt to this. They may be forced to take their creative desires online and turn to the "dark side" ;)
If You Dare Wear Short-Shorts... Mar 28, 2000
grendel
Here's a number of newsworthy items that haven't gotten posted, both new and old. Theres a discussion of C2 auditing of Linux Systems going on over at Slashdot. A keyboard that has an embeded keylogger over here. Theres a content-light article about european scientists cracking RSA-155 on USA Today. "Melissa" (the virus) turns 1 year old, and theres an article over at ZDNet. Finally, the feds want to "Change Law to Fight Cyber Crime". Reeeeeally. I'm all over empowering law enforcement to do their job properly, but if that entails ridiculous broad-handed expansion of federal power in such a way that takes away my freedom... screw that. Well, the article is pretty light on details, but this is a thread to keep an eye on.
ZixMail Replies Mar 24, 2000
pablos
Yesterday, we reported that ZixMail incorporated key escrow. Today I got an email message from the CEO of ZixIt Corporation, David Cook claiming that is no longer the case:

I wanted to address the "key escrow" issue that you have raised regarding ZixMail.

The quote that you reference was from last July - when the escrow was required for "hard" encryption. That requirement was eliminated in December - and we do not keep an escrow of any kind.

I would like to invite you to come to Dallas and visit our data center. I will personally walk you through the system design, etc...

Let me know if you are interested in coming to Dallas.

Thanks

David Cook (CEO)
ZixIt Corporation

My efforts to contact ZixMail about this yesterday failed, and I apologize for the outdated information. Hopefully they're working on replies to our other advice:

  • Open source their (crypto) code
  • Embrace at least one of the existing standards for encrypted email (PGP &/or S/MIME).
IETF Rejects "Wiretapping" Proposal Mar 23, 2000
curator
In the "score one for the good guys" book, the IETF has agreed they should not build wiretapping capabilities into protocols for the sake of an individual government's want to spy on people. Among their other reasons for not considering wiretapping:

  • Given the lack of end to end protection (encryption, et al.) of data on the Internet as it stands today, there are plenty of opportunities for wiretapping external to any standard.
  • Providing such backdoors, may be illegal in some privacy-conscious jurisdictions.
  • Such things would greatly complicate protocols as backdoors, and backdoors to backdoors, would need to be created.
  • The concept if foreign to their views on privacy (RFC1984).
  • The wiretapping technologies would, in their minds, need to be documented fully, possibly negating the effects of the wiretapping or the usage of the protocol.

Good for them! Good for us.

Evil ZixMail Product Launches Today Mar 23, 2000
pablos
ZixIt (Formerly CustomTracks) today announced they are launching ZixMail, "the New Internet Standard for Secure Document Delivery and Private Email Communications." This is utter snake-shit. ZixMail is a standard in no sense of the word. As The Shmoo Group reported last July, ZixMail is Key Escrow. They admitted to this in the following statement that can no longer be found online:

Second, Is there a key escrow for ZixMail?

In order to obtain worldwide encryption export approval from the Commerce Department - for encryption that the National Security Agency cannot break - there is a requirement that a secure key escrow be established, normally with a "trusted third party". This escrow can be accessed only by court order from a federal court of competent jurisdiction.

CustomTracks has been approved to be its own "trusted third party". The escrowed keys, however, are encrypted by public key cryptography and can only be decrypted by a private key that is unknown to CustomTracks or ZixMail.


ZixIt can redeem themselves with a few simple measures:
  • Eliminate key escrow
  • OpenSource their code
  • Embrace at least one of the existing standards for encrypted email (PGP &/or S/MIME).

In the mean time they can start by leveling with their customers. I can find no mention of key escrow on the ZixMail site.

Damages Due to Hacking on the Rise Mar 22, 2000
gdead
According to this report from CNN, financial damages due to hacking are on the rise. Surprise! Gee, with global acceptance of e-* type business, and the millions of dollars going across the net every day, it's not hard to believe that more money is being lost. This article is far from informative, but is going to help stoke the fires of the Fed and Big Business who are looking for ways hammer down on hackers (and in the process taking away some of our privacy). What I'm curious about is how the increase loss to do attacks compares to the increase in total revenues of Net companies. And maybe if someone can show me a good way to calculate "damages due to information theft" I'll be less sceptical of that $66MM figure. (BTW: if you read the press release from CSI that is the basis for CNN's report, you'll notice that "employee abuse of Internet access privileges (for example, downloading pornography or pirated software, or inappropriate use of e-mail systems)" is included in the $265MM loss due to "hacking".
DoveBid Adopts PGP for Authenticating Press Releases Mar 21, 2000
pablos
DoveBid appears to be the first corporation to take on a policy of digitally signing their press releases. This is a sound practice that should be adopted far more widely. If you need help understanding why this is useful, read this Wired blurb.

UPDATE: If you check out some of Microsoft's posts to Bugtraq lately, you'll notice they're PGP signing all their announcements. I can't wait till they get fed up with that and develop MSPGP... of course it won't work with any PGP in existance, but you'll have to install it when you fire up IE6, else the OS will cease to work. - gdead
Score One for the Good Guys Mar 20, 2000
gdead
Thanks in part to a TSG'r, Mike, two San Deigo teens have been arrested in a "spam and scam" ring they were running. The teens, tracked down by Mike, the FBI, and the Anchorage Police Dept, had been sending mail to customers of victim ISP's asking them for their credit card number. mmmm... social engineering at it's best. Anyhoo, they got caught. w00t! Read more at the Anchorage Daily News.
Dropping Our Briefs Mar 20, 2000
curator
Saucy bits of recent news for your viewing digestion. Both the newestCryptoGram and SAFER Newsletter have arrived. The CryptoGram has an article on Windows 2000's broken Kerberos implementation, a paper on AES performance analysis, the Virginian UCITA vote, and additional stuff you'll be sure to devour. The SAFER Newsletter is chock full of it's usual summary of the past month's international security news, tools, and errata. The EU has agreed that current US corporate self-regulation on digital privacy meets with their approval, paving the way for increased sharing of information between EU and US corporations. woohoo? In it's furious and painful backpedal, DoubleClick has hired an "inside watchdog". In indirect rebuff to the CEO of iDefense (that name still makes me laugh), an European report has recently been made public, and an ex-director of the has publicly acknowledged that the US through the auspices of Echelon has commited many acts of corporate espionage.

What with all this fun, what will the coming week bring?

"Hactivists" plan DDoS Web attack? Mar 15, 2000
larry

Always having been one to be amused by the masses finding new ways to thumb their collective noses at authority figures I was intrigued. Distribute a client (in this case just an HTML file) to LOTS of people and then have them use this to take down an enemies server. They are even going to warn them that the attack is coming.

As fasincated as I am I must admit that my first thought was that if i was the victim I'd be covering my odds by harvesting as much information as I could from the maruaders to sell to someone. Surely information on people who hate you has to be worth money to someone. Got the email address of 10,000 people who hate genetically modified food, why not sell it to a health food chain.... or something.

More info here: Microsoft officials announced today a proposed acquisition of the National Security Agency. In a move to bolster their dominance in the growing privacy invasion market, Microsoft will rebrand the NSA as MSNSA and leverage its worldwide customer base to improve surveillance penetration. Microsoft claims it has already incorporated leading spy technology into all its products, and this is a logical progression, giving them access to key intellectual property, and all the other information in the world. NSA officials commented that "Microsoft has been a valuable partner for over 15 years, our union can eliminate the threat of privacy from Amercans once and for all."

Verisign Buys Network Solutions Mar 7, 2000
pablos
I don't know who is buying Verisign stock, or how it got to be worth so much, but they're on a spree. Called "The leading provider of Internet security," whatever that means, Verisign paid US$21 Billion for Network Solutions. Roughly 1 Carl Sagan Unit. I was going to try and spell out the evils here, but I'll assume our readers can extrapolate for themselves.
Netflix's SSL cert expires, and nobody's home. Mar 6, 2000
null
Heard of Netflix? They rent DVDs. It's actually a pretty kewlio outfit. I recently joined their Marquee program, which allows you to put dvds intoa queue of sorts for shipment after you return the discs you currently have rented. Anywho, I went over early (1am) saturday morning to add some movies to my queue. So I'm happily adding stuff, and at the end, have need to connect to their secure server. Lo and behold, my browser tells me that their Security Certificate is expired. Ouch. That's bad.

Read More
Clinton Doesn't Think E-mail is Secure Enough for his Family Mar 6, 2000
gdead
In a speech last friday, President Clinton stated that he won't use email to communicate with Chelsea. "Absolutely not -- I don't think it's secure," was the President's response when asked if he used email with his daughter. It's a bit of a slap in the face for Internet businesses, but a reassurance for consumers worried about their privacy. If the current state of email isn't secure enough for the first family, it's OK for the average family to be concerned about it.
Biometrics Deployment Pushing on Despite Fears Mar 5, 2000
gdead
An article from ZDNet indicates that many e-commerce companies are starting to deploy biometric auth mechanisms despite consumer fears. Companies such as DrugEmporium.Com feel that information as personal as a fingerprint should be used for purchasing online. Some banks are already starting to deploy fingerprint scanning mice to enable users to bank more securely. That's all fine and dandy as long as your fingerprint gets verfied against the local hardware with a ACK/NACK sent to the merchant. Once the merchant requests more than that... once they actually want to keep your fingerprint on file... that's when bad things will happen. Biometric information is too private to give out to merchants, regardless of the current state of authentication protocols.
FBI Clears Coolio of DDoS Involvement Mar 4, 2000
gdead
Dennis Moran, Jr, aka coolio, was cleared of involvement in last month's DDoS attacks by the FBI. In an interview with MSNBC, Moran claimed that his IRC comments where he claims responsibility for the attacks were simply a "joke." He has admitted to defacing more than 100 websites, and will be charged next week in LA. In the meantime, the FBI and RCMP continue to investigate the attacks.
DoubleClick's New Deal (Just Stalling) Mar 4, 2000
pablos
DoubleClick CEO Kevin O'Conner capitulated on plans to cross-reference their databases, a move that would correlate identities with their web traffic records. While his personal statement that he "made a mistake" is touching, he made it clear that DoubleClick is still looking to do so, when there is "agreement between government and industry on privacy standards." These are not groups known for their respect of individual privacy. Don't be fooled, this is still just spin. If "DoubleClick's leadership as an innovator" is to do be taken seriously, they should be developing tools that put ownership and control of profile data in the hands of individuals.

#chmod 700 .profile

"Hackers" Sound Better Mar 3, 2000
gdead
Last week, National Discount Brokers, an online stock brokerage, claimed to be the victim of a denial of service attack. Now, they claim the problem was bad software that had all the "earmarks" of a hacking attack. They are now persuing legal action against their software vendor. The nice thing about blaming transient problems on DoS attacks is no one can refute you, and it's "not your fault." The CW is that DoS attacks are a cronic problem with the internet. The real wisdom says that you can build a network that is resistant to currently known DDoS attacks, and that it IS the fault of the company when they get attacked and fall down making toast.
House of DDoS Suspect Raided Mar 2, 2000
gdead
According to this story from CNN, the home of a suspect in last month's DDoS attacks has been raided. The suspect is a 17 year old male from New Hampshire who goes by the IRC handle "coolio". MSNBC reports that coolio has admitted to defacing the Dare.org and RSA.Com websites. The Los Angeles DA's office plans to press charges against the youth next week for the Dare.org defacement. The FBI is still investigating connections coolio may have had with the DDoS attacks, and no charges are pending. The MSNBC report also has several very interesting logs from IRC sessions supposedly with the youth. The logs seem to be very incriminating. Coolio was tracked down through an account he had with an Arizona ISP.
FTC Lays into Trans Union Corp. Mar 2, 2000
pablos
The Chicago Tribune has an article about The Federal Trade Commission ordering Trans Union Corp., the Chicago-based credit reporting giant, to stop selling personal information to companies that use the data to target consumers--a victory for personal financial privacy.

This is based on the Fair Credit Reporting Act, one of the few strong bits of legislation that consumers have going for them.

SANS Network Security 2000 Paper Deadline Mar 2, 2000
gdead
The Call for Papers deadline for SANS Network Security 2000 is March 15th. SANS is looking for "presentations about the lessons learned in solving the daily problems of managing and securing networks and systems, intrusion detection and vulnerability assessment." They put on a really good show, and if you've done something interesting, draft up a paper and send it in. Presenting papers at cons like SANS is a great way to give back to the community as well as extend yourself professionally. Go for it d00d...
BXA Tries to Clarify Crypto Regs Mar 2, 2000
gdead
The new crypto regs came out over a month ago, and there is still some confusion on what they mean and how they're applied. The BXA has attempted to clear up some of the confusion by releasing new docs. They've distilled the regs down to a few charts (1 & 2), and in all honesty it actually helps. The bottom line for open source developers is that you're still unrestricted but need to notify the Fed when you post crypto to the net.
How To Write Secure Code Mar 1, 2000
gdead
In the process of writing and auditing our code, we've become increasingly upset at the lack of documentation about writing secure code. To try and fix that, and hopefully make your life easier in the process, we've compiled a list of resources we've stumbled across. If you know of any others, please let us know.

There's no excuse to write insecure software - various
L0phtcrack a "burglary or theft tool"? Mar 1, 2000
null
Prosecutors in a small Minnesota town have included the use of L0phtcrack in charges against a local man. This could get interesting.
House and Senate Hold Joint Meeting on DDoS Feb 29, 2000
gdead
The US House and Senate Judiciary Committees held a joint meeting to discuss the recent DDoS attacks and what the federal government's action should be (if any). The prepared statements of the witnesses have been posted on the House website. The comments are very interesting for the most part, and the overall feeling of the private sector is the government should stay out the Net for now. They don't want "big brother" getting in the way. For those NPR listeners, there was a piece the other day on All Things Considered about how large corporations are turning into a "little brother". Companies like M$ and Time/Warner don't have all the oversight power of the Fed, but they're real close. They don't want the fed getting in the way of their own big brother tactics. The current DDoS problem is just the opportunity for the government has been looking for to get involved with the Internet. Now the "little brother" companies have to beat off "big brother" with a stick.
Security Ports for OSX Feb 29, 2000
gdead
The boyz over at MacSecurity.Org have been busy porting security type apps to Mac OSX Server and Client. So far they've tackled GnuPG, MD5, xinetd, and nmap. They've also ripped together a great doc on Securely Install Mac OSX. Lest you giggle too much, MacOSX is based heavily on the NeXT operating system with much of the network code taken from FreeBSD. It seems very fast and stable so far, and it's a Mac with a /etc directory. w00t!
French Smartcard Hacker Sentenced Feb 28, 2000
gdead
Yesterday, Serge Humpich, a Frenchman who shot holes in the security of GCB credit cards, was sentenced. 10 months suspended sentence, 12,000 franc (1,500USD) fine, and 1 franc in symbolic damages to GCB. That's quite a slap in the face to GCB. The only crime he committed (which he did with GCB's help) is purchasing metro tokens using fake credit cards. This is the end of a very odd trial, even after which GCB still won't discuss the specifics of the security they use on the cards. Humpich states "Right now, a credit card is about as safe as a Post-It note". Yikes.
FC 2000 Wrap-Up ala Wired Feb 27, 2000
gdead
Financial Crypto 2000 is over, and pablos is on his way home from a difficult week partying and geeking in the Caribbean. Declan McCullaugh has a nice little wrap-up over at Wired. Zero Knowledge and DeCSS seem to have dominated the con. Well, that and blazing sunshine and lots of rum. Declan sums up the conference well:

Persuading your manager that a midwinter trip to a subtropical isle is necessary to keep up with tech developments can be a difficult but worthwhile task.
Multiple Corel Linux xconf Vulnerabilities Feb 25, 2000
gdead
It's Friday, so it's time for the silly exploit of the week. Corel claims their Corel Linux is easy to install and use. According to this post to Bugtraq it is also very easy to compromise. Corel Linux has a suite of config programs to help users configure their installation. Many of these files are SUID and have some serious issues with input validation. My favorite of the many listed exploits:

(4) Executing arbitrary commands with euid root.
    A touch different. /sbin/setxconf allows users to test X configs with the -T switch. This process eventually invokes xinit with euid root. A quick look at the xinit man page will tell you that xinit looks at ~/.xserverrc and will execute things in there while starting.
Commerce Dept OK's Snuffle Export, Case Pushes On Feb 25, 2000
gdead
CNet reports on a letter from the Commerce Dept which states Daniel Bernstein can export his Snuffle encryption algorithm.

"In light of the changes in licensing and review requirements for publicly available source code, the new regulations do not interfere with his planned activities as you have described them"

For the last few years, Bernstein has been suing the Commerce Dept to allow him to export his crypto code which he developed for a class he teaches. According to Bernstein's lawyer, Cindy Cohn, there are still some points of the case that haven't been cleared up by the Commerce Dept so the trial will likely push on.
FreeBSD To Incorporate OpenSSL and OpenBSD into 4.0 Release Feb 24, 2000
gdead
Aren't the new crypto regs wonderful? Ok, maybe not wonderful, but a least a step in the right direction for open source crypto development. Until recently, Canadian-based OpenBSD was the only BSD-ish OS that shipped with utilities like OpenSSL and OpenSSH (which they developed). FreeBSD's HQ is in the US, so their distribution was limited by US crypto export regs. But according to Daemon News, FreeBSD 4.0 will ship with OpenSSL/SSH thanks to the new crypto regs released last month. The incorporation of OpenSSH was a bit of an afterthought, though, so the release date for 4.0 has been pushed back to March 10. One more reason FreeBSD rocks... Besides the 300 days of uptime on my workstation.
Osiris 1.3.0 Released Feb 24, 2000
gdead
Osiris is a file integrity checker developed by brian here at TSG. The new release includes many new features, including the addition of Haval and SHA hashes. There is also a counter to let you know how far along osiris is when indexing files. MacOSX support has also been added. Download now or check-out the CHANGELOG. Next up: an NT port.
EU Releases Echelon Report Feb 23, 2000
gdead
Wired reports that the European Union has released a study on Echelon, the world wide surveillance network led by the US. The report states that Echelon uses satellites and ground stations from the US, Britain, Canada, and NZ. An EU member said Echelon "poses a clear threat to civil liberties and the EU economy." Further investigations have been ordered on the basis that the US is using Echelon for industrial espionage in the EU.
How to Build a Data Center by Sun Feb 23, 2000
gdead
If you're a Solaris admin, you have a mantra: "docs.sun.com is your friend." Docs is a great resource for all things Sun and Solaris related. While strolling around looking for something today, I stumbled across Sun's Data Center Site Prep. I'm not sure how long this document has exisited, but it's great. I've been building data centers off of notes from NANOG meetings and federal best practices. This doc is one of the best public references on how to select locations and actually build a DC I've ever seen. And, since how and where you build your data center makes a large impact on the quality of your physical security, I post it here for you to enjoy. :-)
Open Source Code Audit Tool from RST Feb 22, 2000
gdead
Reliable Systems Corp today released ITS4, a tool for automatically auditting code for security vulnerablities. ITS4 stands for "It's The Software, Stupid! -- Security Scanner", BTW ;-) There have been great leaps made in scanning code for security holes in the last several years. RST has finally made the fruits of this research available. I just ran ITS4 against some of my code, and it does a great job of hunting down trouble spots, as well as offering suggestions on how to fix the problem.

This is a great tool for folks that write code. It is also a great tool for hackers. Code analysis tools such as ITS4 put everyone on an equal playing field. As these tools get more advanced, there is no execuse for a developer to release insecure code. But it will also give scr1pt k1dd13z brain dead tools to exploit insecure code. A few years from now, production code will be much more secure than it is today, but the interim time may be quite painful as all the holes in existing code are flushed out publicly and privately.
ZeroKnowledge Presents Digital Cash and Minimum Disclosure Privacy Scheme Feb 21, 2000
pablos
Live from the front line in Anguilla: ZKS today announced that they've hired Stephan Brands and will incorporate his brilliant work into their Freedom product. Brands' thesis committee for this ground breaking work was Rivest, Shamir & Claus Schnorr . Everyone should buy his book "Rethinking Public Key Infrastructures and Digital Certificates -- Building in Privacy", published by Ponsen and Looijen in the Netherlands, ISBN 90-901-3059-4. You can also read about it at his web site.

In layman's terms, ZKS now has the technology to deploy anonymous digital cash that rivals the Chaumian offline blinding protocol. Additionally, their "Minimum Disclosure Privacy" scheme overcomes vast privacy violations inherent in today's PKI models.

The Wall Street Journal will break the story today, Wired will probably have a piece by Declan McCullagh before long. Remember, you heard it first from Shmoo.

UPDATE by gdead: As usual, Pablos nails it. Here's the Wired article on this.

DDoS Attacks Offer Cover for Real Hacks Feb 21, 2000
gdead
Leave it to the Register to find a new take on the DDoS attacks. They claim that current DDoS attacks aren't really dangerous and only serve to hide the concern about real hacks. According to Mark Rasch's testimony at the US Senate last week, a company is much more likely to report a DoS attack to authorities than a real hack because a DoS attack doesn't weaken consumer confidence to the magnitude a hack does. Also, a real hack puts a company's intellectual property at risk, which is the only real assets dotcoms have these days.
France Pegs Microsoft & the NSA Feb 20, 2000
pablos
Yahoo! Hong Kong News has a blurb about French intelligence accusing the NSA of working with Microsoft to develop software allowing Washington to spy on communications around the world.

According to the report, "it would seem that the creation of Microsoft was largely supported, not least financially, by the NSA, and that IBM was made to accept the (Microsoft) MS-DOS operating system by the same administration."
It said that the Pentagon was Microsoft's biggest client in the world.

UPDATE by jpm: Microsoft denies it and French intelligence backpedals. - Yahoo Hong Kong
A DDoS Whitepaper Feb 20, 2000
larry
Bennett Todd posted to BugTraq that he has written a DDoS whitepaper. It's not going to teach the security minded anything new but for management types, or junior technical people wanting to get an overview of what a DDoS attack is and how it works it's a pretty decent piece of writing.

It's available at his web site in HTML, Postscript and plain text. [Note: the secure server certificate isn't signed by a known CA so you have to be using a browser capable of approving a custom certificate.]

Intel Announces Device->Display Encryption Feb 18, 2000
curator
Yesterday, at their Developer Forum, Intel announced High-Bandwidth Digital Copy Protection, a technology which encrypts data between an output device (such as a digital video card on a PC, or set top boxes for HDTV) to a digital display ( digital LCD, HDTV, etc.). According to TechWeb's article, the 56-bit keys are doled out to individual vendors much like DVD keys. And a violated key can be tracked and revoked from a satellite network.

Woohoo, CRL's from the sky.

There are all sorts of things that are unclear from the article, especially when it comes to backward compatibility with current digital devices, how the CRL's are actually applied, whether legitimate owners of devices with violated keys get screwed, and what kind of power this satellite network has, but I can already smell a DeCSS-like lawsuit on its way.

How to Annoy the MPAA Feb 18, 2000
pablos
The Meme Factory has released Trojan Cow, basically stego that allegedly contains DVD decryption code. Pigdog Journal has a new tool called "DeCSS" which strips Cascading Style Sheet tags from any HTML document. Unlike the other DeCSS, this program is totally useless, and less likely to get you sued.

[Note: I'm not sure if this is a legit technical glictch or if something ill is in the works, but the pigdog.org site just disappeared and went back to the default ISP's page. Fortunately I had just put up a mirror and it is still available. - larry]

How to defeat "location poisoning" Feb 17, 2000
larry

Developed by 7val, Location Poisoning is a new and especially abusive technology for user-tracking.

A new device (ed. not sure how new but i hadn't heard of it before) to track customers using DNS instead of cookies, so it's harder to circumvent. Unfortunately it somewhat abuses the way DNS and HTTP work and is considered by some to be a "Bad Thing[tm]".

Read more at http://www.lemuria.org/Software/unpoison/, including a way to circumvent it using a squid proxy.

DDoS Fallout Continues Feb 17, 2000
gdead
There's an ancient saying that goes "Be careful what you ask for, you just might get it." Many security experts have been asking for more security news to show up in national media in order to show how lax security is in most of the Internet. Since the DDoS attacks against Yahoo and EBay, security topics have been the headline on most news sites. Most of the news has been helpful, but some of the stories about tracking the attackers were filled with rumors and speculation. I'm sure the reporting will improve over time, and I hope the news won't incite the public to request regulation of the Internet in the name of safety.

On the upside, there's a ton of interesting stuff to read these days. The Washington Post reported that the CIA has given SAIC a pile of cash to develop software to protect web sites from DoS attacks. The money came from the CIA's new venture capital firm, In-Q-Tel. I wonder what strings get attached to money that comes from the CIA? I'm afraid I don't want to know.

The Washington Post has an article that indicates DoS tools have made it into the hands of the masses:

A disgruntled customer of the Virginia Department of Motor Vehicles tried to disable the department's Web site with bogus information requests.... DMV officials, who said the department's Web site was shut down for about 45 minutes early Sunday, were able to identify a suspect within one hour of the attack by tracing the source of the requests. Virginia State Police arrested a 26-year-old Haymarket man about 24 hours after he allegedly began overloading the site with fake transactions.
U.S. Officials laying out plans to fight cybercrime Feb 17, 2000
grendel
Theres a somewhat interesting article in todays New York Times. (Free Reg. Required) Pictured in the article is the current director of the FBI and Janet Reno, testifying before the senate about the recent DDoS attacks. Reno is putting forward a proposition that would "include tougher penalties for hackers and standardized investigative technologies". Thats not too general or anything... The article does have a number of interesting figures though. We'll see what they come up with:)
Dittrich Speaks Feb 16, 2000
gdead
Slashdot asked, Dave Dittrich answered. My fav quote:

What I think needs to happen is to follow the advice of someone (I forget the source) who said, "There should be a hacker on every board of directors," and I would add on every development team.

Nothing ground breaking in the interview, but lots of good advice for admins and management alike.
DNS the Weak Link in the Infrastructure Feb 16, 2000
gdead
In the world of computer security, we are continually searching for the next big hole hackers will exploit. Hackers, by and large, are smart and lazy. They attack targets that are obvious and they come in through holes that are easy to exploit. The current favorite spot to break-in is through applications by finding buffer-overflow vulnerabilities and poor access protection. There are many in the industry that feel this is going to change in the near future. Many holes in the current Internet infrastructure are being discovered and exploited making the Internet core the "low hanging fruit" that hackers will go after.

Last week, the RSA website was hacked. Twice. The first was via a DNS exploit by causing the authoritative nameserver for rsa.com to respond with the wrong IP address for www.rsa.com. The page you were sent to was a spoof of the RSA homepage hosted in Anguila. Shortly thereafter, that page was hacked, and a terse, h4x0r dialog replaced it. An attack on a DNS server can be very destructive, especially when bad data is injected. An attack on the entire DNS architecture, such as an attack on Network Solutions would be devistating. DNS is a vital part of the Internet's infrastructure, and without it, we're sunk.

In the wake of this attack, serveral organizations (such as Hacker News and NT Security) offered words of advice. Of course, you should upgrade all your nameservers whenever exploits are discovered since they are almost impossible to protect from in-band vulnerabilities. They also go on to say admin's should "double check your DNS records to ensure you have strong authentication required for any potential record changes." This sounds like a great idea in theory, but in practice it's impossible to implement.

Until recently, Network Solutions has had a monopoly in .com/.net/.org domain registration. Even now, some would still say they are a monopoly, but there is some competition. When you go to register a domain with NSI, you have 3 options of protecting it: by verifying the "From" email address when a change is submitted, by using a password, or by using your PGP key. I'm not sure exactly what the other registrars offer, but the ones I have seen only offer the "mail-from" protection. Forging an a domain change via the "mail-from" protection protocol is trivial. It is a known problem. So the obvious solution is to password or PGP protect the domain. So just set your auth scheme to password or PGP, and you're safe, right?

Wrong. According to years of problems posted to lists like the North American Network Operators Group, this is not a simple thing to do. Setting up PGP or password auth on a domain can take months, the request may never get fullfilled, or the domain may disappear all together. And if you manage to get the domain PGP/password protected, there's a large chance you'll never be able to make a change to the domain. Many admins who have PGP protected domains end up spending weeks on the phone with NSI only to resort to sending in company letterhead and setting the auth mechanism back to "mail-from". While the domain may be secure, it becomes totally unadministerable.

The problem that plagues the security world in general also effects the DNS infrastructure. The most secure (read: best) solution is so hard to use that the majority of people will use a completely insecure protocol as a trade-off for easier administration.

This is not acceptable, but unfortunately changing the domain registration process is a slow and painful one. There are a lot of players in the game, from NSI and the other registrars to the ISP's and even the folks that run the root nameservers. Getting them all to agree on something is very difficult, and the path of least resistance is to keep the same broken process in place. Until this changes, attacks on DNS records will become more common. DNS is the low hanging fruit in the Internet core, ripe, and ready to be blown apart

A side note: I think using X.509 certs as a auth mechanism for domain names is a great idea. Please don't yell at me for using the "PKI will save the world" line. I think in this case, when a heirarchy already exists, it's an ideal place to deploy an X.509 setup. Now whether NSI, Register.com, ICANN, et al will listen to me remains to be seen. ;-)
The 15th is Newsletter Day Feb 15, 2000
gdead
It's halfway through the month, and as usual Bruce Schneier's Crypto-Gram and Siam Relay's SAFER newsletter came out. SAFER as always is filled with the 10,000' overview of the last month in the security world, while Schneier gets his hands dirty digging through the details. The Crypto-Gram discusses the recent DDoS attacks and revisits the problem of publicizing vulnerabilities. Has anyone noticed that the Crypto-Gram has become much less crypto oriented lately? If you look at his first CG's, or even the issue from a year ago, he is much more into the math/crypto world, and how to tell bad crypto from good crypto. Now it's a monthly discussion of generic security issues with an occasional mention of what's happening in contemporary cryptography. It's not a bad thing, but the name "Crypto-Gram" is getting a bit misleading.
Clinton fights hackers, with a hacker Feb 15, 2000
larry

Maybe a slightly glorified claim, but none the less and interesting counterpoint to recent claims that employing hackers as security experts is "like hiring an arsonist to be your fire marshal".

Read more at CNN.

Security Expectations for Internet Service Providers Feb 15, 2000
gdead
The IESG has been asked to turn the draft Security Expectations for Internet Service Providers into an RFC. This would be a "best practices" informational RFC for all those running ISP/NSP services. It is very diverse and covers topics such as ingress/egress filtering and control of directed broadcasts. Please read it and send mail to iesg@ietf.org or ietf@ietf.org with any comments you may have.
Announcing MacSecurity.org Feb 15, 2000
curator
The Shmoo Group is pleased to announce the arrival of MacSecurity.org, a site devoted to security and privacy resources for Apple's current and next-generation operating systems.

While we will primarily focus upon Mac OS X Server, Mac OS X, and Darwin, we recognize the number of admins that are managing Mac OS 8.x/9.x computers. We will post any relevant info we find useful in this domain, especially when the revelations deal with the joining of the two worlds.

We have several projects forthcoming, and we welcome any suggestions for possible ports of security applications and services for Mac OS X Server. Subscribe to mso-announce for updates on our projects, announcements, and other happenings at MacSecurity.org.

We are also starting a new mailing list devoted to discussing Mac OS security problems, and solutions. Here again the intent is to focus on Apple's BSD-based operating systems, though all of Apple's operating systems are welcome for discussion. There has been little organized (or other) talk of security when it comes to Mac OS X Server. We hope this list will foster better communication throughout the user base, especially looking forward to the general release of Mac OS X (client) upon the traditional Mac OS population. We hope that everyone interested will subscribe.

For members of the macosx-admin and macosx-talk lists, we'll be hosting a searchable, continuously updated archives of the venerable Omnigroup lists.

Well, we hope this has whet your appetite. There will be more content forthcoming (not limited to software and ports, but including white papers and FAQ's on best practices and such) as we see what the public's needs are, and how we can best serve them. We encourage you to visit often and offer feedback on what you'd like to see from the group.

Thanks for your time, and happy browsing.

NOTE: We are currently looking for one or two individuals willing to test software and policies we develop from time to time. We unfortunately do not have the resources to test on all our target platforms, and so need a little help covering the other bases. Right now, we need a user(s) who has access to a machine running Darwin, and a machine running the Mac OS X DP/Beta's. Fortunately we think the software we port to MOSXS will run on both platforms, but can not know for sure since we cannot run either OS. Interested parties should drop a note to curator. Thanks again.

Clinton Wants more Net Porn Feb 15, 2000
gdead
If you read CNN.com at all yesterday, you noticed that the top story all day was "Clinton Gives Online Interview". Somehow that qualified as more important news than new Littleton killings or the tornado in Georgia. Basically, Clinton and some folks from CNN did an interview where the questions came in realtime from the Internet audience. The "Internet" part of the interview was run on a Windows IRC server. And like every good IRC server, there are ways to take over other people's nicknames. Ater a server crash, one of the chat members took the name President_Clinton and started answering questions. "Personally, I'd like to see more porn on the Internet, Wolf how about you?" This lasted for 30 seconds until CNN admins kick/banned the prankster. hehe... old school hakcers meet New World media stunts.
February 2000 Cypherpunks Meeting Feb 14, 2000
pablos
Another lively Bay Area Cypherpunks meeting with our usual heavily skewed ratio of hotheads to hotties. Simson Garfinkle was apparently the feature presentation. He shared some cute anecdotes and didn't plug his new book 'Database Nation' too hard. An allegedly new public key cypher was presented by David Liu. This appears to be extremely fast, and could use a lot more analysis. Elder Scannell shared his recent Thawte Web of Trust debunking work. While a lot of us are Thawte Notaries, the program has issues, and we're not under NDA! Contact Kristen Tsolis if you're interested in helping with intrusion detection systems that can tell a cluebrian from a scriptophyte. Many of us are headed off to the International Financial Cryptography Association conference in Anguilla next week. I'll try to post some updates from the beach. The Cypherpunks meetings are going global, let us know if you want to get one organized in your area. Lastly, we swapped Safeway club cards, I traded a Bruce Schneier card for one with no name.
What Color is Your Hat? Feb 14, 2000
gdead
The NY Times has written a piece on why hiring hackers, even gray hat hackers like l0pht, is a bad idea.

"It's like hiring an arsonist to be your fire marshal. They know all about the stuff and they know how to be good at it, but can you ever really sleep at night?"

The NYT also claims that people that write hacker tools should go to jail just like those who actually perform the hack. L0pht fires back on their news site, Hacker News Network, saying "This is like blaming car manufacturers for auto accidents." Being a fan of full disclosure security, I'm going to have to agree with the boyz from l0pht on this one.
Why a "Web of Trust" is Hard to Maintain Feb 13, 2000
gdead
There are several different models for key distribution in public key crypto. There is the centralized model typically employed by CA's in protocols such as X.509 and PKIX. The problem with this it you have to trust the central authority to be "legit". It also goes against the distributed roots the Internet was built on. The other model is the "web of trust" used by many in the PGP world. Basically, you trust those closest to you, and then you can trust keys signed by them, and then trust keys signed by those folks, ad infintium. You can specify a degredation in trust on a per hop basis until there is no trust left. It's a six degrees kind of thing.

The web of trust model can break very quickly if those you trust in turn trust everyone, regardless of their merit. A real world example surfaced last week. 6 Israeli soldiers were killed in the disputed territory of North Israel/Southern Lebanon by Hezbollah guerrillas. In return, Isreal started daily bombing runs over Lebanon, taking out power plants and other infrastructure targets. At nite, the Israeli government warned all those living in northern Israel to stay indoors and if possible underground. Israel feared that the Hezbollah would retaliate with missile strikes and didn't want targets roaming around on the streets.

You're probably asking yourself "so what?" Well, the interesting part of this story is where the missles came from. The missles the Israeli's are afraid of are American TOW missles (anti tank, but can make quite a impact in urban warfare). American and Israeli intelligence tracked a shipment of several hundred TOW missiles into Lebanon from Iran a few months before. Where did Iran get the TOW's? Remember the Iran/Contra scandal? Well, in the ordeal, the US gave several hundred TOW missiles to Israel, who in turn gave the missiles to Iran in return for US hostages. That is the last known shipment of TOW's into Iran. So 10 years later, Israeli citizens are hiding in their basements at nite, fearing a strike from a missiles that they gave to someone who in turn gave them to "the enemy". Ironic, huh?

This problem exemplifies the problems you encounter when dealing with a web of trust model. You must actively monitor those to whom you give your trust, or it may bite you later. While dealing with large, central companies such as Verisign or the Post Office may be evil, at least they're a known evil entity. The option is the possibility of hundreds of evil people running around abusing your trust.
Hunting Red-headed Snipe and DDoS Attackers Feb 12, 2000
gdead
All roads lead to Rome, and at least one compromised machine used in the DDoS attack will lead to a hacker. According to CNet, the FBI is looking to talk to Mixter, the person responsible for writing TFN. CNN reports that machines in an engineering firm in Long Island as well as computers in Stanford and UC Santa Barbara were used in last weeks DDoS attacks. *gasp* UNIX workstations at a university were hacked? Aren't universities the bastions of computer security? The good news is many of the hacked computers had audit logs left which should make the job of tracking down the folks responsible much easier.
make sploit; make install Feb 11, 2000
gdead
The "Amusing Exploit of the Week" goes to a hole in GNUmake in all versions up to and including 3.77-44. It's the usual game where make writes temporary files to /tmp but the files have a predictable name and make doesn't check for their existence. Create the right file, and you've got root... or maybe toor if you're on a FreeBSD box ;) It's only a local exploit, but still it's kind of ugly. So go get the patch to make sure you don't get rewted the next time you compile Osiris.
Clinton calls Internet security summit Feb 11, 2000
grendel
Well, as usual the government is playing catch-up. Thursday President Clinton stated that he would be calling a summit regarding the recent DDoS attacks, and what can be done in the future to protect commerce and sites on the Internet. 15 CEO's, suits and Execs of leading Internet commerce sites have been invited to the summit. Oh... Bruce, you're invited too:) Heres an article from USA Today.
Slashdot to Interview Dave Dittrick Feb 10, 2000
gdead
mmmm... interview-y goodness. Slashdot is asking for your questions for Dave Dittrick. Dittrick et al have written a few tools to help look for Trin00 and TFN, as well as given a number of great security related talks. You've got 24 hours, so go ask away.
Interview with Author of Tribal Flood Network Denial-of-Service Tool Feb 10, 2000
pablos
Altavista has an interview with Mixter, who wrote the tool being used for some of this week's DDoS attacks. Don't buy his pitch for IPv6, but otherwise, this is sorta interesting.
DDoS Saga Continues Feb 9, 2000
gdead
Day 3 of the mysterious DDoS attacks, and the public at large is still in the dark. CNN reports Datek, E*Trade and ZDNet were attacked today. Wired has many articles on the subject, including a piece on how these attacks fit the profile of a pissed off teenager. The QOTD has to go to YTCracker (he defaced a pile of federal websites). When asked what he thought of the current attacks, he responded "This kind of thing is really frowned on... It's a bunch of bored kids trying to show they have the guts to do this.... We don't like to be associated with these people." Wowzers. Apparently hacking the homepage of the Goddard Flight Center makes a much more ethical statement than stopping Amazon from using their "one click shopping" patent.

Read more of this story...
Court authorizes search of Northwest employees' home computers Feb 9, 2000
larry
From the Star Tribune: Northwest Airlines last week began court-authorized searches of the home computers of between 10 and 20 flight attendants, looking for private e-mail and other evidence that the employees helped to organize a sickout at the airline over the New Year's holiday.

Doesn't that give you a warm glowy feeling of comfort? After all I'm sure they had their employees best interests at heart ...

Could the Yahoo, Amazon, and Buy.com Attacks be Avoided? Feb 8, 2000
gdead
NPR's "All Things Considered" covered the Yahoo DDoS attack today. In it they described how a distributed denial of service attack was done and what the net effect was. They interviewed several security experts who all said that there was nothing the victim of these attacks could do. The experts indicated that only a net wide awareness of these DDoS's and organizations taking the initiative to find compromised hosts and remove the Trin00/TFN clients (claimed to be an easy task by one of the "experts") would solve the problem. While it may be true that once an attack is in progress, there is nothing that a victim can do to make it better, there are ways to minimize the effect.

If Yahoo (or the others) had properly architected their network, they would have barely felt the problem. System architects have made the process of building a server farm a science. It is easy to get space in a colo, put a few load balancers in front of a bunch of web servers, and let things go. This can easily handle large amounts of good traffic. But what about bad traffic, such as traffic generated by Trin00? Simple... spread your eggs out. Build several server farms (costs a bit more, but Yahoo has a few million lying around). Put these farms in different areas. Not just in multiple Exodus colo's. Put one in Exodus, one in Above, one in Global Crossing. Pull circuits from other large providers directly into your network. Get address space from multiple providers. By spreading yourself out, you are no longer "one" target. You are multiple targets spread out in different AS's hanging off of multiple large pipes... Large pipes that can have policies applied to them to further minimize the flow.

The one problem with this setup is adminstrative overhead. This can be minimized by providing your own backend network with well-trained NetOps to run it. The idea is not to be an ecommerce company but to be your own ASN providing network services to ecommerce applications. Your network can be under your control, not your colo providers. This makes all the difference, and will allow you create a system resistant to many large scale attacks.

Geographic distribution will play an ever increasing role in security. It offers much more protection against physical attacks as well as attacks from the network. Until companies like Yahoo and Amazon figure this out, they'll still be vulnerable to "primative" attacks like Trin00 and TFN.
Biometrics Done Right Feb 8, 2000
pablos
Large centralized databases of biometric data are evil. So are implanted auth tokens. This has been widely known for thousands of years, read Revelation 12 (The Bible) if you don't believe me. Sony is doing it right. Each user should have their own authentication token that stores their private key. The user authenticates to this device with some biometric. Your biomentric profile must be stored on this device. Sony is about to release a fantastic little gizmo that does just this. Refuse any biometric authentication where your profile is not under your own control.
Yahoo Hacked? Feb 8, 2000
gdead
The bad thing about hackers? You never know when, where, or how they're going to strike. They are stealthy and random. The good thing about hackers? You never know when, where, or how they're going to strike. So when you're an e-commerce company with a multi-billion dollar market cap and shareholders to think about, if you can blame hackers instead of yourself for an outage, you're doing good. Yahoo suffered a 3 hour outage yesterday which has been partially blamed on hackers. There's no concrete evidence to prove this... in fact originally they said it was a router problem, then they indicated it was a hacker. How nice that they can shift the problem from something they controlled to something totally removed from Yahoo. Go-go-gadget-fault-tolerant-architecture. See the story at Wired.
CERT on Crack Feb 7, 2000
gdead
HackerNews, and many other, feel that CERT may be losing site of the big picture. CERT has historically only focused on major vulnerablities that could cause extreme chaos on the Internet. Their most recent "cross-scripting" warning is felt by many to be old news and a waste of resources.

" think it would be nice to read the news Monday and see that the media, instead of repeating the warning blindly, was now telling the world that the hacking community had denounced the CERT warning for the ridiculous paranoia it really is. "
Bad SORM Rising Feb 6, 2000
curator
Slashdot has a blurb on a recent act of law (an addition to the already injurious SORM legistation that allows wide spread bugging, tapping, taping, and monitoring of Russian citizens) in Russia mandating "black box" IP re-forwarding devices to be installed in all ISP's in Russia. The devices would send a copy of all internet traffic through an ISP to the FSB (Russia's national police force, successor to the KGB), prior to any sort of probable cause or warrant (though ostensibly, such is required to actually read the data). Resistance seems to be already waning, as the one ISP to stand up against the tyranny has been shut down, and Russian citizens are forced to choose survival in their current chaos over a seeming luxury like freedom. It's hard to battle privacy violations when you don't know if you'll have food from day to day.

And we think Echelon is bad.

Perhaps the Russians will spearhead widespread encryption of Internet traffic. Perhaps the Dumas will just mandate some sort of key escrow for everyone in that event. Who knows?

Fake "Flight 261" Site Feb 5, 2000
gdead
Folks from TSG fly Alaska Airlines all the time, and think they're a great air carrier. Our hearts go out to the families and friends of the victims of Flight 261. With that said, please note that there is a phony flight 261 site that is "taking donations" and leaving a virus. It's hard to believe that someone would take advantage of a situation like this. But it underscores the fact that on the Internet, even in times of crisis, you never know who you're dealing with. That needs to change. This change must occur on both the consumer and design side. Consumers must be made aware of the dangers, and protocols (such as TLS) must be developed that expose fraud more readily.
Echelon 'Proof' Discovered Feb 3, 2000
larry

References to a project Echelon have been found for the first time in declassified National Security Agency documents, says the researcher who found them.

After combing through declassified National Security Agency documents, Jeffrey Richelson, a researcher for the National Security Archives, has concluded that Echelon -- the purported name of the alleged international project for intercepting all forms of electronic communication -- does exist.

Read more at Wired.

Judge Finds Against DeCSS Feb 3, 2000
curator
In his decision today, US District Judge Lewis Kaplan has found against the defendants in the DVDCCA case. The judge basically refutes most of the DeCSS group's claims, except perhaps some hint that DMCA may be counter to some First Amendment rights, but that those issues were minor and regulatible. In other news, 2600.com is sponsoring a call to action in response to the decision tomorrow.
Ex-CIA director investigated for gross insecurites Feb 3, 2000
grendel
In a public announcement, Director of the CIA George Tenet openly ripped apart former CIA director John Deutch for storing highly classified, sensitive data on an unsecured home computer that was regularly used for email, surfing for porn, etc... His ISP *drum roll* AOL. Deutch has apparently been under investigation for some time now, but this is the first public announcement regarding their findings. Heres the article in USA Today.
Opt-Out of Double-Click Feb 3, 2000
pablos
Here's a handy link to Opt-Out of DoubleClick without having to dig through three pages of supposed "Privacy Policy" on their web site.
Packing My Shorts Feb 3, 2000
curator
Briefs on today's security news. The US government is still trying to convince the EU that corporate self-regulation really is OK when dealing with consumer privacy. Seems the EU has some rules about their corporations trading information with corporations from countries that don't have consumer privacy laws on the books. In other news, DoubleClick continues to suck. A Japanese official announced a bug in Microsoft's JVM that could allow a malicious website to read files on users computer. Microsoft has known of the problem for a while and is looking into fixing it. CERT has released an advisory and a couple follow-ups on a vulnerability in the way malicious code can be embedded into normal HTML code that provide dynamic web pages. There seems to be an overriding ignorance of China's newest crypto regs. Except by the Chinese government that is.
John Katz - "Software And The Death of Privacy" Feb 2, 2000
pablos
Check out this Slashdot article by Jon Katz. Nothing new to us, but it helps to beat your brain with propaganda from the good guys. Remember to forward this to your mom. Here's a precious little gem that Jon dug up: "I am not the first to point out that capitalism, having defeated communism, now seems about to do the same to democracy. The market is doing splendidly, yet we are not." - Ian Frazier, "On the Rez." Has anybody noticed that I rip off a lot of stuff from Slashdot? Can't wait for them to start ripping us off.
US Government Eases Computer Export Controls Feb 1, 2000
curator
In keeping with the US Government's recent relaxation of crypto regulations, President Clinton has issued an executive order relaxing performance-based computer export regulations. The move deregulates all exports below the 12.3 gigaflop performance line, allowing Apple to ship the PowerMac G4's outside Tier I countries, as well as legalizing export of Playstation 2's. Shipments to Tier IV (Iraq, Syria, et al.) countries remain unchanged. No Sony for Saddam. :-(
So You're Looking For Info on Mysterious Rashes Feb 1, 2000
curator
CNET has an article on the results of a California Healthcare Foundation survey that indicate several of the top 21 healthcare websites are not following their own privacy policies. For the most part the lapses involve selling email addresses, but may involve information tied to those addresses via health survey and/or site registrations. In addition, one third of the surveyed sites, have ties to the evilness known as DoubleClick. With their power to link site use to individuals, a person who thinks their anonymously searching for info on embarassing rashes may end up inexorably linked to the topic, and thus subject to a lifetime of embarassing spam.
U.S. House of Representatives Passes Digital Signature Bill Feb 1, 2000
grendel
This article at CNN is pretty light on content, but gives the gist of the issue. While this is obviously one step closer to me never having to leave my house again, or talk to anyone on the phone, which is a Good Thing(tm)... there appears to be a bit of a battle going on. The article mentions unnamed "consumer groups" trying to enforce some sort of paper trail on the process... *sigh*
Slashdot Interview with Jon Johansen Jan 31, 2000
gdead
Slashdot has arranged for an interview with Jon Johansen, creator of deCSS. Questions must be submitted by Tuesday Feb 1st. Go submit your question or at least see what other people are asking. As long as we're on the DVD subject, you may want to check out the LA Times article by Jack Valenti, CEO of the MPAA.

The intent of these Web sites is clear. Break the encryption. Steal the product. The posting of the hacking code is akin to mass producing and distributing keys to a department store. The keys have only one real purpose: to allow a thief to open a locked door to steal the goods he targets.
Osiris 1.2.0 for UNIX Released Jan 30, 2000
gdead
After a week of furious coding, Brian managed to get Osiris 1.2.0 out the door. The new version has a 50% increase in speed thanks to some serious optimizing of the code. 1.2.0 also logs all SUID/SGID files and notes any changes in SUID/SGID status from previous indices. Kewl. Upcoming for the next rev: Mac OSX support and different checksum algorithms including SHA. Download Osiris 1.2.0 now before your friends beat you to it.
US Government Pressing China On Encryption Technology Jan 28, 2000
curator
In an odd turn, the US government is trying to get China to explain its newly restrictive encryption regulations. Apparently, the newly passed regs require foreign or Chinese businesses and individuals who use encryptive technologies to register with the Chinese government. Huh. I should think the US government would understand, "it's for the good of national security". Talk about the pot calling the kettle black. For some reason it's ok for the US government to regulate encryption by US citizens, and think of things like national key escrow/registry, but they get all pissed off when some foreign country thinks it's ok too. While I'm aware of the recent loosening of the regs on crypto exports, they're still regulations. Sigh...

Animosity++;

Microsoft Releases First Bug Fix For Win2K Jan 28, 2000
curator
In what will surely be the first of many such releases, Microsoft has released their first bug/security fix for Windows 2000, even though it is still three weeks prior to the release of the long-awaited operating system. The bugs, which effect Index Server on both Windows 2000, and Windows NT 4.0, could allow a malicious user to view any file on a system.

While I have an urge to continue to mock Microsoft for this, I must give them credit for actually patching it, even though they may suffer the PR lash back. The biggest shame is that it is another operating system that needs to be patched out of the box.

Who's Dumber: Scientology or the DVDCCA? Jan 27, 2000
gdead
According to the Motley Fool, DVDCCA is. That's quite a compliment. In Rob Landley's recent article, he summarizes the entire DVD fiasco better than anyone else I've seen.

"...the DVD Copy Control Authority (a name straight out of a James Bond movie if you ask me) attempted to sue the ENTIRE INTERNET. It's like a class action lawsuit in reverse."

A must read.
Slashdot Reviews "Intrusion Detection" Jan 27, 2000
pablos
Slashdot has a review of "Intrusion Detection." The author is a former NSA employee and has written this book as a text to convince upper-level types of the need for security and actually paying attention to it. Read the review before you read the book.
CSScramble Removed From the Public Record Jan 26, 2000
gdead
After a cosmic fubar last week where the DVDCCA lawyers submitted the exact trade secret they were trying to protect into public record by including it in court record, they managed to get it sealed back up. A bit late, don't you think? Once a trade secret has been released into the public domain via a universally obtainable document, then it's hardly much of a secret anymore. Wired has the inside scoop.
Doubleclick Admits to Big-Brother Tactic Jan 26, 2000
gdead
Doubleclick confirmed our worst nightmares (OK, maybe not our worst). They are using the data received from newly aquired Abacus Direct to track website users by name and address. They can now tell exactly who you are and where you've been. This is a total about-face from their previous statements. The solution is easy. Block 63.160.54.0/24, 208.10.202.0/24, 208.228.78.0/24, 208.228.86.0/24, 208.229.75.0/24, and 208.32.211.0/24. These are the netblocks UUNet and Sprint have SWIP'd to Doubleclick.net. Blocking traffic to/from these addresses will stop them from tracking you.
Norwegian Authorities Raid Jon Johansen Jan 25, 2000
pablos
According to Slashdot: Jon Johansen (the young man from Norway who reverse-engineered CSS) writes, "The National Authority for Investigation and Prosecution of Economic and Environmental Crime in Norway raided my home today and seized my Linux box, FreeBSD/Win2k box and Nokia cellphone. Not only I, but also my father has been indicted, since he owns the mmadb.no domain (webhotel) where my homepage(s) have been located. They also took me in for questioning which lasted 6-7 hours. It's 2 am CET now (I just got back), I haven't eaten, and someone's definitely going to pay for this. I have shut down my old email account, and I'm now using linuxdvd@mmadb.no - More information coming tomorrow, once I've talked to my lawyer. Did someone whisper countersuit?"
L0pht-y Battle Jan 24, 2000
gdead
According to HackerNews (which is run by the boyz from L0pht) there has been some controversy regarding their merger with @Stake. The most extreme article I've seen is this one from ZDNet.

Of course, the tired old argument is that L0pht performs a service by detailing flaws in systems so that companies can boost their defenses against a real, and more threatening, hacker. Hogwash, poppycock and every other early-20th-century declarative.

"poppycock"? geez, don't retro.
ccTLD Search Now Available Jan 23, 2000
curator
Now available to for your perusal, a country code (iso3166) TLD search engine. Trying to figure out where the ".ha" tld is? Or maybe trying to determine the tld for Brunei Darussalam? We now have the perfect tool for you. You can search for country names (whole or partial) or country code TLD's.
Inadmissable T-Shirts Jan 23, 2000
pablos
Wired has a short story about the T-Shirts that were handed out in front of the court at last weeks DVD hearing. Apparently the DVD CCA lawyers tried to get them admitted as evidence. Judge Elfving shot that down. Apparently some folks who don't exist are planning to try and print some "educational source code" in prominent Silicon Valley newspapers by taking out an ad, they're allegedly accepting anonymous donations at the usual gatherings. How is that for detailed reporting? Somebody should fire me.

Also, sorry for the DVD centric news lately, but we think this will prove to be very important stuff in the long run.

Shit. We're Losing. Watch Those Tags. Jan 22, 2000
pablos
US Courts on both coasts have now issued injunctions against hyperlinks in the DVD CCA cases. We believe this restricts crucial rights. The implications for our future on the net are clearly beyond the imagination of any judge. Do something. Let people know that this matters, it isn't just the movie industry extortionists vs. menacing hackers. It is the US Government impeding free speech. Join EPIC or the EFF. Read the injunction and confidential reply declaration and exhibits by John J. Hoy, President of DVD CCA (and former Toshiba employee). Thanks to anonymous for submitting this to Cryptome. [Caution: It may be illegal for California and New York residents to download the file above. Read contents below and consult attorney beforehand. Or say screw it and enjoy the forbidden fruit of intellectual censorship. Rest of world is free to grab it, for now.]
Mitnick Released From Jail Jan 21, 2000
gdead
After nearly 5 years in jail, Kevin Mitnick was released this morning from Lompoc Correctional. 60 minutes interviewed Mitnick last week, and the interview will air this Sunday. CNN has continuing coverage of the events going on today, but I don't think there will be much excitement... cept maybe driving to Montana to find a job that doesn't involve a computer.
MPAA Wins Injunction in NYC Case Jan 21, 2000
gdead
Judge Kaplan granted a preliminary injunction against three defendants (including Emmanuel Goldstein of 2600 fame) on behalf of the MPAA. John Young was there and has the inside scoop, as well as an attempted interview with Judge Kaplan. According to his analysis, the judge had his mind made up before he even got in the courtroom. So much for a fair hearing. Slashdot has a thread on the hearing with a relatively good signal/noise ratio.

UPDATE: Cryptome has posted the preliminary injunction. 2600 has also posted their feelings on the issue.
Shopping Spree Jan 20, 2000
pablos
Since yesterday I bought DirecTV dish, a Ricochet Modem & MacOS 9. Today I'm working on getting a Garmin StreetPilot GPS, some Freedom Nyms & a Glock 26. If anybody had ideas on how to use all these toys with a Mac email pablos. Also I got my car washed.
Shmoo @ The RSA "Conference" Jan 20, 2000
pablos
Remember all those Internet shows that started out with 80 geeks talkin' trash, then they got bought by Mecklermedia & became 10,000 droid extravaganzas with raffles and booth bunnies? RSA now reeks of this motif. I made the rounds with Cypherpunk Kristin Tsolis who took lots of photos as I heckled various "security" companies about their products and non-existent open-source strategies ("We have a Linux version." - Checkpoint). The NSA brought an Enigma machine that we got to play with. @stake (AKA L0pht) had a booth & glossy brochures. Met some fellow fringe whackos from the Alchemind Society. Ian Goldberg did a fantastic job of walking through the process of building an Anonymous IP network. Lots of biometric stuff, mostly fingerprint readers. A surprising number of key escrow systems to make encryption totally invisible to the user (& a lot less secure).
Drop My Shorts Jan 20, 2000
gdead
Down and dirty security-type links of the day. Another e-commerce site was leaking credit card information all over the floor. They think it was an inside job (surprise!). Declan McCullagh reports on the the government's new stance of searching for a suspects cryptographic keys without first notifying the suspect. 1's and 0's can now be legally stolen off your computer by the Feds. And from the never ending list of silly buffer overflows, MS released a patch to fix the buffer overflow vulnerablity in the RTF reader shipped with all their OS's. Yes, that's right, Rich Text Format. *sigh* I'm off to buffer overflow my barrista so I can get free coffee.
First SAFER of Y2K Jan 20, 2000
gdead
Better late than never, Siam Relay has released January's SAFER Newsletter. It's got the usual sploits, alerts, DoS's, and general security news. I think we're all a step behind because of the RSA conference. Even HackerNews is not doing updates until after the show. It stands to reason, tho, since HNN is run by the boyz at L0pht, L0pht just got aquired by AtStake, and AtStake has a booth there.
CyberTerrorists and Your IT Dept Jan 19, 2000
gdead
The NYT has an article on a break-in and ransom attempt at Visa. The incident occured in December, but Visa just announced it this week. Apparently the hacker didn't take anything "valuable" with him, so Visa didn't give him a cent (yeah Visa!). The real reason I post this article, however, is the quote from Forrester Research in the last paragraph:

"When companies worry about terrorists, they hire a security firm specializing in physical threats. Computer security is no different -- just because you have an (information technology) department doesn't mean it has the skills or training to deploy effective enterprise security"

Hear hear, cheers, and all that.
DVD-CCA vs. The World Preliminary Injunction Hearing Jan 18, 2000
pablos
I just returned from the Santa Clara Courthouse where I got to hear attorneys from both sides arguing on the DVD case. There was an all star cast in attendance, but I won't name names (lotsa Cypherpunks). We filled up all the chairs in the courtroom anyway. Things appear to be going well. The EFF lawyers are doing a fine job as far as I can tell. Too bad you won't get any reporter type details on the case from me. Wired was there, read their site. I got a free t-shirt with the code for css_descramble.c and a flyer with contest results from http://dvd.zgp.org/. This stuff was given to the DVDCCA lawyers too which was pretty amusing. Looks like The Shmoo Group needs some real reporters. I tried to take notes but quickly realized I haven't tried writing in about 15 years and my penmanship is shot. No laptops in the courtroom.
BXA Replies to Declan McCullagh Jan 18, 2000
curator
Eugene Cottilli of bxa.doc.gov has responded to Declan McCullagh's article on Wired, "Is This Man a Crypto-Criminal?". It's short, sweet and to the point. The upshot is that John Young isn't a cybercriminal if he notifies bxa about it.
In Defense of nCipher Jan 18, 2000
gdead
Two days after Bruce Schneier gave nCipher hell for releasing a vulnerablity as a ploy to sell more product, Thomas H. Ptacek posts a response on SecurityFocus. Ptacek claims that Schneier's stance on full disclosure security is counter to restraining the publication of vulnerablities on the basis of intent of the publisher. He also states that several groups that "do things right" such as L0pht actually are commercial org's much like nCipher. For as much publicity nCipher got for their press release, they're about to get a bunch more because of this debate... $1000 well spent if you ask me. ;-)
January 2000 Cypherpunks Meeting Notes Jan 17, 2000
pablos
I don't take very good notes at these things, so don't expect much. I've got all the crucial links though. This was a big meeting due to the RSA Conference frenzy. Lots of names you know from the listserv showed up with their meat. We talked for a hell of a long time about the DVD Encryption case with John Gilmore. Zeroknowledge showed up and talked a lot about the status of Freedom and what kinds of issues they're dealing with. Bill Scannell reported on his new years trip to Lebanon, where he hung out with a terrorist organization. Also somebody posted a new version of Solitaire. Read the notes here.
January 2000 Cypherpunks Meeting Notes Jan 17, 2000
pablos
I only make a halfhearted attempt to take notes at these meetings. Mostly I don't want people to get used to it. Somebody else should take good notes. Anyway, I capture most of the crucial links. We had some good discussion on the DVD Encryption case with John Gilmore in particular. Talked about various RSA Conference related crap. ZeroKnowledge has been kicking ass, and they talked about some of their challenges. Also in the notes is a link to a new & improved version of Solitaire. Got a from Bill Scannell who spent new years in Lebanon hanging out with some terrorists. Read the Notes.
Gearing up for RSA Jan 17, 2000
gdead
The RSA conference starts today, and it promises to be a good one. They're expecting over 8000 attendees, including Dennis Miller (the comedian... you remember him, right?). At RSA, you'll be able to internationally e-mail PGP to your friends at a Pretty Good Party, or you can become a defendant in the DVD lawsuit by wearing a BAD T-shirt. You can even walk 4 blocks down the street and attend the DVD hearing. Our man Pablos is going to do just that, and report back here with anything exciting, interesting, or just plain strange.
New Edition of the Crypto-Gram Available Jan 17, 2000
curator
Bruce Shneier, of Counterpane Systems fame, has released a new edition of the monthly Crypto-Gram newsletter. In this month's newsletter, you'll find:
  • Conflicts of interest with security advocacy by commercial security companies.
  • A pointer to the Counterpane review of IPSec.
  • A rap on Netscape's corporate head about their password encryption.
  • Essay on block and stream ciphers.
  • Responses to reader mail.

Happy reading.

Chock Full of Crypto-ey Goodness Jan 16, 2000
curator
We've just added some more crypto source code in the Crypto Archives. It's just a small start, but we hope to have more there soon. Until then, have a look, and a download, and happy using.
NAI Flounders and Filets Jan 16, 2000
gdead
After gobbling up $2.3 billion dollars worth of smaller companies in the last two years, Network Associates (aka: the evil empire) is splitting itself up. They are forming four separate companies: McAfee - for virii, PGP Security - for VPN's and encryption, Magic Solution - for helpdesks, and Sniffer Tech - for network management. This is a stellar idea, since all they've done is slow down the software development in the companies they've purchased. Maybe I'll actually be able to get a PGP plug-in for Netscape someday. Read the whole story at ZDNet.
John Young a Criminal? Jan 15, 2000
gdead
John Young who constantly pushes the crypto export laws and Freedom of Information Act to their limits has done it again. On Friday, he posted PGP 6.5.2a to his site in celebration of the new crypto export regs. The catch is that they're in compiled binary form. While source code export has been made much easier (but has some silly requirements), object code export is still kind of grey. Wired has a piece on John and his most recent exploit.
Bernstein Case Pushes On Jan 14, 2000
gdead
Wired has an article on the possible outcomes of the Bernstein Case. Cindy Cohn, lead counsel for Bernstein, indicated that even if the Feds tried to drop the case, they would still battle on to get the regs declared unconstitutional.

"We've got a problem with an approach that draws the kinds of lines they're drawing. If they go into the court and they say it's over, we've fixed everything, [we would contest that],"
Osiris for UNIX Release Jan 14, 2000
gdead
The Shmoo Group is proud to announce a UNIX port of Osiris, our file verification program. Run Osiris once before you place a machine into production to create a database of the checksums of all executables on the box. Then re-run it later to verify that the current binaries are the same as the installed ones. If you notice a difference, you're-in-trouble-city. ;-) Osiris has been tested under Linux, FreeBSD, and Solaris. If you run it under another platform and it works, please let Brian (the author) know. So what are you waiting for? Go download it now. And subscribe to the mailling list while you're at it so we can keep you updated on patches and enhancements.
IDS for Fun and Profit Jan 14, 2000
gdead
Thanks to all those who showed up at UAA last nite to watch me rant about intrusion detection systems. I've made the presentation and notes available here for those who would prefer an online copy. For those who weren't there, feel free to read and comment on the presentation. It's available in both HTML and PPT.
Cracking DES on US Soil (again) Jan 13, 2000
gdead
The new crypto regs seem to completely release "open source" strong crypto from any and all restrictions. To celebrate, TSG is proud to once again announce the availability of EFF's bookCracking DES freely to everyone except those in the 7 countries declared "evil" by the DoJ. However, according to the wording of the regs, we don't even have to check if you're coming from those countries. The book that was meant to be free is finally free, and hopefully Dr. Bernstein's ordeal will end.
EFF: New Crypto Regs Still Unconstitutional Jan 13, 2000
gdead
EFF, the ACLU, and EPIC have released a statement that the new crypto regs "still have serious constitutional deficiencies". The most notable is that there is still a descrepancy between crypto source that can be distributed on paper vs. distributed on the Internet.

"The new regulations, like the old ones, impose special requirements on Internet speech, contrary to the Supreme Court's 1997 ruling in Reno v. ACLU. The regulations require that the government be notified of any electronic "export" of publicly available encryption source code, and prohibit electronic "export" to certain countries. Yet people may freely send the same information anywhere on paper."
Where Did Your Bugtraq Mail Go? Jan 13, 2000
gdead
If you haven't been seeing your bugtraq mail for a few days, you may want to read this administrative message Elias Levy sent out yesterday. Basically AboveNet is blocking ORBS's DoS^H^H^Hmail relay checks, so ORBS retaliated by adding all mail servers attached to Above to the SPAM database. SecurityFocus gets their address space from Above, so their mailservers are in the DB now. If you or your ISP is subscribed to ORBS, your bugtraq mail is going into the bit-bucket.
US DMV's Banned From Selling Info Jan 13, 2000
curator
In yet another bit of good regulatory news, the US Supreme Court has upheld the federal ban on state motor vehicle departments selling their driver information database to marketers and other such dreck. While this ruling is causing a bit of heart burn in regards to states' right, it seems to fall under the federal interstate commerce laws. Nonetheless, states must now ask us before they sell our information to spammers, though insurance companies, impound lots, and government authorities still all have free access.
New U.S. Crypto Regs Released Jan 12, 2000
curator
As stated in the Department of Commerce docs, or in the easier to read Techweb article, the U.S. government has released new regulations regarding crypto exporting. It seems now that we're allowed to export and post encryption source code for download (though this will require some notification of the intent to do so), and there's been a relaxation of controls on interbusiness crypto software. Also, any readily available encryption, including strong crypto, software can now be exported with some sort of governmental review.

While definitely a very good thing, the rules still seem awfully complicated and occasionally vague, thus still requiring lawyers. However, we entreat you to read the regs for yourselves.

IDS and Stides and AKLUG, Oh My! Jan 12, 2000
gdead
SecurityPortal has a piece on why signature based IDS's will fail. w00t! It feels like the movement toward creating more intelligent IDS and virus scanners is approaching critical mass. The University of New Mexico has received a lot of press lately regarding their computer immune system. Check it out. CPU intensive, but Moore's law claims that won't be a problem for long.

Speaking of IDS, I'll be giving a talk at the January Alaska Linux Users Group(AKLUG) Thurs Jan 13th at 7:30. It will be in the UAA Library second floor bibliographic room... just follow the signs. If you're in the Anchorage bowl, please attend and throw things at me. ;-)
Book Review: The Code Book, by Simon Singh Jan 11, 2000
curator
The first of what we hope will be many book reviews has been completed and is available for your perusal. We plan to add reviews as we find and read pertanent (in keeping with our security, privacy, crypto domain) books and other such material.
Entrust Technologies Challenging Verisign/Thawte Union Jan 11, 2000
curator
If anyone should have a reason why these two corps should not be joined in holy matrimony, speak now, or forever hold you peace...

Entrust has filed antitrust papers against Verisign who late last year announced their intention to purchase Thawte Consulting. The move follows a Virginia court's dismissal of Entrust's attempt to obtain a temporary restraining order against the takeover. Entrust, like several of us, are concerned that the combined companies will account for 99% of the certificate issuance market.

CyberCash Disputes Hole In ICVerify Jan 11, 2000
gdead
CyberCash claims there is no way that the credit card numbers stolen from CDUniverse came from ICVerify:

CyberCash's ICVERIFY product is a pc-based payment system, not a Web-enabled product and is not being used by CD Universe on its Web site. Therefore, the credit card information cited in recent coverage could not have come from ICVERIFY

That's a pretty bold statement to make. I've seen ISP's do all kinds of weird shoe-horning to ICVerify to get near realtime transactions out of it. An EC site using it could very possibly shoe-horned it all the way in, and in the process, broken the security of what is basically an offline system. I'll spare my general thoughts on ICVerify for another day.
New Security Paradigms Workshop Call For Papers Jan 11, 2000
gdead
ACM is hosting the 9th New Security Paradigms Workshop in Ballycotton, Ireland September 19-21. Workshop attendance is very limited... only the conference organizers and authors of accepted papers will be allowed to attend. The content is usually highly interesting since the authors are "encouraged to present ideas that might be considered risky in some other forum." Past topics have included Securing Information Transmission by Redundancy, Secure Dynamic Adaptive Traffic Masking and Strike Back: Offensive Actions in Information Warfare. If you're interested, check out the call for papers.
Don't Negotiate with Cyber-terrorists Jan 10, 2000
gdead
A big "up" to CDuniverse.com. Not for their security; they got hacked and had thousands of credit card numbers stolen through a hole in CyberCash's ICVerify. However, once they were contacted by the hacker, they didn't negotiate. This may have been purely accidental (ie: sloppy internal management) but it appears to have been purposeful. I've always been a big fan of not dealing with terrorists, but in most real world situations they are dealt with and get at least some of their demands met, including publicity. In CDuniverse's case, it wasn't lives that were lost, but thousands of credit card numbers. Assuming they (or cybercash) can fix their security problems, I'll gladly do business with them knowing they won't make deals or launder money to hide their mistakes and perpetuate the problem. Check out InternetNews for more.

Pablos: This isn't as noble as it sounds. CDUniverse should have paid the hacker. It was their obligation to secure the data & they didn't do it. Now it is other merchants who will absorb the fraud associated with those 300,000 card numbers, not CDUniverse.

B2B Commerce, XML, and other Buzzwords Jan 9, 2000
gdead
Security Portal's cover stories keep getting a little better each week. This week's example, Business to Business: Secure Commerce from B 2 shining B takes a look at technologies critical to B2B Commerce. From the bright future XML has, to the shortcomings of SSL in a transactoin based network, they cover the bases. Hopefully in the coming weeks they'll dive into some of the more thorny topics like what's out there that's better than SSL.
DeCSS Defense Briefs Jan 8, 2000
gdead
EFF has posted the briefs filed in opposition to the preliminary injunction requested by the DVDCCA. You can find them at http://www.eff.org/pub/Intellectual_property/DVD/. For a legal document, it's fairly readable. The defense's arguements, in short:
- Plaintiff's Alleged Trade Secret Is Readily Ascertainable By Proper Means
- Plaintiff's Alleged Trade Secret Lost Its Status As Such When DeCSS was Posted On The Internet
- Plaintiff Has Failed To Show That An Injunction Would Be Anything But Futile Or That It Will Suffer Irreparable Harm
- The Relief Requested By Plaintiff Runs Afoul Of Established Constitutional Principals Guaranteeing Freedom of Speech (mmmm... 1st amendment..)
GI Bill For College-bound Hackers Jan 7, 2000
gdead
This morning, President Clinton proposed a plan that would "offer college scholarships to students in the field of computer security in exchange for their public service afterward". The Feds have really taken their Cyber-war/terrorism initiative to the next level. First a public declaration that cyberspace is now a warground, now a plan to provide ROTC/GI-bill like programs to up and coming computer professionals. I'm not sure where I stand on this. I understand the need to protect the country's infrastructure, and I'm all for that. But the private sector can barely hire enough security professionals; how will they be able to compete with something made to gobble up the talent before it even hits the market?
What's AtStake? L0pht. Jan 6, 2000
gdead
Well, now that Y2K is over, the real strange stuff is starting. AtStake, who's baren website doesn't begin to describe what is going on, announced that they've secured $10MM in VC to "help secure the e-commerce revolution". The surprising part? L0pht has merged with AtStake to form their R&D wing. Oof! There's still no mention of this on L0pht's homepage, but I'm sure there will be soon enough. They also picked up Dan Greer (of CertCo fame) as their CTO, which is news in it's own right.

UPDATE: L0pht and @Stake have both updated their homepage this morning. Yesterday, the @Stake webage simply said "Coming soon...". It's a bit more advanced now. ;-)
New Crypto Regulations Draft Jan 6, 2000
gdead
Thanks again to John Young for HTML-izing the latest draft copy of the proposed crypto regulations. This one is just about as difficult to read as the first one. Some of the definitions have been "relaxed", and source code export is a bit easier, but it's still not laisez-faire. If you prefer the orginal pdf, you can find it here.
Whisker and Trin00 Updates Jan 5, 2000
gdead
It seems that someone at Network Security Wizards was listening when Rain Forest Puppy discussed how Whisker evades IDS's. They posted a reply stating that their Dragon IDS wouldn't be fooled by any of Whiskers tactics. Groovy baby.

Marcus Ranum, from NFR, also delved a bit deeper into how difficult it is to detect Trin00 and TFN. The tools that have been released basically pretend to be the master server and query potential clients. This is unfortunately very easy to by-pass in future releases of the agents, but it should find most of the currently installed ones. "...we're fortunate that the hackers that build these kind of tools don't really understand computer security, or they'd realize that the systems they build are vulnerable to traffic analysis."
The Slings and Arrows of Information Warfare Jan 5, 2000
curator
Incoming Vice Chairman of the Chiefs of Staff, AF General Richard Myers said today in an interview today that cyberwarfare will become "one more arrow in the quiver" of the US war makers, just as soon as the legal and policy issues figured out, thus making attacks on foreign nations' computer networks equivalent to missiles and slings and arrows and stuff.

I can't imagine how this is going to be managed from a legal and political point of view. Foreign countries already get pretty hacked off when we send jets over their countries to go bomb the living daylights out of some dictator's people. Imagine what they're going to do when we start using some of their infrastructure, especially when you consider the often relatively small pipe to and from the countries in transit from the US to the target. Imagine if the Croats and the US get into some cyber-pissing match in the middle of war, thus hogging all or major portions of the bandwidth of the transit countries (or providers). Said countries (or providers) then rip down the circuits in question (or black hole them). Then what are the hackers on either side to do? Suppose MCI, AT&T or someother provider decides the US military is hogging to much bandwidth, or the Iraqis decide that attacking the US provider networks is the best way fight. The the providers then drop all of the US military traffic. What does the military do then? Require MCI or whoever to allow the traffic? At that point, the government is nationalizing the entire network between the US and the target country. Yeah, that'll go over well.

Hackers Inside the Gates Jan 5, 2000
gdead
How well do you control access to resources from people inside your firewall? Does your security stop at the firewall and allow those inside to do as they please? After all, they are trustworthy employees, right? According to a new survey that is far from the truth. Up to 35% of data stolen is taken by "discontented employees" compared to the 28% that outside hackers steel. One more reason for multiple layers of host-based security on ALL resources. SunWorld has an article discussing how to secure hosts from internal hacks especially those from over zealous admins.
Don't Share Your EC Server With Your Friends Jan 5, 2000
gdead
The NYTimes is running an article on an attack against a webserver's private key developed by Nicko van Someren and Adi Shamir. The attack leverages the fact that the bit pattern in a key has much more entropy than the bit pattern found in most files on a harddrive, making it stick out like a sore thumb. This allows the key to be easily discovered, and using an "evil" CGI, you can easily find the key on the shared e-commerce server your share with many other companies (much like many small companies do with their ISP).

"The C.G.I. attack, Mr.[Robert A.] Hettinga said, proves that these days, "sharing a digital commerce server is like sharing someone's toothbrush."
A Dozen Ways to Confuse Your Web-IDS Jan 4, 2000
gdead
OK, back on to something a bit more serious. Rain Forest Puppy (author of Whisker and winner of the strange name of the day award) has written a piece for Securityfocus.com on how he attempts to elude web IDS's. He discusses how Whisker uses things like URL encoding and self referencing directories to scan a web server for vulnerablities and avoid detection. The interesting thing is most of his methods result in a valid request that the webserver will still handle, but the IDS will miss. I hope that IDS vendors take note of this kind of stuff....
Recipe of the Day (ROTD) Jan 4, 2000
grendel
Hey if Pablos can make a silly post, then by all means... Let the silly posting commence! Just stumbled across this little gem:) Schmoo Torte! Apparently as aesthetically pleasing as it is tasty, and gauranteed Trojan free:)
Quote of the Day Jan 4, 2000
pablos
"I'm one of those people I would have mocked." - gdead
The First Advisory of Y2K Jan 4, 2000
gdead
CERT has released another advisory on distributed DoS tools ala Trin00 and TFN2K. They also discuss a new tool called "Stacheldraht" which combines much of the features of Trin00 and TFN while also allowing for encrypted communication between the attacker and master servers. It also allows... hehe.. automatic updates to the agents. Check out this excellent analysis of this new tool. In non-news, CERT announced nothing bad will happen on Feb 29. Well, thank god.
Seven and a Half Non-risks of PKI Jan 3, 2000
gdead
Ben Laurie, from the AL Group, has posted a response to Ellison's and Schneier's Ten Risks of PKI. He's entitled it "Seven and a Half Non-risks of PKI: What You Shouldn't Be Told about Public Key Infrastructure" and you can find it here. To quote Mr Laurie:

Whilst I agree with the conclusion ("Public-key infrastructure has been oversold as the answer to many network security problems") I find myself at odds with many of their arguments. So, I felt impelled to write a response. And here it is.

It is also worth noting that, oversold or not, PKI is the only thing we have right now that even remotely begins to solve some of the problems we have.
Goldstein and Palmer on Hacking Jan 3, 2000
gdead
CNN has a great interview with Emmanuel Goldstein (2600 editor-in-chief) and Dr. Charles C. Palmer (of Global Security Analysis Lab fame). As one might guess, their views differ wildly, of course starting out with diverse definitions of the term hacker. Goldstein states "Hacking is, very simply, asking a lot of questions and refusing to stop asking." Palmer's definition? "Hacking is unauthorized use of computer and network resource." Wow! If these guys don't fit the typical white-hat/black-hat stereotype, I don't know who does.
Slashdot Interview with L0pht Jan 2, 2000
gdead
I meant to post this link on Friday, but with all the beer^H^H^H^Hwholesome family entertainment, I forgot. Anyhoo, Slashdot interviwed some members of l0pht last week, and the topics were fairly scattered (as one would expect), but my personal fav is "Government vs Corporations" one at the top. A bit long, but definately worth the read.
Summary of the Silliness Jan 2, 2000
gdead
Well, the night of nights has come and gone, and it was relatively un-eventful. Personally, a few of my admin scripts broke, mostly displaying "100" as the year. Sean Donelan posted the wrap-up from the NANOG ISP Y2K mailing list, with the most notable incidents being related to ccTLD's. The 01/01/2000 update from SANS' GIAC indicates that the night was relatively slow, but RPC attacks seem to be on the rise. The CW now indicates that these RPC attacks are mainly targeted at Solaris boxen and are used to deposit the Trin00 and TFN DoS clients. The upside of the whole weekend is many admins had to learn a thing or two about security. ComputerWorld has more on that.
Y2K Updates Dec 31, 1999
grendel
Well, its been the year 2000 in New Zealand for about 5 hours (as of this writing), and reports are trickling in by jet assisted carrier pidgeon. Yes the Apocalypse happened and there is mass looting and destruction down under. Its like Beyond Thunderdome already! *shiver* Kay, maybe not, in fact nothing much happened. But, come to think of it, I haven't heard from Adam, he might be frantically trying to repair Earthlight in Dunedin.:) Nope thats up too, *sigh* oh well. You'll all have to content yourselves with accounts from the front, posted on slashdot.

Another interesting point, while there was much hype surrounding "Y2K Virus" threats, i.e. those virii coded specifically to wreak havoc at the rollover, CERT has issued a statement as to their assessment of the actual threat of this happening. Original estimates were in the thousands, now *poof* apparently not many are expected. As someone who wasted quite a bit of time on this subject, I'm a bit miffed.:)

Amazon Becomes Center of New Privacy Debate Dec 30, 1999
gdead
An article in the NY Times (free reg required... how ironic) discusses a FTC complaint filed against Alexa Software, and parent company Amazon, by Richard Smith. As NYT states: At the center of the confrontation is an Internet privacy issue that is currently being bitterly disputed in Washington: whether the good intentions of a corporation are sufficient to protect individual privacy. Which is more evil: big business or big government? I don't like either of the answers.
DeCSS Injunction Denied Dec 29, 1999
curator
In a bit of holiday happiness, the Santa Clara judge overseeing the DeCSS lawsuit has denied a restraining order sought by DVD CCA (plaintiffs) to keep Slashdot and others (defendants) from posting links and information about DeCSS and the reverse engineering of the CSS algorithm. Lucky Green has posted his account of the hearing to the Cypherpunks list, and is a very worthy read.

Round 2 begins January 14, 2000.

Yahoo! Sued for Giving Users Too Much Privacy Dec 29, 1999
pablos
I know you're all sick of the "News of the Weird" motif we've fallen into lately, but it isn't our fault. Security and privacy issues on the internet are rampant with folly. Of all the ridiculous things, Yahoo! is being sued for US$4(10^9). A temporary restraining order has been granted against Yahoo!, ordering it not to publish its privacy policy until the suit is resolved. Needless to say, we've posted a "backup" copy here at Shmoo.com, just in case it goes down and you want to know your rights. In case you want to know what is actually going on, you can read that at a real news site.

Consider this: Does Yahoo! have a contractual obligation to post its privacy policy in order to be a Truste member? Will Truste sue if Yahoo! complies with the restraining order? Shift-Colon-Q-Bang-halt.

Apple Releases Fix for Mac DOS Attack Dec 29, 1999
curator
Apple yesterday released the patch to fix the OT vulnerability allowing distributed DoS attacks using Mac OS 9 boxes as slaves.
EFF to Defend Targets of DVD Lawsuit Dec 29, 1999
gdead
Yesterday, the DVD industry filed suit against site owners that knowingly posted or linked to DeCSS. Shortly thereafter, EFF stated that it will send a legal team to help defend the target of the lawsuit. EFF claims that the DVD CCA's accusation that posting or linking to DeCSS is a "theft of trade secrets" is groundless since CSS was reverse engineered (which is not illegal, esp in the district the suit was filed in). To learn more about the CSS algo, check out this recent post to cypherpunks.
Mac DOS Attack Dec 28, 1999
grendel
John Copeland a professor at Georgia Tech has discovered an interesting feature of MacOS 9 while monitoring standard network traffic to his box. Apparently by sending a custom UDP packet only 29 bytes long, you can get a 1500 byte ICMP packet back:) This has neat potential as a DOS attack. You'll find all sorts of info on the problem, crafting the required UDP packet and using the resulting ICMP packets in the form of an attack on his page.
IDC claims PKI revenues to rise past $1 Billion. Dec 28, 1999
grendel
I stumbled across this short article by way of Security Portal. Market research firm International Data Corporation (IDC) predicts a rise in PKI revenues from $122.7 million in 1998 to $1 billion by 2003. TSG is a big proponent of PKI, and this article has personal interest for a guy considering deploying PKI to a corporation of 10,000 stretched across 21 countries. Mmmmm Smartcards:)
Black-Hat Ops in Sweden Dec 28, 1999
gdead
Looks like another country is getting into the buzzword-compliant Cyberwar. Sweden is training a pile of 'IT Soldiers' to defend (and attack) network infrastructures. I hope their upstream doesn't disconnect them because they're hacking. ;-)
SmartCards: The Alternative Way to Remember Your 2048 Bit Password Dec 28, 1999
gdead
Smartcard enthusiasts have been saying all along that as computing power increases, standard password-based auth won't work anymore. Everyone knew deep down that they were right, but "How am I going to deploy a smartcard infrastructure?" One answer is have all your employees get AmEx Blue Cards which come with their own serial port smartcard reader. Another is to use Compact Flash cards and their USB readers (think digital camera). I'm currently working on a project of that nature, but more on that after the New Year. In the meantime, check out this ZDNet article that discusses our "Smart" future.
FTC Commissioner Discusses On-line Privacy Dec 27, 1999
gdead
The SJ Mercury News recently cornered FTC Commissioner Orson Swindle to discuss on-line privacy. Swindle (hehehe) believes that there are real threats to consumers privacy that simple education can't stop. He also states that while orgs like Trust-e and BBBOnline don't take the place of legislation, they are on track to do so. God help us.
SAINT 1.4.1 Released Dec 27, 1999
gdead
Remember SATAN? That super-useful yet under developed tool for looking for network vulnerablities? Well WWDSI picked up the ball a few years ago and developed SAINT to serve the same purpose. They offer a free, unrestricted version for download, or a for-pay, beefed up version for those that need the extras they can offer. Either way, 1.4.1 was released today. Go download it.
SANS Asks For Your Help Dec 25, 1999
gdead
Even though some hackers have indicated they will take Y2K off, there is still going to be an amazing increase evil traffic on most networks. SANS has set up a Y2K watchcenter to help people in the industry identify emerging threats over the coming days. They're asking for your help by supplying them with captures of bad traffic you've seen on your network. They seem to be keeping up with the flood, so check out the updates every 4 hours.
Forged CERT PGP Key Dec 24, 1999
gdead
CERT has issued a warning that at least one keyserver contains a forged CERT key. As the Y2K hacker-fest heats up, more and more people will be sending information to CERT. Please make sure you're using the valid key to send reports, else they will fall on deaf ears.
Attack Signature Systems Are Dying Dec 22, 1999
gdead
For those of you that know me, and have heard me run off at the mouth on my theories of the computer world (usually while I'm drunk at a conference), one of my big complaints regarding IDS and virus scanners is they almost exclusively rely on the recognition of a known attack signature in order to actually do anything. I've always felt this is a bad way of doing things. As your problem domain gets larger (ie: you have more people trying to do bad things to you in new and different ways) cataloging all known attacks gets to be a harder and harder process. Plus, for those unfortunate few that are the first victims of the attack, there is no defense. The solution is to make IDS/virus scanners more intelligent (AI time, baby.. neural nets and the whole nine yards). It seems that there is some progress being made by Finjan in the virus world. And there are a few IDS projects that attempt to be smart, but the whole idea is still in it's infancy. In the meantime, we're still vulnerable to anyone with half a brain.
Elliptic Curve Crypto Distributed Client Dec 22, 1999
gdead
There is now an effort underway to crack Certicom's 108 bit ECC challenge. Unlike the RC5 and DES efforts, this is not an exhaustive search. They actually use some elegance to find the 2 parts of the key. The reward money goes to you ($1K), the folks that wrote the client ($1K), and the Apache Foundation ($8K). They're already through 5% of the problem space, so download a client and get cracking.
Trin00 and Tribal Make the Big-Time Dec 21, 1999
gdead
An article in CNN that discusses the eToy vs. etoy debate tries (and mostly succeeds) at decribing distibuted DoS attacks such as Trin00 and TFN. As much as many security professionals like to shrug DoS attacks off stating that there only done by script kiddies, these distributed attacks are a serious problem. Maybe RMS will call for an attack on Amazon for their patent issues. ;-)
The Giant Sucking Sound In PKI Dec 20, 1999
curator
Verisign announced today that it has acquired Thawte Consulting for a little over a half billion dollar stock issuance. Reasons this sucks: Verisign and Thawte are #1 and #2 in the biz. As one company, they tie up about 90% of the server SSL-cert market. Having one corporation own that much of the PKI, is silly and dangerous. And whereas Thawte was an approachable company with some hacker mind share, now they're going to merged into Verisign who has a very corporate attitude with the buy everything mentality.
SecurityPortal: The Year in Review Dec 19, 1999
gdead
Well, it's getting toward the end of the year, and that means everyone does an "In Review" segment. It gives readers a chance to remember the ups and downs of the past year... yeah right. What it really does it allow half your writers to go on vacation because you're using old news to piece together a new story. TSG would do an "In Review" piece, but we've only been around for 2 months, so it'd be kinda short ;) Seriously, check out Security Portal's Year in Review to get your daily dose of flashbacks.
Zero Knowledge Systems Holding up to the Heat Dec 18, 1999
pablos
Zero Knowledge Systems has been meeting with Canadian and US Feds and some folks expressed concerns about what would happen to ZKS. Namely, would they be forced to compromise their stand on privacy. Austin hill responded to this with a reasonable statement about what these meetings have consisted of. Read the post. Secondly, Tim May wrote an extensive rant about his concerns with ZKS, and pseudonymity services as a business. People should read this to understand the complexities ZKS is dealing with.
Hong Kong Blondes (or "Why Coca-Cola is Evil") Dec 17, 1999
gdead
In a WorldNet Daily article that's almost too strange to be true, Anthony C. LoBaido unfolds the mystery around the 31337 hacking group Hong Kong Blondes. While I'm not sure if I believe everything that is said in this story, it's chock full of great stuff; a beautiful ex-british female spy who loves to hack, reasons why Coke and Henry Kissinger are evil, and Jack-in-the-Box tacos... *drool* Hacking and Jack tacos, what else could you ask for in downtown Hong Kong?
Go-go Gadget Hacker Census Dec 17, 1999
gdead
Ira Winkler, the "security professional", has made up some more numbers representing the current state of the hacker community. According to Ira, there are between 5,000 and 10,000 "hackers who are good enough to write their own tools," up from 1,000 a year ago. Does anyone have any idea how he came up with these? I'd really like to know, because I never recieved my hacker questionare in the mail.
Netscape Password Encryption Broken Dec 16, 1999
gdead
Conventional wisdom has stated that checking the "remember my password" button in Netscape was a bad idea. Not only was the crypto a black box, it's generally a bad security practice. Well, RST broke the algorithm used to encrypt mail passwords stored locally. Apparently this particular hole has been patched in Communicator 4.7... but still, it's not that big of a hassle to type in your password everytime. Check out ComputerWorld for the mass media's take.
December Crypto-Gram Available Dec 16, 1999
gdead
It got published very late in the day (possibly because of Counterpane's re-org), but regardless, the December Crypto-Gram is out. Topics of this month's rant include a discussion of Sarah Flannery's Public-Key Algorithm, European cellular encryption algorithms, and my personal favorite is a section on Egg Bank.
New SAFER Newsletter Out Dec 15, 1999
curator
Siam Relay Ltd. today released this month's SAFER Newsletter a compendium of the month's security alerts and news, tool releases, exploits and what not. Get 'em whille they're hot!
Clinton Admistration Encourages Hacking on Jan 7-9th 2000 Dec 14, 1999
gdead
In a surprise move, the Clinton Administration asked that hackers "show some self-restraint" over the New Years weekend. With all the Y2K problems going on, the government and private sector would rather not deal with a bunch of attacks as well (duh). They continued on by recommending that if you'd like to hack something, you do it the following weekend. I swear, this is true. Check out ZDNews for the whole story.
Buffer Overflow in SSHd (v1.2.27) Compiled with RSAREF2 Dec 14, 1999
grendel
Seems there's a buffer overflow in SSH v1.2.27 that when explicitly compiled with the RSAREF2 (--with-rsaref) library allows arbitrary code to be executed. There are patches already available for the effected systems. Nuff said, read the CERT Advisory.
Checkpoint Firewall Coming to DSL Service Near You Dec 14, 1999
curator
Checkpoint is expected to announce today that they're forming a new company called Sofaware, that will attempt to bring firewall technology to DSL and cable modem devices everywhere. They are also working on the ability to have the firewalling service run by the ISPs so the ISPs can control and charge for the service. Mmmm... firewalling for fun and profit.
Anonymous Speech Comes Under Fire Dec 14, 1999
gdead
The first questions over whether the Freedom Network is TOO anonymous have been asked. Nandotimes reports on how the Freedom could be used for evil purposes (surprise!). They also indicate that Zero Knowledge will be meeting with the FBI shortly to "brief them" on Freedom. Let's hope that nothing terrible happens in that meeing. IMHO, totally anonymous speech is a good thing; even though some bad things may come of it, it's better than the alternative.
New Crypto Regs Delayed Dec 14, 1999
gdead
According to the NY Times, the White House is delaying the release of the much anticipated new crypto export regulations. The Clinton administration claims they need another month to "address the widespread criticism that greeted a draft of the regulations". Lame. The release of the crypto regs was also the reason that the hearing of the Bernstein case was pushed back to March. While the new release date probably won't effect the case further, you never know.
PGP Granted License for Worldwide Export Dec 13, 1999
pablos
As of today, NetAss can export PGP to "virtually all countries worldwide" without restriction. They got a license from the U.S. Government to do so. Of course this is fantastic news, but should be considered suspect of tainting by the NSA. As always, get code reviews and compile your own crypto software. NAI Pres Release.
Dumpster Diving Contest Ends Dec 13, 1999
gdead
Two weeks ago, Kirk Bailey challenged a bunch of security geeks to find out as much personal information as they could. The results are in, and it looks bad (and it requires a free NYT registration, but that's a different story). In two weeks, without doing anything too illegal or using up too much time, they were able to dig up his SSN, a copy of his birth certificate, an online copy of his signature, and his college grades. Now, this doesn't really surprise me, but it definately drives home the point that no-one's privacy is safe online.
SecurityPortal: An Overview of Corporate Information Security Dec 12, 1999
gdead
The cover story for SecurityPortal.com is an overview of corporate security. What makes it interesting is that it doesn't dwell on the just the technical stuff, but dives into the social and physcial aspects of IT security. Social variables and how they effect security are often overlooked when companies develop and deploy security systems. It's unfortunate too, because more often than not, a person, not a machine, is the weak link in your company's security policy.
Egg-tra, Egg-tra, Another Security Hole Dec 12, 1999
gdead
I swear, if the previous problems with UK bank Egg weren't enough to cause you to remove your money from their safe, maybe this new one will knock some sense into you. They implemented a "logout" button to remove the cookies from your browser, but this security feature caused a different hole to open up allowing your account information to STILL be leaked out. It's hard to believe, that as far as we've come in the security field, that a finacial institution like Egg can screw up this badly this many times.
Absent Secure Remote Access System Released by AT&T Labs Dec 10, 1999
pablos
Christian Gilmore, Dave Kormann, Avi Rubin have released Absent, "a system for secure remote access to the internal web from outside. It addresses the problem of secure remote access to a site's internal web server from outside the firewall. The goal is to give authorized users access to sensitive information, while protecting the information from others.A description, the paper, and the code are available.
Auditors In Disguise Crack Us Pension Computers Dec 10, 1999
pablos
Security experts easily broke into computers at the federal agency that guarantees pensions, acquiring the ability to create fictitious beneficiaries and send them money.

For three months beginning in May, the auditors rummaged through high-level administrative and financial system computer files at the Pension Benefit Guaranty Corp. in Washington, their activities undetected. Full Text.

Former KGB Internet Surveillance Dec 10, 1999
pablos
Russian spy agencies formerly known as the KGB (now the Federal Security Service or FSB) have mandated that ISPs cooperate in their surveillance of internet traffic as part of an initiative called SORM-2. The ISPs have to pay a hefty fee (~$10K to $30K) for the equipment. Apparently this is putting some smaller guys out of business, yet none of them will talk about it! Full Text.
Sun Security Bulletin on Snoop Dec 10, 1999
gdead
Heheheh... I'm still laughing about the snoop exploit that came across bugtraq this week. Since I announced the exploit, I'll annouce the patch. Note that this bug is found in all versions of Solaris since 2.3 on both the Sparc and Intel platforms.
The Cato Institute Posts Nameless in Cyberspace: Anonymity on the Internet Dec 9, 1999
pablos
"Proposals to limit anonymous communications on the Internet would violate free speech rights long recognized by the Supreme Court. Anonymous and pseudonymous speech played a vital role in the founding of this country. Thomas Paine’s Common Sense was first released signed, “An Englishman.” Alexander Hamilton, John Jay, James Madison, Samuel Adams, and others carried out the debate between Federalists and Anti-Federalists using pseudonyms. Today, human rights workers in China and many other countries have reforged the link between anonymity and free speech.

Given the importance of anonymity as a component of free speech, the cost of banning anonymous Internet speech would be enormous. It makes no sense to treat Internet speech differently from printed leaflets or books." - Executive Summary

Cryptanalsysis of GSM Phones Now Available Dec 9, 1999
gdead
The Biryukov and Shamir paper describing the attack on the A5/1 crypto algorithm (used in GSM phones) is now available online. Even for those not so well versed in cryptography, it's fairly easily understood. It boils down to this: a PC with 128MB of RAM and 146 GB of disk can shatter the encryption in less than a second after it's listened to at least 2 minutes of converstation. You know that scene in "Enemy of the State" where Gene Hackman clones that GSM phone in seconds? The one where you said "Nope. Wrong. He couldn't do that"? Well now he can.
The Legal Ramifications of Internet Anonymity Legislation Dec 9, 1999
curator
A current paper from the Cato Institute, discusses the legal ramifications of attempts to put limits on anonymity on the Internet. Probably one of the better accessible, legalized reasonings of the topic I've seen, it's refreshing to read something from someone that seems to know the true legal side of things, instead of an IT idealist (like most of us) who doesn't know anything about the legal precedence. Definitely worthy of a read.
Trustwise Digital Signature Hacked Dec 9, 1999
gdead
A day after the Department of Trade and Insdustry signed of on BT's digital signature algorithm, a British security firm has spoofed it. It wasn't broken cryptographically, but rather by subverting the protocol with the viewer using javascript and HTML. Regardless of how it's done, the signature cannot be trusted. BT's response? "It's not a breach of security, they haven't got into the Trustwise site"....
Physical IDS's Just Got Smarter Dec 8, 1999
gdead
Now here's some good news for people in search of a physically secure data center. New Scientist reports on advances in video surveillance. Researchers in the UK have determined ways to pick out a criminal before he has actually committed the crime. Freaky. They can also determine when someone is going to commit suicide by jumping in front of a train. Just as freaky, but I think there's less application in the computer security world. ;) When was the last time someone jumped in front of a speeding server to "end it all"?
Cyber-Ransom is a Cyber-Joke Dec 8, 1999
gdead
I've read several reports recently that claim that electronic sabotage and spying are on the rise (see today's article in Wired as an example). One of the common threads in these reports is the possiblity of a company's electronic assets being stolen across the network, the orginal information deleted from the compromised hosts, then the data held hostage, waiting for money to be deposited in a Swiss account. In this day and age, that threat carries no weight. Any corporation who is at all serious about their information keeps backups, both on and off site. While a few days worth of data may be lost, I highly doubt that a company would pay the ransom rather than just restore from backup and use the law to go after the terrorists. Stealing the all copies of mission-critical data from a company is almost impossible without several physical compromises, a job that would be difficult for overseas evil-doers. The only way a ransom-based attack could be successful is if it was launched by several insiders who had access to all on and off-line media. There are a LOT of problems for the criminal in that scenario, enough that I don't think that attack is very likely. The future of cyber-crime will be selling the data to competitors, not back to the victimized company... there's no market for it.
Goodies from CERT Dec 8, 1999
gdead
CERT actually does release things that aren't advisories *gasp*. Results of the Distributed-Systems Intruder Tools Workshop is the results of an ad hoc conference held to discuss distributed hacking techniques. It contains information of how the attacks are staged as well as some ideas on how to stop them on the ingress and egress of your network. International Cooperation for Cyber Crime and Terrorism in the 21st Century discusses the how organizations must cooperate across national boundaries in order to security exist in the next century. Both are worth the read.
The #1 Reason to Have a Long Host Name Dec 7, 1999
gdead
Normally I don't post exploit/bug news, but this is way too funny. There is a buffer overflow bug in snoop under Solaris 2.7. Snoop doesn't gracefully handle hostnames longer than 1024 bytes. Give your machine a long hostname, then proceed to smash the stack. This is a remotely exploitable bug in a sniffer. The packet doesn't need to even be destined for the exploitable box... it just needs to be thrown in its general direction. Now that's a 37337 h4x0r 7r1ck.
Schneier and Ten Risks of PKI Dec 7, 1999
gdead
Bruce Schneier and Carl Ellison have ripped together a nice paper on What You're Not Being Told About Public Key Infrastructure. It brings to light the historical underlying issues with PKI, esp regarding the trust put in the server. Also, it's worth a note that Counterpane Systems is now part of Counterpane Internet Security. The new page is a bit sparce on information, but they claim there will be more info forthcoming.
Jump on the "NSA Bashing" Bandwagon Dec 7, 1999
gdead
The poor NSA can't get a break. As if the announcement that they are being sued by EPIC wasn't bad enough, they now have a damning article in the Dec 13th Newsweek. The article discusses the now well-known problem that the NSA has a hard time intercepting digital transmissions, as well as reveal a possible alliance between the NSA and FBI which would allow the NSA to spy inside US borders. Late Monday, the NSA announced that it will not be doing anything illegal in the US... whatever that means.
What Security and Y2K Don't Have in Common Dec 6, 1999
gdead
There's a great editorial in Federal Computer Week that disagrees with a common idea in Washington; security is the next Y2K problem. Many believe that the security problems that face the nation will result in a campaign by the public and private sectors to lock down our information infrastructure, much in the same way the country has attempted to fix the Y2K issues. Unfortunately, the analogy may not fit, and it is doing more harm than good.
Closest thing to Kinakuta so far Dec 6, 1999
pablos
A British hosting provider has set up shop in a nuke proof bunker they bought from the MOD. According to their web site: "The Bunker is a real nuclear bunker, built to withstand a direct strike."
The Bunker offers the ultimate in protection from a myriad of attacks, including crackers, terrorist attack, electro-magnetic pulse, electronic eavesdropping, HERF and Solar flares.
Check out the pics. p.s. I heard about this first on Slashdot.
Everything You Ever Wanted to Know from the DoD Dec 5, 1999
gdead
Thanks again to John Young for digging up assist.daps.mil. The site is part of the Defense Automation and Production Service and has a wonderful quick search. John has created a list of some of the more interesting documents, many of which the NSA has declined to give him under the Freedom of Information Act. Download whatever you can, because the feeling is this site may not be public for much longer.
NT 4.0 SP6a Completes C2 Evaluation Dec 5, 1999
gdead
NT 4.0 SP6a (with hotfixes) has now been evaluated to live in a Trusted Computing Base has defined by the DoD. It seems to be a much more usable C2 compliant configuration than before, but there are still some major parts that can't be used (like streams). Plus, their CryptoAPI (hehehe) has been evaluted under the FIPS 140-1 standard.
TSG Sherlock Plug-Ins Dec 4, 1999
curator
To facilitate Mac OS users in searching and using our site, we've created a couple plug-ins for the Sherlock search engine available in Mac OS 8.5 and above. There are currently two, one for the FW-1 mailing list archives, and one for the site in general. They are available in one archive, or individually. The can be found at http://www.shmoo.com/sherlock
Errr... Whatcha doin'? NSA sued by EPIC. Dec 4, 1999
curator
EPIC is suing the NSA to release documents pertaining to their alleged spying on US citizens (ie, Echelon and its ilk). In June, EPIC and the House Intelligence subcommittee requested the same documents be provided under the Freedom of Information Act. The NSA refused to do so. The NSA now has one month to respond to the suit.

How afraid are we to find out what may be in those documents?

Keeping Evil Cookies Out of Our E-mail Dec 3, 1999
curator
Several privacy and consumer groups are asking the FTC to require browser-makers to block the cookies from cookie-fied html e-mail messages to keep spammers and the like from secretly tracking and gathering information on the readers. While we don't like the idea of having the act of just reading an e-mail establish some sort of demographic on us, we think it's a bit heavy handed to ask the FTC to step in here. It's a bit like going to the state public works council to get someone to fix the lock on your apartment door.
New Years Eve may be a Hacking Paradise Dec 3, 1999
gdead
If I were a full time 3l33t h4x0r, I'd be drooling with antcipation over the upcoming holiday season. Holidays are normally good times to go poking around on someone's network because virtually everyone is out of the office and not paying attention to their pagers. This year is even better because of the potential Y2K problems. There will be chaos on the Net, so a well timed and placed attack may not be noticed for a long time. According to CNN, the FBI and the rest of the feds are bracing for just such an ordeal. Even if there are no major power/telco disruptions, it's still going to be an exciting nite for the sober administrators.
Doh...I hate it when that happens. Dec 2, 1999
curator
In a talk before San Francisco's Digital Economy conference, Eric Schmidt (Novell CEO), admitted to having his credit card number stolen off the internet. Schmidt squarely blames browser cookies as the culprit (yeah... whatever...), which his company "coincidentally" is trying to replace with their own NDS-based product called "digitalme". See, online security and privacy affect people just like you and me.
Walk This Way... Dec 2, 1999
curator
The New Scientist has a interesting article on attempts to use a person's gate as a biometric; not so much as for realtime authentication purposes, but for criminal detection over closed circuit television. Finally a real-world application for the "Ministry of Silly Walks".
DoubleClick Buys Opt-in Email.com Dec 2, 1999
gdead
In a further attempt to Borg-ify the planet, Doubleclick is buying Opt-in Email.com. Opt-in is a provider of "Advanced Email Marketing Services" (read: you can outsource your spam^H^H^H^Hmass mailings to them). They have a giant list of people who expect to get spammed, and DoubleClick has the demographic data to better target the spam. Of course DoubleClick claims their "intention is to be good online citizens." We'll have to wait and see.
Freedom 1.0 Released, get your Nym's while they're hot Dec 2, 1999
gdead
Ian Goldberg and the folx at Zero-Knowledge have turned Freedom into a reality. Last nite they revealed Freedom 1.0. Freedom utilizes the Freedom network (that's been under development for the last little bit) to protect all aspects of your privacy online. There's no trial version yet, but you can purchase a full version for $50, complete with 5 nym's.
No Egg Puns: UK bank Egg Unsafe Dec 1, 1999
gdead
Egg, a UK bank, got egg on it's face twice today (sorry, couldn't resist). The first is a report in The Register indicating that Egg was distributing customer credit card information via clear-text email. The second is a security breach that allowed customers to veiw and modify others' accounts. Eggs answer to both problems: They were "not [the] best business practices". No shit. If you've got money with Egg, move it somewhere else.
Comanche Code-talker Honored Dec 1, 1999
gdead
Charles Chibitty, a 78-year-old Comanche elder was honored by the US government for his work in World War II. He received the "Knowlton Award of the Military Intelligence Corps Association for his professionalism and 'high standard of integrity and moral character' in carrying out his duties". In a time when encrypting voice communication was still thought to be an impossiblity, Chibitty and 16 other Comanches delivered the next best thing; an obscure spoken language that the Germans knew nothing about. Their work was responsible for saving hundreds of lives and providing one of the few codes of the war that was neither broken nor stolen. kewl :)
The Evil Cartoon Cursor Dec 1, 1999
gdead
The cursor that caused Al Gore to rethink his online presence (come on, it is his Internet, right?) and lead to national distrust of all web-based-cursor-modifying-software is allowing you to "opt-out". Comet systems has released a fix that allows you to delete the serial number that identifies you as you surf. uhhh.. That's not really a fix, guys. It still tracks you, they just don't know who "you" are anymore because the serial number is random (ie: not based on you or your IP). QOTD from Trust-e: Comet Systems had "significantly damaged the trust of their customers." I bet Trust-e will still take Comet's money and certify them.
OpenBSD 2.6 released Nov 30, 1999
gdead
Theo de Raadt and gang have done it again. OpenBSD 2.6 is out and available for download. There are a lot of new things in this release; critical ATAPI fixes, built in OpenSSH with libwrap support, some wierd Y2K fixes, and isakmpd updates to name a few. Looks like I'll be spending tomorrow trying to dig up a box to install this on.
"Call for Papers" Deadlines Nov 30, 1999
gdead
For those who enjoy sharing what they've learned or for those who have something of value to donate to the community, you should consider speaking at one of the many security conferences coming up. Most of the spring conference submission deadlines have come and gone, but the summer con's are just getting started. Black Hat is soliciting papers for their Las Vegas get-together. The deadline is March 15th. And for the more academic minds, USENIX is accepting papers until February 10 for the 9th Annual Security Symposium in Denver.
The Real Risks to Your Privacy Nov 30, 1999
curator
Several instances have appeared lately of companies abusing their customers' privacy. While we all know this a bad thing, there are much more insidious threats to our privacy. We understand everyone's concerns about their Internet usage habits being cataloged, but we also think it's a bit disingenuous for everyone to be so bitchy about privacy when everyday we all do things that greatly endanger the privacy we hold so dear. To this end we've written an article expositing on this view. Feel free to comment, converse, and exposit in response.
Is Linux a Good Match for Checkpoint? Nov 29, 1999
gdead
Securityportal.com taken a really good look at the rationale of Checkpoint porting Firewall-1 to Linux. One of the points Checkpoint has made very clear is that they're "adopting an OS, not a movement". They're feeling pressure from VAR's and inside sales channels to have support Linux... at least for a deployment platform. They have no plans to port the management interface to Linux. Course, if you know what you're doing, you can emulate Solaris under FreeBSD and run the Solaris management tool. ;)
AOL See Privacy as a Subscription Service Nov 29, 1999
curator
In their infinite wisdom, AOL has decided that privacy is something their customers need to subscribe to. Literally. Like, all those privacy agreements customers signed last year to keep their online viewing habits out of the hands, and databases, of marketers, spammers, and other info-leeches, are now expired, and will require a yearly re-subscription to said agreement. Apparently, AOL said as much in the original forms, but it still sucks the big green weenie, and most customers are still suprised at the backwards practice. Next thing you'll know they'll even be spamming our mailboxes without any "opt-out" clauses...Doh!
New Yorker Article: The Intelligence Gap Nov 29, 1999
gdead
Seymour Hersh has very few nice words for the current state of the NSA in his article for the Dec 6th New Yorker. "The dirty little secret is that fibre optics and encryption are kicking Fort Meade in the nuts". After reading this, I have a little more faith that I can protect my privacy from the government if I try hard enough.
Ways to Spend your Training Budget Nov 28, 1999
gdead
The government is offering FREE tempest classes. No lie. Check out the schedule the Navy has posted. Most of the courses require some kind of clearance level with the government, but some are open to regular joes like you and me. Regardless, it would be neat to take a class at the The National Cryptologic School.
Pardon Our Dust Nov 28, 1999
gdead
The Shmoo Group is an organic thing, in that stinky gym-sock kind of way. We're currenly adding lots of new stuff to our site, like a more functional backend to help us manage the site to a new whiz-bang UI. While this is going on, you may notice some wierdness. If you find anything really strange (404's, etc) feel free to let us know. later.
SuSE releases security tools Nov 27, 1999
grendel
Whats their motto again? "Quality German engineered Linux"? :) Well the boys at SuSE have released a series of security scripts/tools for hardening Linux. These tools of course will be included in the most recent release of SuSE Linux, along with a number of standard security tools, or you can D/L them individually from SuSE. Check 'em out... a couple of them seem pretty handy... Here's an article on Freshmeat that includes a list of the scripts, commentary, etc...
The Great Australian Intranet Nov 26, 1999
gdead
The Australian government has turned the Internet into what amounts to a corporate inTRAnet the size of a continent. Several laws were just passed that give the governement an unbelievable amount of power over private computers and networks... much the same an IS departement in a company would control and own all the data on company computers. This is downright scary. Check out Slashdot for all the links and views.
Christmas Shopping for the Paranoid .... Nov 25, 1999
gdead
Having trouble deciding what Christmas present to buy the conspiracy theorist in your life? Try Candes Systems where you can buy Pentium II TEMPEST proofed desktops, laptops, and printers. Or maybe go check out Moser Electronics Company based out of a barn in the woods of Washington. They specialize in some of the more obscure geek toys, like mobile targets used in torpedo practice, portable seismographs, and (my favorite) a TEMPEST-proof Mac-Plus.
NSA Suffering from Information Overload Nov 25, 1999
gdead
Even the NSA can't escape the problem of governmental bureaucracy. According to a report from CNN the US spy agency is having a hard time adapting to new technologies. Wiretapping analog signals on copper is much easier than sniffing someone's email off fiber. But don't fret... There's rumours of a giant re-org just around the corner that will let them catch right back up so they once again know everything about everyone.

For those in the US, happy Thanksgiving :)
Smashing the Stack for Everybody Nov 24, 1999
gdead
CNet attempted to explain buffer overflows to the masses by dumbing the problem down to the level that Y2K is. While I feel that educating the public about security issues is a great thing, I don't feel that comments like the following from SANS Director of Research, Alan Paller are called for:

You wrote a program, asked someone for input, gave them space for a certain amount of characters, and didn't check to see if the program could take more. You are incompetent, and you are the problem.

Wowzers... incompetent. Nevermind that most major software projects are the work of many people working together to create a highly complex system. The complexity of these systems don't mean that you can necessarily point at one programmer, proclaim him the clueless wonder that induced an buffer overflow hole, and fire him. It's a bit of a naive statement to put up in the national media.
The Osiris Scripts Released Nov 24, 1999
curator
We've developed a tool that helps verify the integrity of executables, dll's, etc under NT (much the same as the old "tripwire" utility for UNIX). It's called Osiris and you can read more and download it from http://www.shmoo.com/osiris.

Any feedback on it is welcome.

Wallowing in the Crypto Export Swamp Nov 23, 1999
gdead
I believe that Ireland's cryto export-control law says something like "We don't care. Export whatever you want." The US's proposed regulations are several orders of magnitude more complex than that. The September announcement had everyone hoping for new, relaxed, clear-cut rules regarding source code export. Even though the currently proposed draft is a work-in-progress, you can bet it won't get any simpler. And this complexity may wreak havoc with the Berstein Case. Take a look at what USAToday.com and The Industry Standard sayabout the draft.
The Good, the Bad, and the Ugly Sides of Marketing Security Nov 23, 1999
gdead
I've read several articles in the last few days about marketing security. A Forbes columnist called up five big marketing firms in the Valley with a challenge: How do you market BO2K as a commercial product? The results range from the humorous (giving away a live cow at DefCon) to scary ("Have [CdC] member coauther book with Donald Trump, tentatively entitled 'Art of the Steal'"). All in all, I'd say it actually looked marketable.

On the other side of the coin are people using viral marketing techniques to hype up really crappy websites just to get banner revenue. Wired has a piece on 2 guys from NY spamming USENET to generate traffic to their "topical" websites. *sigh* They're making about $25/day for each site they do... not exactly big money for the amount of people they're alienating.
Doubleclick merger = Privacy Apocalypse Nov 22, 1999
gdead
It's not bad enough that Doubleclick servers light up my firewall like a Christmas tree everytime somebody is surfing... Now they're attempting to merge with Abacus Direct, a giant marketing company. The merger was announced in June, but it's being finalized now. Privacy groups are appealing to the FTC to stop the sale. If the FTC doesn't get involved, it's likely that the merger will succeed, and demographic data about millions of people will be melded with an agressive direct marketing company hungry to pigeon-hole the world. Yikes...
DOD planning a ban on "mobile" code? Nov 22, 1999
grendel
What? Someone in the DOD finally getting a clue that ActiveX is a risk? Apparently:) The Department of Defense is considering banning "mobile" code such as JavaScript, ActiveX and JAVA due to the proliferation of breakins attributed to these technologies. Heres the MSNBC article.
"Harry Potter" encrypted with CSS? Nov 22, 1999
gdead
Neil McAllister has writen an editorial for the SF Cronicle on whether DVD privacy is a real or perceived threat. He makes some good points about the current logistical problems dup'ing a DVD. My favorite part, though, is where he discusses pushing "privacy protection" to printed media. Go-go-gadet-decryption-glasses.
Updates for a few of our recent stories... Nov 20, 1999
curator
Late Friday, Wired posted a few updates for some of our recent stories:

  • A recent lawsuit in Virginia by several ISP's, and a free speech organization, against the Virginian government for violation of Virginian free speech laws was thrown out... because they sued the wrong people.
  • After receiving a ton of e-mail mocking a proposed depricatory cash carry tax, the Richmond Federal Reserve clarified it position on the topic, pointing out it was only a hypothetical statement, and no legislation has ever actually been sought.
  • According to the IETF chairman the battle over implanting wiretaping capabilities in Internet standards may not be over.
Simson Says: Who'll Rule Cyberspace? Nov 20, 1999
gdead
Simson Garfinkel, in his latest edition of Simson Says reviews Lawrence Lessig's new book "Code and Other Laws of Cyberspace". The book covers the ad hoc method at which the Internet is governed along with how that method effects your privacy. And as usual, Garfinkel puts his own unique spin on it.
CERT Advisory on Distributed DoS Tools Nov 19, 1999
gdead
CERT has released an incident note regarding distributed DoS tools. These tools, once installed, allow an infected host to participate in a widespread, organized set of DoS attacks. As far as architecting goes, it's kinda a neat idea. ;) Seriously, the incident note contains some good information, like commonly used port number that you can have your firewall look for was well as traffic signatures that you can set up NFR (or the like) to keep an eye out for. And of course, add anti-spoofing rules to anything you can.. routers AND firewalls.
12th Annual FIRST Conference Extends Paper Submission Deadline Nov 18, 1999
gdead
Due to an apparent lack of submitted papers, the FIRST conference on Computer Security and Incident Handling has extended their call for papers. Here's your chance to meet some friendly security folks and see beautiful downtown Chicago in June ;)
MS goes Patch Crazy Nov 18, 1999
gdead
Microsoft has in 24 hours released a patch and pulled another one off their web site due to an "error". A patch to stop Javascript redirection whereby a evil script could read local files and do other bad things. It was also discovered that a previously released patch that broke the TCP stack in a manner that required applications like Notes and VNC to be run as Administrator. Microsoft has pulled that one from their website.
Openssh.com launched Nov 17, 1999
gdead
OpenSSH now has it's own home. OpenSSH.com has source via CVS and FTP, as well as links to FreeBSD, Linux, and Solaris ports. I really dig the logo; a fully armed blowfish, complete with nuclear bomb.
Remailers NG Nov 17, 1999
gdead
Due some projects I've been in volved in lately, I've been paying more and more attention to remailers and the "science" behind them. Dug up an interesting article on the possible future of remailers. "Bandwidth, storage capacity, and processing power (CPU speed) has increased considerably, and will continue to do so. A new remailer system should 'think bigger'". mmm... riding Moore's law.
EchelonWatch.org officially launched. Nov 16, 1999
jpm
We mentioned the ACLU's new site a couple days ago. Here are a couple quotes from today's press release...

"Echelon is perhaps the most powerful intelligence gathering network in the world," said Barry Steinhardt, Associate Director of the ACLU. "But it is still very much a black box, which apparently operates without the oversight of Congress or the courts."

"It appears that the U.S. government is once again spying on Americans' private communications," said Gregory T. Nojeim, a legislative counsel in the ACLU's Washington National Office. "Congress must determine if Echelon is as sweeping and intrusive as has been reported, and most importantly, it must ensure that Americans' conversations are not intercepted without a court order."

Scathing Remarks about Trust-e Nov 16, 1999
 
Slashdot interviewed Dave Steer from Trust-e in an attempt to figure out what exactly Trust-e does. The conclusion: Not a whole lot. Read the article.. figure out how they protect your privacy...
New Crypto-Gram Available Nov 15, 1999
 
A new edition of Bruce Shneier's most excellent Crypto-Gram from Counterpane Internet Security, Inc.'s site. This edition covers such juicy topics as "Why computers are insecure, DVD encryption, Win CE, and Elliptic Curves." As usual, a good and informative read.
Subscribe to TSG's New Mail Lists Nov 15, 1999
 
In an effort to help keep you informed, The Shmoo Group has fired up a couple of mail lists. TSG-Announce is a low volume (1 - 2 messages a day), moderated list with daily security/privacy/crypto updates and views. TSG-Discuss is a higher volume, moderated list with open discussions about issues facing security professionals today.
A New NSA Patent Nov 15, 1999
 
The US National Security Agency has designed and patented a new technology that could aid it in spying on international telephone calls. The NSA patent, granted on 10 August, is for a system of automatic topic spotting and labelling of data. The patent officially confirms for the first time that the NSA has been working on ways of automatically analysing human speech.

More at Independant News.

Nothing is Private Nov 15, 1999
 
This month's Forbes discusses The End of Privacy. Awesome. This article explains why we should all be afraid of what can be found out about us. One of the few things you can can control is who can read your mail... encrypt it, always.
Remote Data Center Security Nov 15, 1999
 
In a subject that is near and dear to my heart, Securityportal.com has an article on Securing Remote Data Centers. It basically discusses physical security, and not stuff like securing remote Out-Of-Band control information. But it's a good start.

Speaking of articles, HNN has a downright silly article on Security practices today, Or lack thereof. It's based on a totally unscientific survey and written by someone who "obviously" knows way more about security than the people he interviewed. I think there's some useful info to be taken away from reading it, if you can get past the tone the article was written in.
Site o' the day: Echelonwatch.org Nov 15, 1999
 
Even the ACLU has taken notice of the Echelon problem. In conjunction with a few other privacy groups, they have launched Echelonwatch.org. What I dig most about this is the fact that the ACLU is a huge organization with lots of influence. They can bring Echelon the attention it deserves... as long as they don't get too preachy about it. ;)
Is the NSA the "Enemy of the State"? Nov 14, 1999
 
The Washington Post has a great article on the current state of the NSA and it's ties with other governments. Of the more interesting information revealed was the NSA's desire to "go back to [their] roots with GCHQ (the UK spy agency)". This tight interaction between the NSA and a foriegn country give Echelon fanatics more basis for believing the world-wide spy network does exist.
NFR Discontinues "Research" Distribution Nov 13, 1999
 
For the last 2 years, MJR and the boys at NFR have distributed a deprecated version of their software in source form (usually the version prior to the current release). Starting this month, they have discontinued this practice. They claim it was because the current "research" distro wasn't a good representation of what their commercial software has turned into. read: it was eating into their bottom line. Read the press release.
MS releases Patch against BubbleBoy Nov 12, 1999
 
In what seemed to be an impossiblity, MS created an email client that was vulnerable to virus attachments without even opening them (they call this technology ActiveXsploit). Anyway, they claim to have fixed it. Go download, patch, reboot, drink heavily and watch your MS stock continue to climb.
Aleph One on NPR Nov 12, 1999
 
Aleph One (aka Bugtraq moderator aka Elias Levy) was interviewed on NPR this morning. Five minutes of cyberterrorism discussion can be found at Securityfocus.com. You'll need *shudder* Real Audio... how ironic.
Quoth the Raven: "No Nettapping" Nov 11, 1999
 
In a decisive vote, the IETF decided last nite to reject Wiretapping the Net. Not a big surprise, but it definitely sets the stage for upcoming conflict. The FBI/DoJ is going to keep pressing the industry to do something to allow wiretapping, and the next debate may not be so friendly. The Washington Post has a good pre-vote article with interviews with Bob Barr and some Feds.
The Internet Random Mail Reader Nov 11, 1999
 
A very brief project abstract for The Internet Random Mail Reader has been posted by The Shmoo Group. We invented this a year ago, but just now decided to let you in on it. If you've got a latent voyeur instinct, this might just be the project for you.
B1 Solaris and Linux Nov 10, 1999
 
Some interesting news from the C2 and higher security levels for popular OS's. Last week Sun announced Trusted Solaris 7. Neat, considering they jumped right from 2.5.1 to 7 without doing a Trusted 2.6. And there's a new release of Rule Set Based Access Control for Linux. This is a security model that will bring Linux up to B1 compliance. Sounds interesting. If anyone has played with this thing, please let us know.
Time to Upgrade Bind Nov 10, 1999
 
The ISC has released Bind 8.2.2p3. They recommend you upgrade as soon as possible lest some 3l33t script kiddie has some fun with all your nameservers. Or I suppose you could just set your firewall to block all nameservice queries ;)
Microsoft Leverages Monopoly to Dominate Virus Market Nov 10, 1999
 
I'm getting real sick & tired of all the email viruses only showing up on Windows. I'm not asking for POSIX compliance, just an occasional Mac or Linux port.

Apparently an MSNBC article broke the story, of all places. Quote from the story: "The virus can only run if Internet Explorer 5.0 with Windows Scripting Host is installed (standard in Windows 98 and Windows 2000 installations). If security settings for Internet Zone in IE5 are set to High, the worm will not be executed. It does not run on Windows NT." ZDNet also has a story about this "Bubbleboy" virus. McAfee weighs in too.

Of course, we stole this tidbit from Slashdot.

New edition of Siam Relay's SAFER Newsletter Nov 10, 1999
 
Siam Relay has released this month's edition of SAFER Newsletter, a compilation of security news, events, tool releases and whatnot from around the world.
Checkpoint to Port FW-1 and VPN-1 to Linux Nov 9, 1999
 
It's a bit old, but Checkpoint has announced that they're gonna port FW-1 and VPN-1 to Linux 2.2 kernel. Good news. Now if they'd only open source their software. ;)
Disrtibuted.net releases CSC and OGR clients Nov 9, 1999
 
After some serious waiting, Distributed.net has released a CSC and OGR client. So, if you weren't already cracking RC5-64 (or helping SETI find aliens) then go download a client and recycle that spare CPU time.
Trust-e? e-Cowards... Nov 9, 1999
 
A Trust-e seal of approval seems to indicate that you're not giving away customer credit cards on your homepage, not much else. They declined to investigate Real Networks' privacy violations of the last few weeks. They even changed their mission statement so they could get around having to explain themselves. Come on. In less than a month, Real has been responsible for the destruction of DVD encryption and a major privacy violation of millions of web users. If they still bare the Trust-e logo, then the logo doesn't mean a thing. Welcome to the world of commercial self-regulation.
Electronic eavesdropping is becoming mere child's play Nov 8, 1999
 
This is a kind of layman's story about Tempest. The interview with Ross Anderson is better. Anyway, the article points out how software radio will make van Eck phreaking a lot more accessible.

The New Scientist - SOFTWARE that allows a computer to receive radio signals could make spying on other computers all too simple, according to two scientists at the University of Cambridge. Such are the dangers that they are patenting countermeasures that computer manufacturers can take to foil any electronic eavesdroppers.

The BCF Cryptosystem explained Nov 8, 1999
 
Thanks to John Young for posting the inner-workings of BCF, an E-Commerce cryptosystem. What makes this really quite interesting is that it uses a giant (CD size) one time pad that is shared by all people who want to use this algorithm. Of course, you have to buy the CD from them "to maintain a high and uniform standard of security for BCF". My butt. It's to make sure they get paid. Anyhoo, it's a neat idea, but it smells like there may be some problems with it. We'll see how it stands up to peer review. Comments on this would be groovy.
Getting OpenSSH via Anonymous CVS Nov 8, 1999
 
Thanks to a TSG reader who sent in the following on how to get OpenSSH:

you can get openssh from via anonymous cvs:

mkdir openssh && cd openssh
CVSROOT=anoncvs@anoncvs.ca.openbsd.org:/cvs
CVS_RSH=/usr/bin/ssh
cvs get src/usr.bin/ssh

It should work fine under the *BSD's, and there's also a Linux port.
PGP 6.5.2 Freeware Released Nov 5, 1999
 
PGP 6.5.2 Freeware was released on Thursday. Mostly Windows 2000 enhancements, but it also features a mail-program auto-selector. Nothing major, unless you're running W2K.
Anatomy of a Web Attack Nov 5, 1999
 
I've gotta give CNN credit... their security coverage keeps getting better. They've got a story about how and why a recent hacking contest was won. "In our minds, the real measure of a secure OS is not how secure you can make an operating system, but how secure it is 90 percent of the time." Definately a more educated statement than I expected to see. Be sure to read the play by play. Very well written.
DVDemise Nov 4, 1999
 
I wasn't going to post this because it is strictly a piracy thing, but then I found out it was Real Networks who screwed up...

Why the DVD Hack Was a Cinch by Andy Patrizio

2:15 p.m. 2.Nov.1999 PST
The anonymous developers of the decryption program that removes DVD copy protection had an easy time doing it, thanks to a gaffe by a software developer and the surprising weakness of the encryption technology.

See also: DVD Piracy: It Can Be Done & Catch the buzz in Hollywood Tech

New Scientist interviews Ross Anderson Nov 4, 1999
 
Ross Anderson (of TEMPEST fame and AES frontrunner) is interviewed in this week's New Scientist. Compare it to last week's Slashdot interview with another AES front runner Bruce Schneier, and you'll see some big differences between two men that are shaping the face of computer security.
COPA 98: Judgement Day Nov 4, 1999
 
As a general rule of thumb, I think it's neat when a law gets overturned by a judge somewhere (shows the systems works). But when bad privacy laws get overturned, it's a beautiful thing. After a similar victory in New Mexico on Tuesday against a state law, the ACLU is going in front of a federal appeals court in Philadelphia today to try and strike down COPA 98. Wish them luck. Check out Wired for the whole story.
Network and Distributed System Security Symposium Announced Nov 3, 1999
 
The ISOC has announced the Seventh Annual Network and Distributed System Security Symposium in San Diego Feb 2-4. Among the topics: "Secure Border Gateway Protocol (S-BGP)" and "Secure Password-Based Protocols for TLS." ... *drooool*
BBC - Echelon Exists Nov 3, 1999
 
The BBC claims that Austrailia has admitted to Echelons existence. They also claim that the US listening post at Menwith Hill is part of the network. Not a lot of big surprising news here, but some hard facts, which until recently haven't been too wide spread.
Shop For Free this Holiday Season Nov 2, 1999
 
Thanks to an article in the San Fran Chronicle, millions of people can shop for free this holiday season. The article's main point is that shopping online is insecure. But the sploit of the week is hidden inside. Some websites shop using very dumb shopping cart engines. If you can change the cost of a product when you submit the final purchase request (via a home generated web page or the fetch utility on a UNIX box) some engines won't check to see if this final price differs from what it actually should be. I'll leave it as an exercise to the reader... Bottom line: you can get a lot of bang for your buck this Christmas.
Real Gets a Clue Nov 2, 1999
 
After justifying their data harvesting practices, Real Networks has given in to public pressure. "We respect and value the privacy of our users" the press release states. Erm... I think if they respected our privacy, they never would have done it in the first place. But at least they've admitted they did something wrong, which is more than some companies. Check out CNN for the national media's view.
Is it Real, or is it Real Networks? Nov 1, 1999
 
Wired has an article about Real Networks habit of sending demographic info back to them without you knowing. I thought it was bad enough that Real Player did this (it's a config option that checked by default), but now they're doing it without telling you or giving you an option to stop doing it... and they have the guts to justify this in national press. Makes me want to use MS's Media Player; That is if I actually used an MS OS for anything but gaming ;)
More Bernstein News Oct 29, 1999
 
The 9th circuit court has granted the DoJ's motion to push back the oral arguments until March 21, 2000 (first day of spring... symbolic? maybe...). Both sides are to file briefs 21 days after the DoJ's announcement of new crypto regs due out on Dec 15. Read the Bernstein-announce message from Cindy Cohn.
Garfinkel on Security Oct 29, 1999
 
Simson Garfinkel wrote an article for ZDTV *shudder* on the Philosophy of Security. In it, he explains the differences between how security is viewed from MS camps and UNIX camps... if the world were only as black and white as he's made it to be.
OpenSSH is out Oct 29, 1999
 
The guys at OpenBSD have released OpenSSH. It's hard to tell from the press release whether this is going to be viable only under OpenBSD or if it's been ported to other platforms. They claim it will be part of OpenBSD 2.6 (soon to be let loose). I can't currently find stand-alone OpenSSH on their site. If anyone has any info, let us know pls.
Tempest, van Eck phreaking, and High Tech Tinfoil Oct 28, 1999
 
There's been a lot of questions lately regarding Tempest, van Eck Phreaking, and what you, Joe Target, can do about it. TSG has started compiling a page of resources to help you make sense of all this. Happy reading, and be sure to check out the tempest-proof fonts.... very kewl.
Wow... more checks and balances Oct 28, 1999
 
CNN has an article about the FBI's new hi-tech push and the leash the Legislative branch has on it. groovy... Maybe the House and Senate aren't just pawns for the DoJ, FBI, and CIA... maybe.
Follow the money Oct 27, 1999
 
The Fed wants to start tracking currency. Not just for demographic info, like a corporation would want, but to deter fraud. How will they keep smugglers from carrying around suitcases of money, you ask? By taxing the bill based on how long it's been in circulation. Basically, if you hold on to a bill long enough, it's value will decay to nothingness. Check out this Wired article. Personally, I think it's a load of hooey. As a non-drug smuggling consumer, I'd be pretty pissed off if the $20 bill I found under my couch after 6 months was only worth a buck-fifty because of the carry tax. I'd also be pretty pissed off if the IRS noticed that I put more bills out of circulation last year then I removed from a banking institution and decided to audit me. Tracking bills in this nature is one step away from putting a radio transmitter in my head so the police know where I am. :P
TEMPEST: not just a Shakespeare play Oct 26, 1999
 
Obscure security info is _finally_ making a mainstream impact. For years security experts have known about TEMPEST and Electro-magnetic snooping... but not many folks outside the industry had even heard about it. Now Wired has an article about TEMPEST and it's unveiling. For more info, check out John Young's website and Phrack 44 File 10.
Site o' the day: Bert-Jaap Koops Crypto Law Survey Oct 25, 1999
 
A nice resource for links to crypto laws around the globe. He updates the site quarterly (or better) and has a mailling list. I really like the maps summarizing the rules of the road around the world. Check it out.
Bob Barr, I think the FBI is watching you now Oct 25, 1999
 
Bob Barr, a Republican House member from Georgia has spoken out against wiretapping the Internet. It's nice to see somebody from the hill on our side. Gives you a bit more faith in the system... a bit.
"Gagging Echelon" a flop (duh) Oct 22, 1999
 
Well, Wired has an article that started with good intentions... to explain how the "Gag Echelon" event was misguided. Unfortunately it ended up as a pro-crypto rant. First of all, I've alredy explained why I sincerely doubt that Echelon has found it's way onto the pulic IP universe (not the least of which is the push the IETF is getting from the FBI to develop eavesdropping protocols). But the big point is that when you talk about crypto and governments, you have to look at in a whole new light. Crypto is great, don't get me wrong. It'll stop your wife from seeing naked picks of your mistress, it'll stop your competetor from reading your business plan, but I doubt it will stop the government from finding out your subversive ways. The US Govt has more resources then most imagine. They have 1000's of people and billions of giga-FLOPS to throw at the "crypto problem". They allow us export strong crypto binaries now because they can crack the stuff that comes out. That's why they don't have to state how they decrypted information used in court. It may take them a while, but they'll get your secrets. Don't think crypto is _the_ answer, it's only part.... ... there, was that enough conspiracy theory for a Friday? ;)
TSG Presents: All the RFC's you can use Oct 21, 1999
 
In the eternal hunt to add groovy things to this site that have phenomenally complex back-ends and look really simple.. ;) We've added an RFC archive and search. Check it out.
DoC asks for more time in the Bernstein case Oct 20, 1999
 
The Man (aka: US Dept of Commerce) has asked to reschedule the upcoming oral arguements scheduled for December 16th. Their basis is the fact that the DoC is going to release new crypto regs on December 15th that may or may not have some impact on source code export. Check out EFF's copy of the motion. The Bernstein camp is expected to file a response by October 29th. Check out TSG's ever-growing Bernstein Resource and new Bernstein-announce archive for more info. And as always, we'll keep you posted.
Surprise! more WU-FTPD vulnerabilities Oct 20, 1999
 
As if CERT needed to tell you, WU-FTPD is chock full of holes. Doh!
More news and views on Internet Wiretapping Oct 19, 1999
 
Sorry that there haven't been any updates since Friday. I've been a bit under the weather. Better now, and should have some interesting upgrades to the site in the next few days. For now check out this article from CNN about the wiretapping debate. And if you haven't already, subscribe to the IETF's list.
The new Cryptogram is out! Oct 15, 1999
 
Read it. That is all.
Book Review Solaris Security Oct 13, 1999
 
I bought Solaris Security by Peter H. Gregory at my local bookseller. Slammed through it in a few hours, and figured I'd write a review. Any books you'd like to tell us about? Let me know.
It was bound to happen Oct 13, 1999
 
For those that know me, one of my biggest peeves about privacy and the government is the fact that since the 50's, every telco switch has been required by law to have wiretapping capabilities. Well, the FBI is now putting pressure on the IETF to make Internet traffic available government snoops. The the IETF is listening. I recommend subscribing to their list to stay abreast of current updates. We will of course be monitoring events as well, and will keep you posted. Check out this Wired article for more info.
A rant on Bernstein, strong crypto, and big money Oct 12, 1999
 
In a fit of idealism, I jotted down some thoughts on the Bernstein case. Nothing major, but you may find it interesting. Let me know.
How ISP's can be blamed for dumb users Oct 12, 1999
 
Look at me actually sticking up for AOL. Wired has a headline that reads "Password Thief Ransacks AOL....Critics says it's the latest in a pattern of neglect by AOL." If you actually read the story, you'll notice that what actually happened was someone socially engineered 1000's of users. A "hacker" sent them all a program that when executed sends back their passwords. Somehow the national media spins this to be a problem with AOL, not with the user. *sigh* Remember the days when you had to figure out trumpet winsock to get on the net? Remember how even the idiots were fairly smart?
Can attacked trees feel pain? Oct 11, 1999
 
Welp, I missed SANS '99 (no time/money to make the trip), but there's lots of good stuff on the web from it. The most interesting I've read so far is a PDF from Bruce Schneier of Counterpane Systems on "attack trees". Basically it's a way of hierarchically breaking apart a secure system when you want to mount an attack. Or when you want to figure out how to defend it. It's a powerpoint presentation, but it's still very complete. It's worth a browse.
Nobody knows who I am, right? Oct 11, 1999
 
Wired has an article about how people leak information all over the internet. The story is not a new one: those who surf the Net leave tracks.. like filling out forms to download this and that, browser info that gets sucked out of you every time you access a webpage, cookies that get set and examined all the time. What is new news is that big companies (read: Lucent) are starting to get in the game of protecting us from this information toilet. Nice in the respect that you don't have to use an anonymous proxy, fill out fake info on forms, and use remailers. Bad because you put your security fate in the hands of a non-opensourced, big-company piece of software. You choose.
COPA v 99.2 (aka "Do you own an ISP in Virginia") Oct 8, 1999
 
Damn the man! ;) The ACLU, PSINet and a handful of others are going after a Virginia law that prohibits the knowing display of information "harmful to junveniles" on the Net. Hasn't this been done before? (see COPA, CDA, CDAII...) They never seem to get it thru their heads. See CNN for details.
Gag Echelon? Gag me... Oct 6, 1999
 
Wired has an interesting article on an upcoming attempt to "overload" Echelon, the multinational super-secret spy network, by adding keywords to your sig. Don't get me wrong, I'm into conspiracy theories just like the next guy, and I have no doubts that Echelon does exist. But I doubt it's ability to snoop on the public internet. I've worked at a large, regional ISP, as well as seen and worked with a lot of the Internet core. There is too much data and too many access points to be effective. Echelon's ability to wiretap at a telco is limited to the switch (which has built in electronics just to listen to calls), but data lines such as T1's and OC'3 don't go through the switch. Local ISP's haven't been inflitrated by sniffers (at least not government ones), and the ability to physically sniff high speed fiber (faster than OC12) by means of a physical "vampire"-type tap is still in it's infancy. The bottom line: you're safe from the government online, but there are still a lot of other meanies out to get you.
Why SSL doesn't work for a transaction protocol Oct 6, 1999
 
Check out Security Portal for an interesting piece on the future of SSL. While not dead, it's application does look limited. It worked great as the Internet's first universal, secure protocol. Now evolution has demanded something greater. Hello TLS.
Site of the day - DFC Oct 6, 1999
 
The Digital Future Coalition (DFC for short) is an advocate group concerned with Copyright and privacy laws on the net. Very political, which I am personally not. But these guys have some great summaries of bills before the House and Senate so non-politcos like me can feel educated. Worth the bytes of admission. - Oct 7 1999
MAC address search Oct 5, 1999
 
TSG's MAC address search lets you find that little phisher who's blasting DHCP traffic across your network. Any suggestions on other tools? Please let us know.
Is Privacy Profitable? Oct 5, 1999
 
CNN has a story on how difficult it is to make money selling privacy software. Is software the wrong approach? Should it be service based instead? Or do people just not care enough about their privacy to actually do something about it. I tend to think that there is a great deal of education that needs to be done with the public at large before they realize that they need to protect themselves. "The net is vast and infinate" (Ghost in the Shell - 1993) seems to be the mantra we all live by. You may be one target out of billions, but you are still a target.
And the beat goes on... Oct 2, 1999
 
The 9th Circuit Court has granted an en blanc review and withdrawn the panel decision. This does not bode well. Check out EFF's Bernstein archive for more info.