|
|
| We Don't Hire Criminals... |
Sep 4, 2000 |
| grendel |
| Theres a really interesting article
over at SecurityFocus
regarding Mark "Phiber Optik" Abene. Mark as you may well know
has been a high profile hacker for years and years... He was
busted in '92 for hacking Telco computers (He served 10 months
jail time). He is currently heading up his own small security
company Crossbar
Security. He apparently recently was courted for
employment by The
Corporation Formerly Known as L0pht. As the article goes,
Mark was gingerly dismissed as a candidate for employment when
they "ran a background check". Regardless of your opinion on
the subject of hiring hackers, the article discusses
interesting trends in the hacker-gone-corporate world. Sorry
Mark, you probably wouldn't have liked working there
anyways.:) |
| SecurityPortal Interviews NTRU's Dan
Lieman |
Sep 4, 2000 |
| gdead |
| SecurityPortal has a
surprisingly technical interview
with NTRU's Dan Lieman. NTRU claims to have built a patented
public key cryptosystem that has low power and CPU
requirements. The cryptosystem, sold as the Tumbler toolkit,
uses a series of disposable keys which "reduce the risk of
power analysis, timing attacks, and the danger of security
breaches due to misplaced, lost, or intercepted keys."
There are potentially a lot of applications for a system like
this, but I think it needs a bit more of a trial by fire
before it starts to be accepted by the crypto community.
|
| Put Your Right Opt-in, Take your
Right Opt-out |
Sep 3, 2000 |
| gdead |
I hang out with many security minded folks. We
sit around and discuss privacy issues; carnivore is bad,
consumer profiling through banner ads it bad, Amazon turning
their customer list into a saleable asset is bad. When we get
bored of privacy, we'll turn to geekier things, like DVD's.
Instantly people pull up a listing of their collection from DVD Tracker, showing how
much their collection cost and how cool it is.
How is
sending ALL this demographic data to a company like DVD
Tracker less evil then having Doubleclick attempt to profile
you anonymously? The DVD Tracker data seems much more
valuable, yet consumers (nay, even security professionals) are
willing to give it all away without a second thought.
According to this Washington Post article
privacy is all about presentation. Consumers can't stand
opt-out programs, but seem more than willing to participate in
opt-in deals like DVD Tracker. No matter how you slice it,
it's still direct marketing and demographic data-snarfing that
helps the companies make more money and us to spend more.
|
| How to Squash New Technology |
Sep 2, 2000 |
| gdead |
The NY Times (login: cpunks/cpunks) explores
the the way new technology is dealt with in society. There are
many parallels between the introduction of the VCR in the
early 80's and the current DeCSS trials (both technologies
allowed for copying of copyrighted material). The reaction of
the media giants was the same in both cases: sue.
Unfortunately the courts are woefully unprepared to deal with
emerging technology. The Supreme Court had to learn the
intricacies of the "pause" button VCR case:
The court's uneasiness with the technical aspects of the
case was evident in its description of the device under
attack. "The pause button, when depressed," Justice John
Paul Stevens solemnly found, "deactivates the recorder until
it is released." History has indicated that the early
rounds of battles like the DVD battle will go to the giants
(ie: DVD-CCA), but in the end David (ie: DeCSS and its
supporters) will win out. Let's hope history holds true.
|
| Blaze and Bellovin on Carnivore
|
Sep 2, 2000 |
| gdead |
| Matt Blaze and Steve Bellovin, two heavyweights
in the security industry, have written an article
the on problems with Carnivore. Yeah, I know... "another
carnivore article." But this one is worth the read (both for
content and because Blaze and Bellovin are part of the Open Carnivore Group
who hopes to review the Carnivore source). This article has
been published in the October Communications of the
ACM, and it really dives to the heart of the issue without
ranting about "oppressive law enforcement" or other
big-brother commentary. |
| Amazon's Revised Privacy Policy a
Scam |
Sep 1, 2000 |
| pablos |
| Amazon has reworked its privacy policy to view
consumer data as a saleable asset. Check out CNN.
Supposedly this type of sale only happens if the company is
sold, but it sucks anyway. This kind of revision work further
dilutes the use of privacy policies. Sadly, it means we need
laws, strict German laws. We also need tools to protect our
privacy, and gunz
to protect our tools. We also need a way to buy books
anonymously. |
| Security Industry Food Chain |
Sep 1, 2000 |
| gdead |
Red Herring has a piece
on the conolidation of companies in the security industry. At
the heart of the article is the fact that doing "security
work" includes such a broad realm of disciplines (perimeter
security, application
security, audits, software development, anti-virus,
enterprise computing) that the little security firms have a
hard time competing. The smaller players in the field must
concentrate on one area of expertise and dominate it in order
to survive. This intense focus, however, makes those companies
"ripe for acquisition."
The author also claims that
"Verisign dominates the market"... Verisign owns Network Solutions. With a
captive audience of millions of domain holders, Verisign has
essentially been given a market through NSI's orginal DoD
contract. Now that's a food chain. |
| The Short(s) of It |
Aug 31, 2000 |
| curator |
| As quickly as it arrived, the now infamous Liberty.Crack
PalmOS trojan seems to have run it's course, leaving a bunch
of pundits to argue about the real risk it posed, the hype
it generated, and the future implications it poses. In similar
news is the possible DOS against Nokia cell phones that
support SMS (Short Message Service), that could cause them to
lock up for about a minute, unless the user reseats the
battery. Both instances seem to have been over-hyped, which is
somewhat understandable given the "firsts" effect. Whatever
the real ramifications of the individual instances, they do
serve to remind us, that in a world where Information is so
very important, anything that may hold, transmit, or analyze
that information is a potential target.
Someone
has produced a survey of 8,081 SSL-enabled web servers on
the Internet showing that 32% of them are either using 40-bit
encryption, or expired certificates. Given that kind of
rampant insecurity, it's not a wonder that the FTC blames the
Internet (seemingly rightly so) for giant
increases in identity fraud. |
| Biometrics: Ostensibly used to deter
fraud... |
Aug 30, 2000 |
| ktsolis |
New York recently started requiring electronic
fingerprints of welfare recipients and Medicaid applicants.
Since New York claimed success in reducing welfare fraud by
using biometrics, many other states followed in its path.
However, The New York Times cites
numerous studies where there is no strong evidence that
biometric fingerprinting has had a statistically significant
impact in preventing fraud.
Many people quoted in the
article question whether the prime reason for using biometrics
is to assure the public that welfare and Medicaid funds are
not being squandered. hmmm... |
| ARIN Makes Security Difficult |
Aug 30, 2000 |
| gdead |
ARIN (The
American Registry for Internet Numbers... the people who give
out IP address in North and South America) has a new policy
regarding named based virtual hosting. Up until now, companies
have been able to use IP based virtual hosting as a
justification for more addresses from there ISP or from ARIN.
ARIN, sensing the lack of IPv4 address space (which is a
joke... there is no shortage), will no longer accept IP based
hosting as justification for addresses. Web hosters must use
named based virtuals if they want more space.
ARIN
does make room for exceptions. The one exception that I assume
they know about is the fact that SSL does not work on named
based virtuals. SSL negotiation happens before the name of the
server is agreed upon. SSL based servers must be hosted on IP
based servers. While I'm sure ARIN groks this, documenting it
for your address request will be a pain in the butt and may
hurt the deployment of secure servers in the long run.
Another, and far more serious problem, is the ability to
control access to servers via router ACL's or firewall rules.
With named based virtuals, the only access control you have is
in the web server itself. By forcing hosting companies to move
to named base virtuals, ARIN has effectively removed 2 of the
most important network security tools at a web hosting
provider's disposal.
Slashdot now has an article
about this. |
| *more* on 'Hacking the Friendly
Skies' |
Aug 29, 2000 |
| ktsolis |
yes, there's more radio hacking of ATC-pilot
communications in London than in any other city, and things
seem to be getting worse. Which does not mean that we should
be very scared (well, at least for now): pilots communicate on
a predetermined
bank of frequencies over VHF. They are required to repeat
all Air Traffic Control instructions, so if a hacker tries to
spoof ATC, the spoof is caught when the pilot acks
instructions to ATC. Since the pilot has a direct radio line
of sight to the tower, it is difficult for the hacker to block
the signal without overtly jamming communications.
What I find more interesting is the datalink being
used by ATC. Air Traffic Control is using text communications
because 1) the ATC VHF band allotment is becoming clogged with
voice transmissions 2) it eliminates repetition due to
inaccurate voice transmission 3) it provides clearer
transmissions (requisite higher frequency communications
easily become distorted over oceans). I'm unsure what kind of
cryptographic protections are used to protect this datalink.
The datalink is supported by ACARS--for a cool link on ACARS,
click here
|
| Hacking the Friendly Skies |
Aug 29, 2000 |
| curator |
| Britain's version of the FAA, the Civil Aviation
Authority (CAA), has posted a general alert in it's safety
periodical, warning of the increase in incidents of air
traffice controller imposters. The number of incidents, while
only three in 1998, grew to 18 last year, and are already at
20 this year. The would be imposters are temporarily hijacking
air traffic controller frequencies, and attempting to give
pilots faulty instructions. To date, the CAA says none of the
attempts have been particular successful, as the imposters
usually don't use the right terminology, and any other errors
are generally found when the pilot reiterates the instructions
back to the tower. Officials do warn though, that given the
rapid increase in incidents, the possibility exists of a
serious accident.
Read
the full story over at ABCNews.
Note to self: When trying to hijack planes, don't start the
transmission off with "Hey, Dudes...how's it hangin' ?"
|
| Is it a Browser or a Virus? |
Aug 29, 2000 |
| gdead |
No, I'm not talking about IE. The author of the
Arachne browser (full
screen graphical browswer for DOS) had to recently refute
claims that his software is a virus. According to NewsBytes
(via ComputerUser), Arachne users have experienced massive
file deletion after installing the browser. The author
explains the problem as a conflict with the TEMP environment
variable. He assumes that if TEMP pre-exists, it points to
actual temporary space on the machine and he can treat it as
such (ie: delete all the files in it and treat it as cache).
Microsoft, however, ships DOS with TEMP pointing to C:\DOS...
definately not the scratch space the author intends. So when
an Arachne user installs the browser, their DOS directory gets
deleted.
I think he stole this idea from Microsoft. I
hear the next version of IE will delete your Netscape
directory at install time. ;) |
| CCTF Data Now Online |
Aug 29, 2000 |
| gdead |
| The wait is over. The DefCon Capture the Capture
the flag data is now online. The gzip'd
dataset is currently over 1.9GB, and may grow depending if we
can salvage data off another disk. If anyone would like to
mirror the data, please send me the URL so I can link to
it. Also, I'm hoping to set up a "Greatest Hits" section
containing the more interesting data for educational and humor
purposes. So if you find anything neat, drop me a line. What are you
waiting for? Get downloading. |
| First Palm Trojan Reported |
Aug 28, 2000 |
| gdead |
CNet reports
that the first ever trojan horse for a Palm has been
discovered. A trojan disguised as a cracked version of the
for-pay game "Liberty" has been circulating the Net for about
a week. The malicious program, once downloaded into the
device, attempts to delete all programs stored on the Palm.
The strange thing is that the trojan was written by the author
of Liberty. He claims it was an exercise in piracy control
that was "never supposed to be run outside of the workshop."
I'm not sure if that will stand up in a court of law.
Odd how this happened just a month after McAfee
released their Palm Pilot antivirus software. ;) |
| AOL's Public Dick |
Aug 28, 2000 |
| curator |
| There's an
article over at the Washington Post about a Loudon County,
Virginia, investigator who's sole job is dealing with AOL
search warrants. You see, since AOL moved to the county in
1996, there have been an increasing number of warrants from
around the nation requesting email and other account
information from the nationwide ISP. They've got a pretty
heinous geometric growth curve going, to the point that Ron
Horak's entire job now is to deal with the requests. Already
this year, they've had 245 queries.
While I'd like to link criminal tendencies to AOL usage, I
think this is probably indicative of the greater trend of
online-related crimes and law enforcement's familiarization
with the technologies. |
| MIT Releases PGP Freeware Patch for
ADK Vulnerability [Updated] |
Aug 26, 2000 |
| curator |
| For users of the freeware versions of PGP 6.5.x
(Windows 9x/NT/2000 and Mac OS only), MIT has posted an update
that fixes the additional decryption keys vulnerability
recently discovered that would allow a malicious individual to
intercept a PGP encrypted message an effectively add their key
to the list of decryption keys. Get the update
now while it's hot.
[Update] NAI has released hotfixes for its
commercial (Windows 9x/NT/2000 and Mac OS) PGP for Personal
Privacy software.
|
| NSI Loses .Com (again) [UPDATE]
|
Aug 25, 2000 |
| curator |
| There continue to be emails fired about in
response to NSI's temporary loss of the .COM tld on a few of
their servers a couple days ago. NSI has sent a further
technical description of the actual incident, and there have
been a few query/responses from readers of the NANOG list.
We've collected (and will continue to collect) the most
interesting messages for your perusal.
|
| More Missiles In the Open Source War
|
Aug 25, 2000 |
| curator |
| Peter Wayner has written an
essay on the "Open Source War" for the NY Times (requires free
account). It's an interesting article, though it an considered
preaching to the choir for TSG members, and probably our
readers. While I agree with the statement the author is trying
to make, he does seem to be a bit niave and confused at times.
For instance, he seems to equate the Napster and DeCSS with
the Open Source movement, and open source software with free
software in general. He also doesn't say anything about the
security issues involved in closed sourceness. There are a few
other things I disagree with, but in all, I agree with
sentiment and consider it a worthy read. |
| Yahoo Teams Up with ZixIt |
Aug 25, 2000 |
| gdead |
Yahoo and ZixIt (makers of encrypted
mail service ZixMail)
are teaming up to give Yahoo Mail users some privacy. The
terms of the agreement have not been released according to CNet.
Once the service starts up, all Yahoo Mail users users will be
able to send encrypted email through ZixIt's SecureDelivery.com
site.
What this new partnership really drives home is
how mainstream security and encryption are becoming. With
systems like Carnivore in the news everyday, and more
companies violating consumer privacy, Net users are
increasingly security savvy. Now that Yahoo is offering
encrypted mail service, you can bet HotMail and other free
mailers will as well. In a few years, it may be the norm that
more users send encrypted mail than those that don't. |
| Egg Bank Theft WAS Successful |
Aug 25, 2000 |
| gdead |
| It turns out the Egg Bank robbery was actually
successful. Initial reports
indicated hundreds of thousands of dollars were stolen. Then
Egg claimed
that no money was actually lost; it was only an
attempted robbery. Now it seems like Egg has changed
their story. The BBC reports
Egg admits to have tens of thousands of dollars stolen, but
through very typical, non-technical means. It seems that the
robbers attempted to get multiple loans and accounts using
fraudulent names and not by breaking Egg's Internet security
systems. Thanks to a TSG reader from the UK for keeping us
posted on this increasingly confusing story. |
| DOJ Releases Solicitation For
Carnivore Review |
Aug 24, 2000 |
| curator |
Earlier today, the Department of Justice
released it's guidelines for the independent contractor review
of the FBI's Carnivore
software. According to the executive summary, the selected
independent body will be charged with answering four major
questions:
- Assuming proper usage, will the Carnivore system provide
investigators with all the information, and only the
information, that it is designed and set to provide in
accordance with a given court order?
- Assuming proper usage, will use of the Carnivore system
introduce new, material risks of operational or security
impairment of an ISP's network?
- Does use of the Carnivore system introduce new, material
risks of the unauthorized acquisition, whether intentional
or unintentional, of electronic communication information by
(i) FBI personnel or (ii) persons other than FBI personnel?
- Are the protections built into the Carnivore system,
including both audit functions and operational procedures or
practices, commensurate with the level of the risks, if any,
identified in response to (3) above?
The deadline
for the response to the RFP is 06 September 2000, with the
draft technical report being due by 17 November 2000. The
selected contractor will prepare said report, which DOJ will
necessarily modify and censor the report for public release,
and is barred from leaking any information not expressly
allowed by directive of the DOJ.
Read the executive
summary, as well as the full
RFP. |
| But Do We Get Guns? |
Aug 24, 2000 |
| curator |
| At a conference
on national information infrastructure security, Richard
A. Clarke (the NSC's new hacking czar) stated, "By protecting
the IT security of your company, you can protect the security
of your country." Wow. No pressure folks. In addition to the
often stressful job of maintaining IT security for their
employing companies, security officers and admins are now
being drafted into a new civil defense force (woohoo). Citing
a number of multi-national hacks, as well as the two dozen
successful hacks against the Air Force last year, Clarke
warned that in war time, the country would have to worry about
being blackmailed or sabotaged electronically. Additionally,
security breeches at private companies are in danger of
creating "electronic Exxon Valdez." I can just imagine the
tragedy of seeing volunteers hand scrubbing dirty bits off
mice, and hosing off routers with high-pressure hot water
jets.
To aid in the coming battles, the government is asking
corporations to share security information, is looking at
sharing "sensitive" information with selected companies,
futzing with the Freedom of Information Act to make it more
attractive for companies and the government to share such info
(danger, will robinson... danger), as well as dropping a few
bucks on IT research in unprofitable areas (what would those
be?).
No word on how they're planning to stop attacks on their
own infrastructure though. Try as we might, nothing shmoo.com
is likely to do will keep USAF sites from getting hacked. But
at least it's a start. |
| Possible PGP Flaw Discovered? |
Aug 24, 2000 |
| rodney |
There's buzz around on the 'net that someone has
found a flaw in PGP, where ADK subpackets can be transmitted
unsigned. Translation: someone can take a PGP message, hack it
by adding an unsigned (and therefore unauthenticated) key
recovery option, and send it to an unsuspecting victim. Check
your usual sources if you want to follow up on this. Just a
rumor at this point, but it looks like a sound concern at
first blush, and such things should not be ignored.
UPDATE: The Shmoo has been told by sources inside PGP
that they ARE aware of the problem. You'll find no information
on their web site because
they are working the issue and dealing with things in a
responsible customer support kind of manner. Wait until later
today to look for updated information. Check out the discussion of
the flaw on Cryptome or
the paper
that discusses the flaw. |
| New DVD Content Protection System on
Horizon |
Aug 24, 2000 |
| gdead |
Wired reports
on the future of DVD copy protection: watermarking.
Watermarking is currently being deployed in DVD audio and
should make it into DVD video in the near future. The problem
with it's deployment is two competing groups of industry
"leaders" can't agree on whose standard to use. And their fear
is that the longer they wait, the more non-watermark aware DVD
recorders will be sold. These DVD recorders will be able to
copy watermarked DVDs while the newer ones won't. With a 12
month deployment cycle, it seems that if they wait much
longer, they might as well not do it.
When will these
people learn that no matter what mechanism they deploy to
protect DVD's, someone will break it. And now the industry is
at the point where they have to be backwards compatible with
previous players. Solutions to the copy protection problem
will only be a patch with limited chance of success. |
| NSI Loses .Com (again) |
Aug 23, 2000 |
| gdead |
This is almost a repeat of a story
from a couple weeks ago. I'll let the message from the NANOG speak for itself:
From: owner-nanog@merit.edu
on behalf of Verd, Brad [bverd@netsol.com] Sent:
Wednesday, August 23, 2000 4:19 PM To: 'nanog@merit.edu'
Subject: ROOT SERVERS ***Important Message Please Read***
This evening it was brought to the attention of the
Network Solutions Registry that four of the thirteen root
servers were not responding with the NS Set for the COM zone's
name servers. The root servers in question were not
responsible for the com zone, but in normal operation they
would point to the com zone's name servers as a redirect.
B.root, j.root, g.root and m.root were the servers in
question.
Read the
rest... |
| New U.S. law (HR 3886) might require
banks to invade the privacy of customers. |
Aug 23, 2000 |
| dustin |
| The International Counter-Money Laundering and
Foreign Anticorruption Act of 2000 (HR 3886). The bill,
sponsored by Rep. James Leach (R-IA), chairman of the House
Banking Committee, passed that panel on June 8 and is headed
for a full House vote in September.
According to a Libertarian Party press release "Banks would
[be] required to develop customer profiles and report any
'unusual activity' such as large cash deposits or withdrawals
to the government -- in effect turning every bank teller into
an informer and everyone with a bank account into a criminal
suspect."
The Liberterians are often a little melodramtic, but this
bears looking into. Incedently U.S. banks would be affected
since any of thier customers is potentially in league with
Foreign Devil(TM) money launderers. |
| Thousands Stolen from Egg Bank (Not!)
|
Aug 23, 2000 |
| gdead |
The Independent reports
that "several hundreds of thousands" of pounds (potentially 1
million USD) has been stolen from Egg Bank in the UK. Egg is a
purely electronic bank where all transactions occur over the
Net or on the phone. The real kicker is the theft is said to
be part of an organised crime ring. Three suspects have been
arrested and are currently being questioned. Egg has had a
history of security problems, including one incident several
months ago where cleartext account passwords were being mailed
to customers.
Update: Egg claims no
money was actually stolen.
Thanks to a TSG reader
who let us know that there was actually no money stolen from
Egg. It seems The Independent is a fairly sensationalist rag.
Check out this BBC
story for a better idea of what happened. |
| Defeating Online Extortion |
Aug 22, 2000 |
| curator |
| Business
Week has article on one of an increasing number of cases
of extortion aimed at the information and information
infrastructures of online businesses. The case in point is
that of media company Bloomberg and their recent run-in with a
couple thugs. Seems the two alleged criminals decided that
since they'd supposedly compromised the Bloomberg network,
they'd be happy to share how they did it with the Bloomberg
executives for a measly $200,000. Rather than give in to the
wouldbe extortionists, the CEO and his executives were able
dupe them into meeting a couple London police agents as part
of the "negotiations".
This case, and a couple other examples in the article,
epitomize the best tactics corporations are taking to combat
this kind of terrorism. As stated in the article, dealing with
this kind of extortion is quite similar to ye olde "thug and
mortar" kidnapping and extortion.
The odd thing is that few of said attacks are publicized,
whatever the outcome. The Bloomberg incident ended well, and
their tact was atypical in that they let everybody know what
happened. Visa did the same, and may have lost customers. As
long as customers react poorly to these invasions, even when
they're handled properly, it won't be surprising that
companies are less than forthcoming. In the end, the article
rightfully makes the statement that keeping such attacks
secret only reinforces some peoples' views that no one ever
gets caught, or that no one else has survived them, or even
that there's no strategy for handling them. |
| Dow Fires Employees for Offensive
Email |
Aug 22, 2000 |
| gdead |
| In what some are calling a "witch hunt", Dow
Chemical is firing employees for sending offensive email
through their corporate account. The AP (through CNet) reports
that in addition to the 50 employees fired in July, another 40
will be getting the axe this week. While some employees "did
not take [the email policy against offensive mail] seriously",
others claim to have been unaware. This brings up the critical
point that employers must go out of their way to inform
employees about IT policies (that is, assuming they have one).
If not, an employee can come back at the employer for wrongful
termination, leading to all kinds of legal and PR problems. So
if you have policies and noone in your company knows about
them either a) don't enforce them or b) call a meeting ASAP to
fill everyone in. |
| Hacker Olympics? |
Aug 22, 2000 |
| gdead |
| What goes around, comes around. The Olympics aren't
very Net friendly, and according to an article on The Age the Net
may not be friendly to the Olympics. The International
Olympic Committee, IBM, various security companies, and the
country of Austrailia are working together in an attempt to
secure the Sydney2000
website. Unlike the Olympics, the website is not "assuming
goodwill" from it's visitors. There are no details about how
the site is secured, but given the amount of horsepower IBM
puts behind it, you can bet that they'll have some big iron in
front of it. And if they successfully defend the site, it will
be great marketing fodder... like IBM needs more money or
something. |
| Where's That Pencil Sharpener |
Aug 21, 2000 |
| curator |
| Usability and price often dictate the winners of
many battles in the IT industry. We've seen it in operating
systems, web browsers and palm devices. There are doubtless
more examples of where ease of use, and a lower price have
caused a technically inferior product to defeat a technically
superior (and generally more complicated and almost always
more expensive) product. An article
on ZDNet today, says this is beginning to happen in the
world of PKI.
Read
on... |
| Herbivores Unite! |
Aug 21, 2000 |
| curator |
| In response to statements from the Justice
Department that they would put the FBI's Carnivore
software to independent review, a group of security
experts have banded together to form the OpenCarnivore group.
The group is attempting to get the Justice Department to add
them to the list of independent testers. As reported in a Wired
article the Justice Department may not be paying them any
particular attention, and it remains to be seen whether the
government will take them up on the offer. As part of their
offer, OpenCarnivore has agreed that they wouldn't release the
code, nor would they release who wrote the potentially evil
software. OpenCarnivore is currently working internally on a
document to be forwarded to the Justice Department in hopes of
getting the process and review started.
Beyond the attempt to be one of the independent testing
groups, the members (which include Mudge, Matt Blaze, Wietse
Venema, David Wagner, and several other industry notables)
have put together a good site that is, as it says, "a source
of factual information and informed opinion about the FBI's
Carnivore software. " |
| Xerox: Free Riding on Gnutella
|
Aug 21, 2000 |
| gdead |
| NYTimes (login: cypherpunks/cypherpunks I
believe) has an article
discussing recent research from Xerox regarding the give and
take of filesharing. The Xerox paper entitled Free
Riding on Gnutella provides an "extensive analysis of
user traffic on Gnutella." The findings aren't all that
surprising: 15% of the computers on the Gnutella network
account for 95% of the shared files, and 70% of all hosts
don't share any files at all (damn leeches). Of course the
Xerox guys call this phenomenon "The Tragedy of the Digital
Commons." Won't RAH
be proud. ;) |
| Internet Privacy Survey Released
|
Aug 21, 2000 |
| gdead |
| The Pew
Internet and American Life Project has released a survey
of privacy concerns on the Net. Some rather shocking numbers
come out of the survey. According to a sampling of 2,117
folks, 10 percent of Net users block cookies and 5 percent use
software "designed to permit anonymous surfing." These numbers
seem awfully high. I work with a group of
privacy professionals, and I doubt that 5% of them uses
anonymizing software or that 10 percent of them block cookies.
However, 2,117 Americans can't be wrong, I guess... CNet has
the full
story. |
| Analysis of the DeCSS ruling |
Aug 20, 2000 |
| dustin
|
| I just read the opinion on the case by judge
Lewis A. Kaplan. It is disappointing to see the "little guy"
(2600) lose and the "big guy" (MPAA) win. However, it is my
opinion that the judge made a reasonable descision in the
case. He evokes the question, "What if this had been a
computer virus?" In that case our sympathies for the
defendants evaporate and we would plainly be rooting for the
other side. With this thought to help balance my frame of
mind, I read the opinion. I believe that based on the
current laws, he has interpreted the case in the only way
possible and explained his reasoning in a clear and persuasive
manner.
Read
More... |
| More on In-Q-Tel |
Aug 19, 2000 |
| gdead |
| CNN has more
info on the CIA venture capital division, In-Q-Tel. To date, over
300 different businesses have pitched to In-Q-Tel and only 8
have been funded. Of course, with only USD28 million in
backing (taxpayer money) they have to be selective lest they
run out of cash too soon. |
| The Standard Interviews Theo de Raadt
|
Aug 18, 2000 |
| gdead |
| The
Standard has a great interview
with OpenBSD guru Theo de Raadt. He discusses how OpenBSD came
to be, what's wrong with most "audits" of OSS, and OpenBSD's
overall goals. The article also states that the DoJ has over
260 copies of OpenBSD installed in their network. The DoJ's
choice to use OSS is impressive, especially since closed
source products like Trusted Solaris tout themselves as being
secure and don't have the "full disclosure of source code" as
a potential problem. |
| Judge Rules for MPAA in DeCSS Case
|
Aug 17, 2000 |
| gdead |
| The Ruling
has arrived, and it is bad. Judge Kaplan ruled against 2600 on
all accounts. QOTD from the Judge: "[The Constitution] is not
a suicide pact." Ouch... Wired has a story,
Slashdot has a few of them (discussion
and questions
for the EFF lawyers). Try and read the ruling
if you get the chance. It's very well written and will help
everyone figure out where to go from here. |
| Secure IOS Configuration |
Aug 17, 2000 |
| gdead |
| Working with routers is a black art in many
respects. Much of the know-how and best practices are passed
along via word of mouth or on lists like NANOG. Over the years you
learn a lot of neat tricks and they get copied from config to
config as your bring up new routers or change jobs. However,
there are very few references on how you should configure a
router securely. Most of what I've done in the past is a
combination of common sense and some words of advice from
gurus. Rob Thomas has released a Secure
IOS Template to help people start with a baseline,
moderately secure configuration. There's lots of good stuff
here including using tcp intercept and CEF reverse path to
minimize (D)Dos attacks. |
| Security Implications of AOL for
Linux Leak |
Aug 17, 2000 |
| gdead |
| The Washington Post has
a piece
on AOL's leak of their Linux client "Gamera."
AOL has two fears about the leak; That the unauthorized
software release is indicative of AOL's overall security, and
that reverse engineering this pre-alpha software will give
away parts of AOL's security architecture. The first issue is
simply a matter of PR. AOL has already released a statement
that claims their customer data is still safe. The second is a
larger problem, and will require some reactionary measures on
AOL's part. Since this was pre-release software, it is assumed
there is code that Shouldn't Be There. AOL must now find out
what secrets can potentially be learned from agressive reverse
engineering and the find a way to minimize the impact of
attacks based on that knowledge. Sounds like a fun day in
AOL's security division. |
| Analysis of Firewall-1 |
Aug 17, 2000 |
| gdead |
| I deployed and used Checkpoint's Firewall-1
for a couple of years. I unfortunately never had a chance to
dive into it and try and break it. Dug Song, Thomas Lopatic,
and John McDonald did, and they posted
their results to Bugtraq. They
outline attacks against FW1's S/Key implementation, problems
with the stateful inspection FW1 employs, and lots of other
goodies. This is an excellent write-up and a great example of
an in-depth security analysis. |
| To Fully Disclose or Not? |
Aug 17, 2000 |
| gdead |
| Marcus Ranum gave a speech at Black Hat this
year that is still causing a stir. He publicly announced that
he was not in favor of full disclosure security. Ranum claimed
it caused more harm than good... a controversial stand to take
at a conference such as Black Hat. Weld Pond (special to
ZDNet) offers a counterpoint
to Ranum's arguement. Weld Pond claims that without full
disclosure, the public would never become informed of security
problems. This would lead to a dangerous situation where a
few, highly talented hackers would cause far more damage than
the current breed of script kiddies could ever do. Personally,
I think full disclosure is here to stay... it's human nature.
The best we can do is try and impose some ethics on the people
finding the vulnerablities to make sure they notify vendors
first and the public second. |
| Kurt Cobain's Ghost Hacks into UK
Computer |
Aug 16, 2000 |
| gdead |
| Man, do I love The Register. They're
a great balance of the technical and the fringe. They just put
up a story
of UK bar manager whose computer was possessed by the ghost of
Kurt Cobain. Apparently after she turned her computer off, an
image of Kurt appeared and pleaded for her help (and a kiss
goodbye). She then turned the computer back on, performed a
virus check (none were found) and had the computer exorcised.
I wonder if Lloyd's of London/Counterpane
offer insurance against supernatural hackers? |
| Linux degenerates into the mainstream
|
Aug 16, 2000 |
| rodney
|
| This week LinuxWorld
(http://www.linuxworldexpo.com) descended into San Jose,
California. I guess I expected to see, well, a bunch of Linux
merchants and related commerical displays. I was surprised and
rather annoyed at what was actually there.
It seems that Linux has gone mainstream, in terms of
marketing. Think DefCon meets Madison Avenue. You pay $25 for
an exhibit pass, if you don't have a complementary ticket.
Even if you pay, you are forced to answer several excessively
private questions before the admission shock troops will
release your id badge. You walk onto the show floor, and it's
a classic "mine is bigger than yours" arrangement of booths. A
booth worker in a green lizard suit becons you into the SuSe
booth. The noise level is deafening, not from music, or people
chatting, but from a blizzard of barkers giving gratuitous
lectures at 60 by 60 booths, to seated throngs of catatonic
show attendees, presumably who are patiently sleeping through
the presentation to get the free T-Shirt.
I start an organized search of the show floor, looking for
the interesting exhibits. Usually this means going to the
small, 10 by 10 booths, that are typically occupied by
startups. There are very few of these, jammed against two
edges of the floor. A woman wearing essentially nothing but a
fishnet bathing suit and a skillfully printed array of Caldera
logos stolls past, as I think about whether I should stare or
not, the marketing flack in the standard logowear buttondown
shirt next to her gives me a cold look. I wish they'd make up
their mind if I should be ashamed of looking at the girl or be
ashamed of thinking about ever purchasing the product.
Eventually I work my way across the floor. This is a
surreal mix of arcane high geekdom and raw crass marketing.
There are grey-bearded techies walking around in t-shirts and
socks and sandals. There are kids, probably high-school age
hackers, milling about with bags full of skillfully obtained
free distribution CD's. There are young innocent looking
mainstream professionals wandering around wearing these silly
red devil horns that have been carpet bombed across the entire
show floor by the BSD folks. Apparently that's not enough to
get your attention, they also have the BSD red Demon, another
booth worker in a gorilla suit, walking the floor accompanied
by a woman in a skimpy red jumpsuit that almost contains her
cleavage.
I try talking to some folks in one of the booths. They are
booth workers, with the normal booth worker skills and faults
(I _hate_ booth works who ignore me when I patiently stand and
wait to ask a question.) They try to tell me theirs is the
coolest O/S on the show floor, but instead of telling me how
good the device driver documentation is (read the source,
dude!) or how reliable it is on several different notebook
configurations, they try to convince me that their lead
amateur's undocumented ad hoc shell script-based packet
insertion kludge is better than Red Hat. I point out I'm the
customer and this is not impressing me, and they proudly point
out they aren't trying to sell me anything as it's open
source.
Oh well, Red Hat may suck, but the competion in the
Unix/Linux/thingie-ix/*bsd*.* space isn't clearly better,
regardless of the number of marketing suits or booth chickies
they hire. |
| Wiretapping Give and Take |
Aug 16, 2000 |
| gdead |
| According to a CNet article,
a federal judge has struck down many controversial provisions
in the Communications Assistance for Law Enforcement Act
(CALEA). CALEA has been hotly debated for years and has proven
hard to implement due to the speed at which telecommunication
technology has advanced over the last decade. The judge
scratched out the section that allowed law enforcement to
intercept digits that were dialed after a call had been placed
(think "creditcard numbers"). However, he upheld the FCC
stance that packet switched data could legally have the
payload and addressing information separated without violating
the suspect's privacy. The judge also left in the clause that
requires cell phone companies to provide law enforcement with
the cellular antenna a targeted phone is using. This allows
law enforcement to track a suspect as they move from cell to
cell. The DC Circuit Court has a full
copy of the opinion. |
| Apache-ssl World Writable Webserver
|
Aug 16, 2000 |
| gdead |
Trustix posted an advisory
about their apache-ssl server to Bugtraq
yesterday. Security advisories are a serious issue. But in the
day of competing
stack protection methods and other highly complex security
issues, this one was amusingly simple:
From: Bugtraq List
[mailto:BUGTRAQ@SECURITYFOCUS.COM]On Behalf Of Oystein Viggen
Sent: Tuesday, August 15, 2000 2:57 AM Subject:
Trustix security advisory - apache-ssl
Hi
Due
to a typo in the rpm spec file for apache-ssl,
/usr/sbin/httpsd on a Trustix system will be installed with
mode 756 instead of 755, making a binary file that will be run
by root world writable. It should not be necessary to explain
why this is an extremely bad thing.
[... info on patch
location ....]
I'll go stand in a corner with a brown
paperbag over my head now...
Humbly,
Oystein
At least it's an easy fix. |
| Crypto Law Survey Updated |
Aug 15, 2000 |
| gdead |
| Bert-Jaap Koops keeps track of crypto laws
across the world on his Crypto
Law Survey. You can lookup laws that govern specific
countries or get an overall picture of how friendly the world
is toward encryption (especially interesting is the graphical
summary of import and export controls). He just finished
his quarterly update so stop by and take a look. BTW:
Bert-Jaap and his partner, Simone van der Hof, are looking for
ideas on how to make the CLS more user friendly. Visit the
page and drop
them line. I think an alternate listing based on date
rather than country (or in addition to?) would be useful.
|
| Primes and Parties in September
|
Aug 15, 2000 |
| rodney |
| The RSA patent expires in September. (Exactly
when? See our assertion, tell us if you think we're wrong...)
We've started gathering information on parties. Visit the RSA
Party Planner page for
more information. And send us info if you're planning a party.
Remember: no large prime numbered arithmetic before driving.
|
| Cryptogram and Bruce's New Book
|
Aug 15, 2000 |
| gdead |
Counterpane's July
Cryptogram is out and ready for your enjoyment. Bruce
Schneier discusses Bluetooth, the SANS "most dangerous flaw"
debacle, and lots of reader mail. He also announces his
new book, Secrets and Lies
- Digital Security in a Networked World. To quote
the author - "[Secrets and Lies] discusses the process of
security: what the threats are, who the attackers are, and how
to live in their world." TSG should be getting a copy of the
book soon. Stay tuned for a review.
I find it amusing
that the security world always refers to Bruce Schneier simply
as "Bruce". He is THE Bruce of the security world. While I as
at DefCon, a reporter walked up to me and asked "Is your name
Bruce?" I said yes (because it is) and he immediately starts
asking me a pile of crypto questions. After a few seconds of
confusion, I realized he was looking for Bruce Schneier
ie: THE Bruce, not A Bruce like me. I pointed him across the
room and sent him towards his real target. The only physical
trait we have in common is really long hair. I imagine that
was all the description the reporter was given before he
started his hunt. It's OK... I don't like reporters anyway.
|
| Training the Preschool Hacker |
Aug 15, 2000 |
| gdead |
Wired has an article
on computer use in preschoolers. I have a preschooler myself,
and this is something I've thought a lot about. On one side of
the coin, you have experts saying that computers help children
develop critical thinking skills as well as learning the
"basics" such as numbers and letters. On the flip side,
opponents will claim that computers make a child antisocial
and can stunt their intellectual growth. I think the answer is
somewhere in the middle... moderated, interactive exposure to
computers can really help a young child out.
How is
this security related? ;) Well, some would say the hackerdom
is an extention of childhood curiosity. Hackers share many
traits with a developing child (this is not meant to be
derogatory); The desire to learn more about your environment
as it expands from the crib, to your house, to your school, to
cyberspace. Now that the next generation is growing up with
computers in their crib with them, how does this affect the
hacker culture. My son will be computer literate by age 4.
Once that happens, how do I control his natural and tenacious
curiosity? Do even attempt to control it? He (and others of
his generation) will have more technical knowledge by the time
he's 14 than most IT workers will have in their life. However,
he will have the social and ethical development of a 14 year
old. Will this next generation re-define "hacker" and bring it
completely mainstream? Or will his generation be exploited for
knowledge and work by an older, more corporate world. Check
back in a decade and I'll tell you. |
| Trojans, Personal Firewalls, and Why
You Should (tcp) Wrap Everything |
Aug 14, 2000 |
| gdead |
| I'm not much on posting articles that are
reviews of products, but this one has a point. I have always
been a big fan of securing every host on your network,
regardless if it lives behind a common firewall. At one of my
last jobs, we firewalled
and TCPwrapped every host; servers and workstations alike. On
top of that, we had a firewall protecting the network at
large. Why? Because one of the biggest threats we had to gaurd
against was the threat from within the company. 3l33t tech
support workers trying to hack into your workstation late at
nite, or some angry accounting person attempting to delete the
fileserver. Most of the security problems we had were with
employees, not outside attackers. Network Computing
has an article
on the threat from within, as well as a review of 8 or 9
personal use firewalls/IDS. Since we all can't be fortunate
enough to run FreeBSD ;) most of the solutions provided are
Windows-centric. BTW: Please note that the story is dated
"August 21, 2000"... mmm... shmoo-y time warp again. |
| Verizon Woes Never End |
Aug 14, 2000 |
| gdead |
| Verizon (formally Bell Atlantic et al) has been
fighting a strike
for the last 9 days. To top it off, SecurityFocus reports
that a newly deployed customer service app was leaking
personal information. The app, which allows users to file
trouble tickets with Verizon, sent things like addresses and
contact information to the end browser in the scope of a
javascript. While the information wasn't displayed directly to
the page, all you need to do is view the source in order to
see the offending javascript variables. A malicious user could
enter any Verizon customer's phone number and get all their
personal information back in return. Doh... |
| Safeway Email Hoax |
Aug 14, 2000 |
| gdead |
| It seems that Safeway (the UK supermarket chain,
which is now independent of the US "Safeway") had a hoax
email sent to 1000's of customers. According to CNet,
the email originated from a Safeway internal server,
indicating that there was some kind of security breach.
Safeway sent an apology email to all their customers
indicating that they are "confident that the no personal
information was accessed" (Isn't email "personal
information"?). The amusing part of this whole thing is the
content of the hoax email. It wasn't filled with 3l33t speak
from a h4x0r claiming to have 0wn3d j00. The mail stated that
Safeway would be raising all it's prices 25%. Customers were
then instructed to "piss off" if they didn't like it, and go
to another supermarket chain. Subtle misinformation is worse
than defacement any day. |
| Surveillance Counter Measures For
Dummies |
Aug 13, 2000 |
| gdead |
| Thanks to a Shmoo reader for sending it a link
to the Granite Island
Group, a company that specializes in surveillance counter
measures. Their site contains just about everything you
need to know about how bugs work and how to detect them. You
must have at least some EE/SigProc background to understand
the technical stuff, but the paranoia should be attainable by
all. These guys rank right up there with MECO, a supplier of all things
fringe. |
| More Fun than I can Stand |
Aug 12, 2000 |
| gdead |
| Due to things way beyond my control, TSG's
servers went through an emergency re-location today. We had
about 2 hours of downtime during the move, but all seems well
now (a big thanks to cowboym for helping out).
If you notice anything funny (mail bouncing, high latency,
etc) please let us
know. Thanks. |
| The Crypto World is On Fire |
Aug 11, 2000 |
| gdead |
As my crypto friend Yoshi remarked, "The crypto
world is on fire [baby, yeah!]". August is conference month
for crypto-geeks. USENIX
Security in Boulder Aug 14-17th, the Workshop on
Cryptographic Hardware and Embedded Systems (CHES) in
Worcester, MA Aug 17-18th, and Crypto
2000 in Santa Barbara Aug 20-24th. I hope to go to CHES
and report back on interesting goings on. If any Shmoo readers
go to USENIX or Crypto 2k and want to tell everyone about it,
let me know.
On
other, more technical fronts, Yoshi pointed me to an
interesting paper - Improved
Cryptanalysis of Rijndael. Rijndael is one of the AES
canidates, and this paper discusses various reduced round
attacks. Interesting stuff, if you're into this kind of thing.
|
| Carnivore Poster Child? |
Aug 11, 2000 |
| gdead |
| CNN reports
that the FBI has given the go-ahead on NTT's purchase of Verio, a large web hosting
firm. After NTT's initial purchase offer in May, the FBI
entered a period of "intense negotiations" with the Japanese
telco. The FBI was concerned with the ability to perform
surveillance on Verio's network once NTT gains control.
Apparently NTT and the FBI have struck a handshake deal, and
the formal terms of the agreement are still being worked out.
I doubt the agreement will have pre-deployed Carnivore boxes
at every router, but you never know. ;) |
| 125K Smurf Amps Can't be Wrong
|
Aug 10, 2000 |
| gdead |
| PullThePlug.Com is at
it again. As a follow-up to their January "survey" of smurf
amps on the Net, they've done a more
comprehensive scan. More networks were probed, but less
smurf amps were found. This is A Good Thing. What really
surprises me is that only 21 networks responded with more than
256 packets per echo request. A few years ago I could name 20
networks off the top of my head that would send back more than
a 1000 packets at a shot. The overall message PullThePlug is
trying to get out is, basically, things are getting better but
we have a long way to go. Securityfocus has more
on the story. |
| Bad Kitty & the Shmoo |
Aug 10, 2000 |
| pablos |
The Shmoo Group went to
DEF CON and made lots of
new friends. Check out Bad Kitty in our
T-Shirt, the first known pr0n type artistic use of our shirt.
|
| We feel a disturbance in the
(anonymous) force, luke... |
Aug 10, 2000 |
| rodney |
| Recently, four Mixmaster
remailers have dropped offline. One died from RIP (English
government Internet Brain Syndrome); one died from
quasi-religious harassment; one died from ISP exhaustion, and
I can't figure out why the fourth died. The good news is, at
least four new ones have popped up. It appears the natural
order of things in the Universe is for there to be
approximately 12 working Mixmaster remailers. Thanks to Noise
(see DefCon speaker list) and others for this information.
|
| Lost: One Dell Laptop. Reward if
Found! |
Aug 10, 2000 |
| gdead |
| According to AFP, the State Department is now offering
a USD 25,000 reward for one of their missing laptops. Not
only that, but they are distributing what amounts to "lost
dog" fliers to pawn shops and computer stores around the
nation. The fliers provide this description - "a black Dell
laptop with a five-digit serial number ending in the letter
'Q' located on a sticker in the back near the ports." If
you've got a black Dell that matches this description and is
NOT state department property, hide it. Someone may steal it
in an attempt to get free money ;) In all seriousness, this
seems insane. The State Department is going through an awful
lot of work to find one laptop... It's been in the wild so
long, I cannot imagine why they'd want it back. It's either
been buried by the person who stole it, or the data has long
since been copied and stored. I would assume their motivation
is to actually find out how and why it was stolen and not
actually to get the laptop back. |
| General Purpose Stack Protection
|
Aug 9, 2000 |
| gdead |
In my current job I spend a lot of time
dealing with software security... in particular I end up in
"watercooler" discussions about how to protect data on the
stack from being smashed. This is an area of research that has
come a long way in the last few years, and it's finally
resulting in pratical solutions that apply to more than just
Linux on x86. Today an article
came across Bugtraq from the
boyz at IBM's Tokyo Research Lab about general purpose stack
protection. The article attempts to compare several techniques
of stack protection, including libsafe and StackGaurd against
IBM's new ProPolice. Depending on your environment, and what
you're trying to protect, the IBM solution appears to be
pretty slick. The authors of ProPolice are attempting to get
their stack protection code added to gcc. Go OSS!
Until stack
protection gets implmented into gcc
however, the burden is on the software developer to write
secure code. Check out TSG's SecureCode section
to learn how.
Update: John Viega and Tim Hollebeek's
followup.
|
| Visa Raises the Bar |
Aug 9, 2000 |
| gdead |
| In an attempt to reduce credit card fraud and
increase customer confidence in e-commerce, Visa has announced
new policies for online merchants. These new rules aren't
exactly rocket science (not like deploying a SET CA), but they
are a step in the right direction. The rules include running a
firewall in front of a host that accepts credit cards,
encrypting sensitive information on the wire, and using
anti-virus software. Visa intends to announce detailed plans
in the next few months and is pushing for worldwide adherence
within a year. |
| EFF's DeCSS Post Trial Brief |
Aug 9, 2000 |
| gdead |
The EFF has posted their Post-Trial
Memorandom of Law in the MPAA v. 2600 case. The
document summarizes EFF's position and goes so far as to call
the DMCA unconstitutional. It also attempts to refute the
precedents set forth by the MPAA. I'm not a lawyer, but given
the Judge's closing
comments and the strength of the EFF's case, I'd say
things look promising. I haven't been able to track down the
MPAA post trial brief... if anyone knows where it is, please
let me know.
Update: Slashdot now has a thread
on the brief. |
| TEMPEST Goes Mainstream |
Aug 8, 2000 |
| gdead |
| ZDNet has a fairly comprehensive article
on van Eck
Phreaking and TEMPEST. It's basically starts out as
Intercepting RF for Dummies but really covers all the
bases. They even mention the BEMA EM-shielded tents; the tent
comes in 3 suitcases and can be erected inside of a hotel
room. *poof* Instant protection from the black helicopters in
stealth mode pointing big antennas. For more in-depth info on
van Eck and TEMPEST, check out the Shmoo TEMPEST pages
and the stuff
over at Cryptome |
| All New Episode of "Dumb Dumb Banks"
|
Aug 8, 2000 |
| pablos |
| So Brian
isn't your usual Kevin Mitnick, Social Engineer type, but he
was recently playing with Wells Fargo over the phone and this
will make you laugh: 1st call, Brian calls Wells Fargo to get
his account balance. For some reason, his fiancee (Kaleigh) is
the primary account holder, and he's just some secondary name,
so they won't give him the balance. Brian hangs up. 2nd call,
Brian calls and the woman asks his name, he says "Kaleigh."
She asks for his mother's maiden name, and he says "I don't
know." This makes her fumble a bit and she asks where he was
born, Brian says "I don't know." "You don't know where you
were born?" she responds. "No," says Brian. "OoohKaaay." Th
woman then proceeds to give him the account balance
information! The moral - Next time a guy named Kaleigh calls,
make sure he knows where he was born. |
| Non-Repudiation: Crypto vs. The Law
|
Aug 7, 2000 |
| gdead |
At the USENIX Electronic Commerce conference in
1998, there was a great deal of discussion (by folks much
smarter than I) about non-repudiation and its definition. On
one side of the bar were lawyers claiming repudiation is the
"ability to declare a signature [and/or its intent] a forgery"
(it's easier for lawyers to define repudiation than
non-repudiation). The other side contained developers and
cryptographers claiming non-repudiation is "that [which]
provides proof of the integrity and origin of data". The
middle was a no-man's land of lawyer jokes, bad assumptions
and miscommunication. After several hours it became obvious
that the "legal guys" and the "tech guys" had totally
different ideas of what non-repudiation meant, and there
wasn't much hope in merging the two mindsets.
Two
years later, these differences are causing much more than
heated discussions at conferences. According to an article
on FirstMonday, the
differing definitions are leading to confusing laws and bad
precedent. Without proper education of developers, lawyers,
and law makers, the future of digital signatures may be doomed
because of this dual definition. |
| Filesharing Through Netscape Exploit
|
Aug 7, 2000 |
| gdead |
| Dan Brunleve has discovered how to turn 2 holes
in Netscape/Netscape's JVM into a webserver on any client. Dan
released BrownOrifice
HTTPD, an exploit based on the 2 vulnerablities, just a
few days ago and it's already done the rounds on /. and Bugtraq.
BrownOrifice turns any version of Netscape into a hidden
filesharing system. He's even written a BOHTTPD
Spy that will show the world who is sharing what. Kinda of
like distributed.net meets cDc meets Napster. I wonder how
sharing files via BrownOrifice would stand up to a court of
law ;) |
| Salon Article on Copyrights, Hackers,
and The Future |
Aug 7, 2000 |
| gdead |
| Salon has an awesome
article that discusses the implications the latest
lawsuits have on software developers. The scariest part of the
article was revelation that regardless of the outcome of the
DeCSS/Napster/Scour/Etc cases, developers are censoring
themselves and their code in an effort not to get sued.
Regardless of the outcome, the creative juices that
made the Net what it is today are being stifled by Big
Business. Developers are afraid of "losing their businesses,
their cars, their homes." This fear doesn't stop at US
borders, either. The MPAA and others involved in these
lawsuits are multinational corporations who can exert power
all over the planet. ... Maybe it's time we all moved to
Anguilla (it's basically another planet, right?). |
| Archimedes is Dead, Long Live
Archimedes |
Aug 6, 2000 |
| gdead |
| What a way to spend a sunday. TSG's faithful
server, archimedes, finally died. I logged in this morning and
my shell died with a Sig 11. I logged into another account and
discovered the mailq had 550 messages in it, all of which had
stopped due to "local mailer died on Signal 13". *sigh*
Luckily we had backup hardware. Curator and I spent the
next 10 hours moving files around and reconfiguring a new
archimedes. At this point, we think most everything is under
control (we're still having a little problem with the maillist
software, but that should be fixed shortly). If you have ANY
problems using the site (404's, 500's, host not found) please
let us know ASAP.
Thanks. :) |
| Shmoo in the Media? |
Aug 5, 2000 |
| heidi |
Big Media keeps covering DefCon 8 and Shmoo
finally gets a reference. From a ComputerWorld
story:
During the Fifth Annual Black and White Ball, a
stunning man drifted by in a long skirt and shoes laced with
glowing electro luminescent wire. Rumor has it that
this "stunning man" is Shmoo's very own Pablos. If you'd like
to copy Pablos' ball ensemble, he completed the outfit with a
sheer black chemise, and fishnet stockings. |
| Ummm... Duhhh..., or When Not To Use
GET |
Aug 5, 2000 |
| curator |
| This
message came through Bugtraq recently. Basically, it's
Authorize.Net's response to someone notifiying them that
sending authentication information encoded in the URL via a
GET request is a bad thing. They write back claiming that it
on the face of it it seems like a security problem, "but upon
further explanation, it becomes clear that this is no more an
issue than anything else that can be accessed on someone's
machine." It's fortunate that these people don't produce
e-commerce software. Oh... wait...
As GET requests show up in browser (histories) and web
server logs (referrers) this seems most academically a
insecure thing. Granted POST requests don't actually encrypt
anything, but the information doesn't show up in the browser
for any future user to see, nor in some other site's web logs
when the user is done using the software.
With policies out there like this, who needs script
kiddies. |
| DNS Still the Weak Link |
Aug 4, 2000 |
| gdead |
This came across NANOG today:
Date: Fri, 4 Aug 2000 16:49:46 -0400
From: "Larson, Matt" To:
"'nanog@merit.edu'" Subject: Recent
issues surrounding g.root-servers.net
Informational
message--Recent issues surrounding g.root-servers.net:
On Friday, July 28, g.root-servers.net, operated by
DISA, started having trouble reliably loading the com zone.
With ICANN's and the DOC's approval, the NSI Registry changed
the root zone to replace g.root-servers.net with
g.gtld-servers.net in the com, net and org NS RRsets. It was
our goal for g.root-servers.net to be answering with current
zone data for the full six-day TTL of the com, net and org NS
records following the change. That has not proved possible;
for example, on Friday morning, August 4, g.root-servers.net
loaded and served up a truncated com zone for a few minutes.
We have asked DISA to stop loading the com, net and org zones
on this server: We believe that it is better for
g.root-servers.net to be lame for com, net and org rather than
to be giving out bad data.
The change to the root zone
reflected in serial number 2000080101 will not be fully seen
until the end of the six-day TTL.
Matt Larson
DNS Platform Manager Network
Solutions Registry / www.nsiregistry.com
What
this means in laymen terms is one of the core nameservers in
the Net claimed (off and on for 6 days) that .com didn't
exist. No need to worry about h4x0r's breaking your nameserver
or stealing your domain. When the folks at the
root/gtld-servers.net screw up, the whole Net can die... And
when NSI screws up, you might as well go home and mow your
lawn, cause the Net will be chaos. |
| Thawte Cans PGP Support |
Aug 4, 2000 |
| pablos |
| The ill fated PGP support at Thawte has
officially met it's fate. While it is unclear whether this
means the demise of the entire "Thawte
Web of Trust," they won't sign PGP keys any longer. What
this really means is that Thawte is merging their CA
operations with Verisign's. Verisign has
never embraced PGP and this is just one more reason to start
looking for a new CA. The Shmoo Group currently recommends TrustCenter,
a German CA with good browser support that will sign your PGP
Key. Check my key
out.
I'd personally like to thank Mark Shuttleworth and Bruce
Watermeyer of Thawte for putting the effort in to support PGP
in the past. |
| Take twenty cryptographers and call
me in a decade? |
Aug 3, 2000 |
| rodney |
| The IETF spend some time at the 'Security Area
Directorate Meeting' (SAAG) discussing the use of a new crypto
algorithm. Some vendors think DES is still fine. Some folks
want an AES candidate now. Personally I think we need multiple
algorithms and AES has nothing to do with it. If we build
protocols using only one crypto algorithm, and it's Triple
DES, we're still vulnerable if there is an attack (like some
high school student from Ireland...) discovered tomorrow. We
need multiple crypto algorithms, perhaps, and the IETF is
lurching towards thinking about this... Stay tuned for next
month, which has a triple crypto witching hour, with RSA's
patent expiring, AES selected, and NIST comes out with a 2048
bit DSA and associated 256 bit SHA-2 hash algorithm. |
| Cross-stitch ala Napster |
Aug 3, 2000 |
| heidi |
| Apparently the music industry isn't the only one
suffering from a Napster-like mentality. For a chuckle or two,
check out CNN's
story about "underground grannies" who are trading
copyrighted needlepoint patterns via the web.
Even though participants in this illicit pattern swapping
only number in the hundreds (versus the millions that use
Napster), the Needlework industry is so small that a movement
such as this could destroy many companies. To quote the CNN
story:
"This strikes at the heart of the needlepoint
industry. The people who are doing this seem to have a
hacker's mentality," said Jo Weiss, executive secretary of
the International Needleart Retailers Guild. |
| Does the military have your DNA on
file? |
Aug 2, 2000 |
| jpm |
|
For quite some time now - at least since I joined the Army
in 1991 - the military has been collecting all sorts of
biometrics from service members. Ostensibly for the
identification of remains although I won't ever commit a
violent crime and expect to get away with it.
Some of this information is from personal experience, and
some can be found in Database Nation by Simson Garfinkel
(ISBN: 1565926536). The Army has all ten of my fingerprints, a
drop of dried blood, and a swab with skin cells floating in a
vial of preservative.
For those of you who have served in the military and think
its badTM that The Man has a
sample of your DNA, you can request that they destroy
it. More information can be found at the Armed Forces
Repository website. |
| Q: What do RSA, DeCSS, and Shmoo have
in Common? |
Aug 2, 2000 |
| gdead |
Answer: They've all been on t-shirts (and my
wife as been on an apron, but that's a different story). In
the great tradition of putting crypto onto a t-shirt (raise
your hand if you've worn your RSA T-shirt across US borders),
Copyleft is selling
DeCSS shirts. The general attitude of the law as been "if the
crypto is printed on something (ie: a T-shirt) then it's
covered under the 1st amendemnt." That's how EFF's Cracking
DES got published. However, the MPAA doesn't think that
having DeCSS printed on a shirt is protected free speech. They
claim the shirt discloses trade secrets, which comes before
your right to free speech. To that end, they've added Copyleft
to the growing number of defendants in the DeCSS suit. Slashdot
and Wired
have the stories.
On a less controversial front, TSG
has some extra T-shirts left over from DefCon. We'll be happy
to sell them for $15 + S/H. If you want one, let us know. (we'll post pics
of them soon) |
| emergency, emergency, everyone to get
from streets! |
Aug 1, 2000 |
| rodney |
Representatives of the US and Japanese
governments presented proposals to the IETF to provide
emergency capabilities for Internet access in times of crisis,
such as earthquakes. Old time IETF geeks and
Cryptolibertarians look askance at this. On the other hand,
listening to the stories about "I Am Alive!" (IAA) systems
being used in Japan at recent volcanic emergencies were quite
compelling. More information is available at IEPS and IAA.
|
| The Coroner's Toolkit |
Aug 1, 2000 |
| gdead |
| After what can best be called a year long closed
beta, Dan Farmer and Wietse Venema (of tcp wrappers fame) have
released The
Coroner's Toolkit (TCT). TCT is designed for "a
post-mortem analysis of a UNIX system after break-in". I've
used TCT while it was in beta and it was powerful but a bit
short on user friendliness. TCT comes with tools to undelete
files, recover keys from processes and disk, and dig up (ie:
grave rob) a bunch of info from the box. TCT is very useful in
the right hands, but the authors will be the first to admit
that it's a bit unpolished. But don't let that stop you...
download and play with it and make your own opinion. |
| Cryptome Back up... Basically |
Jul 31, 2000 |
| gdead |
After long, questionable
outage, Cryptome is
back online, as long as you reference it by IP address. Here's
John Young's email:
Date:
Mon, 31 Jul 2000 07:48:32 -0400 To: jya@pipeline.com
From: John Young Subject: Cryptome
Update
Cryptome and JYA had an outage last week due to
overload caused by news reports on hot files on the sites,
and maybe some cause not yet known. The sites have been
moved to a faster server accessible by IP addresses until
domain names have been changed:
http://216.167.120.50/
(cryptome.org)
http://216.167.120.49/crypto.htm
(jya.com) |
| CCTF - After the Chaos |
Jul 31, 2000 |
| gdead |
Well, DefCon 8 has come and gone. TSG has
sniffed gigabytes of data from the Capture the Flag network
and is working on getting the data online. The CCTF didn't go
perfectly, tho. Our first capture box (Running OpenBSD with
Intel NIC's) was dropping anywhere between 0.5% and 20% of the
packets on the wire. After talking with the OpenBSD folks at
the Con, we decided it was a hardware issue (bad Intel, bad!)
and moved the sniffing activities over to a FreeBSD machine
with 3Com NICs. The new machine didn't drop any packets, but
due to a misconfiguration of some switches in the network, we
only had a partial view for a few hours. To add to the mess,
our powerstrip went bad and the machine kept shutting off. But
by midday saturday, things were under control. Everyone is
heading home today and tonite we should start the
post-processing (merging the FreeBSD and OpenBSD captures,
mergring and/or splitting some of the logs, and bundling for
distribution). This will probably take us a few days due to
the size of the data. Check the CCTF page mid-week for a
list of hosts that will be serving the data.
I'd like
to thank the DC Goons for all the help and support they gave
us. They let us in the NOC, kept watch over our boxes, and
lended a technical hand when required. You guys rock. |
| Shmoo, Live from DefCon 8.0 |
Jul 28, 2000 |
| pablos |
| Eight Shmoo are at DEF CON (Check out the site,
which ADM has just hacked
(Stronghold Exploit)). We've got CCTF under control, and we'll
bring home lotsa interesting packets.
We've been trying to keep this under wraps for most of the
year now, but The Evil Geniuses for a Better Tomorrow will be
releasing a public beta of MojoNation. This is a
brilliant distributed computing system that crosses Napster
like filesharing with a network based RAID5 redundancy and a
micropayment cost-recovery system. Be a part of the revolution
and go get it now. |
| Quite the Day in Court |
Jul 26, 2000 |
| gdead |
Napster and 2600 both had big days in court
today. Napster has been
instructed to stop
service at 12a PDT Friday. From the sounds of it, Judge
Patel really beat on Napster, claiming the "non-infringing"
uses of Napster came as an afterthought. Napster, I assume,
will appeal the ruling, and should have more info here
late Wednesday night.
The 2600 v MPAA trial ended
today. The judge said some encouraging
things about the Side of Light. The real shining moment in the
case was the testimony of David Touretsky, a CMU prof. The
judge seemed to really grasp the issues at hand once he was
done... no small feat given the technical nature of this
trial. EFF has all the trial docs online.
|
| Kuro5hin.org Taken Down after
Application-level DoS |
Jul 26, 2000 |
| gdead |
After 4 days of fighting with a denial of
service attack, kuro5hin.org has stopped
service. In a note
(local copy)
on the site a brief summary of the attack is given. The DoS
was rather unique in the fact that it attacked Scoop, the application
that ran K5 (Scoop was written by rusty, the person who
started K5). Most DoS attacks these days are network based and
will run against any host or network. This was a very specifc
attack aimed at overloading a specific web application. If
you've watched the progress on K5 in the last few days, you'll
notice that the DoS overloaded various parts of the Scoop
system including apache and MySQL... I don't think bandwidth
was really ever an issue. Let's hope this attack doesn't give
birth to a script kiddie tool that lets anyone take down any
Scoop-based site.
On a non-security related note, I'm
sad to see K5 go. It was a great site with a very close knit
community and lots of great discussion. It will be missed.
Update: Slashdot now has a thread
about the K5 DoS.
Another Update:Slash has
another thread
about this, and Rusty has posted an update on K5 indicating
that he'll be bringing the site back up in the future (a month
or so). |
| EPIC and the FBI on Carnivore.
And...use at ISPs. |
Jul 25, 2000 |
| ktsolis |
On Monday, The
Electronic Privacy Information Center's Mark Rotenburg and
Larry Parkinson, general counsel for the FBI, discussed Carnivore
on the McNeil-Lehrer
Newshour. Parkinson stated that Carnivore
is a "surgical tool" and has been in use 25 times over the
last two years. The FBI has a statement about Carnivore here.
The Shmoo group called Mindspring last night and to
ask them about use of Carnivore at the ISP level. Customer
service had been instructed not to discuss the issue. The
person we spoke with stated that he had never seen a Carnivore
box, but he did hear that one had been installed at Earthlink
out in California. |
| Close Your Eyes When Boarding |
Jul 25, 2000 |
| gdead |
| An article
on CNN discusses a pilot program for using bionetrics at
airports. The Charlotte/Douglas International Airport in North
Carolina will be testing a system from EyeTicket
that allows for faster boarding by scanning your iris. While
I'm all for reducing hassles at airports using groovy kewl
technology, there is no way I'm going to let an airline take a
picture of my iris (or any other biometric data). EyeTicket
claims the data is not tied to any other personal information
and that they won't sell the iris database to a third
company... ... *sigh* Regardless of their intent, I don't feel
comfortable giving someone my biometric data (I think pablos agrees with me
on this). Unlike a PIN, password, JavaRing, or even your name,
your biometric data can never be changed. Once someone has it,
they have your identity, they have "you". No matter what their
current motives and security mechanisms are, who knows what
may happen down the road. The company you gave your iris to
may get bought or hacked, allowing your data to be viewed and
used by someone... someone you didn't intend on giving your
iris to. And there's little to nothing you can do about it.
|
| Zero Knowledge Releases Linux Freedom
Source |
Jul 24, 2000 |
| gdead |
| According to a press
release from ZeroKnowledge the
Linux Freedom client has
been GPL'd. ZKS has been promising to release its Freedom code
for A Long Time Now(tm). (for those that don't know, Freedom
is a software/network system that allows pseudo-anonymous
existence on the Net) It's nice to see them finally following
through. The code is available from opensource.zeroknowledge.com.
A quick browse of the code doesn't reveal anything too
interesting (it's a lot smaller than I thought it would be),
and I was able to successfully compile it under Mandrake 7.0.
Not sure how well it works yet, as I don't have a Freedom
account ;) |
| Route Filter Discussion on Slashdot
|
Jul 24, 2000 |
| gdead |
| In what promises to be a giant, flailing
cluefest, Slashdot has
a discussion on ISP's
and their route filters. The basic idea is if an ISP
filtered out packets that don't have a source address that
orginates inside of its network (ie: it was spoofed) then
spoofed DoS and other similar attacks would be stopped. This
is technically called Ingress Filtering, and there's even an
RFC on
it. Ingress filtering is a surprising complex topic, and I
don't anticipate most of the /. readers grasping it. For a
better discussion of this and other large scale network
security problems, check out North American Network Operators
Group (NANOG - archives).
Better yet, don't wait until your ISP fixes things, fix them
yourself. Filter out martian
addresses and read Cisco's Essential
IOS Features Every ISP Should Consider (Cisco specific
implementation but with theory that can be applied on any
platform). |
| Capture the Capture The Flag |
Jul 22, 2000 |
| gdead |
The Shmoo Group is going to DefCon next week (well,
about half of us are). Besides drinking, we actually have
something productive to do while in Vegas. TSG will be capturing the Capture The
Flag contest. For those who don't know, CTF is a weekend
long hacking contest where uber hackers try and break into
various local servers. We will be capturing all that traffic
and (hopefully) burning CD's on the spot for those who want
the dumps. We will also be posting interesting parts of the
capture on the CCTF page
once the conference is over.
TSG will also be selling
T-shirts and giving away stickers. Buy a t-shirt and help
support TSG. Get a free sticker and be the kewlest h4x0r on
your block. :) |
| Weld Pond Writes for ZDNet |
Jul 21, 2000 |
| gdead |
| Weld Pond, of L0pht fame (now @Stake), has written an
article for ZDNet. The article
is a discussion on the use of the term "hacker"; what it meant
10 years ago and what it means now. Interesting (if not
cliche) article. But the real news here is the use of an
underground author by major news media. Maybe it's an attempt
to reduce FUD. Maybe it's a marketing agreement between @Stake
and ZDNet. Maybe he hacked ZDNet and posted the story himself
;) Whatever the reason behind the article, seeing his name as
a byline on ZDNet's site is just plain weird. |
| Fair Weather Shorts |
Jul 20, 2000 |
| gdead |
| Some odds and ends to report on today... EFF is
updating their MPAA v 2600 archives
daily as the case continues on in court. The trial transcripts
are amazingly interesting, but the court stenographer can't
spell "Schneier" (Bruce Snyder == Bruce Schneier). For those
of you filtering address space, ARIN is going to begin
allocating IP blocks from 65.0.0.0/8 and 66.0.0.0/8. Apple
has taken Mac OS X server off of the Apple store. No word as to
whether OS X Server is dead, or just on vacation. And
according a Wired article,
high tech companies are starting to hire Chief Privacy
Officers (CPO's) as a reaction to public outcry about privacy
violations on the Net. |
| Disney to buy bankrupt Toysmart's
customer list? |
Jul 19, 2000 |
| ktsolis |
Last week, we reported that the bankrupt toy
seller Toysmart was preparing a fire sale asset roster
including 1) a customer list and 2) a database of personal
information of people who visited the website. Toysmart's privacy
statement clearly disallows the transfer of this
information to third parties. When the FTC caught wind of
Toysmart's plans, they quickly filed suit to prevent the
bankrupt online toy store from selling this information.
The Toysmart incident poses an question that would
likely throw Simson
Garfinkel into a rant--does an explicit privacy protection
statement still apply if a company goes bankrupt?--but what
was shaping up to be an interesting case for the DC privacy
cabal may well be diffused. Disney, a 60% owner of Toysmart,
has offered
to buy the customer information and retire it. And who
wouldn't trust Disney? : ) |
| Format Bugs - Paper from Bugtraq
|
Jul 19, 2000 |
| gdead |
| Yesterday, Pascal Bouchareine posted a paper
to Bugtraq that is one of the best explanations of a bug I've
seen in years. He thoroughly covers format bugs that most
recently led to exploits
in BitchX. The paper has lots of gdb output with running commentary on
what's happening to the stack while he twists and contorts
input. This paper and Aleph One's Smashing
the Stack for Fun and Profit are two must reads to really
understand what nasty things can happen to your stack. To
avoid having writing programs that look like Swiss cheese, see
TSG's securecode
section. |
| Digital Commerce Society - Washington
DC |
Jul 18, 2000 |
| gdead |
Many moons ago (about 5 years, really) Robert Hettinga started
the Digital
Commerce Society of Boston. DCSB has monthly lunches at
the Harvard Club of Boston where various crypto/finance/geeks
give presentations (ie: Rich Salz, Win Treese, and TSG'r rodney). There's also a
great list (which I highly recommend sub'ing to) which serves
as a distillery of info from cypherpunks, cryptography,
poltech, and other misc lists.
DSCB is great... if
you're in Boston. If you're not in Boston (who wouldn't want
to be) you only get the list and are left out of the great
lunches. To that end, the Digital Commerce Society of
Washington DC has been started. DCSDC is a "branch" of the
DCSB. The idea is to have invitied speakers with food present
over some regular time interval in the Washington DC or
Northern VA area. If you live in the DC area and are
interested in attending, subscribe to the DCSDC
list for info on the when, where, why, and how. |
| DeCSS v MPAA Round 1 |
Jul 18, 2000 |
| gdead |
| The 2600 et al v MPAA suit is underway in New
York. In a last minute attempt to stay the trial, EFF's
lawyers claimed the Judge Kaplan had a conflict of interest
due to prior consulting with Time Warner. The Judge denied the
stay without arguement. Day one was mostly devoted to Michael
Shamos, a CMU faculity and MPAA consultant, who discussed how
he was able to copy a DiVX DVD and exchange it on the
Internet. The whole process took about 20 hours and a ton of
technical expertise. A by product of the cross examination is
that Shamos may be violating CMU's Microsoft site license by
doing his consulting using CMU's resources. Wired
and EFF
have all the details. Day two will have Frank Andrew Stevenson
discuss his original findings when he was first analyzing CSS.
|
| Dilution of Information in
Distributed FileSharing Systems |
Jul 17, 2000 |
| gdead |
Over the last few months, distributed
filesharing systems have become a hot topic. Napster is the most notable
system system out there, due to its giant user base and the
ongoing lawsuits.
Napster only shares mp3's, which is either it's biggest
drawback or it's largest asset.
Other, more generic
clients have appeared in the recent months. Gnutella (released
initially by the boyz from Nullsoft who were promptly
beaten by AOL, their parent company) was the first client of
note. Gnutella was GPL'd after it's false start and a whole
hurd of developers have been beefing it up since.
Now
there are many different distributed filesharing systems being
actively developed...
Read
more...
NOTE: This is only slightly security
related, but interesting none-the-less. |
| IBM Funny Money |
Jul 17, 2000 |
| gdead |
This morning I received an
email from a worker bee in IBM. It's basically a
notification of a bunch of crypto and EC courses IBM is making
available online. Here's The Catch (tm):
Notice: downloading is free, but... most documents
require `paying` using IBM Micro Payments demo
money In order to download the courses, you must first
download and install the IBM micropayment wallet. You then
have to "pay" for the download using fake money from the
wallet. This is a very interesting take on getting wallet
software deployed. Normally, wallets (and the like) are geared
toward consumers or businesses. The attitude is either
"download this wallet and your life will be made easier"
(consumer) or "have your customers download this wallet and
you'll make more money" (business). IBM's ploy is geared
toward the geeks, who are a marketing channel of their own
("download this wallet because it's cutting edge and kewl and
leet and stuff"). IBM is dangling a carrot... lots of crypto
and EC papers of quality... all you need to do is download
this whiz-bang gizmo and it's yours. I imagine the hope is the
geeks will download it, poke it, play with it, and talk about
it... and IBM gets free press and feedback. oh look, I just
became part of the cycle... damnit. |
| 2600 DMCA protest Today in New York
|
Jul 17, 2000 |
| ktsolis |
When Judge Kaplan moved the the next stage of
the Universal City Studios v. 2600 Magazine trial up to July
17th, Emmanuel Goldstein couldn't help but smile: the 2600-hosted HOPE conference
has just ended, and 500+ conference-goers are expected to be
out protesting from 10:30AM to 5:00PM at 500 Pearl Street in
the courtyard of the Court. a few (semi-)official notes
for the protest for those planning to attend: "No
electric sound (megaphones, etc) We need marshals with red
arm bans for interface with the NYPD. They are not
expecting civil disobedience Signs can not have wood
sticks." |
| July Cryptogram is Out |
Jul 16, 2000 |
| grendel |
| This month's edition of Mr.
Schneier's Cryptogram is now available.
Included in this issue besides the always interesting news and
editorials are sensless acts of full disclosure by the CIA, a
topic near and dear to the collective Shmoo heart. :) |
| Space Junk |
Jul 14, 2000 |
| dustin |
| NASA has a Java applet
that tracks all known satelites in orbit. Check the 3D view.
You can click on any of the dots and see it's name and orbit.
I had no idea how much trash we had put in space. I also like
that you can see where the sun is and where it is night and
day.
|
| CERT Advisory: buffer overflow
vulnerability in Sony's Aibo robot dog |
Jul 13, 2000 |
| ktsolis |
| "The AIBO Sound Controller, when configured to
play Britney Spears' "Oops, I Did It Again," will cause AIBO
to lift a hind leg and spontaneously leak battery juice on the
floor, simulating a urination (female ERS-110 models "squat"
during this exploit)." hoot! sure, it's a hoax,
but it's a pretty funny one. Some of you may remember the
equally humorous Independence Day/April Fools Day CERT advisory.
|
| Mitnick Back in Business |
Jul 13, 2000 |
| gdead |
Kevin Mitnick (the "notorious hacker") has
received the go-ahead from his probation officer engage in
computer-related activities. In particular, he's landed 2
consulting gigs (one for a TV show and one for an computer
security firm), a speaking engagement in LA, and a column in
Contentville (I
love that name). In the words of his attorney, this is a "180
degree change" in attitude from his probation officer. Several
weeks ago, a judge ruled that the probation officer, Larry
Hawley, had basically free reign over Mitnick's potential
jobs. Hawley had laid down very strict rules that basically
forced Mitnick to wait tables. Looks like he'll be making
substantially more than a waiter's pay now.
There's no
word yet from Hawley about the change of heart. <
sarcasm> I'm sure there was no pressure on Hawley from the
underground to change Kevin's parole terms
CNN
and MSNBC
have full coverage. |
| No Safe Harbor for US Companies?
|
Jul 12, 2000 |
| ktsolis |
The European Parliament has
voted against the Safe Harbor plan proposed by the
European Commission and the US. The decision came as a
surprise to those of us who watched from the sidelines as the
EC and the US Department of Commerce spent two gruelling years
negotiating the plan. The Safe Harbor plan allows US companies
to engage in e-commerce in the EU without conforming to strict
EU data privacy practices.
Whether the European
Parliament perceives the plan as giving too much data leniency
to US companies or if they are solely engaging in a power
struggle with the EC is unclear. |
| Lars Ulrich on the Hill - revisited
|
Jul 11, 2000 |
| gdead |
The heavy hitters in the digital music battle
hit the hill today. CNN
and Wired
have the stories. The highlites:
- Today was the first day that the Napster faction was
face to face with the recording industry and artists. There
are no reports of Lars beating Shawn Fanning (Napster
founder) into a pulp in the parking lot... yet.
- Orrin Hatch (R-Utah), committee chair, played devil's
advocate. He claimed that service providers such as Napster
are taking advantage of the Digital Millenium Copyright Act.
However, he also asked the RIAA president Hilary Rosen if
making a copy of a CD onto analog tape to give you your
spouse was "fair use" of the CD. She declined to answer.
- Orrin Hatch admitted to listening to Metallica... and
liking it.
|
| Quote of the Day |
Jul 11, 2000 |
| pablos |
I'm on a number of fringe whacko listservs,
always looking for a little gem of wisdom. Here's a great
quote from the Extropy
list in reference to Napsterish disintermediation of the
record industry:
- Q: How does anyone make money if everything can be
pirated so fantastically well?
A: The archives of this list contain many discussions
about how artists make money in a world without copyrights.
It never ceases to amaze me that people who claim to be
creative have such a pathetic lack of imagination for
business models, blindly assuming that the standard old
method of selling recordings is all there is. - Lee Daniel Crocker "All inventions or works of authorship original to
me, herein and past, are placed irrevocably in the public
domain, and may be used or modified for any purpose, without
permission, attribution, or
notification."--LDC |
| FBI Carnivore = Internet Random Mail
Reader? |
Jul 11, 2000 |
| gdead |
The FBI has unleashed their
latest Internet sniffing device: Carnivore. It is a black box
that they drop onto a net connection (say at an ISP) and snarf
traffic. In theory, they're only supposed to listen to traffic
to/from the entity they have a warrant for. In practice, it
may be more like Pablos' Internet
Random Mail Reader. By definition, the FBI will have to
inspect every packet on the wire to see if it's one they need.
What's done with the packets once they've been inspected is
anybody's guess. The scary thing is this system has already
been deployed several times in response to a warrant. I wonder
who they were actually targeting....
yes, my cynicism
runs deep today :) |
| ToySmart.com Sued Over Privacy
Violation |
Jul 10, 2000 |
| gdead |
| ToySmart.com, the failed e-toyler majority owned
by Disney, is being
sued by the FTC. In an effort to raise capital for their
failing company, ToySmart.com sold their customer list in a
direct violation of their privacy policy. The FTC caught wind
of this, and in their eternal fight to defend consumer privacy
rights, they filed suit. The most surprising aspect of this is
who squealed on ToySmart.com... our friends at TRUSTe. It's nice to see
them finally take action to help out consumers. |
| This Week in Shmoo News: Lars Ulrich
on the Hill, EFF DeCSS debate in San Francisco |
Jul 9, 2000 |
| ktsolis |
This Tuesday, Capitol Hill will become the nexus
of the online music brawl. Metallica?s Lars Ulrich along with
the CEOs of Napster and MP3.com will testify during the Senate
Judiciary Committee's hearing
entitled "The Future of Digital Music: Is there an Upside to
Downloading?"
Meanwhile, on the West Coast, Shmoo
readers might want to stop by UC Berkeley's Law School on Monday
night. EFF co-founder John Perry Barlow and UC Berkeley's
Pam Samuelson will bring attendees up to date on and discuss
First Amendment implications of the DeCSS case. The EFF is
coordinating the defense of the first trial to be brought
under the controversial Digital Millennium Copyright Act which
begins on July 17th in New York. |
| Freedom Blocked by FBI (Part Deux)
|
Jul 6, 2000 |
| pablos |
| ZeroKnowledge
confirmed last Friday that the Federal Bureau of Investigation
has been blocking traffic from Freedom servers. The FBI
claims this is not intentional. Shmoo has indirectly
confirmed this with "a well placed source in the FBI." |
| Misc. Stuff I Rippped off from Slashdot Today |
Jul 6, 2000 |
| pablos |
| Lance Spitzner's "Know Your Enemy" series about
script kiddes has been updated with a new "Motives"
section. The FBI
is meddling with NTT's acquisition of Verio, more from CNN.
And the Russians have invented gas
powered boots that make you run 25 MPH. |
| The Shmoo Group Slogan Selection
Process (TSGSSP for short) |
Jul 6, 2000 |
| gdead |
In preparations for upcoming festivities where
TSG will be handing out paraphernalia (no not that kind of
paraphernalia), we're looking for reader feedback on a
(possibly) new slogan. If you want to help out, please vote in
the box to the right ASAP. Or, if you have an idea for a
slogan that isn't there, feel free to write us.
Most of the
slogans are self explanatory. However "Your problem is you
have goals" may not be. That's a quote from a trip I took with
the Real Life Shmoo (TM) while we both worked for an ISP in
Alaska. The story of that journey has become euphemistically
known as "The Soldotna Story". I'd be happy to tell you all
about The Soldotna Story if someone wants to buy a round of
beer for TSG at DefCon. Trust me, it's worth it. ;-) Email in your beer offers
(brand/brew and size) and I'll get the story posted. |
| Shmoo Slogans |
Jul 5, 2000 |
| pablos |
| Shmoo needs a slogan for the pending sticker
project. So far we have:
Half-ass Security Holes
Send us your ideas.
|
| The Scottish-Nike-NSI Connection
|
Jul 5, 2000 |
| heidi |
| In June, Nike's website was hijacked. A
fradulant email to NSI allowed some rogue party to redirect Nike.com traffic to a web hosting company
in Scottland. Now the owner of this company (Greg Lloyd Smith
who was sued last year by amazon over his ownership of the
Amazon.gr domain) is threatening
to sue Nike because they won't pay his bill. That's right
- he billed Nike for the use of his servers. His claim: Nike
did not properly secure its Internet Domain. Of course, Nike
points the finger at NSI. And of course, NSI claims they're
just a conduit for domains and it couldn't possibly be their
fault. Did you follow all that? |
| Volunteers Needed for Publius Live
Trial |
Jul 4, 2000 |
| heidi |
| Publius is
an attempt at a censorship resistant publishing system created
by researchers at AT&T Labs. By using threshold
cryptography to distribute chunks of an ecrypted file through
the Publius virtual file system, Publius prevents a single
entity (aside from the author) from modifying, i.e. censoring,
the published information. They are looking for server
volunteers for the live trial that will begin at the end
of the month. The trial runs 7/28-9/28. |
| Unofficial xinetd Tutorial Now
Available on MacSecurity.org |
Jul 4, 2000 |
| heidi |
Curator announced this earlier today on MacSecurity.org. It's
relevant enough to the Shmoo readership that I figured I'd
post it here.
We've finally finished that unofficial
xinetd tutorial we promised a while back. It's chock
full of information useful for users of all platforms, and
includes a section specifically for Mac OS X [Server]. It
should have just about everything one would need to get up
and running, including installation, configuration, day to
day use, and other sundry things. Have a read and remember,
comments are
welcome. |
| Dead Dot Coms Selling Allegedly
Private Info |
Jul 2, 2000 |
| pablos |
| CNet
has an article about failed dot coms that firesale
databases of personal data collected with a promise of
privacy. Some of these crooks are even TRUSTe members. |
| Freedom Blocked by the FBI |
Jul 2, 2000 |
| pablos |
| ZeroKnowledge
confirmed last Friday that the Federal Bureau of Investigation
has been blocking traffic from Freedom servers. Let the
war begin....
http://www.wired.com/news/technology/0,1282,37425,00.html
|
| The Shmoo Group gets Co-opted, Twice.
|
Jul 1, 2000 |
| pablos |
| A ruthless blow to Osiris, Tripwire has announced
some GPL action for the
Linux version. The famed Internet Random Mail Reader has a
new cousin called EtherPEG which came out of
MacHack this year. It sniffs your local network and creates a
collage of all the GIF and JPEG traffic it can find. Get a Mac
you poser. |
| Security at Network Solutions |
Jun 28, 2000 |
| gdead |
I just got an email from Networks Solutions(R)
(a VeriSign(R) company) that says they're going to require a
"security email" from me whenever a domain I control is
undergoing a change. What the hell where they doing before?
Spinning a magic 8 ball? The first line of the email kills me:
Security for our customers has always been a top
priority at Network
Solutions. HAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHA...
hehe... eheheheh.. HAHa.. he.. woo!
I've got a bridge
in Brooklyn... |
| We've Got Your Number (Station) Right
Here |
Jun 28, 2000 |
| curator |
| First, the old stuff: After two months on
the air, our third
cipher has remained unsolved, even with the lure of two
DVD's. The cipher is admittedly rather, though not unsolvable;
it is a monoalphabetic cipher, sans extended ascii characters
and thus each character reduced to its 7-bit binary
representation, which is then concatenated into a single long
string, which is divided into 3-bit binary groups, which are
finally converted into the corresponding decimal notation and
played to the listener(s). The perl
code that generated the cipher text is available, as is
the plain
text. Again, certainly a rather evil cipher, and in hind
sight too large a jump from simplicity of the first two
ciphers. This brings us to...
The new stuff: Our fourth
cipher returns to a difficulty more in keeping with the
spirit of our contest. This one should be much easier than the
last, while being incrementally more difficult than the first
two. As with our other contests, a DVD (Contact)
goes to the first person to break the cipher and give us the
plain text. Now, get cracking! |
| I Feel So... Vulnerable |
Jun 23, 2000 |
| gdead |
*sniff* Yesterday on BugTraq, 2 of my
favorite Open Source projects had vulnerablities announced.
WuFTP and FreeBSD users take note:
A few years ago, a
root level exploit was discovered through the site exec command in WuFTP. A patch as
released that was assumed to fix the problem. But according to
the post
yesterday, the site exec problem
still exists. All that's needed to gain root is anonymous
access to the ftp server. There is no word on a patch yet.
The FreeBSD Security team announced
yesterday that there's a problem in the IP stack of all
versions of FreeBSD. Maliciously malformed IP options will
cause the kernel to panic and effectively DoS the machine.
This is very similar to a vulnerability
announced earlier this year in NetBSD. Recommended fix:
upgrade to 3.4-STABLE, 4.0-STABLE, or 5.0-CURRENT. For those
folks running 2.2, the fix may be a little painful. |
| "No Such Thing as Crying Wolf?"... My
Butt |
Jun 22, 2000 |
| gdead |
I love it when the media publishes self
perpetuating articles. CNN has a story entitled When
it comes to security, there's no such thing as crying
wolf. The basic idea is that even when the media
annouces a "major security threat" that ends up being a dud,
like the recent Serbian Badman virus, it's better than not
saying anything. Translated into news-business speak this
really says "If we do a story about anything security related,
you better read it. Not only because it generates more
hits/money/business/ad revenue/farm animals, but because you
may, possibly, somewhat be effected by it sometime later in
the near (or not so near) future." So CNN, and the rest of the
mass media feel compelled to report on anything and everything
security related just to "keep us safe"... isn't that nice?
I'm glad they're looking out for us.
What they fail to
mention is the fact that this method of reporting will quickly
de-sensitize us. "Crying wolf" or issuing alerts when there is
no real threat will force people to tune them out (Signal to
Noise ratio problems). When a real problem does arise and the
public does need to be notified, the media channels will be
useless initially because people will perceive it as "just
another alert from CNN". To CERT's and NIPC's credit, they've
been very good about not jumping on this bandwagon. Granted,
they're not media and have in the security industry for years,
but it's nice to know that they give more thought to public
releases than the press does. |
| SAFER RIP |
Jun 22, 2000 |
| gdead |
SAFER,
a monthly security newsletter published by The Relay Group, hasn't
been seen since January. My newsletter first-aid is a little
rusty, but I think after 5 months without any vitals, we can
declare it dead. The Relay Group seems to be alive and well,
but I think they've changed the company's direction...
Specificly to payment processing and mobile
telecommunications. This new direction apparently doesn't
include producing a highly informative, thought-provoking
newsletter like SAFER. Maybe TSG will start a newsletter...
mmm.. ideas?
Update:Thanks to those that wrote in and
corrected me. Safer is still around at http://www.safermag.com/.
The archives at siamrelay.com weren't being updated, but the
ones at safermag are. I'm dumb :-) |
| Platform for Privacy Preferences
|
Jun 22, 2000 |
| gdead |
| According to an article
on Wired, the long awaited Platform for Privacy
Preferences (P3P for short... I have no idea how this acronym
was derived) debuted in New York yesterday. P3P is a protocol
developed by the W3C to
formalize website privacy policies. P3P enabled software will
be able to read the a site's policy and compare it to user
preferences. If there's a problem, the user will be notified
and can choose not to visit the site, DoS them, launch a
rainbow ribbon campaign... whatever they want. Microsoft, AOL,
and even the White House applaud P3P as a great step forward
for consumer privacy online. Some organizations, however, see
P3P as a bad thing; EPIC et al released a report called "Pretty
Poor Privacy" in which they basically rip the whole thing
to shreads. I'm not sure where I stand yet. I understand
EPIC's points, but I think there's potential here (with
consumer feedback). There is also the potential that MS and
AOL will make this protocol useless for all purposes except
for marketing, but I don't think that will happen... maybe.
|
| Hashed Passwords Available to All
Users in Mac OS X |
Jun 20, 2000 |
| gdead |
Go-go gadget curator... From his post
to MacSec:
In recent weeks in playing with my new DP4 install, I
noticed that I could 'nidump passwd / >
/tmp/estupido.txt' as a non-root equivalent user and get a
properly formatted BSD passwd file, with the passwd hashes.
I thought I had to be mistaken about this as it seems to be
a major security problem; maybe the hashes are decoys or
something. To this end, I created a couple test accounts,
set their passwords to easily guessable values, and created
the 'estupido' file. To my (not so much) surprise, crack
cracked the easy test accounts in seconds. ...
As
most would argue, allowing non-root users access to passwd
hashes on a system is a "bad thing". |
| Anonymous Publishing with Random Pads
|
Jun 18, 2000 |
| pablos |
| The Shmoo Group is supporting a nascent method
of free speech on the Internet called random pads. The
beauty of this scheme is it is very simple to understand and
implement, take 20 minutes and learn how it to do it yourself.
Eventually, it will work well in conjunction with Freenet or Eternity.
Get your pads and tools from Shmoo.
|
| June Crypto-Gram is Out |
Jun 17, 2000 |
| grendel |
| The June
issue of Bruce
Schneier's Cypto-Gram
is now available. As always, lots of interesting news and
editorials from the crypto front, straight from the mouth of
Counterpane's
founder. Besides news & editorials, this edition covers
the history of DES, hype in the industry, Java and Viruses,
and a little protocol called SOAP. Get it while its hot.:)
|
| Courtney Loves Napster |
Jun 16, 2000 |
| pablos |
| In case you haven't seen it yet, Salon printed
a
kick-ass rant/manifesto by Courtney Love about the music
industry & her plan to subvert the man. I've managed to
completely ignore her entire career, but this is really good
stuff. She even curtsey's to Ani who has been doing this all
along. |
| OpenBSD 2.7 Out |
Jun 16, 2000 |
| grendel |
| Theo and the other hepcats over at OpenBSD have just released
OpenBSD 2.7. It
looks like theres been significant advances, additions, and
lots of fun crypto:) Mmmmmm encrypted swap space:) |
| Forbes HOWTO on Bank Hacking |
Jun 13, 2000 |
| gdead |
Forbes has put together an article
which is basically "Bank Hacking for Dummies." They explain in
10 easy steps how easy it would be to break into a medium
sized bank and run off with USD100million. The catch is you
need USD2million in seed capital to get the whole operation
off the ground. But technically, the hack isn't that hard, and
relatively low risk. It's not shocking (given the current
state of most companies' information systems) but it is scary.
Be sure to read all the footnotes in the story... My favorite:
In England, for example, a teller discovered that
change-of-address procedures for account holders were not
audited by her bank--after all, what's so worrisome about a
change of address?--so she simply changed the addresses of
various account holders to that of her own when checks were
due to be sent out, then changed them back. She operated
this scam for 10 years before being caught. mmm.....
perimeter security will only get you so far. :-) |
| TSG Announces FEMA Project (aka: A
Cry for Developers) |
Jun 13, 2000 |
| gdead |
| The Shmoo Group is starting work on an
open-source firewall management interface called Firewall
Enterprise Management and Analysis... FEMA. One of my big
"things" is that the best security software in the world can
be made useless if it's difficult to manage. Firewalls (esp
open-source firewalls) are usually managed with a text editor.
This method doesn't really work when you have a dozen machines
to manage. I think that non-scalable management the reason
there aren't enterprise size deployments of OS firewalls. To
try and remedy the situation, TSG has started FEMA, an open, scalable,
portable architecture that can control both open and closed
source firewalls, as well as serve as a focal point for all
their logs. And we need developers ;) We've got 4 developers
in-house starting work on the project, but the more the
merrier. We're currently in the design phase, and should be
moving to implementation in a month or so. If you're
interested in helping in any way (or if you just want to join
the list and maybe pitch in a thought now and then), check out
the FEMA homepage and
sign up. |
| Battlebots |
Jun 12, 2000 |
| pablos |
| Last night some Shmoovians went to a real live
Battlebots
competition. You get a really strange feeling the first time
you hear a crowd booing a robot. With a maximum weight of 488
lbs., there is a lot of metal out there getting thrashed. For
some time now, I've felt this is a glimpse into the future of
sports. Also, it is a glimpse at the future of warfare, if
only to see how gleefully people stand behind a wall of Lexan,
and send their minions out to fight in
their stead. This sort of impersonal diplomacy will reach new
heights as information warfare becomes more and more in vogue.
From what we saw last night, the best way to secure yourself
is with a large gas-powered spike that you can jab into
anything you damn well please. |
| The Powers That Be... |
Jun 10, 2000 |
| curator |
| At about 8am AKDST tomorrow morning (Sunday),
the Shmoo family of web sites will go down for approximately 8
hours, as our host location has a major electrical refit. We
should be back up by late afternoon Sunday.
UPDATE: We're back up. Just thought I'd point
out that outages like that should be embraced. Since Shmoo has
no banner ads, or sponsors of any type, we're lucky to be able
to leach the QoS we've got now. Feel free to contribute if you
want to help make Shmoo better. - pablos. |
| Chain of Custody Destroys CD Universe
Case |
Jun 9, 2000 |
| gdead |
According to MSNBC, the evidence in
the CD Universe credit card theft case has been made
useless. There was a breakdown in the chain of custody, which
basically makes the data/disks/logs useless. There were no
immediate comments from the companies involved (Network
Associates, Kroll O'Gara, and Infowar.com... oh my!). Also
mentioned in the article was Cybercash and their ICVerify card
processing software. ICV default install isn't very secure.
Many merchants don't realize that, leaving themselves open to
attack.
If you're at all involved in the security
world, I highly recommend Investigating
Computer- Related Crime a Handbook for Corporate
Investigators by Peter Stephenson. One of the many
points he discusses is chain of custody; what it is, how to
maintain it, and how important it can be. I'm sure the guys
from NA/KG/IWC were familiar with these topics, but mistakes
are still made. Read the book and you'll have a better chance
if/when you take some 3l33t h4x0r to court. |
| Privatization of NSA |
Jun 7, 2000 |
| gdead |
| First the CIA starts a venture capital firm, now
the NSA has
announced it will privatize many of it's non-spying
computer operations. According to CNN, the NSA is making this
move to be able to better adapt to the changing technology
world as well as to save money. The NSA projects a savings of
USD1 billion over the next 10 years. Several private sector
consortiums will bid on the project, which is to be awarded
next April. There is no word as to what companies are
involved, but the contract is worth an estimated USD5 billion
over the next decade. Don't government contracts go to the
lowest bidder? I'll do it for 10 bucks if I get free access to
Fort Meade. :) |
| A Virus a Day Keeps the Readers at
Bay |
Jun 7, 2000 |
| gdead |
In the wake of the ILOVEYOU virus, the mass
media has caught virus fever. The lastest warning,
released today, indicates that our cellular phones and PDA's
are now under attack. Apparently a new virus released in Spain
will randomly send messages to alpha-numeric cells. There are
no confirmed reports of the virus actually sending any
messages. It appears that it was detected before it could get
that far.
So, another virus story that spreads across
the media channels like wildfire, and the only damage done is
through the hype and hysteria the stories cause. There have
been several love bug variant reports that had the same
effect; minimal actual damage done to networks, but massive
coverage and public disinformation. I think that the news
networks are afraid that the next virus that comes across the
wire will be "the big one" so they better report on it (for
fear someone will beat them to it). Until that mentality dies
down due to too many Wolf calls, be ready for more false
alarms and FUD. |
| The Wine's out of the Bottle PGP 7.0
|
Jun 6, 2000 |
| ktsolis |
Last week, someone on the PGP 7.0 Beta program
posted the software to alt.security.pgp, and now it's made its
way to here.
PGP is most likely peeved at 7.0's early vetting, but what
sane company *wouldn't* want more free security-savvy beta
testers for a security product? Caveat Emptor: this is a
beta product and should not be considered secure. Those who
find problems with the beta are welcome to forward your
findings to TSG, and we'll
help directly filter your concerns to the PGP Team. |
| Microsoft Firewall (not a joke)
|
Jun 6, 2000 |
| gdead |
According to a story
on TechWeb, Microsoft announced today a combined
firewall/cache product called Internet Security and
Acceleration (ISA) Server 2000. The new server is part of the
Windows
DNA platform, apparently a nanotechnology MS is going to
use to Borg-ify the planet (much like all of this year's TechEd
attendees). Unfortunately, I've been really impressed with the
*2000 suite of products. Windows 2000 has a lot of potential.
They're on the verge of _figuring things out_. Maybe their
firewall will be worth while. Let's hope there aren't any root
(aka: Administrator) level sploits ala Gauntlet.
I
wonder what easter egg they'll bury in the firewall... |
| HavenCo Media Blitz |
Jun 5, 2000 |
| pablos |
| HavenCo
announced their existence to the world this weekend and have
succeeded in drumming up a full-on media blitz. Even I was
interviewed (Check out KRON Channel 4 in
San Francisco tomorrow night @ 6:00 pm (GMT-8)) for a
shmoo sighting. They'll undoubtedly clip my comments to the
most outlandish 3 words they can find. Anyway, their PR frenzy
running ragged, and they should be on the cover of every major
British paper tomorrow morning. Look for an exclusive cover
story in the next Wired.
My view? HavenCo is history in the making. These guys are
going way out on a limb to provide the foundation for
unadulterated application hosting on the internet. If you've
been griping about the taxes, crypto restrictions,
surveilence, regulation, or general big brothering anywhere in
the world, you have no excuse anymore. Deploy your
revolutionary app at HavenCo and take a chance
that it will work. |
| Real Datahaven to Open in an Unreal
Country |
Jun 4, 2000 |
| gdead |
| In 1968, a retired British army major named Roy
Bates took over an anti-aircraft bunker 6 miles off the coast
of England and declared it a sovereign nation. He called his
new country "Sealand" (like the trucking company that hauls
killer whales and dolphins all over North America), and has
yet to be confronted by the British. 32 years later, Mr.
Bates' "country" is making waves again by being the location
of the Internet's first data haven (paging Mr. Stephenson...
Mr. Neal Stephenson). According to this article
over at the NYT, HavenCo
will be opening its doors tomorrow for uber-secure colocation
and data protection. According to their AUP, kiddie-porn and
SPAM are no-no's, but everything else is fair game. But be
ready to pay the price... 1U of rackspace with a whopping 64K
of bandwidth will cost you USD1,500 a month. Look out Equinix, here
comes HavenCo. Now where did I put my passport and stolen JFK
report? |
| Is Linking to Cryptome.org Illegal?
|
Jun 4, 2000 |
| gdead |
| Inside has
a great article
on how linking to sites that post DeCSS (such as Cryptome.org) rides a fine
line between 1st Amendment rights and leaking trade secrets.
It seems silly... at least to the majority of the Shmoo.com
audience. But as Inside points out, judges in the federal
court system are decidedly not in my demographics. They're
reaching at 500 year old legal straws in an attempt to get a
handle on linking and trade secrets and journalism in the new
millenium. Due to "hacker hubris" and big money with big
lawyers, the judges are currently clamping down on sites like
cryptome and 2600. What can you do? Mirror DeCSS
wherever you can. Or, if you're like me, wear an Anti-DVD/CCA
shirt and walk around your nation's capital while you talk to
folks and get the word out... I had a fun Sunday ;) |
| InTether Unbound |
Jun 1, 2000 |
| curator
|
Keeping up with security software releases as we
shmoo do, ktsolis came upon a PR release for a company by the
name of InfraWorks,
which is announcing their new product, InTether.
According to the PR release:
"InTether protects the content of files like
.mp3, video, software or documents, allowing the sender of
information to control the recipient's use, including
printing, copying, forwarding and time of destruction. If
hacking is attempted, the file self-destructs. Just like
Mission Impossible. No other technology can do
this."
Nifty sounding stuff I suppose. Unfortunately, it's not
very new, at least as a concept. While I won't debate their
patent rights, I'm sure their implementation is unique, I
debate the quality of the very concepts behind the
implementation.
Read
on... |
| Verisign Oversimplifies Signatures
|
Jun 1, 2000 |
| pablos
|
Verisign has come up with a convoluted
scheme that allegedly makes digital signatures a cinch.
From Internet
News:
- "As enterprises move mission-critical, high-value
applications to the Internet, they are often forced to make
trade-offs between security, privacy and end-user
convenience," said Stratton Sclavos, president and chief
executive officer of VeriSign. Sclavos said the new
technology allows enterprises and end-users to bypass this
hurdle.
In case you haven't noticed, most of my postings to
shmoo.com are out of exasperation. This is just another
example. |
| ICAT..the one-stop vulnerability
database. |
Jun 1, 2000 |
| ktsolis
|
A colleague just introduced me to ICAT, a comprehensive CVE-compliant NIST database of
vulnerabilities. ICAT characterizes vulnerabilities by over 40
attributes and is linked to databases of ISS X-force, CERT,
Security Focus, NT Bugtraq, Bugtraq, and various vendors.
For those of you not familiar with the acronym CVE, it stands for
'Common Vulnerabilities and Exposures'. The CVE is an effort
to standardize names for vulnerabilites so that security
practitioners can communicate with a common vocabulary
(indeed, the CVE folks call their work a 'dictionary' rather
than a 'database'). |
| Opening E-mail will be the Downfall
of the Internet |
Jun 1, 2000 |
| gdead
|
*sigh* According to a
report on The
Standard, the FBI, DoJ, and SANS have released a top-10
list of Internet security threats. SANS has also independently
released a top-5 list of mistakes average computer users make.
While I could find no trace of either of these lists on the
FBI, DoJ, or SANS websites, I'll take The Standard's word on
this. According the top-5 list from SANS, the biggest mistake
average computer users make is... *drum roll*: "opening
unsolicited e-mail attachments without verifying their source
or checking their content" This kind of deviant behavior
resulted in the ILOVEYOU virus causing USD6.7billion in damage
worldwide. ... right... and I'm a closet Ultra-right wing
conservative with NRA stickers all over my car. I'm quite
curious how that number was computed.
More to the
point, I think the biggest mistake users make is using a mail
client that allows scripted languages to run automatically and
unchecked leaving their personal workstation crazy vulnerable.
Call me nuts, but I'd say the majority of this isn't the users
fault. |
| Isn't Technology Wonderful? |
May 31, 2000 |
| rodney
|
| I'm sitting in the Seattle Tacoma Airport. In
the Borg Bar. I kid you not. "Yes America, there is a real
C.J.Borg. ... he's a longtime general manager of operations
for Host Marriott Sea-Tac Airport." I see across the hall the
Massage Bar. Nothing X-Rated, but it's those massage chair
thingies like they have at trade shows. And, of course, I'm
sitting here sipping an Alaskan Amber and using my wireless
Internet connection to surf the web, from a virtual machine
running Windows 98 inside my Linux partition on my notebook
PC. Sometimes you have to marvel at the level of technology we
have around here. Now, of course, it could be better. They say
the next generation of cell phone will be the size of the stem
of a wine glass. This will lead to the ultimate in Californian
connectivity, the combination wineglass-cell phone. Consider
this. Virtual Vineyards, the grand old web site of the digital
certificate world (they had the first VeriSign commerical cert
for credit card processing) has renamed themselves wine.com.
But, they are now also offering real wines. What does it mean
to have a real wine from a virtual vineyard? I bought a bottle
of this (over the web of course) and the bottle was quite
normal looking (not worth $12, but hey, this is internet
commerce...) The front was a normal looking label. The back
was an exact copy of the web page describing the wine. This
leads to our next technological prediction. Add a simple
wireless internet access capability, some sort of touch screen
like on the handhelds, and you would have the combination wine
bottle/web browser. |
| CERT Says the Strangest Things
|
May 31, 2000 |
| gdead |
For the last few years, I've attempted to find
rhyme or reason to advisories that CERT releases. They seem to
"advise" us on some rather silly things, such as Inconsistent
Warning Messages in Netscape Navigator, but totally miss
other serious security concerns (IMAP buffer overflows come to
mind). According to CERT's FAQ:
B1. What is a CERT advisory? What alerts does the
CERT/CC send?
A CERT advisory is a document that
provides a description of a serious security problem and its
impact, along with instructions on how to obtain a patch or
details of a workaround. What's "serious" and what's
not is usually up for debate. Don't get me wrong, I think CERT
provides a valuable service, but sometimes their decisions are
a bit strange. In that vein, yesterday CERT released an
advisory on a flaw
in PGP v5.0 key generation. Basically, if you create a key
in PGPv5.0 in a non-interactive fashion on a machine with
/dev/random, PGP will produce a predictable key.
"Non-interactive" in this case means you typed "pgpk -g [DSS or RSA] [key-length] [user-id]
[timeout] [pass-phrase]" to create your key. I imagine
the number of people that used PGP in this manner to produce
their key is astronomically small... call me a cynical. |
| Info.sec.radio.erotic.crypto.girlfriends
|
May 30, 2000 |
| gdead |
| Info.sec.radio is a live bi-monthly radio
broadcast (on the airwaves and on the net) sponsored by SecurityFocus. The
most recent
edition is quite good. It includes an indepth discussion
of power grid security problems as well as an interview with
Bruce Schneier of Counterpane fame. So,
fire up RealAudio (don't forget to uncheck all the "feedback"
mechanisms they have) and listen in. |
| More Number Station-y Goodness
|
May 27, 2000 |
| gdead |
NPR's All Things
Considered did a piece on Number Stations on
Friday. I didn't hear it, but from what I've read in the
Slashdot discussion
it was quite good. During the broadcast, a new number station
contest was announced
by the Conet Project. The contest (unlike the TSG contest) uses real
clips from number stations. I'm not sure what the prize is (I
can't find reference on their webpage) but it better be good
since solving their contest may be impossible. Most folks
assume that number stations broadcast using one-time-pads,
which if true, would make this an exercise in futility.
Course, who knows, maybe they're using 40-bit encryption due
to export limitations of shortwave transmissions. ;)
On a different note, there is one week left in the
current number station
contest that we're running. Curator's last clue makes
solving this one much easier, but I'll up the ante anyway.
I'll toss in a 2nd DVD ("Omega Code") for the winner. So, tune in and get
cracking. |
| Kevin Poulsen groks NIPC |
May 26, 2000 |
| ktsolis |
| In this Security Focus
article, Kevin Poulsen gives an interesting historical
perspective on critical infrastructure protection and the
National Infrastructure Protection Center's efforts to protect
the North American power grid. |
| EFF Comments on DMCA and CSS |
May 26, 2000 |
| gdead |
OK, I've become a Cryptome.Org junkie again.
John Young keeps a great handle on the legal/fringe stuff, and
the site is definately worth checking every few days.
Today he's posted EFF's comments on the
DMCA and CSS for the Copyright Office. It is probably the
best explanation of what's wrong with the DMCA in
respect to the "copyright control" CSS offers. Some choice
quotes:
- CSS together with the web of laws and contracts
around it also eliminate the individual's ability to make
noninfringing copies of DVD images
- EFF is not spending years in court merely to exonerate
one or two individuals, or to enable distribution of a
limited software prototype. We are here to establish the
principle that the anticircumvention provisions cannot be
used to eliminate fair use broadly throughout society.
- While the industry has loudly over-stated any potential
harm it might face resulting from digital technology, it
quietly looks the other way without mentioning the
unprecedented power technology provides to copyright holders
to control access and use over creative
expression.
The doc is a bit long, but well worth
the read. BTW: Check out EFF's
website. They've redone it and it looks waaay better than
before. |
| Mitnick Setting Sights Higher than
Arby's |
May 25, 2000 |
| gdead |
Part of Kevin
Mitnick's probation is a gag order that prevents him from
consulting or advising anyone "in any computer-related
activity." Since computers are all Kevin is really skilled in,
his probation officer suggested he go work at Arby's. But
according to a story over at
Cryptome.org, he will be attempting to "clarify" his probation
in an attempt to get on the lecture circuit.
Kevin
initially started the clarification process using his pro bono
lawyer, Sherman M. Ellison. But shortly thereafter, he was
joined by Floyd Abrams, the 1st Amendment lawyer who became
famous in the Pentagon Papers fight in 1971. Mr. Abrams is
being paid by a NY publisher by the name of Steven Brill
(Brill? like the guy in "Enemy of the State"). Ahh... a
publisher. That's the catch. In exchange for such a high
powered lawyer, Mr. Brill would like Mitnick to write a column
for his soon-to-be-released eCommerce website,
Contentville, with a possible eBook deal in the future.
As a side note, I'd like to point out that, IMHO,
"Contentville" is one of the dumbest names for a website I
have ever heard of. I'm thinking of registering Newsboro.com
for my new news site, and maybe even Porndale.com the Shmoo
pr0n site. |
| FBI Files Online |
May 24, 2000 |
| pablos |
FBI files not linked to an active crime
investigation are public record since the Freedom of
Information Act. I looked myself up and was surprised to see
that they not only had my file but they also have a fairly
recent color photo of me! Do you have a file at the FBI? To
know, check
this web site.
Pablos with a script kiddie FBI
file? oy, who knew? ; ) On a serious note, what is
theCenter2000.com? I'm a little dubious about not only telling
them who I am but also giving them access to my FBI file..
-ktsolis |
Rant: Getting the Evil out of the
Empire. Low stock prices may help. |
May 23, 2000 |
| dustin |
| As a person who has several contacts in the
trenches at Microsoft, I have a unique opportunity to see
inside the belly of the beast. The current saga with the
Justice Dept. has led to a lot of cheerleading inside
Microsoft. A lot of "Hurray for our side" type stuff (and
outside as well). All of this posturing really has a net zero
effect on productivity. It just changes the text of
conversation at the cafeteria and in the halls.
What really makes a difference is the people. In every
endeavor there are two kinds of people who can get involved.
There is the kind of people you want to work with. You know
them. They share your values and your views on software
construction. They like lunch at the same place you do and
they make your job as fun as it can be. When you are on a team
with them, you feel like there is nothing you cannot do.
Then there are the ones who you would shoot if the
president gave you a card good for one free murder. These evil
beings suck your moral and cause the boss to make poor
decisions based on their faulty, but insistent input. They are
the albatross around the neck of your project.
Granted, these are polar opposites and most people fall in
a continuum along the axis rather than at the extremes.
However, the more people you can get from the good side and
the fewer from the evil side the better.
The people from the good side have thoughts like these:
- If I spend another two weeks with this code Version 2.0
will be a breeze.
- I need to get with the other programmers on this project
and think this through.
- Most meetings are a big waste of time.
- The testers found 3 bugs in my last section of code.
time to re-write.
Evil people think this way:
- If I only spend a week with this code I will be rewarded
for pumping out features.
- The other programmers on this project are not as smart
as me. their input would be meaningless.
- I want to go to another meeting so I can prove I am
smarter than the others.
- The testers are picking on me. That's not a bug a real
user would ever encounter.
In a small startup, you recognize the evil people, route
around them, and then fire them.
Microsoft has been a victim of it's own growth. It has a
large number of people and quite a few of the evil ones snuck
in while uncle Bill was not looking. It's all but impossible
to fire a developer. The best you can do is shuffle them off
to another group.
There are very few groups without some number of the evil
people. Once two or three evil people get together they
multiply their evil ways and tread all over the good. I
personally think most of the things we think of as evil that
Microsoft has done is due, in no small part, to this
contingent of bad advisers and cowboy coders.
Microsoft's history of surging stock prices has made it so
these people never want to leave, even if they are hated. Some
of them even like being hated. (The computer industry is rife
with people with strong and unusual personalities.)
The only good thing about these people is that they are
rigorously self-centered. If they think the ship is sinking,
they will desert like the rats that they are. It has already
started to happen. A few more weeks of dropping or neutral
stock performance will further weed out these losers.
In the short term Microsoft will perceive a labor shortage
and may make the mistake of making it attractive for these
folks to stay around. The people they really want to keep are
not going to be scared off by a month or two of low stock
prices.
In the end, if they can manage to let the jerks leave and
not let them back when things improve, they will be left with
a better balance of good to evil. Their products will improve
and consumer/investor confidence will rise once again. It
will, however, take months and years to show the fruits of
this culling.
With any luck Microsoft's new tag line this summer will be:
Microsoft, now with 50% less evil!
|
| Liftware - "The Real Thing at an
Unreal Price" |
May 23, 2000 |
| pablos |
| Apparently I've found my way onto every fringe
wacko spam list there is. Liftware appears to be an
online software site in Armenia where you can buy the latest
Windoze software at prices that are a steal (literally).
Autocad 2000 $375, Office 2000 $125. Besides the name, check
out some choice lines from their FAQ: "Each cd is custom
made," "Do I have to use my 'real' e-mail address? No you
don't." |
| When Firewalls Become More than
Firewalls... |
May 22, 2000 |
| gdead |
Trouble with a capital "T" can happen. For a
long time, the term "firewall" implied that you had a program
or device that could filter on layer 3 and 4 information. As
time went on and the firewall business became more
competitive, companies were quick to add more bells and
whistles. From integration with IDS' to layer 7 inspection and
redirection, firewalls now have feature lists that span
multiple glossy pages on tables at trade shows.
Well,
it seems that this rapid feature creep has finally caught up
with NAI. Today they announced
a root level compromise in their Gauntlet Firewall (billed as
the "World's Most Secure Firewall"). The hole is caused by
NAI's integration of CyberPatrol, a
content-filtering-pr0n-prevention program, into Gauntlet. The
culprit is of course a buffer overflow that allows you to
execute shell code at the access level of the firewall, ie:
root. This is a Bad Thing(tm). Some companies' only protection
against 3l33t h4x0rs is their firewall. Now any script kiddie
on the planet can turn a Gauntlet firewall into a jumping off
point for further attacks into the protected network and
elsewhere on the net. w00t! |
| Re-Selling MS Software: Mission
Impossible |
May 20, 2000 |
| gdead |
There's a great discussion
over at Kuro5hin.org
about eBay
shutting down legal sales of Microsoft software. Even
though MS's license clearly states the terms that you can
resell their software after purchasing, apparently they don't
really intend to allow people to actually sell it. eBay's privacy
policy even gives eBay the right to give all information
about potential buyers and sellers to MS. Microsoft as been
contacting all parties involved in the auctions and informing
them that their eBay auction is illegal and will be shut down.
Go-go-gadget-monopoly-power.
As a side note, eBay is
Trust-e and BBBOn-line certified. As we've seen time and time
again, all that means is they have a privacy policy. It makes
no claim as to what the policy is. They could state that
they're going to sell all your information to the highest
bidder, and it makes no difference as long as it's fully
documented. I'm kinda speechless after reading all this stuff.
It's basically a full violation of consumer trust on every
angle. |
| The highest level domain.... .god
|
May 19, 2000 |
| ktsolis |
Joe Baptista, an Internet Sandinista, has reportedly
created the .god domain in response to malodorous
ICANN/NSI policies. Choice quote: "Host names should be
permanent. They define resources--and not legal jibberish.
Legal jibberish can change anytime a judge farts. And we find
that sort of thing to cause a certain amount of instability in
the net and a bad smell to boot." |
| Evilness Comes to a Paperclip Near
You, or Eeww... Do You Know Where That Paperclip's Been?
|
May 18, 2000 |
| curator |
| I always thought those damn talking paperclips
in Microsoft's Office software were evil. Little did I know...
MS
has released a patch to Office 2000 that fixes a
demonstrated hole in the Office Assistant discovered by the
folks at @stake.
The fault lies in an undocumented ActiveX control (read:
eeevil) that allows malicious documents (local docs,
spreadsheets, html docs, blah, blah, et al.) to use it to
change numerous Office and IE settings, most notably the
changing of macro security settings. Having stuck a nail
through that prophelactic, we can only imagine what kinds of
nasty diseases the malfeasant code could give us. There is a
demo of the 'sploit at @stake. |
| Network Solutions in the Doghouse
again |
May 18, 2000 |
| ktsolis |
If NSI decides that your domain is being used
for "any improper purpose", they may terminate domain name
registration services at will, according to a Cnet
report. Anyone up for defining "improper purpose"? Don't
bother--NSI is the one and only arbiter here per their latest
service agreement. In the Domain Name Buyer's Guide's legal
ranking, NSI earned an execrable one out of five stars. The Guide
explains how you can easily move from NetSol to another
registrar. |
| Wheelbarrow of Kerberos Sploits
|
May 18, 2000 |
| gdead |
| A CERT advisory
released yesterday outlines potential vulnerablities in 6
programs in the MIT Kerberos distribution. The long and short
of it is if you've compiled Kerb5 with Kerb4 support, you've
got some _huge_ holes to drive a hacker through, including the
ability to remotely gain root level access on your KDC. Kerb4
(almost all rev's) is vulnerable as well. There are patches
available, so get them while they're hot. |
| Mindrover, Guerilla marketing at
work. |
May 17, 2000 |
| dustin |
| I have lost several evening recently to a game
from CogniToy called Mindrover. The premise of
the game is cool. You have a small robot vehicle and a mission
to complete. You wire up the robot and away it goes. Users can
trade bots easily. Whats cooler yet (at least to the Shmooey
part of me) is the marketing campaign. It's user driven. They
have been to a few trade shows but no big ads anywhere. They
concentrate on programming. I wish them luck and I hope other
companies are able to use this model as well. I hate flashing
banner ads. |
| OpenSSH 2.1 is out |
May 17, 2000 |
| grendel |
Well, I normally don't like to post software
releases to this section, but OpenSSH is just too cool to
ignore. It's been out and available for awhile now, but the
2.1 release includes some nice features, like it now supports
both ssh1 & ssh2 protocols, in one nice neat package.
From the keyboard of Theo: "the portable release of it
is coming together. as you might expect, openbsd 2.7 (shipping
soonish, like in 4 weeks or so?) will contain it. ie. patent
free ssh."
If you don't already use ssh, get a clue,
go get it, turn off telnet. |
| For you poor souls that have to use
Outlook at work. |
May 16, 2000 |
| jpm |
| Microsoft has announced
that an Outlook security
patch is in development. One of the things I find interesting
is that you won't be able to receive executables anymore.
You know, I just wish that they would admit that an email
client that opens messages without your interaction was a
bad idea. |
| May Cryptogram Newsletter Available
|
May 15, 2000 |
| curator |
| Mr. Schneier has put up his monthly
newsletter this evening. This month, there's a general
rant about the bass-ackwardness of trying to cure all our
information security problems with magic bullets
(applications, devices, chicken sacrifices), rather than
treating it as an overall process of risk abatement. He even
uses the oft stated (I'm sure I've heard it at least once or
twice before), "Security is a process, not a product."
You'll also find notes on the International Cybercrime
Treaty, the damnable ILOVEYOU bug/virus/feature, trusted
client software (an important part of several engineered
obselesence/EOL/limited lifetime usage apps), and Microsoft's
lame attempts at Kerberos standards obfuscation.
Happy reading. |
| 3 Year Comparative Study of BugTraq
Vulnerabilities |
May 15, 2000 |
| grendel |
The hepcats over at Security Focus have
compiled an interesting 3 year statistical comparison of
vulnerabilities posted to BugTraq.
"Ever wanted to know which operating systems and
applications have the most reported security vulnerabilities?
Are there more known vulnerabilities in Windows NT or Linux?"
Check out the BugTraq
Vulnerability Database Statistics now. |
| Online Voting is a Bad Idea |
May 13, 2000 |
| pablos |
| Just twiddling a few bits could mean the
difference between democracy and a h4x0poly! (I don't mind
losing to Cindy or John, but Bob's gonna have to fight me for
it.)
Update: Never fear readers, it seems a good dooer
has quelled the ego of our most fair and beloved pablos. We
trust he shall take this in good stride. |
| Cybercriminals on Americas Most
Wanted |
May 13, 2000 |
| gdead |
So I was sitting around watching America's
Most Wanted tonite (don't laugh... I'm currently living in
a basically empty apartment with a 7" TV and no cable and only
one computer... not much to do) and they had a little special
on Cybercriminals. The high points:
- The Melissa virus caused in excess of $80MM in damage
- AMW intervied FBI Director Freeh *giggle* a _real_
meeting of the soundbites. Both sides tried to sound
dramatic and apocalyptic, but it came out sounding vague and
uninformative.
- Terrorists all over the world are storing their evil
plans on the internet for all to see and duplicate
- They added the h4x0r's that helped mafiaboy in the Feb
DDoS attacks to their Most Wanted List. Feel free to
call them or visit their website if you overheard
mafiaboy and pals in your favorite yahoo chatroom.
NOTE: As of 10:45PM EDT, AMW's site is unreachable
(as well as other sites in the Teleglobe network). Must be a
DoS from all the folks sending in leads on where to stick
it.
|
| Foreign Agents Free to Roam State
Department |
May 12, 2000 |
| grendel |
| This is too much, considering the current state
of security affairs in the State Department and a number of
other high-profile government agencies.:) Apparently FBI section chief Timothy
Bereznay has stated information that leads to the
conclusion... *drum roll* foreign agents (aka spies:), under
the guise of "news correspondents" were allowed to roam the
State Department unescorted. Theres some discrepancy about the
FBI actually knowing that said "news correspondents" were in
fact spies, and did not notify the State Department. Funny:)
Theres some great comments from FBI and State Department
personnel pointing fingers in the article
from USA Today. |
| MegaCar! |
May 11, 2000 |
| grendel |
Okay, this isn't exactly security news, but I
can justify anything.:) This makes me feel a bit like Michael
J. Fox in "Back to the Future".
Marty McFly:
Wait a minute, Doc. Ah... Are you telling me you built a time
machine... out of a DeLorean? Doctor Emmet Brown:
The way I see it, if you're gonna build a time machine into a
car, why not do it with some style?
In other words,
every geeks dream car.
Mobile security command center anyone? It's 150 kbit/sec
connectivity is provided by multihoming 16 GSM modules, an
interesting method put together by security company, Data Protect AG. Be
warned, the site is heavy on Flash. |
| Get Shorty |
May 10, 2000 |
| grendel |
There are a number of interesting items in the
news today, believe it or not, a couple of them are from Wired.
Token security
summit stresses education, no standards, and open
communications. A number of ecommerce "players" got together
to discuss security recently, with apparently not much
valuable out of it except a commitment to share info... well,
its a step.[ARTICLE].
Who Loves Ya Baby? Some uncredited person thinks that
"the author is a member of the 'GrammerSoft' hacking group,
which has links to AMA Computer College (AMACC) in Manila."
C'mon, the number of theory's at this point is comical. [ARTICLE]
In an interesting, but not entirely ingenious move,
Australian "CrimeNet" publishes australian criminal records
online. According to them business is booming, demand for this
sort of service is extremely high.[ARTICLE]
On an unrelated to security note, more in the vein of
personal rights issues... Napster, in the course of
getting sued by butt-rockers Metallica has suspended 317,377
user accounts, heres the
statement. Of course theres nothing physically preventing
all 317,377 users from signing up all over again.
Finally, for your viewing pleasure, satellite photo's
of Area 51:). Theres apparently been some controversy over a
number of imaging companies publishing photos of the supposed
Black Ops base. You can see them at http://www.terraserver.com/
and http://www.spaceimaging.com/.
|
| ILOVEYOU....not? |
May 8, 2000 |
| ktsolis |
The FBI and the Philippine National Bureau of
Investigation rebuffed the amorous proclamation and have arrested
a man suspected of being the ILOVEYOU virus author. Law
enforcement officials pinpointed the suspects last Friday but
were unable
to find a judge over the weekend who would issue a search
warrant for the Manila apartment. The NBI aired the
possibility that the suspect might simply be the
victim of an infected computer. |
| Final Hint For Number Station Contest
#3 |
May 4, 2000 |
| curator |
| Well, here it is three weeks later, and yet
still no solution to the cipher. This will
be the final hint for this contest. Next week around this
time, there'll be a new cipher (perhaps a bit easier), but
until then there's still a Contact
DVD up for grabs.
Third/final hint: Whilst digging around in the binary
representation of the world of our message, think about
ASCII and how it's represented at the binary level. And
think about how many bits are in the regulation ASCII set,
excluding any of the extended non-standard set.
Now get cracking.
|
| Have they ever heard of PGP? |
May 3, 2000 |
| rodney |
| The UK government has announced their intent to
require links from all ISP's to MI-5's headquarters for email
monitoring, according to news reports.
John Gilmore once said "The Internet treats censorship as
damage, and routes around it." One wonders also if they've
ever heard of PGP or IPsec or other encryption technologies,
all of which are available in Europe, thank you very much.
The member of the long-lost southeastern shmoo sub-clan
would like to thank the shmoo elders for inviting us to this
site ;-) |
| Phrack 56 is all GUI |
May 2, 2000 |
| gdead |
Phrack 56 is at phrack.com. One would hope
that the huge delays between the recent phrack's would greatly
increase their quality... but alas, I don't think it's true.
P56 is better than the last few, but not as revolutionary as
the orginals. And it's all GUI and I think I got some on me
(they have a SecurityFocus.com ad on the main page).
On a side note, you may have noticed my absence from
the shmoo.com lately. I'm currently on a cross country trip in
my truck to a new and wonderful job on the right coast. I'm
in a hotel off of I-90 in Idaho right now, and hope to come
out of warp in Virginia in about a week. Wish me luck :)
|
| A Short In the System |
May 2, 2000 |
| curator |
| What passes for news from around the 'Net:
The Seattle Times has an
article that apparently attempts to educate users about
the insecurity of their e-mail. Unfortunately, it's a
lackluster attempt that fails to educate the user, and even
leaves the user with the sense that everything is just fine,
unless you're famous. The upshot is that your e-mail is safe
with your ISP and eveywhere else because it takes too much to
time to read everyone's email. And besides it's bad business,
unless you're famous, then you have something to worry about,
but can fix it, not by using PGP (or GPG, or any semi-standard
solution), but by using some ginchy bit o' software from Cypost. Insert
dumbfounded stare here. This is the "meat" of their
article. These people can't be on the same plane of existence
as the rest of us. In an article entitled "Internet security:
Just how safe is your e-mail?", you'd think they'd actually
have credible "experts", and some information that users would
find useful. Perhaps they'd tell people about corporate e-mail
problems and solutions? Encryption standards? The law, maybe?
And to make things worse, they say it will be even less of a
problem in the future, because there'll be even more e-mail,
making it more difficult to browse. Whatever. With information
like this spreading around to the general public, it's no
wonder the average user doesn't realize the true insecurities
of e-mail. Argghhh!
ZDNet has
an article about another company proposing to make money
from tracking everywhere users go and feeding the boiled down
version of it to merchants. The company actually believes that
a lot of people will willingly download their software (or
free ISP's will require/bundle it), install it, and allow
themselves to be tracked, cataloged, and spammed. Apparently,
the software also allows the company to track all form
submissions, but haven't decided whether they're going to
implement that feature yet. Yeah, that's just what we need.
Hook me up.
Ok, that was only two of them, and they weren't exactly
short, but ... |
| Number Station Hint #2 For Contest #3
|
Apr 27, 2000 |
| curator |
| Two plus weeks into the excitement that is the
third TSG number station contest and still no winning
solution, so it's time for the next hint. Keep listening and
remember that there's a Contact
DVD in it for the winner.
Hint: While delving deeper into the base of the
numbers that are broadcast, and the different way those same
numbers may be represented, think strings of
binary. |
| Is That Your Quanta I See Before Me?
|
Apr 27, 2000 |
| curator |
| According to a recent update of American
Institute of Physics (AIP) Newsletter, three separate
institutions have demonstrated the use of entanglement-based
quantum cryptography to encrypt data over long distances and
at faster speeds than achievable with non-entangled
cryptography. Researchers tested several features of this
"most foolproof" quantum cryptography yet, including
simulating a snooper in the loop.
Pretty darn cool stuff all things considered. No word of
when I'll be able to attach an add-on unit to my Palm though.
|
| Biometric Use Report Released |
Apr 26, 2000 |
| ktsolis |
| International Biometric Group has published a report covering
trends in use of biometric identification and authentication
systems. Finger-scanning wins in the biometric popularity
contest at 34% market share, followed by hand geometry (26%),
facial recognition (15%), iris and retina scan (11%), speaker
verification (11%), and signature verification (3%).
pablos: Sadly, these guys are not Brothers in Arms. Choice
quote from their site - "The future will be brighter when the
privacy paranoia fades." |
| Patches are More than Just an Early
80's Fashion Statement |
Apr 25, 2000 |
| pablos |
| If you use RedHat, get
this patch which supposedly fixes the "Piranha" exploit.
|
| Palm VII banned from National Lab
|
Apr 24, 2000 |
| ktsolis |
| The San
Jose Mercury News reports that Palm VII's have been banned
from Lawrence Livermore National Labs. This isn't so
surprising; after all, this is the same place where workers
and visitors reportedly slip their batteries out of their cell
phones when they enter secure areas. No news on whether
Ricochet is banned though : ) |
| ZDNet Town Hall Redux |
Apr 21, 2000 |
| ktsolis |
| On Thursday morning, ZDNet held a Town Hall
meeting to discuss cyberterror and possibilities for
government/private sector response.
Though this meeting to foster public discussion of a public
problem was itself semi-newsworthy, the government did not
unveil any new proposals. Jeffery Hunker, a White House
advisor on threats to critical infrastructure, briefly
outlined elements of the Clinton administration's National
Plan for Information Systems Protection
(http://cryptome.org/cybersec-plan.htm) -pointedly labeling it
'Version 1.0'.
One law enforcement official slipped out the back,
exasperated at the number of policy wonks in the room.
Hacker-turned-government advisor Mudge didn't show, but Gregor
Freund of Zone Labs took his place as the technology expert on
the panel.
Hunker stressed that though we have not yet seen instances
of cyberterror, we should be concerned that China, Russia, and
other countries are developing CNA (Computer Network Attack)
capability, and that we need to take a proactive stance to
protect critical infrastructure. Hunker and the other
panelists discussed the need for public/private collaboration
to secure the Internet, yet they emphasized that individual
citizens must take responsibility to protect themselves.
Members from the audience proposed that government should
have a federal 'sandbox' where hackers can legally play-after
all, not all 15-year olds can afford a security lab. Hunker
seemed interested.
More
information on the Town Hall meeting from ZDNet.
|
| All This for a Portscan? |
Apr 20, 2000 |
| gdead |
FreePaul.org
has been doing the rounds on all the security sites. Quick
overview: Paul (from "FreePaul" and a student at CalPoly) used
computer on a CalPoly network to portscan a host outside of
the CalPoly network. He claims the portscan was lawful and
part of his job as a sysadmin at a local web development shop.
CalPoly contends he was violating their AUP and California
law.
As Paul's website asks, "why should you care?"
Well, because it's damn funny. First of all, Paul has given
very little justification as to what he was actually
doing (portscanning a cable modem, over and over). His defense
is based completely on legal loopholes in CalPoly regulations
as well as exploiting the misconduct of CP administration. His
site is huge, and contains very little technical information
and is mostly pages and pages (and mp3's) of dealings with
CalPoly's administration. At this point, he's made the entire
CalPoly Judicial Affairs division look like the Keystone Cops
and himself the oppressed, poor, knowledge-hungry college
student. Regardless if he had bad intent or not, I think he'll
get out of most of the charges simply because he was able to
confuse the issues beyond recognition. After college, I hear
he has a job with Johnnie Cochran.... |
| Number Station Contest Hint |
Apr 19, 2000 |
| gdead |
Well, it's been about a week since we posted the
third number station
contest, and we still don't have a winner. Looks like curator made a good
cipher. Maybe too good, but we'll see. ;) I'll throw out a
hint once a week until it's solved to help folks out. There's
a free DVD in it for you, so get cracking.
Today's
Hint: Don't think of the numbers in decimal or octal
notation. Dive deeper.
Hope this helps. email tsg@shmoo.com if you've solved
it. Good luck. |
| From the Mouths of Anti-Virus
Vendors... |
Apr 18, 2000 |
| gdead |
This is a snippet from a discussion
on Silicon.com about
hiring hackers to do "real" white-hat security work:
Graham Cluely, senior technical consultant at
anti-virus vendor Sophos, said the group [hackers] may find
it hard to be accepted in the marketplace. He said: "They
may find they need to act in a more corporate way."
"Who is going to buy software from someone who hides
behind a pseudonym like 'Shrieking Radish' or 'Colostomy
BagBoy' rather than a real name?" Cluely added. bash-2.02$ egrep radish /etc/aliases
shriekingradish:gdead bash-2.02$
[Barry
White voice]Oh yeah..[end Barry] From now on, I will be known
as ShriekingRadish... email me at ShriekingRadish@shmoo.com
May all your salads be eaten out of black hats. |
| Mafiaboy Arrested in Conjunction with
DDoS Attacks |
Apr 18, 2000 |
| gdead |
According to CNN
and a Royal Canadian Mounted Police press
release, mafiaboy was arrested in Canada for his
involvement in the DDoS attacks against eBay, Yahoo, CNN, et
al. There is very little information available currently, as
the RCMP has only acknowledged the arrest and said little
else. There is a press conference scheduled for 10:30a
Montreal time where the Mounties will release more information
and answer questions. We'll keep you posted on what happens,
and maybe try to send someone there.
BTW: anybody in
Montreal want to join The Shmoo Group ;-) |
| Is Open Source Software a Panacea for
Security? |
Apr 18, 2000 |
| larry |
| Elias Levy of Security Focus fame
has just posted a moderately
harsh article about the security problems Open Source
Software can have, and how they compare to the problems with
closed source software. It seems that the article has gotten
a few
people's panties in a bunch, including Bruce Perens (from
SPI, Debian and countless other OSS projects).
While I don't agree with much of what Elias Levy says in
this case, I give him the benifit of the doubt from his many
years working with BugTraq (one of the earliest, and best
respected, full disclosure security forums) that he's more
questioning people's blind faith in OSS as as oftware
development method, then then Open Source model its self.
|
| The Reason IMAP Has Not Caught
On |
Apr 17, 2000 |
| gdead |
Ask your local admin what they think of IMAP.
I'll bet dollars to doughnut's his answer will be "It's really
nice to use, and is very flexible, but it's a security hole
the size of the Lincoln Tunnel." In the past, I'd say that was
very true. For most admins, IMAP == University of Washington's
IMAPD server. It is the most fully functional, well known,
open source IMAP server out there. And it's historically been
chock full of holes. Looking through SecurityFocus'
sploits archive digs up at least 4 vulnerabilities in the last
3 years for IMAP-UW. However, in the last year things seemed
on the up and up. No new problems, and lots of new features.
One would have thought they had the code under control.
My thoughts on IMAP-UW changed drastically this week
due to a new thread on bugtraq. It all
started with yesterday's post
about a vulnerability in the LIST command in the UW server.
To: BUGTRAQ@SECURITYFOCUS.COM Subject: imapd4r1
v12.264 From: Michal Zalewski
Newest RH:
OK nimue
IMAP4rev1 v12.264 server ready 1 login lcamtuf test
1 OK LOGIN completed 1 list ""
AAAAAAAAAAAAAAAAAAAAAAAAAAA...[yes, a lot of 'A's ;]
Program received signal SIGSEGV, Segmentation fault.
0x41414141 in ?? ()
*sigh*
Privledges
seems to be dropped, but, anyway, it's nice way to get shell
access to mail account, maybe grab some data from memory
etc. *sigh* is right. A sploit to get local access of any
level is bad, esp with the number of "local root exploits"
running around that admins tend not to fix. Maybe the code
isn't as solid as I thought.
Of course, the
vulnerability gets a response
from Mark Cripsin, the author of UW's IMAP. This is where I
lose all faith in the system. I'll just quote the good stuff
and comment where needed.
As was indicated, all privileges are dropped at that
point. There is nothing that can be done by crashing imapd
this way that can not also be done (much easier) by logging
in to the UNIX shell.
This of course assumes that
the user has a shell account on the server he's getting his
mail from. I'd say that 90% of the time, this is not the
case, judging from the work I've done at ISP's and talking
with other geeks
All imapd security efforts have
been focused on eliminating root-level security holes. ...
There has not been an equivalent effort to eliminate all
possible ways to induce imapd or the c-client library to
crash when it is in a non-root state. I am not certain that
the results would be worth the effort, particularly since
there are alternatives, either one of which is sufficient to
neutralize the problem:
If you have a "closed"
system (which is the only type of system where this bug
matters), a much better solution is to insert the following
instruction in routine pw_login() in env_unix.c: if
(chroot (home ? home : ANONYMOUSHOME)) chroot ("/tmp");
Not every machine supports "jailed" processes.
And of those that do, sometimes having local privs is enough
to break out of the jail. chroot solves some problems in
normal execution, but if a program can be exploited, a
chroot'd jail may not be enough to stop the bad things from
happening
Another important measure is to use
StackGuard. I am very surprised at the implication that
RedHat doesn't use StackGuard. Is that really true?
As many on bugtraq pointed out, the whole planet
isn't run on Linux, so StackGaurd isn't always an option.
Plus, it's best to fix the whole and not rely on the OS to
catch your mistake The moral of the story? If this is
the attitude around the UW development team, keep their
software away from me. Security is more than just keeping out
root level exploits... it's a process. From the high layer
design to each strncpy, it needs to be thought of at every
level. Relying on admins to build a secure enough system to
not be compromised when your software crashes isn't the
answer. Assume the admins are monkeys and not trained in the
arts of security. Create monkey proof software.
The
really unfortunate part of all this is the IMAP-UW server is
synonymous with "IMAP" in general. If they continue to develop
insecure software, the industry will be reluctant to adopt the
IMAP protocol based on the "market leader's" performance.
Until UW gets it's act together and starts seriously
integrating security into their code, IMAP doesn't have a
chance. |
| Being Enonymously Stupid Is Still
Stupid |
Apr 13, 2000 |
| curator |
| As if the waters of online privacy weren't muddy
enough, a new website promises to rate websites according to
the quality of the privacy they ensure. This may sound all
well and good, but the ratings system is somewhat specious at
best, as stated in an article at Wired.
Enonymous's four star rating system while seemingly sending a
site's user valuable information about the security of that
user's privacy on that site can be quite misleading. As stated
in the above article, a number of sites are completely
mislabeled and poorly rated, including epic.org, eff.org,
slashdot.org, and many others. Other major sites have yet to
be cataloged/rated at all. Still others are claimed to have no
privacy policy whatsoever, when it is quite plain to see to
interested party, especially one who's supposed to be rating a
site, that there is one. Even beyond the realm of rating
what's stated on the site, what do the raters know of what
really happens to our data when it's taken? Who's to say the
rated company won't ignore their own stated privacy policies?
It's not as if it hasn't already
happened.
Some of these problems are somewhat understandable, as the
ratings are created by humans, fallible as we are; however,
given the great number of errors that exist, it is nearly
unforgiveable for a company that claims "strict, objective
criteria" and wants to make money off our privacy concerns, to
blatantly mislead the public into thinking they're the
"privacy standard". And more along those lines, how much do we
trust a company who's entire business is based upon making
money off our privacy, and who's trying sell a "wallet" and
other services that are intimately related to how customers
feel about the privacy of a site.
And then there's that insipid name... |
| Digital Signatures a Threat to
Privacy? |
Apr 12, 2000 |
| larry |
|
According to this
article on ZDNet some people think that the current laws
getting ready to be passed regarding digital signatures might
not be in the best interests of the consumer. Funnily enough
the voice quoted is that of Zero Knowledge Systems who have
recently patented a system for digital signatures which are
capable of only releasing a portion of your credentials to a
remote site.
Still I like what I've seen from ZKS so far and some good
points are made. |
| WAPtacular Security Coming To a Phone
Near You |
Apr 11, 2000 |
| gdead |
According to a buzzword-compliant report
on Wired, mobile phone manufactures Ericsson, Nokia, and
Motorola have teamed up in an attempt to make even more money.
Even though current Internet phones are relatively unsecure,
they claim to have everything under control. The 3 companies
believe that the next generation of WAP enabled phones,
complete with WTLS (SSL for cell phones) and WIM (strong auth)
will make mobile devices "the platform to bridge the
virtual and physical worlds of e-business." Silly me, I
thought my PC already did that.
As a side note, if you
want a fun way to waste a few hours, try and find an available
domain name with the term "WAP" in it. Then find one that
makes sense. |
| Internet Number Station Contest too
|
Apr 11, 2000 |
| gdead |
The first Internet Number Station contest has
been solved. It took 5 hours to fall to "cryptonalysis" (the
cipher was simply a conversion from ascii to decimal). Thanks
to all those who played and congrats to the winner.
Contest #2 is now running. A new, tougher cipher for
this round, but still very solvable. Check out http://www.shmoo.com/numbers/
for links to the new numbers. Tune in, transscribe, and win
"Pi" on DVD.
Feedback is always welcome.
And thanks for playing :) |
| Shmoo's Shorts Are Fluffy |
Apr 10, 2000 |
| gdead |
| Lots of news today worth mentioning. The Internet Number Station
started and finished it's first contest today. TrustedBSD was
announced. TBSD is an attempt to build a B1 compliant BSD
UNIX. Slashdot interviewed
Ian Clarke of FreeNet fame. Some say Ian won't succeed.
Others (namely most of the members of TSG) think he's right on
target. According to Info-War, many of US West's DSL customers
don't
set a password on their routers. The end result: 3l337
h4x0r's can take over their routers with a telnet and a smile.
Isn't the Internet great? |
| Announcing the TSG Internet Number
Station |
Apr 10, 2000 |
| gdead |
| If you're a shortwave radio junkie, you probably
already know what the term "number station" means. If you're
like me (an Internet geek who's never touched a shortwave
radio) then you may not have any idea what a number station
is, let alone why they're so cool. In short, the stations are
either a complete hoax or the cheapest, best way to send
encrypted messages to people all over the world. They've been
around since the 40's, and still no one knows exactly what
they mean. In the spirit of crypto advocacy, TSG has set up
it's own Internet
Number Station. We've enciphered a message into numbers
and are broadcasting it across the net. If you're the first to
break the code, you'll win a free DVD. The first contest is
easy, and they'll get harder as new ones start, so play early
if you don't want to think too hard. ;) |
| April 2000 Cypherpunks Mtg. |
Apr 10, 2000 |
| pablos |
| The San Francisco Bay Area Cypherpunks meeting
was held on Saturday in the sunny courtyard of Stanford's
Tressidor Union. Cindy Cohn, the attorney representing Peter
Junger in the Junger vs. Daley case, celebrated the Sixth
Circuit Court of Appeals recent ruling
that yes--source code is protected speech under the First
Amendment. The decision calls into question the Clinton
Administration's current restrictions on the export of
encryption software. Cohn discussed differences in the
Bernstein and Junger cases and answered questions regarding
the puzzling new (well, as of January) crypto
export regulations.
Many of the cypherpunk usual suspects were off attending
the Computers, Freedom, and Privacy Conference in Toronto. We
hear that they held a meeting on Saturday at the Toronto City
Hall--we imagine that we'll hear more from the cavorting
conference-goers as they straggle home.
Articles on the Junger case: CNET
& Wired
On another note, Cohn and the EFF may soon be launching BXA
Watch, a community watchdog organization that will keep an eye
on the Bureau of Export Administration. Cohn fears that the
BXA might attempt to reintroduce stricter crypto export
regulations. Stay tuned. |
| European Parliament Demands End of
Anonymity |
Apr 7, 2000 |
| larry |
|
Article Stolen from Technocrat:
According to this
article (in German but Babelfish is your
friend) the committee "citizen rights, internal affairs, and
law" of the European parliament requires an end to anonymity
on the Internet. In a report the committee also suggests that
ISPs should be forced to enable the identification of email
users and store connection data for up to 3 months.
The recommendations of the parliament are not binding
however. The council for justice and internal affairs makes
the final decision over the directive.
See also End
of Anonymity (in German too) for a more in-depth article.
|
| Census 2000 Afraid of the Internet
|
Apr 7, 2000 |
| gdead |
| Sick of hearing about the US Census? Well,
here's some info that may push you over the edge. According to
the Industry
Standard, the Census Bureau does "not feel ready to
rely on the Internet as a primary means of collection this
year". If you have the short form, 5-in-6 households do,
you can send your response via the Net. Even though the
majority of households are eligible to answer the census
online, the Bureau deliberately played down that ability.
Their primary concern was protecting the data from hackers, a
feat that the government has proven woefully incompetent. But
fear not! According to a census official, the Bureau "will
unleash a full-fledged online collection effort" for the
2010 census. |
| Oh God, Don't Encourage Them |
Apr 6, 2000 |
| gdead |
In what I think is a fit of cocaine-induced
bravado, IRCNet will be shutdown for
more than a day this weekend in order to protest DDoS
attacks. To quote the press release:
The German IRCnet operators have been forced to do this
to point out that continuous sabotage by individuals and
groups against the IRCnet infrastructure threatens the
future of IRCnet and IRC as a whole in Germany.
...
The German IRCnet operators want to show, with this
token strike, that the mindless vandalism of individuals and
groups is endangering the whole IRC community and
ultimately, the future of open Internet services in general.
If this behaviour of just a few people continues it will
gradually lead to the loss of a historic and popular
Internet culture. *sigh* They don't even need the
3l337 script kiddies to DoS them... they'll do it themselves.
I think the "popular Internet culture" is more than just open
and cooperative services. It's standing up to adversity and
overcoming the problems that are presented... not caving in to
them. By shutting there doors in protest, even for a short
time, IRCNet stops legitimate users from accessing their
service and forces them to go elsewhere. Plus it re-inforces
the folks attacking the servers, showing them that they can
get results above and beyond what there initial DoS was trying
to accomplish.
To me, this boils down to "negotiating
with terrorists," which is some thing I'm convinced you
shouldn't do. By acknowledging their existance and purpose,
you just fan the flames, and open the door to larger and
meaner attacks down the road. To all those users of IRCNet
looking for a place to go, check out NewNet, a very open and
democratic network who won't bend to hackers. |
| Enigma Thief Arrested, No Machine...
Yet |
Apr 6, 2000 |
| gdead |
| According to Wired,
a suspect in last week's hoist
of one of the world's last Enigma machines has been arrested
and released on bail. Very few details of the 50 year old
suspect have been given to the public, with no word on
possible motivations. There is a feeling that the machine is
still on Bletchley Park grounds, possibly outdoors. A herd of
British police officers have returned to the Bletchley museum
in an attempt to find it before the evil island weather
destroys it. Anybody know of any conversion kits for IBM
Selectric's so they can emulate an Enigma? |
| Cyber Patrol ban list published on
the Web |
Apr 5, 2000 |
| null |
| Get it while it's hot.
Amusing reading, to say the least. |
| Crypto Regs One Step Closer to Death
|
Apr 5, 2000 |
| gdead |
| The 6th District Court of Appeals declared
yesterday that crypto source code is a method of speech and is
covered by the First Admendment. w00t! There ruling was in
response to Peter Junger's suit against the Fed regarding his
book Computers and the Law. This ruling is also in
harmony with the 9th District's ruling in the Bernstein
case. So now with appelate courts on boths sides of the
nation agreeing crypto source code is protected by the 1st
Amendment, it shouldn't be long before all regs regarding
source are torn down... I'll buy the beer when that happens.
|
| NATO Pooches It |
Apr 4, 2000 |
| pablos |
NATO is blaming
a leaked classified document on a "virus." Apparently the
public perception of viruses being omnipotent is just too hard
to resist for media spinsters. I've never seen a press release
that said "NATO Fucked Up." The interesting part of this
article is:
- "Sources also suggest that the document was posted to a
Usenet group, but was quickly deleted by a Ministry of
Defence autobot, a software agent that autodeletes
questionable Usenet postings from the servers of
Usenet-enabled Internet service providers (ISPs) around the
world."
Sounds like Scientologists. Oh yeah, Riccochet works great
in the SeaTac airport. |
| ECC2K 108bit Cracked |
Apr 4, 2000 |
| gdead |
| After 4 months and 76% of the keyspace, the Ceritcom ECC 108bit
Challenge has been solved. The
ECDL Project will give USD8,000 to the Apache folks and keep
2K for themselves. If you're running the client, you can stop
now. The EDCL Project has recommendations for that spare CPU
time: ECMNET which
aims to find new factors of Cunningham numbers, and CABAL773,
a project to factor some _giant_ number that eats up a ton of
RAM. |
| More Info on CIA Venture Capital
|
Apr 4, 2000 |
| gdead |
| The CIA's venture capital wing, In-Q-Tel, is in
the news again. To quote the MSNBC article:
"In-Q-Tel's mission: to invest in high-tech start-ups that
will help the spy agency regain the edge in gizmos and gadgets
that it once held over the private sector." So far
In-Q-Tel has been pitched to by more than 500 start-ups, but
only invested in 8. And, not surprisingly, those companies are
security related. If you'd like to pitch your idea to the fed,
check out In-Q-Tel's website and sell your
soul^H^H^H^Hsubmit your business plan. |
| Call For Papers: ACM Con for Computer
and Communication Security |
Apr 4, 2000 |
| gdead |
| Got a brain? Want to go to Athens? Then submit a
paper
for the 7th annual ACM
Convention for Computer and Communication Security. The
con will be the first week of November, and abstracts are due
by April 30th. Topics range from IDS to steganography to
database security. So get a paper ready, talk to your
advisor/boss/figurehead and contribute something. |
| What was the FBI Thinking? |
Apr 3, 2000 |
| gdead |
| By now, I'm sure most of you have heard of the
911
virus. The FBI released a warning about the virus on April 1
(no foolin') which SANS picked up and fired out to their
lists. After reading about the "threat" this virus posed, I
wondered why such a big deal was made of this slowly
propogating, not-so-dangerous program. Apparently, I wasn't
alone. This
story from InternetNews echos some of my feelings.
Basically, the FBI cried wolf. While a program that will
randomly dial 911 and delete your harddrive at the end of the
month is a Bad Thing, this particular one wasn't really a
threat. The program replicates itself across open Windows
shares, but it's a DOS batch file that must actually be
executed in order to do it's damage. I guess it will fool the
"oh-I-wonder-what-this-program-is" crowd, but not many others.
I think someone at the Fed got a bit scared on April Fool's
and jumped the gun on this one. |
| Enigma Machine Stolen |
Apr 3, 2000 |
| gdead |
| The BBC reports
that one of the 3 remaining Enigma machines were stolen. This
one was located at Bletchley Park in the UK, where Alan Turing
did much of his work. Apparently the machine was worth
£100,000, but in the words of Mastercard, the value to the
crypto industry is "priceless". So, if someone approaches you
on the street offering a "genuine" Enigma machine, be a good
netizen... kick them in the knees, pick up the machine, and
run to Scotland Yard. |
| Hacking the MIT Tunnels |
Mar 31, 2000 |
| gdead |
| The Boston Globe has an
article on how students at MIT routinely "hack" into the
tunnels under the campus. They "hack" in the historical
terms... "interrogating the environment, and learning from
it." According to sources (my boss, an MIT almost-grad)
this has been going on for years. Lets hope the new-found
attention doesn't put a halt to this. They may be forced to
take their creative desires online and turn to the "dark side"
;) |
| If You Dare Wear Short-Shorts...
|
Mar 28, 2000 |
| grendel |
| Here's a number of newsworthy items that haven't
gotten posted, both new and old. Theres a discussion of C2
auditing of Linux Systems going on over at Slashdot. A keyboard that
has an embeded keylogger over here. Theres a
content-light article
about european scientists cracking RSA-155 on USA Today. "Melissa" (the
virus) turns 1 year old, and theres an article
over at ZDNet. Finally,
the feds want to "Change Law to Fight Cyber Crime".
Reeeeeally. I'm all over empowering law enforcement to do
their job properly, but if that entails ridiculous
broad-handed expansion of federal power in such a way that
takes away my freedom... screw that. Well, the article
is pretty light on details, but this is a thread to keep an
eye on. |
| ZixMail Replies |
Mar 24, 2000 |
| pablos |
| Yesterday, we reported that ZixMail incorporated key
escrow. Today I got an email message from the CEO of ZixIt Corporation, David Cook
claiming that is no longer the case:
- I wanted to address the "key escrow" issue that you have
raised regarding ZixMail.
The quote that you reference was from last July - when
the escrow was required for "hard" encryption. That
requirement was eliminated in December - and we do not keep
an escrow of any kind.
I would like to invite you to come to Dallas and visit
our data center. I will personally walk you through the
system design, etc...
Let me know if you are interested in coming to Dallas.
Thanks
David Cook (CEO) ZixIt Corporation
My efforts to contact ZixMail about this yesterday failed,
and I apologize for the outdated information. Hopefully
they're working on replies to our other advice:
- Open source their (crypto) code
- Embrace at least one of the existing standards for
encrypted email (PGP &/or S/MIME).
|
| IETF Rejects "Wiretapping" Proposal
|
Mar 23, 2000 |
| curator |
| In the "score one for the good guys" book, the
IETF
has agreed they should not build wiretapping capabilities
into protocols for the sake of an individual government's want
to spy on people. Among their other reasons for not
considering wiretapping:
- Given the lack of end to end protection (encryption, et
al.) of data on the Internet as it stands today, there are
plenty of opportunities for wiretapping external to any
standard.
- Providing such backdoors, may be illegal in some
privacy-conscious jurisdictions.
- Such things would greatly complicate protocols as
backdoors, and backdoors to backdoors, would need to be
created.
- The concept if foreign to their views on privacy
(RFC1984).
- The wiretapping technologies would, in their minds, need
to be documented fully, possibly negating the effects of the
wiretapping or the usage of the protocol.
Good for them! Good for us. |
| Evil ZixMail Product Launches Today
|
Mar 23, 2000 |
| pablos |
| ZixIt (Formerly
CustomTracks) today announced they are launching ZixMail, "the
New Internet Standard for Secure Document Delivery and Private
Email Communications." This is utter snake-shit.
ZixMail is a standard in no sense of the word. As The
Shmoo Group reported last July, ZixMail is Key Escrow.
They admitted to this in the following statement that can no
longer be found online:
- Second, Is there a key escrow for ZixMail?
In order to obtain worldwide encryption export approval
from the Commerce Department - for encryption that the
National Security Agency cannot break - there is a
requirement that a secure key escrow be established,
normally with a "trusted third party". This escrow can be
accessed only by court order from a federal court of
competent jurisdiction.
CustomTracks has been approved to be its own "trusted
third party". The escrowed keys, however, are encrypted by
public key cryptography and can only be decrypted by a
private key that is unknown to CustomTracks or
ZixMail. ZixIt can redeem themselves
with a few simple measures:
- Eliminate key escrow
- OpenSource their code
- Embrace at least one of the existing standards for
encrypted email (PGP &/or S/MIME).
In the mean time they can start by leveling with their
customers. I can find no mention of key escrow on the ZixMail
site. |
| Damages Due to Hacking on the Rise
|
Mar 22, 2000 |
| gdead |
| According to this
report from CNN, financial damages due to hacking are on
the rise. Surprise! Gee, with global acceptance of e-* type
business, and the millions of dollars going across the net
every day, it's not hard to believe that more money is being
lost. This article is far from informative, but is going to
help stoke the fires of the Fed and Big Business who are
looking for ways hammer down on hackers (and in the process
taking away some of our privacy). What I'm curious about is
how the increase loss to do attacks compares to the increase
in total revenues of Net companies. And maybe if someone can
show me a good way to calculate "damages due to information
theft" I'll be less sceptical of that $66MM figure. (BTW: if
you read the press
release from CSI that is the basis for CNN's report,
you'll notice that "employee abuse of Internet access
privileges (for example, downloading pornography or pirated
software, or inappropriate use of e-mail systems)" is
included in the $265MM loss due to "hacking". |
| DoveBid Adopts PGP for Authenticating
Press Releases |
Mar 21, 2000 |
| pablos |
DoveBid
appears to be the first corporation to take on a policy
of digitally signing their press releases. This is a sound
practice that should be adopted far more widely. If you need
help understanding why this is useful, read
this Wired blurb.
UPDATE: If you check out some of
Microsoft's posts
to Bugtraq lately, you'll notice they're PGP signing all their
announcements. I can't wait till they get fed up with that and
develop MSPGP... of course it won't work with any PGP in
existance, but you'll have to install it when you fire up IE6,
else the OS will cease to work. - gdead |
| Score One for the Good Guys |
Mar 20, 2000 |
| gdead |
| Thanks in part to a TSG'r, Mike, two San Deigo teens
have been arrested in a "spam and scam" ring they were
running. The teens, tracked down by Mike, the FBI, and the
Anchorage Police Dept, had been sending mail to customers of
victim ISP's asking them for their credit card number. mmmm...
social engineering at it's best. Anyhoo, they got caught.
w00t! Read more at the Anchorage
Daily News. |
| Dropping Our Briefs |
Mar 20, 2000 |
| curator |
| Saucy bits of recent news for your viewing
digestion. Both the newestCryptoGram
and SAFER
Newsletter have arrived. The CryptoGram has an article on
Windows 2000's broken Kerberos implementation, a paper on AES
performance analysis, the Virginian UCITA vote, and additional
stuff you'll be sure to devour. The SAFER Newsletter is chock
full of it's usual summary of the past month's international
security news, tools, and errata. The EU
has agreed that current US corporate self-regulation on
digital privacy meets with their approval, paving the way for
increased sharing of information between EU and US
corporations. woohoo? In it's furious and painful backpedal,
DoubleClick
has hired an "inside watchdog". In indirect rebuff to the
CEO of iDefense
(that name still makes me laugh), an
European report has recently been made public, and an
ex-director of the has publicly acknowledged that the US
through the auspices of Echelon has commited many acts of
corporate espionage.
What with all this fun, what will the coming week bring?
|
| "Hactivists" plan DDoS Web attack?
|
Mar 15, 2000 |
| larry |
|
Always having been one to be amused by the masses finding
new ways to thumb their collective noses at authority figures
I was intrigued. Distribute a client (in this case just an
HTML file) to LOTS of people and then have them use this to
take down an enemies server. They are even going to warn them
that the attack is coming.
As fasincated as I am I must admit that my first thought
was that if i was the victim I'd be covering my odds by
harvesting as much information as I could from the maruaders
to sell to someone. Surely information on people who hate you
has to be worth money to someone. Got the email address of
10,000 people who hate genetically modified food, why not sell
it to a health food chain.... or something.
More info here: Microsoft officials announced
today a proposed acquisition of the National Security Agency. In a
move to bolster their dominance in the growing privacy
invasion market, Microsoft will rebrand the NSA as MSNSA and
leverage its worldwide customer base to improve surveillance
penetration. Microsoft claims it has already incorporated
leading spy technology into all its products, and this is a
logical progression, giving them access to key intellectual
property, and all the other information in the world. NSA
officials commented that "Microsoft has been a valuable
partner for over 15 years, our union can eliminate the threat
of privacy from Amercans once and for all." |
| Verisign Buys Network Solutions
|
Mar 7, 2000 |
| pablos |
| I don't know who is buying Verisign stock, or
how it got to be worth so much, but they're on a spree. Called
"The leading provider of Internet security," whatever that
means, Verisign paid US$21 Billion for Network Solutions.
Roughly 1 Carl Sagan Unit. I was going to try and spell out
the evils here, but I'll assume our readers can extrapolate
for themselves. |
| Netflix's SSL cert expires, and
nobody's home. |
Mar 6, 2000 |
| null |
Heard of Netflix? They rent DVDs.
It's actually a pretty kewlio outfit. I recently joined their
Marquee program, which allows you to put dvds intoa queue of
sorts for shipment after you return the discs you currently
have rented. Anywho, I went over early (1am) saturday morning
to add some movies to my queue. So I'm happily adding stuff,
and at the end, have need to connect to their secure server.
Lo and behold, my browser tells me that their Security
Certificate is expired. Ouch. That's bad.
Read
More |
| Clinton Doesn't Think E-mail is
Secure Enough for his Family |
Mar 6, 2000 |
| gdead |
| In a speech last friday, President Clinton
stated that he
won't use email to communicate with Chelsea.
"Absolutely not -- I don't think it's secure," was the
President's response when asked if he used email with his
daughter. It's a bit of a slap in the face for Internet
businesses, but a reassurance for consumers worried about
their privacy. If the current state of email isn't secure
enough for the first family, it's OK for the average family to
be concerned about it. |
| Biometrics Deployment Pushing on
Despite Fears |
Mar 5, 2000 |
| gdead |
| An article
from ZDNet indicates that many e-commerce companies are
starting to deploy biometric auth mechanisms despite consumer
fears. Companies such as DrugEmporium.Com feel that
information as personal as a fingerprint should be used for
purchasing online. Some banks are already starting to deploy
fingerprint scanning mice to enable users to bank more
securely. That's all fine and dandy as long as your
fingerprint gets verfied against the local hardware with a
ACK/NACK sent to the merchant. Once the merchant requests more
than that... once they actually want to keep your fingerprint
on file... that's when bad things will happen. Biometric
information is too private to give out to merchants,
regardless of the current state of authentication protocols.
|
| FBI Clears Coolio of DDoS Involvement
|
Mar 4, 2000 |
| gdead |
| Dennis Moran, Jr, aka coolio, was cleared of
involvement in last month's DDoS attacks by the FBI. In an interview with
MSNBC, Moran claimed that his IRC comments where he claims
responsibility for the attacks were simply a "joke." He has
admitted to defacing more than 100 websites, and will be
charged next week in LA. In the meantime, the FBI and RCMP continue to
investigate the attacks. |
| DoubleClick's New Deal (Just
Stalling) |
Mar 4, 2000 |
| pablos |
| DoubleClick CEO Kevin O'Conner capitulated
on plans to cross-reference their databases, a move that
would correlate identities with their web traffic records.
While his personal statement that he "made a mistake" is
touching, he made it clear that DoubleClick is still looking
to do so, when there is "agreement between government and
industry on privacy standards." These are not groups known for
their respect of individual privacy. Don't be fooled, this is
still just spin. If "DoubleClick's leadership as an innovator"
is to do be taken seriously, they should be developing tools
that put ownership and control of profile data in the hands of
individuals.
#chmod 700 .profile |
| "Hackers" Sound Better |
Mar 3, 2000 |
| gdead |
| Last week, National Discount Brokers, an online
stock brokerage, claimed to be the victim of a denial of
service attack. Now, they claim the problem was bad
software that had all the "earmarks" of a hacking attack.
They are now persuing legal action against their software
vendor. The nice thing about blaming transient problems on DoS
attacks is no one can refute you, and it's "not your fault."
The CW is that DoS attacks are a cronic problem with the
internet. The real wisdom says that you can build a network
that is resistant to currently known DDoS attacks, and that it
IS the fault of the company when they get attacked and fall
down making toast. |
| House of DDoS Suspect Raided |
Mar 2, 2000 |
| gdead |
| According to this
story from CNN, the home of a suspect in last month's DDoS
attacks has been raided. The suspect is a 17 year old male
from New Hampshire who goes by the IRC handle "coolio". MSNBC
reports
that coolio has admitted to defacing the Dare.org and RSA.Com
websites. The Los Angeles DA's office plans to press charges
against the youth next week for the Dare.org defacement. The
FBI is still investigating connections coolio may have had
with the DDoS attacks, and no charges are pending. The MSNBC
report also has several very interesting logs from IRC
sessions supposedly with the youth. The logs seem to be very
incriminating. Coolio was tracked down through an account he
had with an Arizona ISP. |
| FTC Lays into Trans Union Corp.
|
Mar 2, 2000 |
| pablos |
| The Chicago Tribune has an article
about The Federal Trade Commission ordering Trans Union Corp.,
the Chicago-based credit reporting giant, to stop selling
personal information to companies that use the data to target
consumers--a victory for personal financial privacy.
This is based on the Fair Credit Reporting Act, one of the
few strong bits of legislation that consumers have going for
them. |
| SANS Network Security 2000 Paper
Deadline |
Mar 2, 2000 |
| gdead |
| The Call for Papers
deadline for SANS Network Security 2000 is March 15th.
SANS is looking for "presentations about the lessons
learned in solving the daily problems of managing and securing
networks and systems, intrusion detection and vulnerability
assessment." They put on a really good show, and if you've
done something interesting, draft up a paper and send it in.
Presenting papers at cons like SANS is a great way to give
back to the community as well as extend yourself
professionally. Go for it d00d... |
| BXA Tries to Clarify Crypto Regs
|
Mar 2, 2000 |
| gdead |
| The new crypto regs came out over a month ago,
and there is still some confusion on what they mean and how
they're applied. The BXA
has attempted to clear up
some of the confusion by releasing new docs. They've
distilled the regs down to a few charts (1 &
2),
and in all honesty it actually helps. The bottom line for open
source developers is that you're still unrestricted but need
to notify the Fed when you
post crypto to the net. |
| How To Write Secure Code |
Mar 1, 2000 |
| gdead |
In the process of writing and auditing our code,
we've become increasingly upset at the lack of documentation
about writing secure code. To try and fix that, and hopefully
make your life easier in the process, we've compiled a list of resources
we've stumbled across. If you know of any others, please let
us know.
There's
no excuse to write insecure software - various |
| L0phtcrack a "burglary or theft
tool"? |
Mar 1, 2000 |
| null |
| Prosecutors in a small Minnesota town have
included the use of L0phtcrack in charges
against a local man. This could get interesting. |
| House and Senate Hold Joint Meeting
on DDoS |
Feb 29, 2000 |
| gdead |
| The US House and Senate Judiciary Committees held
a joint meeting to discuss the recent DDoS attacks and
what the federal government's action should be (if any). The
prepared statements of the witnesses have been posted on the
House website. The comments are very interesting for the
most part, and the overall feeling of the private sector is
the government should stay out the Net for now. They don't
want "big brother" getting in the way. For those NPR
listeners, there was a piece the other day on All Things
Considered about how large corporations are turning into a
"little brother". Companies like M$ and Time/Warner don't have
all the oversight power of the Fed, but they're real close.
They don't want the fed getting in the way of their own big
brother tactics. The current DDoS problem is just the
opportunity for the government has been looking for to get
involved with the Internet. Now the "little brother" companies
have to beat off "big brother" with a stick. |
| Security Ports for OSX |
Feb 29, 2000 |
| gdead |
| The boyz over at MacSecurity.Org have
been busy porting security type apps to Mac OSX Server and
Client. So far they've tackled
GnuPG, MD5, xinetd, and nmap. They've also ripped together a
great doc on Securely
Install Mac OSX. Lest you giggle too much, MacOSX is based
heavily on the NeXT operating system with much of the network
code taken from FreeBSD. It seems very fast and stable so far,
and it's a Mac with a /etc directory. w00t! |
| French Smartcard Hacker Sentenced
|
Feb 28, 2000 |
| gdead |
| Yesterday, Serge Humpich, a Frenchman who shot
holes in the security of GCB credit cards, was
sentenced. 10 months suspended sentence, 12,000 franc
(1,500USD) fine, and 1 franc in symbolic damages to GCB.
That's quite a slap in the face to GCB. The only crime he
committed (which he did with GCB's help) is purchasing metro
tokens using fake credit cards. This is the end of a very odd
trial, even after which GCB still won't discuss the specifics
of the security they use on the cards. Humpich states
"Right now, a credit card is about as safe as a Post-It
note". Yikes. |
| FC 2000 Wrap-Up ala Wired |
Feb 27, 2000 |
| gdead |
Financial Crypto
2000 is over, and pablos is on his way
home from a difficult week partying and geeking in the
Caribbean. Declan McCullaugh has a nice little wrap-up
over at Wired. Zero
Knowledge and DeCSS seem to have dominated the con. Well,
that and blazing sunshine and lots of rum. Declan sums up the
conference well:
Persuading your manager that a
midwinter trip to a subtropical isle is necessary to keep up
with tech developments can be a difficult but worthwhile task.
|
| Multiple Corel Linux xconf
Vulnerabilities |
Feb 25, 2000 |
| gdead |
It's Friday, so it's time for the silly exploit
of the week. Corel claims their Corel Linux is easy to install
and use. According to this
post to Bugtraq it is also very easy to compromise. Corel
Linux has a suite of config programs to help users configure
their installation. Many of these files are SUID and have some
serious issues with input validation. My favorite of the many
listed exploits:
(4) Executing arbitrary commands
with euid root.
A touch different. /sbin/setxconf allows users to test X
configs with the -T switch. This process eventually invokes
xinit with euid root. A quick look at the xinit man page
will tell you that xinit looks at ~/.xserverrc and will
execute things in there while starting. |
| Commerce Dept OK's Snuffle Export,
Case Pushes On |
Feb 25, 2000 |
| gdead |
CNet reports on a letter
from the Commerce Dept which states Daniel Bernstein
can export his Snuffle encryption algorithm.
"In light of the changes in licensing and review
requirements for publicly available source code, the new
regulations do not interfere with his planned activities as
you have described them"
For the last few years,
Bernstein has been suing the Commerce
Dept to allow him to export his crypto code which he developed
for a class he teaches. According to Bernstein's lawyer, Cindy
Cohn, there are still some points of the case that haven't
been cleared up by the Commerce Dept so the trial will likely
push on. |
| FreeBSD To Incorporate OpenSSL and
OpenBSD into 4.0 Release |
Feb 24, 2000 |
| gdead |
| Aren't the new crypto regs wonderful? Ok, maybe
not wonderful, but a least a step in the right direction for
open source crypto development. Until recently, Canadian-based
OpenBSD was the only
BSD-ish OS that shipped with utilities like OpenSSL and OpenSSH (which they
developed). FreeBSD's HQ
is in the US, so their distribution was limited by US crypto
export regs. But according to Daemon News, FreeBSD
4.0 will ship with OpenSSL/SSH thanks to the new crypto regs
released last month. The incorporation of OpenSSH was a bit of
an afterthought, though, so the release date for 4.0 has been
pushed back to March 10. One more reason FreeBSD rocks...
Besides the 300 days of uptime on my workstation. |
| Osiris 1.3.0 Released |
Feb 24, 2000 |
| gdead |
| Osiris is a file integrity checker developed by
brian here at TSG. The
new release includes many new features, including the addition
of Haval and SHA hashes. There is also a counter to let you
know how far along osiris is when indexing files. MacOSX
support has also been added. Download
now or check-out the CHANGELOG.
Next up: an NT port. |
| EU Releases Echelon Report |
Feb 23, 2000 |
| gdead |
| Wired reports
that the European Union has released a study on Echelon, the
world wide surveillance network led by the US. The report
states that Echelon uses satellites and ground stations from
the US, Britain, Canada, and NZ. An EU member said Echelon
"poses a clear threat to civil liberties and the EU
economy." Further investigations have been ordered on the
basis that the US is using Echelon for industrial espionage in
the EU. |
| How to Build a Data Center by Sun
|
Feb 23, 2000 |
| gdead |
| If you're a Solaris admin, you have a mantra:
"docs.sun.com is your friend." Docs is a great resource for
all things Sun and Solaris related. While strolling around
looking for something today, I stumbled across Sun's Data
Center Site Prep. I'm not sure how long this document
has exisited, but it's great. I've been building data centers
off of notes from NANOG
meetings and federal best practices. This doc is one of the
best public references on how to select locations and actually
build a DC I've ever seen. And, since how and where you build
your data center makes a large impact on the quality of your
physical security, I post it here for you to enjoy. :-) |
| Open Source Code Audit Tool from RST
|
Feb 22, 2000 |
| gdead |
Reliable
Systems Corp today released ITS4, a tool
for automatically auditting code for security vulnerablities.
ITS4 stands for "It's The Software, Stupid! -- Security
Scanner", BTW ;-) There have been great leaps made in scanning
code for security holes in the last several years. RST has
finally made the fruits of this research available. I just ran
ITS4 against some of my code, and it does a great job of
hunting down trouble spots, as well as offering suggestions on
how to fix the problem.
This is a great tool for folks
that write code. It is also a great tool for hackers. Code
analysis tools such as ITS4 put everyone on an equal playing
field. As these tools get more advanced, there is no execuse
for a developer to release insecure code. But it will also
give scr1pt k1dd13z brain dead tools to exploit insecure code.
A few years from now, production code will be much more secure
than it is today, but the interim time may be quite painful as
all the holes in existing code are flushed out publicly and
privately. |
| ZeroKnowledge Presents Digital Cash
and Minimum Disclosure Privacy Scheme |
Feb 21, 2000 |
| pablos |
| Live from the front line in Anguilla: ZKS today announced
that they've hired Stephan Brands and will incorporate his
brilliant work into their Freedom product. Brands'
thesis committee for this ground breaking work was Rivest,
Shamir & Claus Schnorr . Everyone should buy his book
"Rethinking Public Key Infrastructures and Digital
Certificates -- Building in Privacy", published by Ponsen and
Looijen in the Netherlands, ISBN 90-901-3059-4. You can also
read about it at his
web site.
In layman's terms, ZKS now has the technology to deploy
anonymous digital cash that rivals the Chaumian offline
blinding protocol. Additionally, their "Minimum Disclosure
Privacy" scheme overcomes vast privacy violations inherent in
today's PKI models.
The Wall Street Journal
will break the story today, Wired will probably have a piece
by Declan McCullagh before long. Remember, you heard it first
from Shmoo.
UPDATE by gdead: As usual, Pablos
nails it. Here's
the Wired article on this. |
| DDoS Attacks Offer Cover for Real
Hacks |
Feb 21, 2000 |
| gdead |
| Leave it to the Register to find a
new take on the DDoS attacks. They claim
that current DDoS attacks aren't really dangerous and only
serve to hide the concern about real hacks. According
to Mark Rasch's testimony at the US Senate last week, a
company is much more likely to report a DoS attack to
authorities than a real hack because a DoS attack doesn't
weaken consumer confidence to the magnitude a hack does. Also,
a real hack puts a company's intellectual property at risk,
which is the only real assets dotcoms have these days. |
| France Pegs Microsoft & the NSA
|
Feb 20, 2000 |
| pablos |
| Yahoo! Hong Kong News has a
blurb about French intelligence accusing the NSA of
working with Microsoft to develop software allowing Washington
to spy on communications around the world.
- According to the report, "it would seem that the
creation of Microsoft was largely supported, not least
financially, by the NSA, and that IBM was made to accept the
(Microsoft) MS-DOS operating system by the same
administration."
- It said that the Pentagon was Microsoft's biggest client
in the world.
UPDATE by jpm: Microsoft denies it and
French intelligence backpedals. - Yahoo
Hong Kong |
| A DDoS Whitepaper |
Feb 20, 2000 |
| larry |
| Bennett Todd posted to BugTraq that he has
written a DDoS whitepaper. It's not going to teach the
security minded anything new but for management types, or
junior technical people wanting to get an overview of what a
DDoS attack is and how it works it's a pretty decent piece of
writing.
It's available at his web site in
HTML, Postscript and plain text. [Note: the secure server
certificate isn't signed by a known CA so you have to be using
a browser capable of approving a custom certificate.]
|
| Intel Announces Device->Display
Encryption |
Feb 18, 2000 |
| curator |
| Yesterday, at their Developer Forum, Intel
announced High-Bandwidth Digital Copy Protection, a technology
which encrypts data between an output device (such as a
digital video card on a PC, or set top boxes for HDTV) to a
digital display ( digital LCD, HDTV, etc.). According to TechWeb's
article, the 56-bit keys are doled out to individual
vendors much like DVD keys. And a violated key can be tracked
and revoked from a satellite network.
Woohoo, CRL's from the sky.
There are all sorts of things that are unclear from the
article, especially when it comes to backward compatibility
with current digital devices, how the CRL's are actually
applied, whether legitimate owners of devices with violated
keys get screwed, and what kind of power this satellite
network has, but I can already smell a DeCSS-like lawsuit on
its way. |
| How to Annoy the MPAA |
Feb 18, 2000 |
| pablos |
| The Meme Factory has released Trojan Cow,
basically stego that allegedly contains DVD decryption code.
Pigdog Journal has
a new tool called "DeCSS" which strips Cascading Style Sheet
tags from any HTML document. Unlike the other DeCSS, this
program is totally useless, and less likely to get you sued.
[Note: I'm not sure if this is a legit technical glictch or
if something ill is in the works, but the pigdog.org site just
disappeared and went back to the default ISP's page.
Fortunately I had just put up a mirror and it is still available. - larry]
|
| How to defeat "location poisoning"
|
Feb 17, 2000 |
| larry |
|
Developed by 7val,
Location Poisoning is a new and especially abusive technology
for user-tracking.
A new device (ed. not sure how new but i hadn't heard of it
before) to track customers using DNS instead of cookies, so
it's harder to circumvent. Unfortunately it somewhat abuses
the way DNS and HTTP work and is considered by some to be a
"Bad Thing[tm]".
Read more at http://www.lemuria.org/Software/unpoison/,
including a way to circumvent it using a squid proxy. |
| DDoS Fallout Continues |
Feb 17, 2000 |
| gdead |
There's an ancient saying that goes "Be careful
what you ask for, you just might get it." Many security
experts have been asking for more security news to show up in
national media in order to show how lax security is in most of
the Internet. Since the DDoS attacks against Yahoo and EBay,
security topics have been the headline on most news
sites. Most of the news has been helpful, but some of the
stories about tracking
the attackers were filled with rumors and speculation. I'm
sure the reporting will improve over time, and I hope the news
won't incite the public to request regulation of the Internet
in the name of safety.
On the upside, there's a ton of
interesting stuff to read these days. The Washington Post
reported that the
CIA has given SAIC a pile of cash to develop software to
protect web sites from DoS attacks. The money came from the
CIA's new venture capital firm, In-Q-Tel. I wonder what
strings get attached to money that comes from the CIA? I'm
afraid I don't want to know.
The Washington Post has
an
article that indicates DoS tools have made it into
the hands of the masses:
A disgruntled customer of
the Virginia Department of Motor Vehicles tried to disable the
department's Web site with bogus information requests.... DMV
officials, who said the department's Web site was shut down
for about 45 minutes early Sunday, were able to identify a
suspect within one hour of the attack by tracing the source of
the requests. Virginia State Police arrested a 26-year-old
Haymarket man about 24 hours after he allegedly began
overloading the site with fake transactions. |
| U.S. Officials laying out plans to
fight cybercrime |
Feb 17, 2000 |
| grendel |
| Theres a somewhat interesting article
in todays New York
Times. (Free Reg. Required) Pictured in the article is the
current director of the FBI and Janet Reno, testifying before
the senate about the recent DDoS attacks. Reno is putting
forward a proposition that would "include tougher penalties
for hackers and standardized investigative technologies".
Thats not too general or anything... The article does have a
number of interesting figures though. We'll see what they come
up with:) |
| Dittrich Speaks |
Feb 16, 2000 |
| gdead |
Slashdot asked, Dave
Dittrich answered. My fav quote:
What I think
needs to happen is to follow the advice of someone (I forget
the source) who said, "There should be a hacker on every board
of directors," and I would add on every development team.
Nothing ground breaking in the interview, but lots of
good advice for admins and management alike. |
| DNS the Weak Link in the
Infrastructure |
Feb 16, 2000 |
| gdead |
In the world of computer security, we are
continually searching for the next big hole hackers will
exploit. Hackers, by and large, are smart and lazy. They
attack targets that are obvious and they come in through holes
that are easy to exploit. The current favorite spot to
break-in is through applications by finding buffer-overflow
vulnerabilities and poor access protection. There are many in
the industry that feel this is going to change in the near
future. Many holes in the current Internet infrastructure are
being discovered and exploited making the Internet core the
"low hanging fruit" that hackers will go after.
Last
week, the RSA
website was hacked. Twice. The first was via a DNS exploit
by causing the authoritative nameserver for rsa.com to respond
with the wrong IP address for www.rsa.com. The page you were
sent to was a spoof of the RSA homepage hosted in Anguila.
Shortly thereafter, that page was hacked, and a terse, h4x0r
dialog replaced it. An attack on a DNS server can be very
destructive, especially when bad data is injected. An attack
on the entire DNS architecture, such as an attack on Network Solutions
would be devistating. DNS is a vital part of the Internet's
infrastructure, and without it, we're sunk.
In the
wake of this attack, serveral organizations (such as Hacker News and NT
Security) offered words of advice. Of course, you should
upgrade all your nameservers whenever exploits are discovered
since they are almost impossible to protect from in-band
vulnerabilities. They also go on to say admin's should
"double check your DNS records to ensure you have strong
authentication required for any potential record changes."
This sounds like a great idea in theory, but in practice it's
impossible to implement.
Until recently, Network
Solutions has had a monopoly in .com/.net/.org domain
registration. Even now, some would still say they are a
monopoly, but there is some
competition. When you go to register a domain with NSI,
you have 3 options of protecting it: by verifying the "From"
email address when a change is submitted, by using a password,
or by using your PGP key. I'm not sure exactly what the other
registrars offer, but the ones I have seen only offer the
"mail-from" protection. Forging an a domain change via the
"mail-from" protection protocol is trivial. It is a known
problem. So the obvious solution is to password or PGP protect
the domain. So just set your auth scheme to password or PGP,
and you're safe, right?
Wrong. According to years of
problems posted to lists like the North American
Network Operators Group, this is not a simple thing to do.
Setting up PGP or password auth on a domain can take months,
the request may never get fullfilled, or the domain may
disappear all together. And if you manage to get the domain
PGP/password protected, there's a large chance you'll never be
able to make a change to the domain. Many admins who have PGP
protected domains end up spending weeks on the phone with NSI
only to resort to sending in company letterhead and setting
the auth mechanism back to "mail-from". While the domain may
be secure, it becomes totally unadministerable.
The
problem that plagues the security world in general also
effects the DNS infrastructure. The most secure (read: best)
solution is so hard to use that the majority of people will
use a completely insecure protocol as a trade-off for easier
administration.
This is not acceptable, but
unfortunately changing the domain registration process is a
slow and painful one. There are a lot of players in the game,
from NSI and the other registrars to the ISP's and even the
folks that run the root nameservers. Getting them all to agree
on something is very difficult, and the path of least
resistance is to keep the same broken process in place. Until
this changes, attacks on DNS records will become more common.
DNS is the low hanging fruit in the Internet core, ripe, and
ready to be blown apart
A side note: I think using
X.509 certs as a auth mechanism for domain names is a great
idea. Please don't yell at me for using the "PKI will save the
world" line. I think in this case, when a heirarchy already
exists, it's an ideal place to deploy an X.509 setup. Now
whether NSI, Register.com, ICANN, et al will listen to me
remains to be seen. ;-) |
| The 15th is Newsletter Day |
Feb 15, 2000 |
| gdead |
| It's halfway through the month, and as usual
Bruce Schneier's Crypto-Gram
and Siam Relay's SAFER
newsletter came out. SAFER as always is filled with the
10,000' overview of the last month in the security world,
while Schneier gets his hands dirty digging through the
details. The Crypto-Gram discusses the recent DDoS attacks and
revisits the problem of publicizing vulnerabilities. Has
anyone noticed that the Crypto-Gram has become much less
crypto oriented lately? If you look at his first CG's, or even
the issue
from a year ago, he is much more into the math/crypto
world, and how to tell bad crypto from good crypto. Now it's a
monthly discussion of generic security issues with an
occasional mention of what's happening in contemporary
cryptography. It's not a bad thing, but the name "Crypto-Gram"
is getting a bit misleading. |
| Clinton fights hackers, with a hacker
|
Feb 15, 2000 |
| larry |
|
Maybe a slightly glorified claim, but none the less and
interesting counterpoint to recent claims that employing
hackers as security experts is "like hiring an arsonist to be
your fire marshal".
Read more at CNN.
|
| Security Expectations for Internet
Service Providers |
Feb 15, 2000 |
| gdead |
| The IESG has been asked to turn the draft Security
Expectations for Internet Service Providers into an RFC.
This would be a "best practices" informational RFC for all
those running ISP/NSP services. It is very diverse and covers
topics such as ingress/egress filtering and control of
directed broadcasts. Please read it and send mail to iesg@ietf.org or ietf@ietf.org with any
comments you may have. |
| Announcing MacSecurity.org |
Feb 15, 2000 |
| curator |
| The Shmoo
Group is pleased to announce the arrival of MacSecurity.org, a site
devoted to security and privacy resources for Apple's current
and next-generation operating systems.
While we will primarily focus upon Mac OS X Server, Mac OS
X, and Darwin, we recognize the number of admins that are
managing Mac OS 8.x/9.x computers. We will post any relevant
info we find useful in this domain, especially when the
revelations deal with the joining of the two worlds.
We have several projects forthcoming, and we welcome any suggestions for
possible ports of security applications and services for Mac
OS X Server. Subscribe to mso-announce
for updates on our projects, announcements, and other
happenings at MacSecurity.org.
We are also starting a new mailing list devoted to
discussing Mac OS security problems, and solutions. Here again
the intent is to focus on Apple's BSD-based operating systems,
though all of Apple's operating systems are welcome for
discussion. There has been little organized (or other) talk of
security when it comes to Mac OS X Server. We hope this list
will foster better communication throughout the user base,
especially looking forward to the general release of Mac OS X
(client) upon the traditional Mac OS population. We hope that
everyone interested will subscribe.
For members of the macosx-admin and macosx-talk lists,
we'll be hosting a searchable, continuously updated archives
of the venerable Omnigroup lists.
Well, we hope this has whet your appetite. There will be
more content forthcoming (not limited to software and ports,
but including white papers and FAQ's on best practices and
such) as we see what the public's needs are, and how we can
best serve them. We encourage you to visit often and offer
feedback on what you'd like to see from the group.
Thanks for your time, and happy browsing.
NOTE: We are currently looking for one or two individuals
willing to test software and policies we develop from time to
time. We unfortunately do not have the resources to test on
all our target platforms, and so need a little help covering
the other bases. Right now, we need a user(s) who has access
to a machine running Darwin, and a machine running the Mac OS
X DP/Beta's. Fortunately we think the software we port to
MOSXS will run on both platforms, but can not know for sure
since we cannot run either OS. Interested parties should drop
a note to curator. Thanks
again. |
| Clinton Wants more Net Porn |
Feb 15, 2000 |
| gdead |
| If you read CNN.com at all yesterday, you
noticed that the top story all day was "Clinton Gives Online
Interview". Somehow that qualified as more important news than
new Littleton killings or the tornado in Georgia. Basically,
Clinton and some folks from CNN did an interview where the
questions came in realtime from the Internet audience. The
"Internet" part of the interview was run on a Windows IRC
server. And like every good IRC server, there are ways to take
over other people's nicknames. Ater a server crash, one of the
chat members took the
name President_Clinton and started answering questions.
"Personally, I'd like to see more porn on the Internet,
Wolf how about you?" This lasted for 30 seconds until CNN
admins kick/banned the prankster. hehe... old school hakcers
meet New World media stunts. |
| February 2000 Cypherpunks Meeting
|
Feb 14, 2000 |
| pablos |
| Another lively Bay Area Cypherpunks meeting with
our usual heavily skewed ratio of hotheads to hotties. Simson Garfinkle was
apparently the feature presentation. He shared some cute
anecdotes and didn't plug his new book 'Database
Nation' too hard. An allegedly new public
key cypher was presented by David Liu. This appears to be
extremely fast, and could use a lot more analysis. Elder Scannell shared his recent
Thawte
Web of Trust debunking work. While a lot of us are Thawte
Notaries, the program has issues, and we're not under NDA!
Contact Kristen
Tsolis if you're interested in helping with intrusion
detection systems that can tell a cluebrian from a
scriptophyte. Many of us are headed off to the International Financial
Cryptography Association conference in Anguilla next week.
I'll try to post some updates from the beach. The Cypherpunks
meetings are going global, let us
know if you want to get one organized in your area.
Lastly, we swapped Safeway club cards, I traded a Bruce
Schneier card for one with no name. |
| What Color is Your Hat? |
Feb 14, 2000 |
| gdead |
The NY Times has written a
piece on why hiring hackers, even gray hat hackers like
l0pht, is a bad idea.
"It's like hiring an arsonist
to be your fire marshal. They know all about the stuff and
they know how to be good at it, but can you ever really sleep
at night?"
The NYT also claims that people that
write hacker tools should go to jail just like those who
actually perform the hack. L0pht fires back on their news
site, Hacker News
Network, saying "This is like blaming car manufacturers
for auto accidents." Being a fan of full disclosure
security, I'm going to have to agree with the boyz from l0pht
on this one. |
| Why a "Web of Trust" is Hard to
Maintain |
Feb 13, 2000 |
| gdead |
There are several different models for key
distribution in public key crypto. There is the centralized
model typically employed by CA's in protocols such as X.509
and PKIX. The problem with this it you have to trust the
central authority to be "legit". It also goes against the
distributed roots the Internet was built on. The other model
is the "web of trust" used by many in the PGP world.
Basically, you trust those closest to you, and then you can
trust keys signed by them, and then trust keys signed by those
folks, ad infintium. You can specify a degredation in
trust on a per hop basis until there is no trust left. It's a
six degrees kind of
thing.
The web of trust model can break very quickly
if those you trust in turn trust everyone, regardless of their
merit. A real world example surfaced last week. 6 Israeli
soldiers were
killed in the disputed territory of North Israel/Southern
Lebanon by Hezbollah guerrillas. In return, Isreal started
daily bombing runs over Lebanon, taking out power plants and
other infrastructure targets. At nite, the Israeli government
warned all those living in northern Israel to stay indoors and
if possible underground. Israel feared that the Hezbollah
would retaliate with missile strikes and didn't want targets
roaming around on the streets.
You're probably asking
yourself "so what?" Well, the interesting part of this story
is where the missles came from. The missles the Israeli's are
afraid of are American TOW missles (anti tank, but can make
quite a impact in urban warfare). American and Israeli
intelligence tracked a shipment of several hundred TOW
missiles into Lebanon from Iran a few months before. Where did
Iran get the TOW's? Remember the Iran/Contra scandal? Well, in
the ordeal, the US gave several hundred TOW missiles to
Israel, who in turn gave the missiles to Iran in return for US
hostages. That is the last known shipment of TOW's into Iran.
So 10 years later, Israeli citizens are hiding in their
basements at nite, fearing a strike from a missiles that they
gave to someone who in turn gave them to "the enemy". Ironic,
huh?
This problem exemplifies the problems you
encounter when dealing with a web of trust model. You must
actively monitor those to whom you give your trust, or it may
bite you later. While dealing with large, central companies
such as Verisign or the Post Office may be evil, at least
they're a known evil entity. The option is the possibility of
hundreds of evil people running around abusing your trust.
|
| Hunting Red-headed Snipe and DDoS
Attackers |
Feb 12, 2000 |
| gdead |
| All roads lead to Rome, and at least one
compromised machine used in the DDoS attack will lead to a
hacker. According to CNet, the
FBI is looking to talk to Mixter, the person responsible
for writing TFN. CNN reports
that machines in an engineering firm in Long Island as well as
computers in Stanford and UC Santa Barbara were used in last
weeks DDoS attacks. *gasp* UNIX workstations at a university
were hacked? Aren't universities the bastions of
computer security? The good news is many of the hacked
computers had audit logs left which should make the job of
tracking down the folks responsible much easier. |
| make sploit; make install |
Feb 11, 2000 |
| gdead |
| The "Amusing Exploit of the Week" goes to a hole
in GNUmake in all versions up to and including 3.77-44.
It's the usual game where make writes temporary files to /tmp
but the files have a predictable name and make doesn't check
for their existence. Create the right file, and you've got
root... or maybe toor if you're on a FreeBSD box ;) It's only
a local exploit, but still it's kind of ugly. So go get the patch to make
sure you don't get rewted the next time you compile Osiris. |
| Clinton calls Internet security
summit |
Feb 11, 2000 |
| grendel |
| Well, as usual the government is playing
catch-up. Thursday President Clinton stated that he would be
calling a summit regarding the recent DDoS attacks, and what
can be done in the future to protect commerce and sites on the
Internet. 15 CEO's, suits and Execs of leading Internet
commerce sites have been invited to the summit. Oh... Bruce, you're invited too:)
Heres an article
from USA Today. |
| Slashdot to Interview Dave Dittrick
|
Feb 10, 2000 |
| gdead |
| mmmm... interview-y goodness. Slashdot is asking
for your questions for Dave Dittrick. Dittrick et al have
written a few
tools to help look for Trin00 and TFN, as well as given a
number of great security related talks. You've got 24 hours,
so go ask away. |
| Interview with Author of Tribal Flood
Network Denial-of-Service Tool |
Feb 10, 2000 |
| pablos |
| Altavista
has an interview with Mixter, who wrote the tool being
used for some of this week's DDoS attacks. Don't buy his pitch
for IPv6, but otherwise, this is sorta interesting. |
| DDoS Saga Continues |
Feb 9, 2000 |
| gdead |
Day 3 of the mysterious DDoS attacks, and the
public at large is still in the dark. CNN reports
Datek, E*Trade and ZDNet were attacked today. Wired has many
articles on the subject, including a piece on how these
attacks fit the profile of a pissed off teenager. The QOTD has
to go to YTCracker (he defaced a pile of federal websites).
When asked what he thought of the current attacks, he
responded "This kind of thing is really frowned on... It's
a bunch of bored kids trying to show they have the guts to do
this.... We don't like to be associated with these
people." Wowzers. Apparently hacking the homepage of the
Goddard Flight Center makes a much more ethical statement than
stopping Amazon from using their "one click shopping" patent.
Read
more of this story... |
| Court authorizes search of Northwest
employees' home computers |
Feb 9, 2000 |
| larry |
| From the Star
Tribune: Northwest Airlines last week began
court-authorized searches of the home computers of between 10
and 20 flight attendants, looking for private e-mail and other
evidence that the employees helped to organize a sickout at
the airline over the New Year's holiday.
Doesn't that give you a warm glowy feeling of comfort?
After all I'm sure they had their employees best interests at
heart ... |
| Could the Yahoo, Amazon, and Buy.com
Attacks be Avoided? |
Feb 8, 2000 |
| gdead |
NPR's "All Things Considered" covered the Yahoo
DDoS attack today. In it they described how a distributed
denial of service attack was done and what the net effect was.
They interviewed several security experts who all said that
there was nothing the victim of these attacks could do. The
experts indicated that only a net wide awareness of these
DDoS's and organizations taking the initiative to find
compromised hosts and remove the Trin00/TFN clients (claimed
to be an easy task by one of the "experts") would solve the
problem. While it may be true that once an attack is in
progress, there is nothing that a victim can do to make it
better, there are ways to minimize the effect.
If
Yahoo (or the others) had properly architected their network,
they would have barely felt the problem. System architects
have made the process of building a server farm a science. It
is easy to get space in a colo, put a few load balancers in
front of a bunch of web servers, and let things go. This can
easily handle large amounts of good traffic. But what about
bad traffic, such as traffic generated by Trin00? Simple...
spread your eggs out. Build several server farms (costs a bit
more, but Yahoo has a few million lying around). Put these
farms in different areas. Not just in multiple Exodus colo's.
Put one in Exodus, one in Above, one in Global Crossing. Pull
circuits from other large providers directly into your
network. Get address space from multiple providers. By
spreading yourself out, you are no longer "one" target. You
are multiple targets spread out in different AS's hanging off
of multiple large pipes... Large pipes that can have policies
applied to them to further minimize the flow.
The one
problem with this setup is adminstrative overhead. This can be
minimized by providing your own backend network with
well-trained NetOps to run it. The idea is not to be an
ecommerce company but to be your own ASN providing network
services to ecommerce applications. Your network can be under
your control, not your colo providers. This makes all
the difference, and will allow you create a system resistant
to many large scale attacks.
Geographic distribution
will play an ever increasing role in security. It offers much
more protection against physical attacks as well as attacks
from the network. Until companies like Yahoo and Amazon figure
this out, they'll still be vulnerable to "primative" attacks
like Trin00 and TFN. |
| Biometrics Done Right |
Feb 8, 2000 |
| pablos |
Large centralized
databases of biometric data are evil. So are implanted auth
tokens. This has been widely known for thousands of years,
read Revelation 12 (The Bible) if you don't believe me. Sony
is doing it right. Each user should have their own
authentication token that stores their private key. The user
authenticates to this device with some biometric. Your
biomentric profile must be stored on this device. Sony is
about to release a fantastic
little gizmo that does just this. Refuse any biometric
authentication where your profile is not under your own
control. |
| Yahoo Hacked? |
Feb 8, 2000 |
| gdead |
| The bad thing about hackers? You never know
when, where, or how they're going to strike. They are stealthy
and random. The good thing about hackers? You never know when,
where, or how they're going to strike. So when you're an
e-commerce company with a multi-billion dollar market cap and
shareholders to think about, if you can blame hackers instead
of yourself for an outage, you're doing good. Yahoo suffered a
3 hour outage yesterday which has been partially blamed on
hackers. There's no concrete evidence to prove this... in fact
originally they said it was a router problem, then they
indicated it was a hacker. How nice that they can shift the
problem from something they controlled to something totally
removed from Yahoo. Go-go-gadget-fault-tolerant-architecture.
See the story at Wired.
|
| CERT on Crack |
Feb 7, 2000 |
| gdead |
HackerNews, and many other, feel that CERT
may be losing site of the big picture. CERT has
historically only focused on major vulnerablities that could
cause extreme chaos on the Internet. Their most recent
"cross-scripting" warning is felt by many to be old news and a
waste of resources.
" think it would be nice to
read the news Monday and see that the media, instead of
repeating the warning blindly, was now telling the world that
the hacking community had denounced the CERT warning for the
ridiculous paranoia it really is. " |
| Bad SORM Rising |
Feb 6, 2000 |
| curator |
| Slashdot
has a blurb on a recent act of law (an addition to the
already injurious SORM legistation that allows wide spread
bugging, tapping, taping, and monitoring of Russian citizens)
in Russia mandating "black box" IP re-forwarding devices to be
installed in all ISP's in Russia. The devices would send a
copy of all internet traffic through an ISP to the FSB
(Russia's national police force, successor to the KGB), prior
to any sort of probable cause or warrant (though ostensibly,
such is required to actually read the data). Resistance seems
to be already waning, as the one ISP to stand up against the
tyranny has been shut down, and Russian citizens are forced to
choose survival in their current chaos over a seeming luxury
like freedom. It's hard to battle privacy violations when you
don't know if you'll have food from day to day.
And we think Echelon is bad.
Perhaps the Russians will spearhead widespread encryption
of Internet traffic. Perhaps the Dumas will just mandate some
sort of key escrow for everyone in that event. Who knows?
|
| Fake "Flight 261" Site |
Feb 5, 2000 |
| gdead |
| Folks from TSG fly Alaska Airlines all the
time, and think they're a great air carrier. Our hearts go out
to the families and friends of the victims of Flight 261. With
that said, please note that there is a phony
flight 261 site that is "taking donations" and leaving a
virus. It's hard to believe that someone would take advantage
of a situation like this. But it underscores the fact that on
the Internet, even in times of crisis, you never know who
you're dealing with. That needs to change. This change must
occur on both the consumer and design side. Consumers must be
made aware of the dangers, and protocols (such as TLS) must be
developed that expose fraud more readily. |
| Echelon 'Proof' Discovered |
Feb 3, 2000 |
| larry |
|
References to a project Echelon have been found for the
first time in declassified National Security Agency documents,
says the researcher who found them.
After combing through declassified National Security Agency
documents, Jeffrey Richelson, a researcher for the National
Security Archives, has concluded that Echelon -- the purported
name of the alleged international project for intercepting all
forms of electronic communication -- does exist.
Read more at Wired.
|
| Judge Finds Against DeCSS |
Feb 3, 2000 |
| curator |
| In his decision
today, US District Judge Lewis Kaplan has found against
the defendants in the DVDCCA case. The judge basically refutes
most of the DeCSS group's claims, except perhaps some hint
that DMCA may be counter to some First Amendment rights, but
that those issues were minor and regulatible. In other news,
2600.com is sponsoring a call to
action in response to the decision tomorrow. |
| Ex-CIA director investigated for
gross insecurites |
Feb 3, 2000 |
| grendel |
| In a public announcement, Director of the CIA George Tenet openly ripped
apart former CIA director John Deutch for storing highly
classified, sensitive data on an unsecured home computer that
was regularly used for email, surfing for porn, etc... His ISP
*drum roll* AOL. Deutch has apparently been under
investigation for some time now, but this is the first public
announcement regarding their findings. Heres the article
in USA Today. |
| Opt-Out of Double-Click |
Feb 3, 2000 |
| pablos |
| Here's a handy link to Opt-Out
of DoubleClick without having to dig through three pages of
supposed "Privacy Policy" on their web site. |
| Packing My Shorts |
Feb 3, 2000 |
| curator |
| Briefs on today's security news. The US
government is still
trying to convince the EU that corporate self-regulation
really is OK when dealing with consumer privacy. Seems the EU
has some rules about their corporations trading information
with corporations from countries that don't have consumer
privacy laws on the books. In other news, DoubleClick
continues to suck. A Japanese official announced a bug
in Microsoft's JVM that could allow a malicious website to
read files on users computer. Microsoft has known of the
problem for a while and is looking into fixing it. CERT has
released an advisory and a couple follow-ups on a
vulnerability in the way malicious code can be embedded into
normal HTML code that provide dynamic web pages. There seems
to be an overriding
ignorance of China's newest crypto regs. Except by the
Chinese government that is. |
| John Katz - "Software And The Death
of Privacy" |
Feb 2, 2000 |
| pablos |
| Check out this Slashdot
article by Jon Katz. Nothing new to us, but it helps to
beat your brain with propaganda from the good guys. Remember
to forward this to your mom. Here's a precious little gem that
Jon dug up: "I am not the first to point out that capitalism,
having defeated communism, now seems about to do the same to
democracy. The market is doing splendidly, yet we are not." -
Ian Frazier, "On the Rez." Has anybody noticed that I rip off
a lot of stuff from Slashdot? Can't wait for them to start
ripping us off. |
| US Government Eases Computer Export
Controls |
Feb 1, 2000 |
| curator |
| In keeping with the US Government's recent
relaxation of crypto regulations, President Clinton has issued
an
executive order relaxing performance-based computer export
regulations. The move deregulates all exports below the 12.3
gigaflop performance line, allowing Apple to ship the PowerMac
G4's outside Tier I countries, as well as legalizing export of
Playstation 2's. Shipments to Tier IV (Iraq, Syria, et al.)
countries remain unchanged. No Sony for Saddam. :-( |
| So You're Looking For Info on
Mysterious Rashes |
Feb 1, 2000 |
| curator |
| CNET has an
article on the results of a California
Healthcare Foundation survey that indicate several of the
top 21 healthcare websites are not following their own privacy
policies. For the most part the lapses involve selling email
addresses, but may involve information tied to those addresses
via health survey and/or site registrations. In addition, one
third of the surveyed sites, have ties to the evilness known
as DoubleClick.
With their power to link site use to individuals, a person who
thinks their anonymously searching for info on embarassing
rashes may end up inexorably linked to the topic, and thus
subject to a lifetime of embarassing spam. |
| U.S. House of Representatives Passes
Digital Signature Bill |
Feb 1, 2000 |
| grendel |
| This article
at CNN is pretty light on
content, but gives the gist of the issue. While this is
obviously one step closer to me never having to leave my house
again, or talk to anyone on the phone, which is a Good
Thing(tm)... there appears to be a bit of a battle going on.
The article mentions unnamed "consumer groups" trying to
enforce some sort of paper trail on the process... *sigh*
|
| Slashdot Interview with Jon Johansen
|
Jan 31, 2000 |
| gdead |
Slashdot has arranged for an interview with Jon
Johansen, creator of deCSS. Questions must be submitted by
Tuesday Feb 1st. Go submit
your question or at least see what other people are
asking. As long as we're on the DVD subject, you may want to
check out the LA Times article
by Jack Valenti, CEO of the MPAA.
The intent of
these Web sites is clear. Break the encryption. Steal the
product. The posting of the hacking code is akin to mass
producing and distributing keys to a department store. The
keys have only one real purpose: to allow a thief to open a
locked door to steal the goods he targets. |
| Osiris 1.2.0 for UNIX Released
|
Jan 30, 2000 |
| gdead |
| After a week of furious coding, Brian managed to get Osiris
1.2.0 out the door. The new version has a 50% increase in
speed thanks to some serious optimizing of the code. 1.2.0
also logs all SUID/SGID files and notes any changes in
SUID/SGID status from previous indices. Kewl. Upcoming for the
next rev: Mac OSX support and different checksum algorithms
including SHA. Download Osiris 1.2.0
now before your friends beat you to it. |
| US Government Pressing China On
Encryption Technology |
Jan 28, 2000 |
| curator |
| In an odd
turn, the US government is trying to get China to explain
its newly restrictive encryption regulations. Apparently, the
newly passed regs require foreign or Chinese businesses and
individuals who use encryptive technologies to register with
the Chinese government. Huh. I should think the US government
would understand, "it's for the good of national security".
Talk about the pot calling the kettle black. For some reason
it's ok for the US government to regulate encryption by US
citizens, and think of things like national key
escrow/registry, but they get all pissed off when some foreign
country thinks it's ok too. While I'm aware of the recent
loosening of the regs on crypto exports, they're
still regulations. Sigh...
Animosity++; |
| Microsoft Releases First Bug Fix For
Win2K |
Jan 28, 2000 |
| curator |
| In what will surely be the first of many such
releases, Microsoft has released
their first bug/security fix for Windows 2000, even though
it is still three weeks prior to the release of the
long-awaited operating system. The bugs, which effect Index
Server on both Windows 2000, and Windows NT 4.0, could allow a
malicious user to view any file on a system.
While I have an urge to continue to mock Microsoft for
this, I must give them credit for actually patching it, even
though they may suffer the PR lash back. The biggest shame is
that it is another operating system that needs to be patched
out of the box. |
| Who's Dumber: Scientology or the
DVDCCA? |
Jan 27, 2000 |
| gdead |
According to the Motley Fool, DVDCCA is. That's
quite a compliment. In Rob Landley's recent
article, he summarizes the entire DVD fiasco better than
anyone else I've seen.
"...the DVD Copy Control
Authority (a name straight out of a James Bond movie if you
ask me) attempted to sue the ENTIRE INTERNET. It's like a
class action lawsuit in reverse."
A must read.
|
| Slashdot Reviews "Intrusion
Detection" |
Jan 27, 2000 |
| pablos |
| Slashdot has a review of "Intrusion Detection."
The author is a former NSA employee and has written this book
as a text to convince upper-level types of the need for
security and actually paying attention to it. Read
the review before you read the book. |
| CSScramble Removed From the Public
Record |
Jan 26, 2000 |
| gdead |
| After a cosmic fubar last week where the DVDCCA
lawyers submitted the exact trade secret
they were trying to protect into public record by including it
in court record, they managed to get it sealed back up. A bit
late, don't you think? Once a trade secret has been released
into the public domain via a universally obtainable document,
then it's hardly much of a secret anymore. Wired has the inside
scoop. |
| Doubleclick Admits to Big-Brother
Tactic |
Jan 26, 2000 |
| gdead |
| Doubleclick confirmed
our worst nightmares (OK, maybe not our worst).
They are using the data received from newly aquired Abacus
Direct to track website users by name and address. They can
now tell exactly who you are and where you've been. This is a
total about-face from their previous statements. The solution
is easy. Block 63.160.54.0/24, 208.10.202.0/24,
208.228.78.0/24, 208.228.86.0/24, 208.229.75.0/24, and
208.32.211.0/24. These are the netblocks UUNet and Sprint have
SWIP'd to Doubleclick.net. Blocking traffic to/from these
addresses will stop them from tracking you. |
| Norwegian Authorities Raid Jon
Johansen |
Jan 25, 2000 |
| pablos |
| According to Slashdot:
Jon Johansen (the young man from Norway who reverse-engineered
CSS) writes, "The National Authority for Investigation and
Prosecution of Economic and Environmental Crime in Norway
raided my home today and seized my Linux box, FreeBSD/Win2k
box and Nokia cellphone. Not only I, but also my father has
been indicted, since he owns the mmadb.no domain (webhotel)
where my homepage(s) have been located. They also took me in
for questioning which lasted 6-7 hours. It's 2 am CET now (I
just got back), I haven't eaten, and someone's definitely
going to pay for this. I have shut down my old email account,
and I'm now using linuxdvd@mmadb.no - More information coming
tomorrow, once I've talked to my lawyer. Did someone whisper
countersuit?" |
| L0pht-y Battle |
Jan 24, 2000 |
| gdead |
According to HackerNews (which is run
by the boyz from L0pht) there has been some controversy
regarding their merger with @Stake. The most extreme article
I've seen is this
one from ZDNet.
Of course, the tired old
argument is that L0pht performs a service by detailing flaws
in systems so that companies can boost their defenses against
a real, and more threatening, hacker. Hogwash, poppycock and
every other early-20th-century declarative.
"poppycock"? geez, don't retro. |
| ccTLD Search Now Available |
Jan 23, 2000 |
| curator |
| Now available to for your perusal, a country
code (iso3166) TLD
search engine. Trying to figure out where the ".ha" tld
is? Or maybe trying to determine the tld for Brunei
Darussalam? We now have the perfect tool for you. You can
search for country names (whole or partial) or country code
TLD's. |
| Inadmissable T-Shirts |
Jan 23, 2000 |
| pablos |
| Wired
has a short story about the T-Shirts that were handed out in
front of the court at last weeks DVD hearing. Apparently the
DVD CCA lawyers tried to get them admitted as evidence. Judge
Elfving shot that down. Apparently some folks who don't exist
are planning to try and print some "educational source code"
in prominent Silicon Valley newspapers by taking out an ad,
they're allegedly accepting anonymous donations at the usual
gatherings. How is that for detailed reporting? Somebody
should fire me.
Also, sorry for the DVD centric news lately, but we think
this will prove to be very important stuff in the long run.
|
| Shit. We're Losing. Watch Those
Tags. |
Jan 22, 2000 |
| pablos |
| US Courts on both coasts have now issued
injunctions against hyperlinks in the DVD CCA cases. We
believe this restricts crucial rights. The implications for
our future on the net are clearly beyond the imagination of
any judge. Do something. Let people know that this matters, it
isn't just the movie industry extortionists vs. menacing
hackers. It is the US Government impeding free speech. Join EPIC or the EFF. Read the
injunction and confidential
reply declaration and exhibits by John J. Hoy, President
of DVD CCA (and former Toshiba employee). Thanks to anonymous
for submitting this to Cryptome. [Caution: It may
be illegal for California and New York residents to download
the file above. Read contents below and consult attorney
beforehand. Or say screw it and enjoy the forbidden fruit of
intellectual censorship. Rest of world is free to grab it, for
now.] |
| Mitnick Released From Jail |
Jan 21, 2000 |
| gdead |
| After nearly 5 years in jail, Kevin Mitnick was
released this morning from Lompoc Correctional. 60 minutes interviewed
Mitnick last week, and the interview will air this Sunday.
CNN has continuing coverage
of the events going on today, but I don't think there will be
much excitement... cept maybe driving to Montana to find a job
that doesn't involve a computer. |
| MPAA Wins Injunction in NYC Case
|
Jan 21, 2000 |
| gdead |
Judge Kaplan granted a preliminary injunction
against three defendants (including Emmanuel Goldstein of 2600
fame) on behalf of the MPAA. John Young was there and has the
inside
scoop, as well as an attempted interview with Judge
Kaplan. According to his analysis, the judge had his mind made
up before he even got in the courtroom. So much for a fair
hearing. Slashdot has a thread
on the hearing with a relatively good signal/noise ratio.
UPDATE: Cryptome has posted the preliminary
injunction. 2600 has also posted their
feelings on the issue. |
| Shopping Spree |
Jan 20, 2000 |
| pablos |
| Since yesterday I bought DirecTV dish, a
Ricochet Modem & MacOS 9. Today I'm working on getting a
Garmin StreetPilot GPS, some Freedom Nyms & a Glock 26. If
anybody had ideas on how to use all these toys with a Mac
email pablos. Also I got
my car washed. |
| Shmoo @ The RSA "Conference" |
Jan 20, 2000 |
| pablos |
| Remember all those Internet shows that started
out with 80 geeks talkin' trash, then they got bought by
Mecklermedia & became 10,000 droid extravaganzas with
raffles and booth bunnies? RSA now reeks of this motif. I made
the rounds with Cypherpunk Kristin Tsolis who took lots of
photos as I heckled various "security" companies about their
products and non-existent open-source strategies ("We have a
Linux version." - Checkpoint). The NSA brought an Enigma
machine that we got to play with. @stake (AKA L0pht) had a booth &
glossy brochures. Met some fellow fringe whackos from the Alchemind Society. Ian
Goldberg did a fantastic job of walking through the process of
building an Anonymous IP network. Lots of biometric stuff,
mostly fingerprint readers. A surprising number of key escrow
systems to make encryption totally invisible to the user
(& a lot less secure). |
| Drop My Shorts |
Jan 20, 2000 |
| gdead |
| Down and dirty security-type links of the day.
Another e-commerce site was
leaking credit card information all over the floor. They
think it was an inside job (surprise!). Declan McCullagh
reports on the the
government's new stance of searching for a suspects
cryptographic keys without first notifying the suspect. 1's
and 0's can now be legally stolen off your computer by the
Feds. And from the never ending list of silly buffer
overflows, MS released
a patch to fix the buffer overflow vulnerablity in the RTF
reader shipped with all their OS's. Yes, that's right, Rich
Text Format. *sigh* I'm off to buffer overflow my barrista so
I can get free coffee. |
| First SAFER of Y2K |
Jan 20, 2000 |
| gdead |
| Better late than never, Siam Relay has released
January's SAFER
Newsletter. It's got the usual sploits, alerts, DoS's, and
general security news. I think we're all a step behind because
of the RSA conference. Even HackerNews is not doing
updates until after the show. It stands to reason, tho, since
HNN is run by the boyz at L0pht, L0pht just got aquired
by AtStake, and AtStake has a booth there. |
| CyberTerrorists and Your IT Dept
|
Jan 19, 2000 |
| gdead |
The NYT has an
article on a break-in and ransom attempt at Visa. The
incident occured in December, but Visa just announced it this
week. Apparently the hacker didn't take anything "valuable"
with him, so Visa didn't give him a cent (yeah Visa!). The
real reason I post this article, however, is the quote from
Forrester Research in the last paragraph:
"When
companies worry about terrorists, they hire a security firm
specializing in physical threats. Computer security is no
different -- just because you have an (information technology)
department doesn't mean it has the skills or training to
deploy effective enterprise security"
Hear hear,
cheers, and all that. |
| DVD-CCA vs. The World Preliminary
Injunction Hearing |
Jan 18, 2000 |
| pablos |
| I just returned from the Santa Clara Courthouse
where I got to hear attorneys from both sides arguing on the
DVD case. There was an all star cast in attendance, but I
won't name names (lotsa Cypherpunks). We filled up all the
chairs in the courtroom anyway. Things appear to be going
well. The EFF lawyers are doing a fine job as far as I can
tell. Too bad you won't get any reporter type details on the
case from me. Wired was there, read their site. I got a free
t-shirt with the code for css_descramble.c and a flyer with
contest results from http://dvd.zgp.org/. This stuff
was given to the DVDCCA lawyers too which was pretty amusing.
Looks like The Shmoo Group needs some real reporters. I tried
to take notes but quickly realized I haven't tried writing in
about 15 years and my penmanship is shot. No laptops in the
courtroom. |
| BXA Replies to Declan McCullagh
|
Jan 18, 2000 |
| curator |
| Eugene Cottilli of bxa.doc.gov has responded to
Declan McCullagh's article on Wired, "Is
This Man a Crypto-Criminal?". It's short, sweet and to the
point. The upshot is that John Young isn't a cybercriminal if
he notifies bxa about
it. |
| In Defense of nCipher |
Jan 18, 2000 |
| gdead |
| Two days after Bruce Schneier gave
nCipher hell for releasing a vulnerablity as a ploy to
sell more product, Thomas H. Ptacek posts
a response on SecurityFocus. Ptacek claims that Schneier's
stance on full disclosure security is counter to restraining
the publication of vulnerablities on the basis of intent of
the publisher. He also states that several groups that "do
things right" such as L0pht actually are commercial
org's much like nCipher. For as much publicity nCipher got for
their press release, they're about to get a bunch more because
of this debate... $1000 well spent if you ask me. ;-) |
| January 2000 Cypherpunks Meeting
Notes |
Jan 17, 2000 |
| pablos |
| I don't take very good notes at these things, so
don't expect much. I've got all the crucial links though. This
was a big meeting due to the RSA Conference frenzy. Lots of
names you know from the listserv showed up with their meat. We
talked for a hell of a long time about the DVD Encryption case
with John Gilmore. Zeroknowledge showed
up and talked a lot about the status of Freedom and what kinds
of issues they're dealing with. Bill Scannell reported on his
new years trip to Lebanon, where he hung out with a terrorist
organization. Also somebody posted a new version of Solitaire.
Read
the notes here. |
| January 2000 Cypherpunks Meeting
Notes |
Jan 17, 2000 |
| pablos |
| I only make a halfhearted attempt to take notes
at these meetings. Mostly I don't want people to get used to
it. Somebody else should take good notes. Anyway, I capture
most of the crucial links. We had some good discussion on the
DVD Encryption case with John Gilmore in particular. Talked
about various RSA Conference related crap. ZeroKnowledge has
been kicking ass, and they talked about some of their
challenges. Also in the notes is a link to a new &
improved version of Solitaire. Got a from Bill Scannell who
spent new years in Lebanon hanging out with some terrorists.
Read
the Notes. |
| Gearing up for RSA |
Jan 17, 2000 |
| gdead |
| The RSA
conference starts today, and it promises to be a good one.
They're expecting over 8000 attendees, including Dennis Miller
(the comedian... you remember him, right?). At RSA, you'll be
able to internationally e-mail PGP to your friends at a Pretty
Good Party, or you can become a defendant in the DVD
lawsuit by wearing a BAD
T-shirt. You can even walk 4 blocks down the street and
attend the DVD hearing. Our man Pablos is going to do
just that, and report back here with anything exciting,
interesting, or just plain strange. |
| New Edition of the Crypto-Gram
Available |
Jan 17, 2000 |
| curator |
Bruce Shneier, of Counterpane
Systems fame, has released a new
edition of the monthly Crypto-Gram newsletter. In this
month's newsletter, you'll find:
- Conflicts of interest with security advocacy by
commercial security companies.
- A pointer to the Counterpane review of IPSec.
- A rap on Netscape's corporate head about their password
encryption.
- Essay on block and stream ciphers.
- Responses to reader mail.
Happy reading. |
| Chock Full of Crypto-ey Goodness
|
Jan 16, 2000 |
| curator |
| We've just added some more crypto source code in
the Crypto
Archives. It's just a small start, but we hope to have
more there soon. Until then, have a look, and a download, and
happy using. |
| NAI Flounders and Filets |
Jan 16, 2000 |
| gdead |
| After gobbling up $2.3 billion dollars worth of
smaller companies in the last two years, Network Associates
(aka: the evil empire) is splitting itself up. They are
forming four separate companies: McAfee - for virii, PGP
Security - for VPN's and encryption, Magic Solution - for
helpdesks, and Sniffer Tech - for network management. This is
a stellar idea, since all they've done is slow down the
software development in the companies they've purchased. Maybe
I'll actually be able to get a PGP plug-in for Netscape
someday. Read the whole story at ZDNet.
|
| John Young a Criminal? |
Jan 15, 2000 |
| gdead |
| John Young who
constantly pushes the crypto export laws and Freedom of
Information Act to their limits has done it again. On Friday,
he posted PGP 6.5.2a
to his site in celebration of the new crypto export regs. The
catch is that they're in compiled binary form. While source
code export has been made much easier (but has some silly
requirements), object code export is still kind of grey. Wired
has a piece
on John and his most recent exploit. |
| Bernstein Case Pushes On |
Jan 14, 2000 |
| gdead |
Wired has an article
on the possible outcomes of the Bernstein Case.
Cindy Cohn, lead counsel for Bernstein, indicated that even if
the Feds tried to drop the case, they would still battle on to
get the regs declared unconstitutional.
"We've got
a problem with an approach that draws the kinds of lines
they're drawing. If they go into the court and they say it's
over, we've fixed everything, [we would contest that],"
|
| Osiris for UNIX Release |
Jan 14, 2000 |
| gdead |
| The Shmoo Group is proud to announce a UNIX port
of Osiris, our file
verification program. Run Osiris once before you place a
machine into production to create a database of the checksums
of all executables on the box. Then re-run it later to verify
that the current binaries are the same as the installed ones.
If you notice a difference, you're-in-trouble-city. ;-) Osiris
has been tested under Linux, FreeBSD, and Solaris. If you run
it under another platform and it works, please let Brian (the author) know. So
what are you waiting for? Go download it now. And
subscribe to the mailling list while you're at it so we can
keep you updated on patches and enhancements. |
| IDS for Fun and Profit |
Jan 14, 2000 |
| gdead |
| Thanks to all those who showed up at UAA last
nite to watch me rant about intrusion detection systems. I've
made the presentation and notes available here for those who
would prefer an online copy. For those who weren't there, feel
free to read and comment on the presentation. It's available
in both HTML and PPT. |
| Cracking DES on US Soil (again)
|
Jan 13, 2000 |
| gdead |
| The new crypto regs seem to completely release
"open source" strong crypto from any and all restrictions. To
celebrate, TSG is proud to once again announce the
availability of EFF's bookCracking
DES freely to everyone except those in the 7 countries
declared "evil" by the DoJ. However, according to the wording
of the regs, we don't even have to check if you're coming from
those countries. The book that was meant to be free is finally
free, and hopefully Dr. Bernstein's
ordeal will end. |
| EFF: New Crypto Regs Still
Unconstitutional |
Jan 13, 2000 |
| gdead |
EFF, the ACLU, and EPIC have released a statement
that the new crypto regs "still have serious constitutional
deficiencies". The most notable is that there is still a
descrepancy between crypto source that can be distributed on
paper vs. distributed on the Internet.
"The new
regulations, like the old ones, impose special requirements on
Internet speech, contrary to the Supreme Court's 1997 ruling
in Reno v. ACLU. The regulations require that the government
be notified of any electronic "export" of publicly available
encryption source code, and prohibit electronic "export" to
certain countries. Yet people may freely send the same
information anywhere on paper." |
| Where Did Your Bugtraq Mail Go?
|
Jan 13, 2000 |
| gdead |
| If you haven't been seeing your bugtraq mail for
a few days, you may want to read this
administrative message Elias Levy sent out yesterday.
Basically AboveNet is
blocking ORBS's
DoS^H^H^Hmail relay checks, so ORBS retaliated by adding all
mail servers attached to Above to the SPAM database.
SecurityFocus gets their address space from Above, so their
mailservers are in the DB now. If you or your ISP is
subscribed to ORBS, your bugtraq mail is going into the
bit-bucket. |
| US DMV's Banned From Selling Info
|
Jan 13, 2000 |
| curator |
| In yet another bit of good regulatory news, the
US Supreme Court has
upheld the federal ban on state motor vehicle departments
selling their driver information database to marketers and
other such dreck. While this ruling is causing a bit of heart
burn in regards to states' right, it seems to fall under the
federal interstate commerce laws. Nonetheless, states must now
ask us before they sell our information to spammers, though
insurance companies, impound lots, and government authorities
still all have free access. |
| New U.S. Crypto Regs Released |
Jan 12, 2000 |
| curator |
| As stated in the Department
of Commerce docs, or in the easier to read Techweb
article, the U.S. government has released new regulations
regarding crypto exporting. It seems now that we're allowed to
export and post encryption source code for download (though
this will require some notification of the intent to do so),
and there's been a relaxation of controls on interbusiness
crypto software. Also, any readily available encryption,
including strong crypto, software can now be exported with
some sort of governmental review.
While definitely a very good thing, the rules still seem
awfully complicated and occasionally vague, thus still
requiring lawyers. However, we entreat you to read the regs
for yourselves. |
| IDS and Stides and AKLUG, Oh My!
|
Jan 12, 2000 |
| gdead |
SecurityPortal has a piece
on why signature based IDS's will fail. w00t! It feels like
the movement toward creating more intelligent IDS and virus
scanners is approaching critical mass. The University of New
Mexico has received a lot of press lately regarding their computer immune
system. Check it out. CPU intensive, but Moore's law
claims that won't be a problem for long.
Speaking of
IDS, I'll be giving a talk at the January Alaska Linux Users
Group(AKLUG) Thurs Jan 13th at 7:30. It will be in the UAA
Library second floor bibliographic room... just follow the
signs. If you're in the Anchorage bowl, please attend and
throw things at me. ;-) |
| Book Review: The Code Book, by
Simon Singh |
Jan 11, 2000 |
| curator |
| The first of what we hope will be many book reviews
has been completed and is
available for your perusal. We plan to add reviews as we
find and read pertanent (in keeping with our security,
privacy, crypto domain) books and other such material. |
| Entrust Technologies Challenging
Verisign/Thawte Union |
Jan 11, 2000 |
| curator |
| If anyone should have a reason why these two
corps should not be joined in holy matrimony, speak now, or
forever hold you peace...
Entrust
has filed antitrust papers against Verisign who late last
year announced their intention to purchase Thawte Consulting.
The move follows a Virginia court's dismissal of Entrust's
attempt to obtain a temporary restraining order against the
takeover. Entrust, like several of us, are concerned that the
combined companies will account for 99% of the certificate
issuance market. |
| CyberCash Disputes Hole In ICVerify
|
Jan 11, 2000 |
| gdead |
CyberCash claims
there is no way that the credit card numbers stolen from
CDUniverse came from ICVerify:
CyberCash's ICVERIFY
product is a pc-based payment system, not a Web-enabled
product and is not being used by CD Universe on its Web site.
Therefore, the credit card information cited in recent
coverage could not have come from ICVERIFY
That's
a pretty bold statement to make. I've seen ISP's do all kinds
of weird shoe-horning to ICVerify to get near realtime
transactions out of it. An EC site using it could very
possibly shoe-horned it all the way in, and in the process,
broken the security of what is basically an offline system.
I'll spare my general thoughts on ICVerify for another day.
|
| New Security Paradigms Workshop Call
For Papers |
Jan 11, 2000 |
| gdead |
| ACM is hosting the 9th New Security Paradigms
Workshop in Ballycotton, Ireland September 19-21. Workshop
attendance is very limited... only the conference organizers
and authors of accepted papers will be allowed to attend. The
content is usually highly interesting since the authors are
"encouraged to present ideas that might be considered risky in
some other forum." Past topics have included Securing
Information Transmission by Redundancy, Secure Dynamic
Adaptive Traffic Masking and Strike Back: Offensive
Actions in Information Warfare. If you're interested,
check out the call for
papers. |
| Don't Negotiate with Cyber-terrorists
|
Jan 10, 2000 |
| gdead |
| A big "up" to CDuniverse.com. Not for
their security; they got hacked and had thousands of credit
card numbers stolen through a hole in CyberCash's ICVerify.
However, once they were contacted by the hacker, they didn't
negotiate. This may have been purely accidental (ie: sloppy
internal management) but it appears to have been purposeful.
I've always been a big fan of not dealing with terrorists, but
in most real world situations they are dealt with and get at
least some of their demands met, including publicity. In
CDuniverse's case, it wasn't lives that were lost, but
thousands of credit card numbers. Assuming they (or cybercash)
can fix their security problems, I'll gladly do business with
them knowing they won't make deals or launder money to hide
their mistakes and perpetuate the problem. Check out InternetNews
for more.
Pablos: This isn't as
noble as it sounds. CDUniverse should have paid the hacker. It
was their obligation to secure the data & they didn't do
it. Now it is other merchants who will absorb the fraud
associated with those 300,000 card numbers, not CDUniverse.
|
| B2B Commerce, XML, and other
Buzzwords |
Jan 9, 2000 |
| gdead |
| Security Portal's
cover stories keep getting a little better each week. This
week's example, Business
to Business: Secure Commerce from B 2 shining B takes
a look at technologies critical to B2B Commerce. From the
bright future XML has, to the shortcomings of SSL in a
transactoin based network, they cover the bases. Hopefully in
the coming weeks they'll dive into some of the more thorny
topics like what's out there that's better than SSL. |
| DeCSS Defense Briefs |
Jan 8, 2000 |
| gdead |
EFF has posted the briefs filed in opposition to
the preliminary injunction requested by the DVDCCA. You can
find them at http://www.eff.org/pub/Intellectual_property/DVD/.
For a legal document, it's fairly readable. The defense's
arguements, in short: - Plaintiff's Alleged Trade Secret
Is Readily Ascertainable By Proper Means - Plaintiff's
Alleged Trade Secret Lost Its Status As Such When DeCSS was
Posted On The Internet - Plaintiff Has Failed To Show That
An Injunction Would Be Anything But Futile Or That It Will
Suffer Irreparable Harm - The Relief Requested By
Plaintiff Runs Afoul Of Established Constitutional Principals
Guaranteeing Freedom of Speech (mmmm... 1st amendment..)
|
| GI Bill For College-bound Hackers
|
Jan 7, 2000 |
| gdead |
| This morning, President Clinton proposed
a plan that would "offer college scholarships to
students in the field of computer security in exchange for
their public service afterward". The Feds have really
taken their Cyber-war/terrorism initiative to the next level.
First a public declaration that cyberspace is now a warground,
now a plan to provide ROTC/GI-bill like programs to up and
coming computer professionals. I'm not sure where I stand on
this. I understand the need to protect the country's
infrastructure, and I'm all for that. But the private sector
can barely hire enough security professionals; how will they
be able to compete with something made to gobble up the talent
before it even hits the market? |
| What's AtStake? L0pht. |
Jan 6, 2000 |
| gdead |
Well, now that Y2K is over, the real strange
stuff is starting. AtStake, who's baren
website doesn't begin to describe what is going on, announced
that they've secured $10MM in VC to "help secure the
e-commerce revolution". The surprising part? L0pht has merged with AtStake
to form their R&D wing. Oof! There's still no mention of
this on L0pht's homepage, but I'm sure there will be soon
enough. They also picked up Dan Greer (of CertCo fame) as
their CTO, which is news in it's own right.
UPDATE: L0pht and @Stake have both updated
their homepage this morning. Yesterday, the @Stake webage
simply said "Coming soon...". It's a bit more advanced now.
;-) |
| New Crypto Regulations Draft |
Jan 6, 2000 |
| gdead |
| Thanks again to John
Young for HTML-izing the latest draft copy
of the proposed crypto regulations. This one is just about as
difficult to read as the first one. Some of the definitions
have been "relaxed", and source code export is a bit easier,
but it's still not laisez-faire. If you prefer the
orginal pdf, you can find it here.
|
| Whisker and Trin00 Updates |
Jan 5, 2000 |
| gdead |
It seems that someone at Network Security
Wizards was listening when Rain Forest Puppy discussed
how Whisker evades IDS's. They posted a
reply stating that their Dragon IDS wouldn't be fooled by
any of Whiskers tactics. Groovy baby.
Marcus Ranum,
from NFR, also delved a bit deeper into how
difficult it is to detect Trin00 and TFN. The tools that
have been released basically pretend to be the master server
and query potential clients. This is unfortunately very easy
to by-pass in future releases of the agents, but it should
find most of the currently installed ones. "...we're
fortunate that the hackers that build these kind of tools
don't really understand computer security, or they'd realize
that the systems they build are vulnerable to traffic
analysis." |
| The Slings and Arrows of Information
Warfare |
Jan 5, 2000 |
| curator |
| Incoming Vice Chairman of the Chiefs of Staff,
AF General Richard Myers said today in an
interview today that cyberwarfare will become "one more
arrow in the quiver" of the US war makers, just as soon as the
legal and policy issues figured out, thus making attacks on
foreign nations' computer networks equivalent to missiles and
slings and arrows and stuff.
I can't imagine how this is going to be managed from a
legal and political point of view. Foreign countries already
get pretty hacked off when we send jets over their countries
to go bomb the living daylights out of some dictator's people.
Imagine what they're going to do when we start using some of
their infrastructure, especially when you consider the often
relatively small pipe to and from the countries in transit
from the US to the target. Imagine if the Croats and the US
get into some cyber-pissing match in the middle of war, thus
hogging all or major portions of the bandwidth of the transit
countries (or providers). Said countries (or providers) then
rip down the circuits in question (or black hole them). Then
what are the hackers on either side to do? Suppose MCI,
AT&T or someother provider decides the US military is
hogging to much bandwidth, or the Iraqis decide that attacking
the US provider networks is the best way fight. The the
providers then drop all of the US military traffic. What does
the military do then? Require MCI or whoever to allow the
traffic? At that point, the government is nationalizing the
entire network between the US and the target country. Yeah,
that'll go over well. |
| Hackers Inside the Gates |
Jan 5, 2000 |
| gdead |
| How well do you control access to resources from
people inside your firewall? Does your security stop at the
firewall and allow those inside to do as they please? After
all, they are trustworthy employees, right? According to a new
survey that is far from the truth. Up to 35% of data
stolen is taken by "discontented employees" compared to the
28% that outside hackers steel. One more reason for multiple
layers of host-based security on ALL resources. SunWorld has
an article discussing how
to secure hosts from internal hacks especially those from
over zealous admins. |
| Don't Share Your EC Server With Your
Friends |
Jan 5, 2000 |
| gdead |
The NYTimes is running an
article on an attack
against a webserver's private key developed by Nicko van
Someren and Adi Shamir. The attack leverages the fact that the
bit pattern in a key has much more entropy than the bit
pattern found in most files on a harddrive, making it stick
out like a sore thumb. This allows the key to be easily
discovered, and using an "evil" CGI, you can easily find the
key on the shared e-commerce server your share with many other
companies (much like many small companies do with their ISP).
"The C.G.I. attack, Mr.[Robert A.] Hettinga said,
proves that these days, "sharing a digital commerce server is
like sharing someone's toothbrush." |
| A Dozen Ways to Confuse Your Web-IDS
|
Jan 4, 2000 |
| gdead |
| OK, back on to something a bit more serious.
Rain Forest Puppy (author of Whisker and winner of
the strange name of the day award) has written
a piece for Securityfocus.com on how he attempts to elude
web IDS's. He discusses how Whisker uses things like URL
encoding and self referencing directories to scan a web server
for vulnerablities and avoid detection. The interesting thing
is most of his methods result in a valid request that the
webserver will still handle, but the IDS will miss. I hope
that IDS vendors take note of this kind of stuff.... |
| Recipe of the Day (ROTD) |
Jan 4, 2000 |
| grendel |
| Hey if Pablos can make a silly
post, then by all means... Let the silly posting
commence! Just stumbled across this little gem:) Schmoo
Torte! Apparently as aesthetically pleasing as it is
tasty, and gauranteed Trojan free:) |
| Quote of the Day |
Jan 4, 2000 |
| pablos |
| "I'm one of those people I would have mocked." -
gdead |
| The First Advisory of Y2K |
Jan 4, 2000 |
| gdead |
| CERT has released another advisory
on distributed DoS tools ala Trin00 and TFN2K. They also
discuss a new tool called "Stacheldraht" which combines much
of the features of Trin00 and TFN while also allowing for
encrypted communication between the attacker and master
servers. It also allows... hehe.. automatic updates to the
agents. Check out this excellent
analysis of this new tool. In non-news, CERT announced nothing
bad will happen on Feb 29. Well, thank god. |
| Seven and a Half Non-risks of PKI
|
Jan 3, 2000 |
| gdead |
Ben Laurie, from the AL Group, has posted a
response to Ellison's and Schneier's Ten Risks of
PKI. He's entitled it "Seven and a Half Non-risks of PKI:
What You Shouldn't Be Told about Public Key Infrastructure"
and you can find it here. To
quote Mr Laurie:
Whilst I agree with the conclusion
("Public-key infrastructure has been oversold as the answer to
many network security problems") I find myself at odds with
many of their arguments. So, I felt impelled to write a
response. And here it is.
It is also worth noting
that, oversold or not, PKI is the only thing we have right now
that even remotely begins to solve some of the problems we
have. |
| Goldstein and Palmer on Hacking
|
Jan 3, 2000 |
| gdead |
| CNN has a great
interview with Emmanuel Goldstein (2600 editor-in-chief)
and Dr. Charles C. Palmer (of Global Security Analysis Lab
fame). As one might guess, their views differ wildly, of
course starting out with diverse definitions of the term
hacker. Goldstein states "Hacking is, very simply,
asking a lot of questions and refusing to stop asking."
Palmer's definition? "Hacking is unauthorized use of computer
and network resource." Wow! If these guys don't fit the
typical white-hat/black-hat stereotype, I don't know who does.
|
| Slashdot Interview with L0pht |
Jan 2, 2000 |
| gdead |
| I meant to post this link on Friday, but with
all the beer^H^H^H^Hwholesome family entertainment, I forgot.
Anyhoo, Slashdot
interviwed some members of l0pht last week, and the topics
were fairly scattered (as one would expect), but my personal
fav is "Government vs Corporations" one at the top. A bit
long, but definately worth the read. |
| Summary of the Silliness |
Jan 2, 2000 |
| gdead |
| Well, the night of nights has come and gone, and
it was relatively un-eventful. Personally, a few of my admin
scripts broke, mostly displaying "100" as the year. Sean
Donelan posted the
wrap-up from the NANOG ISP Y2K mailing list, with the most
notable incidents being related to ccTLD's. The 01/01/2000 update from
SANS' GIAC indicates that the night was relatively slow,
but RPC attacks seem to be on the rise. The CW now indicates
that these RPC attacks are mainly targeted at Solaris boxen
and are used to deposit the Trin00 and TFN DoS clients. The
upside of the whole weekend is many admins had to learn a
thing or two about security. ComputerWorld
has more on that. |
| Y2K Updates |
Dec 31, 1999 |
| grendel |
| Well, its been the year 2000 in New Zealand for
about 5 hours (as of this writing), and reports are trickling
in by jet assisted carrier pidgeon. Yes the Apocalypse
happened and there is mass looting and destruction down under.
Its like Beyond Thunderdome already! *shiver* Kay, maybe not,
in fact nothing much happened. But, come to think of it, I
haven't heard from Adam,
he might be frantically trying to repair Earthlight in
Dunedin.:) Nope thats up too, *sigh* oh well. You'll all have
to content yourselves with accounts
from the front, posted on slashdot.
Another interesting point, while there was much hype
surrounding "Y2K Virus" threats, i.e. those virii coded
specifically to wreak havoc at the rollover, CERT has issued a statement
as to their assessment of the actual threat of this happening.
Original estimates were in the thousands, now *poof*
apparently not many are expected. As someone who wasted quite
a bit of time on this subject, I'm a bit miffed.:) |
| Amazon Becomes Center of New Privacy
Debate |
Dec 30, 1999 |
| gdead |
| An article
in the NY Times (free reg required... how ironic)
discusses a FTC complaint filed against Alexa Software, and
parent company Amazon, by Richard Smith. As NYT states: At
the center of the confrontation is an Internet privacy issue
that is currently being bitterly disputed in Washington:
whether the good intentions of a corporation are sufficient to
protect individual privacy. Which is more evil: big
business or big government? I don't like either of the
answers. |
| DeCSS Injunction Denied |
Dec 29, 1999 |
| curator |
| In a bit of holiday happiness, the Santa Clara
judge overseeing the DeCSS lawsuit has denied
a restraining order sought by DVD CCA (plaintiffs) to keep
Slashdot and others (defendants) from posting links and
information about DeCSS and the reverse engineering of the CSS
algorithm. Lucky Green has posted
his account of the hearing to the Cypherpunks list, and is
a very worthy read.
Round 2 begins January 14, 2000. |
| Yahoo! Sued for Giving Users Too Much
Privacy |
Dec 29, 1999 |
| pablos |
| I know you're all sick of the "News of the
Weird" motif we've fallen into lately, but it isn't our fault.
Security and privacy issues on the internet are rampant with
folly. Of all the ridiculous things, Yahoo! is being sued for
US$4(10^9). A temporary restraining order has been granted
against Yahoo!, ordering
it not to publish its privacy policy until the suit is
resolved. Needless to say, we've posted a "backup" copy here
at Shmoo.com, just in case it goes down and you want to
know your rights. In case you want to know what is actually
going on, you can read that at a real
news site.
Consider this: Does Yahoo! have a contractual obligation to
post its privacy policy in order to be a Truste member? Will
Truste sue if Yahoo! complies with the restraining order?
Shift-Colon-Q-Bang-halt. |
| Apple Releases Fix for Mac DOS Attack
|
Dec 29, 1999 |
| curator |
| Apple yesterday released the
patch to fix the OT vulnerability allowing distributed DoS
attacks using Mac OS 9 boxes as slaves. |
| EFF to Defend Targets of DVD Lawsuit
|
Dec 29, 1999 |
| gdead |
| Yesterday, the DVD industry filed
suit against site owners that knowingly posted or linked
to DeCSS. Shortly thereafter, EFF
stated that it will send a legal team to help defend the
target of the lawsuit. EFF claims that the DVD CCA's
accusation that posting or linking to DeCSS is a "theft of
trade secrets" is groundless since CSS was reverse engineered
(which is not illegal, esp in the district the suit was filed
in). To learn more about the CSS algo, check out this
recent post to cypherpunks. |
| Mac DOS Attack |
Dec 28, 1999 |
| grendel |
| John Copeland a professor at Georgia Tech has
discovered an interesting feature of MacOS 9 while monitoring
standard network traffic to his box. Apparently by sending a
custom UDP packet only 29 bytes long, you can get a 1500 byte
ICMP packet back:) This has neat potential as a DOS attack.
You'll find all sorts of info on the problem, crafting the
required UDP packet and using the resulting ICMP packets in
the form of an attack on his
page. |
| IDC claims PKI revenues to rise past
$1 Billion. |
Dec 28, 1999 |
| grendel |
| I stumbled across this short article by way of
Security Portal.
Market research firm International Data
Corporation (IDC) predicts a rise in PKI revenues from
$122.7 million in 1998 to $1 billion by 2003. TSG is a big
proponent of PKI, and this article has personal interest for a
guy considering deploying PKI to a corporation of 10,000
stretched across 21 countries. Mmmmm Smartcards:) |
| Black-Hat Ops in Sweden |
Dec 28, 1999 |
| gdead |
| Looks like another country is getting into the
buzzword-compliant Cyberwar. Sweden
is training a pile of 'IT Soldiers' to defend (and attack)
network infrastructures. I hope their upstream doesn't
disconnect them because they're hacking. ;-) |
| SmartCards: The Alternative Way to
Remember Your 2048 Bit Password |
Dec 28, 1999 |
| gdead |
| Smartcard enthusiasts have been saying all along
that as computing power increases, standard password-based
auth won't work anymore. Everyone knew deep down that they
were right, but "How am I going to deploy a smartcard
infrastructure?" One answer is have all your employees get
AmEx Blue Cards which come with their own serial port
smartcard reader. Another is to use Compact Flash cards and
their USB readers (think digital camera). I'm currently
working on a project of that nature, but more on that after
the New Year. In the meantime, check out this
ZDNet article that discusses our "Smart" future. |
| FTC Commissioner Discusses On-line
Privacy |
Dec 27, 1999 |
| gdead |
| The SJ Mercury News recently cornered FTC
Commissioner Orson Swindle to discuss on-line
privacy. Swindle (hehehe) believes that there are real
threats to consumers privacy that simple education can't stop.
He also states that while orgs like Trust-e and BBBOnline
don't take the place of legislation, they are on track to do
so. God help us. |
| SAINT 1.4.1 Released |
Dec 27, 1999 |
| gdead |
| Remember SATAN? That super-useful yet under
developed tool for looking for network vulnerablities? Well WWDSI picked up the ball a
few years ago and developed SAINT to serve the same purpose.
They offer a free, unrestricted version for download, or a
for-pay, beefed up version for those that need the extras they
can offer. Either way, 1.4.1 was released today. Go download it. |
| SANS Asks For Your Help |
Dec 25, 1999 |
| gdead |
| Even though some
hackers have indicated they will take Y2K off, there is
still going to be an amazing increase evil traffic on most
networks. SANS has set up a
Y2K watchcenter to help people in the industry identify
emerging threats over the coming days. They're asking
for your help by supplying them with captures of bad
traffic you've seen on your network. They seem to be keeping
up with the flood, so check out the updates every 4 hours.
|
| Forged CERT PGP Key |
Dec 24, 1999 |
| gdead |
| CERT has issued a warning
that at least one keyserver contains a forged CERT key. As the
Y2K hacker-fest heats up, more and more people will be sending
information to CERT. Please make sure you're using the valid
key to send reports, else they will fall on deaf ears. |
| Attack Signature Systems Are Dying
|
Dec 22, 1999 |
| gdead |
| For those of you that know me, and have heard me
run off at the mouth on my theories of the computer world
(usually while I'm drunk at a conference), one of my big
complaints regarding IDS and virus scanners is they almost
exclusively rely on the recognition of a known attack
signature in order to actually do anything. I've always felt
this is a bad way of doing things. As your problem domain gets
larger (ie: you have more people trying to do bad things to
you in new and different ways) cataloging all known attacks
gets to be a harder and harder process. Plus, for those
unfortunate few that are the first victims of the attack,
there is no defense. The solution is to make IDS/virus
scanners more intelligent (AI time, baby.. neural nets and the
whole nine yards). It seems that there
is some progress being made by Finjan in the virus world.
And there are a few IDS projects that attempt to be smart, but
the whole idea is still in it's infancy. In the meantime,
we're still vulnerable to anyone with half a brain. |
| Elliptic Curve Crypto Distributed
Client |
Dec 22, 1999 |
| gdead |
| There is now an effort
underway to crack Certicom's 108 bit ECC challenge. Unlike
the RC5 and DES efforts, this is not an exhaustive search.
They actually use some elegance to find the 2 parts of the
key. The reward money goes to you ($1K), the folks that wrote
the client ($1K), and the Apache Foundation ($8K). They're
already through 5% of the problem space, so download a client
and get cracking. |
| Trin00 and Tribal Make the Big-Time
|
Dec 21, 1999 |
| gdead |
| An article
in CNN that discusses the eToy vs. etoy debate tries (and
mostly succeeds) at decribing distibuted DoS attacks such as
Trin00
and TFN. As much as many security professionals like to
shrug DoS attacks off stating that there only done by script
kiddies, these distributed attacks are a serious problem.
Maybe RMS will call for an attack on Amazon for their patent
issues. ;-) |
| The Giant Sucking Sound In PKI
|
Dec 20, 1999 |
| curator |
| Verisign announced
today that it has acquired Thawte Consulting for a little
over a half billion dollar stock issuance. Reasons this sucks:
Verisign and Thawte are #1 and #2 in the biz. As one company,
they tie up about 90% of the server SSL-cert market. Having
one corporation own that much of the PKI, is silly and
dangerous. And whereas Thawte was an approachable company with
some hacker mind share, now they're going to merged into
Verisign who has a very corporate attitude with the buy
everything mentality. |
| SecurityPortal: The Year in Review
|
Dec 19, 1999 |
| gdead |
| Well, it's getting toward the end of the year,
and that means everyone does an "In Review" segment. It gives
readers a chance to remember the ups and downs of the past
year... yeah right. What it really does it allow half your
writers to go on vacation because you're using old news to
piece together a new story. TSG would do an "In Review" piece,
but we've only been around for 2 months, so it'd be kinda
short ;) Seriously, check out Security
Portal's Year in Review to get your daily dose of
flashbacks. |
| Zero Knowledge Systems Holding up to
the Heat |
Dec 18, 1999 |
| pablos |
| Zero Knowledge Systems has been meeting with
Canadian and US Feds and some folks expressed concerns about
what would happen to ZKS. Namely, would they be forced to
compromise their stand on privacy. Austin hill responded to
this with a reasonable statement about what these meetings
have consisted of. Read
the post. Secondly, Tim May wrote an extensive rant about
his concerns with ZKS, and pseudonymity services as a
business. People
should read this to understand the complexities ZKS is
dealing with. |
| Hong Kong Blondes (or "Why Coca-Cola
is Evil") |
Dec 17, 1999 |
| gdead |
| In a WorldNet
Daily article that's almost too strange to be true,
Anthony C. LoBaido unfolds the mystery around the 31337
hacking group Hong Kong Blondes. While I'm not sure if
I believe everything that is said in this story, it's chock
full of great stuff; a beautiful ex-british female spy who
loves to hack, reasons why Coke and Henry Kissinger are evil,
and Jack-in-the-Box tacos... *drool* Hacking and Jack tacos,
what else could you ask for in downtown Hong Kong? |
| Go-go Gadget Hacker Census |
Dec 17, 1999 |
| gdead |
| Ira Winkler, the "security professional", has made
up some more numbers representing the current state of the
hacker community. According to Ira, there are between 5,000
and 10,000 "hackers who are good enough to write their own
tools," up from 1,000 a year ago. Does anyone have any
idea how he came up with these? I'd really like to know,
because I never recieved my hacker questionare in the mail.
|
| Netscape Password Encryption Broken
|
Dec 16, 1999 |
| gdead |
| Conventional wisdom has stated that checking the
"remember my password" button in Netscape was a bad
idea. Not only was the crypto a black box, it's generally
a bad security practice. Well, RST broke the
algorithm used to encrypt mail passwords stored locally.
Apparently this particular hole has been patched in
Communicator 4.7... but still, it's not that big of a hassle
to type in your password everytime. Check out ComputerWorld
for the mass media's take. |
| December Crypto-Gram Available
|
Dec 16, 1999 |
| gdead |
| It got published very late in the day (possibly
because of Counterpane's re-org), but regardless, the December
Crypto-Gram
is out. Topics of this month's rant include a discussion of
Sarah Flannery's Public-Key Algorithm, European cellular
encryption algorithms, and my personal favorite is a section
on Egg Bank. |
| New SAFER Newsletter Out |
Dec 15, 1999 |
| curator |
| Siam Relay
Ltd. today released this month's SAFER
Newsletter a compendium of the month's security alerts and
news, tool releases, exploits and what not. Get 'em whille
they're hot! |
| Clinton Admistration Encourages
Hacking on Jan 7-9th 2000 |
Dec 14, 1999 |
| gdead |
| In a surprise move, the Clinton Administration
asked that hackers "show some self-restraint" over the New
Years weekend. With all the Y2K problems going on, the
government and private sector would rather not deal with a
bunch of attacks as well (duh). They continued on by
recommending that if you'd like to hack something, you do it
the following weekend. I swear, this is true. Check out ZDNews
for the whole story. |
| Buffer Overflow in SSHd (v1.2.27)
Compiled with RSAREF2 |
Dec 14, 1999 |
| grendel |
| Seems there's a buffer overflow in SSH v1.2.27
that when explicitly compiled with the RSAREF2 (--with-rsaref)
library allows arbitrary code to be executed. There are
patches already available for the effected systems. Nuff said,
read the CERT
Advisory. |
| Checkpoint Firewall Coming to DSL
Service Near You |
Dec 14, 1999 |
| curator |
| Checkpoint is expected to announce
today that they're forming a new company called Sofaware,
that will attempt to bring firewall technology to DSL and
cable modem devices everywhere. They are also working on the
ability to have the firewalling service run by the ISPs so the
ISPs can control and charge for the service. Mmmm...
firewalling for fun and profit. |
| Anonymous Speech Comes Under Fire
|
Dec 14, 1999 |
| gdead |
| The first questions over whether the Freedom
Network is TOO anonymous have
been asked. Nandotimes reports on how the Freedom could be
used for evil purposes (surprise!). They also indicate that
Zero Knowledge will be meeting with the FBI shortly to "brief
them" on Freedom. Let's hope that nothing terrible happens in
that meeing. IMHO, totally anonymous speech is a good thing;
even though some bad things may come of it, it's better than
the alternative. |
| New Crypto Regs Delayed |
Dec 14, 1999 |
| gdead |
| According to the NY Times, the White House is
delaying the release of the much anticipated new crypto
export regulations. The Clinton administration claims they
need another month to "address the widespread criticism
that greeted a draft of the regulations". Lame. The
release of the crypto regs was also the reason that the
hearing of the Bernstein case was pushed back to
March. While the new release date probably won't effect the
case further, you never know. |
| PGP Granted License for Worldwide
Export |
Dec 13, 1999 |
| pablos |
| As of today, NetAss can export PGP to "virtually
all countries worldwide" without restriction. They got a
license from the U.S. Government to do so. Of course this is
fantastic news, but should be considered suspect of tainting
by the NSA. As always, get code reviews and compile your own
crypto software. NAI
Pres Release. |
| Dumpster Diving Contest Ends |
Dec 13, 1999 |
| gdead |
| Two weeks ago, Kirk Bailey challenged a bunch of
security geeks to find out as much personal information as
they could. The results
are in, and it looks bad (and it requires a free NYT
registration, but that's a different story). In two weeks,
without doing anything too illegal or using up too much time,
they were able to dig up his SSN, a copy of his birth
certificate, an online copy of his signature, and his college
grades. Now, this doesn't really surprise me, but it
definately drives home the point that no-one's privacy is safe
online. |
| SecurityPortal: An Overview of
Corporate Information Security |
Dec 12, 1999 |
| gdead |
| The cover
story for SecurityPortal.com
is an overview of corporate security. What makes it
interesting is that it doesn't dwell on the just the technical
stuff, but dives into the social and physcial aspects of IT
security. Social variables and how they effect security are
often overlooked when companies develop and deploy security
systems. It's unfortunate too, because more often than not, a
person, not a machine, is the weak link in your company's
security policy. |
| Egg-tra, Egg-tra, Another Security
Hole |
Dec 12, 1999 |
| gdead |
| I swear, if the previous
problems with UK bank Egg weren't enough to cause you to
remove your money from their safe, maybe this new
one will knock some sense into you. They implemented a
"logout" button to remove the cookies from your browser, but
this security feature caused a different hole to open up
allowing your account information to STILL be leaked out. It's
hard to believe, that as far as we've come in the security
field, that a finacial institution like Egg can screw up this
badly this many times. |
| Absent Secure Remote Access System
Released by AT&T Labs |
Dec 10, 1999 |
| pablos |
| Christian Gilmore, Dave Kormann, Avi Rubin have
released Absent, "a system for secure remote access to the
internal web from outside. It addresses the problem of secure
remote access to a site's internal web server from outside the
firewall. The goal is to give authorized users access to
sensitive information, while protecting the information from
others.A
description, the paper, and the code are available. |
| Auditors In Disguise Crack Us Pension
Computers |
Dec 10, 1999 |
| pablos |
| Security experts easily broke into computers at
the federal agency that guarantees pensions, acquiring the
ability to create fictitious beneficiaries and send them
money.
For three months beginning in May, the auditors rummaged
through high-level administrative and financial system
computer files at the Pension Benefit Guaranty Corp. in
Washington, their activities undetected. Full
Text. |
| Former KGB Internet Surveillance
|
Dec 10, 1999 |
| pablos |
| Russian spy agencies formerly known as the KGB
(now the Federal Security Service or FSB) have mandated that
ISPs cooperate in their surveillance of internet traffic as
part of an initiative called SORM-2. The ISPs have to pay a
hefty fee (~$10K to $30K) for the equipment. Apparently this
is putting some smaller guys out of business, yet none of them
will talk about it! Full
Text. |
| Sun Security Bulletin on Snoop
|
Dec 10, 1999 |
| gdead |
| Heheheh... I'm still laughing about the snoop
exploit that came across bugtraq this week. Since I
announced the exploit, I'll annouce the
patch. Note that this bug is found in all versions of
Solaris since 2.3 on both the Sparc and Intel platforms.
|
| The Cato Institute Posts Nameless
in Cyberspace: Anonymity on the Internet |
Dec 9, 1999 |
| pablos |
| "Proposals to limit anonymous communications on
the Internet would violate free speech rights long recognized
by the Supreme Court. Anonymous and pseudonymous speech played
a vital role in the founding of this country. Thomas Paine’s
Common Sense was first released signed, “An Englishman.”
Alexander Hamilton, John Jay, James Madison, Samuel Adams, and
others carried out the debate between Federalists and
Anti-Federalists using pseudonyms. Today, human rights workers
in China and many other countries have reforged the link
between anonymity and free speech.
Given the importance of anonymity as a component of free
speech, the cost of banning anonymous Internet speech would be
enormous. It makes no sense to treat Internet speech
differently from printed leaflets or books." - Executive
Summary |
| Cryptanalsysis of GSM Phones Now
Available |
Dec 9, 1999 |
| gdead |
| The Biryukov and Shamir paper describing the
attack on the A5/1 crypto algorithm (used in GSM phones) is now available
online. Even for those not so well versed in cryptography,
it's fairly easily understood. It boils down to this: a PC
with 128MB of RAM and 146 GB of disk can shatter the
encryption in less than a second after it's listened to at
least 2 minutes of converstation. You know that scene in
"Enemy of the State" where Gene Hackman clones that GSM phone
in seconds? The one where you said "Nope. Wrong. He couldn't
do that"? Well now he can. |
| The Legal Ramifications of Internet
Anonymity Legislation |
Dec 9, 1999 |
| curator |
| A current
paper from the Cato
Institute, discusses the legal ramifications of attempts
to put limits on anonymity on the Internet. Probably one of
the better accessible, legalized reasonings of the topic I've
seen, it's refreshing to read something from someone that
seems to know the true legal side of things, instead of an IT
idealist (like most of us) who doesn't know anything about the
legal precedence. Definitely worthy of a read. |
| Trustwise Digital Signature Hacked
|
Dec 9, 1999 |
| gdead |
| A day after the Department of Trade and
Insdustry signed of on BT's digital signature algorithm, a
British security firm has
spoofed it. It wasn't broken cryptographically, but rather
by subverting the protocol with the viewer using javascript
and HTML. Regardless of how it's done, the signature cannot be
trusted. BT's response? "It's not a breach of security, they
haven't got into the Trustwise site".... |
| Physical IDS's Just Got Smarter
|
Dec 8, 1999 |
| gdead |
| Now here's some good news for people in search
of a physically secure data center. New Scientist reports
on advances in video surveillance. Researchers in the UK
have determined ways to pick out a criminal before he has
actually committed the crime. Freaky. They can also determine
when someone is going to commit suicide by jumping in front of
a train. Just as freaky, but I think there's less application
in the computer security world. ;) When was the last time
someone jumped in front of a speeding server to "end it all"?
|
| Cyber-Ransom is a Cyber-Joke |
Dec 8, 1999 |
| gdead |
| I've read several reports recently that claim
that electronic sabotage and spying are on the rise (see today's
article in Wired as an example). One of the common threads
in these reports is the possiblity of a company's electronic
assets being stolen across the network, the orginal
information deleted from the compromised hosts, then the data
held hostage, waiting for money to be deposited in a Swiss
account. In this day and age, that threat carries no weight.
Any corporation who is at all serious about their information
keeps backups, both on and off site. While a few days worth of
data may be lost, I highly doubt that a company would pay the
ransom rather than just restore from backup and use the law to
go after the terrorists. Stealing the all copies of
mission-critical data from a company is almost impossible
without several physical compromises, a job that would be
difficult for overseas evil-doers. The only way a ransom-based
attack could be successful is if it was launched by several
insiders who had access to all on and off-line media. There
are a LOT of problems for the criminal in that scenario,
enough that I don't think that attack is very likely. The
future of cyber-crime will be selling the data to competitors,
not back to the victimized company... there's no market for
it. |
| Goodies from CERT |
Dec 8, 1999 |
| gdead |
| CERT actually does release things that aren't
advisories *gasp*. Results of the
Distributed-Systems Intruder Tools Workshop is the
results of an ad hoc conference held to discuss distributed
hacking techniques. It contains information of how the attacks
are staged as well as some ideas on how to stop them on the
ingress and egress of your network. International
Cooperation for Cyber Crime and Terrorism in the 21st
Century discusses the how organizations must cooperate
across national boundaries in order to security exist in the
next century. Both are worth the read. |
| The #1 Reason to Have a Long Host
Name |
Dec 7, 1999 |
| gdead |
| Normally I don't post exploit/bug news, but this
is way too funny. There is a buffer
overflow bug in snoop under Solaris 2.7. Snoop
doesn't gracefully handle hostnames longer than 1024 bytes.
Give your machine a long hostname, then proceed to smash the
stack. This is a remotely exploitable bug in a sniffer.
The packet doesn't need to even be destined for the
exploitable box... it just needs to be thrown in its general
direction. Now that's a 37337 h4x0r 7r1ck. |
| Schneier and Ten Risks of PKI
|
Dec 7, 1999 |
| gdead |
| Bruce Schneier and Carl Ellison have ripped
together a nice paper on What
You're Not Being Told About Public Key Infrastructure.
It brings to light the historical underlying issues with PKI,
esp regarding the trust put in the server. Also, it's worth a
note that Counterpane Systems is now part of Counterpane
Internet Security. The new page is a bit sparce on
information, but they claim there will be more info
forthcoming. |
| Jump on the "NSA Bashing" Bandwagon
|
Dec 7, 1999 |
| gdead |
| The poor NSA can't get a break. As if the
announcement that they are
being sued by EPIC wasn't bad enough, they now have a damning
article in the Dec 13th Newsweek. The article discusses
the now well-known problem that the NSA has a hard time
intercepting digital transmissions, as well as reveal a
possible alliance between the NSA and FBI which would allow
the NSA to spy inside US borders. Late Monday, the
NSA announced that it will not be doing anything illegal
in the US... whatever that means. |
| What Security and Y2K Don't Have in
Common |
Dec 6, 1999 |
| gdead |
| There's a great
editorial in Federal Computer Week that disagrees
with a common idea in Washington; security is the next Y2K
problem. Many believe that the security problems that face the
nation will result in a campaign by the public and private
sectors to lock down our information infrastructure, much in
the same way the country has attempted to fix the Y2K issues.
Unfortunately, the analogy may not fit, and it is doing more
harm than good. |
| Closest thing to Kinakuta so far
|
Dec 6, 1999 |
| pablos |
A British
hosting provider has set up shop in a nuke proof bunker
they bought from the MOD. According to their web site: "The
Bunker is a real nuclear bunker, built to withstand a direct
strike."
- The Bunker offers the ultimate in protection from a
myriad of attacks, including crackers, terrorist attack,
electro-magnetic pulse, electronic eavesdropping, HERF and
Solar flares.
Check out the pics. p.s. I
heard about this first on Slashdot. |
| Everything You Ever Wanted to Know
from the DoD |
Dec 5, 1999 |
| gdead |
| Thanks again to John
Young for digging up assist.daps.mil. The site
is part of the Defense Automation and Production Service and
has a wonderful quick
search. John has created a list of some of
the more interesting documents, many of which the NSA has
declined to give him under the Freedom of Information Act.
Download whatever you can, because the feeling is this site
may not be public for much longer. |
| NT 4.0 SP6a Completes C2 Evaluation
|
Dec 5, 1999 |
| gdead |
| NT 4.0 SP6a (with hotfixes) has now been evaluated
to live in a Trusted Computing Base has defined by the DoD.
It seems to be a much more usable C2 compliant configuration
than before, but there are still some major parts that can't
be used (like streams). Plus, their CryptoAPI (hehehe) has
been evaluted
under the FIPS 140-1 standard. |
| TSG Sherlock Plug-Ins |
Dec 4, 1999 |
| curator |
| To facilitate Mac OS users in searching and
using our site, we've created a couple plug-ins for the
Sherlock search engine available in Mac OS 8.5 and above.
There are currently two, one for the FW-1 mailing list
archives, and one for the site in general. They are available
in one archive, or individually. The can be found at http://www.shmoo.com/sherlock
|
| Errr... Whatcha doin'? NSA sued by
EPIC. |
Dec 4, 1999 |
| curator |
| EPIC
is suing the NSA to release documents pertaining to their
alleged spying on US citizens (ie, Echelon and its ilk). In
June, EPIC and the House Intelligence subcommittee requested
the same documents be provided under the Freedom of
Information Act. The NSA refused to do so. The NSA now has one
month to respond to the suit.
How afraid are we to find out what may be in those
documents? |
| Keeping Evil Cookies Out of Our
E-mail |
Dec 3, 1999 |
| curator |
| Several privacy and consumer groups are asking
the FTC to require browser-makers to block the cookies
from cookie-fied html e-mail messages to keep spammers and the
like from secretly tracking and gathering information on the
readers. While we don't like the idea of having the act of
just reading an e-mail establish some sort of demographic on
us, we think it's a bit heavy handed to ask the FTC to step in
here. It's a bit like going to the state public works council
to get someone to fix the lock on your apartment door. |
| New Years Eve may be a Hacking
Paradise |
Dec 3, 1999 |
| gdead |
| If I were a full time 3l33t h4x0r, I'd be
drooling with antcipation over the upcoming holiday season.
Holidays are normally good times to go poking around on
someone's network because virtually everyone is out of the
office and not paying attention to their pagers. This year is
even better because of the potential Y2K problems. There will
be chaos on the Net, so a well timed and placed attack may not
be noticed for a long time. According to CNN, the
FBI and the rest of the feds are bracing for just such an
ordeal. Even if there are no major power/telco disruptions,
it's still going to be an exciting nite for the sober
administrators. |
| Doh...I hate it when that happens.
|
Dec 2, 1999 |
| curator |
| In a talk before San
Francisco's Digital Economy conference, Eric Schmidt
(Novell CEO), admitted to having his credit card number stolen
off the internet. Schmidt squarely blames browser cookies as
the culprit (yeah... whatever...), which his company
"coincidentally" is trying to replace with their own NDS-based
product called "digitalme". See, online security and privacy
affect people just like you and me. |
| Walk This Way... |
Dec 2, 1999 |
| curator |
| The New
Scientist has a interesting article on attempts to use a
person's gate as a biometric; not so much as for realtime
authentication purposes, but for criminal detection over
closed circuit television. Finally a real-world application
for the "Ministry of Silly Walks". |
| DoubleClick Buys Opt-in Email.com
|
Dec 2, 1999 |
| gdead |
| In a further attempt to Borg-ify the planet,
Doubleclick is
buying Opt-in Email.com. Opt-in is a provider of
"Advanced Email Marketing Services" (read: you can outsource
your spam^H^H^H^Hmass mailings to them). They have a giant
list of people who expect to get spammed, and DoubleClick has
the demographic data to better target the spam. Of course
DoubleClick claims their "intention is to be good online
citizens." We'll have to wait and see. |
| Freedom 1.0 Released, get your Nym's
while they're hot |
Dec 2, 1999 |
| gdead |
| Ian Goldberg and the folx at Zero-Knowledge have
turned Freedom into a reality. Last nite they revealed Freedom 1.0.
Freedom utilizes the Freedom network (that's been under
development for the last little bit) to protect all aspects of
your privacy online. There's no trial version yet, but you can
purchase a full version for $50, complete with 5 nym's. |
| No Egg Puns: UK bank Egg Unsafe
|
Dec 1, 1999 |
| gdead |
| Egg, a UK bank, got egg on it's face twice today
(sorry, couldn't resist). The first is a report in The
Register indicating that Egg was distributing customer
credit card information via clear-text email. The second is a
security breach that allowed customers to veiw and modify
others' accounts. Eggs answer to both problems: They were "not
[the] best business practices". No shit. If you've got money
with Egg, move it somewhere else. |
| Comanche Code-talker Honored |
Dec 1, 1999 |
| gdead |
| Charles Chibitty, a 78-year-old Comanche elder
was honored
by the US government for his work in World War II. He
received the "Knowlton Award of the Military Intelligence
Corps Association for his professionalism and 'high standard
of integrity and moral character' in carrying out his duties".
In a time when encrypting voice communication was still
thought to be an impossiblity, Chibitty and 16 other Comanches
delivered the next best thing; an obscure spoken language that
the Germans knew nothing about. Their work was responsible for
saving hundreds of lives and providing one of the few codes of
the war that was neither broken nor stolen. kewl :) |
| The Evil Cartoon Cursor |
Dec 1, 1999 |
| gdead |
| The cursor that caused Al Gore to rethink his
online presence (come on, it is his Internet, right?) and lead
to national
distrust of all web-based-cursor-modifying-software is
allowing you to "opt-out". Comet systems has released
a fix that allows you to delete the serial number that
identifies you as you surf. uhhh.. That's not really a fix,
guys. It still tracks you, they just don't know who "you" are
anymore because the serial number is random (ie: not based on
you or your IP). QOTD from Trust-e: Comet Systems had
"significantly damaged the trust of their customers." I bet
Trust-e will still take Comet's money and certify them. |
| OpenBSD 2.6 released |
Nov 30, 1999 |
| gdead |
| Theo de Raadt and gang have done it again. OpenBSD 2.6 is out
and available for download. There are
a lot of new
things in this release; critical ATAPI fixes, built in
OpenSSH with libwrap support, some wierd Y2K fixes, and
isakmpd updates to name a few. Looks like I'll be spending
tomorrow trying to dig up a box to install this on. |
| "Call for Papers" Deadlines |
Nov 30, 1999 |
| gdead |
| For those who enjoy sharing what they've learned
or for those who have something of value to donate to the
community, you should consider speaking at one of the many
security conferences coming up. Most of the spring conference
submission deadlines have come and gone, but the summer con's
are just getting started. Black Hat is
soliciting papers for their Las Vegas get-together. The
deadline is March 15th. And for the more academic minds,
USENIX is accepting
papers until February 10 for the 9th Annual Security
Symposium in Denver. |
| The Real Risks to Your Privacy
|
Nov 30, 1999 |
| curator |
| Several instances have appeared lately of
companies abusing their customers' privacy. While we all know
this a bad thing, there are much more insidious threats to our
privacy. We understand everyone's concerns about their
Internet usage habits being cataloged, but we also think it's
a bit disingenuous for everyone to be so bitchy about privacy
when everyday we all do things that greatly endanger the
privacy we hold so dear. To this end we've written an article
expositing on this view. Feel free to comment, converse,
and exposit in response. |
| Is Linux a Good Match for Checkpoint?
|
Nov 29, 1999 |
| gdead |
| Securityportal.com
taken a really good look at the rationale of Checkpoint
porting Firewall-1 to Linux. One of the points Checkpoint
has made very clear is that they're "adopting an OS, not a
movement". They're feeling pressure from VAR's and inside
sales channels to have support Linux... at least for a
deployment platform. They have no plans to port the management
interface to Linux. Course, if you know what you're doing, you
can emulate Solaris under FreeBSD and run the Solaris
management tool. ;) |
| AOL See Privacy as a Subscription
Service |
Nov 29, 1999 |
| curator |
| In their infinite wisdom, AOL
has decided that privacy is something their customers need to
subscribe to. Literally. Like, all those privacy
agreements customers signed last year to keep their online
viewing habits out of the hands, and databases, of marketers,
spammers, and other info-leeches, are now expired, and will
require a yearly re-subscription to said agreement.
Apparently, AOL said as much in the original forms, but it
still sucks the big green weenie, and most customers are still
suprised at the backwards practice. Next thing you'll know
they'll even be spamming our mailboxes without any "opt-out"
clauses...Doh! |
| New Yorker Article: The Intelligence
Gap |
Nov 29, 1999 |
| gdead |
| Seymour Hersh has very few nice words for the
current state of the NSA in his article for the Dec
6th New Yorker. "The dirty little secret is that fibre
optics and encryption are kicking Fort Meade in the nuts".
After reading this, I have a little more faith that I can
protect my privacy from the government if I try hard enough.
|
| Ways to Spend your Training Budget
|
Nov 28, 1999 |
| gdead |
| The government is offering FREE tempest classes.
No lie. Check out the
schedule the Navy has posted. Most of the courses require
some kind of clearance level with the government, but some are
open to regular joes like you and me. Regardless, it would be
neat to take a class at the The National Cryptologic
School. |
| Pardon Our Dust |
Nov 28, 1999 |
| gdead |
| The Shmoo Group is an organic thing, in that
stinky gym-sock kind of way. We're currenly adding lots of new
stuff to our site, like a more functional backend to help us
manage the site to a new whiz-bang UI. While this is going on,
you may notice some wierdness. If you find anything
really strange (404's, etc) feel free to let us know. later. |
| SuSE releases security tools |
Nov 27, 1999 |
| grendel |
| Whats their motto again? "Quality German
engineered Linux"? :) Well the boys at SuSE have released a series of
security scripts/tools for hardening Linux. These tools of
course will be included in the most recent release of SuSE
Linux, along with a number of standard security tools, or you
can D/L them individually from SuSE. Check 'em out... a couple
of them seem pretty handy... Here's an article on Freshmeat
that includes a list of the scripts, commentary, etc... |
| The Great Australian Intranet |
Nov 26, 1999 |
| gdead |
| The Australian government has turned the
Internet into what amounts to a corporate inTRAnet the size of
a continent. Several laws were just passed that give the
governement an unbelievable amount of power over private
computers and networks... much the same an IS departement in a
company would control and own all the data on company
computers. This is downright scary. Check out Slashdot
for all the links and views. |
| Christmas Shopping for the Paranoid
.... |
Nov 25, 1999 |
| gdead |
| Having trouble deciding what Christmas present
to buy the conspiracy theorist in your life? Try Candes Systems
where you can buy Pentium II TEMPEST proofed desktops,
laptops, and printers. Or maybe go check out Moser Electronics Company
based out of a barn in the woods of Washington. They
specialize in some of the more obscure geek toys, like mobile
targets used in torpedo practice, portable seismographs, and
(my favorite) a TEMPEST-proof Mac-Plus. |
| NSA Suffering from Information
Overload |
Nov 25, 1999 |
| gdead |
Even the NSA can't escape the problem of
governmental bureaucracy. According to a report from
CNN the US spy agency is having a hard time adapting to
new technologies. Wiretapping analog signals on copper is much
easier than sniffing someone's email off fiber. But don't
fret... There's rumours of a giant re-org just around the
corner that will let them catch right back up so they once
again know everything about everyone.
For those in the
US, happy Thanksgiving :) |
| Smashing the Stack for Everybody
|
Nov 24, 1999 |
| gdead |
CNet attempted to explain
buffer overflows to the masses by dumbing the problem down
to the level that Y2K is. While I feel that educating the
public about security issues is a great thing, I don't feel
that comments like the following from SANS Director of
Research, Alan Paller are called for:
You wrote a
program, asked someone for input, gave them space for a
certain amount of characters, and didn't check to see if the
program could take more. You are incompetent, and you are the
problem.
Wowzers... incompetent. Nevermind
that most major software projects are the work of many people
working together to create a highly complex system. The
complexity of these systems don't mean that you can
necessarily point at one programmer, proclaim him the clueless
wonder that induced an buffer overflow hole, and fire him.
It's a bit of a naive statement to put up in the national
media. |
| The Osiris Scripts Released |
Nov 24, 1999 |
| curator |
| We've developed a tool that helps verify the
integrity of executables, dll's, etc under NT (much the same
as the old "tripwire" utility for UNIX). It's called Osiris
and you can read more and download it from http://www.shmoo.com/osiris.
Any feedback on it is welcome. |
| Wallowing in the Crypto Export Swamp
|
Nov 23, 1999 |
| gdead |
| I believe that Ireland's cryto export-control
law says something like "We don't care. Export whatever you
want." The US's proposed
regulations are several orders of magnitude more complex
than that. The September announcement had everyone hoping for
new, relaxed, clear-cut rules regarding source code export.
Even though the currently proposed draft is a
work-in-progress, you can bet it won't get any simpler. And
this complexity may wreak havoc with the Berstein Case. Take
a look at what USAToday.com
and The
Industry Standard sayabout the draft. |
| The Good, the Bad, and the Ugly Sides
of Marketing Security |
Nov 23, 1999 |
| gdead |
I've read several articles in the last few days
about marketing security. A Forbes columnist called up five
big marketing firms in the Valley with a challenge: How do you
market BO2K as a commercial product? The results range
from the humorous (giving away a live cow at DefCon) to scary
("Have [CdC] member coauther book with Donald Trump,
tentatively entitled 'Art of the Steal'"). All in all, I'd say
it actually looked marketable.
On the other side of
the coin are people using viral marketing techniques to hype
up really crappy websites just to get banner revenue.
Wired has a piece
on 2 guys from NY spamming USENET to generate traffic to their
"topical" websites. *sigh* They're making about $25/day for
each site they do... not exactly big money for the amount of
people they're alienating. |
| Doubleclick merger = Privacy
Apocalypse |
Nov 22, 1999 |
| gdead |
| It's not bad enough that Doubleclick servers
light up my firewall like a Christmas tree everytime somebody
is surfing... Now they're attempting to merge with Abacus
Direct, a giant marketing company. The merger was announced in
June, but it's being finalized now. Privacy groups are appealing
to the FTC to stop the sale. If the FTC doesn't get
involved, it's likely that the merger will succeed, and
demographic data about millions of people will be melded with
an agressive direct marketing company hungry to pigeon-hole
the world. Yikes... |
| DOD planning a ban on "mobile" code?
|
Nov 22, 1999 |
| grendel
|
| What? Someone in the DOD finally getting a clue
that ActiveX is a risk? Apparently:) The Department of Defense
is considering banning "mobile" code such as JavaScript,
ActiveX and JAVA due to the proliferation of breakins
attributed to these technologies. Heres the MSNBC
article. |
| "Harry Potter" encrypted with CSS?
|
Nov 22, 1999 |
| gdead |
| Neil McAllister has writen an editorial for the
SF Cronicle on whether DVD
privacy is a real or perceived threat. He makes some good
points about the current logistical problems dup'ing a DVD. My
favorite part, though, is where he discusses pushing "privacy
protection" to printed media. Go-go-gadet-decryption-glasses.
|
| Updates for a few of our recent
stories... |
Nov 20, 1999 |
| curator |
| Late Friday, Wired
posted a few updates for some of our recent stories:
- A recent lawsuit in Virginia by several ISP's, and a
free speech organization, against the Virginian government
for violation of Virginian free speech laws was thrown
out... because they sued the wrong people.
- After receiving a ton of e-mail mocking a proposed
depricatory cash carry tax, the Richmond Federal Reserve
clarified it position on the topic, pointing out it was only
a hypothetical statement, and no legislation has ever
actually been sought.
- According to the IETF chairman the battle over
implanting wiretaping capabilities in Internet standards may
not be over.
|
| Simson Says: Who'll Rule Cyberspace?
|
Nov 20, 1999 |
| gdead |
| Simson Garfinkel, in his latest edition of Simson Says
reviews Lawrence Lessig's new book "Code and Other Laws of
Cyberspace". The book covers the ad hoc method at which the
Internet is governed along with how that method effects your
privacy. And as usual, Garfinkel puts his own unique spin on
it. |
| CERT Advisory on Distributed DoS
Tools |
Nov 19, 1999 |
| gdead |
| CERT has
released an incident
note regarding distributed DoS tools. These tools, once
installed, allow an infected host to participate in a
widespread, organized set of DoS attacks. As far as
architecting goes, it's kinda a neat idea. ;) Seriously, the
incident note contains some good information, like commonly
used port number that you can have your firewall look for was
well as traffic signatures that you can set up NFR (or the
like) to keep an eye out for. And of course, add anti-spoofing
rules to anything you can.. routers AND firewalls. |
| 12th Annual FIRST Conference Extends
Paper Submission Deadline |
Nov 18, 1999 |
| gdead |
| Due to an apparent lack of submitted papers, the
FIRST conference on
Computer Security and Incident Handling has extended
their call for papers. Here's your chance to meet some
friendly security folks and see beautiful downtown Chicago in
June ;) |
| MS goes Patch Crazy |
Nov 18, 1999 |
| gdead |
| Microsoft has in 24 hours released a patch and
pulled another one off their web site due to an "error". A patch
to stop Javascript redirection whereby a evil
script could read local files and do other bad things. It was
also discovered that a previously released patch that
broke the TCP stack in a manner that required applications
like Notes and VNC to be run as Administrator. Microsoft has
pulled
that one from their website. |
| Openssh.com launched
|
Nov 17, 1999 |
| gdead |
| OpenSSH now has it's own home. OpenSSH.com has source via
CVS and FTP, as well as links to FreeBSD, Linux, and
Solaris ports. I really dig the logo; a fully armed
blowfish, complete with nuclear bomb. |
| Remailers NG |
Nov 17, 1999 |
| gdead |
| Due some projects I've been in volved in lately,
I've been paying more and more attention to remailers and the
"science" behind them. Dug up an interesting article on the
possible future of remailers. "Bandwidth, storage capacity,
and processing power (CPU speed) has increased considerably,
and will continue to do so. A new remailer system should
'think bigger'". mmm... riding Moore's law. |
| EchelonWatch.org
officially launched. |
Nov 16, 1999 |
| jpm |
| We mentioned the ACLU's new site a couple days
ago. Here are a couple quotes from today's press release...
"Echelon is perhaps the most powerful intelligence
gathering network in the world," said Barry Steinhardt,
Associate Director of the ACLU. "But it is still very much a
black box, which apparently operates without the oversight of
Congress or the courts."
"It appears that the U.S. government is once again spying
on Americans' private communications," said Gregory T. Nojeim,
a legislative counsel in the ACLU's Washington National
Office. "Congress must determine if Echelon is as sweeping and
intrusive as has been reported, and most importantly, it must
ensure that Americans' conversations are not intercepted
without a court order." |
| Scathing Remarks about Trust-e
|
Nov 16, 1999 |
| |
| Slashdot interviewed Dave
Steer from Trust-e in an attempt to figure out what
exactly Trust-e does. The conclusion: Not a whole lot. Read
the article.. figure out how they protect your privacy...
|
| New Crypto-Gram Available |
Nov 15, 1999 |
| |
| A new
edition of Bruce Shneier's most excellent Crypto-Gram from
Counterpane Internet
Security, Inc.'s site. This edition covers such juicy
topics as "Why computers are insecure, DVD encryption, Win CE,
and Elliptic Curves." As usual, a good and informative read.
|
| Subscribe to TSG's New Mail Lists
|
Nov 15, 1999 |
| |
| In an effort to help keep you informed, The
Shmoo Group has fired up a couple of mail lists.
TSG-Announce
is a low volume (1 - 2 messages a day), moderated list with
daily security/privacy/crypto updates and views. TSG-Discuss
is a higher volume, moderated list with open discussions about
issues facing security professionals today. |
| A New NSA Patent |
Nov 15, 1999 |
| |
| The US National
Security Agency has designed and patented
a new technology that could aid it in spying on international
telephone calls. The NSA patent, granted on 10 August, is for
a system of automatic topic spotting and labelling of data.
The patent officially confirms for the first time that the NSA
has been working on ways of automatically analysing human
speech.
More at Independant
News. |
| Nothing is Private |
Nov 15, 1999 |
| |
| This month's Forbes discusses The
End of Privacy. Awesome. This article explains why we
should all be afraid of what can be found out about us. One of
the few things you can can control is who can read your
mail... encrypt it, always. |
| Remote Data Center Security |
Nov 15, 1999 |
| |
In a subject that is near and dear to my heart,
Securityportal.com has an article on Securing
Remote Data Centers. It basically discusses physical
security, and not stuff like securing remote Out-Of-Band
control information. But it's a good start.
Speaking
of articles, HNN has
a downright silly article on Security
practices today, Or lack thereof. It's based on a totally
unscientific survey and written by someone who "obviously"
knows way more about security than the people he interviewed.
I think there's some useful info to be taken away from reading
it, if you can get past the tone the article was written in.
|
| Site o' the day: Echelonwatch.org
|
Nov 15, 1999 |
| |
| Even the ACLU
has taken notice of the Echelon problem. In conjunction with a
few other privacy groups, they have launched Echelonwatch.org. What
I dig most about this is the fact that the ACLU is a huge
organization with lots of influence. They can bring Echelon
the attention it deserves... as long as they don't get too
preachy about it. ;) |
| Is the NSA the "Enemy of the State"?
|
Nov 14, 1999 |
| |
| The Washington Post has a great
article on the current state of the NSA and it's ties with
other governments. Of the more interesting information
revealed was the NSA's desire to "go back to [their] roots
with GCHQ (the UK spy agency)". This tight interaction
between the NSA and a foriegn country give Echelon fanatics
more basis for believing the world-wide spy network does
exist. |
| NFR Discontinues "Research"
Distribution |
Nov 13, 1999 |
| |
| For the last 2 years, MJR and the boys at NFR
have distributed a deprecated version of their software in
source form (usually the version prior to the current
release). Starting this month, they have discontinued this
practice. They claim it was because the current "research"
distro wasn't a good representation of what their commercial
software has turned into. read: it was eating into their
bottom line. Read the
press release. |
| MS releases Patch
against BubbleBoy |
Nov 12, 1999 |
| |
| In what seemed to be an impossiblity, MS created
an email client that was vulnerable to virus attachments
without even opening them (they call this technology
ActiveXsploit). Anyway, they claim
to have fixed it. Go download, patch, reboot, drink
heavily and watch your MS stock continue to climb. |
| Aleph One on NPR |
Nov 12, 1999 |
| |
| Aleph One (aka Bugtraq moderator aka Elias Levy)
was interviewed on NPR this morning. Five minutes of
cyberterrorism discussion can be found at Securityfocus.com.
You'll need *shudder* Real Audio... how ironic. |
| Quoth the Raven: "No Nettapping"
|
Nov 11, 1999 |
| |
| In a decisive vote, the IETF decided last nite
to reject
Wiretapping the Net. Not a big surprise, but it definitely
sets the stage for upcoming conflict. The FBI/DoJ is going to
keep pressing the industry to do something to allow
wiretapping, and the next debate may not be so friendly. The
Washington
Post has a good pre-vote article with interviews with Bob
Barr and some Feds. |
| The
Internet Random Mail Reader |
Nov 11, 1999 |
| |
| A very brief project abstract for The
Internet Random Mail Reader has been posted by The Shmoo
Group. We invented this a year ago, but just now decided to
let you in on it. If you've got a latent voyeur instinct, this
might just be the project for you. |
| B1 Solaris and Linux |
Nov 10, 1999 |
| |
| Some interesting news from the C2 and higher
security levels for popular OS's. Last week Sun announced Trusted
Solaris 7. Neat, considering they jumped right from 2.5.1
to 7 without doing a Trusted 2.6. And there's a new release of
Rule Set Based Access
Control for Linux. This is a security model that will
bring Linux up to B1 compliance. Sounds interesting. If anyone
has played with this thing, please let us know. |
| Time to Upgrade Bind |
Nov 10, 1999 |
| |
| The ISC has released Bind
8.2.2p3. They recommend you upgrade as soon as possible
lest some 3l33t script kiddie has some fun with all your
nameservers. Or I suppose you could just set your firewall to
block all nameservice queries ;) |
| Microsoft Leverages Monopoly to
Dominate Virus Market |
Nov 10, 1999 |
| |
| I'm getting real sick & tired of all the
email viruses only showing up on Windows. I'm not asking for
POSIX compliance, just an occasional Mac or Linux port.
Apparently an MSNBC article
broke the story, of all places. Quote from the story: "The
virus can only run if Internet Explorer 5.0 with Windows
Scripting Host is installed (standard in Windows 98 and
Windows 2000 installations). If security settings for Internet
Zone in IE5 are set to High, the worm will not be executed. It
does not run on Windows NT." ZDNet also has a
story about this "Bubbleboy" virus. McAfee weighs in
too.
Of course, we stole this tidbit from Slashdot. |
| New edition of Siam Relay's SAFER
Newsletter |
Nov 10, 1999 |
| |
| Siam
Relay has released this month's edition of SAFER
Newsletter, a compilation of security news, events, tool
releases and whatnot from around the world. |
| Checkpoint to Port FW-1 and VPN-1 to
Linux |
Nov 9, 1999 |
| |
| It's a bit old, but Checkpoint has announced
that they're gonna port FW-1 and VPN-1 to Linux 2.2 kernel.
Good news. Now if they'd only open source their software. ;)
|
| Disrtibuted.net
releases CSC and OGR clients |
Nov 9, 1999 |
| |
| After some serious waiting, Distributed.net has
released a CSC and OGR client. So, if you weren't already
cracking RC5-64 (or helping SETI find aliens) then go download
a client and recycle that spare CPU time. |
| Trust-e? e-Cowards... |
Nov 9, 1999 |
| |
| A Trust-e seal of approval seems to indicate
that you're not giving away customer credit cards on your
homepage, not much else. They declined
to investigate Real Networks' privacy violations of the
last few weeks. They even changed their mission statement so
they could get around having to explain themselves. Come on.
In less than a month, Real has been responsible for the
destruction of DVD encryption and a major privacy violation of
millions of web users. If they still bare the Trust-e logo,
then the logo doesn't mean a thing. Welcome to the world of
commercial self-regulation. |
| Electronic
eavesdropping is becoming mere child's play |
Nov 8, 1999 |
| |
| This is a kind of layman's story about Tempest.
The interview
with Ross Anderson is better. Anyway, the article points
out how software radio will make van Eck phreaking a lot more
accessible.
The New Scientist - SOFTWARE that allows a computer to
receive radio signals could make spying on other computers all
too simple, according to two scientists at the University of
Cambridge. Such are the dangers that they are patenting
countermeasures that computer manufacturers can take to foil
any electronic eavesdroppers. |
| The BCF Cryptosystem explained
|
Nov 8, 1999 |
| |
| Thanks to John Young for posting
the inner-workings of BCF, an E-Commerce
cryptosystem. What makes this really quite interesting is
that it uses a giant (CD size) one time pad that is shared by
all people who want to use this algorithm. Of course, you have
to buy the CD from them "to maintain a high and uniform
standard of security for BCF". My butt. It's to make sure
they get paid. Anyhoo, it's a neat idea, but it smells like
there may be some problems with it. We'll see how it stands up
to peer review. Comments on this would be groovy. |
| Getting OpenSSH via Anonymous CVS
|
Nov 8, 1999 |
| |
| Thanks to a TSG reader who sent in the following
on how to get OpenSSH:
you can get openssh from via anonymous cvs:
mkdir openssh && cd openssh
CVSROOT=anoncvs@anoncvs.ca.openbsd.org:/cvs
CVS_RSH=/usr/bin/ssh cvs get src/usr.bin/ssh
It should work fine under the *BSD's, and
there's also a Linux port.
|
| PGP 6.5.2
Freeware Released |
Nov 5, 1999 |
| |
| PGP 6.5.2
Freeware was released on Thursday. Mostly Windows 2000
enhancements, but it also features a mail-program
auto-selector. Nothing major, unless you're running W2K.
|
| Anatomy of a Web Attack |
Nov 5, 1999 |
| |
| I've gotta give CNN credit... their security
coverage keeps getting better. They've got a story
about how and why a recent hacking contest was won. "In our
minds, the real measure of a secure OS is not how secure you
can make an operating system, but how secure it is 90 percent
of the time." Definately a more educated statement than I
expected to see. Be sure to read the play by
play. Very well written. |
| DVDemise |
Nov 4, 1999 |
| |
| I wasn't going to post this because it is
strictly a piracy thing, but then I found out it was Real
Networks who screwed up...
Why
the DVD Hack Was a Cinch by Andy Patrizio
2:15 p.m. 2.Nov.1999 PST The anonymous developers of
the decryption program that removes DVD copy protection had an
easy time doing it, thanks to a gaffe by a software developer
and the surprising weakness of the encryption technology.
See also: DVD
Piracy: It Can Be Done & Catch the buzz in
Hollywood Tech |
| New Scientist interviews
Ross Anderson |
Nov 4, 1999 |
| |
| Ross Anderson (of TEMPEST fame and AES
frontrunner) is interviewed
in this week's New
Scientist. Compare it to last week's Slashdot
interview with another AES front runner Bruce Schneier,
and you'll see some big differences between two men that are
shaping the face of computer security. |
| COPA 98: Judgement Day |
Nov 4, 1999 |
| |
| As a general rule of thumb, I think it's neat
when a law gets overturned by a judge somewhere (shows the
systems works). But when bad privacy laws get overturned, it's
a beautiful thing. After a similar victory
in New Mexico on Tuesday against a state law, the ACLU is
going in
front of a federal appeals court in Philadelphia today to
try and strike down COPA 98. Wish them luck. Check out Wired
for the whole story. |
| Network and Distributed System
Security Symposium Announced |
Nov 3, 1999 |
| |
| The ISOC has
announced the Seventh
Annual Network and Distributed System Security Symposium
in San Diego Feb 2-4. Among the topics: "Secure Border
Gateway Protocol (S-BGP)" and "Secure Password-Based
Protocols for TLS." ... *drooool* |
| BBC - Echelon Exists |
Nov 3, 1999 |
| |
| The BBC claims
that Austrailia has admitted to Echelons existence. They also
claim that the US listening post at Menwith
Hill is part of the network. Not a lot of big surprising
news here, but some hard facts, which until recently haven't
been too wide spread. |
| Shop For Free this Holiday Season
|
Nov 2, 1999 |
| |
| Thanks to an article
in the San Fran Chronicle, millions of people can shop for
free this holiday season. The article's main point is that
shopping online is insecure. But the sploit of the week is
hidden inside. Some websites shop using very dumb
shopping cart engines. If you can change the cost of a product
when you submit the final purchase request (via a home
generated web page or the fetch utility on a UNIX box) some
engines won't check to see if this final price differs from
what it actually should be. I'll leave it as an exercise to
the reader... Bottom line: you can get a lot of bang for your
buck this Christmas. |
| Real Gets a Clue |
Nov 2, 1999 |
| |
| After justifying their data harvesting
practices, Real Networks has given
in to public pressure. "We respect and value the
privacy of our users" the press release states. Erm... I
think if they respected our privacy, they never would have
done it in the first place. But at least they've admitted they
did something wrong, which is more than some companies. Check
out CNN
for the national media's view. |
| Is it Real, or is it Real Networks?
|
Nov 1, 1999 |
| |
| Wired has an article
about Real Networks habit of sending demographic info back to
them without you knowing. I thought it was bad enough that
Real Player did this (it's a config option that checked by
default), but now they're doing it without telling you or
giving you an option to stop doing it... and they have the
guts to justify this in national press. Makes me want to use
MS's Media Player; That is if I actually used an MS OS for
anything but gaming ;) |
| More Bernstein News |
Oct 29, 1999 |
| |
| The 9th circuit court has granted the DoJ's
motion to push back the oral arguments until March 21, 2000
(first day of spring... symbolic? maybe...). Both sides are to
file briefs 21 days after the DoJ's announcement of new crypto
regs due out on Dec 15. Read the Bernstein-announce
message from Cindy Cohn. |
| Garfinkel on Security |
Oct 29, 1999 |
| |
| Simson Garfinkel wrote an article for ZDTV
*shudder* on the Philosophy
of Security. In it, he explains the differences between
how security is viewed from MS camps and UNIX camps... if the
world were only as black and white as he's made it to be.
|
| OpenSSH is out |
Oct 29, 1999 |
| |
| The guys at OpenBSD have released
OpenSSH. It's hard to tell from the press
release whether this is going to be viable only under
OpenBSD or if it's been ported to other platforms. They claim
it will be part of OpenBSD 2.6 (soon to be let loose). I can't
currently find stand-alone OpenSSH on their site. If anyone
has any info, let us know pls. |
| Tempest, van Eck
phreaking, and High Tech Tinfoil |
Oct 28, 1999 |
| |
| There's been a lot of questions lately regarding
Tempest, van Eck Phreaking, and what you, Joe Target, can do
about it. TSG has started compiling a page of resources to
help you make sense of all this. Happy reading, and be sure to
check out the tempest-proof fonts.... very kewl. |
| Wow... more checks and balances
|
Oct 28, 1999 |
| |
| CNN has an article
about the FBI's new hi-tech push and the leash the Legislative
branch has on it. groovy... Maybe the House and Senate aren't
just pawns for the DoJ, FBI, and CIA... maybe. |
| Follow the money |
Oct 27, 1999 |
| |
| The Fed wants to start tracking currency. Not
just for demographic info, like a corporation would want, but
to deter fraud. How will they keep smugglers from carrying
around suitcases of money, you ask? By taxing the bill based
on how long it's been in circulation. Basically, if you hold
on to a bill long enough, it's value will decay to
nothingness. Check out this Wired article.
Personally, I think it's a load of hooey. As a non-drug
smuggling consumer, I'd be pretty pissed off if the $20 bill I
found under my couch after 6 months was only worth a
buck-fifty because of the carry tax. I'd also be pretty pissed
off if the IRS noticed that I put more bills out of
circulation last year then I removed from a banking
institution and decided to audit me. Tracking bills in this
nature is one step away from putting a radio transmitter in my
head so the police know where I am. :P |
| TEMPEST: not just a Shakespeare play
|
Oct 26, 1999 |
| |
| Obscure security info is _finally_ making a
mainstream impact. For years security experts have known about
TEMPEST and Electro-magnetic snooping... but not many folks
outside the industry had even heard about it. Now Wired has an
article
about TEMPEST and it's unveiling. For more info, check out
John Young's website
and Phrack 44
File 10. |
| Site o' the day: Bert-Jaap Koops Crypto
Law Survey |
Oct 25, 1999 |
| |
| A nice resource for links to crypto laws around
the globe. He updates the site quarterly (or better) and has a
mailling list. I really like the maps
summarizing the rules of the road around the world. Check it
out. |
| Bob Barr, I think the FBI is watching
you now |
Oct 25, 1999 |
| |
| Bob Barr, a Republican House member from
Georgia has spoken
out against wiretapping the Internet. It's nice to see
somebody from the hill on our side. Gives you a bit more faith
in the system... a bit. |
| "Gagging Echelon" a flop (duh)
|
Oct 22, 1999 |
| |
| Well, Wired has an article
that started with good intentions... to explain how the "Gag
Echelon" event was misguided. Unfortunately it ended up as a
pro-crypto rant. First of all, I've alredy explained why I
sincerely doubt that Echelon has found it's way onto the pulic
IP universe (not the least of which is the push the IETF is
getting from the FBI to develop eavesdropping protocols). But
the big point is that when you talk about crypto and
governments, you have to look at in a whole new light. Crypto
is great, don't get me wrong. It'll stop your wife from seeing
naked picks of your mistress, it'll stop your competetor from
reading your business plan, but I doubt it will stop the
government from finding out your subversive ways. The US Govt
has more resources then most imagine. They have 1000's of
people and billions of giga-FLOPS to throw at the "crypto
problem". They allow us export strong crypto binaries now
because they can crack the stuff that comes out. That's why
they don't have to state how they decrypted information used
in court. It may take them a while, but they'll get your
secrets. Don't think crypto is _the_ answer, it's only
part.... ... there, was that enough conspiracy theory for a
Friday? ;) |
| TSG Presents: All the RFC's you can use
|
Oct 21, 1999 |
| |
| In the eternal hunt to add groovy things to this
site that have phenomenally complex back-ends and look really
simple.. ;) We've added an RFC archive and search. Check it out. |
| DoC asks for more time in the
Bernstein case |
Oct 20, 1999 |
| |
| The Man (aka: US Dept of Commerce) has asked to
reschedule the upcoming oral arguements scheduled for December
16th. Their basis is the fact that the DoC is going to release
new crypto regs on December 15th that may or may not
have some impact on source code export. Check out EFF's copy
of the motion.
The Bernstein camp is expected to file a response by October
29th. Check out TSG's ever-growing Bernstein Resource
and new Bernstein-announce
archive for more info. And as always, we'll keep you
posted. |
| Surprise! more WU-FTPD
vulnerabilities |
Oct 20, 1999 |
| |
| As if CERT
needed to tell you, WU-FTPD is chock
full of holes. Doh! |
| More news and views on Internet
Wiretapping |
Oct 19, 1999 |
| |
| Sorry that there haven't been any updates since
Friday. I've been a bit under the weather. Better now, and
should have some interesting upgrades to the site in the next
few days. For now check out this article
from CNN about the wiretapping debate. And if you haven't
already, subscribe to the IETF's list.
|
| The new Cryptogram
is out! |
Oct 15, 1999 |
| |
| Read it. That is all. |
| Book Review
Solaris Security |
Oct 13, 1999 |
| |
| I bought Solaris Security by Peter H.
Gregory at my local bookseller. Slammed through it in a few
hours, and figured I'd write a review. Any
books you'd like to tell us about? Let me know. |
| It was bound to happen |
Oct 13, 1999 |
| |
| For those that know me, one of my biggest peeves
about privacy and the government is the fact that since the
50's, every telco switch has been required by law to have
wiretapping capabilities. Well, the FBI is now putting
pressure on the IETF to
make Internet traffic available government snoops. The the
IETF is listening.
I recommend subscribing to their list to
stay abreast of current updates. We will of course be
monitoring events as well, and will keep you posted. Check out
this Wired article
for more info. |
| A rant on
Bernstein, strong crypto, and big money |
Oct 12, 1999 |
| |
| In a fit of idealism, I jotted down some
thoughts on the Bernstein case. Nothing major, but you may
find it
interesting. Let me know.
|
| How ISP's can be blamed for dumb
users |
Oct 12, 1999 |
| |
| Look at me actually sticking up for AOL. Wired has a headline that
reads "Password Thief Ransacks AOL....Critics says it's the
latest in a pattern of neglect by AOL." If you actually read
the story,
you'll notice that what actually happened was someone socially
engineered 1000's of users. A "hacker" sent them all a program
that when executed sends back their passwords. Somehow the
national media spins this to be a problem with AOL, not with
the user. *sigh* Remember the days when you had to figure out
trumpet winsock to get on the net? Remember how even the
idiots were fairly smart? |
| Can attacked trees feel pain? |
Oct 11, 1999 |
| |
| Welp, I missed SANS '99 (no
time/money to make the trip), but there's lots of good stuff
on the web from it. The most interesting I've read so far is a
PDF
from Bruce Schneier of Counterpane Systems on
"attack trees". Basically it's a way of hierarchically
breaking apart a secure system when you want to mount an
attack. Or when you want to figure out how to defend it. It's
a powerpoint presentation, but it's still very complete. It's
worth a browse. |
| Nobody knows who I am, right? |
Oct 11, 1999 |
| |
| Wired has an article
about how people leak information all over the internet. The
story is not a new one: those who surf the Net leave tracks..
like filling out forms to download this and that, browser info
that gets sucked out of you every time you access a webpage,
cookies that get set and examined all the time. What is new
news is that big companies (read: Lucent) are starting to get
in the game of protecting us from this information toilet.
Nice in the respect that you don't have to use an anonymous
proxy, fill out fake info on forms, and use remailers. Bad
because you put your security fate in the hands of a
non-opensourced, big-company piece of software. You choose.
|
| COPA v 99.2 (aka "Do you own an ISP
in Virginia") |
Oct 8, 1999 |
| |
| Damn the man! ;) The ACLU,
PSINet and a handful of others are going after a Virginia law
that prohibits the knowing display of information "harmful to
junveniles" on the Net. Hasn't this been done before? (see
COPA, CDA, CDAII...) They never seem to get it thru their
heads. See CNN
for details. |
| Gag Echelon? Gag me... |
Oct 6, 1999 |
| |
| Wired has an interesting article
on an upcoming attempt to "overload" Echelon, the
multinational super-secret spy network, by adding keywords to
your sig. Don't get me wrong, I'm into conspiracy theories
just like the next guy, and I have no doubts that Echelon does
exist. But I doubt it's ability to snoop on the public
internet. I've worked at a large, regional ISP, as well as
seen and worked with a lot of the Internet core. There is too
much data and too many access points to be effective.
Echelon's ability to wiretap at a telco is limited to the
switch (which has built in electronics just to listen to
calls), but data lines such as T1's and OC'3 don't go through
the switch. Local ISP's haven't been inflitrated by sniffers
(at least not government ones), and the ability to physically
sniff high speed fiber (faster than OC12) by means of a
physical "vampire"-type tap is still in it's infancy. The
bottom line: you're safe from the government online, but there
are still a lot of other meanies out to get you. |
| Why SSL doesn't work for a
transaction protocol |
Oct 6, 1999 |
| |
| Check out Security
Portal for an interesting piece on the future of SSL.
While not dead, it's application does look limited. It worked
great as the Internet's first universal, secure protocol. Now
evolution has demanded something greater. Hello TLS. |
| Site of the day - DFC |
Oct 6, 1999 |
| |
| The Digital Future
Coalition (DFC for short) is an advocate group concerned
with Copyright and privacy laws on the net. Very political,
which I am personally not. But these guys have some great
summaries of bills before the House and Senate so non-politcos
like me can feel educated. Worth the bytes of admission. -
Oct 7 1999 |
| MAC address search
|
Oct 5, 1999 |
| |
| TSG's MAC address search
lets you find that little phisher who's blasting DHCP traffic
across your network. Any suggestions on other tools? Please
let us know. |
| Is Privacy Profitable? |
Oct 5, 1999 |
| |
| CNN has a story
on how difficult it is to make money selling privacy software.
Is software the wrong approach? Should it be service based
instead? Or do people just not care enough about their privacy
to actually do something about it. I tend to think that there
is a great deal of education that needs to be done with the
public at large before they realize that they need to protect
themselves. "The net is vast and infinate" (Ghost in
the Shell - 1993) seems to be the mantra we all live by. You
may be one target out of billions, but you are still a target.
|
| And the beat goes on... |
Oct 2, 1999 |
| |
| The 9th Circuit Court has granted an en
blanc review and withdrawn the panel decision. This does
not bode well. Check out EFF's Bernstein
archive for more info.
| | |