bcrypt – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Fri, 01 Mar 2019 15:47:05 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png bcrypt – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Proper Password Procedures | TechSNAP 398 https://original.jupiterbroadcasting.net/129611/proper-password-procedures-techsnap-398/ Fri, 01 Mar 2019 07:47:05 +0000 https://original.jupiterbroadcasting.net/?p=129611 Show Notes: techsnap.systems/398

The post Proper Password Procedures | TechSNAP 398 first appeared on Jupiter Broadcasting.

]]>

Show Notes: techsnap.systems/398

The post Proper Password Procedures | TechSNAP 398 first appeared on Jupiter Broadcasting.

]]>
BTRFS is Toast | TechSNAP 331 https://original.jupiterbroadcasting.net/117276/btrfs-is-toast-techsnap-331/ Tue, 08 Aug 2017 22:38:35 +0000 https://original.jupiterbroadcasting.net/?p=117276 RSS Feeds: HD Video Feed | MP3 Audio Feed | iTunes Feed | Torrent Feed Become a supporter on Patreon: Show Notes: Responsible Disclosure Is Hard When a responsible person discovers a security issue, disclosing it properly is difficult Uses Tesla’s policy as a good example of how companies should do this “This is not […]

The post BTRFS is Toast | TechSNAP 331 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

HD Video Feed | MP3 Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Responsible Disclosure Is Hard

  • When a responsible person discovers a security issue, disclosing it properly is difficult

  • Uses Tesla’s policy as a good example of how companies should do this

  • “This is not hard stuff and it basically amounts to text on a page. Consider whether your own organisation has something to this effect and is actually ready to handle disclosure by those who attempt to do so ethically. Listen to these people and be thankful they exist; there’s a whole bunch of others out there who are far less charitable and by the time you hear from those guys, it’s already too late.”

RedHat deprecates Btrfs

  • The Btrfs file system has been in Technology Preview state since the initial release of Red Hat Enterprise Linux 6. Red Hat will not be moving Btrfs to a fully supported feature and it will be removed in a future major release of Red Hat Enterprise Linux.

  • The Btrfs file system did receive numerous updates from the upstream in Red Hat Enterprise Linux 7.4 and will remain available in the Red Hat Enterprise Linux 7 series. However, this is the last planned update to this feature.

320 Million Freely Downloadable Pwned Password hashes


Feedback


Round Up:

The post BTRFS is Toast | TechSNAP 331 first appeared on Jupiter Broadcasting.

]]>
BSD Now vs. BSDTalk | BSD Now 27 https://original.jupiterbroadcasting.net/52967/bsd-now-vs-bsdtalk-bsd-now-27/ Thu, 06 Mar 2014 23:41:07 +0000 https://original.jupiterbroadcasting.net/?p=52967 The long-awaited meetup is finally happening on today\’s show. We\’re going to be interviewing the original BSD podcaster, Will Backman, to discuss what he\’s been up to and what the future of BSD advocacy looks like. After that, we\’ll be showing you how to track (and even cross-compile!) the -CURRENT branch of NetBSD. We\’ve got […]

The post BSD Now vs. BSDTalk | BSD Now 27 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The long-awaited meetup is finally happening on today\’s show. We\’re going to be interviewing the original BSD podcaster, Will Backman, to discuss what he\’s been up to and what the future of BSD advocacy looks like. After that, we\’ll be showing you how to track (and even cross-compile!) the -CURRENT branch of NetBSD. We\’ve got answers to user-submitted questions and the latest news, on BSD Now – the place to B.. SD.

Thanks to:


\"iXsystems\"

Direct Download:

Video | HD Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | HD Vid Feed | HD Torrent Feed

– Show Notes: –

Headlines

FreeBSD and OpenBSD in GSOC2014

  • The Google Summer of Code is a way to encourage students to write code for open source projects and make some money
  • Both FreeBSD and OpenBSD were accepted, and we\’d love for anyone listening to check out their GSOC pages
  • The FreeBSD wiki has a list of things that they\’d be interested in someone helping out with
  • OpenBSD\’s want list was also posted
  • DragonflyBSD and NetBSD were sadly not accepted this year

Yes, you too can be an evil network overlord

  • A new blog post about monitoring your network using only free tools
  • OpenBSD is a great fit, and has all the stuff you need in the base system or via packages
  • It talks about the pflow pseudo-interface, its capabilities and relation to NetFlow (also goes well with pf)
  • There\’s also details about flowd and nfsen, more great tools to make network monitoring easy
  • If you\’re listening, Peter… stop ignoring our emails and come on the show! We know you\’re watching!

BSDMag\’s February issue is out

  • The theme is \”configuring basic services on OpenBSD 5.4\”
  • There\’s also an interview with Peter Hansteen
  • Topics also include locking down SSH, a GIMP lesson, user/group management, and…
  • Linux and Solaris articles? Why??

Changes in bcrypt

  • Not specific to any OS, but the OpenBSD team is updating their bcrypt implementation
  • There is a bug in bcrypt when hashing long passwords – other OSes need to update theirs too! (FreeBSD already has)
  • \”The length is stored in an unsigned char type, which will overflow and wrap at 256. Although we consider the existence of affected hashes very rare, in order to differentiate hashes generated before and after the fix, we are introducing a new minor \’b\’.\”
  • As long as you upgrade your OpenBSD system in order (without skipping versions) you should be ok going forward
  • Lots of specifics in the email, check the full post

This episode was brought to you by

\"iXsystems


Interview – Will Backman – bitgeist@yahoo.com / @bsdtalk

The BSDTalk podcast, BSD advocacy, various topics


Tutorial

Tracking and cross-compiling -CURRENT (NetBSD)


News Roundup

X11 no longer needs root

  • Xorg has long since required root privileges to run the main server
  • With recent work from the OpenBSD team, now everything (even KMS) can run as a regular user
  • Now you can set the \”machdep.allowaperture\” sysctl to 0 and still use a GUI

OpenSSH 6.6 CFT

  • Shortly after the huge 6.5 release, we get a routine bugfix update
  • Test it out on as many systems as you can
  • Check the mailing list for the full bug list

Creating an OpenBSD USB drive

  • Since OpenBSD doesn\’t distribute any official USB images, here are some instructions on how to do it
  • Step by step guide on how you can make your very own
  • However, there\’s some recent emails that suggest official USB images may be coming soon… oh wait

PCBSD weekly digest

  • New PBI updates that allow separate ports from /usr/local
  • You need to rebuild pbi-manager if you want to try it out
  • Updates and changes to Life Preserver, App Cafe, PCDM

Feedback/Questions

  • espressowar writes in: https://slexy.org/view/s2JpJ5EaZp
  • Antonio writes in: https://slexy.org/view/s2QpPevJ3J
  • Christian writes in: https://slexy.org/view/s2EZLxDfWh
  • Adam writes in: https://slexy.org/view/s21gEBZbmG
  • Alex writes in: https://slexy.org/view/s2RnCO1p9c

  • All the tutorials are posted in their entirety at bsdnow.tv
  • Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv
  • We especially want to hear some tutorial ideas that you guys would like to see, so let us know
  • Also, if you\’re a NetBSD or DragonflyBSD guy listening, we want to talk to you! We\’d love more interviews related to those, whether you\’re a developer or not
  • Watch live Wednesdays at 2:00PM Eastern (19:00 UTC)

The post BSD Now vs. BSDTalk | BSD Now 27 first appeared on Jupiter Broadcasting.

]]>
Go Directly to Fail | TechSNAP 151 https://original.jupiterbroadcasting.net/52407/go-directly-to-fail-techsnap-151/ Thu, 27 Feb 2014 17:23:58 +0000 https://original.jupiterbroadcasting.net/?p=52407 We’ll break down Apple’s major SSL flaw, and what it says about Apple’s general security posture, then the Zeus trojan evolves…

The post Go Directly to Fail | TechSNAP 151 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We’ll break down Apple’s major SSL flaw, and what it says about Apple’s general security posture, then the Zeus trojan evolves…

Plus an awesome batch of your questions, our answers.

On this week’s episode of, TechSNAP.

Thanks to:


\"GoDaddy\"


\"Ting\"


\"iXsystems\"

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

— Show Notes: —

Apple fixes certificate validation flaw in iOS and OS X

  • The flaw in the certificate verification step allowed an attacker to sign a certificate with any private key, or no key at all, and the certificate would still be accepted by the device
  • This means an attacker could trivially perform a man-in-the-middle (MitM) attack, and intercept all traffic between you and a secure destination
  • This would allow an attack to get your email passwords, logins for services like facebook and twitter, and compromise your online banking account
  • A MitM attack is what TLS/SSL are designed to prevent
  • A MitM is trivial to perform if you can trick a user into connecting to a WiFi access point you control, say at a coffee shop or other public space
  • The flaw is also present in Mac OS X and fixed in 10.9.2 (Released Feb 25th, 4 days after the iOS update)
  • The issue is caused by a duplicate ‘goto’ statement. The first is inside the if structure (with implied curly braces), but the 2nd is unconditional, causing the goto fail to happen in every case
  • It is unclear how long Apple has known about the flaw, but the CVE for the bug was reserved on January 8th
  • diff between Mac OS X 10.8.5 and 10.9 showing the addition of the errant goto
  • OS X 10.9.2 also fixes an issue with cURL, where the TLS/SSL verification code did not check the hostname again the certificate if the URL was an IP address
  • Hacker News thread
  • More analysis
  • Why were there gotos in apple software in the first place?
  • Apple Announcement

University of Maryland ID card system breached

  • 309,079 of the students, faculty, and staff of the University of Maryland College Park and Shady Grove campuses have had their personal information exposed in an attack against the ID card system
  • The breach occurred about 04:00 February 18th
  • An attacker was able to get access to the ID card database that holds information on all card holders dating back to 1998
  • The data includes full name, SSN, birth date and University ID number
  • Brian Voss, CIO of U Md., said “what most concerns him is the sophistication of the attack: The hacker or hackers must have had a “very significant understanding” of how the school’s data are designed and protected”
  • Voss claims that this was not a case of a ‘door left open’, that the attackers had to ‘pick through multiple locks’
  • It will be interesting to see if details of the attack are published
  • Related: The total cost of unmasked data

New Zeus trojan variant targets SalesForce.com

  • “The Adallom Labs team recently discovered an unusual variant of the Zeus trojan that targets Salesforce users. We’ve been internally referring to this type of attack as “landmining”, since the attackers laid “landmines” on unmanaged devices used by employees to access company resources. The attackers, now bypassing traditional security measures, wait for the user to connect to *.my.salesforce.com in order to exfiltrate company data from the user’s Salesforce instance.”
  • We have covered the Zeus trojan before, it is a sophisticated malware used to steal online banking credentials and perform transactions, even in the face of two-factor authentication schemes by performing ‘man-in-the-browser’ attacks
  • This attack does not exploit a vulnerability of SalesForce, it is just taking over the user’s device used to access the site, in order to steal data from the site once logged in
  • This attack seems to be a totally new kind of attack, not described by any existing Common Attack Pattern Enumeration and Classification (CAPEC) pattern.
  • When the Adallom security system detected an employee accessing a large number of records in a short period of time, it triggered an ‘insider thread’ alert. This alert is fairly common and is usually related to a sales agent downloading their entire rolodex, sometimes in preparation for leaving the company
  • When corporate security integrated the employee in question, they claimed no knowledge of the bulk download
  • The employees laptop was scanned and found to be clean
  • Further investigation lead to the employees home PC, which was running outdated windows XP, an unpatched version of Internet Explorer, and an expired virus scanner
  • The machine was infected with various bits of malware, but specifically, a modified version of the Zeus Trojan (win32/ZBot)
  • The interesting part is that the Trojan targets *.my.salesforce.com instead of banking sites
  • The attack also leveraged devices not controlled by corporate security
  • This highlights the risks involved with BYOD and allowing employees to use their home computers to access corporate applications, especially SaaS applications

Feedback:


Round Up:


The post Go Directly to Fail | TechSNAP 151 first appeared on Jupiter Broadcasting.

]]>
Cryptocrystalline | BSD Now 16 https://original.jupiterbroadcasting.net/48367/cryptocrystalline-bsd-now-16/ Fri, 20 Dec 2013 10:53:55 +0000 https://original.jupiterbroadcasting.net/?p=48367 How to do a fully-encrypted installation of FreeBSD and OpenBSD. We also have an interview with Damien Miller - one of the lead developers of OpenSSH.

The post Cryptocrystalline | BSD Now 16 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We\’ll be showing you how to do a fully-encrypted installation of FreeBSD and OpenBSD. We also have an interview with Damien Miller – one of the lead developers of OpenSSH – about some recent crypto changes in the project. If you\’re into data security, today\’s the show for you. The latest news and all your burning questions answered, right here on BSD Now – the place to B.. SD.

Thanks to:


\"iXsystems\"

Direct Download:

Video | HD Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | HD Vid Feed | HD Torrent Feed

– Show Notes: –

Headlines

Secure communications with OpenBSD and OpenVPN

  • Starting off today\’s theme of encryption…
  • A new blog series about combining OpenBSD and OpenVPN to secure your internet traffic
  • Part 1 covers installing OpenBSD with full disk encryption (which we\’ll be doing later on in the show)
  • Part 2 covers the initial setup of OpenVPN certificates and keys
  • Parts 3 and 4 are the OpenVPN server and client configuration
  • Part 5 is some updates and closing remarks

FreeBSD Foundation Newsletter

  • The December 2013 semi-annual newsletter was sent out from the foundation
  • In the newsletter you will find the president\’s letter, articles on the current development projects they sponsor and reports from all the conferences and summits they sponsored
  • The president\’s letter alone is worth the read, really amazing
  • Really long, with lots of details and stories from the conferences and projects

Use of NetBSD with Marvell Kirkwood Processors

  • Article that gives a brief history of NetBSD and how to use it on an IP-Plug computer
  • The IP-Plug is a \”multi-functional mini-server was developed by Promwad engineers by the order of AK-Systems. It is designed for solving a wide range of tasks in IP networks and can perform the functions of a computer or a server. The IP-Plug is powered from a 220V network and has low power consumption, as well as a small size (which can be compared to the size of a mobile phone charger).\”
  • Really cool little NetBSD ARM project with lots of graphs, pictures and details

Experimenting with zero-copy network IO

  • Long blog post from Adrian Chad about zero-copy network IO on FreeBSD
  • Discusses the different OS\’ implementations and options
  • He\’s able to get 35 gbit/sec out of 70,000 active TCP sockets, but isn\’t stopping there
  • Tons of details, check the full post

Interview – Damien Miller – djm@openbsd.org / @damienmiller

Cryptography in OpenBSD and OpenSSH


Full disk encryption in FreeBSD & OpenBSD

  • Shows how to install both FreeBSD and OpenBSD with full disk encryption
  • We\’ll be using geli and bioctl and doing it step by step

News Roundup

OpenZFS office hours

  • Our buddy George Wilson sat down to take some ZFS questions from the community
  • You can see more info about it here

License summaries in pkgng

  • A discussion between Justin Sherill and some NYCBUG guys about license frameworks in pkgng
  • Similar to pkgsrc\’s \”ACCEPTABLE_LICENSES\” setting, pkgng could let the user decide which software licenses he wants to allow
  • Maybe we could get a \”pkg licenses\” command to display the license of all installed packages
  • Ok bapt, do it

The post Cryptocrystalline | BSD Now 16 first appeared on Jupiter Broadcasting.

]]>
Kickin’ NAS | BSD Now 15 https://original.jupiterbroadcasting.net/47992/kickin-nas-bsd-now-15/ Thu, 12 Dec 2013 22:07:53 +0000 https://original.jupiterbroadcasting.net/?p=47992 We'll be looking at the new version of FreeNAS, a BSD-based network attached storage solution, as well as talking to Josh Paetzel.

The post Kickin' NAS | BSD Now 15 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We\’ll be looking at the new version of FreeNAS, a BSD-based network attached storage solution, as well as talking to Josh Paetzel – one of the key developers of FreeNAS. Actually, he\’s on the FreeBSD release engineering team too, and does quite a lot for the project. We\’ve got answers to viewer-submitted questions and plenty of news to cover, so get ready for some BSD Now – the place to B.. SD.

Thanks to:


\"iXsystems\"

Direct Download:

Video | HD Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | HD Vid Feed | HD Torrent Feed

– Show Notes: –

Headlines

More faces of FreeBSD

  • Another installment of the FoF series
  • This time they talk with Reid Linnemann who works at Spectra Logic
  • Gives a history of all the different jobs he\’s done, all the programming languages he knows
  • Mentions how he first learned about FreeBSD, actually pretty similar to Kris\’ story
  • \”I used the system to build and install ports, and explored, getting actively involved in the mailing lists and forums, studying, passing on my own limited knowledge to those who could benefit from it. I pursued my career in the open source software world, learning the differences in BSD and GNU licensing and the fragmented nature of Linux distributions, realizing the FreeBSD community was more mature and well distributed about industry, education, and research. Everything steered me towards working with and on FreeBSD.\”
  • Now works on FreeBSD as his day job
  • The second one covers Brooks Davis
  • FreeBSD committer since 2001 and core team member from 2006 through 2012
  • He\’s helped drive our transition from a GNU toolchain to a more modern LLVM-based toolchain
  • \”One of the reasons I like FreeBSD is the community involved in the process of building a principled, technically-advanced operating system platform. Not only do we produce a great product, but we have fun doing it.\”
  • Lots more in the show notes

We cannot trust Intel and Via’s chip-based crypto

  • We woke up to see FreeBSD on the front page of The Register, Ars Technica and Hacker News for their strong stance on security and respecting privacy – good to see big news outlets giving credit where it\’s due
  • At the EuroBSDCon dev summit, there was some discussion about removing support for hardware-based random number generators.
  • FreeBSD\’s /dev/random got some updates and, for 10.0, will no longer allow the use of Intel or VIA\’s hardware RNGs as the sole point of entropy
  • \”It will still be possible to access hardware random number generators, that is, RDRAND, Padlock etc., directly by inline assembly or by using OpenSSL from userland, if required, but we cannot trust them any more\”
  • Hopefully others will follow FreeBSD\’s example very soon

OpenSMTPD 5.4.1 released

  • The OpenBSD developers came out with major a new version
  • Improved config syntax (please check your smtpd.conf before upgrading)
  • Adds support for TLS Perfect Forward Secrecy and custom CA certificate
  • MTA, Queue and SMTP server improvements
  • SNI support confirmed for the next version
  • Check the show notes for the full list of changes, pretty huge release
  • Watch Episode 3 for an interview we did with the developers

More getting to know your portmgr

  • The portmgr secretary, Thomas Abthorpe, interviews… himself!
  • Joined as -secretary in March 2010, upgraded to full member in March 2011
  • His inspiration for using BSD is \”I wanted to run a webserver, and I wanted something free. I was going to use something linux, then met up with a former prof from university, and shared my story with him. He told me FreeBSD was the way to go.\”
  • Mentions how he loves that anyone can contribute and watch it \”go live\”
  • The second one covers Baptiste Daroussin
  • The reason for his nick, bapt, is \”Baptiste is too long to type\”
  • There\’s even a video of bapt joining the team!

Interview – Josh Paetzel – josh@ixsystems.com / @freenasteam

FreeNAS 9.2.0


Tutorial

[FreeNAS walkthrough]


News Roundup

Introducing configinit

  • CloudInit is \”a system originally written for Ubuntu which performs configuration of a system at boot-time based on user-data provided via EC2\”
  • Wasn\’t ideal for FreeBSD since it requires python and is designed around the concept of configuring a system by running commands (rather than editing configuration files)
  • Colin Percival came up with configinit, a FreeBSD alternative
  • Alongside his new \”firstboot-pkgs\” port, it can spin up a webserver in 120 seconds from \”launch\” of the EC2 instance
  • Check the show notes for full blog post

OpenSSH support for Ed25519 and bcrypt keys

  • New Ed25519 key support (hostkeys and user identities) using the public domain ed25519 reference code
  • SSH private keys were encrypted with a symmetric key that\’s just an MD5 of their password
  • Now they\’ll be using bcrypt by default
  • We\’ll get more into this in next week\’s interview

The FreeBSD challenge

  • A member of the Linux foundation blogs about using FreeBSD
  • Goes through all the beginner steps, has to \”unlearn\” some of his Linux ways
  • Only a few posts as of this time, but it\’s a continuing series that may be helpful for switchers
  • Maybe some day he\’ll be on the FreeBSD foundation instead!

PCBSD weekly digest

  • GNOME3, cinnamon and mate desktops are in the installer
  • Compat layer updated to CentOS 6, enables newest Skype
  • Looking for people to test printers and hplip
  • Continuing work on grub, but the ability to switch between bootloaders is back

Feedback/Questions

  • Bostjan writes in: https://slexy.org/view/s20k2gumbP
  • Jason writes in: https://slexy.org/view/s2PM8tfKfe
  • John writes in: https://slexy.org/view/s2KgXIKqrJ
  • Kjell-Aleksander writes in: https://slexy.org/view/s20DLk8bac
  • Alexy writes in: https://slexy.org/view/s2nmmJHvgR

  • All the tutorials are posted in their entirety at bsdnow.tv
  • Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv
  • Watch live Wednesdays at 2:00PM Eastern (19:00 UTC)

The post Kickin' NAS | BSD Now 15 first appeared on Jupiter Broadcasting.

]]>
Tales from the BCrypt | TechSNAP 85 https://original.jupiterbroadcasting.net/27761/tales-from-the-bcrypt-techsnap-85/ Thu, 22 Nov 2012 00:08:38 +0000 https://original.jupiterbroadcasting.net/?p=27761 How Allan saved PayPal from an embarrassing leak and a bunch of cash, details on the FreeBSD project’s compromise, and the latest advances in password hashing.

The post Tales from the BCrypt | TechSNAP 85 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

How Allan saved PayPal from an embarrassing leak and a bunch of cash, details on the FreeBSD project’s compromise, and the latest advances in password hashing.

Plus the bug in iOS 6 that could cost you money, and a batch of your questions and our answers!

All that and a lot more in this week’s TechSNAP!

Thanks to:

Use our code tech495 to get a .COM for $4.95, or go20off5 to save 20% on your entire order!

$4.99 SSL certificates, just use our code 499ssl2. Expires 12-31-12!

Pick your code and save:
techsnap7: $7.49 .com
techsnap10: 10% off
techsnap11: $1.99 hosting for the first 3 months
techsnap20: 20% off 1, 2, 3 year hosting plans
techsnap40: $10 off $40
techsnap25: 25% off new Virtual DataCenter plans
techsnapx: 20% off .xxx domains

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

 

Support the Show:

   

Show Notes:

Get TechSNAP on your Android:

Browser Affiliate Extension:

  • Jupiter Broadcasting Affiliate Extensions for Chrome and Firefox
  • Researcher finds flaw in PayPal that may expose sensitive data

    • PayPal’s new bug bounty program opened on June 21st 2012
    • On June 29th, the security researcher in this story decided to take a look at PayPal and see if he could make some money
    • He started his quest with a search on SHODAN (search engine for service information, like version numbers etc) for ‘admin paypal’
    • He found a number of publically accessible ‘staging’ servers for PayPal (such as stage2mb106.paypal.com)
    • He started by trying to do an authentication bypass by using SQL injection using the randomly selected username ‘lsmith’
    • This returned an error message, but also the string ‘You are logged in as Lori Smith’
    • After some more testing, he found jsmith was Janine Smith
    • He wasn’t sure what this staging admin area did yet, but after some googing he found examples of court documents dumping the details of a paypal account that are generated by the tool at admin.paypal.com
    • This is where the researcher found the first problem with PayPal’s bug bounty program. PayPal asks that all submissions be encrypted with PGP to ensure privacy, however the PGP key posted on the bug bounty program website had expired
    • On July 5th he finally got a proper PGP key and sent his report
    • July 19th – automated report that submission was received
    • August 7th – submission closed as ‘invalid’
    • August 8th – submission recategorized and reopened
    • August 21st – A hand written reply to another bug report, says the current report is still open and payment will be sent when it is fixed
    • August 29th – received payment for a ‘XSS Vulnerability’, which seems like a miscategorization, asks if this is a mistake, never gets a reply
    • Researcher’s Writeup

    • Allan has also participated in the PayPal Bug Bounty program, after finding a cache of stolen paypal accounts totaling millions of dollars (a story to be covered in depth when I get time)
    • My own disclosure to the program started on September 15th and was finally concluded today, November 21st
    • The first automated reply saying they had received the report was September 17th
    • September 20th they replied asking for some additional information
    • October 26th, Paypal apologized for the delay and notified me that while my submission did not qualify under the Bug Bounty program, due to the nature of the information they were still going to award me $1000, I should expect payment in 3 weeks
    • November 21st, I received my payment and clearance to talk about the incident

    Two FreeBSD project servers compromised by leaked SSH key

    • On November 17th the FreeBSD security officer announced that intrusions into two servers operated by the FreeBSD project had been detected on November 11th
    • The affected machines were taken offline for analysis
    • A large portion of the remaining infrastructure machines were also taken offline as a precaution
    • The two machines that were compromised were part of the legacy third-party package building infrastructure
    • It is believed that the compromise may have occurred as early as the 19th September 2012
    • The compromise is believed to have occurred due to the leak of an SSH key from a developer who legitimately had access to the machines in question, and was not due to any vulnerability or code exploit within FreeBSD
    • At no time did this attack place the core FreeBSD operating system (kernel, userland, contributed apps (ssh/sshd, bind, etc)) at risk
    • However, the attacker had access sufficient to potentially allow the compromise of third-party packages. No evidence of this has been found during in-depth analysis, however the FreeBSD Project is not taking any risks, and has thrown out all of the packages it was building for the release of FreeBSD 9.1 and building them from scratch
    • If you are running a system that has had no third-party packages installed or updated on it between the 19th September and 11th November 2012, you have no reason to worry
    • The Source, Ports and Documentation Subversion repositories have been audited, and the project is confident that no changes have been made to them. Any users relying on them for updates have no reason to worry
    • The project cannot guarantee the integrity of any packages available for installation between 19th September 2012 and 11th November 2012, or of any ports compiled from trees obtained via any means other than through svn.freebsd.org or one of its mirrors. Although there is no evidence to suggest any tampering took place and such interference is unlikely, the FreeBSD Project recommends you consider reinstalling any such machines from scratch, using trusted sources
    • Additional Source

    PHP 5.5 to introduce new password hashing API

    • Official PHP RFC Wiki
    • Why do we need password hashing: to store passwords in a way such that we can verify the a user is entering the correct password, but if our database is compromised, the attacker cannot easily determine the users password
    • Why do we need strong cryptographic password hashing: Using regular hashing functions such as MD5 or even SHA512 is not sufficient. Regular hashing algorithms are designed to be fast and that is undesirable. Additionally, a straight hash is subject to attack by rainbow tables (precalculated hashes). Cryptographic hashes add a salt, to make each hash unique (even if multiple users use the same password, because the salt will be different, the hash will be different). Cryptographic hashes also usually include a stretching or slowing algorithm, that makes the hash take longer to calculate, sha512crypt uses a loop count, doing the hash 10000 times. Some algorithms like bcrypt are resistant to acceleration by a GPU, and other algorithms such as scrypt are designed to be memory intensive to resist acceleration for ASIC or FPGAs.
    • The new PHP password hashing API makes the process of generating and validating hashes much easier, and includes a system for upgrading hashes
    • The new API allows you to optionally specify the hash to use, and if not defaults to bcrypt (the old crypt() defaulted to DES). This also means that in the future, if PHP changes the default password hash, all new hashes will be made using the new algorithm
    • The API introduces a function that checks if a password hash needs to be upgraded. So when a user attempts to login, you check that they have entered the correct password (your database contains a hash from the old algorithm, but the hashes contain a marker at the front that identifies the hashing algorithm), if it is correct, you then use the attempted password (which you have in plain text, since you require that to generate a hash to check against the hash in your database) and hash it with the new algorithm, and overwrite the copy in your database. With this system, the first time a user with an old hash logs in, their hash is upgraded to the new algorithm
    • PHP 5.5 is just coming out in beta, and will likely not see production use for a while, but you do not have to wait, there is a pure-PHP implementation for PHP 5.3

    iOS 6 streaming bug causes excessive data user

    • The issue has been detailed in a blog post at PRX.org
    • They looked into it after being approached by folks at This American Life about extremely high bills from their CDN for the month of October.
    • Chris has heard from other podcasters about this issue, and for some less prepared networks/shows it’s caused a semi-DDoS effect for many hours after an episode release.
    • PRX.org was able to reproduce the issue with several podcasts in the Podcast app, including podcasts using Limelight and Akamai CDNs.
    • PRX.org was unable to reproduce the issue using iOS 5 or using iOS 6.0.1, but there are still many people using iOS 6.0.0. We believe that this issue, combined with the bug causing the phone to behave as though it is connected to WiFi even when it is not, could account for the significant data overages reported with the release of iOS 6.
    • Others have reported the issue remains in iOS 6.0.1, but is perhaps alleviated by the resolution of the wifi bug.
    • When the file has completed downloading, it begins downloading again from the beginning of the file and continues for as long as one is streaming the file.
    • As long as one is listening to audio being streamed with iOS 6, it is using significant amounts of data.
    • There appears to be a system-wide problem with the AV Foundation framework in iOS 6.0.0, impacting any App in the app store that uses that backend.
    • Apple does not appear to have acknowledged the specific issue.
    • Original PRX Labs post
    • More Coverage at Ars Technica and The Next Web

    Openwall gives talk at YaC2012 about password hashing

    • Openwall are the developers behind John the Ripper
    • Talk covers the challenges of securing against online and offline attacks
    • Covers the Pros and Cons of the YubiHSM, a USB hardware security module for servers from the makers of the YubiKey
    • Covers the future vulnerabilities of PBKDF2 and bcrypt
    • Talks about the advantages of scrypt
    • scrypt was invented by Colin Percival (former FreeBSD Security Officer), for his tarsnap secure online backup product
    • scrypt is designed to be much more secure against hardware brute-force attacks (using ASICs and FPGAs etc), it uses a time-memory trade off, requiring a large amount of ram to lower the required amount of CPU cycles, making dedicated hardware attacks much more expensive to carry out
    • “if 5 seconds are spent computing a derived key, the cost of a hardware brute-force attack against scrypt is roughly 4000 times greater than the cost of a similar attack against bcrypt (to find the same password), and 20000 times greater than a similar attack against PBKDF2”
    • When used for file encryption, the cost of cracking the password is 100 billion times more than the cost of cracking the same password on a file encrypted by openssl enc
    • scrypt is now an IETF internet draft

    Feedback:

    Round Up:

    The post Tales from the BCrypt | TechSNAP 85 first appeared on Jupiter Broadcasting.

    ]]>