Cloudflare – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Mon, 04 Oct 2021 17:44:05 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png Cloudflare – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Linux Action News 209 https://original.jupiterbroadcasting.net/146302/linux-action-news-209/ Sun, 03 Oct 2021 19:15:00 +0000 https://original.jupiterbroadcasting.net/?p=146302 Show Notes: linuxactionnews.com/209

The post Linux Action News 209 first appeared on Jupiter Broadcasting.

]]>

Show Notes: linuxactionnews.com/209

The post Linux Action News 209 first appeared on Jupiter Broadcasting.

]]>
RAID Reality Check | TechSNAP 428 https://original.jupiterbroadcasting.net/141352/raid-reality-check-techsnap-428/ Fri, 01 May 2020 00:15:00 +0000 https://original.jupiterbroadcasting.net/?p=141352 Show Notes: techsnap.systems/428

The post RAID Reality Check | TechSNAP 428 first appeared on Jupiter Broadcasting.

]]>

Show Notes: techsnap.systems/428

The post RAID Reality Check | TechSNAP 428 first appeared on Jupiter Broadcasting.

]]>
AMD Inside | TechSNAP 424 https://original.jupiterbroadcasting.net/140042/amd-inside-techsnap-424/ Fri, 06 Mar 2020 00:15:00 +0000 https://original.jupiterbroadcasting.net/?p=140042 Show Notes: techsnap.systems/424

The post AMD Inside | TechSNAP 424 first appeared on Jupiter Broadcasting.

]]>

Show Notes: techsnap.systems/424

The post AMD Inside | TechSNAP 424 first appeared on Jupiter Broadcasting.

]]>
The Coffee Shop Problem | TechSNAP 413 https://original.jupiterbroadcasting.net/135407/the-coffee-shop-problem-techsnap-413/ Thu, 03 Oct 2019 23:15:16 +0000 https://original.jupiterbroadcasting.net/?p=135407 Show Notes: techsnap.systems/413

The post The Coffee Shop Problem | TechSNAP 413 first appeared on Jupiter Broadcasting.

]]>

Show Notes: techsnap.systems/413

The post The Coffee Shop Problem | TechSNAP 413 first appeared on Jupiter Broadcasting.

]]>
Linux Action News 123 https://original.jupiterbroadcasting.net/134592/linux-action-news-123/ Sun, 15 Sep 2019 18:42:42 +0000 https://original.jupiterbroadcasting.net/?p=134592 Show Notes: linuxactionnews.com/123

The post Linux Action News 123 first appeared on Jupiter Broadcasting.

]]>

Show Notes: linuxactionnews.com/123

The post Linux Action News 123 first appeared on Jupiter Broadcasting.

]]>
Old School Outages | TechSNAP 407 https://original.jupiterbroadcasting.net/132681/old-school-outages-techsnap-407/ Wed, 10 Jul 2019 21:15:15 +0000 https://original.jupiterbroadcasting.net/?p=132681 Show Notes: techsnap.systems/407

The post Old School Outages | TechSNAP 407 first appeared on Jupiter Broadcasting.

]]>

Show Notes: techsnap.systems/407

The post Old School Outages | TechSNAP 407 first appeared on Jupiter Broadcasting.

]]>
The Future is Open | LINUX Unplugged 309 https://original.jupiterbroadcasting.net/132656/the-future-is-open-linux-unplugged-309/ Tue, 09 Jul 2019 19:37:09 +0000 https://original.jupiterbroadcasting.net/?p=132656 Show Notes: linuxunplugged.com/309

The post The Future is Open | LINUX Unplugged 309 first appeared on Jupiter Broadcasting.

]]>

Show Notes: linuxunplugged.com/309

The post The Future is Open | LINUX Unplugged 309 first appeared on Jupiter Broadcasting.

]]>
3 Things to Know About Kubernetes | TechSNAP 385 https://original.jupiterbroadcasting.net/127336/3-things-to-know-about-kubernetes-techsnap-385/ Thu, 27 Sep 2018 18:58:04 +0000 https://original.jupiterbroadcasting.net/?p=127336 Show Notes: techsnap.systems/385

The post 3 Things to Know About Kubernetes | TechSNAP 385 first appeared on Jupiter Broadcasting.

]]>

Show Notes: techsnap.systems/385

The post 3 Things to Know About Kubernetes | TechSNAP 385 first appeared on Jupiter Broadcasting.

]]>
Interplanetary Peers | TechSNAP 384 https://original.jupiterbroadcasting.net/127246/interplanetary-peers-techsnap-384/ Fri, 21 Sep 2018 06:36:05 +0000 https://original.jupiterbroadcasting.net/?p=127246 Show Notes: techsnap.systems/384

The post Interplanetary Peers | TechSNAP 384 first appeared on Jupiter Broadcasting.

]]>

Show Notes: techsnap.systems/384

The post Interplanetary Peers | TechSNAP 384 first appeared on Jupiter Broadcasting.

]]>
Here Comes Cloud DNS | TechSNAP 381 https://original.jupiterbroadcasting.net/126906/here-comes-cloud-dns-techsnap-381/ Thu, 30 Aug 2018 07:51:17 +0000 https://original.jupiterbroadcasting.net/?p=126906 Show Notes: techsnap.systems/381

The post Here Comes Cloud DNS | TechSNAP 381 first appeared on Jupiter Broadcasting.

]]>

Show Notes: techsnap.systems/381

The post Here Comes Cloud DNS | TechSNAP 381 first appeared on Jupiter Broadcasting.

]]>
Pen is Mightier | User Error 47 https://original.jupiterbroadcasting.net/123777/pen-is-mightier-user-error-47/ Mon, 02 Apr 2018 09:28:52 +0000 https://original.jupiterbroadcasting.net/?p=123777 RSS Feeds: MP3 Feed | Video Feed | iTunes Feed Become a supporter on Patreon: Links: Gero Lifespan on the App Store Scientists use AI to predict biological age based on smartphone and wearables data — Moscow Institute of Physics and Technology Kodi No More! | Kodi | Open Source Home Theater Software Stream Movies, […]

The post Pen is Mightier | User Error 47 first appeared on Jupiter Broadcasting.

]]>

RSS Feeds:

MP3 Feed | Video Feed | iTunes Feed

Become a supporter on Patreon:

Patreon

Links:

The post Pen is Mightier | User Error 47 first appeared on Jupiter Broadcasting.

]]>
Cloudy with a Chance of Leaks | TechSNAP 308 https://original.jupiterbroadcasting.net/107191/cloudy-with-a-chance-of-leaks-techsnap-308/ Tue, 28 Feb 2017 21:37:19 +0000 https://original.jupiterbroadcasting.net/?p=107191 RSS Feeds: HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed Become a supporter on Patreon: Show Notes: Announcing the first SHA1 collision Not just Google on this, they worked with CWI SHA1 is a Cryptographic hash function SHA-1 was developed as part […]

The post Cloudy with a Chance of Leaks | TechSNAP 308 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Announcing the first SHA1 collision

CloudBleed


Feedback


Round Up:


The post Cloudy with a Chance of Leaks | TechSNAP 308 first appeared on Jupiter Broadcasting.

]]>
Cloudy With a Chance of SSL | TechSNAP 195 https://original.jupiterbroadcasting.net/74772/cloudy-with-a-chance-of-ssl-techsnap-195/ Thu, 01 Jan 2015 11:50:39 +0000 https://original.jupiterbroadcasting.net/?p=74772 We go inside the epic takedown of SpamHaus, then we break down why CloudFlare’s Flexible SSL is the opposite of security. Followed by a great batch of questions, our answers & much much more! Thanks to: Get Paid to Write for DigitalOcean Direct Download: HD Video | Mobile Video | MP3 Audio | Ogg Audio […]

The post Cloudy With a Chance of SSL | TechSNAP 195 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We go inside the epic takedown of SpamHaus, then we break down why CloudFlare’s Flexible SSL is the opposite of security.

Followed by a great batch of questions, our answers & much much more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

Become a supporter on Patreon:

Foo

— Show Notes: —

Krebs covers the arrest of one of the attackers in the SpamHaus attack, but digs even deeper

  • “A 17-year-old male from London, England pleaded guilty this week to carrying out a massive denial-of-service attack last year against anti-spam outfit SpamHaus and content delivery network CloudFlare”
  • In late March 2013, a massive distributed denial-of-service (DDoS) attack hit the web site of SpamHaus, an organization that distributes a blacklist of spammers to email and network providers.
  • When SpamHaus moved its servers behind CloudFlare, which specializes in blocking such attacks — the attackers pelted CloudFlare’s network, taking it down as well.
  • The New York Times called the combined assault the largest known DDoS attack ever on the Internet at the time; for its part, CloudFlare dubbed it “the attack that almost broke the Internet.”
  • Both of these were wrong, the attack was no larger than others seen every day on the internet
  • The only clever part of the DDoS was attacking the, supposed to be unpublished and unreachable, IP address of the route server at the London Internet Exchange (LINX)
  • A response from the CTO of nLayer/GTT (major backbone providers)
  • TechSNAP Episode 104 – We tear down the hype around this attack
  • The Krebs article also digs much deeper into the story, covering StopHaus, the group that ordered the attack, uncovering who is behind it
  • “this seems as good a time as any to look deeper into who’s likely the founder and driving force behind the Stophaus movement itself. All signs point to an angry, failed spammer living in Florida who runs an organization that calls itself the Church of Common Good”
  • The Church of Common Good lists as its leader a Gulfport, Fla. man named Andrew J. Stephens, whose LinkedIn page says he is a “media mercenary” at the same organization (hours after this story was posted, large chunks of text were deleted from Stephens’ profile; a PDF of the original profile is here).
  • Stephens’ CV lists a stint in 2012 as owner of an email marketing firm variously called Digital Dollars and IBT Inc, moneymaking schemes which Stephens describes as a “beginner to intermediate level guide to successful list marketing in today’s email environment. It incorporates the use of both white hat and some sketchy techniques you would find on black hat forums, but has avoided anything illegal or unethical…which you would also find on black hat forums.”
  • Under his “Featured Work” heading, he lists “The Stophaus Project,” “Blackhat Learning Center,” and a link to an spamming software tool called “Quick Send v.1.0.”
  • “Putting spammers and other bottom feeders in jail for DDoS attacks may be cathartic, but it certainly doesn’t solve the underlying problem: That the raw materials needed to launch attacks the size of the ones that hit SpamHaus and CloudFlare last year are plentiful and freely available online. As I noted in the penultimate chapter of my new book — Spam Nation (now a New York Times bestseller, thank you dear readers!), the bad news is that little has changed since these ultra-powerful attacks first surfaced more than a decade ago.”

Why CloudFlare’s Flexible SSL is the opposite of security

  • “Flexible SSL makes it easy to create a secure connection and have it mean nothing. Do you need a trusted certificate for your latest phishing scheme? Just host it regularly on your insecure server and set it up on Cloudflare: that padlock might just seal the deal to the distracted user”
  • The issue is that, to buy real SSL certificates, costs money for each domain
  • But setting up 100s of sites and using Flexibile SSL costs much less
  • “I’m not giving the reader a brilliant criminal idea, I’m sure this is rather obvious to any serious cybercriminal that creates those realistic website copies and the appealing emails that lead people to them – they have been trying to emulate the security features of real websites, but setting up trusted SSL has been a challenge. Now SSL is within their reach, even without the minimum knowledge on how to configure SSL servers.”
  • “It subverts the idea of a secure channel, because it is not secure by any reasonable definition, given the data is transmitted in the clear at some point through the public internet; the idea of authentication, given you no longer are interacting with the websites’ actual servers; and the idea of trust, since thousands of bogus certificates emitted this way will not ensure users’ security, leading me to distrust the trust model of the entire Web. That’s pretty severe right there.”
  • “I’m all for the proliferation of SSL, and security is indeed too difficult for the average webmaster to figure out. This means, unfortunately, that some websites that ask for your private data send it in the clear. Certainly SSL for everybody is much better?
    I’d argue that not really. Not only does it empower anyone to create malicious websites (see above) but it empowers people who don’t know security to do it badly. And by making Flexible SSL available, the easiest and default option is just that.“
  • Do you trust Cloudflare entirely? — Enabling Universal SSL gives your users a sense of security: that the data they are sending is protected from the preying eyes of attackers. Remember though, in this setup, Cloudflare has access to the entire data stream in cleartext, thus your transmission is only as secure as Cloudflare’s infrastructure: one zero-day exploit is all it takes to read traffic of potentially millions of websites with a single attack (this means it could take more than one attack, but certainly not proportional to the number of websites affected, in the sense that a single Cloudflare endpoint mediates traffic to multiple websites).
  • Full SSL allows you to use an untrusted certificate between your server and CloudFlare, then CloudFlare uses a real certificate between them and your users, but they can still snoop on everything
  • Sure, Cloudflare may be in a better position than you are to combat a zero day, but what about combating the government?
  • So, while CloudFlare touts itself as providing SSL for everyone, we are left questioning if that is actually a good thing. Should people that don’t understand how SSL works really be hosting sites using SSL, leaving them and their users trusting that things are secure when they likely aren’t, and trusting CloudFlare doesn’t seem like the best idea

Feedback:


Round Up:


The post Cloudy With a Chance of SSL | TechSNAP 195 first appeared on Jupiter Broadcasting.

]]>
Celebrity Bugs | TechSNAP 191 https://original.jupiterbroadcasting.net/73082/celebrity-bugs-techsnap-191/ Thu, 04 Dec 2014 20:52:33 +0000 https://original.jupiterbroadcasting.net/?p=73082 2014 has been the year of the celebrity bugs, we take a look at the new trend of giving security vulnerabilities names & logos & ask who it truly benefits. Plus practical way to protect yourself from ATM Skimmers, how they work & much more! Thanks to: Get Paid to Write for DigitalOcean Direct Download: […]

The post Celebrity Bugs | TechSNAP 191 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

2014 has been the year of the celebrity bugs, we take a look at the new trend of giving security vulnerabilities names & logos & ask who it truly benefits.

Plus practical way to protect yourself from ATM Skimmers, how they work & much more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

Become a supporter on Patreon:

Foo

— Show Notes: —

Wiretapping ATMs

  • “Banks in Europe are warning about the emergence of a rare, virtually invisible form of ATM skimmer involving a so-called “wiretapping” device that is inserted through a tiny hole cut in the cash machine’s front. The hole is covered up by a fake decal, and the thieves then use custom-made equipment to attach the device to ATM’s internal card reader.”
  • “The criminals cut a hole in the fascia around the card reader where the decal is situated,” EAST described in a recent, non-public report. “A device is then inserted and connected internally onto the card reader, and the hole covered with a fake decal”
  • “It’s where a tap is attached to the pre-read head or read head of the card reader,” Lachlan said. “The card data is then read through the tap. We still classify it as skimming, but technically the magnetic stripe [on the customer/victim’s card] is not directly skimmed as the data is intercepted.”
  • So, they attach to the REAL card reader, and siphon off a copy of the data as the card is read
  • That makes this form of skimming pretty much undetectable (except possibly by the fake decal used to cover the hole cut in the front of the ATM)
  • The Krebs article also talks about new “insert transmitter skimmers”, that use a small battery and transmit the skimmed data a short distance, meaning the attacker does not have to return to the scene of the crime to collect the stolen data, decreasing their risk of getting caught
  • “It’s best to focus instead on protecting your own physical security while at the cash machine. If you visit an ATM that looks strange, tampered with, or out of place, try to find another ATM. Use only machines in public, well-lit areas, and avoid ATMs in secluded spots”
  • “Last, but certainly not least, cover the PIN pad with your hand when entering your PIN: That way, if even if the thieves somehow skim your card, there is less chance that they will be able to snag your PIN as well. You’d be amazed at how many people fail to take this basic precaution. Yes, there is still a chance that thieves could use a PIN-pad overlay device to capture your PIN, but in my experience these are far less common than hidden cameras (and quite a bit more costly for thieves who aren’t making their own skimmers).”

Bug naming and shaming

  • This article discusses the advantages and disadvantages to having named and branded bugs like Heartbleed, as well as some behind the scenes info on that exploit, and the people behind the naming of various other vulnerabilities since then
  • “If the bug is dangerous enough, it gets a name. Heartbleed’s branding changed the way we talk about security, but did giving a bug a logo make it frivolous… or is this the evolution of infosec?”
  • Heartbleed was discovered some time before Friday, March 21, 2014 by a Google security researcher. It was later shared with Open SSL, Red Hat, CloudFlare, Facebook, and Akamia
  • Finnish security company Codenomicon separately discovered Heartbleed on April 3, and informing the National Cyber Security Centre Finland the next day”
  • They then immediately went to work on a marketing plan. This discovery was going to launch their small firm into super stardom. They had a logo and website designed, and prepared for the public disclosure of the bug
  • The original public disclosure was supposed to be made on April 9th. However, after details started to leak, and the OpenSSL team decided that if more than 1 group had already discovered the bug, more would quickly follow, they released the details early, on April 7th
  • “Half an hour after OpenSSL published a security advisory the morning of April 7, CloudFlare bragged in a blog post and a tweet that it was first to protect its customers, and how CloudFlare was enacting an example for “responsible disclosure.”
  • “An hour after CloudFlare’s little surprise, Codenomicon tweeted to announce the bug, now named Heartbleed, linking to a fully prepared website, with a logo, and an alternate SVG file of the logo made available for download.”
  • “Heartbleed — birth name CVE-2014-0160 — became a household term overnight, even though average households still don’t actually understand what it is.”
  • “The media mostly didn’t understand what Heartbleed was either, but its logo was featured on every major news site in the world, and the news spread quickly. Which was good, because for the organizations who needed to remediate Heartbleed, it was critical to move fast.”
  • In the end, it seems Heartbleed was a success, most systems were patched quite quickly, although many systems did not follow the full procedure, and that has had some fallout that we have covered
  • In justifying the name given to a Russian hacking group, iSight Partners said: “Without naming these teams, it would be impossible for a network defender to keep track of them all. We think that’s essential, because intimately understanding these teams is the first step to mounting an effective defense. Giving a name to a team — as we have done with Sandworm — helps practitioners and researchers track and attribute tactics, techniques, procedures and ongoing campaigns back to the team. By assigning identities, It helps to bring these actors out of the shadows and into the light.“
  • Other vulnerabilities, like POODLE, had alarmingly bad reporting that may have done more harm than good
  • ShellShock was the anti-case. It didn’t have a logo, or an official website. ShellShock timeline
  • It was actually originally dubbed BashDoor by its creator, but when it was leaked to the press by someone else, they provided the name ShellShock
  • Further, because the initial fix for the ShellShock vulnerability did not entirely solve the problem, there was much confusion, where people thought they had already patched, but didn’t have the “latest” patch
  • Then, there were a number of follow-on vulnerabilities in bash, that didn’t have names, but were lumped in with ShellShock, which lead to even more confusion
  • Closing Quote: “The researchers didn’t tell their closest biz-buddies in a game of telephone, one in which Heartbleed became an arms race of egos, insider information trading, and opportunism”
  • Who gets to decide what bugs are bad enough to get a name instead of just a CVE number? Should MITRE start tracking names along with the CVE numbers?
  • Who gains more for naming bugs, the end users who might become more aware of the issue and be able to protect themselves, or the PR powered firms that exploit it for their own good?

Feedback:


Round Up:


The post Celebrity Bugs | TechSNAP 191 first appeared on Jupiter Broadcasting.

]]>
Time to Kill openSSL | TechSNAP 158 https://original.jupiterbroadcasting.net/55342/time-to-kill-openssl-techsnap-158/ Thu, 17 Apr 2014 17:00:12 +0000 https://original.jupiterbroadcasting.net/?p=55342 Is it time to replace openSSL? We’ll follow up on the Heartbleed story, discuss how attackers got read access to Google’s production servers.

The post Time to Kill openSSL | TechSNAP 158 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Is it time to replace openSSL? We’ll follow up on the Heartbleed story, discuss how attackers got read access to Google’s production servers and then it’s a great batch of your questions and our answers.

All that and much much more…

On this week’s TechSNAP!

Thanks to:


\"DigitalOcean\"


\"Ting\"


\"iXsystems\"

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

— Show Notes: —

Heartbleed followup


How we got read access to Google’s production servers

  • A group of researchers decided to target Google
  • Looking at the trends in the industry, flaws are most often found in:
  • Old and deprecated software
  • Unknown and hardly accessible software
  • Proprietary software that only a few people have access to
  • Alpha/Beta releases and otherwise new technologies
  • So they did their homework
  • They used the Google search engine, to search for software and companies that Google had acquired, antique systems, and products with very few users
  • They found the Google Toolbar button gallery
  • The product allows users to customize the toolbar by uploading XML that controls the style etc
  • They quickly managed to perform an XXE attack
  • They were then able to read files on Google’s production servers, including /etc/passwd, and some custom init scripts that Google uses to manage their cluster of servers
  • They likely could have escalated the attack, and possibly accessed Google’s internal servers
  • The team reporting the issue to Google, and was awarded a $10,000 bug bounty

Feedback:


Round Up:

The post Time to Kill openSSL | TechSNAP 158 first appeared on Jupiter Broadcasting.

]]>
Packets Over 90,000 | TechSNAP 102 https://original.jupiterbroadcasting.net/34026/packets-over-90000-techsnap-102/ Thu, 21 Mar 2013 16:48:28 +0000 https://original.jupiterbroadcasting.net/?p=34026 A CloudFlare outage takes down three quarter of a million sites, we’ll tell you what went wrong.

The post Packets Over 90,000 | TechSNAP 102 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A CloudFlare outage takes down three quarter of a million sites, we’ll tell you what went wrong.

Some old school malware gets the job done, Allan’s cool toys from Japan, a big batch of your questions our answers, and much more on this week’s TechSNAP.

Thanks to:

Use our code hostdeal4 to score economy hosting for $1 a month, for one year.

35% off your ENTIRE order just use our code go35off4 until the end of the month!

 

Visit techsnap.ting.com to save $25 off your device or service credits.

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

 

Support the Show:

   

Show Notes:

Get TechSNAP on your Android:

Browser Affiliate Extension:

  • Jupiter Broadcasting Affiliate Extensions for Chrome and Firefox
  • CloudFlare outage takes down reported 750,000 sites

    • CloudFlare is an online WAF (Web Application Firewall) and CDN
    • We have talked about outages they have had in the past, but this one is different
    • Sites went down on March 3rd at 09:47 UTC (4:47am EST, 1:47am PST), the sites, DNS and other services all returned a ‘no route to host’ error
    • Service was restored at 10:49 – a total of just over an hour
    • Unlike some previous outages, this took down all 23 of their data centers
    • According to CloudFlare, they originally detected a DDoS attack against one or more customers’ DNS servers, and moved to filter that attack
    • Their attack profiling software reported that the attack packets were between 99,971 and 99,985 bytes
    • This is actually impossible, largest possible IP (Layer 3) packet is 65535 bytes, due to the size of the field that holds the length of the packet in the header (16 bits)
    • Also, most layer 2 protocols (like Ethernet) also impose a smaller frame size, the default for Ethernet is 1500 bytes. The CloudFlare network is configured to use ‘jumbo frames’ with a maximum packet size of 4470 bytes
    • When they used the Juniper Flowspec protocol to push a rule to all of their routers to block packets of the impossible size, the routers accepted the rules, but then started exhausting all of their ram, probably due to a bug related to the fact that the rule was invalid
    • This caused many of the routers to reboot, but then they would load the same rules and just reboot again, in a continuous loop
    • Some of the routers also stopped responding on their management interfaces, requiring that the devices be manually power cycled (in the 23 different data centers in 14 countries)
    • When the routers were down, the routes would be withdrawn/expired, and it ended up that there were no routes left to allow anyone to reach the CloudFlare network
    • CloudFlare is working with Juniper to see if this is a bug in Flowspec, or if it was specific to the rules and traffic of CloudFlare
    • CloudFlare is also attempting to find a way to be able to use flowspec to push rules only to a specific subset of their routers (those under attack, or those in a specific region), so that next time it doesn’t take down their entire network at once
    • Official Post Mortem

    Malware doesn’t have to be advanced to be effective

    • Researchers have discovered a malware attack that has been ongoing for 10 years using off-the-shelf remote administration software TeamViewer along with proprietary malware
    • The attackers managed to exfiltrate encryption keys and ‘secret’ documents from a number of sensitive places, including an unidentified NATO/EU member country’s embassy and an industrial manufacturer in Russia, multiple research and educational institutions in France and Belgium, and a high-profile Hungarian governmental victim
    • Kaspersky’s research indicated the threat actors were most likely Russian, because the malware scripts changed the character set to CP1251 and used the Russian localized version of TimeViewer. They also found some possible links to the Red October malware
    • CrySyS.hu Report
    • Kaspersky research paper

    BBC twitter accounts hacked by Pro-Assad Syrians

    • The twitter accounts for BBC Weather, BBC Arabic and BBC Ulster Radio were compromised and posted unauthorized tweets
    • “The attacks began in the early afternoon on Thursday. At the same time, BBC staff were alerted to a phishing email that had been sent to some BBC email accounts. It is not yet clear if the two are related”
    • The attack was apparently the work of the “Syrian Electronic Army”, a group that has previously shown strong support for Syrian President Bashar-al-Assad
    • Humorous tweets were posted, such as:
      • “Saudi weather station down due to head-on collision with camel.”
      • “Chaotic weather forecast for Lebanon as the government decides to distance itself from the Milky Way.”
    • The accounts are now back under the control of the BBC
    • It is not clear how the accounts were compromised

    Feedback:

    [asa]B0070I17LQ[/asa]

    Round Up:

    The post Packets Over 90,000 | TechSNAP 102 first appeared on Jupiter Broadcasting.

    ]]> I Know Your Password | TechSNAP 61 https://original.jupiterbroadcasting.net/20312/i-know-your-password-techsnap-61/ Thu, 07 Jun 2012 17:50:30 +0000 https://original.jupiterbroadcasting.net/?p=20312 Bad password storage practices many popular sites had their password databases leaked online this week, we’ve got the details!

    The post I Know Your Password | TechSNAP 61 first appeared on Jupiter Broadcasting.

    ]]>

    post thumbnail

    It’s a simple thing but everyone keeps messing it up, bad password storage practices many popular sites had their password databases leaked online this week, we’ve got the details!

    Plus how the Flame malware impersonated Windows Update, and another batch of audience questions!

    All that and more, on this week’s TechSNAP.

    All that and so much more, in this week’s episode of, TechSNAP.

    Thanks to:

    Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

    Limited time offer:

    $1.99/mo economy hosting for 3 months – special offer!
    Code:  199tech
    Expires:  June 30, 2012

    Direct Download:

    HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | Torrent File

    RSS Feeds:

    HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

     

    Support the Show:

    Show Notes:

    Flame Took Advantage of Windows Update

    • Iran has sustained 185 Flame virus infections, followed by 95 in Israel and the Palestinian Territories, 32 in Sudan and 29 in Syria
    • A Flame module called Gadget possesses man-in-the-middle functionality which enabled it pass crafted update packages to other computers on the same network
    • One specific package was called WuSetupV.exe and was signed with a certificate issued by the “Microsoft Enforced Licensing Registration Authority CA”, a sub-CA of Microsoft’s root authority
    • The malware, which is 20 megabytes when all of its modules are installed, contains multiple libraries, SQLite3 databases, various levels of encryption — some strong, some weak — and 20 plug-ins that can be swapped in and out to provide various functionality for the attackers. It even contains some code that is written in the LUA programming language
    • Most victims were running 32-bit editions of Windows 7, with a sizeable 45 per cent running XP. Flame does not work on the 64-bit edition of Windows 7
    • The Flame malware used a cryptographic collision attack in combination with the terminal server licensing service certificates to sign code as if it came from Microsoft
    • Microsoft still uses MD5 fingerprints on its certificates, according to the Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates | TechSNAP 37 MD5 was Deprecated for Root and Subordinate CAs in Dec 2010, SHA256 or better is required for all certificates issued after Dec 31, 2013. SHA1 is only allowed until more browsers support SHA256 or better
    • Microsoft has already confirmed that Flame developers were able to issue valid Microsoft certificates
    • Flame’s operators used a number of fake identities to register their domains. According to Kaspersky, server locations included Germany, the Netherlands, the UK, Switzerland, Hong Kong and Turkey
    • Although the Flame toolkit does not appear to have been written by the same programmers who wrote Stuxnet and DuQu, it does share a few interesting things with Stuxnet
    • Stuxnet is believed to have been written through a partnership between Israel and the United States, and was first launched in June 2009
    • Researchers say the compilation date of modules in Flame appear to have been manipulated by the attackers, perhaps in an attempt to thwart researchers from determining when they were created

    “Whoever created it was careful to mess up the compilation dates in every single module,” Gostev said. “The modules appear to have been compiled in 1994 and 1995, but they’re using code that was only released in 2010.”
    + Iran’s Computer Emergency Response Team announced on Monday that it had developed a detector to uncover what it calls the “Flamer” malware on infected machines and delivered it to select organizations at the beginning of May

    Links


    LinkedIn leaks 6.4 million password hashes

    • A list of 6.4 million SHA–1 hashes, proported to be passwords from the popular business social networking site Linkedin.com was posted on a Russian password cracking forum
    • The list is deduplicated, meaning each hash is listed only once, meaning more than 6.4 million passwords were compromised
    • The list that I managed to download had a lot of the hashes prefixed with 5 or 6 0s, apparently marking them as already having been brute forced
    • An analysis of a number of permutations of the word linkedin, shows that almost every obfuscation was present on the list
    • Research has shown that the name of the site is one of the most common passwords, so this suggests that the list is actually from LinkedIn
    • A number of users at hackernews found their obscure/random passwords on the list of hashes, further suggesting that the list is legitimate
    • Using plain SHA–1 hashes to store passwords is extremely insecure, a cryptographic hashing algorithm with a salt should be used
    • I managed to download a 10GB rainbow table of SHA1 hashes, and check every 1–7 character mixed case alpha numeric password using my nVidia GTX 560 Ti, in only 220 seconds
    • A rainbow table for longer passwords is impractical due to the amount of storage required
    • Salted hashes cannot be attacked by rainbow tables because the salt basically extends the length of the password, and because crypt() based hashing algorithms run the hash multiple times
    • MD5-crypt uses an 8 character salt and loops 100 times, SHA256/SHA512-crypt uses a 16 character salt and by default loops 5000 times (adjustable between 1000 and 100 million), and Bcrypt uses a 22 character salt and 16 loops (adjustable as powers of two between 4 and 31)
    • Consider the following key spaces, and assume you had access to the cracking power of the ENTIRE bitcoin mining network (10 Terahashes per second) (Disclaimer: these numbers are probably wrong, just an example for reference)
      • 8 character password, mixed case alpha numberic: (26+26+10)^8 = 218,340,105,584,896 = 21.8 seconds to try every possible password
      • 8 character password, all 7-bit ascii characters: 127^8 = 67,675,234,241,018,881 = 6767 seconds to try every possible password (less than 2 hours)
      • 8–12 character password, alphabetical only: 26^8 + 26^9 + 26^10 + 26^11 + 26^12 = 99,246,106,575,066,880 = 9924 seconds (less than 3 hours)
      • 8 character mixed case alpha numberic password, with 8 character salt, 100 rounds = 62^16 * 100 = 4,767,240,170,682,353,345,026,333,081,600 = 15,116,819,414 years
    • Official LinkedIn Response
    • LinkedIn claims that they now salt passwords, so if you change your password, it will be updated and stored more securely
    • LinkedIn would be able to update to the stronger hashing algorithm without requiring users to change their password, by computing the new hash the next time each user logs in
    • LastPass – LinkedIn Password Checker

    Cloudflare hacked via its voicemail

    • Cloudflare is a cloud based WAF (Web Application Firewall) and Global Load Balancer
    • An Attacker found four separate security vulnerabilities and chained them together in order to take over the account of a single Cloudflare user
    • The attacker was basically in control of the entire cloudflair infrastructure approximately 30 minutes
    • The attacker first exploited weak security at AT&T to redirect voicemail from the Cloudflare CEO to a mailbox setup by the attacker
    • The attacker next took over the CEOs personal Gmail account by tricking Google’s password reset system in to leaving the pin number in the voicemail box by a specially crafted voicemail greeting
    • A flaw (since fixed) in Google’s Enterprise Apps system, allowed the attacker to by-pass the two-factor authentication system when resetting the password for the CEOs Corporate Gmail, having the password send to the CEOs Personal Gmail compromised earlier.
    • An internal policy at Cloudflare had all password reset emails BCCed to administrators (ironically, this was done for debugging and to watch for suspicious password reset requests)
    • Once the attacker had compromised a Google Enterprise Apps admin account, he reset the passwords for the other admins, and initiated a Cloudflare password reset for the targetted customer
    • A copy of the password reset was sent to the administrator email, which the attacker now controlled, giving them access to the target users Cloudflare account
    • The attacker redirected all traffic to the target site to twitter
    • Official Incident Report w/ Updates
    • Official Followup

    MD5-Crypt no longer considered secure

    • Poul-Henning Kamp (also known as PHK), who wrote the MD5-crypt implementation used in most all devices since 1995, says that it should no longer be considered secure
    • Commercial off-the-shelf video cards can crack MD5 hashes are rates in excess of 1 million hashes per second
    • PHK says he will not write a new password hashing algorithm, because he is not a cryptographer
    • His recommendation is to actually mix a number of algorithms, rather than using just a single algorithm
    • He also recommends that each site implement their own variation of the algorithm, to ensure against ‘class breaks’
    • FreeBSD 9 already supports Bcrypt, and SHA256/512 based password hashing
    • Arch Linux and a few others uses SHA256 by default now

    Feedback:

    Round up:

    The post I Know Your Password | TechSNAP 61 first appeared on Jupiter Broadcasting.

    ]]>