gawker – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Sat, 03 Nov 2012 16:06:09 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png gawker – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 /var/water/logged | TechSNAP 82 https://original.jupiterbroadcasting.net/26841/varwaterlogged-techsnap-82/ Thu, 01 Nov 2012 16:37:44 +0000 https://original.jupiterbroadcasting.net/?p=26841 An inside look at how hard some Sysadmins had to work to keep their servers running after being hit by Superstorm Sandy!

The post /var/water/logged | TechSNAP 82 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

An inside look at how hard some Sysadmins had to work to keep their servers running after being hit by Superstorm Sandy!

Plus the final analysis of the Diginotar saga, an epic network debugging war story that will leave you groaning and a huge batch of your questions, and so much more!

Thanks to:

Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

BONOUS ROUND PROMO:

Get your .COMs just $5.99 per year up to 3 domains! Additional .COMs just $7.99 per year!
CODE: 599tech

SPECIAL OFFER! Save 20% off your order!
Code: go20off5

Pick your code and save:
techsnap7: $7.49 .com
techsnap10: 10% off
techsnap11: $1.99 hosting for the first 3 months
techsnap20: 20% off 1, 2, 3 year hosting plans
techsnap40: $10 off $40
techsnap25: 25% off new Virtual DataCenter plans
techsnapx: 20% off .xxx domains

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

 

Support the Show:

   

Show Notes:

Get TechSNAP on your Android:

Browser Affiliate Extension:

  • Jupiter Broadcasting Affiliate Extensions for Chrome and Firefox
  • Hurricane Sandy creates havoc for data centers in New York and New Jersey

    • A number of data centers in and around New York and New Jersey suffered various failures and issues
    • ConEd the utility provider in New York started proactively shutting down power before the storm hit, in an effort to avoid damage to their equipment
    • Most data centers had already pro-actively switched to off-grid mode, providing their own power via Diesel Generators
    • What happens when salt water meets high voltage gear
    • Slashdot created a status page, showing the known issues
    • WebHostTalk thread where various customers report the status of their gear
    • More reporting from the Web Hosting Industry Review
    • Equinix reports on their situation
    • Oct 29th: Datagram goes down, takes out Gawker, HuffingtonPost, BuzzFeed and others
    • Oct 29th: Internap announces they are evacuating the 75 Broad Street building
    • “The flooding has submerged and destroyed the site’s diesel pumps and is preventing fuel from being pumped to the generators on the mezzanine level. The available fuel reserves on the mezzanine level are estimated to support customer loads for approximately 5–7 hours”
    • It appears that NY building codes prevent storing large amounts of fuel on the upper floors due to the danger to occupants and emergency personnel in the event of a fire
    • Generators are located in the basement with the fuel supply, and some customers have their own generators on the upper floors
    • The above ground generators and fueled from small ‘day tanks’, that are then refueled from the sub-basement by pumps
    • The pumps must be located near the fuel supply, rather than on the upper levels, because the pumps would not be able to ‘prime’ themselves (pumps need liquid to pump, they cannot create enough vacuum to draw the fuel up many floors)
    • Due to the flooding cutting off fuel supplies and drowning generators, some data centers that did manage to stay powered up, lost some or all of their transit to the internet, because the other buildings that their connections go through, or their providers lost power
    • Peer1, in the same building (75 Broad Street) is on the 17th floor, provided customers hourly updates via their forums
    • Peer1 staff and customers 2 took to carrying barrels of diesel fuel up to the 17th floor to keep the day tanks full
    • Oct 29, 17:40 – Sites 1 and 2 transitioned to generator power
    • 20:36 – Still on generator. Building reports that the lobby has taken in some water
    • 22:27 – Building has detected some flooding in the 1st and 2nd basement due to the storm surge. Extent of the damage will not be determined until the basement is accessible. The fuel system has a header with 5000 gallons of fuel and will be the primary supply for the next 12–24 hours. They are also observing some lowering of the water level outside the building.
      • Oct 30, 03:30 – We are still running from emergency generator power. Water has receded and we are currently waiting for a report back from building engineers on the status of the fuel and power systems that were located in the basement. We will post further updates when we have them
      • 08:00 – At this point we have an estimate of 4 hours for the fuel left on our generators. Our techs and facility are continuously working to get emergency fuel delivery on time and was looking to set-up a temporary tank and pump since the basement is still flooded. In the event of not receiving the fuel on time, worst case scenario is we will have to gracefully shutdown the facility.
      • 16:00 – the PEER 1 Hosting NYC datacenter remains on generator power with fuel being provided through the remaining building supply. The fuel tank has arrived at our facility and due to flooding conditions in the basement caused by the weather, we are working on alternative methods of fuel delivery to the day tank located on the 17th floor. As of now, our datacenter team is carrying half-full 50 gallon barrels of diesel to our daily fuel reservoir on the 17th floor, until a more sustainable solution is reached.
      • Oct 31, 00:00 – Peer1 is still maintaining generator power. We did have slight temperature rise at Site 1 but this has been addressed by technicians. We will provide our next update in 1 hour
      • 04:00 – Peer1 is still maintaining generator power for most customers in Site 2 and Site 1. the temperature in Site 1 is still running at critically high level. At this point, We have started to call all clients in our site 1 and are asking all our colocation clients to turn down non essential equipment. This will maximize our time to run on Generator and help with the temperature rise in site 1. Our technicians will go ahead and shutdown all customers at Site 1 within the next hour (You will receive an update when this is being performed). We will provide our next update in 1 hour.
      • 08:00 – completed shutdown of customer equipment in Site 1
      • 10:00 – The A/C in site 1 is powered off building generators that are still down. If we bring site 1 back up before the building generators are back up site 1 will just overheat . we are working to try and find another work around, but we are having trouble getting electricians on site and are also working with the building to get their generator up and running. Additional spare fuel is still being manually put into our generator.We have also schedule a fuel drop off for the next fueling marker. We will provide our next update in 1 hour.
      • 15:00 – Peer1 is still maintaining generator power for customers in Site 2 . The temperature in Site 1 is starting to stabilize but we are still not bringing up the power due to our cooling system still down in site 1. The electrician is currently moving electrical circuits to get a portion of the CRAC units in site 1 online. We will contact those customers directly once we have these units online. Fuel is still good, we will provide our next update in 1 hour.
      • 23:00 – Peer1 is still maintaining generator power for customers in Site 2. The temperature in Site 1 is has stabilize. We will soon begin the process of slowly bringing up customer’s cabinets at Site 1. Fuel is still good, we will provide our next update in 1 hour.
      • Nov 1, 13:00 – Peer1 is still maintaining generator power. We have an update from the building. We are providing them a fuel hose that will allow them to start filling the building fuel tank in the next hour. We are continuing to run from our generator.
    • 16:00 – Peer1 is still maintaining generator power. Building is currently pumping fuel into the 5000 gallon header tank. We are looking at cutting over to the 5000 gallon header tank in ~90 minutes
    • Additional Story
    • NY Times live updates on Sandy’s Aftermath

    70% of State chief information security officers report breaches this year

    • Between 2010 and 2011 only 14% of CISOs saw a budget increase, while 44% say their budgets didn’t change and 34% saw their budgets reduced
    • Only 24% of CISOs are confidence that they can safeguard their data from outside attacks
    • Report PDF

    DigiNotar report lands, all CAs totally compromised

    • The attacker who compromised the SSL CA DigiNotar last year, had full control over all 8 of their certificate issuing servers
    • The report suggests that the attacker may have issued additional rouge certificates that were never identified
    • This risk was mitigated somewhat by most vendors revoking all trust in DigiNotar issued certificates, but customers who did not receive the root trust update could still be vulnerable
    • The company investigating the compromise found that the log files were generally stored on the same servers that had been compromised and evidence was found that they had been tampered with
    • “While these log files could be used to make inconclusive observations regarding unauthorized actions that took place, the absence of suspicious entries could not be used to conclude that no unauthorized actions took place”
    • Investigators also found evidence that a claim by the anonymous attacker who compromised the Comodo CA, that he was also the one who breached DigiNotar, may infact be true
    • The DigiNotar network was highly segmented and a number of the segments were isolated from the public Internet. However, a lack of strict enforcement of these policies may have allowed the attacker to island hop from compromised web server to the CA servers
    • "The investigation showed that web servers in DigiNotar’s external Demilitarized Zone (DMZ-ext-net) were the first point of entry for the intruder on June 17, 2011”
    • "From the web servers in DMZ-ext-net, the intruder first compromised systems in the Office-net network segment between the 17th and 29th of June 2011”
    • “Subsequently, the Secure-net network segment that contained the CA servers was compromised on July 1, 2011”
    • “Specialized tools were recovered on systems in these segments, which were used to create tunnels that allowed the intruder to make an Internet connection to DigiNotar’s systems that were not directly connected to the Internet. The intruder was able to tunnel Remote Desktop Protocol connections in this way, which provided a graphical user interface on the compromised systems, including the compromised CA servers."”
    • The attack on DigiNotar lasted for almost six weeks, without being detected
    • “The private keys were activated in the netHSM using smartcards. No records could be provided by DigiNotar regarding if and when smartcards were used to activate private keys, except that the smartcard for the Certificate Authorities managed on the CCV-CA server, which is used to issue certificates used for electronic payment in the retail business, had reportedly been in a vault for the entire intrusion period”
    • Original Article, in Dutch
    • Full Report PDF

    Feedback

    Followup:

    Warstory The little ssh that sometimes couldn’t

    • Mina Naguib is a sysadmin and director of engineering at Adgear
    • Noticed that some of his SSH cronjobs started reporting failures and timeouts between his servers in London (UK) and Montreal (CA)
    • He found that the transfers either completed at high speed, or hung and never completed (there we no transfers that succeeded at low speed)
    • Running the transfers manually seemed to work fine
    • After examining packets with TCPDump as they left in London, he found that some packets were being transmitted, not acknowledged, and then retransmitted, still not acknowledged
    • While examining the packets are they were received in Montreal, he noticed a difference
    • The 15th byte of every 16 bytes was being predictably corrupted
    • In the SSH handshake, instances of “h” became “x”, all instances of “c” became “s”, but only beyond the first 576 bytes
    • The SSH sessions were getting stuck, because the remote server’s kernel was discarding the TCP packet because it was corrupted, the retransmit was corrupted the same way, and so the connection was in a stalemate
    • He rules out an issue with the NICs in the servers on either side, because the issue was affecting multiple servers, and two different Montreal data centers
    • To prove his hypothesis, he used netcat, and piped /dev/zero over the network, and while examining the packets as they were received on the other side, beyond the first 576 bytes, a specific bit was being transformed from a 0 to a 1
    • The issue did not affect UDP or ICMP packets, only TCP
    • Now, the task was to pinpoint which router along the path was causing the issue
    • This was more difficult because unlike an ICMP ECHO where you can evoke a predictable response from a remote host, for TCP you require both endpoints to cooperate
    • So, he grabbed nmap, and used it’s ‘Random IP’ mode to find a collection of SSH servers, some that did, and some that did not, share hops in common with the affected route between London and Montreal
    • He created a list of servers that did not experience corruption, and those that did, and used traceroutes to identify the paths the packets took
    • Note: some internet paths are asymmetrical, and a standard traceroute will not find the return path, this could have made this problem much harder to diagnose
    • After finding 16 bad, and 25 good SSH connections, he was able to narrow his list of suspects down to a specific connection between 2 backbone providers
    • London → N hops upstream1 → Y hops upstream2
    • “Through upstream1, I got confirmation that the hop I pointed out (first in upstream2) had an internal “management module failure” which affected BGP and routing between two internal networks. It’s still down (they’ve routed around it) until they receive a replacement for the faulty module.”
    • The upstreams involved appear to have been GBLX and Level3

    Round Up:

    The post /var/water/logged | TechSNAP 82 first appeared on Jupiter Broadcasting.

    ]]> Not So Secret Answers | TechSNAP 70 https://original.jupiterbroadcasting.net/22921/not-so-secret-answers-techsnap-70/ Thu, 09 Aug 2012 16:02:55 +0000 https://original.jupiterbroadcasting.net/?p=22921 A Gawker Reporter’s entire online presence is hacked, and all his devices wiped. We’ll walk you through the details of this attack, the challenges it exposes and more.

    The post Not So Secret Answers | TechSNAP 70 first appeared on Jupiter Broadcasting.

    ]]>

    post thumbnail

    A Gawker Reporter’s entire online presence is hacked, and all his devices wiped. We’ll walk you through the details of this attack, and why it suggests we might be facing some fundamental challenges.

    Plus: Your questions, our answers, and so much more.

    On this week’s TechSNAP!

    Thanks to:

    Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

    SPECIAL OFFER! Save 20% off your order!
    Code: go20off5

    Pick your code and save:
    techsnap7: $7.49 .com
    techsnap10: 10% off
    techsnap11: $1.99 hosting for the first 3 months
    techsnap20: 20% off 1, 2, 3 year hosting plans
    techsnap40: $10 off $40
    techsnap25: 25% off new Virtual DataCenter plans
    techsnapx: 20% off .xxx domains

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

 

Support the Show:

   

Show Notes:

Gawker Reporter gets entire online presense hacked

  • Gawker Reporter and formed Wired editor Mat Honan had his entire digital life destroyed in a matter of minutes last week
  • A hacker going by the pseudonym Phobia, originally targeted Mat’s twitter account because of its 3 character username
  • The @mat twitter account linked to Mat’s personal website, which listed his gmail address
  • The attacker then started the password recovery process to reset the password of the gmail account
  • Since the gmail account had not been configured for two-factor authentication, the reset option was to send a new password to the alternate account configured in gmail
  • The address of this account is obscured and displayed so you know which email to go check, but when the alternate address for mhonan@gmail.com is displayed as m*****n@me.com it is pretty easy to guess the email address
  • Now, in order to reset the password of the AppleID, the attackers would normally need the answers to the account’s “Secret Questions”, however, there is a fallback method, when these cannot be provided by the customer
  • Apple only requires that you provide the billing address and last for digits of the credit card on file for the account
  • The billing address is fairly easy to come by (phone book, domain whois, people search, blog posts, etc), but the last four digits of the credit card number are less so
  • Since the hacker knew the victims email address, the next target of the attack was Amazon.com
  • The attacker had an associate call Amazon and claim to be the victim, wanting to add a new credit card to the account. This process only requires knowing the account holders name, billing address, and the new credit card (Adding a new credit card to your account does not seem like a high security operation, and it would seem to make sense for companies to make this process as easy as possible)
  • The trick is, you then call Amazon back, and now you are able to provide the account holders name, billing address, and current credit card number. With this information to verify your identity, you are able to change the email address on the account, to one that you control
  • Now that you control the Amazon account, you simply login, and look at the other cards on file, you don’t get to see the entire credit card number, but the first and last 4 digits are displayed, so that customers can identify which card is which
  • With that information in hand, it now time to call AppleCare, and reset the password on the AppleID, gaining you access to the iCloud account and @me.com email address of your victim
  • Next you can reset the password of the gmail account, and then once you control that, reset the password of the twitter account
  • Now, if you want to prevent your victim from interfering with your actions, you need to disable their ability to fight back. This is where iCloud’s ‘Find My’ service comes into play
  • The attacker used the service to initiate a remote wipe of the victim’s iPhone, iPad and MacBook, as part of this process, the devices are also locked with a PIN code, which only the attacker has
  • The next step was to delete the gmail account, so it couldn’t be used to regain control of the twitter account. Normally you are able to undelete a gmail account, however it requires external verification, in this case via a text message to the cell phone tied to the gmail account, which the victim had not yet regained control of
  • All of this points out that the serious weak link in most all security systems, are the people, and the ways around the security systems we put in place, for when people forget their passwords
  • As we have seen in other cases like this, with some basic personal information that is pretty easy to acquire, and attacker could have transferred the phone service from the victim’s cell phone to another device in order to intercept verification text messages from services such as gmail or the victim’s online banking
  • Mat Honan admits that a number of the security problems that made this attack possible were his own fault, not having recent backups of his devices, not using two-factor authentication for gmail and other services and having only a 7 character password for his AppleID (although this didn’t factor into this attack as originally believed, it is still a security failure)
  • Wired did its own tests using the methodology that the attacker claimed to have used, and was able to completely compromise two other Wired employees
  • Apple and Amazon have both since stopped doing password resets over the phone

Secret Questions Don’t Work

  • The problem with Secret Questions is that in order for a question to be general enough that it will apply to most people and static enough that the answer won’t change by time you need to use the questions to recover your password, the answers end up being very generic and can usually be found with a bit of research
  • You also have to consider who may be attacking your secret questions, if the question is “What was the name of your first Teacher”, what if the attacker is someone you went to school with?
  • Another problem is how strictly the answers are verified, a common security question when calling your credit card company is your mother’s maiden name. In a great deal of cases, if you just mumble something this will be accepted and you will be able to make changes to the account
  • A good security question must maximize these four criteria:
  • Definitive: there should only be one correct answer which does not change over time.
  • Applicable: the question should be possible to answer for as large a portion of users as possible (ideally, universal).
  • Memorable: the user should have little difficulty remembering it
  • Safe: it should be difficult to guess or find through research
  • Feedback: Send in your ideas for good secret questions, and we’ll critique some of the suggestions next week
  • Bruce Schneier on Secret Questions

Feedback:

Round-Up:

The post Not So Secret Answers | TechSNAP 70 first appeared on Jupiter Broadcasting.

]]> Gawker Hacked | J@N | 12.15.10 https://original.jupiterbroadcasting.net/4106/gawker-hacked-jn-121510/ Wed, 15 Dec 2010 22:32:53 +0000 https://original.jupiterbroadcasting.net/?p=4106 Gawker's recent bad luck spells real trouble for Chris! He'll share his tale of woes in tonight's show. Plus some great tools to improve your password habits!

The post Gawker Hacked | J@N | 12.15.10 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Gawker’s recent bad luck spells real trouble for Chris! He’ll share his tale of woes in tonight’s show. Plus some great tools to improve your password habits!

Show Feeds:

Download:

Gawker Account Information Compromised
https://www.wired.com/threatlevel/2010/12/gawker-hacked/
https://thenextweb.com/media/2010/12/13/gawker-hackers-release-file-with-ftp-author-reader-usernamespasswords/

A ridiculously comprehensive write-up and follow-up editorial
https://blogs.forbes.com/firewall/2010/12/13/the-lessons-of-gawkers-security-mess/

WAS I HACKED?
https://www.slate.com/id/2277768/

Top  50 Gawker User Passwords – LOL

Is it a hacking TREND?
https://www.fastcompany.com/1709836/expert-hackers-might-be-in-a-pissing-contest-companies-should-be-on-red-alert
McDonald’s, DeviantART and Walgreens now also on the “been hacked” list

Was it 4chan’s users?  Apparently not…
https://techshrimp.com/2010/12/13/gawker-website-hacked-by-gnosis-gnosis-says-they-are-not-4chan-or-anonymous/

Interview with a group named “Gnosis” that is claiming responsibility
https://thenextweb.com/media/2010/12/14/an-interview-with-gnosis-the-group-behind-the-gawker-hacking/

PREVENTION

LastPass can generate random passwords and remember them for you
https://lastpass.com/

SuperGen Pass

Something you have, something you know: Yubikey

Get CRAZY with your passwords: https://www.grc.com/passwords.htm

Download:

The post Gawker Hacked | J@N | 12.15.10 first appeared on Jupiter Broadcasting.

]]>