Seagate – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Fri, 01 May 2020 02:58:46 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png Seagate – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 RAID Reality Check | TechSNAP 428 https://original.jupiterbroadcasting.net/141352/raid-reality-check-techsnap-428/ Fri, 01 May 2020 00:15:00 +0000 https://original.jupiterbroadcasting.net/?p=141352 Show Notes: techsnap.systems/428

The post RAID Reality Check | TechSNAP 428 first appeared on Jupiter Broadcasting.

]]>

Show Notes: techsnap.systems/428

The post RAID Reality Check | TechSNAP 428 first appeared on Jupiter Broadcasting.

]]>
Storage Stories | TechSNAP 426 https://original.jupiterbroadcasting.net/140792/storage-stories-techsnap-426/ Fri, 03 Apr 2020 00:15:00 +0000 https://original.jupiterbroadcasting.net/?p=140792 Show Notes: techsnap.systems/426

The post Storage Stories | TechSNAP 426 first appeared on Jupiter Broadcasting.

]]>

Show Notes: techsnap.systems/426

The post Storage Stories | TechSNAP 426 first appeared on Jupiter Broadcasting.

]]>
Hopeful for HAMR | TechSNAP 423 https://original.jupiterbroadcasting.net/139677/hopeful-for-hamr-techsnap-423/ Fri, 21 Feb 2020 18:10:00 +0000 https://original.jupiterbroadcasting.net/?p=139677 Show Notes: techsnap.systems/423

The post Hopeful for HAMR | TechSNAP 423 first appeared on Jupiter Broadcasting.

]]>

Show Notes: techsnap.systems/423

The post Hopeful for HAMR | TechSNAP 423 first appeared on Jupiter Broadcasting.

]]>
Dangerous Dangling Quotes | TechSNAP 278 https://original.jupiterbroadcasting.net/101686/dangerous-dangling-quotes-techsnap-278/ Thu, 04 Aug 2016 17:47:47 +0000 https://original.jupiterbroadcasting.net/?p=101686 How to get an SSL certificate for other people’s domains, how to decrypt HTTPS traffic with some javascript & the latest storage reliability report. Plus great questions & a rocking round up! Thanks to: Get Paid to Write for DigitalOcean Direct Download: HD Video | Mobile Video | MP3 Audio | OGG Audio | YouTube […]

The post Dangerous Dangling Quotes | TechSNAP 278 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

How to get an SSL certificate for other people’s domains, how to decrypt HTTPS traffic with some javascript & the latest storage reliability report.

Plus great questions & a rocking round up!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | OGG Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Keeping Positive: Obtaining wildcard SSL certificates for arbitrary domains

    I recently decided to investigate the security of various certificate authority’s online certificate issuing systems. These online issuers allow certificate authorities to verify that someone owns a specific domain, such as thehackerblog.com and get a signed certificate so they can enable SSL/TLS on their domain.

    When I started out hunting for possible vulnerabilities, my initial strategy was to look for the cheapest, most 90’s-looking, poorly designed certificate authority websites. Since the compromise of any certificate authority allows an attacker to bypass all the protections of SSL/TLS it doesn’t even have to be a popular provider because they all have the same power. After doing a bit of searching I realized it would be advantageous to do testing against authorities that had free SSL certificates, since doing tests against these wouldn’t cost me any money. I passed on Let’s Encrypt because I figured it had already been thoroughly audited, the second site I saw was a 30 day free trial from Positive SSL (a company owned by Comodo).

    Upon entering your CSR and selecting the software you used to generate it, you then select the email address for domain validation (from the website’s WHOIS) and arrive on a “Corporate Details” page. This is the vulnerable portion of the application, where you fill out your company/personal information getting to the email validation portion

    When I first went through this process I mindlessly filled out junk HTML for all of these fields. The service then sent a verification email to the email address on the website’s WHOIS info. Once I received the email, I noticed the HTML was not being properly escaped and the markup I had entered before was being evaluated. This is really bad because the email also contained a verification code which could be used to obtain an SSL/TLS certificate for my website. This means if I had a way to leak a victim’s token, I could obtain a valid certificate for their site, so that I could intercept traffic to that site seamlessly without users knowing I was doing so

  • Normally, the email provides the user with a link and the code to validate the certificate. However, because an attacker can fill out the form fields with HTML, they can change the message in the email, instead requiring you to click a link within the next 24 hours to REJECT this bogus certificate
  • So, in the field he wrote some HTML that included an form tag and a textarea tag that was never closed
  • This resulted in everything that appears after that field in the email, being swallowed by the text area, rather than the body of the email.
  • Then a later form field adds a button, “click here to reject this request”. When the user clicks the button, it submits the contents of the HTML textarea (including the verification code) to the attacker’s website, giving them the code, allowing them to approve the certificate for YOUR domain
  • Form submissions are a great way to leak secrets like this because they work in many different mail clients. Even the iPhone’s Mail app supports this functionality

    Once I’ve leaked the code from the victim in this way, I can then log into the account I created during the certificate request process and download the SSL/TLS certificate

    One other important thing to note is that resellers of Comodo’s certificates were also affected as well. This risk is amplified because resellers can have a customized HTML header and footer for the verification emails that get sent out. This means that it would be possible for a third party vendor to have a dangling tag in the header combined with a single quote in the footer which would side-channel leak the verification code in the email body (similar to the attack above, but automatic with no user interaction). This style of dangling mark-up injection wasn’t possible in the previously proof-of-concept but is possible for resellers.

  • Timeline:
  • June 4th, 2016 – Emailed security@comodo.com and reached out on Twitter to @Comodo_SSL.
    • June 6th, 2016 – Robin from Comodo confirms this is the correct contact to report security issues, provides PGP key.
    • June 6th, 2016 – Emailed Comodo the vulnerability PGP-encrypted and sent my PGP public key.
    • June 7th, 2016 – Robin from Comodo confirms they understand the bug and state they will work on a fix as soon as possible.
    • June 20th, 2016 – Emailed Comodo for status update.
    • July 1st, 2016 – Outline timeline for responsible disclosure date (90 days from report date per industry standards).
    • July 25th, 2016 – Robin from Comodo confirms a fix has be put in place.
  • Normally, the name of the game when it comes to finding a way to mint arbitrary SSL/TLS certificates is to find the smallest, cheapest, and oldest certificate provider you can. Comodo is the exact opposite of this, they have a 40.6% marketshare and are the largest minter of certificates on the internet. Basically, they are the largest provider of SSL/TLS certificates and yet they still suffer from security issues which would be (hopefully) caught on a regular penetration testing engagement. This paints a grim picture for the certificate authority system. If the top providers can’t secure their systems, how could the smaller providers possibly be expected to do so? It’s a hard game to play since the odds are heavily stacked in the attacker’s favor with tons of certificate authorities all with the power to mint arbitrary certificates. A single CA compromise and the entire system falls apart.

    Luckily, we have some defences against this with newer web technologies such as Public Key Pinning which offers protection against attackers using forged certificates. This is a fairly powerful mitigation against an attacker with a forged certificate. However, the support is iffy with a lack of support in Internet Explorer, Edge, Safari, and Safari on iOS.

    Many people like to speak of a certificate authority hack as if it was something only a nation state could accomplish, but just a day’s worth of searching led me to this issue and I don’t doubt that many providers suffer from much more severe vulnerabilities. What happens when your attacker doesn’t care about ethical boundaries and is willing to do much more in-depth testing? After all, this is Comodo, the largest provider. What about the smaller certificate providers? Do they really stand a chance?


HEIST: New attack allows stealing sensitive information web HTTPS encrypted pages

  • HEIST: HTTP Encrypted Information can be Stolen through TCP-windows
  • This new attack exploits how HTTPS responses are delivered over TCP, and how compression is used, and the new Javascript API
  • The exploit is notable because it doesn’t require a man-in-the-middle position. Instead, an end user need only encounter an innocuous-looking JavaScript file hidden in an Web advertisement or hosted directly on a webpage. The malicious code can then query a variety of pages protected by the secure sockets layer or transport layer security protocols and measure the precise file sizes of the encrypted data they transmit.

    Once attackers know the size of an encrypted response, they are free to use one of two previously devised exploits to ferret out the plaintext contained inside it. Both the BREACH and the CRIME exploits are able to decrypt payloads by manipulating the file compression that sites use to make pages load more quickly.

  • “HEIST makes a number of attacks much easier to execute,” Tom Van Goethem, one of the researchers who devised the technique, told Ars. “Before, the attacker needed to be in a Man-in-the-Middle position to perform attacks such as CRIME and BREACH. Now, by simply visiting a website owned by a malicious party, you are placing your online security at risk.”
  • Rather than having to visit a malicious website, all that is required is that you end up being served a malicious advertisement, on any website
  • Using HEIST in combination with BREACH allows attackers to pluck out and decrypt e-mail addresses, social security numbers, and other small pieces of data included in an encrypted response. BREACH achieves this feat by including intelligent guesses—say, @gmail.com, in the case of an e-mail address—in an HTTPS request that gets echoed in the response. Because the compression used by just about every website works by eliminating repetitions of text strings, correct guesses result in no appreciable increase in data size while incorrect guesses cause the response to grow larger.

    To determine the size of an HTTPS-protected response, the attacker uses an oracle technique that returns what amounts to a yes-or-no response to each guess. When a request containing “value=” results in the same data size, the attacker knows that string is inside the encrypted response and then tries to modify the guess to include the next character, say “value=0”. If that guess results in a larger file size, the attacker knows it’s wrong and will try “value=1”, “value=2”, and so on until the new guess similarly results in a response that shows no increase in file size. The attacker then tries to guess the next character and repeats the process until the entire token has been recovered.

    Until now, this BREACH-style exploit required the attacker to be able to actively manipulate the traffic passing between the Web server and end user. A HEIST-enabled BREACH exploit removes that limitation. It does this by using TCP characteristics as a quasi cryptographic side channel to measure the size of an HTTPS response. TCP divides large transmissions into smaller fixed-sized chunks called frames and further groups frames inside what are called TCP windows, which are sent one at a time. TCP sends a new window only after receiving confirmation that frames from the previous window were received by the end user.

    HEIST is able to count the number of frames and windows sent by interacting with a set of newly approved APIs, one called Resource Timing and another called Fetch. In the process, they allow a piece of JavaScript to determine the exact size of an HTTPS response.

    Van Goethem said the only mitigation he knows of is to disable the third-party cookies, since responses sent by the HTTPS site are no longer associated with the victim. At the moment, most Web browsers by default enable the receipt of third-party cookies, and some online services don’t work unless third-party cookies are allowed.

    Wednesday’s demo will show how a malicious ad displayed on The New York Times website is able to painstakingly measure the size of an encrypted response sent by a fictitious third-party site they dubbed targetwebsite.com (see the image below). It will go on to show how that information can be used to infer the characters contained in a security token designed to prevent cross-site request forgery attacks

  • And, we are not protected by the next generation HTTP protocol either
  • HEIST is also effective against HTTP/2, the drop-in replacement for the older HTTP standard that encrypts all Web traffic. In some cases, HEIST can abuse new features of HTTP/2 to increase the damaging effects.

  • If we know that HTTP/2 is used, we can let the browser simultaneously request the targeted resource, and another resource that contains reflected content,” Vanhoef and Van Goethem wrote in a research paper.
  • Since HTTP/2 is used, both requests are sent in parallel to the server, and the server replies to them in parallel as well.

    It’s too early to know if HEIST combined with BREACH will be exploited against real people visiting real HTTPS-protected websites. While there’s no indication that BREACH has ever been exploited in the wild, the new convenience offered by HEIST may change that.

  • Blackhat Slides
  • Research Paper

Backblaze: 2016 Q2 hard drive failure rates

  • Backblaze has published their latest numbers on drive failures
  • This is the first report to feature the newer 8TB drives
  • As before, the HGST drives are doing very well, although some models seem to be doing better than others. The Seagate drives are on spec, and the Western Digital drives are not doing so well. Although there is relatively few WD drives, not because of the high failure rate, but as explained in the 2016Q1 report, just difficulty acquiring large numbers of them
  • Almost half of all drives in BackBlaze are the Seagate 4TB desktop model
  • I think it would help for BackBlaze’s formula to consider the age of the drive. Of course the failure rate of older drives will increase over time. It would be interesting to see a graph of the failure rate vs drive age
  • The Seagate 4TB drives seem to be doing as expected. I feel confident in my decision to purchase these exact drives for my own use
  • Backblaze explains their formula, and reminders readers to consider the formula when looking at the numbers. A single drive failure in a new set of Toshiba 5TB drives gives a result of a nearly 9% failure rate, but obviously the sample set is too small
  • There is also an interesting discussion of their migration process, moving data from 64+ month old hard drives to new larger drives
  • Further down, they also provide a breakdown of their failure statistics from 2013 through 2016, which makes for much more interesting reading
  • In general, most of the drives seem to perform as expected, with a 1 – 3 % annual failure rate
  • Of course, BackBlaze does not buy the fancier Enterprise drives. Hopefully someone else will produce a similar report using Enterprise drives, so we can see if they are worth the extra money.
  • The 4TB Seagate drives are our workhorse drives today and their 2.8% annualized failure rate is more than acceptable for us. Their low failure rate roughly translates to an average of one drive failure per Storage Pod per year. Over the next few months expect more on our migrations, a look at the day in the life of a data center tech, and an update of the “bathtub” curve, i.e. hard drive failure over time

  • If you would like to do your own thing with the data, here it is

Feedback:


Round Up:


The post Dangerous Dangling Quotes | TechSNAP 278 first appeared on Jupiter Broadcasting.

]]>
Metaphorically Exploited | TechSNAP 258 https://original.jupiterbroadcasting.net/97786/metaphorically-exploited-techsnap-258/ Thu, 17 Mar 2016 16:40:16 +0000 https://original.jupiterbroadcasting.net/?p=97786 The theoretical Android flaw becomes reality, a simple phishing scam hits some major companies & why your PIN has already been leaked. Plus great questions, our answers, a rocking round up & much, much more! Thanks to: Get Paid to Write for DigitalOcean Direct Download: HD Video | Mobile Video | MP3 Audio | OGG […]

The post Metaphorically Exploited | TechSNAP 258 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The theoretical Android flaw becomes reality, a simple phishing scam hits some major companies & why your PIN has already been leaked.

Plus great questions, our answers, a rocking round up & much, much more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | OGG Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

W2 Phishing scams hit a number of companies

  • “Payday lending firm Moneytree is the latest company to alert current and former employees that their tax data — including Social Security numbers, salary and address information — was accidentally handed over directly to scam artists”
  • “Seattle-based Moneytree sent an email to employees on March 4 stating that “one of our team members fell victim to a phishing scam and revealed payroll information to an external source.”
  • “Moneytree was apparently targeted by a scam in which the scammer impersonated me (the company co-founder) and asked for an emailed copy of certain information about the Company’s payroll including Team Member names, home addresses, social security numbers, birthdates and W2 information,” Moneytree co-founder Dennis Bassford wrote to employees.”
  • Why that would even be a reasonable request, I don’t know
  • “Unfortunately, this request was not recognized as a scam, and the information about current and former Team Members who worked in the US at Moneytree in 2015 or were hired in early 2016 was disclosed. The good news is that our servers and security systems were not breached, and our millions of customer records were not affected. The bad news is that our Team Members’ information has been compromised.”
  • Moneytree joins a growing list of companies disclosing to employees that they were duped by W2 phishing scams, which this author first warned about in mid-February. Earlier this month, data storage giant Seagate acknowledged that a similar phishing scam had compromised the tax and personal data on thousands of current and past employees.
  • “On March 1, Seagate Technology learned that the 2015 W-2 tax form information for current and former U.S.-based employees was sent to an unauthorized third party in response to the phishing email scam. The information was sent by an employee who believed the phishing email was a legitimate internal company request.”
  • “W2 information is highly prized by fraudsters involved in tax refund fraud, a multi-billion dollar problem in which thieves claim a large refund in the victim’s name, and ask for the funds to be electronically deposited into an account the crooks control.”
  • “For better or worse, most companies that have notified employees about a W2 phish this year are offering employees the predictable free credit monitoring, which is of course useless to prevent tax fraud and many other types of identity theft. But in a refreshing departure from that tired playbook, Moneytree says it will be giving employees an extra $50 in their next paycheck to cover the initial cost of placing a credit freeze (for more information on the different between credit monitoring and a freeze and why a freeze might be a better idea, check out Credit Monitoring vs. Freeze and How I Learned to Stop Worrying and Embrace the Security Freeze).”
  • ““When something like this happens, the right thing to do is to disclose what you know as soon as possible, take care of the people affected, and learn from what went wrong. To make good on that last point, we will be ramping up our information security efforts company-wide, because we never want to have to write an email like this to you again”.”

New exploit developed for Android Stagefright

  • “Security researchers have successfully exploited the Android-based Stagefright bug and remotely hacked a phone, which may leave millions devices vulnerable to attack.”
  • “Israeli software research company NorthBit claimed it had “properly” exploited the Android bug that was originally described as the “worst ever discovered”.”
  • “The exploitation, called Metaphor, is detailed in a research paper (PDF) from NorthBit and also a video showing the exploit being run on a Nexus 5. NorthBit said it had also successfully tested the exploit on a LG G3, HTC One and Samsung Galaxy S5.”
  • “The Stagefright vulnerability was first highlighted by security firm Zimperium in July 2015. The hack was said to be able to execute remote code on Android devices and could possibly affect up to 95 percent of Android devices.”
  • “A second critical vulnerability exploited issues in .mp3 and .mp4 files, which when opened were claimed to be able to remotely execute malicious code, was dubbed Stagefright 2.0 in October.”
  • The flaws were originally thought to not be easily exploitable, but this new research provides a simple remote exploit case
  • “The researchers from NorthBit say they have been able to create an exploit that can be used against Stagefright on Android 2.2, 4.0, 5.0 and 5.1. Other versions are not affected.”
  • Android 5.0 and above are protected by ASLR, however “Dabah claims the exploit “depicts a way to bypass” address space layout randomisation (ASLR)”
  • “”We managed to exploit it to make it work in the wild,” Dabah said. The research paper reads: “Breaking ASLR requires some information about the device, as different devices use slightly different configurations which may change some offsets or predictable addresses locations.”
  • “”I would be surprised if multiple professional hacking groups do not have working Stagefright exploits by now. Many devices out there are still vulnerable, so Zimperium has not published the second exploit in order to protect the ecosystem”.”
  • Researcher PDF
  • I am glad my phone runs Android 6.0.1 with the March 2016 Security Updates applied

PIN analysis

  • “There are 10,000 possible combinations that the digits 0-9 can be arranged to form a 4-digit pin code. Out of these ten thousand codes, which is the least commonly used?”
  • “People are notoriously bad at generating random passwords. I hope this article will scare you into being a little more careful in how you select your next PIN number. Are you curious about what the least commonly used PIN number might be?”
  • “I was able to find almost 3.4 million four digit passwords. Every single one of the of the 10,000 combinations of digits from 0000 through to 9999 were represented in the dataset”
  • “A staggering 26.83% of all passwords could be guessed by attempting the top 20 combinations”
  • “The first “puzzling” password I encountered was 2580 in position #22. What is the significance of these digits? Why should so many people select this code to make it appear so high up the list?”
  • This turns out to be straight down the middle of a telephone style number pad. Not the same as on on a computer, but most ABMs use the telephone style
  • “Another fascinating piece of trivia is that people seem to prefer even numbers over odd, and codes like 2468 occur higher than a odd number equivalent, such as 1357”
  • “Statistically, one third of all codes can be guessed by trying just 61 distinct combinations! The 50% cumulative chance threshold is passed at just 426 codes (far less than the 5,000 that a random uniformly distribution would predict)”
  • The most unpopular pin is: 8068
  • Warning Now that we’ve learned that, historically, 8068 is (was?) the least commonly used password 4-digit PIN, please don’t go out and change yours to this! Hackers can read too! They will also be promoting 8068 up their attempt trees in order to catch people who read this (or similar) articles.”
  • “Many of the high frequency PIN numbers can be interpreted as years, e.g. 1967 1956 1937 … It appears that many people use a year of birth (or possibly an anniversary) as their PIN. This will certainly help them remember their code, but it greatly increases its predictability”
  • Pins that start with 19 dominate the top 10%, and all appear within the top 20%
  • The heatmap also shows that people tend to use Birthdays a lot as well (MMDD)

Feedback:


Round Up:


The post Metaphorically Exploited | TechSNAP 258 first appeared on Jupiter Broadcasting.

]]>
Key Flaw With GPL | TechSNAP 234 https://original.jupiterbroadcasting.net/88501/key-flaw-with-gpl-techsnap-234/ Thu, 01 Oct 2015 09:31:07 +0000 https://original.jupiterbroadcasting.net/?p=88501 D-Link publishes its private code signing keys, exploiting Windows Symbolic Links & why encryption is not sufficient protection. Plus some great questions, our answers, a rockin roundup & much, much more! Thanks to: Get Paid to Write for DigitalOcean Direct Download: HD Video | Mobile Video | MP3 Audio | OGG Audio | YouTube | […]

The post Key Flaw With GPL | TechSNAP 234 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

D-Link publishes its private code signing keys, exploiting Windows Symbolic Links & why encryption is not sufficient protection.

Plus some great questions, our answers, a rockin roundup & much, much more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | OGG Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Foo

— Show Notes: —

D-Link accidentally publishes its private code signing keys

  • As part of its GPL license complain, D-Link makes its firmware source code available for many of its devices
  • “He had purchased the DCS-5020L-surveillance camera from D-Link and wanted to download the firmware. D-Link firmware source code of many open source under a GPL license available.”
  • “When looking through the files I accidentally stumbled upon 4 different private keys used for code signing. Only one — the one belonging to D-Link itself — was still valid at the time. I have successfully used this key to sign an executable as D-Link”
  • “In fact, in some batch files were the commands and pass phrases that were needed.”
  • The certificates have already been revoked
  • Fox-IT confirms: “The code signing certificate is indeed in the firmware packages, firmware version 1.00b03 released February 27 of this year, was released this certificate was therefore issued for expired, a big mistake.”
  • We’ll have to cover this in more detail once more information is available, in English

“Investigating the Computer Security Practices and Needs of Journalists”

  • A survey found that 50% of journalists do not use any security tools
  • Those that do, may not realize that the tools they are using are ineffective, or that the way they are using them hurts their security
  • “Observation: The computer security community builds a lot of tools that might be useful for journalists, but we don’t deeply understand the journalistic process!”
  • “I report on unauthorized immigrants a great deal and have concerns about how to communicate with them without putting them at risk. That said, asking them to use encrypted methods of communication I think would create a greater sense of threat about talking to me and make it more difficult to report. Many are also not extremely computer-savvy. This is something I struggle with a great deal”
  • “Objective: Conduct in-depth interviews with full-time journalists at recognized media organizations operating across a range of media, including print, digital, broadcast and wire services”
  • Figure out the typical workflow for a journalist, model security tools that work with them, instead of forcing them to a workflow dictated by the tools
  • Findings:
    • “Audio recording and digital note-taking were primary forms of interview documentation.”
    • “Many participants use third-party cloud services, but few voiced concern about possible security risks”
    • Long-term sources are common
  • Sources like Snowden, a big one-time data dump, are rare
  • Security Concerns:
  • Negative effects on source
  • Loss of credibility if source information was exposed
  • Government identification of sources
  • Disciplinary actions (e.g., losing job)
  • Loss of competitive advantage
  • Potential financial consequences
  • The project found that in most cases of a journalist using security tools, it was because the source requested it, or because the journalist had had specific security training
  • “A lot of services out there say they’re secure, but having to know which ones are actually audited and approved by security professionals — it takes a lot of work to find that out.”
  • “There were different kinds of litigation software that I was familiar with as a lawyer, where, let’s say, you have a massive case, where you have a document dump that has 15,000 documents. […] There are programs that help you consolidate and put them into a secure database. So it’s searchable [and provides a secure place where you can see everything related to a story at once]. I don’t know of anything like that for journalism.”
  • It will be interesting to see what comes out of this research

Exploiting Windows Symbolic Links

  • “For the past couple of years I’ve been researching Windows elevation of privilege attacks. This might be escaping sandboxing or gaining system privileges. One of the techniques I’ve used multiple times is abusing the symbolic link facilities of the Windows operating system to redirect privileged code to create files or registry keys to escape the restrictive execution context.”
  • “Symbolic links in themselves are not vulnerabilities, instead they’re useful primitives for exploiting different classes of vulnerabilities such as resource planting or time-of-check time-of-use.”
  • A time-of-check time-of-use vulnerability works like this:
    • You setup a symlink to a file you are allowed to access
    • You try to access a resource
    • The software checks that you are allowed to access the resource, you are
    • You quickly re-target the symlink to something else
    • You try to access the resource, and the software allows you, since it has already checked that you are allowed
    • You now have access to a resource you should not
  • “This blog post contains details of a few changes Microsoft has made to Windows 10, and now back ported (in MS15-090) as far back as Windows Vista which changes who can use certain types of symbolic links. There’s not been many mitigations of this type which get back ported to so many older versions of Windows. Therefore I feel this is a good example of a vendor developing mitigations in response to increased attacks using certain techniques which wouldn’t have traditionally been considered before for mitigations.”
  • Almost everything in the Windows file system is a symbolic link. Even C: is actually a symbolic link to \Device\HarddiskVolume4 (since NT 3.1)
  • Microsoft has released three new mitigations:
  • “Registry Key Symbolic Link Mitigation (CVE-2015-2429) — The simplest mitigation implementation is for registry keys. Effectively a sandboxed process is not allowed to ever create a registry key symbolic link. This is implemented by calling RtlIsSandboxToken function when creating a new key (you need to specific a special flag when creating a key symbolic link). It’s also called when setting the SymbolicLinkValue value which contains the link target. This second check is necessary to prevent modifying existing symbolic links, although it would be unlikely to be something found on a real system.”
  • “Object Manager Symbolic Link Mitigation (CVE-2015-2428) — If an application tries to create an object manager symbolic link from a sandbox process it will still seem to work, however if you look at where the check is called you’ll find it doing something interesting. When the symbolic link is created the RtlIsSandboxToken function is called but the kernel doesn’t immediately return an error. Instead it uses it to set a flag inside the symbolic link kernel object which indicates to the object manager a sandboxed process has created this link. This flag is then used in the ObpParseSymbolicLink function which is called when the object manager is resolving the target of a symbolic link. The RtlIsSandboxToken is called again, if the current caller is not in a sandbox but the creator was in a sandbox then the kernel will return an error and not resolve the symbolic link, effective making the link useless for a sandboxed to unsandboxed elevation.”
  • “NTFS Mount Point Mitigation (CVE-2015-2430) — The final mitigation is for NTFS mount points. In early technical previews of Windows 10 (I first spotted the change in 10130) the check was in the NTFS driver itself and explicitly blocked the creation of mount points from a sandboxed process. Again for presumably application compatibility reasons this restriction has been relaxed in the final release and the back ported mitigations. Instead of completely blocking creation the kernel function IopXxxControlFile has been modified so whenever it sees the FSCTL_SET_REPARSE_POINT file system control code being passed to a driver with a mount point reparse tag it tries to verify if the sandboxed caller has write access to the target directory. If access is not granted, or the directory doesn’t exist then setting the mount point fails. This ensures that in the the majority of situations the sandboxed application couldn’t elevate privileges, as it could already write to the directory already. There’s obviously a theoretical issue in that the target could later be deleted and replaced by something important for a higher privileged process but that’s not very likely to occur in a practical, reliable exploit.”
  • “These targeted mitigations gives a clear indication that bug hunting and disclosing the details of how to exploit certain types of vulnerabilities can lead into mitigation development, even if they’re not traditional memory corruption bugs. While I didn’t have a hand in the actual development of the mitigation It’s likely my research was partially responsible for Microsoft acting to develop them. It’s very interesting that 3 different approaches ended up being taken, reflecting the potential application compatibility issues which might arise.”
  • “Excluding any bypasses which might come to light these should make entire classes of resource planting bugs unexploitable from a compromised sandboxed process and would make things like time-of-check time-of-use harder to exploit. Also it shows the level of effort that implementing mitigations without breaking backwards compatibility requires. The fact that these only target sandboxes and not system level escalation is particularly telling in this regard.”

Encryption as Protection? Maybe Not

  • We often see as part of the coverage of a data breach how the data was not “encrypted”
  • As it turns out, having data encrypted on the disk, doesn’t necessarily help, if the data is still “live” on the system
  • If your laptop hard drive is encrypted, but you leave it unlocked at the coffee shop and visit the restroom, anyone can access the files on your computer. Having them encrypted did nothing for you
  • The way hard drive encryption works, it only protects you if you lock or shutdown the computer, and require a strong passphrase to decrypt the disk to mount it again
  • The same applies to a file server or database at a company. Encryption is only useful if access to the data is still strictly controlled
  • “A recent espionage prosecution in West Palm Beach, Florida demonstrates that encryption may not be the panacea that organizations think it is. So rather than relying on encryption alone, companies need to adopt and maintain strategies that continue to provide layered security.”
  • “After every data breach, we hear the same mantra, “If only the data were encrypted!” As if encryption of data is the answer to data breaches.”
  • The case centers in this article centers on Christopher Glenn, a 35-year-old former defense contractor living in his mother’s retirement community
  • He worked for the US Government in Honduras
  • “He was convicted of stealing and retaining classified documents he obtained which related to U.S. policy in the Middle East”
  • “In preparation for his theft, Glenn, a “computer specialist” with a U.S. defense contractor, read up on data security in general and encryption in particular. He apparently read articles about TrueCrypt, a popular freeware encryption product used for On-The-Fly Encryption (OTFE), noting in particular an October 2011 article entitled, “FBI Hackers Fail to Crack TrueCrypt”. Glenn figured that he could create an encrypted partition (called 2012 Middle East) on his drive. He created a 30-character passphrase, thinking that the data would be secured. Indeed, he estimated that it would take the FBI “billions of years” to crack the crypto through brute force.”
  • “He was wrong. And he was sentenced to 10 years in jail.”
  • “According to case reports, the FBI’s counter-intelligence agents were able to decrypt the encrypted files on Glenn’s computer, which became evidence in his case. Given that this is 2015, they did so in substantially less than the “billions of years” that Glenn anticipated.”
  • There is no information on how exactly the FBI decrypted the data, but it was likely an attack against the passphrase, or the machine Glenn had used to encrypt the data
  • “Companies need to evaluate not only WHETHER they encrypt data, but when and how they encrypt data. For example, RAM scrapers capture credit card numbers and other personal information, which is encrypted, before the data is encrypted.”
  • “All of this must be part of a comprehensive data security program which includes access control, data management, ingress and egress reporting, data loss prevention processes, intrusion detection and prevention, managed and monitored firewalls and other services, threat intelligence, and comprehensive incident response. There are no shortcuts here. Oh yes, and encryption, the right encryption.”
  • Encryption of “data at rest” in servers

Feedback


Round Up:


The post Key Flaw With GPL | TechSNAP 234 first appeared on Jupiter Broadcasting.

]]>
Speculated Apples | TTT 210 https://original.jupiterbroadcasting.net/87351/speculated-apples-ttt-210/ Tue, 08 Sep 2015 12:08:06 +0000 https://original.jupiterbroadcasting.net/?p=87351 A new touchscreen display goes ons ale for the Raspberry Pi that nearly makes it a complete computer, researchers hack the sensors of self driving cars & we speculate rampantly about the iPad Pro, but definitely not the iPhone 6s! Direct Download: MP3 Audio | OGG Audio | Video | HD Video | Torrent | […]

The post Speculated Apples | TTT 210 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A new touchscreen display goes ons ale for the Raspberry Pi that nearly makes it a complete computer, researchers hack the sensors of self driving cars & we speculate rampantly about the iPad Pro, but definitely not the iPhone 6s!

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed

Become a supporter on Patreon

Foo

Show Notes:

— Episode Links —

The post Speculated Apples | TTT 210 first appeared on Jupiter Broadcasting.

]]>
SSL Heartbreak | TechSNAP 157 https://original.jupiterbroadcasting.net/54907/ssl-heartbreak-techsnap-157/ Thu, 10 Apr 2014 17:43:12 +0000 https://original.jupiterbroadcasting.net/?p=54907 We break down the critical flaw in OpenSSL, and explain why the Heartbleed catastrophe impacts so many systems we use. the timeline of events, and more. Plus your great questions, our answers, and much much more. On this week’s TechSNAP! Thanks to: Direct Download: HD Video | Mobile Video | MP3 Audio | Ogg Audio […]

The post SSL Heartbreak | TechSNAP 157 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We break down the critical flaw in OpenSSL, and explain why the Heartbleed catastrophe impacts so many systems we use. the timeline of events, and more.

Plus your great questions, our answers, and much much more.

On this week’s TechSNAP!

Thanks to:


\"DigitalOcean\"


\"Ting\"


\"iXsystems\"

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

— Show Notes: —

Critical flaw in OpenSSL discloses usernames, passwords and possibly encryption keys

  • Two separate groups of researchers discovered a disastrous flaw in OpenSSL, the cryptographic library that protects almost all information on the Internet.
  • The flaw is in the rarely used OpenSSL feature ‘heartbeat’ which allows the client to send a block of data to the server and have it returned to the client, keeping the connection and session alive
  • The flaw stems from a missing security check, where the software assumes that the ‘length’ of the data send by the client matches the length the client included in the header. When the actual length of the data sent by the client is less than that size, the software returns a larger chunk of memory that intended, disclosing the contents of segments of memory that were recently freed
  • This flaw allows an attacker to send a malformed request and in response get up to a 64kb chunk of memory from the server that may contain sensitive information
  • There are a number of proof-of-concept tools out there, and when used against an HTTPS server, they often return the HTTP headers of recent requests, which can include POST data (usernames, password, private emails) as well as cookies and other data that could be used for session hijacking
  • There also exists the possibility that by brute forcing this exploit an attacker may get some or all of the private key used to decrypt data sent to the server over TLS. In the common case of sessions that lack the newer PFS (Perfect Forward Secrecy) feature, if an attacker managed to compromise the private key, they would be able to decrypt all traffic that was ever encrypted to that key
  • It is possible that even PFS sessions may be compromised, if the flaw also leaks the temporary tokens used to make PFS sessions unique
  • People I’ve talked to have managed to compromise data from their own servers using only very basic tools, including capturing the admin username and password for a router and hijacking a web forum session
  • Because of the risk that the private key for the SSL certificate was compromised, the proper course of action after patching all of the servers and applications, is to re-key the certificate (generate a new private key, and get a fresh certificate signed), and then revoke the old certificate. It is unclear how well the root CAs will handle the load caused by this, or how the CRL and/or OCSP infrastructures will handle the mass revocation of keys
  • Luckily, the root CA keys are not likely to have been compromised, as they will not have been on servers exposed to the Internet
  • OpenSSL provides SSL/TLS for protocols such as HTTPS (encrypted HTTP, used for online banking, logging in to services including gmail and facebook), IMAP/SMTP and POP3 (encryption for email delivery. This affects all email, and especially the usernames and passwords used to access email), chat servers (IRC and XMPP), many types of VPN (SSL VPNs like OpenVPN) and much more
  • The flaw was originally discovered by Neel Mehta of Google Security, and around the same time was independently discovered by Riku, Antti and Matti at Codenomicon. The fix was written by Adam Langley agl@chromium.org and Bodo Moeller bmoeller@acm.org
  • OpenSSL versions 1.0.1 through 1.0.1f (including 1.01-beta) are vulnerable. 1.0.2-beta1 is also vulnerable. Versions 1.0.0 and 0.9.8 are not affected. All users of 1.0.1 are encouraged in the strongest terms to upgrade to OpenSSL 1.0.1g (or 1.0.2-beta2).
  • Questions are being raised about the fumbling of the responsible disclosure. It seems some companies like CloudFlair and CacheFly were notified as much as a week before anyone else.
  • Amazon appears to have not been given any advanced warning – A later post describes steps customers should take
  • Also, the security officers of major open source projects including all of the BSDs, Debian/Ubuntu, Suse etc, received absolutely no advanced warning, just the initial security advisory.
  • It appears that RedHat has approximately 2 days warning because one of the OpenSSL developers is also on their security team
  • The researchers at Codenomicon notified the National Cyber Security Centre Finland (NCSC-FI) and tasked them with coordinating the disclosure to OpenSSL, operating system vendors (which should have included the various BSD and Linux projects), appliance and service vendors (Amazon, Cisco, CloudFlare etc)
  • The issue appears to be that while the responsible disclosure was being organized, someone leaked the information and forced OpenSSL to issue the advisory. This was followed quickly by the publishing of the heartbleed.com website (by the researchers at Codenomicon) and the CloudFlare blog post.
  • It is unclear why CloudFlare was notified, but Amazon and most open source operating systems were not
  • CloudFlare Blog Post features a very long comment thread
  • Long thread discussing the issue on the Open Source Software Security list
  • Insight on the FreeBSD security process
  • Timeline:
    • 2012-01-03 – OpenSSL 1.0.1-beta1 is available
    • 2012-03-14 – OpenSSL 1.0.1 is released, first GA version with heartbeat support
    • (sometime prior to 2014-04-05): Researchers at Codenomicon and Google discover the flaw. The flaw is reported to NCSC-FI (CERT) and OpenSSL
    • 2014-04-07 05:56 – Huzaifa Sidhpurwala (RedHat) add a bug to Red Hat bugzilla
    • 2014-04-07 06:10 – Huzaifa Sidhpurwala sends a mail to linux distros list with no details but an offer to request them privately
    • 2014-04-07 11:34 – Timestamp on RedHat OpenSSL 1.0.1g build
    • 2014-04-07 ??:?? – Information about the bug leaks, forces OpenSSL to issue advisory immediately
    • 2014-04-07 16:53 – Fix is committed to OpenSSL git
    • 2014-04-07 17:27 – OpenSSL releases advisory
    • 2014-04-07 18:00 – CloudFlare posts blog entry (claiming they were notified a week ago)
    • 2014-04-07 19:00 – Heartbleed.com is published
    • 2014-04-09 – The planned disclosure of the bug was to happen here
  • Vulnerable:
    • Debian Wheezy (stable) (OpenSSL 1.0.1e-2+deb7u4)
    • Ubuntu 12.04.4 LTS (OpenSSL 1.0.1-4ubuntu5.11)
    • CentOS 6.5 (OpenSSL 1.0.1e-15)
    • Fedora 18 (OpenSSL 1.0.1e-4)
    • OpenBSD 5.3 and 5.4 (OpenSSL 1.0.1c 10 May 2012)
    • FreeBSD 10.0 (OpenSSL 1.0.1e 11 Feb 2013)
    • NetBSD 5.0.2 (OpenSSL 1.0.1e)
    • OpenSUSE 12.2 (OpenSSL 1.0.1c)
  • Not Vulnerable:
    • Debian Squeeze (oldstable) (OpenSSL 0.9.8o-4squeeze14)
    • SUSE Linux Enterprise Server
    • FreeBSD 8.4 (OpenSSL 0.9.8y 5 Feb 2013)
    • FreeBSD 9.2 (OpenSSL 0.9.8y 5 Feb 2013)
    • FreeBSD Ports – OpenSSL 1.0.1g (At 7 Apr 21:46:40 2014 UTC)
  • It is not clear how many appliances are vulnerable, but many consumer grade appliances are likely to be vulnerable and unlikely to receive a fix. If the only solution for these devices is to throw them in the trash and replace them, the issue remains that it would likely take 2-12 months for fresh embedded devices to make it to stores where users could buy new ones
  • Analysis:
  • Canada Halts Online Tax-Filing Services
  • The Heartbleed Hit List: The Passwords You Need to Change Right Now
  • Additional Coverage – The Register
  • Additional Coverage – Washington Post
  • Additional Coverage – ThreatPost
  • IDS Signature for detecting heartbleed
  • What you should know about heartbleed
  • Critical crypto bug exposes Yahoo Mail, other passwords Russian roulette-style
  • FreeBSD Security Advisory

Feedback:


Round Up:

The post SSL Heartbreak | TechSNAP 157 first appeared on Jupiter Broadcasting.

]]>
100% Uptime | TechSNAP 100 https://original.jupiterbroadcasting.net/33126/100-uptime-techsnap-100/ Thu, 07 Mar 2013 17:20:39 +0000 https://original.jupiterbroadcasting.net/?p=33126 We’ve warned against it for nearly 100 episodes, this week we’ll share the fallout from NBC.com getting hacked, and more.

The post 100% Uptime | TechSNAP 100 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We’ve warned against it for nearly 100 episodes, this week we’ll share the fallout from NBC.com getting hacked, Bit9’s whitelist technology is use against them and their customers.

Plus the bad news for Java users, a batch of your questions, and some big surprises.

Thanks to:

Use our code hostdeal4 to score economy hosting for $1 a month, for one year.

35% off your ENTIRE order just use our code go35off4 until the end of the month!

 

Visit techsnap.ting.com to save $25 off your device or service credits.

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

 

Support the Show:

   

Show Notes:

Get TechSNAP on your Android:

Browser Affiliate Extension:

  • Jupiter Broadcasting Affiliate Extensions for Chrome and Firefox
  • NBC website compromised, malicious code injected

    • The official website of US broadcasting and media giant NBC was found to contain a malicious iframe pointing visitors to the RedKit Exploit Kit
    • The exploit kit used one of the vulnerabilities patched in Java 7u11 (released January 13th, although the issue was not fully fixed until Java 7 u13 on February 1st), as well as a .PDF exploit to drop the Citadel banking Trojan, a variant of the Zeus botnet only ever sold to the russian underground, to prevent infiltration by authorities and security companies
    • This attack could have been much worse if it has used one of the newer vulnerabilities that had not been patched until u15 (February 19th) or u17 (March 4th)
    • Many users are likely still using somewhat outdated versions of java due to the rapid release and the inefficacy of the java updater, and the addition of the .PDF exploit ensured a wider vulnerability
    • The attackers likely had ongoing access for a time, as the URL target of the iframe changed rapidly to avoid blocking of the delivery sites
    • One of the domains used in the iframe was an internationalized domain name, which translated from russian to my-new-sploit.com
    • The version of the Citadel trojan used in the exploit was only recognized by 3 of the 46 virus scanners on virustotal.com on the date of the attack
    • The infection was also detected on other NBC sites such as latenightwithjimmyfallon.com and jeylenosgarage.com, so it was likely an exploit against the CMS
    • These trusted sites are especially valuable as attack vectors for malware authors, because of their huge traffic volumes and the fact that users expect the large trusted sites to be free of malware or other risk
    • Facebook’s malware scanner detected something was wrong (since iframes of .jar and .pdf files are usually only seen in attacks), and blocked users from posting links to NBC.com (We have discussed Facebook malware scan that is part of their spider that fetches the preview images)
    • The malware was first detected by researchers at 16:43 CET on the 21st, it is unclear how long the injection was on the site before it was discovered
    • The malware was removed from the site by 21:28 CET
    • Researchers Post
    • Additional Coverage

    Bit9’s cloud security app compromised, 32 pieces of malware whitelisted

    • Bit9 is a security company whose main product is an application control software, which basically monitors all of the applications and processes running on a server or end-user device, and reports any unusual activity (applications not on the cloud maintained whitelist)
    • Customers of Bit9 include the US government, banks, oil and energy companies, defence contractors and 30 companies from the Fortune 100 list
    • Attackers managed to compromise one or more virtual machines at the company and gained access to a code signing certificate, subsequently using it to sign 32 pieces of malware, effectively whitelisting them
    • It turns out, due to an “operational oversight” a “handful” of computers at Bit9 did not run Bit9’s own software, so the intrusion was not detected or prevented
    • As such, Bit9 claims that the compromise was not due to a problem with their software
    • Bit9’s investigation suggests that only three of their customers were affected by the illegitimately signed malware
    • Bit9 revoked the certificate that was used to sign the malware (and probably all previously whitelisted binaries, Bit9 claims it was no longer actively using the stolen certificate, but that it was still valid), got a new certificate and resigned the whitelisted apps, and patched their software to blacklist anything signed with the revoked certificate
    • It is interesting to note that the most often touted features of the Bit9 system is that it stops new and unknown malware, because it only allows approved applications to run, the opposite of traditional anti-virus applications, which rely on a blacklist of known malware. In this case, it might have been that the compromised caused Bit9 to allow known malware that would have been stopped by traditional anti-virus to run on the target systems
    • Bit9 is not saying which of its customers were targeted, but based on other information and the list of industries Bit9 said were not targeted, it appears to have been a defence contractor
    • Official Update Announcement
    • Bit9 says the attackers originally compromised their systems in July of 2012 view an SQL injection flaw in software that was running on an internet accessible web server
    • From the web server, the attackers were able to compromise two legitimate user accounts, and eventually use those to access a virtual machine that contains the private keys for the code-signing certificate
    • The virtual machine that was compromised was shut down a few days later, the compromise undetected
    • In January that virtual machine was started again, and the compromise was eventually detected
    • Bit9 says evidence suggests that they were not the ultimate target of the attack, but rather just a stepping stone to eventually compromise one of their customers
    • Bit9’s audit showed that the source code for their software was not accessed or modified
    • The attackers later executed a watering hole attack (similar to the mobile developer forum attack that compromised twitter, facebook, apple and microsoft) against the 3 target Bit9 customers
    • The attack used a java vulnerability to execute the HiKit and Unixhome backdoors, two of the binaries that had been signed with the stolen Bit9 certificate. Rather than these being blocked by Bit9 as intended, because they had been signed by Bit9, they were whitelisted and allowed to run in the highly secured network of the defense contractors
    • Krebs on Security Coverage – Part 1 Part 2
    • Security Ledger coverage

    Oracle issues another emergency Java patch after McRAT exploits new 0-day in the wild

    • The fix covers CVE–2013–1493 and CVE–2013–0809
    • The latter vulnerability is in the colour management system of Java 2D and allows an attack to use a specially crafted image file to execute a memory corruption attack. The attack targets the JVM’s internal data structures and overwrites the areas of memory that control whether the security manager to enabled or not
    • The exploit has been seen in the wild, successful exploited to drop the McRAT trojan
    • The security company that discovered the exploit reported that the McRAT trojan was communicating with the same Command and Control server that was used in an earlier attack against security company Bit9
    • FireEye blog post
    • Additional Coverage
    • The issue was originally reported on February 1st, Oracle claimed that was too late to be included in the February 19th patch. Oracle planned to sit on the update until the next scheduled update in April, but once it was being exploited in the wild they were forced to release this update
    • Java Security bulletin
    • Security Explorations has reported 7 more java vulnerabilities since February 25th
    • Oracle has rejected issue #54 claiming it is not a vulnerability, but the polish firm and US-CERT disagree, Security Explorations has sent additional details and proof of concept to help Oracle understand the vulnerability
    • Oracle has issued tracking numbers for issues #56–60 but clarifies that the issues are not ‘confirmed’ yet
    • This seems to signal an increasing resistance from Oracle and acknowledge and fix the bugs that researchers report, until it is too late and they are being actively exploited

    Feedback

    Round Up:

    The post 100% Uptime | TechSNAP 100 first appeared on Jupiter Broadcasting.

    ]]> Future SSL | TechSNAP 37 https://original.jupiterbroadcasting.net/15136/future-ssl-techsnap-37/ Thu, 22 Dec 2011 20:09:38 +0000 https://original.jupiterbroadcasting.net/?p=15136 Find out what major infrastructure software uses the admin password of “100”, plus future improvements to SSL, how the CIA keeps their IT guys trustworthy.

    The post Future SSL | TechSNAP 37 first appeared on Jupiter Broadcasting.

    ]]>

    post thumbnail

    Find out what major infrastructure software uses the admin password of “100”, plus future improvements to SSL, how the CIA keeps their IT guys trustworthy, and…

    An epic tech war story!!

    All that and more, on this week’s TechSNAP.

    Thanks to:

    GoDaddy.com Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

    Free Private Registration

    GoDaddy Offer Code: techsnap17
    Link: https://www.godaddy.com/domainaddon/private-registration.aspx?isc=techsnap17

    $1.99 hosting for the first 3 months

    GoDaddy Offer Code: techsnap11

    20% off .xxx domains

    Code: techsnapx

    Direct Download Links:

    HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

       
    Subscribe via RSS and iTunes:

    Show Notes:

    Siemens lied about critical flaws in SCADA software

    • The SIMATIC systems have a major flaw in the authentication system that allows an attacker to entirely bypass authentication, accessing the control software without a username or password
    • If a user changes the password to something with a special character in it, the system may automatically reset the password to ‘100’
    • The Siemens system was the target of the Stuxnet attack, the most sophisticated virus/worm ever seen, yet the Siemens system is rather trivial to break in to
    • The values of the session cookies used by the Siemens system can be predicted after some analysis, allowing the attacker to authenticate themselves without any credentials
    • The researcher (Bill Rios, who works for Google) discovered this issue in May, and reported it to Siemens. Siemens had acknowledged the problem when it was reported.
    • Later, Siemens PR department told a Reuters reporter that “there are no open issues regarding authentication bypass bugs at Siemens,”
    • The SIMATIC system has 3 interfaces, Web, VNC and Telnet (why? Telnet is insecure). All three interfaces uses separate credentials, all defaulting to ‘100’. If a user changes the web password, they may not realize that the VNC password is still the default
    • The SCADA system at a water and sewage treatment plant in Texas was compromised by an attacker who found the system to be using a 3 character password (possibly the ‘100’ described above)
    • Addition In-Depth Coverage

    Shorter warranties of desktop hard drives

    • Western Digital and Seagate have announced that drives sold in the new year may have significantly shorter warranties
    • Most desktop hard drives will see their warranties cut. Higher end and Near Line drives may see reductions
    • Western Digital drives (Green/Blue editions and others), except the Black editions, will drop from 3 years to 2. Black Edition, VelociRaptor and Enterprise products will continue to have 5 year warranties.
    • Seagate desktop and laptop drives (Barracuda, Barracuda Green,
      Momentus 2.5”) will see their industry leading 5 year warranties cut to only 1 year
    • Seagate’s specialty Video and Surveillance drives (SV35 Series, Pipeline HD/HD Mini) will feature 2 year warranties
    • Seagate’s higher end drives (Barracuda XT, and the hybrid Momentus XT) as well as near line drives (Constellation 2/ES/ES2) will come with 3 year warranties
    • Seagate enterprise drives, such as the Cheetah series, will retain their 5 year warranty
    • Seagate recently purchases Samsung’s hard drive business, so warranties on the remaining product lines to carry the samsung name will also be reduced
    • Original Coverage

    New SSL CA Requirements Published

    • In an effort to solve issues that have plagues the SSL Certificate system this year, a new set of requirements has been put together
    • The goal is to establish a new set of criteria that vendors will use when deciding which CAs to trust. This list distributed as part of web browsers, operating systems and other SSL clients, is inherently important to the PKI
    • The CA/Browser forum is made up of major CAs such as Comodo, CyberTrust, Entrust, GeoTrust, GlobalSign, GoDaddy, Network Solutions, RSA Security, StartCom, Symantec, Thawte and Verizon. (Interestingly, VeriSign does not appear on the list). The Relying-Parties include Apple, Google, Microsoft, Mozilla, RIM, KDE, and Opera
    • The policy strictly spells out the duties of the CA, such as verifying that the user requesting the certificate actually has control over and the right to use the Domains and IP Addresses listed on the certificate (Earlier this year, certificates for domains such as google.com and mail.yahoo.com were incorrectly issued to an attacker)
    • CAs must also make efforts to ensure the information on the certificate is correct, and not misleading (with the advent of internationalized domain names, it was possible to get a certificate for a domain that looked like paypal.com, but was actually spelled with a unicode character that looks very much like the letter a)
    • All CAs much provide a 24×7 publicly accessible repository of status information about all certificates (whether the certificate has been revoked, etc)
    • Certificates will no longer be allowed to be issues for internal IP addresses (such as 192.168.0.0/24 or 10.0.0.0/8). New certificates with internal IPs cannot be issued after November 2015, and all existing certificates will be revoked October 2016
    • The common name field is deprecated in favour of the subjectAltNames field.
    • Certificates can no have an expiration date of more than 60 months. Beyond April 2015, any certificate with an expiration date greater than 39 months requires special documentation
    • Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates

      How Does the CIA Keep Its IT Staff Honest?

    • “Once you’re in, there are frequent reinvestigations, but it’s just part of process here,” says Tarasiuk, who also gets polygraphed regularly
    • There’s so much top secret information contained within the CIA’s systems that IT plays a key infosecurity role in making sure that CIA employees are not doing anything nefarious.
    • “They are very concerned about foreign intelligence services that are interested in penetrating the CIA. Because of that we pay particular attention to the kinds of things we put on our network.”
    • The CIA’s networks aren’t directly connected to the internet. “We have a very closed network that’s connected to an intelligence community enterprise,” Tarasiuk says, “so I don’t necessarily have the worries about the hackers from the internet trying to break through.”

    Feedback

    Q: (Markus) I have a small company network. (About 5 clients 1 windows 4 linux). Your War story about Bacula was very interesting. I’m interested in building a dedicated bacula server for my backups. Do you know a entry level barebones system that supports the latest FreeBSD and can handle 3 drives (ZFS). Can I just grab a Intel Atom barebones and it is going to work?

    A: An Atom based system would likely work well for that, you don’t really need all that much performance to do backups, so even the slower RAM, lack of cache/queue depth, and typically weaker SATA controller really won’t be an issue for a backup server. I don’t have any advice on a specific model or anything, the SuperMicro barebones Atom servers are nice, but they are typically space-saver type deals that won’t fit more than 1 disk, and may be over priced for what you want. Chris’ Bitcoin Atom Parts List

    Atom board with 8GB of RAM Support


    War Story

    This weeks War Story comes in from long time JB viewer Irish_Darkshadow (The other, other Alan)

    Setting:
    IBM has essentially two “faces”, one is the commercial side that deals with all of the clients and the other is a completely internal organisation called the IGA (IBM Global Account) that provides IT infrastructure and support to all parts of IBM engaged with commercial business.

    There are sites located in key geographies which then provide that support for their regions and at a rudimentary level, those sites act as failover for each other.

    Each of those sites has a team that deals with Incident / Problem / Change Management functions in addition to Crit Sit (critical situations handling) and communications around those disciplines. Sometimes events take place that require multiple sites to cooperate in order to handle certain situations.

    The events described below took place between August 14th and 15th of 2003.

    War Story:

    The EMEA (Europe / Middle East / Africa) CSC (Customer Support Centre) site was based in Dublin, Ireland at the time. The site management arranged to have a night out on the town for the entire location as a sort of “end of summer” event. I was working for the crit sit team at that point and happened to be designated as the “on call” guy that night. Being an Irishman with a healthy liking for the odd alcoholic beverage I was a bit miffed at having to attend such an event and not being able to imbibe.

    While at the event I then set about blagging as many vouchers for free drinks as possible to give to my team and I hassled every management person I could see to get the job done. At one point I went up to the bar to get a round for my team and realised that I was standing beside the on call Duty Manager. If something kicked off at work, I would be the first person called and if I needed management support to get things done, this Duty Manager would have been my first call thereafter. My next realisation was that the Duty Manager was knocking back cocktails to beat the band. I questioned this and got one of those “meh, what’s the worst that could happen” responses. My first mistake that night was that I took her response as an implicit “all clear” to have some drinks myself. Several rounds later at around 2am, I decided to have my girlfriend drive me home as she was on soft drinks that night. I arrived home, very drunk at around 2:35 and was dead to the world about 10 seconds after my head hit the pillow. And that’s where things take a turn for the worst.

    I awake at 3:20 to the wonderful melody of the on call mobile phone. Upon eventually figuring out how to answer the phone and then hold it the right way up, I was greeted by an overly enthusiastic support agent. Apparently “some guy” from the US had called in to the EMEA CSC site to request that our Dublin Executive join some conference call in the middle of the night (at least for Dublin). Through the fog of alcohol induced indecision, I somehow managed to realise that this meant contacting the cocktail loving Duty Manager to get approval to wake up the Executive (ya gotta love big blue bureaucracy). I gave my permission to the support agent to make that call for me while I located a cold shower and a source of caffeine. During the following minutes I realised that the cocktail loving duty manager would probably not answer her phone and that I would likely be getting another call. In preparation I went down to the kitchen….impressively staying upright despite my blood alcohol level. Tea was the only option available to me and some toast to soak up some of the sweet, sweet booze in my belly. The phone rang again and it was time to get an update…..as expected, the agent was unable to contact the Duty Manager and so I gave permission for him to call the Executive directly giving instructions for her to call me. Just before hanging up I walked into my living room, turned on the TV and there on the news channel I saw “US power outage – 16 million east coast homes without power”. I had a sudden sinking feeling when I realised that the little graphic they showed covered an area which included some major IBM locations: Research Triangle Park (RTP in North Carolina), IBM Headquarters in Armonk, New York and also MOB North in Toronto. The shit was truly about to hit the fan and if I wasn’t under the influence of alcohol at that point, I likely would have been more worried. Instead, I managed to explain to the agent on the phone what I believed the situation was and how to proceed. I knew that I would have to get to the office and the local taxi service told me that they had no cars available for at least 90 mins. I made the long climb back upstairs….nudged the already miffed girlfriend and requested a lift to work 😀 . After much moaning, she decided she would just start work early anyways and off we went.

    Upon arrival at the EMEA CSC site I started organising calls to sort out a plan for handling the initial problems. With those US and Canada sites being offline we would have to activate contingency plans in other geographies to cover them. Within the hour we had established that only the Toronto site had not failed over onto backup power. The site was primarily a call taking center and that meant I needed to arrange for staff on our site to come in early, cancel all native language support in favour of english only support and then assess workload incoming versus emergency capacity. Oh alcohol, how you did tease me with these conundrums in the middle of the night!

    I called Toronto personally to speak with my counterpart there in order to get an update on why they were unable to get over to backup power. Each site typically has a diesel generator in their disaster recovery plans for just such an eventuality. The Toronto site manager was able to explain to me that the diesel generator simply had not kicked in and they were investigating. I requested 15 minute update calls from that point onwards. The first call exposed that the primary reason for their backup generator failing was that nobody had thought to put any frickin’ diesel in the damn thing! I requested that they arrange for an emergency supply to be procured and get back to me on the next call with an outlook. The next call never happened 15 minutes later but the following one did (30 mins after I asked for a diesel supply). The Toronto site manager then explained that a supply was en route and would be there in less than an hour. It was about 05:30 for me at that point and I was sobering up fast. I agreed to put off the next update call for an hour while I prepared on our side.

    I had to assume that the diesel would be a failure and that meant I needed to arrange for staff to be called, woken up and summoned to work. This included calling in people off vacation and basically staffing for an apocalyptic onslaught of incoming work to handle the overflow from Toronto. Preparations were going well on that front despite the inconvenience to our staff who were being rudely awoken with the wonderful news.

    When it came time to speak with Toronto again, nobody answered. Fifteen minutes later….still no answer. This went on for about 45 minutes before I got the site manager on the line. The conversation went something like this:

    Me: Ok, where the hell have you been for the last 45 minutes?!?!

    Toronto: I’m at the compound with the diesel truck.

    Me: That doesn’t exactly answer my question. Are you guys up and running now?

    Toronto: No, the truck guy says that it will take up to an hour to fill the generator and it cannot be switched on until that is done.

    Me: Ok, that’s good news. So in an hour or so you guys will be powered up and my staff only need to cover that time for you. Excellent, I’ll inform the Execs.

    Toronto: Eh, I wouldn’t do that just yet.

    Me: Why not?

    Toronto: There’s another problem.

    Me: You have my undivided attention.

    Toronto: We can’t actually get to the backup generator to fill it with diesel.

    Me: I think that warrants further explanation.

    Toronto: The gate to the compound that surrounds the generator…well…..it’s electrically powered!

    And there you have it folks, in IT support when you see high level disaster recovery plans being put in place. Maybe somebody with some common sense should take a look over them and ensure that a crucial, diesel backup generator actually has fuel in it and that it can be accessed in the event of a power outage! (and never, ever get drunk when you’re the on call guy).


    Round Up:

    The post Future SSL | TechSNAP 37 first appeared on Jupiter Broadcasting.

    ]]>