SMB – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Wed, 17 Nov 2021 03:14:01 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png SMB – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Three Tumbleweed Temptations | LINUX Unplugged 432 https://original.jupiterbroadcasting.net/146727/three-tumbleweed-temptations-linux-unplugged-432/ Tue, 16 Nov 2021 18:00:00 +0000 https://original.jupiterbroadcasting.net/?p=146727 Show Notes: linuxunplugged.com/432

The post Three Tumbleweed Temptations | LINUX Unplugged 432 first appeared on Jupiter Broadcasting.

]]>

Show Notes: linuxunplugged.com/432

The post Three Tumbleweed Temptations | LINUX Unplugged 432 first appeared on Jupiter Broadcasting.

]]>
Ye Olde Linux Distro | LINUX Unplugged 410 https://original.jupiterbroadcasting.net/145317/ye-olde-linux-distro-linux-unplugged-410/ Tue, 15 Jun 2021 18:00:00 +0000 https://original.jupiterbroadcasting.net/?p=145317 Show Notes: linuxunplugged.com/410

The post Ye Olde Linux Distro | LINUX Unplugged 410 first appeared on Jupiter Broadcasting.

]]>

Show Notes: linuxunplugged.com/410

The post Ye Olde Linux Distro | LINUX Unplugged 410 first appeared on Jupiter Broadcasting.

]]>
Distro in the Rough | LINUX Unplugged 405 https://original.jupiterbroadcasting.net/145017/distro-in-the-rough-linux-unplugged-405/ Tue, 11 May 2021 18:00:00 +0000 https://original.jupiterbroadcasting.net/?p=145017 Show Notes: linuxunplugged.com/405

The post Distro in the Rough | LINUX Unplugged 405 first appeared on Jupiter Broadcasting.

]]>

Show Notes: linuxunplugged.com/405

The post Distro in the Rough | LINUX Unplugged 405 first appeared on Jupiter Broadcasting.

]]>
Storage Stories | TechSNAP 426 https://original.jupiterbroadcasting.net/140792/storage-stories-techsnap-426/ Fri, 03 Apr 2020 00:15:00 +0000 https://original.jupiterbroadcasting.net/?p=140792 Show Notes: techsnap.systems/426

The post Storage Stories | TechSNAP 426 first appeared on Jupiter Broadcasting.

]]>

Show Notes: techsnap.systems/426

The post Storage Stories | TechSNAP 426 first appeared on Jupiter Broadcasting.

]]>
Linux Action News 71 https://original.jupiterbroadcasting.net/127156/linux-action-news-71/ Sun, 16 Sep 2018 16:44:47 +0000 https://original.jupiterbroadcasting.net/?p=127156 RSS Feeds: HD Video Feed | MP3 Feed | iTunes Feed Become a supporter on Patreon: Episode Links: linuxactionnews.com/71

The post Linux Action News 71 first appeared on Jupiter Broadcasting.

]]>

RSS Feeds:

HD Video Feed | MP3 Feed | iTunes Feed

Become a supporter on Patreon:

Patreon

Episode Links:

linuxactionnews.com/71

The post Linux Action News 71 first appeared on Jupiter Broadcasting.

]]>
Trials of TLS | TechSNAP 350 https://original.jupiterbroadcasting.net/121017/trials-of-tls-techsnap-350/ Fri, 29 Dec 2017 10:35:32 +0000 https://original.jupiterbroadcasting.net/?p=121017 RSS Feeds: HD Video Feed | MP3 Audio Feed | iTunes Feed | Torrent Feed Become a supporter on Patreon: Show Notes: Why TLS 1.3 isn’t in browsers yet It has been over a year since Cloudflare’s TLS 1.3 launch and still, none of the major browsers have enabled TLS 1.3 by default. Leaky S3 […]

The post Trials of TLS | TechSNAP 350 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

HD Video Feed | MP3 Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Why TLS 1.3 isn’t in browsers yet

It has been over a year since Cloudflare’s TLS 1.3 launch and still, none of the major browsers have enabled TLS 1.3 by default.

Leaky S3 Buckets

“I had seen unencrypted flight logs, passports, drivers licenses, and identification cards,” Finisterre said, adding: “It should be noted that newer logs and PII [personally identifiable information] seemed to be encrypted with a static OpenSSL password, so theoretically some of the data was at least loosely protected from prying eyes.”

For a researcher at UpGuard, on 6 October the answer turned out to be an intriguing 36GB database file sitting in plain view_on an Amazon Simple Storage Service (S3) bucket uploaded by analytics company Alteryx._

Three misconfigured AWS S3 buckets have been discovered wide open on the public internet containing “dozens of terabytes” of social media posts and similar pages — all scraped from around the world by the US military to identify and profile persons of interest.

Introduction to SMB for Network Security

Of all the common protocols a new analyst encounters, perhaps none is quite as impenetrable as Server Message Block (SMB). Its enormous size, sparse documentation, and wide variety of uses can make it one of the most intimidating protocols for junior analysts to learn. But SMB is vitally important: lateral movement in Windows Active Directory environments can be the difference between a minor and a catastrophic breach, and almost all publicly available techniques for this movement involve SMB in some way. While there are numerous guides to certain aspects of SMB available, I found a dearth of material that was accessible, thorough, and targeted towards network analysis. The goal of this guide is to explain this confusing protocol in a way that helps new analysts immediately start threat hunting with it in their networks, ignoring the irrelevant minutiae that seem to form the core of most SMB primers and focusing instead on the kinds of threats an analyst is most likely to see.

The StorageCrypter Ransomware appears to be targeting NAS systems around the world but the facts surrounding it have been somewhat confusing.

Feedback

Repairing a 1960s mainframe: Fixing the IBM 1401’s core memory and power supply

The IBM 1401 was a popular business computer of the early 1960s. It had 4000 characters of internal core memory with additional 12000 characters in an external expansion box. 2 Core memory was a popular form of storage in this era as it was relatively fast and inexpensive. Each bit is stored in a tiny magnetized ferrite ring called a core. (If you’ve ever heard of a “core dump”, this is what the term originally referred to.) The photo below is a magnified view of the cores, along with the red wires used to select, read and write the cores.4 The cores are wired in an X-Y grid; to access a particular address, one of the X lines is pulsed and one of the Y lines is pulsed, selecting the core where they intersect.

The post Trials of TLS | TechSNAP 350 first appeared on Jupiter Broadcasting.

]]>
A Burrito Stole My Money | TechSNAP 321 https://original.jupiterbroadcasting.net/115216/a-burrito-stole-my-money-techsnap-321/ Tue, 30 May 2017 21:35:00 +0000 https://original.jupiterbroadcasting.net/?p=115216 RSS Feeds: HD Video Feed | MP3 Audio Feed | iTunes Feed | Torrent Feed Become a supporter on Patreon: Show Notes: Cultivating cybersecurity talent Unit 8200 dates back to 1952 Theresa may to create new internet that would be controlled and regulated by government Theresa May is planning to introduce huge regulations on the […]

The post A Burrito Stole My Money | TechSNAP 321 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

HD Video Feed | MP3 Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Cultivating cybersecurity talent

Theresa may to create new internet that would be controlled and regulated by government

  • Theresa May is planning to introduce huge regulations on the way the internet works, allowing the government to decide what is said online.

new SMB worm using 7 NSA tools not 2

Feedback


Round Up:


The post A Burrito Stole My Money | TechSNAP 321 first appeared on Jupiter Broadcasting.

]]>
Kill Switch Engage | TechSNAP 320 https://original.jupiterbroadcasting.net/115001/kill-switch-engage-techsnap-320/ Tue, 23 May 2017 18:16:19 +0000 https://original.jupiterbroadcasting.net/?p=115001 RSS Feeds: HD Video Feed | MP3 Audio Feed | iTunes Feed | Torrent Feed Become a supporter on Patreon: Show Notes: Cisco’s Talos Intelligence Group Blog: Player 3 Has Entered the Game: Say Hello to ‘WannaCry’ FCC Filings Overwhelmingly Support Net Neutrality Once Anti-Net Neutrality Spam is Removed Net Neutrality II: Last Week Tonight […]

The post Kill Switch Engage | TechSNAP 320 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

HD Video Feed | MP3 Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Cisco’s Talos Intelligence Group Blog: Player 3 Has Entered the Game: Say Hello to ‘WannaCry’

FCC Filings Overwhelmingly Support Net Neutrality Once Anti-Net Neutrality Spam is Removed


Feedback


Round Up:


The post Kill Switch Engage | TechSNAP 320 first appeared on Jupiter Broadcasting.

]]>
When IT Security Cries | TechSNAP 319 https://original.jupiterbroadcasting.net/114721/when-it-security-cries-techsnap-319/ Tue, 16 May 2017 21:37:30 +0000 https://original.jupiterbroadcasting.net/?p=114721 RSS Feeds: HD Video Feed | MP3 Audio Feed | iTunes Feed | Torrent Feed Become a supporter on Patreon: Show Notes: Hackers Hit Dozens of Countries Exploiting Stolen N.S.A. Tool Timeline of the attach Don’t tell people to turn off Windows Update, just don’t U.K. Hospitals Hit in Widespread Ransomware Attack +The need for […]

The post When IT Security Cries | TechSNAP 319 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

HD Video Feed | MP3 Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Hackers Hit Dozens of Countries Exploiting Stolen N.S.A. Tool

+The need for urgent collective action to keep people safe online: Lessons from last week’s cyberattack

+ Microsoft Issues WanaCrypt Patch for Windows 8, XP

Keylogger Found in Audio Driver of HP Laptops


Feedback


Round Up:


The post When IT Security Cries | TechSNAP 319 first appeared on Jupiter Broadcasting.

]]>
SMBTrapped in Microsoft | TechSNAP 210 https://original.jupiterbroadcasting.net/80632/smbtrapped-in-microsoft-techsnap-210/ Thu, 16 Apr 2015 19:01:23 +0000 https://original.jupiterbroadcasting.net/?p=80632 Researches find an 18 year old bug in Windows thats rather nasty, we’ve got the details. A new perspective on the bug bounty arms race & the security impact of Wifi on a plane. Plus great feedback, a bursting round up & much much more! Thanks to: Get Paid to Write for DigitalOcean Direct Download: […]

The post SMBTrapped in Microsoft | TechSNAP 210 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Researches find an 18 year old bug in Windows thats rather nasty, we’ve got the details. A new perspective on the bug bounty arms race & the security impact of Wifi on a plane.

Plus great feedback, a bursting round up & much much more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | OGG Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Foo

— Show Notes: —

Cylance finds “SPEAR” a new spin on an 18 year old Windows vulnerability

  • In 1997 Aaron Spangler discovered a flaw in Windows
  • By causing a user to navigate to a file://1.2.3.4/ url in Internet Explorer, the user’s windows credentials would be sent to the remote server, to attempt to login to it
  • “Redirect to SMB is a way for attackers to steal valuable user credentials by hijacking communications with legitimate web servers via man-in-the-middle attacks, then sending them to malicious SMB (server message block) servers that force them to spit out the victim’s username, domain and hashed password”
  • “It’s a serious issue because stolen credentials can be used to break into private accounts, steal data, take control of PCs and establish a beachhead for moving deeper into a targeted network.”
  • “Software from at least 31 companies including Adobe, Apple, Box, Microsoft, Oracle and Symantec can be exploited using this vulnerability”
  • “Redirect to SMB is most likely to be used in targeted attacks by advanced actors because attackers must have control over some component of a victim’s network traffic.”
  • “Less sophisticated attackers could launch Redirect to SMB attacks on shared WiFi access points at locations such as coffee shops from any computer, including mobile devices. We successfully tested this attack on a home network using a Nexus 7 loaded with all required tools.”
  • “While the user credentials sent over SMB are commonly encrypted, the encryption method used was devised in 1998 and is weak by today’s standards. A stronger hashing algorithm being used on these credentials would decrease the impact of this issue, but not as much as disabling automatic authentication with untrusted SMB servers. With roughly $3,000 worth of GPUs, an attacker could crack any 8-character password consisting of letters (upper and lower case) as well as numbers in less than half a day.”
  • “Microsoft has yet to release a patch to fix the Redirect to SMB vulnerability. The simplest workaround is to block outbound traffic from TCP 139 and TCP 445 — either at the endpoint firewall or at the network gateway’s firewall (assuming you are on a trusted network). The former will block all SMB communication, which may disable other features that depend on SMB. If the block is done at the network gateway’s firewall, SMB features will still work inside the network, but prevent authentication attempts with destinations outside the network. See the white paper for other mitigation steps.”
  • “Microsoft did not resolve the issue reported by Aaron Spangler in 1997. We hope that our research will compel Microsoft to reconsider the vulnerabilities and disable authentication with untrusted SMB servers. That would block the attacks identified by Spangler as well as the new Redirect to SMB attack.”
  • Cylance Whitepaper (PDF)

Given enough money, all bugs are shallow

  • Eric Raymond, in The Cathedral and the Bazaar, famously wrote: “Given enough eyeballs, all bugs are shallow.”
  • “The idea is that open source software, by virtue of allowing anyone and everyone to view the source code, is inherently less buggy than closed source software. He dubbed this “Linus’s Law”.”
  • “However, the Heartbleed SSL vulnerability was a turning point for Linus’s Law, a catastrophic exploit based on a severe bug in open source software. How catastrophic? It affected about 18% of all the HTTPS websites in the world, and allowed attackers to view all traffic to these websites, unencrypted… for two years.”
  • “OpenSSL, the library with this bug, is one of the most critical bits of Internet infrastructure the world has – relied on by major companies to encrypt the private information of their customers as it travels across the Internet. OpenSSL was used on millions of servers and devices to protect the kind of important stuff you want encrypted, and hidden away from prying eyes, like passwords, bank accounts, and credit card information.”
  • “This should be some of the most well-reviewed code in the world. What happened to our eyeballs, man?”
  • “In reality, it’s generally very, very difficult to fix real bugs in anything but the most trivial Open Source software. I know that I have rarely done it, and I am an experienced developer. Most of the time, what really happens is that you tell the actual programmer about the problem and wait and see if he/she fixes it”
  • “Even if a brave hacker communities to read the code, they’re not terribly likely to spot one of the hard-to-spot problems. Why? Few open source hackers are security experts”
  • “There’s a big difference between usage eyeballs and development eyeballs.”
  • “Most eyeballs are looking at the outside of the code, not the inside. And while you can discover bugs, even important security bugs, through usage, the hairiest security bugs require inside knowledge of how the code works.”
  • Peer reviewing code is a lot harder than writing code.
  • “The amount of code being churned out today – even if you assume only a small fraction of it is “important” enough to require serious review – far outstrips the number of eyeballs available to look at the code”
  • “There are not enough qualified eyeballs to look at the code. Sure, the overall number of programmers is slowly growing, but what percent of those programmers are skilled enough, and have the right security background, to be able to audit someone else’s code effectively? A tiny fraction”
  • “But what’s the long term answer to the general problem of not enough eyeballs on open source code? It’s something that will sound very familiar to you, though I suspect Eric Raymond won’t be too happy about it.”
  • “Money. Lots and lots of money.”
  • “Increasingly, companies are turning to commercial bug bounty programs. Either ones they create themselves, or run through third party services like Bugcrowd, Synack, HackerOne, and Crowdcurity. This means you pay per bug, with a larger payout the bigger and badder the bug is.”
  • However, adding more money to the equation might actually make things worse
  • “There’s now a price associated with exploits, and the deeper the exploit and the lesser known it is, the more incentive there is to not tell anyone about it until you can collect a major payout. So you might wait up to a year to report anything, and meanwhile this security bug is out there in the wild – who knows who else might have discovered it by then?”
  • “If your focus is the payout, who is paying more? The good guys, or the bad guys? Should you hold out longer for a bigger payday, or build the exploit up into something even larger? I hope for our sake the good guys have the deeper pockets, otherwise we are all screwed.”
  • I like that Google addressed a few of these concerns by making Pwnium, their Chrome specific variant of Pwn2Own, a) no longer a yearly event but all day, every day and b) increasing the prize money to “infinite”. I don’t know if that’s enough, but it’s certainly going in the right direction.
  • “Money turns security into a “me” goal instead of an “us” goal“
  • “Am I now obligated, on top of providing a completely free open source project to the world, to pay people for contributing information about security bugs that make this open source project better? Believe me, I was very appreciative of the security bug reporting, and I sent them whatever I could, stickers, t-shirts, effusive thank you emails, callouts in the code and checkins. But open source isn’t supposed to be about the money… is it?”
  • “Easy money attracts all skill levels — The submitter doesn’t understand what is and isn’t an exploit, but knows there is value in anything resembling an exploit, so submits everything they can find.”
  • “But I have some advice for bug bounty programs, too”:
  • “You should have someone vetting these bug reports, and making sure they are credible, have clear reproduction steps, and are repeatable, before we ever see them.”
  • “You should build additional incentives in your community for some kind of collaborative work towards bigger, better exploits. These researchers need to be working together in public, not in secret against each other”.
  • “You should have a reputation system that builds up so that only the better, proven contributors are making it through and submitting reports”.
  • “Encourage larger orgs to fund bug bounties for common open source projects, not just their own closed source apps and websites. At Stack Exchange, we donated to open source projects we used every year. Donating a bug bounty could be a big bump in eyeballs on that code.”

FAA Needs a More Comprehensive Approach to Address Cybersecurity As Agency Transitions to NextGen

  • The Federal Aviation Administration (FAA) faces cybersecurity challenges in at least three areas:
  • (1) protecting air-traffic control (ATC) information systems,
  • (2) protecting aircraft avionics used to operate and guide aircraft
  • (3) clarifying cybersecurity roles and responsibilities among multiple FAA offices
  • “FAA has taken steps to protect its ATC systems from cyber-based threats; however, significant security-control weaknesses remain that threaten the agency’s ability to ensure the safe and uninterrupted operation of the national airspace systems”
  • “Modern aircraft are increasingly connected to the Internet. This interconnectedness can potentially provide unauthorized remote access to aircraft avionics systems. As part of the aircraft certification process, FAA’s Office of Safety (AVS) currently certifies new interconnected systems through rules for specific aircraft and has started reviewing rules for certifying the cybersecurity of all new aircraft systems.”
  • “FAA officials and experts we interviewed said that modern aircraft are also increasingly connected to the Internet, which also uses IP-networking technology and can potentially provide an attacker with remote access to aircraft information systems. According to cybersecurity experts we interviewed, Internet connectivity in the cabin should be considered a direct link between the aircraft and the outside world, which includes potential malicious actors. FAA officials and cybersecurity and aviation experts we spoke to said that increasingly passengers in the cabin can access the Internet via onboard wireless broadband systems.”
  • “Four cybersecurity experts with whom we spoke discussed firewall vulnerabilities, and all four said that because firewalls are software components, they could be hacked like any other software and circumvented. The experts said that if the cabin systems connect to the cockpit avionics systems (e.g., share the same physical wiring harness or router) and use the same networking platform, in this case IP, a user could subvert the firewall and access the cockpit avionics system from the cabin. The presence of personal smartphones and tablets in the cockpit increases the risk of a system’s being compromised by trusted insiders, both malicious and non-malicious, if these devices have the capability to transmit information to aircraft avionics systems”
  • One would hope that the cockpit avionics are separated from the onboard entertainment and wifi systems by more than just a firewall. Even if they are not, a properly configured firewall is very difficult to compromise.
  • Additional Coverage – BatBlue
  • It seems that the authors of this report were not experts on the subject, and when interviewing experts on the topic, they asked questions like “is there any way to get around a firewall”

Feedback:


Round Up:


The post SMBTrapped in Microsoft | TechSNAP 210 first appeared on Jupiter Broadcasting.

]]>
Puffy in a Box | BSD Now 81 https://original.jupiterbroadcasting.net/79142/puffy-in-a-box-bsd-now-81/ Thu, 19 Mar 2015 09:37:38 +0000 https://original.jupiterbroadcasting.net/?p=79142 We’re back from AsiaBSDCon! This week on the show, we’ll be talking to Lawrence Teo about how Calyptix uses OpenBSD in their line of commercial routers. They’re getting BSD in the hands of Windows admins who don’t even realize it. We also have all this week’s news and answer to your emails, on BSD Now […]

The post Puffy in a Box | BSD Now 81 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We’re back from AsiaBSDCon! This week on the show, we’ll be talking to Lawrence Teo about how Calyptix uses OpenBSD in their line of commercial routers. They’re getting BSD in the hands of Windows admins who don’t even realize it. We also have all this week’s news and answer to your emails, on BSD Now – the place to B.. SD.

Thanks to:


DigitalOcean


iXsystems


Tarsnap

Direct Download:

Video | HD Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | HD Vid Feed | HD Torrent Feed

– Show Notes: –

Headlines

Using OpenBGPD to distribute pf table updates

  • For those not familiar, OpenBGPD is a daemon for the Border Gateway Protocol – a way for routers on the internet to discover and exchange routes to different addresses
  • This post, inspired by a talk about using BGP to distribute spam lists, details how to use the protocol to distribute some other useful lists and information
  • It begins with “One of the challenges faced when managing our OpenBSD firewalls is the distribution of IPs to pf tables without manually modifying /etc/pf.conf on each of the firewalls every time. This task becomes quite tedious, specifically when you want to distribute different types of changes to different systems (eg administrative IPs to a firewall and spammer IPs to a mail server), or if you need to distribute real time blacklists to a large number of systems.”
  • If you manage a lot of BSD boxes, this might be an interesting alternative to some of the other ways to distribute configuration files
  • OpenBGPD is part of the OpenBSD base system, but there’s also an unofficial port to FreeBSD and a “work in progress” pkgsrc version

Mounting removable media with autofs

  • The FreeBSD foundation has a new article in the “FreeBSD from the trenches” series, this time about the sponsored autofs tool
  • It’s written by one of the autofs developers, and he details his work on creating and using the utility
  • “The purpose of autofs(5) is to mount filesystems on access, in a way that’s transparent to the application. In other words, filesystems get mounted when they are first accessed, and then unmounted after some time passes.”
  • He talks about all the components that need to work together for smooth operation, how to configure it and how to enable it by default for removable drives
  • It ends with a real-world example of something we’re all probably familiar with: plugging in USB drives and watching the magic happen
  • There’s also some more advanced bonus material on GEOM classes and all the more technical details

The Tor Browser on BSD

  • The Tor Project has provided a “browser bundle” for a long time, which is more or less a repackaged Firefox with many security and privacy-related settings preconfigured and some patches applied to the source
  • Just tunneling your browser through a transparent Tor proxy is not safe enough – many things can lead to passive fingerprinting or, even worse, anonymity being completely lost
  • It has, however, only been released for Windows, OS X and Linux – no BSD version
  • “[…] we are pushing back against an emerging monoculture, and this is always a healthy thing. Monocultures are dangerous for many reasons, most importantly to themselves.”
  • Some work has begun to get a working port on BSD going, and this document tells about the process and how it all got started
  • If you’ve got porting skills, or are interested in online privacy, any help would be appreciated of course (see the post for details on getting involved)

OpenSSH 6.8 released

  • Continuing their “tick tock” pattern of releases alternating between new features and bugfixes, the OpenSSH team has released 6.8 – it’s a major upgrade, focused on new features (we like those better of course)
  • Most of the codebase has gone through refactoring, making it easier for regression tests and improving the general readability
  • This release adds support for SHA256-hashed, base64-encoded host key fingerprints, as well as making that the default – a big step up from the previously hex-encoded MD5 fingerprints
  • Experimental host key rotation support also makes it debut, allowing for easy in-place upgrading of old keys to newer (or refreshed) keys
  • You can now require multiple, different public keys to be verified for a user to authenticate (useful if you’re extra paranoid or don’t have 100% confidence in any single key type)
  • The native version will be in OpenBSD 5.7, and the portable version should hit a ports tree near you soon
  • Speaking of the portable version, it now has a configure option to build without OpenSSL or LibreSSL, but doing so limits you to Ed25519 key types and ChaCha20 and AES-CTR ciphers

NetBSD at AsiaBSDCon

  • The NetBSD guys already have a wrap-up of the recent event, complete with all the pictures and weird devices you’d expect
  • It covers their BoF session, the six NetBSD-related presentations and finally their “work in progress” session
  • There was a grand total of 34 different NetBSD gadgets on display at the event

Interview – Lawrence Teo – lteo@openbsd.org / @lteo

OpenBSD at Calyptix


News Roundup

HardenedBSD introduces Integriforce

  • A little bit of background on this one first: NetBSD has something called veriexec, used for checking file integrity at the kernel level
  • By doing it at the kernel level, similar to securelevels, it offers some level of protection even when the root account is compromised
  • HardenedBSD has introduced a similar mechanism into their “secadm” utility
  • You can list binaries in the config file that you want to be protected from changes, then specify whether those can’t be run at all, or if they just print a warning
  • They’re looking for some more extensive testing of this new feature

More s2k15 hackathon reports

  • A couple more Australian hackathon reports have poured in since the last time
  • The first comes from Jonathan Gray, who’s done a lot of graphics-related work in OpenBSD recently
  • He worked on getting some newer “Southern Islands” and “Graphics Core Next” AMD GPUs working, as well as some OpenGL and DRM-related things
  • Also on his todo list was to continue hitting various parts of the tree with American Fuzzy Lop, which ended up fixing a few crashes in mandoc
  • Ted Unangst also sent in a report to detail what he hacked on at the event
  • With a strong focus on improving SMP scalability, he tackled the virtual memory layer
  • His goal was to speed up some syscalls that are used heavily during code compilation, much of which will probably end up in 5.8
  • All the trip reports are much more detailed than our short summaries, so give them a read if you’re interested in all the technicalities

DragonFly 4.0.4 and IPFW3

  • DragonFly BSD has put out a small point release to the 4.x branch, 4.0.4
  • It includes a minor list of fixes, some of which include a HAMMER FS history fix, removing the no-longer-needed “new xorg” and “with kms” variables and a few LAGG fixes
  • There was also a bug in the installer that prevented the rescue image from being installed correctly, which also gets fixed in this version
  • Shortly after it was released, their new IPFW2 firewall was added to the tree and subsequently renamed to IPFW3 (since it’s technically the third revision)

NetBSD gets Raspberry Pi 2 support

  • NetBSD has announced initial support for the second revision of the ever-popular Raspberry Pi board
  • There are -current snapshots available for download, and multiprocessor support is also on the way
  • The NetBSD wiki page about the Raspberry Pi also has some more information and an installation guide
  • The usual Hacker News discussion on the subject
  • If anyone has one of these little boards, let us know – maybe write up a blog post about your experience with BSD on it

OpenIKED as a VPN gateway

  • In our first discussion segment, we talked about a few different ways to tunnel your traffic
  • While we’ve done full tutorials on things like SSH tunnels, OpenVPN and Tor, we haven’t talked a whole lot about OpenBSD’s IPSEC suite
  • This article should help fill that gap – it walks you through the complete IKED setup
  • From creating the public key infrastructure to configuring the firewall to configuring both the VPN server and client, this guide’s got it all

Feedback/Questions


Mailing List Gold


  • Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv
  • If you’re in or around the Troy, New York area, our listener Brian is giving a presentation about ports on OpenBSD at the Rensselaer Polytechnic Institute this Friday at 4:00PM
  • If anyone else in the audience is doing something similar or organizing any kind of BSD event, let us know and we’ll be glad to mention it
  • Look forward to seeing the AsiaBSDCon interviews in upcoming episodes

The post Puffy in a Box | BSD Now 81 first appeared on Jupiter Broadcasting.

]]>
Sharing with Samba | LAS 319 https://original.jupiterbroadcasting.net/60967/sharing-with-samba-las-319/ Sun, 29 Jun 2014 14:31:03 +0000 https://original.jupiterbroadcasting.net/?p=60967 Easily share files between Windows and Linux, and we’ll solve some common network browsing challenges under Linux. Plus a quick look at Linux Mint 17 KDE edition, the huge new features coming to OwnCloud, a new hacker event…. AND SO MUCH MORE! All this week on, The Linux Action Show! Thanks to: Download: HD Video […]

The post Sharing with Samba | LAS 319 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Easily share files between Windows and Linux, and we’ll solve some common network browsing challenges under Linux.

Plus a quick look at Linux Mint 17 KDE edition, the huge new features coming to OwnCloud, a new hacker event….

AND SO MUCH MORE!

All this week on, The Linux Action Show!

Thanks to:


DigitalOcean


Ting

Download:

HD Video | Mobile Video | WebM Torrent | MP3 Audio | Ogg Audio | YouTube | HD Torrent

RSS Feeds:

HD Video Feed | Large Video Feed | Mobile Video Feed | MP3 Feed | Ogg Feed | iTunes Feeds | Torrent Feed

— Show Notes: —

Easy Windows File Sharing from Linux:


System76

Brought to you by: System76

File Manager not show your network shares?

Install Samba:

Samba is a re-implementation of the SMB/CIFS networking protocol, it facilitates file and printer sharing among Linux and Windows systems as an alternative to NFS. Some users say that Samba is easily configured and that operation is very straight-forward. However, many new users run into problems with its complexity and non-intuitive mechanism.

  • Install Samba

sudo apt-get update

sudo apt-get install samba samba-common system-config-samba python-glade2 gksu nautilus-share

  • Enable your user account as a Samba user

smbpasswd -e chase

Having troubles resolving computer names?

  • Check your DNS settings

  • Add the following stanza to smb.conf:

name resolve order = lmhosts bcast host wins

testparm — check an smb.conf configuration file for
internal correctness

Bonus: Going through these steps will also make your Windows network file browsing work under your file manager too!

Further Reading:


— Picks —

Runs Linux

Raspberry Pi Controlled Aquaponics

This build uses the IBC method of Aquaponics, with modifications to include a Raspberry Pi for controlling a pump, solenoid drain, and temperature probes for water and air temperatures. The relays and timing is controlled with python scripting. Temperature and control data is collected every minute and sent to plot.ly for graphing, and future expansion will include sensors for water level and PH values for additional control.

All of my scripts are available at github.com

Desktop App Pick

beets: the music geek’s media organizer

The purpose of beets is to get your music collection right once and for all. It
catalogs your collection, automatically improving its metadata as it goes using
the MusicBrainz database. Then it provides a bouquet of tools for
manipulating and accessing your music.

Weekly Spotlight

Unix & Linux Stack Exchange

— NEWS —

ownCloud 7 Community Edition Enhances, Extends and Simplifies Control of Sensitive Data

imgurlArea 27-06-14  13_32_23.png

ownCloud 7 Community Edition server-to-server sharing enables users on one ownCloud instance to seamlessly share files with a user on a different ownCloud installation without using share links — enhancing sharing and collaboration while maintaining security and privacy.

ownCloud 7 Community Edition also gives end users a “Dropbox-like” experience — complementing the security and privacy on the back end — with an entirely new web interface, mobile web browser support, file notifications in email or activity stream, and significant performance improvements.

“ownCloud 7 Community Edition enables greater collaboration even across ownCloud instances, as well as greater admin control, updated user management and improved external storage control,” said Frank Karlitschek, founder and leader of the ownCloud project. “And at the same time, added or improved installation and configuration wizards, completely overhauled sharing, and a new user interface significantly simplifies the ownCloud experience.”

Russia to ditch Intel, AMD in favor of homegrown ‘Baikal’ chips; will use GNU/Linux

According to a Russian business newspaper, state departments and state-run companies have no plans to buy PCs built around Intel or AMD processors. Instead, beginning in 2015, the government will order some 700,000 personal computers annually worth $500 million and 300,000 servers worth $800 million based on the Baikal chip.

Where KDE is going – Part 1 | KDE.news

GNOME 3.13.3 | Goings on

The Linux Mint Blog » Blog Archive » Linux Mint 17 “Qiana” KDE released!

Dad’s computer lady and “The Linux” by Chad Seaman

ToorCamp | the five day, open air, tech camping event

NEAH BAY, WA
JULY 9-13, 2014

Feedback:

— Chris’ Stash —

Hang in our chat room:

irc.geekshed.net #jupiterbroadcasting

— What’s Matt Doin? —

— Find us on Google+ —

— Find us on Twitter —

— Follow the network on Facebook: —

— Catch the show LIVE Sunday 10am Pacific / 1pm Eastern / 6pm UTC: —

The post Sharing with Samba | LAS 319 first appeared on Jupiter Broadcasting.

]]>
YaCy Creator Interview | LAS s30e09 https://original.jupiterbroadcasting.net/51277/yacy-creator-interview-las-s30e09/ Sun, 09 Feb 2014 14:50:07 +0000 https://original.jupiterbroadcasting.net/?p=51277 Michael Christen the creator and maintainer of YaCy search joins us to discuss his free search engine that uses a unique Peer-to-peer technology.

The post YaCy Creator Interview | LAS s30e09 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Michael Christen the creator and maintainer of YaCy search joins us to discuss his free search engine that anyone can use to build a search portal for their intranet or to help search the public internet using a unique Peer-to-peer technology.

Plus who’s building Linux, the big Docker news, a look ahead at the next big Gnome release…

AND SO MUCH MORE!

All this week on, The Linux Action Show!

Thanks to:


GoDaddy


Ting

Download:

HD Video | Mobile Video | WebM Torrent | MP3 Audio | Ogg Audio | YouTube | HD Torrent

RSS Feeds:

HD Video Feed | Large Video Feed | Mobile Video Feed | MP3 Feed | Ogg Feed | iTunes Feeds | Torrent Feed

Support the Show:

— Show Notes: —

Michael Christen YaCy Maintainer:


System76

Brought to you by: System76

YaCy is a free search engine that anyone can use to build a search portal for their intranet or to help search the public internet. When contributing to the world-wide peer network, the scale of YaCy is limited only by the number of users in the world and can index billions of web pages. It is fully decentralized, all users of the search engine network are equal, the network does not store user search requests and it is not possible for anyone to censor the content of the shared index. We want to achieve freedom of information through a free, distributed web search which is powered by the world’s users.

Questions

  • What’s the key reason you believe decentralized search is important?

  • How does YaCy help combat censorship?

  • Can I use YaCy on my school/work network to index all of the material on our intranet?

  • I want to run YaCy on a VPS, can it be configured to crawl faster than my home PC since it has a faster connection?

  • How would I know that some YaCy machine in the globe does not collect all the requests it gets?

  • Could YaCy be used to index the TOR network?

  • And more in show, not documented here.

Installing YaCY

q5ys’s Kickstarter


– Picks –

Runs Linux:

Desktop App Pick

Weekly Spotlight


— NEWS —

About once a year, the Linux Foundation analyzes the online repository that holds the source code of the kernel, or core, of the Linux operating system.

As well as tracking the increasing complexity of the ever-evolving kernel over a series of releases from versions 3.0 to 3.10

The report also reveals who is contributing code, and the dominant role corporations now play in what began as an all-volunteer project in 1991.

Over 80 percent of code is contributed by people who are paid for their work

The Linux Foundation notes that contributions have been increasing from companies that make mobile and embedded systems, such as Linaro, Samsung, and Texas Instruments.
Contributions from individual developers must have sign-offs before being incorporated into the official kernel code.

Corporate employees truly dominate, with just over 5 percent of approvals by volunteers.

The increasing size of the Linux kernel is due to the incorporation of significant new features, including a file system optimized for solid-state drives and support for the 64-bit ARM microprocessors used in embedded and mobile devices.

That’s evident in today’s news that the company has raised $15 million in a Series B round led by Greylock Partners, with minority participation from Insight Venture Partners and existing investors Benchmark Capital and Trinity Ventures. Also participating is Yahoo! Co-Founder Jerry Yang, who has participated in previous

Docker will use the funding to push toward the general availability of the Docker environment, develop commercial services that pair with the open-source technology and build a team to support the growing community.

– Feedback: –

— Chris’ Stash —

Hang in our chat room:

irc.geekshed.net #jupiterbroadcasting

— What’s Matt Doin? —

— Find us on Google+ —
— Find us on Twitter —
— Follow the network on Facebook: —
— Catch the show LIVE Sunday 10am Pacific / 1pm Eastern / 6pm UTC: —

The post YaCy Creator Interview | LAS s30e09 first appeared on Jupiter Broadcasting.

]]>
Grand Theft BGP | TechSNAP 121 https://original.jupiterbroadcasting.net/41087/grand-theft-bgp-techsnap-121/ Thu, 01 Aug 2013 17:49:09 +0000 https://original.jupiterbroadcasting.net/?p=41087 A BGP hack reroutes the traffic of banks, Amazon and many others. We’ll explain how this can happen, and why we don't see it more often.

The post Grand Theft BGP | TechSNAP 121 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A BGP hack reroutes the traffic of banks, Amazon and many others. We’ll explain how this can happen, and why we don’t see it more often.

Plus an Interview with Brendan Gregg author of a new book that focuses on Systems Performance in the Enterprise and the Cloud, plus a big batch of your questions, our answers, and much much more!

Thanks to:

Use our code tech249 to score .COM for $2.49!

Get private registration FOR FREE with a .COM! code: free5

 

Visit dirwiz.com/unitysync use code tech for an extended trial and a year of maintenance.

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed


BGP hijack used to redirect traffic destin for online banking

  • On 24 July 2013 a number of specific IP addresses were maliciously mis-routed to an ISP in the Netherlands
  • This is especially unusual because most all BGP routes are /24 or larger (because routers only have so much RAM in which to hold the routing table for the entire Internet), and most of these were specific /32s (a single IP address).
  • This might be considering a mistake or something, however the owners of the specific IP addresses suggest otherwise:
    • AMAZON-AES – Amazon.com, Inc.
    • AS-7743 – JPMorgan Chase & Co.
    • ASN-BBT-ASN – Branch Banking and Trust Company
    • BANK-OF-AMERICA Bank of America
    • CEGETEL-AS Societe Francaise du Radiotelephone S.A
    • FIRSTBANK – FIRSTBANK
    • HSBC-HK-AS HSBC HongKong
    • PFG-ASN-1 – The Principal Financial Group
    • PNCBANK – PNC Bank
    • REGIONS-ASN-1 – REGIONS FINANCIAL CORPORATION
  • The ISP, NedZone.nl normally announced about 30 prefixes of various sizes between /18 and /24, but on the date in question, they were announcing 369, most all of which were smaller than /24 (usually the smallest that would be announced)
  • It is most likely this was caused by a malicious customer, rather than NedZone or one of it’s Employees
  • The attack appears to have been an attempt to run a MITM attack against online banking
  • RIPE AS Dashabout for AS25459, showing list of prefixes announced in the last 30 days
  • HE BGP Looking Glass AS25459 Prefixes

Digital Ocean Cloud ‘Droplets’ found to be reusing same SSH private keys

  • While using Digital Ocean’s cloud server to write a comparison of Ansible and Salt, two different administration/orchestration tools, Joshua Lund discovered that many of his ‘Droplets’ had the same SSH fingerprint
  • While rapidly creating and destroying Droplets, he ended up with the same ip address, and noticed that he did not receive an SSH fingerprint mismatch, warning him that this server is not the same as the one that resided at this IP address previously
  • Upon further investigation he found that the SSH keys appeared to be part of the base image, rather than being generated on first boot
  • While this was likely a simple oversight while creating the images, or an attempt to make the droplets boot faster by foregoing the SSH key generation, it is a significant security issue
  • This means someone could replace your droplet with their own and have the same SSH private key (and therefore fingerprint), if you or one of your old users connected to your old IP which now belonged to someone else, they could capture your password or otherwise perform a MITM attack
  • The issue was reported to Digital Ocean and they responded the same day
  • The immediate fix did not resolve all instances of the issue, but within 7 days the issue had been resolved
  • Digital Ocean then started working with their customers to have them replace their SSH host keys with unique ones
  • 6 weeks later a public security advisory was issued
  • If you do not install the OS your self, it may be a good idea to regenerate the SSH keys as part of the initial setup process
  • Official Advisory
  • On a future Episode of TechSNAP we’ll talk about SSHFP DNS records and maintaining a system wide ssh_known_hosts file

Interview with Brendan Gregg

[asa]0133390098[/asa]


Feedback:

Directory Dive:

Round Up:

The post Grand Theft BGP | TechSNAP 121 first appeared on Jupiter Broadcasting.

]]>
Battery Malware | TechSNAP 16 https://original.jupiterbroadcasting.net/10763/battery-malware-techsnap-16/ Thu, 28 Jul 2011 22:52:47 +0000 https://original.jupiterbroadcasting.net/?p=10763 Attackers take aim at Apple with an exploit that could brick your Macbook, or perhaps worse. Plus you need to patch against a 9 year old SSL flaw.

The post Battery Malware | TechSNAP 16 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Attackers take aim at Apple with an exploit that could brick your Macbook, or perhaps worse. Plus you need to patch against a 9 year old SSL flaw.

Plus find out about a Google bug that could wipe a site from their Index, and a excellent batch of your feedback!

All that and more, on this week’s TechSNAP!

Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

Subscribe via RSS and iTunes:

[ad#shownotes]

Show Notes:

iPhones vulnerable to 9 year old SSL sniffing attack

  • A nine year old bug discovered and disclosed by Moxie Marlinspike in 2002 allows attackers to decrypt intercepted SSL sessions. Moxie Marlinspike released a newer, easier to use version of the tool on monday, to coincide with Apple finally patching the flaw on iPhone and other iOS devices.
  • Any unpatched iOS device can have all of it’s SSL traffic trivially intercepted and decrypted
  • This means anyone with this new easy to use tool sitting near a wifi hotspot, can intercept encrypted login information (gmail, facebook), banking credentials, e-commerce transactions, or anything else people do from their phone.
  • The bug was in the way iOS interpreted the certificate chain. Apple failed to respect the ‘basicConstraint’ parameter, allowing an attacker to sign a certificate for any domain with an existing valid certificate, a condition normally prevented by the constraint.
  • There are no known flaws in SSL it self, in this case, the attacker could perform a man-in-the-middle attack, by feeding the improperly signed certificate to the iPhone which would have accepted it, and used the attackers key to encrypt the data.
  • Patch is out with a support doc and direct download links

Apple Notebook batteries vulnerable to firmware hack

  • After analyzing a battery firmware update that Apple pushed in 2009, researchers found that all patched batteries, and all batteries manufactured since, use the same password
  • With this password, it is possible to control the firmware on the battery
  • This means that an attacker can remotely brick your Macbook, or cause the battery to overheat and possibly even explode
  • The attacker can also falsify the data returned to the OS from the battery, causing odd system behaviour
  • The attacker could also completely replace the Apple firmware, with one designed to silently infect the machine with malware. Even if the malware is removed, the battery would be able to reinfect the machine, even after a complete OS wipe and reinstall.
  • Further research will be presented at this years Black Hat Security Conference
  • In the meantime, researchers have notified Apple of the vulnerability, and have created a utility that generates a completely random password for your Mac’s battery.
    Additional Link

Facebook fixes glitch that let you see private video information

  • A glitch in facebook allowed you to see the thumbnail preview and description of private videos posted by other users, even when they were not shared with you.
  • It was not possible to view the actual videos

Google was quick to shutdown Webmaster Tools after vulnerability found

  • Using the google webmaster tools, users were able to remove websites that did not belong to them from the Google Index
  • By simply modifying the query string of a valid request to remove your own site from the google index, and changing one of the two references to the target url, you were able to remove an arbitrary site from the google index
  • The issue was resolved within 7 hours of being reported to Google
  • Google restored sites that were improperly removed from its index.

Researchers find vulnerablity in Skype

  • Inproper input validation and output sanitation allowed attackers to inject code into their skype profile
  • By entering html and java script in to the ‘mobile phone’ section of your profile, anyone who had you on their friends list would execute the injected code.
  • This vulnerability could have allowed attackers to high your session, steal your account, capture your payment data, and change your password

Feedback


Q: (Sargoreth) I downloaded eclipse, and I didn’t bother to verify the md5 hash they publish on the download page, how big a security risk is this?
A: Downloadable software often has an MD5 hash published along with the downloadable file, as a measure to allow you to ensure that the file you downloaded is valid. Checking the downloaded file against this hash can ensure that the file was not corrupted during transfer. However it is not a strong enough indicator that the file has not been tampered with. If the file was modified, the MD5 hash could just as easily have been updated along with it. In order to be sure that the file has not been tampered with, you need a hash that is provided out of band, from a trusted source (The FreeBSD Ports tree comes with the SHA256 hashs of all files, which are then verified once they are downloaded). SHA256 is much more secure, as MD5 has been defeated a number of times, with attackers able to craft two files with matching hashes. SHA-1 is no longer considered secure enough for cryptographic purposes. It should also be noted that SHA-512 is actually faster to calculate than SHA256 on 64bit hardware, however it is not as widely supported yet. The ultimate solution for ensuring the integrity of downloadable files is a GPG signature, verified against a trusted public key. Many package managers (such as yum) take this approach, and some websites offer a .asc file for verification. A number of projects have stopped publishing the GPG signatures because the proportion of users who checked the signature was too low to justify the additional effort. Some open source projects have had backdoors injected in to their downloadable archives on official mirrors, such as the UnrealIRCd project.


Q: (Christoper) I have a windows 7 laptop, and a Ubuntu desktop, what would be a cheap and easy way to share files between them?
A: The easiest and most secure way, is to enable SSH on the ubuntu machine, and then use an SFTP client like FileZilla (For Windows, Mac and Linux), and then just login to your ubuntu machine using your ubuntu username/password. Alternatively, If you have shared a folder on your windows machine, you should be be able to browse to it from the Nautilus file browser in Ubuntu. Optionally, you can also install Samba, to allow your Ubuntu machine to share files with windows, it will appear as if it were another windows machine in your windows ‘network neighbourhood’.


Q: (Chad) I have a network of CentOS servers, and a central NFS/NIS server, however we are considering adding a FreeNAS box to provide ZFS. I need to be able to provide consistent centralized permissions control on this new file system. I don’t want to have to manually recreate the users on the FreeNAS box. Should I switch to LDAP?
A: FreeNAS is based on FreeBSD, so it has a native NIS client you can use (ypbind) to connect to your existing NIS system. This would allow the same users/groups to exist across your heterogeneous network. You may need to modify the /etc/nsswitch.conf file to configure the order local files and NIS are checked in, and set your NIS domain in /etc/rc.conf. Optionally, you could use LDAP, again, adding some additional parameters to nsswitch.conf and configuring LDAP. If you decide to use LDAP, I would recommend switching your CentOS machines to using LDAP as well, allowing you to again maintain a single system for both Linux and BSD, instead of maintaining separate account databases. If you are worried about performance, you might consider setting the BSD machine up as an NIS slave, so that it maintains a local copy of the NIS database. The FreeBSD NIS server is called ypserv. You can find out more about configuring NIS on FreeBSD here


Bitcoin Blaster

Roundup

The post Battery Malware | TechSNAP 16 first appeared on Jupiter Broadcasting.

]]>