* Posts by Crazy Operations Guy

2513 publicly visible posts • joined 29 Jun 2009

Forget data thieves, data sabotage will be your next IT nightmare

Crazy Operations Guy

Not a new problem

Back during the halcyon days of the internet, it wasn't uncommon for attackers to modify log files.

More recently, I worked for a manufacturer that was producing one of those toys that people were trampling fellow shoppers to get their hands on it. One of the assembly line drones hired to fill production gaps made his way into the factory mainframe. He patched the DB libraries so that finished products from his coworkers would be credited to him, earning him substantial performance bonuses. The data was also altered so that units built by him would appear as rejected by the inspector and thrown in the reject bin, but would really be going into his pocket, where he'd sell them for ~$500 a piece on eBay. The "rejected" units would be attributed to a random assembly drone and marked as being inspected by a random inspector.

All the production numbers, QA numbers, and inventory control would be in line with each other at the end of the day, so no one noticed. The guy ended up defrauding the company for close to $350,000 in bonuses and in proceeds from the stolen property. We only found out after attempting an upgrade to the db software and the diffs for the libraries wouldn't apply properly (since he messed with the lines being used to determine the proper context for line changes)

Linode: Major cuts to several submarine cables to Singapore

Crazy Operations Guy

When are those laser-comm satellites supposed to be ready?

I can;t wait until they start deploying those laser-based comms satellites. We really need a second method of getting data across the water, the massive cables are fine for the bulk of it, but a backup in case something like this happens, is really needed.

Hitchhacker's Guide to RSA clones conference badge with a towel

Crazy Operations Guy

Really should be other methods of anti-counterfeiting

Maybe they should use some kind of two-factor authentication or something? Maybe cut a certificate for each attendee and equip the badges with an NFC-enabled smart card rather than just a standard tag. Or maybe integrate the processor for their two-factor tokens and only make it readable via NFC. Or I"d assume that they would have some kind of anti-copying badge product meant for producing secure ID cards for employers.

RSA is a massive security conglomeration, why aren't they acting like it?

Hardcoded god-mode code found in RSA 2016 badge-scanning app

Crazy Operations Guy

Re: More likely to be found out

They don't need to store a password anyway. IF you forget the password, they should just return the scanner to the conference host's support desk and receive a fresh one with a new password. Its not like these are out in the field, they're being used in a controlled conference venue loaded with support folk from the host's org.

The scanning devices aren't doing all that much anyway, just a simple device that scans for an attendee's ID for the conference and adds it to the scanner's list of contacts. At the end of the conference. each vendor would send their list of gathered ID's and the host would send back the contact info for those IDs.

A few years back, I was at a conference for hardware engineers and they gave everyone a badge scanner built out of an RFID dev kit with a WiFi module attached. The RFID module would send the 64-bit badge ID to a microprocessor. This would then be concatenated with "INSERT INTO" <Vendor_id> "(contact_ID) VALUES "<badge_id> ";" where the the WiFi module would take that string, dump it into an encrypted TCP packet and fire it off over an encrypted WLAN to an SQL server. At the end of the show, the vendors were sent back home with the scanning equipment and schematics+source of the device, it was just a couple dev kits put together after all. The attendees also received the dev kits and the code to re-program the ID number in their badges.

After the conference ended, the host scanned the databases for non-existant badge-IDs to weed out vendors that tried to guess badge numbers to get additional contact info. The db hosting the contact info was isolated from the db tracking contacts, so there was no risk of hacking the badge scanner network to get at the private info.

One-third of all HTTPS websites open to DROWN attack

Crazy Operations Guy

If it is only unenecrypted, SMTP, it wouldn't show up on the vulnerability page. It is quite likely also running SMTP/s on port 587 which negotiates the encrypting protocol and would be vulnerable.

The vulnerability scanner is trying to perform an SSLv2 handshake, so that fact that it was able to means that something on that server is vulnerable.

Crazy Operations Guy

SMTP is still affected. It has nothing to do with the protocol, the attack is in the exchange of encryption keys irrespective of the protocol its protecting. Anything that supports SSLv2 is affected.

Crazy Operations Guy

Because there are people still out there using browser that don't support anything better. Mostly the same kind of people that still have @aol.com email addresses...

Crazy Operations Guy

Well, I suppose its a good thing that there isn't anything that actually needs encryption, although I do wish they had a PGP public key posted for news tips...

Wakey wakey, app developers. Mobile ad blocking will kill you all

Crazy Operations Guy

WiFi vs. cellular

I don;t care too much about Ads on WiFi, but I certainly do on cellular. I've noticed that one of the apps I was using would download ads intended for non-mobile devices, then shrink it down on the phone. Nothing kills a data plan faster than grabbing a 20 MB chunk of video every 5 minutes over the air...

Got enough Fibre in your diet? QLogic hustles 32gig HBA hitter

Crazy Operations Guy

It'll look good next to the 56 Gbps FDR Inifniband card running FCoE in my DB servers to our fiber-channel SAN...

Google cloud wobbles as workers patch wrong routers

Crazy Operations Guy

Never change production equipment

The beauty of cloud /virtualization seems to escape Google. The proper way of working on something like this would have been to spin up a new DC with the changes needed, then slowly move stuff from another DC to it. Once everything is moved, you perform the changes on the now-empty DC, and once done, move the machines over from another DC. Allows for keeping the machines fresh and timetables can be shifted without affecting production.

Microsoft's Hololens is up for pre-order, here's hoping you can expense it

Crazy Operations Guy

Medical imaging

It'd be so useful for medical staff where just looking at patient would bring up their scans and properly overlay the images so any internal damage appears on the skin, or in a way that the patient looks translucent. Maybe add some kind of facial recognition and a brief synopsis of the patient's records so that doctors can ensure they are giving treatment to the right person.

I'd also like to see something that tracks surgical objects during surgery so that any foreign object is highlighted in the surgeon's view so they don't forget about their materials. A ridiculous number of people have experienced severe surgical complications because someone left a sponge in their abdominal cavity. There've also been cases of scalpels, forceps, retractors, and sorts of other tools left inside patients. I've personally had the end of a suction hose left in after my appendectomy, luckily it was close enough to the surface that it caused an obvious bulge under my skin.

Mathletics promises security upgrades after parents' security gripes

Crazy Operations Guy

Re: Mathletics tested regularly by security experts?

I really want to know who these 'security experts' are so that I can avoid dealing with them. This is basic Secure Programming 101 type stuff that they missed.

All pages should be https-only, with a few supporting both http and https (such as the main page, the support FAQ, and the contacts page). No page should be http-only.

As for login pages, I am severely disappointed at how few websites support certificate-based auth.

Worldpay outs self as provider of easy-to-crack payment services

Crazy Operations Guy

Mozilla has also allowed other bad certificates

Looking at Mozilla's list of authorized CA's in Firefox, noticed several bad authorities still getting updated with certs for several different country's intelligence agencies, including PM/SGDN - IGC/A (The French intelligence agency that was caught issuing fraudulent *.google.com / *.gmail.com certificates a few years back).

The worst part is that Firefox re-adds them whenever it updates. I've gone the route of setting up a proxy server that does crypto re-encapsulation so all my clients just see the one certificate. My proxy only trusts a very small number of vetted Certificate Authorities.

Sussex PC sacked after using police databases to snoop on his ex-wife

Crazy Operations Guy

Re: At least something significant was done

Can't be as bad as the USA's Secret Service or the US Marshals . Is fairly routine for agents to look at the records for girlfriends, family, random women they met at a bar, etc... And they have access to an immense amount of data about every American and a pretty large number of foreigners.

Humans – 1 Robots – 0: Mercedes deautomates production lines

Crazy Operations Guy

Why use robots when the country just got a whole flood of cheap humans

Its probably cheaper to hire Syrian refugees than to buy and maintain adaptable robots. I have no problem with that, since the additional employees mean a higher tax revenue and a higher GDP, which benefits everyone.

Microsoft urges law rewrite to keep US govt's mitts off overseas data

Crazy Operations Guy

All had saved the US going through the much lengthier MLAT (mutual legal assistance treaty) process.

Then perhaps they should just figure out how to streamline the MLAT process and scrap SCA / LEADS / ECPA. I'd rather that justice moves a little slower than risk violating the basic human rights of foreign citizens...

Apple fires legal salvo at FBI for using All Writs law in iPhone brouhaha

Crazy Operations Guy

Completely pointless anyway

The phone itself wasn't even the property of the killer, but rather a device given to him by his employer, the City of San Bernardino. He had two other phones, both of which were destroyed. The probability of there being anything remotely useful is practically nil, who would be stupid enough to put information about the attack they were planning on a device owned by their target when they had two other options already in use? And if it did contain anything useful, why didn't he destroy it like the other two phones?

What really bothers me is how much attention has been paid to Apple rather than the IT department that failed to properly deploy Mobile Device Management software onto everyone's phones. They had such software installed on the vast majority of the phones they were given to employees anyway, so there was no reason why the Killer's phone wouldn't have it (in which case the city could've just reset the password themselves and none of this shit would've gotten anywhere close to the fan)

Awoogah – brown alert: OpenSSL preps 'high severity' security fixes

Crazy Operations Guy

Re: Pisses me off...

The complaints are about how the OpenSSL developers kept shouting about how great their software was when in reality, it was full to brim with shitty, unmaintainable code.

Crazy Operations Guy

Re: Why bother about openssl anymore ?

"due to a memory allocator compatible with Win16, MPE 6, VMS 2 and probably ENIAC as well."

The motivation for OpenSSL was to stop programmers form trying to roll their own crypto, then they go and write their own memory allocator. Seems like they really need a big ol' dose of self awareness...

Tor users are actively discriminated against by website operators

Crazy Operations Guy

Defeating the purpose

"With abuse-based blocking, we need solutions to enable precise filtering beyond IP address blocking of Tor exit nodes, so that benign Tor users don’t have to suffer from the abusive actions of other Tor users sharing the same exit node." ®

So the solution is to implement would be some sort of token to identify users to differentiate them as 'trustworthy'; which would be kind of defeating the purpose of Tor as an anonymizing service...

Crazy Operations Guy

would had blocked the US and UK, and then almost all malicious attacks would have stopped.

How about blocking the entire internet, then you won't see a single attack.

Rather than blocking countries, you'd get better value out of spending your time ensure that your web-facing services are properly written.

Those countries that you listed make up nearly 75% of internet users. Interestingly enough, if you actually look at the ratio of normal users vs. malicious users, those countries are much cleaner than the Western nations...

OpenBSD website operators urged to fix mind-alteringly bad bug

Crazy Operations Guy

Re: Robert Norton's Legacy?

Comic Sans was developed for Microsoft Bob and was patterned off of the text used in comic books. The objective was to make the OS child / amateur friendly.

Crazy Operations Guy

Re: Coming out of the closset

I've used it a couple times recently; I use it to relay sarcasm in text. Its a good font for conveying less-than-serious messages.

Dan Kaminsky is an expert on DNS security – and he's saying: Patch right God damn now

Crazy Operations Guy

Re: Porper use of malloc()

This is in my programs, I'm not modifying glibc. My point is that when you are accepting input, never assume that its the size you expect, so plan for it being way too large. A buffer under-flow can be safely handled by an exception in whatever piece of code is handling the data, a buffer overflow, on the other hand, could mean that the system is fully compromised.

Crazy Operations Guy

Porper use of malloc()

Am I the only person that when a function accepts input from a network, I have the function do malloc( NET_INTERFACE_MTU * INPUT_SEGMENTS) for any unknown-length inputs? I then copy a specific number of bytes out of that variable into the variable I'll actually work with. I do the same when working with files; malloc(FS_BLOCK_SIZE * FS_BLOCKS).

RAM is cheap, and with the typical packet being a mere 1.5 KB each and filesystem blocks being 512-1024 Bytes, I don't mind using extra RAM if it means preventing buffer overflows, especially since nowadays even the higher-end RAM is less than $10/GB...

Crazy Operations Guy

Re: I have a retina iMac

OS X uses the same glibc as the vast majority of open source OSes, so its quite likely you are vulnerable. Also, what the fuck does your type of monitor have to do with the software running it?

No tit for tat, or should that be tat for tit ... Women selling stuff on eBay get lower bids

Crazy Operations Guy

Scope of the study

What geographical regions did they study? If they were just studying Amazon and eBay within Israel, then I'm surprised that the gap was only 20 cents on the dollar.

A proper study would've broken it down by region, if not country. Gender inequality is definitely a cultural thing and ignoring that make the data less than useless. Who does it help when you combine gender data from a place like Saudi Arabia or Afghanistan, where you're likely to see an eBay auction -for- a woman; and a place like Sweden or Germany, which were founded on the concept that if you can cleave a Roman's head in two with a battle, you're a warrior no matter what is in your pants.

Funny how there seems to a correlation between sexism and how theocratic a country is...

Alleged Anonymous hacker rescued off Cuba by Disney cruise ship

Crazy Operations Guy

"causing damage estimated at over $300,000."

Its a hospital, the human cost is far more important than the cash. Besides, $300,000 is nothing to a hospital's IT budget since anything they buy has had its price inflated by at least a factor of 10 due to it being 'medical grade'...

Gird your coins: A phishing tsunami is smashing into America

Crazy Operations Guy

Easy way to identify a fake

If an email or SMS message is claiming to be from a government agency, its obviously a fake; governments are too incompetent to use any technology made after 1965; seeing as no politicians seems to know how one of those new-fangled 'comm-poot-ors' work and all.

I worked as a contractor for the Senate for a while, there are far too many senators that have their staff print all their emails so that they can read it, and then have their secretary dictate a response. I personally knew of 5 of them that did that and I heard about several others from the other IT folk while I worked there. One of them is a prominent member of several computer/telecom related committees...

Android Xbot trojan poses as banking app, nicks your login creds

Crazy Operations Guy

Never underestimate the stupidity of the average user. I figure that they could pull off this ruse by offering free money and requiring them to verify their bank account (similar to PayPal's bank account verification works by depositing a random amount of money into your account and you verify you own that account by typing in that value and a random number added into the transaction description which would show as POS/PAYPAL*12345678901)

El Reg blows chow down at Justretch.com

Crazy Operations Guy

Re: expert sex-change, dot com

" you've seen your free tech tip, now pay up."

Except if you were smart enough to just look at the source... They eventually fixed that, but it was a pretty hilarious failure on their part. Maybe they were charging so they could hire a proper web developer.

Crazy Operations Guy

Re: [citation needed]

"Penisland.com was/is a prank."

Not originally. I actually was a shop that sold specialty pens, but they were losing quite a bit of money hosting the website when no one wanted to buy anything, so when a porn company came along, offering to buy the domain for a ridiculous sum of cash, they jumped on that as quickly as possible.

519070 or blank: The PINs that can pwn 80k online security cams

Crazy Operations Guy

"The Internet of Things is going to be great, isn't it!"

For me it will be. Before, I needed to pay out the nose for a machine elsewhere on the internet so I can test what external users see of my network. Now its just a quick trip over to Shodan, and away I go...

Comodo's 'security' kit installed a lame VNC server on PCs on the sly

Crazy Operations Guy

Upgrade by uninstalling

No security software is far better than this piece of crap. At least by going bare, the user would be a bit more cautious rather than relying on the AV to protect them.

Really, remote support should be relayed through an SSH connection with the support person sending their public key to the user to be supported. The support application would then add that to the authorized_users file, which is normally left completely blank. The support certificate would be created by a CA set up for that purpose and its public key added to the AV product. This way, the VNC server remains fully secure until its needed, and when they do connect, bot ends can be validated. No passwords to deal with, just secure connections. And the certificate the support person is using could be made single-use by revoking it once the end user confirms the ticket is closed and the issue fixed.

Yahoo! axes! websites! you've! never! heard! of! and! lays! off! staff!

Crazy Operations Guy

Re: Good, hope they tank.

"Configure the email server to redirect all inbound mail to that address to /dev/null"

Then why create the account in the first place? If you're just throwing the account away like that, then you could just as well a fake address to begin with.

I do something similar, except I use the maildir format and just drop it into a directory. I dropped a cheap 1 TB disk onto my mail server (Actually an old disk from when I upgraded my NAS), so I can store my junk mail for many many years. There might be something useful in there, or at the very least, useful data to train my spam filters.

Locky ransomware is spreading like the clap

Crazy Operations Guy

I got a promotion because the head admin was logged into a domain controller for our root domain with his 'Enterprise Admin' account and decided that it was a good time to watch some borderline-illegal porn (Seeing as how the domain controller was one of the few machines not behind the content filters yet had very-high speed connection to the itnernet). We ended up cleaning 75k+ machines because of that...

Filename-handling slip let attackers evade FireEye analysis

Crazy Operations Guy

Re: The batch script continues

And welcome to why PowerShell exists. The scripting capabilities are far, far superior and would easily prevent something like this from happening. Hell, VisualBasic would've been able to prevent this...

Uh-oh, no mo' dough to 'slow-mo' GoGo: American Airlines aims ammo at Wi-Fi pros

Crazy Operations Guy

Re: Good

American Airlines was were I learned that its possible to order an A320 with such spartan amenities. I mean cloth seats? Really? What kind of cheap-skate operation does something like that... My return flight was through Virgin America, only $20 more, the plane was the same model, but it had leather seats, full entertainment system (Seat-back display, game controller stored in the arm-rest, wide selection of media, charging ports (Both USB and 120v outlet), and much better lighting.

AA isn't bad, it just sucks compared to the other airlines.

This is what it looks like when your website is hit by nasty ransomware

Crazy Operations Guy

Re: Read-only filesystems

"I think you need a new name."

Wish I could change it...

I got the name several years back when we were doing massive amount of work on a 100,000+ physical machine datacenter. We were merging with another organization that was bringing 25,000 of their own boxes in. Plus there was all the OS / Application integration that had to take place as well. I ended up doing about 6 weeks of 15 hour days so I just went down to the local Ikea and bought a futon, a table, and a combination mini-fridge/microwave and set them up in a storage room attached to the DC. So for about a month I lived in the datacenter, the storage area was insulated enough that the temperature was just right and the servers' fans produced a comfortable level of white noise. Come to think of it, it was probably the best sleep I ever had...

Crazy Operations Guy

Read-only filesystems

When will people learn to use the RO flag on the partition they are using for their web documents?

The web boxen I'm responsible for are placed behind a load balancer and with code inserted into nginx's rc script that if /www/ is writable, it'll shut down immediately. I update the site by shutting down nginx, unmounting /www, running newfs against it, then extracting the tarball with the fresh contents into the new /www, remounting it as RO and starting nginx. In fact, every partition is mounted read-only by default, except /tmp and /var/log.

Its immune to defacement, malware, and even clumsy PFYs.

iPhones clock-blocked and crocked by setting date to Jan 1, 1970

Crazy Operations Guy

" date format between US mm/dd/yy and the rest of us should die in a fire"

Seconded. Which is why I write my dates as 13-Feb-2016. I'm an American, but its been over a decade since I last used our broken data format. Helps quite a bit when sending email to India since some places have started adopting the US data format, while others use the British format (hooray for outsourcing...)

Reluctant Wikipedia lifts lid on $2.5m internet search engine project

Crazy Operations Guy

" project costed at $2.5m"

How is it possible that Wikipedia goes through money so quickly? Are they burning it to heat the building? Seriously, it seems like every other week they're begging for more money...

Indonesian comms ministry orders 'gay emoji' block

Crazy Operations Guy

Re: Bah!

First, that joke was already made. Second, are you 13-year-old boy posting from 1992? That would be the only justification I can think of for posting something so juvenile.

Crazy Operations Guy

Its the 21st century, why are we still arguing over sexuality?

Why is it that society still gives a shit about what other people do with each other? The only thing that should matter to anyone else when it comes to sex is that all convoluted have given, and are capable of giving, consent to engage in sex.

Carly Fiorina makes like HP and splits – ex-CEO quits White House race

Crazy Operations Guy

Re: Bring Marshmallows...

Not the only hell for idiots voting for terrible people. Thatcher and Blair got into office...

Crazy Operations Guy

And good riddance

As a victim of her reign of terror, I must say that she will not be missed...

Microsoft hits the gas in drive to recruit autistic techies

Crazy Operations Guy

Re: Um, this is ridiculously illegal

There is absolutely nothing wrong with giving jobs to the disabled, but we shouldn't be giving people jobs -because- they are disabled. Especially since doing things like this dehumanizes the person and in the eyes if the employer, the become nothing more than their disability (It becomes 'we hired and autistic!' not 'We hired a person that happens to have autism')

Crazy Operations Guy

Um, this is ridiculously illegal

The Americans With Disabilities Act prevents an employer from asking about disabilities until after the person is hired, and only then, if the disability would prevent them from doing their job. The act also strictly forbids a company from making any hiring decisions based on a person's disability.

Beside, autism =/= genius. The rate of people with above average intelligence is no different between those with and those without autism. Autism doesn't affect intelligence, it is merely a lack of ability to automatically filter actions based on the social consequence of those actions. An affect that can be replicated with supportive supervisors and bosses.

What would also allow them to gain better perspectives would be to fix their hiring practices. They seem to prioritize candidates the same way that many, many other companies do:

1) Americans with Advanced degrees

2) Foreigners with advanced degrees

3) Offshore Contractors

99) People without a degree but are otherwise brilliant

I ran an experiment a few years back with a local tech company where I applied for two different job postings (Same exact job, but different group). One of my resumes included only my experience and no degree listed; the other was missing a lot of relevant experience but did list a Bachelor's of Arts degree from one of those crap safety schools in the mid-west. Guess which one I got called back for?