Archive

Category Archives for "Networking"

An SDN vulnerability forced OpenDaylight to focus on security

Open-source software projects are often well intended, but security can take a back seat to making the code work.OpenDaylight, the multivendor software-defined networking (SDN) project, learned that the hard way last August after a critical vulnerability was found in its platform.It took until December for the flaw, called Netdump, to get patched, a gap in time exacerbated by the fact that the project didn’t yet have a dedicated security team. After he tried and failed to get in touch with OpenDaylight, the finder of the vulnerability, Gregory Pickett, posted it on Bugtraq, a popular mailing list for security flaws.To read this article in full or to leave a comment, please click here

An SDN vulnerability forced OpenDaylight to focus on security

Open-source software projects are often well intended, but security can take a back seat to making the code work. OpenDaylight, the multivendor software-defined networking (SDN) project, learned that the hard way last August after a critical vulnerability was found in its platform. It took until December for the flaw, called Netdump, to get patched, a gap in time exacerbated by the fact that the project didn’t yet have a dedicated security team. After he tried and failed to get in touch with OpenDaylight, the finder of the vulnerability, Gregory Pickett, posted it on Bugtraq, a popular mailing list for security flaws.To read this article in full or to leave a comment, please click here

Go Go Gadget Networking Lab!

For the last few years, if you wanted to set up a virtual network environment (for testing purposes, or setting up a lab, etc), it was more or less a manual process of installing software like the CSR 1000v from an ISO or OVA. Rinse and repeat. If you were fortunate enough to work at a company with decent virtual machine automation and infrastructure (and had access to it) then you could in theory make this a little easier, but it’s hardly portable.

Go Go Gadget Networking Lab!

For the last few years, if you wanted to set up a virtual network environment (for testing purposes, or setting up a lab, etc), it was more or less a manual process of installing software like the CSR 1000v from an ISO or OVA. Rinse and repeat. If you were fortunate enough to work at a company with decent virtual machine automation and infrastructure (and had access to it) then you could in theory make this a little easier, but it’s hardly portable.

How to boot an encrypted system safely

These are my notes on how to set up a system securely, in a way that would prevent attackers from being capable of performing an “evil maid attack”.

The threat model

You have a Linux server that you want to protect against data theft and other backdoors. The attacker can get physical access to your hardware, for example by having access to the server room that houses your rack.

Your attacker is funded, but not super well funded. This will not protect you against intelligence agencies.

The attacker can buy a new server that looks just like the one you have. You will not be able to tell the difference from physical inspection.

You want to know that it’s safe to log in to your server after a suspicious power outage or reboot.

This solution assumes that once the system is booted and you log in, you have access to the secret data. In other words, this is not a protection for gaming consoles or kiosks.

Overview of the solution

First of all, full disk encryption using dm-crypt. Obviously. (other FDE also acceptable, of course)

Walking up to the server and typing the passphrase every reboot is not only tedious Continue reading

How to boot an encrypted system safely

These are my notes on how to set up a system securely, in a way that would prevent attackers from being capable of performing an “evil maid attack”.

The threat model

You have a Linux server that you want to protect against data theft and other backdoors. The attacker can get physical access to your hardware, for example by having access to the server room that houses your rack.

Your attacker is funded, but not super well funded. This will not protect you against intelligence agencies.

The attacker can buy a new server that looks just like the one you have. You will not be able to tell the difference from physical inspection.

You want to know that it’s safe to log in to your server after a suspicious power outage or reboot.

This solution assumes that once the system is booted and you log in, you have access to the secret data. In other words, this is not a protection for gaming consoles or kiosks.

Overview of the solution

First of all, full disk encryption using dm-crypt. Obviously. (other FDE also acceptable, of course)

Walking up to the server and typing the passphrase every reboot is not only tedious Continue reading

BGP Optimizer Causes Thousands Of Fake Routes

Earlier today many BGPmon users received one or more alerts informing them that their autonomous system (AS) started to announce a more-specific prefix. BGPmon classified many of these alerts as possible BGP man-in-the-middle (MITM) attacks. Here is an example alert:


====================================================================
Possible BGP MITM attack (Code: 21)
====================================================================
Your prefix: 23.20.0.0/15:
Prefix Description: acxiom-online.com --- Amazon EC2 IAD prefix
Update time: 2015-03-26 11:27 (UTC)
Detected by #peers: 24
Detected prefix: 23.21.112.0/20
Announced by: AS14618 (AMAZON-AES - Amazon.com, Inc.,US)
Upstream AS: AS3257 (TINET-BACKBONE Tinet SpA,DE)
ASpath: 4608 24130 7545 6939 40633 18978 3257 14618

The alert shows the user was monitoring 23.20.0.0/15, normally announced by Amazon, Inc. (AS14618). In this case however, the detected prefix was the more specific 23.21.112.0/20. The netblock owners would have verified their BGP announcements and quickly recognized they did not originate this more-specific prefix. Further analysis pointed to the suspicion that a bad actor was impersonating Amazon. BGPmon algorithms alerted to this as well, and–within moments of the initial change–marked these events as a possible BGP MITM attack.

Screen Shot 2015-03-26 at 1.16.15 PM
One reason for this classification is the way BGPmon understands and interprets AS Continue reading

Court throws out lawsuit over storage on iPhones, iPads

A federal court has dismissed a lawsuit against Apple over the amount of storage available in mobile devices that come with iOS 8.The district court in San Jose, California, threw out the proposed class-action suit on Wednesday after Apple filed a motion saying the plaintiffs failed to back up their arguments. The case was dismissed with prejudice, meaning the plaintiffs can’t sue Apple again for the same thing.In the suit, filed last December, Paul Orshan and Christopher Endara charged that Apple misled consumers about how much of the storage on iPhones and iPads was taken up by the OS. For example, they said a 16GB iPhone 6 really had just 13GB of capacity available.To read this article in full or to leave a comment, please click here

Court throws out lawsuit over storage on iPhones, iPads

A federal court has dismissed a lawsuit against Apple over the amount of storage available in mobile devices that come with iOS 8.The district court in San Jose, California, threw out the proposed class-action suit on Wednesday after Apple filed a motion saying the plaintiffs failed to back up their arguments. The case was dismissed with prejudice, meaning the plaintiffs can’t sue Apple again for the same thing.In the suit, filed last December, Paul Orshan and Christopher Endara charged that Apple misled consumers about how much of the storage on iPhones and iPads was taken up by the OS. For example, they said a 16GB iPhone 6 really had just 13GB of capacity available.To read this article in full or to leave a comment, please click here

Apple asks court to throw out lawsuit over storage on iPhones, iPads

Apple has asked a federal court to dismiss a lawsuit accusing it of misleading  customers about the amount of storage available in mobile devices that come  with iOS 8.Apple filed a motion for dismissal Wednesday at the district court in San Jose,  California, saying the plaintiffs failed to back up their arguments. It wants  the case dismissed with prejudice, which would prevent the plaintiffs from  suing Apple again for the same thing. Judge Edward Davila will now have to rule  on the motion.In the suit, filed last December, Paul Orshan and Christopher Endara charged that Apple misled consumers about how much of the storage on iPhones and iPads was taken up by the OS. For example, they said a 16GB iPhone 6 really had just 13GB of capacity available.To read this article in full or to leave a comment, please click here

Apple asks court to throw out lawsuit over storage on iPhones, iPads

Apple has asked a federal court to dismiss a lawsuit accusing it of misleading  customers about the amount of storage available in mobile devices that come  with iOS 8.Apple filed a motion for dismissal Wednesday at the district court in San Jose,  California, saying the plaintiffs failed to back up their arguments. It wants  the case dismissed with prejudice, which would prevent the plaintiffs from  suing Apple again for the same thing. Judge Edward Davila will now have to rule  on the motion.In the suit, filed last December, Paul Orshan and Christopher Endara charged that Apple misled consumers about how much of the storage on iPhones and iPads was taken up by the OS. For example, they said a 16GB iPhone 6 really had just 13GB of capacity available.To read this article in full or to leave a comment, please click here

Salt – The basics

In my last post, I showed you how I automated my Kubernetes lab build out by using Salt.  This took the build time and cut it by more than 70% (Im guessing here but you get the point).  In addition, I’ve been making all of my changes for the cluster in Salt rather than applying them directly to the host.  Not only does this give me better documentation, it allows me to apply changes across multiple nodes very quickly.  You might be wondering why I chose Salt since I’ve blogged about Chef in the past.  The answer isn’t cut and dry, but Salt just made sense to me.  On top of that, there is VERY good documentation out there about all of the state and state functions so it’s pretty easily consumable.    As I walk through the process I used to create the lab build scripts, I hope you’ll start to catch onto some of the reasons that made me decide to learn Salt.

Let’s start by taking a look at me GitHub repo…

imageWhile there’s a lot here, the pieces we really want to talk about are the files that end Continue reading

Flaw in common hotel router threatens guests’ devices

Corporate travelers should be warned that a Wi-Fi router commonly used in hotels is easily compromised, putting guests passwords at risk and opening up their computers to malware infections and direct attacks.The good news is that there is a patch for the flaw, but there is no guarantee affected hotels will install it right away.+ More on Network World: 10 young security companies to watch in 2015 +Cylance, a security vendor whose research team found the problem, says 277 InnGate routers in 29 countries are affected. The routers are made by ANTLabs.To read this article in full or to leave a comment, please click here

Flaw in common hotel router threatens guests’ devices

Corporate travelers should be warned that a Wi-Fi router commonly used in hotels is easily compromised, putting guests passwords at risk and opening up their computers to malware infections and direct attacks.The good news is that there is a patch for the flaw, but there is no guarantee affected hotels will install it right away.+ More on Network World: 10 young security companies to watch in 2015 +Cylance, a security vendor whose research team found the problem, says 277 InnGate routers in 29 countries are affected. The routers are made by ANTLabs.To read this article in full or to leave a comment, please click here

Cheap mobile subscriptions the bait as Euro operators become more aggressive

Consumers seem to be coming out on top as a growing number of European telecom and cable operators offer discounted mobile subscriptions as a bonus for choosing other services.Bundles with broadband, telephony and TV across fixed and mobile networks are becoming increasingly important for operators across the continent. The latest example is British operator BT, which on Wednesday announced its return to the consumer mobile market.The expressed goal is to offer the best-value, 4G SIM-only mobile deals as a reward for its broadband customers. The cheapest plan costs £5 (US$7.40) per month and includes 500MB of data, unlimited texts and 200 voice minutes. BT’s broadband subscribers can also choose a plan with 2GB of data, unlimited texts and 500 voice minutes for £12 per month, the operator said.To read this article in full or to leave a comment, please click here

Cheap mobile subscriptions the bait as Euro operators become more aggressive

Consumers seem to be coming out on top as a growing number of European telecom and cable operators offer discounted mobile subscriptions as a bonus for choosing other services.Bundles with broadband, telephony and TV across fixed and mobile networks are becoming increasingly important for operators across the continent. The latest example is British operator BT, which on Wednesday announced its return to the consumer mobile market.The expressed goal is to offer the best-value, 4G SIM-only mobile deals as a reward for its broadband customers. The cheapest plan costs £5 (US$7.40) per month and includes 500MB of data, unlimited texts and 200 voice minutes. BT’s broadband subscribers can also choose a plan with 2GB of data, unlimited texts and 500 voice minutes for £12 per month, the operator said.To read this article in full or to leave a comment, please click here

Nigeria joins list of African countries threatening prison sentences for mobile operators

Nigeria, Africa’s largest telecom market, has joined the list of countries on the continent that will impose prison sentences on officials at mobile operators that continually fail to deliver quality services to customers.Tanzania and Zambia are among African countries imposing prison sentences on mobile operators who do not provide quality telecom services.The Nigeria Consumer Protection Council (CPC) has warned mobile phone operators that it would soon start filing criminal charges against them as a way of whipping them to order. The consumer watchdog, supervised by the Nigerian government under the Federal Ministry of Trade and Investment, said lack of strict punishment for erring companies had led to a situation where consumers no longer get value for their money in the West African country.To read this article in full or to leave a comment, please click here

Hands on: AT&T Velocity hits the WiFi hotspot

AT&T Velocity I’m using the ZTE-built AT&T Velocity WiFi hotspot as I write up my quickie review of the device here, and sure enough it’s providing me with ample speed as I fact check on the web during this process. The basic purpose for the device is to provide you with 2.4- or 5-GHz WiFi Internet access – via an AT&T 4G LTE connection -- when you can’t find free or safe WiFi in the wild. You just need to make sure you’re not somewhere that blocks usage of such devices – a practice frowned upon by the FCC.To read this article in full or to leave a comment, please click here

US lawmakers push for auctions of gov’t spectrum

A group of U.S. lawmakers has reintroduced legislation aimed at encouraging government agencies to give up their spectrum by allowing the agencies to share in the profits when the spectrum is auctioned to commercial mobile carriers.The Federal Spectrum Incentive Act, introduced in both the Senate and the House of Representatives Thursday, mirrors legislation that was introduced in the House in 2013 but failed to pass. But the need for the bill is growing, sponsors argue, because of the skyrocketing consumer demand for commercial mobile and unlicensed WiFi spectrum.To read this article in full or to leave a comment, please click here