Legacy TLS cipher support in Firefox

After upgrading Firefox recently, I noticed that I could no longer access certain embedded devices via HTTPS. It seems that recent versions of Firefox and Chrome no longer support certain TLS ciphers due to recently discovered vulnerabilities. That's all well and good, except the error returned offers no recourse if you need to connect anyway.

firefox_error.png

Firefox returns the error SSL_ERROR_NO_CYPHER_OVERLAP with no option to temporarily allow connectivity. (Chrome reports a similar error named ERR_SSL_VERSION_OR_CIPHER_MISMATCH.) Presumably, this choice was made by the developers with the intention of forcing people to upgrade outdated devices. Unfortunately, in order to upgrade an out-of-date device, we typically must first be able to connect to it. I wasted a fair bit of time digging up a solution, so I figured I'd document the workaround here for when I inevitably run into this problem again a year from now and have forgotten what I did.

Continue reading · 2 comments

5 affordable MDM options for small businesses

Affordable MDM options for small businessesImage by ThinkstockSmall and medium sized businesses (SMBs) have embraced BYOD. In a study of SMBs from the IT community, Spiceworks, 61 percent of respondents said they have a BYOD policy in place. However, the same study found that 56 percent of that group also said they had not implemented any mobile device management (MDM) strategies and didn't have plans to do so within the next six months. While BYOD might allow these smaller businesses to save on hardware costs, it does open up unique risks for IT. With employees running on varying operating systems and hardware, it becomes difficult to implement secure solutions across the board, leaving sensitive data at risk. If just one employee's tablet falls into the wrong hands, you're going to wish you had some way to remotely wipe data on that device. But small businesses also have small IT departments -- sometimes consisting of only one person -- so a BYOD management strategy needs be straightforward, affordable and low-maintenance. Just because your business doesn't have a big budget or a large staff doesn't mean you can't ensure that all your corporate data remains secure, no matter where Continue reading

How Anaplan makes dynamic strategic planning a reality

Anaplan doesn’t come up in many conversations about unicorns – you know, the Ubers, Airbnbs and SnapChats of the world. But if your company is struggling with strategic planning, Anaplan is one unicorn you’ll want to learn more about. San Francisco-headquartered Anaplan’s cloud-based platform replaces spreadsheet mania as a way to handle large-scale strategic planning in real time. Companies such as HP, Intel and Morgan Stanley are streamlining sales management, forecasting and a variety of other applications using Anaplan, which simplifies life for everyone from senior managers to model builders and end users.To read this article in full or to leave a comment, please click here(Insider Story)

IDG Contributor Network: 8 tech ‘megatrends’ that are about to change business

An assemblage of technological breakthroughs are rapidly morphing to create massive changes in how businesses operate.Artificial intelligence (AI), blockchain and Internet of Things (IoT) are just three of eight crucial “megatrends” that strategy consulting firm PricewaterhouseCoopers (PwC) says is going to significantly distort business.Those new forces should clearly be planned for. And although the consulting firm's advice is aimed at generalized CEOs, it's IT and technical teams that will have to lay the groundwork.Robots, augmented reality (AR), 3D printing, drones and virtual reality (VR) are also among PwC’s pick of “essential eight technologies” that the firm says in its report (PDF) (released during the summer) need to be considered by company chiefs to move their operations forward.To read this article in full or to leave a comment, please click here

Lawmakers want UK to set example on transparency in AI decision making

British lawmakers want more transparency and less bias in decision-making -- not their own, of course, but in decisions made by AI systems.As more and more software systems and connected devices employ artificial intelligence technologies to make decisions for their owners, the lawmakers want to know what's behind their thinking. The U.K. Parliament's Science and Technology Committee has been studying the need for more regulation in the fields of robotics and artificial intelligence.Recent advances in AI technology raise a host of social, ethical and legal questions, the committee's members said in a report published Wednesday.To read this article in full or to leave a comment, please click here

Reaction: DNS is Part of the Stack

Over at ipspace.net, Ivan is discussing using DNS to program firewall rules—

Could you use DNS names to translate human-readable rules into packet filters? The traditional answer was “no, because I don’t trust DNS”.

This has been a pet peeve of mine for some years—particularly after my time at Verisign Labs, looking at the DNS system, and its interaction with the control plane, in some detail. I’m just going to say this simply and plainly; maybe someone, somewhere, will pay attention—

The Domain Name System is a part of the IP networking stack.

Network engineers and application developers seem to treat DNS as some sort of red-headed-stepchild; it’s best if we just hide it in some little corner someplace, and hope someone figures out how to make it work, but we’re not going to act like it should or will work. We’re just going to ignore it, and somehow hope it goes away so we don’t have to deal with it.

Let’s look at some of the wonderful ideas this we’ll just ignore DNS has brought us over the years, like, “let’s embed the IP address in the packet someplace so we know who we’re talking to,” and “we Continue reading

Lessons Learned from Scaling Uber to 2000 Engineers, 1000 Services, and 8000 Git repositories

For a visual of the growth Uber is experiencing take a look at the first few seconds of the above video. It will start in the right place. It's from an amazing talk given by Matt Ranney, Chief Systems Architect at Uber and Co-founder of Voxer: What I Wish I Had Known Before Scaling Uber to 1000 Services (slides).

It shows a ceaseless, rhythmic, undulating traffic grid of growth occurring in a few Chinese cities. This same pattern of explosive growth is happening in cities all over the world. In fact, Uber is now in 40 cities and 70 countries. They have over 6000 employees, 2000 of whom are engineers. Only a year and half a go there were just 200 engineers. Those engineers have produced over 1000 microservices which are stored in over 8000 git repositories.

That's crazy 10x growth in a crazy short period of time. Who has experienced that? Not many. And as you might expect that sort of unique, compressed, fast paced, high stakes experience has to teach you something new, something deeper than you understood before.

Matt is not new to this game. He was co-founder of Voxer, which experienced its Continue reading

IDG Contributor Network: A night to remember: Engineering lessons from the Titanic

Some 31 years ago, the RMS Titanic was discovered resting on the ocean floor. The legend of its sinking has been retold many times in books and movies. One compelling aspect of the story is the safety claims made by its creators. Even as reports of the disaster began to filter into New York, the vice president of the White Star Line stated, without qualification, “We place absolute confidence in the Titanic. We believe that the boat is unsinkable.” Obviously reality betrayed those maritime engineers’ confidence.What lessons might this famous disaster teach engineers in modern data centers? In particular, how do we prevent hostile attacks—the “icebergs” that lurk on the seas we sail—from causing catastrophic breaches?To read this article in full or to leave a comment, please click here

IDG Contributor Network: A night to remember: Engineering lessons from the Titanic

Some 31 years ago, the RMS Titanic was discovered resting on the ocean floor. The legend of its sinking has been retold many times in books and movies. One compelling aspect of the story is the safety claims made by its creators. Even as reports of the disaster began to filter into New York, the vice president of the White Star Line stated, without qualification, “We place absolute confidence in the Titanic. We believe that the boat is unsinkable.” Obviously reality betrayed those maritime engineers’ confidence.What lessons might this famous disaster teach engineers in modern data centers? In particular, how do we prevent hostile attacks—the “icebergs” that lurk on the seas we sail—from causing catastrophic breaches?To read this article in full or to leave a comment, please click here

IDG Contributor Network: A night to remember: Engineering lessons from the Titanic

Some 31 years ago, the RMS Titanic was discovered resting on the ocean floor. The legend of its sinking has been retold many times in books and movies. One compelling aspect of the story is the safety claims made by its creators. Even as reports of the disaster began to filter into New York, the vice president of the White Star Line stated, without qualification, “We place absolute confidence in the Titanic. We believe that the boat is unsinkable.” Obviously reality betrayed those maritime engineers’ confidence.What lessons might this famous disaster teach engineers in modern data centers? In particular, how do we prevent hostile attacks—the “icebergs” that lurk on the seas we sail—from causing catastrophic breaches?To read this article in full or to leave a comment, please click here

Review: Pearl RearVision quickly retrofits a backup camera to your old jalopy (with video)

The scoop: RearVision backup camera license plate bracket, by Pearl Auto, about $500.What is it? This package includes a license plate bracket for the back of your automobile, but it’s not an ordinary bracket. Inside are two video cameras that provide you with a view for behind your car. The system includes an on-board diagnostics adapter (OBD) that communicates with the camera via Bluetooth and Wi-Fi to your smartphone to provide the view. The cameras are charged via solar sensors, so you don’t need to have a professional installation in order to power up the cameras. To complete the package, the system includes a mounting bracket for either your car’s dashboard or air vents, depending on your personal preference (or state laws that prohibit dashboard mounts).To read this article in full or to leave a comment, please click here

Foreign spies used RAT to hack Australian weather bureau with weak security controls

Foreign spies made off with an “unknown quantity of documents” after infecting Australia’s meteorology bureau with a RAT, but the fact that security controls at the bureau were “insufficient” even for common cybercrime threats only helped the “state-sponsored cyber adversaries.”After Australia’s Bureau of Meteorology systems was hacked, unnamed government officials immediately blamed China and China immediately denied the “groundless accusations.” When the hack hit the news in December 2015, the Bureau of Meteorology (BOM) would not confirm if its systems had been compromised. In April, Australian’s Prime Minister did confirm there had been a “significant cyber intrusion” at the Bureau.To read this article in full or to leave a comment, please click here

Foreign spies used RAT to hack Australian weather bureau with weak security controls

Foreign spies made off with an “unknown quantity of documents” after infecting Australia’s meteorology bureau with a RAT, but the fact that security controls at the bureau were “insufficient” even for common cybercrime threats only helped the “state-sponsored cyber adversaries.”After Australia’s Bureau of Meteorology systems was hacked, unnamed government officials immediately blamed China and China immediately denied the “groundless accusations.” When the hack hit the news in December 2015, the Bureau of Meteorology (BOM) would not confirm if its systems had been compromised. In April, Australian’s Prime Minister did confirm there had been a “significant cyber intrusion” at the Bureau.To read this article in full or to leave a comment, please click here

Galaxy Note 7 flameout: Worst-case scenario

As readers are now no doubt aware, the Samsung Galaxy Note 7 phablet has been on fire lately. Literally. To the point where the Korean manufacturer has given up on fixing the design and killed the entire project. Buyers have been told to stop using the phones and return them in, get this, a fireproof box.+ Also on Network World: The Note 7 is dead: What Samsung must do now +Given the Galaxy Note 7’s propensity for spontaneous combustion and Samsung’s inability to definitively fix the problem, the move shouldn’t come as too much of a surprise. Still, the fallout from Galaxy Note 7 debacle will be felt far and wide, and not just by Samsung and the users and sellers of this particularly flawed device.To read this article in full or to leave a comment, please click here

TLS nonce-nse

One of the base principles of cryptography is that you can't just encrypt multiple messages with the same key. At the very least, what will happen is that two messages that have identical plaintext will also have identical ciphertext, which is a dangerous leak. (This is similar to why you can't encrypt blocks with ECB.)

One Does Not Simply

If you think about it, a pure encryption function is just like any other pure computer function: deterministic. Given the same set of inputs (key and message) it will always return the same output (the encrypted message). And we don't want an attacker to be able to tell that two encrypted messages came from the same plaintext.

Same inputs, same output

The solution is the use of IVs (Initialization Vectors) or nonces (numbers used once). These are byte strings that are different for each encrypted message. They are the source of non-determinism that is needed to make duplicates indistinguishable. They are usually not secret, and distributed prepended to the ciphertext since they are necessary for decryption.

The distinction between IVs and nonces is controversial and not binary. Different encryption schemes require different properties to be secure: some just need them to never repeat, in which case we commonly Continue reading