Tweet By Phone

February 1, 2011

Google and Twitter have teamed up to help the Egyptian populace spread news on the Internet, despite the country shutting down all of its Internet traffic this week. They set up a service to allow tweets to be posted with the tag #egypt by calling a certain set of phone numbers; essentially, anyone with access to voice communication also has access to post on the Internet.

Kudos to everyone involved. As I read once, the Internet will interpret censorship as damage, and route around it.


Definition Monday: Virtual Private Networks

January 31, 2011

Welcome to Definition Monday, where we define and explain a common technology or security concept for the benefit of our less experienced readers. This week: Virtual Private Networks.

Virtual Private Networks, commonly referred to as “VPNs” for the sake of brevity, are a common technology in today’s corporate networks. The concept behind them is simple – provide a way for two geographically distinct sites to appear to be on the same internal LAN, so that the users and computers on those networks can share resources. At the same time, of course, those resources need to be protected from the users of the Internet at large.

Back in the Dark Ages, when I started working in IT, connecting two sites to one another required either either laying fresh cable or (more likely) leasing a connection from the local telecom monopoly. You would call up the corporate sales office for your RBOC and tell them that you needed a T-1 or T-3 or Frame Relay connection between two sites, and they would quote you an outrageous price. You would then pay it, because you had no other options, and would receive a slow-by-today’s-standards dedicated connection between the two locations. Your satellite office could now access internal resources in your main office.

Now, dedicated lines weren’t all bad, of course – they were reliable, for the most part, and secure. But they were very pricey, and not a geographically flexible technology; if you signed that contract, your satellite office wasn’t going to be moving for a long, long time.

VPNs give that same sort of functionality, but without the physical networking path. Essentially, a VPN is a cryptographically secure tunnel between two sites on the Internet. Traffic flows through, from one side to the other, securely wrapped in something like IPsec and unaware of the transition between networks. From the point of view of the end user’s applications, it is a transparent technology.

One implementation style of VPN is the client-server model, as seen above: this is when a remote worker needs to access corporate resources, and so he or she runs a VPN software client on a computer at a remote location to connect to the corporate network. This allows the client to have a network address on the corporate network; it’s essentially the same as just giving the client a very, very long Ethernet cable and plugging it in behind the corporate firewall. All traffic intended for the corporate network, symbolized by the green line above, passes through the firewall and is able to access the internal corporate network directly.

Another style is the site-to-site, or LAN-to-LAN, model. This is the replacement for the dedicated leased line model above; traffic is transparently routed through a tunnel between the edge of one network and the VPN concentrator on another network. Using the same green line as in the previous example, you see that the encrypted tunnel actually starts at the router that the client computer is connected to, rather than at the client computer itself. This would be used when setting up a remote or satellite office. But since the VPN is not tied to a physical wiring structure, as with a leased line, this can be used to set up a temporary office “in the field”.

Which approach is correct? It depends on a lot of factors – how many people will be using the VPN, how permanent a satellite location is, what sort of authentication and authorization schemes you have in place or need to be implemented. But independent of the details, the VPN technology as a whole is an excellent tool for a geographically dispersed business that needs to share computer resources among employees while protecting them from the Internet at large.


Netflix Throughput Charts

January 28, 2011

As a provider of high-definition video streams, Netflix is in a unique position to determine the sustained bandwidth that is commonly available to the customers of broadband ISPs. And, because they are such generous souls, they’ve chosen to share that information. In graphical form, no less.

The winners? Charter, in the US, and Rogers in Canada.


Huawei Cipher Weakness

January 28, 2011

According to this post on Bugtraq earlier this week, the Huawei HG520 and HG530 home WAPs have a weak generation scheme for the default encryption key – it can be generated from the device’s MAC address. And since the MAC address is available to anyone on the network, that means that the encryption key can be generated by anyone who is passively eavesdropping on traffic.

Just another example of why you should never, ever, use the vendor’s default password for anything. Even if it’s “secure” and “unique”. There has to be some way to generate it reliably during manufacturing, and that algorithm is rarely secure enough to rely upon.


Facebook HTTPS

January 27, 2011

Facebook is adding https functionality spanning the entire web site. Previously, only pages that required authentication credentials to be entered were encrypted; this meant that authentication cookies could be captured in plaintext, as with the Firesheep tool. This should put an end to that.

The capability can be activated by end users on the “Account Settings” page.


HTTP Status Code Harvesting

January 26, 2011

An excellent example of using http status codes to determine what other pages a web user is currently logged in to. This would be useful in many environments – say, adding a “Check out our Facebook Page!” link to a corporate home page when determining that the user is currently logged into their own Facebook account.


File Transfer Via DNS Query

January 25, 2011

The always-resourceful Johannes Ullrich has posted an excellent step-by-step tutorial on the Internet Storm Center outlining a method for performing file transfers using DNS queries and tools built into a typical Linux installation (specifically, xxd and dig).

If you start seeing lots of hexadecimal A record queries showing up in your named.log — you might have a problem.


Domain Blocking 2010

January 25, 2011

OpenDNS has released a report [warning: PDF file] on the white- and blacklisting of domains in 2010. Interestingly, Facebook was the single most commonly blocked site – but it was also the second most commonly whitelisted site. This means that networks that disallowed social networking sites in general were still likely to make an exception for Facebook, likely owing to its popularity as a legitimate marketing tool.

Apparently the bad guys were also aware of this. The report indicates that Facebook is the second most commonly spoofed site for phishing attacks, behind only Paypal.


Facebook and Tunisia

January 25, 2011

A fascinating story in The Atlantic about the cat-and-mouse game between the Tunisian government and Facebook during the recent political unrest. Ammar, the governmental security apparatus, strongarmed the ISPs that Tunisian citizens were using into running domain-level keylogging. Essentially, they were stealing an entire country’s worth of passwords.

The Facebook developers responded with an ingenious technical hack to get around the key capture. All password submissions were pushed over an encrypted channel, and also required the user to identify a friend from his or her accounts. Ingenious – the passwords as a single authentication token were rendered useless.


Websites for Sale

January 22, 2011

Ever wanted to have administrator access to a .edu or a .mil site? According to the blog at Imperva’s web site, now is your chance.

For prices ranging up to $499, you can purchase the credentials for full administrative access to a variety of sites. If you’d rather just have the PII (Personally Identifiable Information) instead, that’s also available.

Odds are good that this information and access was gathered using simple, automated, run-of-the-mill SQL Injection attacks and other simple web vulnerabilities. If your web site is running code written by amateurs, or even by seasoned programmers without the experience to write secure code on the web, you should probably look into a vulnerability assessment or code audit. After all, it’s better to find the hole yourself before the bad guys do, right?