Information Security News mailing list archives
CRYPTO-GRAM, July 15, 2003
From: InfoSec News <isn () c4i org>
Date: Wed, 16 Jul 2003 02:44:55 -0500 (CDT)
Forwarded from: Bruce Schneier <schneier () counterpane com>
CRYPTO-GRAM
July 15, 2003
by Bruce Schneier
Founder and CTO
Counterpane Internet Security, Inc.
schneier () counterpane com
<http://www.counterpane.com>
A free monthly newsletter providing summaries, analyses, insights, and
commentaries on computer security and cryptography.
Back issues are available at
<http://www.counterpane.com/crypto-gram.html>. To subscribe, visit
<http://www.counterpane.com/crypto-gram.html> or send a blank message
to crypto-gram-subscribe () chaparraltree com.
Copyright (c) 2003 by Counterpane Internet Security, Inc.
** *** ***** ******* *********** *************
In this issue:
How to Fight
The Doghouse: YTech
More E-mail Filtering Idiocy
News
Counterpane News
Security Notes from All Over: Red Wine
Password Safe
Crying Wolf
Comments from Readers
** *** ***** ******* *********** *************
How to Fight
I landed in Los Angeles at 11:30 PM, and it took me another hour to get
to my hotel. The city was booked, and I was lucky to get a reservation
where I did. When I checked in, the clerk insisted on making a
photocopy of my driver's license. I tried fighting, but it was no
use. I needed the hotel room. There was nowhere else I could go. The
night clerk didn't really care if he rented the room to me or not. He
had rules to follow, and he was going to follow them.
My wife needed a prescription filled. Her doctor called it in to a
local pharmacy, and when she went to pick it up the pharmacist refused
to fill it unless she disclosed her personal information for his
database. The pharmacist even showed my wife the rule book. She found
the part where it said that "a reasonable effort must be made by the
pharmacy to obtain, record, and maintain at least the following
information," and the part where is said: "If a patient does not want a
patient profile established, the patient shall state it in writing to
the pharmacist. The pharmacist shall not then be required to prepare a
profile as otherwise would be required by this part." Despite this,
the pharmacist refused. My wife was stuck. She needed the
prescription filled. She didn't want to wait the few hours for her
doctor to phone the prescription in somewhere else. The pharmacist
didn't care; he wasn't going to budge.
I had to travel to Japan last year, and found a company that rented
local cell phones to travelers. The form required either a Social
Security number or a passport number. When I asked the clerk why, he
said the absence of either sent up red flags. I asked how he could
tell a real-looking fake number from an actual number. He said that if
I didn't care to provide the number as requested, I could rent my cell
phone elsewhere, and hung up on me. I went through another company to
rent, but it turned out that they contracted through this same company,
and the man declined to deal with me, even at a remove. I eventually
got the cell phone by going back to the first company and giving a
different name (my wife's), a different credit card, and a made-up
passport number. Honor satisfied all around, I guess.
It's stupid security season. If you've flown on an airplane, entered a
government building, or done any one of dozens of other things, you've
encountered security systems that are invasive, counterproductive,
egregious, or just plain annoying. You've met people -- guards,
officials, minimum-wage workers -- who blindly force you to follow the
most inane security rules imaginable.
Is there anything you can do?
In the end, all security is a negotiation among affected players:
governments, industries, companies, organizations, individuals,
etc. The players get to decide what security they want, and what
they're willing to trade off in order to get it. But it sometimes
seems that we as individuals are not part of that
negotiation. Security is more something that is done to us.
Our security largely depends on the actions of others and the
environment we're in. For example, the tamper resistance of food
packaging depends more on government packaging regulations than on our
purchasing choices. The security of a letter mailed to a friend
depends more on the ethics of the workers who handle it than on the
brand of envelope we choose to use. How safe an airplane is from being
blown up has little to do with our actions at the airport and while on
the plane. (Shoe-bomber Richard Reid provided the rare exception to
this.) The security of the money in our bank accounts, the crime rate
in our neighborhoods, and the honesty and integrity of our police
departments are out of our direct control. We simply don't have enough
power in the negotiations to make a difference.
I had no leverage when trying to check in without giving up a photocopy
of my driver's license. My wife had no leverage when she tried to fill
her prescription without divulging a bunch of optional personal
information. The only reason I had leverage renting a phone in Japan
was because I deliberately sneaked around the system. If I try to
protest airline security, I'm definitely going to miss my flight and I
might get myself arrested. There's no parity, because those who
implement the security have no interest in changing it and no power to
do so. They're not the ones who control the security system; it's best
to think of them as nearly mindless robots. (The security system
relies on them behaving this way, replacing the flexibility and
adaptability of human judgment with a three-ring binder of "best
practices" and procedures.)
It would be different if the pharmacist were the owner of the pharmacy,
or if the person behind the registration desk owned the hotel. Or even
if the policeman were a neighborhood beat cop. In those cases, there's
more parity. I can negotiate my security, and he can decide whether or
not to modify the rules for me. But modern society is more often
faceless corporations and mindless governments. It's implemented by
people and machines that have enormous power, but only power to
implement what they're told to implement. And they have no real
interest in negotiating. They don't need to. They don't care.
But there's a paradox. We're not only individuals; we're also
consumers, citizens, taxpayers, voters, and -- if things get bad enough
-- protestors and sometimes even angry mobs. Only in the aggregate do
we have power, and the more we organize, the more power we have.
Even an airline president, while making his way through airport
security, has no power to negotiate the level of security he'll receive
and the tradeoffs he's willing to make. In an airport and on an
airplane, we're all nothing more than passengers: an asset to be
protected from a potential attacker. The only way to change security
is to step outside the system and negotiate with the people in
charge. It's only outside the system that each of us has power:
sometimes as an asset owner, but more often as another player. And it
is outside the system that we will do our best negotiating.
Outside the system we have power, and outside the system we can
negotiate with the people who have power over the security system we
want to change. After my hotel stay, I wrote to the hotel management
and told them that I was never staying there again. (Unfortunately, I
am collecting an ever-longer list of hotels I will never stay in
again.) My wife has filed a complaint against that pharmacist with the
Minnesota Board of Pharmacy. John Gilmore has gone further: he hasn't
flown since 9/11, and is suing the government for the constitutional
right to fly within the U.S. without showing a photo ID.
Three points about fighting back. First, one-on-one negotiations --
customer and pharmacy owner, for example -- can be effective, but they
also allow all kinds of undesirable factors like class and race to
creep in. It's unfortunate but true that I'm a lot more likely to
engage in a successful negotiation with a policeman than a black person
is. For this reason, more stylized complaints or protests are often
more effective than one-on-one negotiations.
Second, naming and shaming doesn't work. Just as it doesn't make sense
to negotiate with a clerk, it doesn't make sense to insult
him. Instead say: I know you didn't make the rule, but if the people
who did ever ask you how it's going, tell them the customers think the
rule is stupid and insulting and ineffective." While it's very hard
to change one institution's mind when it is in the middle of a fight,
it is possible to affect the greater debate. Other companies are
making the same security decisions; they need to know that it's not
working.
Third, don't forget the political process. Elections matter; political
pressure by elected officials on corporations and government agencies
has a real impact. One of the most effective forms of protest is to
vote for candidates who share your ideals.
The more we band together, the more power we have. A large-scale
boycott of businesses that demand photo IDs would bring about a
change. (Conference organizers have more leverage with hotels than
individuals. The USENIX conferences won't use hotels that demand ID
from guests, for example.) A large group of single-issue voters
supporting candidates who worked against stupid security would make a
difference.
Sadly, I believe things will get much worse before they get
better. Many people seem not to be bothered by stupid security; it
even makes some feel safer. In the U.S., people are now used to
showing their ID everywhere; it's the new security reality
post-9/11. They're used to intrusive security, and they believe those
who say that it's necessary.
It's important that we pick our battles. My guess is that most of the
effort fighting stupid security is wasted. No hotel has changed its
practice because of my strongly worded letters or loss of
business. Gilmore's suit will, unfortunately, probably lose in
court. My wife will probably make that pharmacist's life miserable for
a while, but the practice will probably continue at that chain
pharmacy. If I need a cell phone in Japan again, I'll use the same
workaround. Fighting might brand you as a troublemaker, which might
lead to more trouble.
Still, we can make a difference. Gilmore's suit is generating all
sorts of press, and raising public awareness. The Boycott Delta
campaign had a real impact: passenger profiling is being revised
because of public complaints. And due to public outrage, Poindexter's
Terrorism (Total) Information Awareness program, while not out of
business, is looking shaky.
When you see counterproductive, invasive, or just plain stupid
security, don't let it slip by. Write the letter. Create a Web
site. File a FOIA request. Make some noise. You don't have to join
anything; noise need not be more than individuals standing up for
themselves.
You don't win every time. But you do win sometimes.
Privacy International's Stupid Security Awards:
<http://www.privacyinternational.org/activities/stupidsecurity/>
Stupid Security Blog:
<http://www.stupidsecurity.com/>
Companies Cry 'Security' to Get A Break From the Government:
<http://online.wsj.com/article_email/0,,SB10541572621041000,00.html>
Gilmore's suit:
<http://freetotravel.org/>
Relevant Minnesota pharmacist rules:
<http://www.revisor.leg.state.mn.us/arule/6800/3110.html>
How you can help right now:
Tell Congress to Get Airline Security Plan Under Control!
<http://actioncenter.ctsg.com/admin/adminaction.asp?id=2557>
TIA Update: Ask Your Senators to Support the Data-Mining Moratorium Act
of 2003!
<http://actioncenter.ctsg.com/admin/adminaction.asp?id=2401>
Congress Takes Aim at Your Privacy
<http://actioncenter.ctsg.com/admin/adminaction.asp?id=1723>
Total Information Awareness: Public Hearings Now!
<http://actioncenter.ctsg.com/admin/adminaction.asp?id=2347>
Don't Let the INS Violate Your Privacy
<http://actioncenter.ctsg.com/admin/adminaction.asp?id=2436>
Demand the NCIC Database Be Accurate
<http://www.petitiononline.com/mod_perl/signed.cgi?ncic>
Citizens' Guide to the FOIA
<http://www.fas.org/sgp/foia/citizen.html>
** *** ***** ******* *********** *************
The Doghouse: YTech
YTech has the ShadowX algorithm. It's proprietary to the company, of
course. This kind of thing is nothing new, and normally I wouldn't
bother. But this sentence has me really worried: "Two modes of
encryption 'Self Mode' and 'Key mode.'" Um, how secure can it possibly
be if there isn't a key?
<http://ytech.co.il/shadowx.htm>
** *** ***** ******* *********** *************
More E-Mail Filtering Idiocy
I use Postini as a spam filter. Postini automatically scans all of my
incoming e-mail. Anything it considers spam it shunts to another
mailbox, which I check occasionally. There I can quickly scan my spam
for legitimate e-mail, and specify certain e-mail addresses as ones
that should be allowed rather than shunted. It's a good system. I see
almost no spam anymore.
Not everyone else has such a nice spam filter. Crypto-Gram is fighting
a seemingly endless battle against filters of various sorts. There are
people who simply can't get this newsletter because it is tagged as
spam or porn. (I don't think anyone on MSN gets Crypto-Gram anymore,
for example.) Most of the time I never hear about this, but
occasionally I get error messages back from corporate filters. Some of
them are entertaining.
Some filters block Crypto-Gram if it is larger than 50K. Once, a
filter blocked an issue that used the term "ILOVEYOU." Another was
returned with the following message: "Body contains word(s)/phrase(s)
'bomb, gun.'" Another filter blocked an issue because the words "blow"
and "job" appeared in the e-mail, even though they were in different
paragraphs. The most recent issue was blocked by one filter because it
contained more than two links to Geocities Web sites. (It seems that
many Geocities Web sites are pornographic.) The same issue was also
blocked by another filter for containing unspecified "dirty words"; the
person involved pointed out that the same filter didn't block penis
enlargement spam.
Sadly, the above paragraph will trigger all the same spam filters, so
the people who don't get Crypto-Gram because of them will not get this
issue either, and hence will never know why. And my stories pale in
comparison to Neil Gaiman's experience with the spam filter at DC
Comics, publisher of Sandman. It seems that the filter automatically
blocked all e-mail containing the word "Sandman" without informing
either the sender or the receiver. Gaiman was unable to communicate
with his publisher about his own writing.
The EFF's position on spam filters is: "Any measure for stopping spam
must ensure that all non-spam messages reach their intended
recipients." It's a laudable goal, but one that's very difficult to
implement in practice. Newsletters like Crypto-Gram are
problematic. I know that everyone who gets my newsletter has
subscribed, but how does any filter know that? I send 80,000 of these
out every month; the only difference between me and a spammer is that
my recipients asked to receive this e-mail. But I'm sure that some of
my recipients don't remember subscribing. To them, Crypto-Gram is
unsolicited e-mail: spam.
Despite my personal difficulties with sending out Crypto-Gram, I have a
lot of sympathy for spam filters. There's a lot of "throwing the baby
out with the bathwater" going on, but the bathwater is so foul that
many companies don't mind the occasional loss of baby. The spam
problem is so bad that draconian solutions are the only workable ones
right now.
EFF on spam filters:
<http://www.eff.org/Spam_cybersquatting_abuse/Spam/position_on_junk_emai
l.html> or <http://tinyurl.com/gyve>
Neil Gaiman's story:
<http://www.neilgaiman.com/journal_archives/2003_03_01_archive.asp#20004
7127> or <http://tinyurl.com/gyvf>
Original article on e-mail filtering idiocy:
<http://www.counterpane.com./crypto-gram-0102.html#8>
** *** ***** ******* *********** *************
News
Another DDOS variant:
<http://arxiv.org/abs/cs.CY/0305042>
British cryptanalysis work against Russian ciphers during World War II:
<http://portal.telegraph.co.uk/news/main.jhtml?xml=/news/2003/06/02/ncod
e02.xml> or <http://tinyurl.com/gyvg>
Spammers are using Trojans to take over home PCs:
<http://www.vnunet.com/News/1141610>
Long, but good, article on homeland security:
<ttp://www.businessweek.com/technology/content/may2003/tc20030513_5532_t
c110.htm>
Erroneous timestamps on ATM withdrawals result in the arrest of three
innocents:
<http://www.washingtonpost.com/wp-dyn/articles/A19633-2003Jun21.html>
June 25th was the 100th anniversary of George Orwell's birth.
<http://www.orwell2003.org>
For years I've been saying that securing data in servers is much harder
than securing data in transit, and that encryption is an irrelevant
security technology in many situations. Here's another essay that
makes similar points:
<http://www.continuitycentral.com/feature016.htm>
A new California law requires companies to report security breaches:
<http://www.boston.com/dailyglobe2/174/business/Law_requires_that_firms_
reveal_security_breaches+.shtml> or <http://tinyurl.com/fddn>
In the days after 9/11, lots of people took advantage of malfunctioning
cash machines and stole millions.
<http://www.nzherald.co.nz/latestnewsstory.cfm?storyID=3508252&thesectio
n=news&thesubsection=world> or <http://tinyurl.com/erxh>
Vulnerability management. With so many out there, you have to prioritize.
<http://img.cmpnet.com/nc/1412/graphics/1412f1_file.pdf>
Web privacy policies confuse more than they enlighten, according to a
survey. This is hardly surprising; I kind of figured confusion was the
point.
<http://news.com.com/2100-1029_3-1020709.html>
It took just one week for the new Harry Potter book to be available online:
<http://news.com.com/2100-1025-1020984.html>
Security through diversity. Remember that this only works if your
system is as secure as the union of the security of the diverse
subsystems. If your system is as secure as the intersection of the
security of the diverse subsystems, then diversity is going to hurt
rather than help.
<http://www.csoonline.com/read/060103/flashpoint.html>
** *** ***** ******* *********** *************
Counterpane News
Counterpane had an excellent second quarter. Read about it here:
<http://www.counterpane.com/pr-20030715.html>
Bruce Schneier is delivering the keynote speech at BlackHat: 7/31 at
8:00 AM in Las Vegas.
<http://www.blackhat.com>
** *** ***** ******* *********** *************
Security Notes from All Over: Red Wine
"Some women dining out in Tegucigalpa's fancier restaurants always
order red rather than white wine, I was told. That way, if a robber
comes in with a gun, they can discreetly drop their rings and earrings
into the wine glass where they will not be spotted as they would be in
a glass of white."
This idea intrigues me. It's a simple security countermeasure, and one
likely to be effective in a quick and stressful robbery. But why is
wine required? Couldn't the women equally effectively use their
napkins, their blouse, or the floor? I suppose moving to sip wine is a
more natural, and therefor less noticed, maneuver. And I wonder if
restaurants might start offering a cheap house red just for this purpose.
<http://www.guardian.co.uk/comment/story/0,3604,968353,00.html>
** *** ***** ******* *********** *************
Password Safe
Password Safe 1.92b is available.
Many computer users today have to keep track of dozens of passwords:
for network accounts, online services, premium Web sites. Some write
their passwords on a piece of paper, leaving their accounts vulnerable
to thieves or in-house snoops. Others choose the same password for
different applications, which makes life easy for intruders of all
kinds. Password Safe is a free Windows utility (originally developed
at Counterpane Labs) that allows users to keep their passwords securely
encrypted on their computers. A single Safe Combination -- just one
thing to remember -- unlocks them all.
Password Safe has always been free, but it only become open source last
year. This April, Rony Shapiro took charge of the project. (Applause
and accolades.) He's released a new version, based on work by a small
team of volunteers.
Password Safe 1.92 has a number of small improvements, all of which
make it easier to use and more customizable to each user's
preferences. The changes include: resizable main window, displaying
username and notes in main window, ability to search the database for a
given string, listing last database opened, ability to define generated
password policies, ability to pass the name of a database via command
line. The Release Notes list all the changes in gory detail.
If you're a user of Password Safe 1.7 (the most recent version
available on the Counterpane Web site), you'll have no trouble going
back and forth with the same database.
Password Safe 2.0 is currently under development. The significant new
features are: an ability to organize passwords in hierarchical view,
portability to other platforms (PocketPC, Linux, Palm, probably in that
order), and an extensible database format (meaning that they will be
able to add more features easily). The overall goal is to keep
Password Safe a small and simple application.
As with any open source non-commercial project, schedules are
fluid. Right now, the end of this year is a good conservative estimate
for a non-beta 2.0 release.
Password Safe Web site:
<http://www.counterpane.com./passsafe.html>
Download Password Safe 1.92b:
<http://prdownloads.sourceforge.net/passwordsafe/pwsafe-1.9.2b-bin.zip?d
ownload> or <http://tinyurl.com/gyvi>
Discussions on Password Safe 2.0:
<https://sourceforge.net/forum/?group_id=41019>
** *** ***** ******* *********** *************
Crying Wolf
On July 2, both the U.S. government and ISS (a company that sells
computer security products) sent out a story about something called the
"Defacers Challenge." Supposedly thousands of Web sites would be
defaced on July 6 as part of some game. The press picked the story up,
and soon it was international news. At Counterpane we discounted it as
nonsense, but when our customers started calling us we put out an advisory.
July 6 came and went; nothing happened. My guess is that it was all a
hoax.
Not that we could do anything if something did happen. Most of the
news reports and advisories told people to make sure their security was
up to date and their patches current. That's good advice any day of
the year. Worrying about July 6 didn't make it less likely that Web
sites would get attacked.
For years, the security industry has tried to survive on FUD: fear,
uncertainty, and doubt. The basic idea is that if you scare your
potential customers, they're going to buy your products. (Greed and
fear are two major human motivators, and both are exploited endlessly
by corporate -- and government -- marketers.) The problem is that FUD
only works for a while. Eventually people realize that there's nothing
to be scared about. Eventually people ignore the warnings. And when
that happens, they ignore the real warnings as well as the hyped ones.
FUD is hard to prevent. Even those of us who knew better had to deal
with the Defacers Challenge story. A few reporters covered it because
it's kind of a cool story, and then everyone else had to follow. I
remember talking to one reporter. He said that he ignored the story at
first, realizing that it was FUD. But when other papers picked it up,
his editor demanded that he write about it, too. It didn't matter that
it wasn't real news; it was news solely because it was reported elsewhere.
And in a weird way, the reporting made the threat real. Thousands of
would-be Web site defacers, who would never have heard about the
Defacers Challenge read about it in the newspapers. "Sounds like fun,"
they might have thought.
Recently I've read several articles about why the computer security
industry is in the doldrums. People, it seems, are not buying the new
cool security products. There are half a dozen reasons for this, but
FUD is a big one. We have threatened customers with the big bad
nasties of the Internet. We have promised customers that -- this time
for sure -- our products would solve their problems. But guess
what? Customers have gotten cynical. They've noticed that it isn't
all that bad out there. And they've noticed that they have problems
whether or not they buy the products.
Here's my hint to anyone trying to sell computer security: demonstrate
value. Demonstrate ROI. Demonstrate that your product enables
customers to manage their risk better. FUD doesn't work anymore. It
doesn't sell anything, and it pisses off your potential customers.
Unfortunately, the U.S. government is going to have to learn this same
lesson. Since 9/11, the Department of Homeland Security has elevated
the terrorist threat level to Orange twice (I think). Every time, we
were told to be on our guard, but go about out business. And every
time, nothing happened.
Terrorist attacks are rare, and if the color-threat level changes
willy-nilly with no obvious cause or effect, then people will simply
stop paying attention. And the threat levels are publicly known, so
any terrorist with a lick of sense will simply wait until the threat
level goes down.
The U.S. military has a similar system; DEFCON 1-5 corresponds to the
five threat alerts levels: Green, Blue, Yellow, Orange, and Red. The
difference is that the DEFCON system is tied to particular procedures;
military units have specific actions they need to perform every time
the DEFCON level goes up or down. The color-alert system, on the other
hand, is not tied to any specific actions. People are left to worry,
or are given nonsensical instructions to buy plastic sheeting and duct
tape. Even local police departments and government organizations
largely have no idea what to do when the threat level changes.
The threat levels actually do more harm than good, by needlessly
creating fear and confusion (which is an objective of terrorists) and
anesthetizing people to future alerts and warnings. If the color-alert
system became something better defined, so that people knew exactly
what caused the levels to change, what the change meant, and what
actions they needed to tak e in the event of a change, then it could be
useful. But even then, the real measure of effectiveness is in the
implementation. There has to be some measurable result, even if there
is no actual attack. You can only cry wolf so many times before people
ignore you.
Note: One excellent Web source for uncovering FUD has been
Vmyths. For years, Vmyths has been a voice of reason in the security
community. Now the site may close down because it can't support
itself. If you're a company looking for a *good* PR boost, consider
taking over this site.
News articles before:
<http://www.newsfactor.com/perl/story/21851.html>
<http://www.reuters.com/newsArticle.jhtml?type=internetNews&storyID=3029
731> or <http://tinyurl.com/gyvj>
<http://www.securityfocus.com/news/6219>
News articles after:
<http://www.theregister.co.uk/content/55/31591.html>
<http://news.com.com/2100-1002_3-1023295.html>
<http://www.computerworld.com/securitytopics/security/story/0,10801,8281
1,00.html?nas=SEC-82811> or <http://tinyurl.com/gd8d>
<http://www.sltrib.com/2003/Jul/07072003/monday/73270.asp>
<http://reuters.com/newsArticle.jhtml?type=technologyNews&storyID=3057682>
Counterpane's alert:
<http://www.counterpane.com/alert-t20030702-001.html>
Vmyths alert on the Defacers Challenge:
<http://www.vmyths.com/hoax.cfm?id=279&page=3>
Vmyths may disappear:
<http://www.wired.com/news/infostructure/0,1377,59473,00.html>
What the government thinks those threat levels mean:
<http://www.whitehouse.gov/news/releases/2002/03/20020312-5.html>
** *** ***** ******* *********** *************
Comments from Readers
From: Rob Lemos <robert.lemos () cnet com>
Subject: Cyberterrorism
Whenever I talk about cyberterrorism, I point out that the Queensland
consultant, Vitek Boden, released 1 million liters of pollution into an
estuary that was cleaned up in a week. A couple of months later, a
bird landed on a transformer in the Ohio River valley, blew itself and
the transformer up, and released about 2.5 million gallons (call it 10
million liters) of sewage into the river.
So it seems that we should be more worried about birds than
hackers. Or to be less cheeky, physical attacks than Internet attacks.
From: "Allan Dyer" <adyer () yuikee com hk>
Subject: Teaching Viruses
It is not the teaching of how exploits, viruses, and worms work that is
the problem. It is the unnecessary creation of self-replicating
code. We need more people who understand viruses and how to combat
them, but it is not necessary to create a virus to understand
them. Additionally, knowing how to create a virus is nowhere near the
complete skill set needed to combat them. Combined with the inherent
dangers of self-replicating code this makes virus writing practicals
unnecessary and unethical.
The inherent dangers are a result of three properties of
self-replicating code: generality, range of effect, and
persistence These change how we need to think about security. In
particular, if the precautions taken to prevent escape of the code from
the secure laboratory fail, then there is no pre-determined limit on
how much damage it can cause, or how long it can survive. As we know
there are no absolute guarantees in security, the course organiser
should therefore minimise the potential for damage by supplying
anti-virus developers with samples of all the viruses created. One
University class of new viruses each year (say, 50 viruses) is not
going to make a big difference to the total number of new viruses --
there are currently at least 50,000 known types. However, if this is a
good and useful course, then every University, world-wide, should have
a similar course and we could see 50,000 new viruses a year, just from
those courses.
So, is it possible to study viruses and worms without creating
them? The feature that differentiates a virus from other programs is
modifying other programs to include a copy of itself, but, in terms of
studying techniques and understanding, what is the difference between:
i) modify program A to include a copy of program B.
ii) modify program A to include a copy of yourself.
Would the student's understanding of the techniques involved be reduced
if he wrote a program to do (i) instead of (ii)? How do they compare
in terms of safety? The program from (i) could be used by a miscreant
to modify programs, perhaps creating Trojans with bad effects wherever
the miscreant introduced the Trojans. The program from (ii) is a
virus, and, as noted above, capable of spreading indefinitely,
modifying other programs with unknown results. So: (i) is a tool that,
when used with intent to damage can cause harm -- no worse than an axe,
(ii) can spread like wildfire from a single accident or careless
incident. A dropped cigarette butt and an axe can both destroy a
forest, but one takes a lot more work and intent. So, new infection
methods can be examined by creating programs that create arbitrary
programs -- making it self replicating is not necessary for
understanding the technique.
Universities should be teaching students how to work and research
safely and ethically. Undergraduate medical students don't cut up live
people, they learn anatomy cutting up dead people. When I was learning
microbiology and genetic engineering, we learnt about containment of
our experiments, how to sterilise our equipment, before and after, and
safe disposal of the cultures. Computer science students should be
learning how to research computer viruses without creating them.
We do need to teach this stuff, but that does not require virus writing
practicals, just as police officer training does not require murder
practicals. Understanding self-replicating code is different from
writing it. In fact, reverse engineering is a much more important
skill for an anti-virus researcher -- when presented with an unknown
program, how do you work out everything it does, without inadvertently
allowing it to cause damage or escape.
I hope that makes it clearer why it is not necessary for students to
write viruses, and why it is not responsible to do so. Many anti-virus
researchers have a similar opinion, as can be seen from this open letter:
<http://www.avien.org/publicletter.htm>
The signatories are not just anti-virus vendor insiders; many are from
major players in the IT industry, and IT users, including commercial
and academic organisations. The University of Calgary has its academic
freedom, but it should consider the reasons why so many of its peers,
and those in the field it claims it is serving, object before proceeding.
From: Paul Kocher <paul () cryptography com>
Subject: Attacking VMs Using Memory Errors
At the end of your comment on the above topic, you write: "Now that the
attack is known, it can easily be prevented. Simple measures like
parity checking or error-correcting codes can defeat this technique."
Glitching attacks have been known for a long time (this is a creative
example of one), and have proven extremely difficult to prevent. Error
correction helps, but often just forces the attacker to whack the
target harder until an error slips through. Error detection can also
be helpful, but creates a new problem: reduced reliability. These
approaches are well suited to RAM, but are much more difficult to apply
to processors and other portions can be glitched.
Finally, the suggestion that the problem will be fixed because it is
known is also optimistic. Some vendors will do a great job, but others
will ignore it completely unless their customers actually start
defecting because of the problem.
From: George Robert Blakley III <blakley () us ibm com>
Subject: Coins at Football Matches
When I was growing up in Buffalo, I used to go watch the Sabres play
hockey. They weren't very good then, but they sure had mean
fans. When a particularly despised opponent (e.g. the Boston Bruins)
would come to town, fans would take coins from their pockets, heat them
up by holding them in their hands for a minute or two, and throw them
into the rink. Since the players wore lots of pads, helmets, etc...,
it wasn't likely that a coin was going to injure a player by impact,
but that wasn't the point. The point was much more subtle -- a warm
coin will sink into ice a bit, at which point it becomes a significant
impediment to the progress of an ice skate. Sometimes it took 30 or 40
minutes to get the pennies out of the ice and Zamboni the surface.
From: "Owen Minns" <Owen () oakspan com>
Subject: Self-destructing DVDs
You suggest that the technology "solved the problem of needing an
infrastructure to process DVD returns." In the US, perhaps, but does
not globally absolve Disney of this responsibility. This system might
work in the US, where Disney and other companies can still convince
consumers to buy expensive packaging and products that become garbage
after a few days, but in the EU, progress has dictated that producers
assume greater responsibility for the full life-cycle of their
products, including recycling/disposal. Presumably Disney will be
responsible for the management and disposal of "former-DVDs" in that
more rational jurisdiction.
One would hope that a company with the resources of Disney could
develop reliable security measures without generating even more waste!
From: Greg Jennings <gjennings () mail communica com>
Subject: Telephoning Account Data
Your link to the DirecTV story (Hacking customer privacy in DirecTV) in
the June 15, 2003 Crypto-Gram reminded me of how a store clerk and an
accomplice can get credit card information.
I once purchased an expensive item with my Visa card. The computer
apparently instructed the clerk to call Visa and then hand me the
phone. The Visa representative had me verify my home phone and
mother's maiden name and the allowed the transaction to go through.
However, and it did not occur to me at the time, I had no way of
verifying that the person on the other end of the phone was from Visa!
It could just as easily been someone in the back room or anywhere else
for that matter.
[This is the strangest piece of mail I have ever received, by several
orders of magnitude. I reprint it here solely for entertainment purposes.]
From: Somewhere
Subject: I haven't a clue, really
On January 15, 2003, I was banking on-line at Lee bank in Lee,
Massachusetts. Zone Alarm informed me on the computer (mostly
everything I have is documented) that a "would be hacker" was trying to
penetrate my account. I wrote down the port numbers, called the bank,
and was told by a very young secretary that I would have to come in and
change my password. The Lee Bank of course later denied it, wanting to
pretend that our systems are all secure. I thought "oh, they are just
changing their systems -- I'll call back in 15 minutes. I was told to
come in and change my password. The bank of course, later denied
it. The portal numbers were the same as the one I would run into later.
Fifteen minutes later I was back to my on-line computer and there was
my ex-husband's (and now wife's) yellow e-mail staring me in the
face. He was mailing things back to himself as he had done over the
years. He had all sorts of "spy ware" installed on the first computer
in our house. When we outgrew our, "Windows 95," I decided to get Jake
a new computer. (I have 2 children, Jake and Hallie, and had remarried
in 2000.) The new Compaq was bought in 1999. I don't know how long he
had been e-mailing things back to himself. What came through when I
pressed file, was our daughter's picture. Then, I pressed source &
view and print. Pages started printing out -- So many that I ran out
of paper. I showed these to a computer forensic person in Boston. He
said that the program might show that they were laundering money,
running pornography or Chuck could have been stealing money from George
Gilder's bank account. George Gilder is the man responsible for
predicting the stocks on the Gilder Technology report.
Please forgive this very unprofessional letter. My house was broken
into night after night. My jewelry was all changed with copper wire
and numbered. Everything I touched looked like a little disk to hold
information on it and it was covered in microchips in silver and copper.
No one believed me. I had recently started taking medications for
ADD. That made my second husband furious. Little did I know that he
may have been involved in what I believe to be cryptography? I found a
bag that the FBI will test for substances. I woke up groggy. I was
followed by the same car day in and day out. They wanted to know when
they could use my house. A private investigator from New York is
coming tonight. The FBI will come tomorrow. I had a bag from New
Mexico that I looked up on the internet. I was not allowed to use the
computer when I wouldn't do my ex-husband's program. My calls were
intercepted. We thought we had Verizon DSL. My computer was
controlled by my ex-husband Edward Charles Frank. I had read in his
notes of his running the v2ks. When I would wake up in the morning,
floppy disks would be at my bedside, I was to run them and I am not a
computer forensic person but I knew they weren't bible verses.
Now comes the hard part. My house was broken into at least a dozen
times. Watches, purses, coats, and my own belief in myself disappeared
and reappeared on a daily basis.
The Lee Police never visited my house one time. They, in fact, called
in mental health -- one of the most humiliating experiences I have ever
endured. The social worker said that my problems seemed to be called
externally, the state police threw me out and I know how to ask calm
and mannerly, as I am an opera singer. I stopped singing. They had
already (I assume) been told that I was crazy, or maybe they were paid
off. I just couldn't believe the treatment I received. When I called
to tell them my purse was stolen out of my house in the night, I heard
"Oh, you'll have to wait to talk to officer Buffis, he's handling
this." For weeks the same cars followed me like hornets. Something on
me told them my location. They had keys to my house and my cars. I
had my locks changed. That night, even my bedroom lock and chain were
penetrated.
I heard a tape of my present husband testing the mikes and I also found
a tape of myself in every room of the house, speaking distinctly.
There is much more to the story and much more to be solved. I believe
I am entitled to some compensation for the mental abuse and suffering I
went through. 3 computers are at Kroll. Will you work with me? I
started taking down license plates (about 7 or 8). Just this
afternoon, all of the cars appeared across the street and seemed very
angry. I have a lot of evidence, even the bag they used to drug my
Labrador.
I noticed a HUGE Verizon truck across the street at the
way-station. Funny right, now we have no service at all.
[This letter arrived in a box, approximately 10 inches on a side,
filled with a pile of CD-ROMs, pens, costume jewelry, bits of metal, a
fishing lure, and assorted other garbage all individually wrapped and
secured with tape. Thankfully, the box was sent not to my home or
business address, but to a mail drop I maintain. It might be a hoax,
but the writing seems too authentic. It's hard to fake delusional
paranoia that well.]
** *** ***** ******* *********** *************
CRYPTO-GRAM is a free monthly newsletter providing summaries, analyses,
insights, and commentaries on computer security and cryptography. Back
issues are available on <http://www.counterpane.com/crypto-gram.html>.
To subscribe, visit <http://www.counterpane.com/crypto-gram.html> or
send a blank message to crypto-gram-subscribe () chaparraltree com. To
unsubscribe, visit <http://www.counterpane.com/unsubform.html>.
Please feel free to forward CRYPTO-GRAM to colleagues and friends who
will find it valuable. Permission is granted to reprint CRYPTO-GRAM,
as long as it is reprinted in its entirety.
CRYPTO-GRAM is written by Bruce Schneier. Schneier is founder and CTO
of Counterpane Internet Security Inc., the author of "Secrets and Lies"
and "Applied Cryptography," and an inventor of the Blowfish, Twofish,
and Yarrow algorithms. He is a member of the Advisory Board of the
Electronic Privacy Information Center (EPIC). He is a frequent writer
and lecturer on computer security and cryptography.
Counterpane Internet Security, Inc. is the world leader in Managed
Security Monitoring. Counterpane's expert security analysts protect
networks for Fortune 1000 companies world-wide.
<http://www.counterpane.com/>
Copyright (c) 2003 by Counterpane Internet Security, Inc.
-
ISN is currently hosted by Attrition.org
To unsubscribe email majordomo () attrition org with 'unsubscribe isn'
in the BODY of the mail.
Current thread:
- CRYPTO-GRAM, July 15, 2003 InfoSec News (Jul 16)
