* Posts by Daniel Palmer

78 publicly visible posts • joined 22 May 2008

Page:

Microsoft nobbled ‘Vista-Capable’ for Intel

Daniel Palmer

Bus slots?

I wonder why they didn't just ship the machines that were going to be bundled with Vista with a cheap ATI or Nvidia card. Problem solved.... or someone at Intel could write some LDDM or whatever compatible drivers, I don't pretend to know much about Microsofts retarded interfaces but unless there's something missing from the hardware I don't see why it couldn't have been fixed.

OT: why do people have such big issues with Intel integrated graphics chipsets (not really a chipset as it all lives in the same package, but there we go)? If you were talking about the i810 you'd have a point, those were truly awful things to get working. If don't want to play games or want to use the box with something that isn't Windows the Intel stuff is the way to go.

Swedish transsexuals offered prosthetic todgers

Daniel Palmer
Flame

@AC

> transexual men and women are not 'fakes

Most "real" men and women can reproduce with a suitable partner of the opposite sex.

No amount of mashing up your genitalia is going to give a male to female transexual a womb etc and so on. Maybe "fake" is a bit strong, but these people haven't really changed their "sex". If changing their outward appearing sex makes them happier fair enough, but making out that they have somehow reversed how they formed in the womb is a bit silly.

Turbo-charged wireless hacks threaten networks

Daniel Palmer

@Seriously?? and kudos @Lee

>As Lee's pointed out as well, all they're doing is brute forcing. We know that it works, it's >always worked, it just takes a really really long time. Now it takes a really long time

>instead (100x faster? So it's just 10m years now compared to 1bn - awesome)

And the performance of graphics hardware is increasing how many times a year? How long until someone finds a flaw in WPA that seriously reduces the amount of keys you need to brute force? No one ever said this wasn't a "bruteforce" attack, the interesting thing is that have used common place and more importantly cheap hardware to increase the speed at which they can do the attack by a good margin.

If lee knew anything about WPA he would have suggested that people don't use common SSID's for their WPA protected networks as some pretty large rainbow tables already exists for common ones like linksys...

Open source release takes Linux rootkits mainstream

Daniel Palmer

@sam

x86 chips have "Rings", not just a flat user and supervisor layout. Ring 0 being where the kernel sits,.. The problem with this system is that when we fully virtualise a kernel it's code wants to run in Ring 0 too which isn't a good thing. SVM (Amd) and VT-x (Intel) get around this by letting the guest kernel's privileged code run but throw exceptions when it tries to do something bad like read memory that doesn't belong to it, or use instructions that it isn't allowed to... so the privilege model on a modern IA32/AMD64 processor is actually pretty complicated.

But I think that's beside the point as this rootkit uses the IA32 Debug Register (http://en.wikipedia.org/wiki/Debug_register)... The rootkit being implemented as debug exception handler which allows it total control over the machine (you wouldn't be able to debug a kernel otherwise). You would have thought however that the debug exception handler would have to be installed by privileged code i.e. the kernel. So by the point that this is installed the machine is fairly comprised already so this is just a way of hiding that fact and maintaining control over the machine.

The article says this doesn't work with SMP (would need to install handlers on all the running cores),... would it work when the CPU is in longmode? What stops it being ported to different OSes? Seems a bit flaky to me.

Daniel Palmer

@Exploit

>VmWare does a pretty good job of hiding itself from the client OS.

The vmware hypervisor or whatever you want to call it is visible to clients via special io ports on the virtualised processor. You can see how that works by looking at the openvm tools stuff vmware has released recently..... and this "exploit" is slightly different; As far as I can see it's basically about generating interrupts at a high enough privilege level (kernel debugging level) that you can do whatever you like, including trapping attempts by the running kernel to detect the rootkit. Unless this has some fairly extensive code to bind the kernel debugger part into the running OS I can't see how it's that useful scriptkiddies, if they can't manage a buffer overflow by themselves how are they going to work with something that requires knowledge of the inner workings of the processor to understand?

Judge slaps Fasthosts for rubbish kit and support

Daniel Palmer

@Hard drive dependence

>All operating systems rely on a storage device, whether it be a hard disk or solid >state drive so the linux lovers have just made themselves look really stupid.

You need a storage device to store the data before you load it into memory.. but you don't need a fixed disk if you don't intend to keep accessing it. It's very possible to load a linux kernel + initramfs image from a "real" disk (or prom, flash, whatever) and then run totally inside memory.

Hint: If operating systems really really really *needed* a fixed disk i.e. wouldn't run without one they would be unusable.

Most operating systems handle stuff like disks disappearing from the system (due to disconnection, failure and such) better than Windows.

CERT: Linux servers under 'Phalanx' attack

Daniel Palmer
Flame

Dead horse

"The CERT advisory makes no mention of the flaw in the Debian random number generator,"

Because it's been fixed,... and the debian ssh packages depend on blacklists that block weak keys from being used for ingoing and outgoing connections, ship with tools to find weak keys etc blah blah blah. You realise a good starting point for finding keys would be to bruteforce boxes than allow password authentication don't you?

Acer US prunes Aspire One mini laptop prices

Daniel Palmer

@Faulty Goods

That will be a keymap setting. In any case, if you want to "Learn about linuks!" you should install a normal distribution anyway. Any i386 distro will run. The keyboard worked correctly out of the box with Debian here,.. which is rare with laptop keyboards.

Easy iPhone 3G unlocking for $30?

Daniel Palmer

@AC

> Not in the EU. It is a legal requirement in the EU to unlock

Can't find any direct legislation on this. Only thing that seems close is some consumer protection legislation... can you point me in the right direction?

Also since when has large company listened to EU directives? I'm pretty sure charging the excessive roaming costs that most operators do was ruled as unfair by the EU,... yet we're still paying excessive roaming costs.

> But as somebody who lives and works in Japan, I _do_ care simply because

> I want the Japanese economy to do well and therefore I do not welcome

> anti-competitive business practises in Japan.

So don't buy encumbered products? The carriers will soon notice the huge dent you have caused on the Japanese economy and rethink their business strategies.

Your argument seemed to be that your phone's firmware has some brain damaged security where-by all files have to be digitally signed.. that's maybe to stop things like bad image decoders from turning into workable exploits. Interoperability issues opposed to handsets being locked to a network (reduction of consumer choice).

Saying that Apple have "opened up" anything is ignorant to say the least...

Daniel Palmer

@AC

>Indeed, but at least in the UK and other EU countries operators

>are obliged to unlock the phone (for a fee) after your initial

>contract period has ended.

>There is no such obligation in Japan and the operators won't do it.

Are you sure that's true? Surely the terms which you are given (leased) the phone dictate whether the supplier has to unlock it. You would have to read all the legal documents of each supplier to find out exactly where they stand.

>but the way the Japanese bureaucrats tick, they are more likely to

>issue a first number in order to get a second number which then

>allows you to submit your application. Go figure.

Well, it's their country isn't it?

>However, I don't think anybody who's been living in Japan for a few years >would find this sort of thing unusual.

I find it really silly how people that have "been living in Japan for a few years" whine and whine about their "situation". Take that arsehat debito as the greatest example of that. Japan isn't all that different from any other country it's just the majority of people that move to Japan have no experience of living anywhere outside their home country and expect Japan to jump hurdles to accommodate the less than 2% of population that aren't Japanese.

Bottom line; If you don't like what the operators do to hardware before they lease it to you in Japan either A: move somewhere else B: learn some Japanese and buy a shiro-rom phone.

Daniel Palmer

@ Anonymous Coward -- Japan

>Well, here in Japan, the land where presumably your ancestors have come from, >there are no cell phones which are not locked to the network, all phones are locked, >and after you paid your dues and the duration of the 2 year contract you signed has >passed, guess what, they won't unlock your phone then anyway, you have to go >overseas to get that done.

That's if the phone has a SIM card. The Softbank ones seem to have what would otherwise be on the sim card burnt into the firmware. DoCoMo and Au handsets do seem to have cards though.

You said the iPhone brought freedom to Japan (I'm guessing you're not Japanese as your ingurishu is too good), but the fact is all phones are restricted in Japan. Not many places require evidence of your right of abode and take copies of your papers before allowing you to have a phone, and that's not just for the monkey ALT's but for Japanese citizens.

Also if you want to get your data off of your phone you could always get an SD reader.. all Japanese phones have miniSD microSD slots, even the 5000 yen ones, and the formats are generally pretty standard.

Sega hopes to score with homely Japanese women

Daniel Palmer

There's already a game out like this...

It's called "face training" and is part of the "Adult's DS" series. Comes with a camera that goes in slot 2 and a stand for the DS + camera combo.

US Congress to vote on in-flight mobile ban

Daniel Palmer
Flame

@Andy Bright

So when you were a small child (~1 or 2 years of age) you weren't mentally developed enough to understand a plane ride hence screamed and cried.... but you could understand the intrinsic qualities of other cultures?

I blame the mums... it's the same mums that drag the poor kids shopping and then beat them around the head for not wanting to be there. Someone needs to educate them about online shopping.

Nut launches death threats at Debian women

Daniel Palmer
Flame

@Destroy All Monsters

OT: Ramming romanised Japanese words into your sentences is neither big nor clever. The word basically means "Go live in the woods"; I know the ADSL roll out is progressing at a rapid pace, but I doubt that there are many wooded areas in which you can get ADSL. There again, if you moved to the woods in the first place surely you're trying to get away from modern technology and such anyhow?

Family visa sponsors face ID, credit and CRB checks

Daniel Palmer

@Anton Ivanov

Surely if he carries a passport issued by a EU member he can enter the country the same as people from those countries that have visa exception agreements with us.

Now if he carries an Non-EU passport and the country that issued his passport doesn't have an agreement with us (That's very very few countries), it's right he should have to apply for a visa. Unless you intend to keep the in-law locked in your shed for the duration of his stay what does it matter that he's visiting a British citizen? Maybe your British Citizen'ness confirms the in-law to be a jolly good chap and we should waiver the need for a visa regardless of the fact that country that issued their passport hasn't got an immigration agreement with us.

Daniel Palmer

Re: OH NOES!?! ITS 1984 OH NOES!!!

Sounds like a good idea to me. Currently we give out 6 month visa's[1] to almost anyone that turns up on the door and send them on their way, and those people have the choice just to disappear. The problem is other parties (i.e. their sponsor) could also make them disappear and there's no way of finding out where they went. People that have things to hide shouldn't be vouching for other people to enter the country.

As for ID cards for foreign visitors; It's only recently that you haven't had to carry a resident registration card in Spain if you intend to stay there for an extended period of time. Even with a tourist entry permit in Japan you need to register yourself as an alien at the local city hall after a certain period. It's very hard to track down people relatives if they get run over if they don't have any in that country,.. having some documentation of your existence in that country is a good idea (TM).

1 - We say visas.. those are the things you apply for before you get here, and even though you have a visa in your passport is no guarantee that you'll be permitted to enter the country. Non-EU nationals from countries with visa exception agreements get 6 month entry permits or something stamped into their passports when they get here IIRC.

1,076 developers, 15 years, one open-source Wine

Daniel Palmer
Flame

@Mark

> $ dd if=/dev/dvd1 of=/dev/dvd2

Yes, because will all know that dd can handle dvd packet writing and like Bruce Schneier can decrypt CSS without a single line of code for that purpose.

If you're going to be an evangelist it might be a good idea not to talk out of your arse.

Linksys revamps WRT54G wireless router

Daniel Palmer

@Operating System?

Linksys switched over to using vxworks near the end of the last generation WRT54G's... vxwork needs less ram and flash, so production costs go down.

Microsoft's own chip design blamed for Xbox 360 RRoD

Daniel Palmer

Badly written article

The article makes it sound like Microsoft designed the graphics core in-house and had it fabbed somewhere cheap... and then when that didn't work they went to ATI and bought a design? Wouldn't that make the two generations of chipset incompatible?

As one of the posters above mentioned; Microsoft licensed a design which is pretty common and then got a cheap vendor to produce the silicon. Which is a world apart from Microsoft cracking out the VHDL and wipping up a GPU.

KDE 4.1 beta 1 released

Daniel Palmer

@I don't like KDE4.0

Same feelings here. I upgraded this box from FC8 to FC9 a week or so ago and was surprised to find that the kde 3 I had come to love was replaced with the practically unusable kde 4.0... so I'm stuck with using Gnome, which isn't a bad desktop, just not as nice as KDE 3 + bits like kmail and kopete.

I sort of wish someone would take kde 3.5.9, rip out all the shit that shouldn't be there like attempting to "configure" things and instead munging up config files, and release a fork.

After Debian's epic SSL blunder, a world of hurt for security pros

Daniel Palmer

@BKB

>They're very often done in order to make software fit Debian's "policies". The >problem is that the "policies" are arbitrary - they're Debian-only standards which >the original developer of the software may not be aware of, and there may be very >good reasons not to do things the way the "policy" says.

The developer of the software is aware that the license they distribute allows Debian, Redhat et al. to do these sorts of things with their code. If you don't like it, don't distribute your code with licenses that allow modification and redistribution.

DJB did exactly that.

>In fact as I mentioned on another one of these comment pages, the first time I >found a bug in a Debian package which didn't exist in the original source codes >(i.e. a bug which could be removed by uninstalling the Debian version of the >software and then reinstalling from the original source code) was back in 1996

I guess you never reported said bug to the package maintainer so that it could be fixed? When you "reinstalled from source", were you linking against locally built libraries or the shipped ones? There are numerous things that could have caused a bug on your system that had nothing to do with the package you experienced problems with. Like out mutual friend Chris Thomas you seem to have had one bad experience with Debian and in your eyes that seems to give you the right to bad mouth the thousands and thousands of hours of time people have volunteered into the project.

I don't even see why you brought Windows into the argument.

Daniel Palmer

@Chris Thomas

>1) if I was at a company and personally created a disaster that caused millions of >pounds of damage, it doesnt matter

Millions of pounds of damage? Evidence? Even if some bigwigs lost "millions of pounds" because of this patch they have no legal grounds for complaint. They used the code under the license it was offered.

RSA have sold console makers like Nintendo encryption and it hasn't worked,.. Nintendo haven't sued. Figure that out.

>ONE LITTLE BIT that they have insurance you dumbass, it has NO RELEVENCE >WHATEVER on the fact that at the end of the day, I am collecting my P45, they are >covered, thats true, but I AM OUT OF THERE.

You need something like 3 warnings of increasing severity to be fired unless your mistake can be considered "gross misconduct". I hope silly human mistakes aren't considered gross misconduct, I think that assumes intent to commit wrong doing.

Companies actually give courses on how to fire people these days....

>2) it depends on whether you want to be taken seriously or not, if I had an employee >who did this and basically if you work for "me" you're my employee

Far be it for me to tell you how to run your business, but you should have code review, a peer should be checking for an obvious blunder. It's very easy to miss things. The DD that patched OpenSSL tried to get peer review from the OpenSSL developers.

>3) If the TV was straight out of the box and then at night set fire to my house killing >my wife and children, yeah I'd be around your house to find out what happened with >that TV that made it do that and if you tell me it was standing in a puddle of water!!

You didn't check it for signs of damage before plugging it in? I offered you no warranty of the fitness of the goods and you should have expected as much. If you don't have the common sense to protect what is important to you these things will happen. What if it was stolen? You'd be liable for handling stolen goods.

>4) but he obviously isnt, because if he was, he wouldnt make such a f**king n00b >mistake would he.

So your informed critique comes down to the DD being a "n00b". Pat on the back.

>5) Since I learned that debian is for idiots, I pretty much stayed away from it and I >have nothing to do with it, and I enforce that with everything I do, I dislike their entire >band of brothers do much, I never run into this problem. However, some of my friends, >have.

You will never run into this problem? Chances are you have communicated with a server running Debian that has been using weak keys. Everyone is affected.

There must be billions and billions of pounds of damages outstanding from dodgy webservers, broken MTA's,... You'd think having to brute force thousands of keys would be a minor issue in comparison.

>6) Thankfully, I've never had to directly deal with idiots from debian, so I've been >mostly free from having to interact with them and be "infected" with cool 1337 ideas >like removing parts of RNG code.

So you don't actually understand what happened? The intent was to disable an almost unless part of the entropy generation process (uninitialised memory isn't a good source of entropy), but by mistake the DD managed to knock out a fundamental part of OpenSSL's entropy generating process.

>Seriously man, get a grip, millions of pounds of damage has been done and >thousands of man hours wasted over a f**king valgrind fix, this shit does not happen >to good developers. Stop protecting the weak, their death is SUPPOSED to happen. >It's called nature.

Earth quakes cause millions of pounds of damage, I think the damage this has caused is subjective at best. Maybe someone is replaying old SSL encrypted credit card transactions against the known weak keys in a hope of getting some usable data? Otherwise I'm totally lost as to where these $18.500.000 Million dollars (Eighteen Million Five Hundred  Thousand

us dollars Only) have been lost. You would have thought all those big companies that rely on SSL to protect their loot would have to use encryption accelerators anyhow.

Daniel Palmer

@Chris Thomas

>Irrational? ok, being in the software industry, if I caused this kind of damage, you think >I'd be collecting a phat paycheck at the end of the month? or my P45?

Your employer should have liability insurance and contracts et al. worded in such a way that you aren't directly liable.

Read the first couple lines of *any* opensource license and you'll see the developers have nicely decoupled themselves from any responsibility. Many proprietary licenses shed as much responsibility as legally possible. Your's should too.

Aside from that the employment laws in the UK would make it almost impossible to just sack you and withhold your salary.

>Seriously, this guy needs ejecting and find his fun somewhere else and yes, in this >case, he isnt paid, but should he continue to work on the project?

Not being part of the Debian community is that really for you to have say so on?

It would be very easy to revoke this DD's rights within the project but that is for the project itself to decide not Random Internet Commentators (TM).

>We are constantly living in a society where failure is tolerated at any level and while I >agree that people make mistakes, they should also be shown that severe mistakes, >are taken and fixed severely.

Again, you're saying that instead of trying to limit the damage this has caused we should be telling people off. If someone gifts you a TV and it doesn't work do you go around their house and give them a mouth full of crap about it? You didn't pay for it, what right to you have to start a witch hunt against anyone? The licenses this stuff is distributed under actually forbids you any right to complain.

>There are some bugs you shrug off and others which you cannot and the only >recourse is your head, sorry, but this guy was editing and compiling code which he >isnt even remotely qualified to do.

More assumptions. Do you know anything of this guy's background? He could Schneier's genetic clone.

>and as for helping, I am helping, by using fedora and telling everyone else to not use

Well, even with Fedora you could have weak keys in your system; Keys created by debian users etch and beyond. Actually, with a Fedora system you are more vulnerable ssh-wise because you don't have the blacklist for weak keys. Maybe you should spend your time telling your sysadmin friends to watch out for keys generated on Debian boxes and to install blacklists where possible?

>Sorry, but for a decade I have had a hatred of debian because of it's idiotic mindset

So what you're basically saying is - I don't really care about this, I just don't like Debian and because of that I should decide the course of action taken in resolving the problem at hand. Is it possible you have been scorned by the Debian community for *your* lack of ability hence have this negative outlook towards them?

Daniel Palmer

@Alan W. Rateliff, II

http://cr.yp.to/maildisasters/sendmail.html, aside from being historically insecure you simply don't need it. Exim, postfix etc all include sendmail wrappers.

Daniel Palmer

@Chris Thomas

> Then he ships crap sandwiches to everyone and openssl are to blame????

No one said that the person that did the change *isn't* to blame. The problem here is that your and other like minded peoples responses are totally irrational.

People make mistakes.

>And you are correct in saying that distributions "repackage" software for their >distribution, but the difference here is that they ONLY REPACKAGE

All distributions patch the original source files to some degree. That could be something as simple as changing the location of the config files,.. and that could still introduce security problems that weren't present in the vanilla source.

Are you saying we should change everything to DJB-style licenses?

>It is simply not openssl team's job to respond to every mail on the mailing list, it's >their job to look after their project and their code,

They did respond. There seems to have been some confusion over what their response meant; Yes comment it out, or maybe comment it out only for debugging. The fact remains the damage is done. No amount of being a tit on either side is going to fix that. Debian announced the problem publicly, and have/are putting in place measures to limit the damage. (i.e. openssh now depends on a package that blocks known weak keys)

> it's not the fault of openssl

Instead of telling people off maybe you could help? Debian is a community project and I'm sure they could do with more people like yourself that understand everything and never make cockups.

Daniel Palmer
Flame

@Chris Thomas

>Simple really, these guys are a joke, this just proves it, no wonder they are getting >killed by ubuntu.

Ubuntu imported the exact same duff patch into their archive, which sort of proves how much auditing is happening on their packages. Which is ironic, we're being told "people that don't know what they are doing shouldn't get involved" but it's fine for Ubuntu to mass import packages with little or no knowledge of how those packages work?

Flawed logic.

Daniel Palmer

@The real problem with debian

>Can anyone remember the last time debian made something revolutionary

>linux ecosystem? Graphical installers? dbus? gnome? kde? firefox? x.org?

apt? dpkg? debian-installer has had a graphical option since Etch...

Also your argument about Debian "importing trees" is total crap. The Debian packaging tools advise "against" creating native packages that depend on the Debian build tools, and actually create a complete trail of changes that have happened to the original source....

It takes one slip up to bring out all the whiners and idiots... Debian isn't only vendor that patches software; I'm pretty sure Fedora patch their packages to put config files in really stupid places, maybe it's just magic?

El Reg is populated by super-humans that never make mistakes apparently.

Daniel Palmer
Thumb Down

Picking facts from the air.

>It vastly reduces the amount of entropy used when programs like the Apache >webserver, Sendmail, Exim and some implementations of Kerberos use OpenSSL >to perform basic cryptographic functions.

Exim uses GNUTLS in Debian[1],.. maybe before blowing your horn off you should do your research? Anyone that actually has "Sendmail" and not a wrapper around a real MTA installed should be shot anyhow.

[1]

libgnutls.so.26 => /usr/lib/libgnutls.so.26 (0x00002aaf7d373000)

Page: