1454 posts • joined 14 Jun 2007
Re: Why do you put up with so much BS?
"Maybe one day, when all this BS is sorted out, I can finally upgrade from my perfectly useful and adequate 'dumbphone'. "
I'm similar, but not quite as much of a stuckist :-)
I love my android tablet, but there is a maintenance requirement that I have no desire to deal with on my phone.
My phone is an old symbian Nokia E63 which I don't intend to replace until it dies (at which point I'll be looking for another E63)
P.S. The E63 has ssh/putty, a camera, and a decent web browser by the still supported UC browser.
Not bad for a phone that came from 'the back of my brothers sock draw', and costs 2p per text, 3p per min voice, 1p a meg data (with 300mb free for a month when you top up £5) and no monthly fees!
Re: Why a large battery?
2 days cycling across London? Rather you than me!
You deserve a pint (or 3) for that!
Re: re: Had to downgrade security as the TV supports WEP!
"Everything else goes over WEP2."
WPA2 you mean :-)
[ That maybe the reason for the downvote, but it wasn't from me! ]
....and trust a 3rd party VPN?
Even if they are totally honest, I know where I'd concentrate efforts if I was a spy agency...
You'll hate El Regs' "buzzfeed-style" article headlines
That is all.
"I have a Galaxy SII just like my daughter. "
Well, the Galaxy doesn't look much like a human, so I assume your daughter looks like a phone?
Errrrr, am I the only one here who assumed that he actually means resolution?
He was talking to a non-technical audience.
I assumed El'Regs comment about DRM etc. was based on errornously taking his words literally
You've basically described Freenet, which is a sortof p2p cloud storage based on file hashes...
Freenet is a peer-to-peer platform for censorship-resistant communication. It uses a decentralized distributed data store to store information, and has a suite of free software for working with this data store.
Freenet works by storing small encrypted snippets of content distributed on the computers of its users and connecting only through intermediate computers which pass on requests for content and sending them back without knowing the contents of the full file, similar to how routers on the Internet route packets without knowing anything about files—except with caching, a layer of strong encryption, and without reliance on centralized structures. This allows users to publish anonymously or retrieve various kinds of information.
Re: history is always repeated.
"Yes, but it was UNIX - Solaris, IIRC, not Linux. "
I wondered if anyone would mention that.
From what I gather, Sun Solaris run the backend mailservers and storage, whilst FreeBSD/apache the front end web servers and cgi's
Re: Why bother with new stuff?
Have a thumbs-up from the FreeBSD camp!
I realise this post will be unpopular with the GPL cultists here, but whatever.
I'm actually not trolling - I just hope there is no pressure on non-GPL projects to switch to GPL, or indeed, any bias towards GPL licensed projects.
Downvotes from people that think GPL is the solution to everything in 3..2..1...
Re: How often has throwing money at bad software worked?
"mixing tab and space characters for indentation should be illegal)"
I hate TABS
No security issues?
“Broadly, we have an impeccable track record with 500 telcos in 150 countries. There's never been a security issue of any kind,” Sykes told journalists. “We wouldn't be a $40bn company today if were not good at building secure networks"
I generally think that Huawei gets political FUD thrown at them, but the above is clearly incorrect.
If you have one of their wi-fi devices, anyone can grab the wifi password without needing to go through authorisation.
Re: C - the leech theraphy of coding. It will never go away!
As for heartbleed:
". buffer overruns would be a thing of the past as the overrun space would be empty."
Do we know for sure that the buffer read overran into freed memory, and not just some other data structures that were still in use?
Even if so in this case, the malloc proposals aren't a silver bullet for all overruns
Re: Right, so ...
"For starters they'll probably make it work with the system malloc instead of OpenSSL's brain dead memory allocator:"
I knpw you're not implying it, but as many people believe it to be so, it's worth reminding that the hearbleed bug has nothing to do with malloc, nor memory management in general.
Also, the OPENSSL_malloc function ends up calling system malloc, but as you infer, this point is moot if they use other mechanisms to manipulate their malloced memory block in user space.
"Gary Campbell of the Official Loch Ness Monster Club."
So how did his 'club' become official?
Does he know Nessies agent or something?
Re: Er, why?
"It's not obvious that they knew of this specific bug - developers were already concerned that OpenSSL's own "secret malloc sauce" was dangerous. Here's OpenSSH's Theo de Raadt gently remonstrating..."
How many times do I need to repeat myself?
This bug is a buffer over-read.
Nothing to do with malloc.
No malloc/calloc/jemalloc/magic-pixies-malloc would have helped.
Yeah, guard pages and canaries could help, but as it stands, so long as the memory being overflowed to still belongs to the process, there won't be any sigsev crash.
After reading your posts, I spent a few hours going over the code again, and google, before replying.
I''m no C expert - definitely no crypto expert, but I would have to say it shows that the code is written by mathematicians rather than programmers! - loads of labels and pointers to pointers to functions and bleugh!
They even comment-out code using #ifdef 0 . Ugh
"If they are really using a stack-based source then electric fence would not have caught it, but I would have hoped some of the code profiling tools would have thrown up a warning about the copy size being potentially bigger than the buffer."
There was an interesting post (http://security.coverity.com/blog/2014/Apr/on-detecting-heartbleed-with-static-analysis.html) from one of the Coverity people on why they missed it, and in a linked followup post, how they've now altered their product to find such errors in future, though to me, it look like their solution is a bit of a kludge, potenially producing false positives (I'm probably wrong, but t seems to me that they are keying on a very weird scenario, not necessarily an illegal one - though I'm probably wrong! - or maybe that's how these programs generally work anyway... I don't know!)
Anyway, I agree with all your comments in general, but am curious - is there really any 'live' malloc that doesn't return a pointer to cleared/scrubbed memory? I know the spec says the contents are undefined, but surely it would be a security risk ( I suppose that a malloc optimized to not bother scrubbing memory returned to the same UID or even just process wouldn't be a hole in itself, but even that would make it easier to exploit bugyy software (especially servers))
Anyway it's a lovely day, so Im going outside. Have a cold beer on me!
Re: @Michael Wojcik
2 errors in the comments in this thread:
"They use their own malloc"
No. If you follow the spaghetti trail that is the source code, you'll see that their "malloc wrapper" is simply a call to the system malloc.
"This wouldn't have happened if they used calloc"
Yes it would. Try it yourself!
This bug has nothing to do with memory allocation. It seems many people think that the buffer is malloced to the 64k by virtue of the attacking packet, but only the much smaller payload is copied into the buffer, exposing the rest of the buffer as malloced but stale data.
THIS ISN'T THE CASE!
Besides, any sane malloc on a multi-user system would clear/randomize the returned buffer.
What is happening is that 64K of data is being copied into a 64kb buffer, from a char * buffer that contains the much smaller data sent by the attacker, hence overfilling the buffer with other variable data on the stack.
It can be simplified to:
strcpy (retbuf, 65535, sentbuf);
I.e. it's read-overflow (or 'buffer overflow' by reading rather than writing) - nothing to do with the memory allocation!
"You are aware that there are IDS rules to detect large-packet TLS responses specifically to spot Heartbleed then? No? Oh..."
Hmmmm, so you're saying the attack will be caught on those servers which have updated IDS rules, but not patched servers?
In other words, any update made to explicitly stop/catch heartbleed is irrelevent when talking about attacks against heartbleed!
Re: this could be exploited in just 4 bytes
"The 4 byte example was enough to show it would work, not enough to have any chance of stealing useful data."
Nah... 4 bytes is all that is needed - in fact, any more would be less effective, as you'd be 'overwriting' the out-of-bounds data you'll be getting back!
Note, this is the request data we are talking about. Many such small requests receiving 64Kb replies may be detected, though.
Re: Selfies can be good.
"So we dutifully used proper ones. Whereas the old self-signed could be replaced instantly. Hence paradoxically our users were more secure with selfies."
Also, don't forget that with a 'selfie' there is no third party chain of trust above you that could be hacked/pwned by gchq/nsa/blackhat etc.
Re: This is nonsense...
Um. My apache servers record both the data size of the request, and the response.
If they have something like that, wouldn't checking the logs for repeated large requests that go nowhere imply they were being heatbled?
Re: "Google's Android 4.1.1 is vulnerable"
"Yes the library inplementing the protocol has a flaw and there is a vulnerability, but the consequences to humanity at large of unsuspecting clients connecting to malicious servers (servers which will still be expected to present a valid SSL certificate) are rather than less serious than those from malicious clients connecting to unsuspecting servers."
Ummm, I don't think anyone has said the problems for clients are just as serious, however you don't seem to understand the situation.
Are you saying you only ever visit google and your banks websites? Or maybe you use the lesser-known plugin "httpsNoWhere"?
Any site you visit could have malicious code - even a non-https site could have embedded https stuff (with a valid certificate too - that's not relevant)
So, you are basically trusting the honesty *and* security of every site you vvisit, and every third party ad company/image broker/js-library provider they use.
Re: Isn't it ironic...
"Oh, and Jamie Jones: There is nothing wrong with Alanis Morissette's understanding of irony; armchair pedants who think there is clearly don't know what irony is."
Now, that's ironic!
I'm not implying that any old random URL posed is somehow authoritive, but this one is accurate:
Re: Isn't it ironic...
Either I've missed something, or you're from the Alanis Morissette school of irony.....
Re: Danger Will Robinson
Thank-you fellow commentards for not commenting on that abomination of a brain-fart (honestly!)
Re: Danger Will Robinson
Hyperthetically, if I have a valid license for XP that is no longer in use, I'm perfectly entitled to transfer it to another installation if it's a transfer and not a copy.
Why do people still think EULAs are above the law?
Adding to that, breaking a contract doesn't automatically mean you are breaking the law anyway.
"It would be alot more convincing if they showed unfudged output images side-by-side with the real pictures. Photoshopping them into the real pictures ruins the credibility in my opinion."
At first I though this amazing algorithm could also predict the way they stood and even the type and colour of clothes they wore!
Re: Who Still Uses Malloc?
Any sane OS (basically all multiuser systems) already zero freshly malloced memory, otherwise it would be a trivial method of exteacting memory information the user wouldn't normally be privileged to do so.
This bug is nothing to do with malloc - it's a basic overflow - the data returned is bigger than the allocated size, thus returning other parts of the processes memory/variables.
So even using calloc throughout would have made no difference here.
Please check before posting that you are secure on that high-horse of yours! :-)
Re: "Because ethernet and wireless are the same."
someone could plug in an ethernet wireless adaptor in and mess up my sat-nav?
How on earth can we survive this, when all we had to worry about before was brakes lines being cut, sugar in the petrol, a banana up the exhaust pipe etc..
Sigh, if someone drives into oncoming traffic or off a cliff due to satnav issues, they shouldn't be on the road!
"Dismissing someone who is leading the biggest and most important software project in existence based on "he used naughty words mummy". Grow the fuck up."
Your obvious bias shows with that comment, but leaving that aside, I'd say Obama is a more important person as a leader oof something, and I'm sure you wouldn't expect him to behave the same way.
Re: Too Little Too Late
"The world has moved on from Microsoft's proprietary API's to FOSS solutions like Android, ChromeOS, Ubuntu, and SteamOS. "
Hmmmmm, another one who thinks FOSS == Linux/GNU
Your use of the 'fanboi-alert' penguin icon was a clue!
Re: Lots more than that -
"Now now, look what you did - you spoiled all the fun with your unwelcome little fact. Tyrion was an a roll with 5 upvotes already!"
Indeed. As a long time opponent of Microsoft OS's and business practices, I get frustrated by the damage done by the FUD spreading Linux users that happen to be cult-of-RMS fanbois, they do more harm than good to Linux and FOSS in general.
I don't know......
It started in school, when someone came to give a talk on apprenticeships, and was surprised to hear that I was going to University.....
And continues throughout my adult career when people (both in and out of the field) say that they are surprised as I don't look like I'm good with computers..
p.s. Post icon is being used for non-windows purposes!
If there are security issues for others, then you have to be responsible.
Additionally, I've made many cockups that I'll admit to, but as I tried to say, for an error so fundamental...
Are you saying there is *nothing* embaressing that you've ever done you'd rather keep to yourself?
Also, note, the blog post wasn't even warning/advising about the error itself - that was an aside - his story was that Amazon picked it up. I'm sure if they hadn't, and he found out his error through other means, no article would have been written.
I'm no Reg shill, but it is clearly impled that the very least that he is shocked by this, and deems it a revelation worth posting about:
Amazon Is Downloading Apps From Google Play and Inspecting Them
I got the following email from Amazon about one of our Android apps that uses our AWS credentials as simple strings in the app itself.
Clearly Amazon or someone working with them is downloading apps from the Google Play Store and decompiling and/or otherwise inspecting them.
I’ve since fixed this problem, but my guess is that I am not alone in using credentials like this in my apps.
I'd personally never make such a schoolboy error, but if I did, telling everyone about it would be the last thing on my mind!
"We don't do mobile redirects atm"
And long may it continue!
Some sense in a sea of of User-Agent sniffing I once thought was in our past, but is unfortunately alive and kicking in tthe mobile world...
Re: Cloud Overlords
I personally haven't notice cloud-bias in the articleseither way.
The comments, however, are overwhelmingly anti-cloud, and obviously aren't being censored...
Re: Cloud Overlords
I assume he was referring to the original poster.
Drew, your fault for not implementing some kind of 'in reply to' header :-)
Re: Date/time in comments is now date only.
Now, the time shows as '..a few minutes ago' etc. (for those of us readers unable to tell the time .....sigh)
A classic case of change with no advantages and just disadvantages.
This change (which isn't even user-configurable scores a BIG black mark)
Australias next big thing?
... hit the rest of the world about 5 years ago.
"Yes, you are missing something.
7-bit ASCII doesn't need the initial '0' ... The modern 8 (16/32/64)-bit systems use of ASCII should be obvious to the cognizant."
Haha, he was quoting you with the initial '0', so I guess your insult is directed at yourself?
Re: CA Minors *can* sign contracts
" You can not delete a Facebook account, "deleting" a Facebook account merely hides your profile page."
Wrong. Facebook has both a 'deactivation' option, and a deletion option. Tin-foil-hat conspiracy theories relating to the latter option are irrelevant.
Re: Confirms my view about Microsoft as a cult
"Anon", I'm as anti-MS as the next guy, but if you weren't trolling, seek professional help especially as you seemed to miss the irony talking about cults when you clearly follow the cult-of-GNU (and no I'm not saying all GNU users/developers/proponents behave cultishly, but unfortunately, many do)
Re: Head to head @1Rafayal
" Interesting that you see it that way. I see many posters ( or is it just one or two ACs) proclaiming that Windows is far superior whilst still seeming to need to rabidly attack Linux with the same old tired untruths."
As a unix user and developer for over 20 years, and a FreeBSD user/developer for 15, I actually have to agree with the 1Rafayal.
Yes, you have the windows trolls but the Linux fanbois are far more prevailent.
Even as part of the open source / free software / unix-not-windows culture, I've regularly been severely voted down for making valid points perceived as being negative against Linux.
And surely you can't have failed to see the enormous upvotes posts get for praising Linux - even those offering no actual substance?
Unfortunately the Slashdot-style 'cult-of-gnu' is alive and kicking on the Reg.
Re: "Safety does not sell"
" It worked, really, really well. An automobile design that was so out of touch with US design preferences that it couldn't be sold here was repositioned as 'it's ugly because it's safe' and people ate that shit up"
They had the same campaign here in the UK, and it worked here too - everyone 'knew' that the ugly Volvo box car was safer.
Re: "Harvard Cancer Expert: Steve Jobs Probably Doomed Himself With Alternative Medicine"
" Sadly, the desperate act the most desperate, and grasp out at anything."
My cousin started going to see one, and he and his parents said it was really working. He died a month later, aged 22, after being milked by these bastards for lots of cash.
I may have missed something here, but what the hell has this got to do with New York citizens and US courts?
Maybe we should prosecute Fox News here in the UK because of the lies they broadcast
It's a funny old world
One government department exploits weaknesses, the other punishes them!
- Analysis iPhone 6: The final straw for Android makers eaten alive by the data parasite?
- First Crack Man buys iPHONE 6 and DROPS IT to SMASH on PURPOSE
- TOR users become FBI's No.1 hacking target after legal power grab
- Vid Reg bloke zips through an iPHONE 6 queue from ZERO to 60 SECONDS
- Analysis Why Oracle CEO Larry Ellison had to go ... Except he hasn't