* Posts by Andrew Commons

226 publicly visible posts • joined 22 Dec 2007

Page:

Ghost in the DCL shell: OpenVMS, touted as ultra reliable, had a local root hole for 30 years

Andrew Commons

Re: Simple workaround?

Yes you can, but it's rarely used.

Andrew Commons

Simple workaround?

Either remove CDU from non-privileged user command tables and/or reinstall it (this is VMS INSTALL) without CMEXEC. Not sure what the side effects of the second option would be.

It would be rare for non-privileged users to be using the SET COMMAND command.

You're the IT worker in charge of securing the cloud for your company. Welcome to Hell

Andrew Commons

Re: ..Osborne, you were spoilt!

@Doctor Syntax

The Silent 700 Model 763 - the one with the bubble memory - was 17 lb. I had an Osborne as well but I never had to lug that 1km to the train so it seemed lighter.

Andrew Commons

..Osborne, you were spoilt!

Try a TI Silent 700 for size. They were heavy!

https://en.wikipedia.org/wiki/Silent_700

DevOps: Bloody hell, we've got to think about security too! Sigh. Who wants coffee?

Andrew Commons

@Bill M

Presumably the firewall was relocated to where it was originally meant to be...blocking access from the Dev boxes to Production?

Dinosaurs gathered at NASA Goddard site for fatal feeding frenzy

Andrew Commons

Just a loose slab of rock?

In the Nature piece it looks like a loose slab of rock buried in the ground...there maybe more of it nearby?

On yer bike! Boffins teach AI drone to fly itself using cams on bicycles, self-driving car

Andrew Commons

Re: Rotating blades at groin height

"2.5 meters (high enough to avoid most urban obstacles testicles)"

There, fixed it for you.

'Do the DevOps?' No thanks! Not until a 'blameless post-mortem' really is one

Andrew Commons

Re: At exec level the word Agile has a completely different meaning

"They will not even realise its the name of a methodology."

Strictly speaking it is the name of a Manifesto, the methodologies associated with it try to adhere to the principles but may do so in different ways.

Parity calamity! Wallet code bug destroys $280m in Ethereum

Andrew Commons

Re: This is when I know I'm getting old...

Software defined money. That it's broken is no surprise because we cannot write software.

Thank god we don't have software defined networks, software defined infrastructure or software defined security because we would be royally screwed then.

Transparent algorithms? Here's why that's a bad idea, Google tells MPs

Andrew Commons

Re: The algorithmic model can be can be selectively tested with different types of input

Some research recently published on the arXiv preprint server examined inserting back-doors in algorithms during the training phase. The rationale was that training was likely to be outsourced - sent to the Cloud - to get the compute resources and that the training data could be manipulated while it was in the Cloud. Worked well. Back-door could not be detected looking at the model and it survived additional training largely unscathed.

Security pros' advice to consumers: 'We dunno, try 152 things'

Andrew Commons

An old survey.

"We used Google Forms (www.google.com

/forms/about) to write and host the survey, which ran

from February through June 2014"

That's in the final version in IEEE Security & Privacy as well so I assume it's the correct date.

Red (Planet) alert: Future astro-heroes face shocking adventures on Martian moon Phobos

Andrew Commons

There are Puns and Punishment

And that heading is the latter. The machine-pun approach does not befit El Reg. It may lead to negative feelings, sparks may fly, charges may be laid.

WPA2 security in trouble as KRACK Belgian boffins tease key reinstallation bug

Andrew Commons

Re: Router firmware updates?

It looks like an update for my SOHO Access Point has been available for about a week. Check vendor support sites.

London Tube tracking trial may make commuting less miserable

Andrew Commons

Re: One thing I always failed to understand....

I believe iOS does a pretty good job of MAC address randomisation when not associated, Android is generally very poor. This could bias the sample.

Australians still buy 100,000 feature phones a quarter

Andrew Commons

Smart phone breakage rate?

My recent purchase of one of these was driven by the failure of my smart phone. It covered me while it was being repaired.

Does 100,000 failures a quarter seem unreasonable?

Cybersecurity world faces 'chronic shortage' of qualified staff

Andrew Commons

Re: Actually, there are plenty of us out here.

@Warm Braw

That really needs to happen!

And the security industry has to stop pushing snake oil 'solutions' that haven't solved anything and start pushing solutions for secure architecture, design and coding. Most of the 'Top This' and 'Top That' coding flaws are either validation or error handling problems, or stupid design/architecture decisions.

Both likely to be driven by time to market pressures and the latest rapid development fad. Look how long DevOps was around before we saw the Ooops moment leading to DevSecOps...and then the next fad will blow it all away again.

DMARC anti-phishing standard adoption is lagging even in big firms

Andrew Commons

Email is a cess-pit

Companies don't care about their customers and also outsource a lot of the email to them. Then you have the fact that this is MTA to MTA technology rather than down at the client level and it is now down to the customer ISP to implement it to help the customer.

Use by companies to protect themselves is also non-trivial. Outsourcing and partnership arrangements that originate emails as if they were internal have to be dealt with...and you will find a lot of shadow technology once you embark on this path!

Sonos will deny updates to those who snub rewritten privacy terms

Andrew Commons

Re: Farewell Sonos

If you did own a Sonos I wonder if changing the T&Cs to something you no longer agree with provides a case for you to return the goods for a full refund?

You would not have acquired the goods in the first place with the revised T&Cs.

Internet's backroom boffins' big brainwave: Put people first in future

Andrew Commons

Re: sometimes you need a very simple clear rule like this to stop the BS explosion

@Charles 9

Exactly. This is what Netscape did with SSL. Nothing to stop it happening again.

Al Capone was done for taxes. Now Microsoft's killing domain-squatters with trademark law

Andrew Commons

Just 65 names?

An ars technical piece from a couple of days ago:

https://arstechnica.com/tech-policy/2017/07/microsoft-targets-fancy-bears-domains-in-trademark-lawsuit/

It contains a link to 200 PAGES of domain names 3 columns per page and small print.

Insurers claim cyber calamities could cost more than Hurricane Sandy

Andrew Commons

Cut them a bit of slack.

The report is, obviously, written from the point of view of the insurer and the numbers are what they would consider the insurance cover to be. Think of insuring your house, if it burns down you have the obvious replacement cost but also additional costs covering where you live in the interim.

The Reckitt Benckiser number is the immediate replacement cost. There will be other costs that would not have been considered in this statement. So while the report numbers seem high they might not be as overstated as the commentators suggest.

Secondly, if you are going to attack the numbers it would be more productive to flag where their model is wrong. They have at least run something up the flag pole so maybe make it better.

Hackers able to turbo-charge DJI drones way beyond what's legal

Andrew Commons

Re: "It's a bit silly to leave debug code in production apps"

I think at least one of the Mars rovers was saved because debug code had been left in the production software.

New work: Algorithms to give self-driving cars 'impulsive' human 'ethics'

Andrew Commons

Re: Save the women and children first!

@ Steve Button

Thinking much the same way. 4 seconds is considered opinion and would probably not match instinctive reactions. The assumption is that this is a good thing but now you may be deliberately mowing down A to preserve B which will be making lawyers salivate.

Time to rethink machine learning: The big data gobble is OFF the menu

Andrew Commons

Re: It is not the amounts of data that matter, it is the labelling

Exactly. It is very easy to get many GBs of security logs but labelling them is a huge issue. So relatively ancient KDD Cup data is used over and over because it's among the few instances of tagged data available.

50th anniversary of the ATM opens debate about mobile payments

Andrew Commons

Re: Cash still has some advantages

Here in OZ TELSTRA will charge you a fee of $1 to use it to pay your bill.

UK Parliament hack: Really, a brute-force attack? Really?

Andrew Commons

Re: Not only missing 2FA

It's quite easy to lock out all accounts if you implement lockouts after a certain number of failures. Even lockouts that expire can be prodded to keep the account locked. So the malicious actor can't get in and neither can any of the users of the system.

AES-256 keys sniffed in seconds using €200 of kit a few inches away

Andrew Commons

Re: In effect "traffic analysis" applied at the bus level.

@elDog

That's how you usually defeat traffic analysis.

Power plant cyber threat: Lock up your ICSs and SCADAs

Andrew Commons

Re: Really bad design

@Paul Crawford. Exactly. Educating the people who want to put this gear into these environments is not easy. But these devices are manufactured and sold by reputable players.

Andrew Commons

Re: Really bad design

Monitoring on the Internet is not a good idea either, you are exposed to DoS and possibly spoofing.

Air gapping also gets interesting when WiFi or Bluetooth enabled components come into the mix. These can get deployed in areas where physical access is awkward, and of course, they will have an App for the techies smartphone which is another vector for compromise.

Just give up: 123456 is still the world's most popular password

Andrew Commons

Re: Don't Just Blame Users

Agreed. I have had sites reject random passwords with 'special' characters in them without any indication of the allowable character set. The error message - logs - have displayed the password string in full so just changing a bit here and there is not an option.

Desperation may lead you to 12345 just to move forward. Finding some way to go back and rectify that accommodation may be non-trivial.

So users should not shoulder all the blame here.

FM now stands for 'fleeting mortality' in Norway

Andrew Commons

Re: It's not the first country

Well Wikipedia says this in the link you have provided:

"Today, as elsewhere in the developed world, most Australian broadcasting is on FM - although AM talk stations are still very popular."

It came back.

Put walls around home Things, win $25k from US government

Andrew Commons

Re: I'd like my fridge to be able to import my CA certificates

That would certainly be a step in the right direction. The consumer environment is not going to be able to cope with a 'trust nothing' model for quite a while. Migrating 'old school' corporate technology into this space would be a viable alternative in the short term. Consumer edge devices become UTM by default.

Andrew Commons

A good start

A good start if you are talking about filtering outbound as well as inbound. Then you get tunnelling and encrypted traffic which is probably going to be beyond the capabilities of consumer devices to inspect (are you listening Google?). This is on top of the bizarre connectivity requirements some devices seem to require.

Throw it all away and start again in a universe far far away...

The Internet Society is unhappy about security – pretty much all of it

Andrew Commons

Re: There was never an era where all hats were white

My hair is very white :-)

My comment is based on the lack of success seen in all 'secure coding' initiatives. We see this every month.

While we are obsessed with shiny it will never change.

Andrew Commons

Security is rubbish

Absolutely. Serious efforts by major organisations have clearly shown that with current technology it will remain so.

Abandon all shiny things and go back to simplicity. We may actually have a chance of improving things, after we have ditched all the 20th century technology we rely on that was built for an era where hats were all White.

Men overboard! US Navy spills data on 134k sailors

Andrew Commons

Re: Full Disclosure?

Leaks involving seamen is invariably bad news.

Obama awards honours to Grace Hopper, Margaret Hamilton for computing contributions

Andrew Commons

Maybe you should read this:

https://www.nasa.gov/feature/margaret-hamilton-apollo-software-engineer-awarded-presidential-medal-of-freedom

The sharks of AI will attack expensive and scarce workers faster than they eat drivers

Andrew Commons

Two points.

First, this relies on the Internet which can be taken away at any time because the technology it is built on is not up to the job. The temptation/motivation to take it away will only be increased by this sort of shift. You would have to be mad....oh.

Second, you can always change the economics...don't pay them as much!

Silicon Valley's oligarchs got a punch in the head – and that's actually good thing

Andrew Commons

Re: Question?

However they do have other parties and even if they do not rate as credible they probably sucked up enough votes to impact the outcome of this election.

Adobe Australia drops SaaS tax dodge

Andrew Commons

Laughing all the way to the Bank

I assume the 10% will be added to the purchase price and so will increase the currency conversion charge applied by the Bank/Credit Card handling the transaction....and appear on the Bank's bottom line.

Nice work if you can get it!

Uncle Sam emits DNS email security guide – now speak your brains

Andrew Commons

The goal of this project is to help organizations

Consumers are still left out in the cold. Until such time we see end-to-end measures wide spread at the consumer level email will still be the playground of the criminals.

Run a JSON file through multiple parsers and you'll get different results every time

Andrew Commons

Re: The Golden Ant

Mythology maybe...Jason and the Golden...

Andrew Commons

Re:it's just an arbitrary string after all...

More likely to be a very carefully chosen string particularly when the parser has been identified and it's parsing quirks are known.

Quite a large number of the parsers tested supposedly parsed input they should have rejected. That would be an interesting path to explore if you wanted to inject invalid data into an application.

Andrew Commons

Welcome to the Internet

Tools such as Nmap rely on implementation differences to fingerprint end points. These implementation differences are invariably fuelled by sloppy specifications - aka RFCs - that use the terminology of RFC2219 (and all too frequently RFC6919) to specify the technology we rely on.

These should be reduced to MUST and MUST NOT before things get any better and even that is probably not going to be sufficient.

I assume tools like nmap will jump on this :-)

Cloudflare ordered by judge to help unmask two website owners

Andrew Commons

Who Is....

The WhoIs information for the sites leads to WhoIs Privacy Corp domiciled in the Bahamas.

Their web site claims it will protect your identity as the owner of a domain and only reveal it under specific circumstances. These include "To comply with a subpoena or other legal process served upon us.".

I would assume that Elsevier drew a blank here as well if they are now going after Cloudflare.

It is not at all surprising that the domain registration process allows this to happen.

IBM throws ISP under a bus for Australia's #Censusfail

Andrew Commons

Data security?

I pointed out that the Canadian owned (at the time) NextGen were in the picture in a response to this post:

http://www.theregister.co.uk/2016/08/07/it_analyst_oz_census_data_processed_as_plain_text/

The SSL/TLS connections terminated on their network. They potentially had access to all the responses on their network.

So we have at least two foreign powers having access to the data submitted online.

Australia's new data breach disclosure laws have a rather floppy definition of 'breach'

Andrew Commons

Being distressed is not sufficient.

"Though individuals may be distressed or otherwise upset at an unauthorised access to or unauthorised disclosure or loss of their personal information, this would not itself be sufficient to require notification unless a reasonable person in the entity’s position would consider that the likely consequences for those individuals would constitute a form of serious harm."

Consider a series of breaches where each one releases some information about an individual, none of these are considered serious enough to report in isolation but taken together they provide enough information to create the risk of 'serious harm'.

They all need to be reported.

The concept of 'notification fatigue' also seems to imply that a large number of breaches are expected to be taking place which increases the aggregate risk issue.

You've been hacked. What are you liable for?

Andrew Commons

A bit hard on HR..

Disclaimer: I have no HR affiliations.

"and HR and sales departments are the most often hacked because they are the least computer security aware"

HR is also at the pointy end when it comes to receiving legitimate unsolicited emails so they have to be far more aware than the average employee. Fake resumes and expressions of interest are very common vectors for phishing. So this is actually a bit harsh.

Email security: We CAN fix the tech, but what about the humans?

Andrew Commons

Re: S/Mime

Actually not much will break and if you adopt soft fails initially then this will be further reduced.

Anything and everything on the Internet can be compromised. It's really about building a framework that supports defence in depth and therefore requires multiple compromises to subvert.

Still possible but at some point the effort required and the reduced returns will start to have an effect.

It's all about doing something rather than passively accepting it all. And the tools are there right now.

Andrew Commons

S/Mime

All companies/corporations must digitally sign their outgoing email. A number (increasing number?) of email clients can handle this. This provides end-to-end integrity and assurance of origin.

Additionally clients need to be able to perform SPF/DKIM checks rather than hoping (in vain) that the ISPs MTA has done this. Companies then need to implement SPF/DKIM for ALL their domains which many companies don't do.

This will make it harder to impersonate legitimate emails but still requires an informed user and appropriate client software support. All the standards already exist and are used go some extent.

Page: