* Posts by patrickstar

643 publicly visible posts • joined 1 Dec 2015

Page:

Oracle reveals Java Applet API deprecation plan

patrickstar

Re: @patrickstar

I was referring to what it takes to write a runtime, not to write code that runs in it.

And first of all, just because you can write fast number crunching (relatively easy to optimize the runtime for) doesn't mean a lot of other stuff isn't painfully slow.

Second, imagine if equal effort went into designing runtimes for more suitable languages. You'd achieve a lot more and at the very least have much fewer bugs (many of them potential security issues).

Third of all, even discounting performance etc. and just looking at pain of development, it's not even a particularly good language for anything more complex (as you seem to partly agree).

patrickstar

There are lots of design decisions in JavaScript that makes it a very poor candidate to use as a p-code-like target for other languages. Just getting any sort of performance in a JS runtime requires LOTS of voodoo.

This should be fairly obvious - it was after all intended to be used for basic interactive scripting. The requirements are somewhat different.

AVM2, which at least keeps type information around, would be a much better candidate, and is a fully open standard that you can implement without having anything to do with Adobe or the rest of Flash. But that's of course not as cool or fun as reinventing the wheel. (And admittedly AVM2 has its problems too, like the egregiously fat opcodes... eg string concatenation like "a" + "b" literally compiles to an addition op).

FBI Director wants 'adult conversation' about backdooring encryption

patrickstar

Re: Bah!

Actually, to stretch the mechanical key metaphor much too far, there are some interesting vulnerabilities that arise when a mechanical lock is master keyed, i.e. able to be opened by two different keys (sound familiar?). See http://crypto.com/masterkey.html

WikiLeaks uploads 300+ pieces of malware among email dumps

patrickstar

Re: Should be part of their threat model

It could very well be interesting for third parties to study the sort of malware sent to these organisations. So flat out removing it wouldn't be a good idea.

Viscous liquid oozing down the walls? You must have hives

patrickstar

This reminds me an awful lot of an X-Files episode, though there it doesn't take place in a hospital...

Now where is the Cigarette-Smoking Man when we need him?

Linux security backfires: Flaw lets hackers inject malware into downloads, disrupt Tor users, etc

patrickstar

Re: At least it's an easy fix

There is no benefit from these settings unless you are on a multihomed host - and chances are your home network isn't. *

And they break lots of multihomed setups.

So no, not good to have by default. I think Debian actually used to enable them by default but wisened up. At least I have lots of memories of doing routy stuff with Debian and repeatedly scratching my head as to why it wasn't working until I remembered to disable them.

* Actually, there is one use case on a single homed host: Efficiently blocking traffic from a long list of addresses/networks. Add routes for them via loopback and enable rp_filter. What rp_filter does is look up the sources of all incoming packets in the routing table and dropping the packets if the incoming interface doesn't match the route. And routing table lookups are a lot more efficient than stepping through firewall rules.

Windows 10 Anniversary Update crashing under Avast antivirus update

patrickstar

Re: Two questions

Kernel/driver coding is HARD, and there is a lot of potential for unforeseen interactions.

MS has actually stopped, beginning with 64 bit Windows, AV vendors (and certain other usual suspects) from poking around in the kernel arbitrarily. See PatchGuard / Kernel Patch Protection.

Instead they have provided documented APIs for things like filtering syscalls.

This however sounds like a driver for the Avast virtualization sandbox thingie. Not very familiar with it, but you can't really stop that without breaking VMware, VirtualBox, et al. as well.

Three times as bad as malware: Google shines light on pay-per-install

patrickstar

Re: Another extended whine

There's a crucial difference between "ad-financed software" and "adware".

Hell, the latter is (or was, before ransomware etc) frequently distributed via drive-by-downloads as well as being bundled with installers.

Power cut crashes Delta's worldwide flight update systems

patrickstar

I wonder how many of these datacenter power disasters would have been avoided if everyone had just standardized on -48VDC for servers, like in the telco world?

It's orders of magnitude simpler to provide backup (batteries! No DC/AC converters needed) and failover (no phase sync needed, among other things) for.

Hell, apart from enormous DC UPS systems, the only time you see those insanely huge DC/AC converters is in HVDC systems... For a reason.

Stealthy malware infects digitally-signed files without altering hashes

patrickstar

Re: "Nipravsky reverse-engineered Microsoft's undocumented portable executable loading process"

The format is documented. There is no reliance on obscurity, and there was no reverse engineering involved in "discovering" this. See http://download.microsoft.com/download/9/c/5/9c5b2167-8017-4bae-9fde-d599bac8184a/Authenticode_PE.docx and the actual paper instead of the crappy Reg reporting of it.

The paper isn't even an attack on Authenticode per se - it's just a way to store stuff in PE executables without altering their signatures. This does not mean whatever you added actually gets executed. There still has to be code that actually loads and runs it - you could achieve the same thing by just having the PE executable load an external file from disk or over the network. This is what the "reflective PE loading" hype is about - a technique that's well used for ages for both malicious and non-malicious purposes.

At most it's an attack on stupid AVs that blindly assume a signed PE should never be checked for signatures etc. A well-known attack, even. And you still have traceability as to who signed a PE that does crazy stuff like loading code from its signature.

I don't know if storing the code to be loaded in this particular place has been done before, but similar and more advanced certainly has. One example would be bypassing kernel driver signing by loading a driver with a known vulnerability and exploiting it.

Stopping this completely is well recognized as impossible - even if you outright ban introducing new code at runtime (which certain smartphones do if I'm not mistaken), you can still introduce code into an interpreter or virtual machine.

$67M in bitcoin stolen as hacking typhoon lashes Hong Kong's Bitfinex

patrickstar

Re: "suddenly become vapor..."

260mg of MDMA HCl is definitely a tad on the high side, but still an order of magnitude or so off the dose where it actually starts killing people on its own. Unless you have some underlying condition, get severely dehydrated, etc, i.e. a linear progression of the usual dangers. There are even quite a few instances of people literally taking grams of the stuff on purpose (attempted suicide or just being idiots) and lived to tell the tale without even ending up in a hospital.

200mg is, by the way, perfectly enjoyable (or so I've heard...).

As a sidenote, Sasha was never actually a big fan of MDMA himself - he didn't get the typical effects but rather some giddy intoxicated state. Referred to it as his "low-calorie martini".

PS. Without knowing this case in particular, I'd suspect poor pill making practices giving a wildly variable dose rather than intentionally ending up with 1/3 the pills they would have with a lower, but still very good, amount.

Or it could even be intentionally putting out identical pills, some containing a high dose of MDMA and some containing a random chemistry accident. Agree on the legalization point regardless.

patrickstar

Banks and government do no such thing. Gold reserves cover a very small fraction of the currency in circulation. Even then, banks in turn only keep around 10% or so (depending on regulation and accounting standards/tricks) of the already virtual money on "your" account actually around - the rest is being loaned out.

patrickstar

Re: "suddenly become vapor..."

You are confusing MDMA, a specific chemical, and "ecstasy". The amount of MDMA that would be likely to kill you wouldn't fit in anything you would recognize as a pill. Rather seems to be the old classic of someone pressing pills containing God-knows-what random chemical and selling it as "ecstasy". Possibly not even an illegal one and thus sourced from China or India and not some darknet market.

UK's 'Sir King Cash' card fraudster ordered to cough up £560,000

patrickstar

How was he able to keep his merchant account alive with that fraud rate?

I'm assuming here he didn't have that much other business...

My Microsoft Office 365 woes: Constant crashes, malware macros – and settings from Hell

patrickstar

Uhm, last time I checked, or rather last time fetchmail ran on my Sun workstation (i.e. a couple of minutes ago), Office 365 had a perfectly good POP3/IMAP server...?

How to upgrade cities to 40Gbps broadband without replacing today's fiber network

patrickstar

PON is crap anyways, why bother with the lipstick on the pig? It's a dead end when it comes to offering anything more than fancy cable. With the abundance of cheap ethernet-over-fiber gear, it doesn't even make sense financially except for networks which were stupid enough to lock themselves into a PON topology from the start. If you did it right, or do it right now, you can run any speeds now and in the future by just swapping out the gear at both ends of the fiber pair (or single fiber strand for that matter).

We're not looking for MH370 in the wrong place say investigators

patrickstar

Re: everyone [..] wants [..] a better chance of it not happening again

For good reasons (Think about it...), pilots often don't prioritize radio communication when desperately trying to save the aircraft in a sudden emergency. Look at the recent Egypt Air crash. Probable on-board fire - no radio comms.

BT customers hit by broadband outage ... again

patrickstar

The ACs are not powered by the UPS in a datacenter, only by the generator.

DC UPSes are meant for computer/network gear only and will become very unhappy if you try to power ACs from them - chances are the ACs would get pissed off as well. No need to try in the first place since you can do perfectly fine without cooling during the few minutes it takes for the generators to start.

patrickstar

Re: Some sympathy -but not a lot

LINX going down would at most lead to reduced capacity, not an outage (well, not for long, at least).

Containers rated more secure than conventional apps

patrickstar

This is about SELinux, but applies to containers as well... possibly even more so than a strict ruleset that reduces kernel attack surface somewhat. https://www.grsecurity.net/~spender/pics/mac_security_sesamestreet.jpg

Malaysia-based credit card fraud ring broken, 105 arrested

patrickstar

Re: Credit card fraud tentacles ..

Most stolen card info comes from either skimming, compromised merchants or card processors.

Zero-interaction remote wormable hijack hole blasts Symantec kit

patrickstar

MSE, or whatever it's called today...?

patrickstar

Re: So, is this still a thing?

You can rest fully assured that there are tons of just-as-critical, but yet-not-disclosed-in-public, vulnerabilities in these products (or any other product exposed to untrusted data developed with a similar callous disregard for security)

patrickstar

If you for some reason decide you need an AV, why the hell would you ever pay for one? Avast is free and certainly a lot more effective and less horrible than Norton in all aspects.

Objective-C can fly the COOP, says subversive at Microsoft Research

patrickstar

Re: After a few seconds of thinking:

Noone has ever succeeded in eliminating exploitable bugs in complex software written in memory-unsafe languages, using valgrind or anything else.

In fact, one of the Firefox JS developers is also one of the guys behind Valgrind. Still, a steady stream of exploitable vulnerabilities are discovered (nowadays frequently as they are being exploited in the wild) in Firefox.

Crims set up fake companies to hoard and sell IPv4 addresses

patrickstar

The proper, and well-established, way to fix this is to use Proxy ARP and either port protection or one VLAN per customer. Then all traffic will pass through the network gateway even though the IP addresses are in the same subnet.

RIP ROP: Intel's cunning plot to kill stack-hopping exploits at CPU level

patrickstar

Re: Would also bork legitimate code

This comes with a very big performance penalty on modern x86 CPUs, so noone should be doing it in new code anyways. The CPU actually keeps a stack of return addresses around so it can predict where the RET goes. Anything except CALL/RET that fiddles with return addresses will cause it to become unbalanced with a pretty hefty performance penalty.

On her microphone's secret service: How spies, anyone can grab crypto keys from the air

patrickstar

Re: 4096-bits in audio bandwidth

The actual entropy of a 4096 bit RSA key is a lot less than 4096 bit... that's why they are so big to begin with.

As for balanced branches, you're much better off not having key dependent branches in the first place. Very doable atleast for ECC crypto.

Two plead guilty to stealing personal information of millions

patrickstar

So Boca Raton is STILL the spam capital of the world, despite all the competition from the Russians?

Hacked in a public space? Thanks, HTTPS

patrickstar

Re: Net history

You could easily imagine a network where things like authentication and confidentiality are built right into the network itself.

At least this could be applied to the distribution of routing information to prevent things like, say, all traffic to Youtube suddenly going to Pakistan, or any more recent BGP hijacking incident.

VMware flushes Windows vSphere client and Adobe Flash

patrickstar

Re: VMWare flash future

VMware already has its own OS. It's called VMkernel, and it's what ESXi runs on. Hell, it's even binary compatible with Linux (and judging from current GPL lawsuit includes a chunk of code from it as well). And ESXi can supposedly virtualize itself, so nothing except the minor issues of usefulness and sanity stops you from running your services in a VMware OS inside a VMware VM inside a ...

("Bare metal hypervisor" is, by the way, a stupid marketing term that doesn't make sense on anything remotely resembling this kind of virtualization. No matter what you do, you are still gonna need memory management, scheduler, drivers, etc. - the makings of an OS. And in VMware's case you literally have a general-purpose OS with a standard kernel architecture etc. - just one that's optimized for running specific applications)

Symantec antivirus bug allows utter exploitation of memory

patrickstar

Back in the XP days (before Patchguard), Symantec/Norton antivirus hooked some of the same shadow SSDT entries (syscalls) as you'd expect a keylogger to do. I actually showed the hooks to a guy at MS security and he was totally convinced the computer had a keylogger...

Really makes you wonder.

Sloppy security in IoT putting 'life and limb' at risk, guru warns

patrickstar

Re: IoT developers and security

While I've seen my share of atrocious XP Embedded systems and the like, some really bad cases don't even run much if anything of an operating system (often just some libs supplied by the uC/SoC manufacturer) and/or doesn't have a MMU (good luck running Windows - or remotely normal Linux - on that).

Kill Flash now? Chrome may be about to do just that

patrickstar

Re: Why has Flash been so bad?

I'm sure that if Photoshop automatically loaded media off web sites and was deployed on a large chunk of Internet connected PCs, we would be having this discussion about it instead...

Flash at its heyday was, and to some extent still is, a really good tool/environment from the content author/software developer viewpoint. Covers everything from simple interactive 2D vector stuff to high-performance bitmapped 2D graphics as well as 3D (with or without acceleration) and everything in between. Either as part of a web site interacting with the rest of it, loaded from a web site, or a standalone application. And works really well while doing so, provided that the developer actually knows what he/she is doing (admittedly, your average Flash developer should be dragged out and shot, but that applies even more so to web developers in general). With a nice API and a rich ecosystem including very good third-party toolchains and libraries. Etc.

Too much focus on making it nice, pretty and nifty and too little focus on security.

patrickstar

Re: Google catches up to Apple, while Microsoft trails the pack

It's less, yes, but there is a significant degree of overlap in the functionality exposed to hostile content.

Flash has something corresponding to all the basic components and APIs except the whole user interface thing.

Most importantly, it has all the parts that tend to be where exploitable browser bugs actually are.

patrickstar

Re: Google catches up to Apple, while Microsoft trails the pack

To be fair, its bug count or frequency isn't worse than any of the major browsers. They are all, universally, major security jokes, in case someone hasn't noticed. The advantage of Flash is that you can actually turn it off, unlike all the Web3.0 hipster crap in modern browsers.

And just to be picky - while it for obvious reasons is unlikely to get targeted by some Russian exploit pack nowadays, Windows 98 in its heyday happily downloaded and ran ActiveX controls automatically. At most displaying a message along the lines or "Are you sure you wanted to run this ActiveX control?"

And not sure whether Windows 98 is vulnerable to the MDAC bugs, but those (applies to NT/2K and XP up to some service pack) were actually a staple in above mentioned exploit packs for many years, and let attackers simply tell it to run any command.

Finally - 98 has no ASLR/DEP (not that it would save you from those), sandboxing, permissions/user control, or even real ring3/0 separation, so any bug - memory corruption or not - and you're hosed.

How to not get pwned on Windows: Don't run any virtual machines, open any web pages, Office docs, hyperlinks ...

patrickstar

Not to mention Intel's implementation isn't even particularly good. It's mostly microcoded, so a simple VM exit takes literally hundreds of clock cycles before the VMM even gains control. Compare that with SPARC (sun4v) - one (1) cycle.

patrickstar

Re: it's easy - take off your rose tinted spectacles and back away from the pc.

For desktop, sure, but what about mobile?

I'd certainly prefer PalmOS to iOS, Android, etc. And it doesn't even have preemptive multitasking!

patrickstar

Re: Windows 10 news!

Windows (NT) has at one point existed for both of those, and a bunch more, so if there was a compelling reason for it I'm certain it'd reappear, or appear on an entirely new platform for that matter.

Hell, it wasn't even developed for x86 originally and rumor has it the x86 port was a skunkworks project.

But maybe they un-learned this since then?

patrickstar

Re: Allowing a VM to corrupt the host is a sin

The complexity lies in emulating all the hardware needed and/or providing interfaces for paravirtualization. The actual virtual machine management itself (i.e. fiddling with VMX or AMDs equivalent) is minimal.

Compare VMware Workstation for example (since it's what I have handy at the moment)

Actual thing that does what the CPU helps you with: vmx86.sys, 66KB

The rest: vmware-vmx.exe, 20MB

VMware might be the worst in this aspect (even on ESXi guests frequently have more hardware than the host!) but even if you shave it down to 1/5 that's still a lot of exposed code...

Gumtree serves world's worst exploit kit to scores of Aussies

patrickstar

Re: Ad Blocker

The advertisers brought this whole ad-blocking thing on themselves. If they had stuck to, say, banner and text ads, instead of todays resource-eating ever-tracking annoying (now even frequently with sound!) javascript-dependent disasters, noone would be annoyed or get infected by them.

patrickstar

Chronically insecure code like...

...any major web browser and/or any common plugins.

FTFY

You can't dust-proof a PC with kitchen-grade plastic food wrap

patrickstar

Re: Random jottings...

Did you have absurd humidity or something? Computer gear is normally rated down to -20C or -40C when not in operation.

The air hole (pressure equalization?) in HDs is covered by a micron filter, by the way.

patrickstar

I almost strangled the construction workers after arriving at the office and seeing a sheet of plastic over my workstation - luckily, both for my workstation and liberty, picl reported temperatures just a tad above normal. It wasn't anywhere near a complete wrap like this, rather formed a tent with openings at the bottom.

Bash on Windows. Repeat, Microsoft demos Bash on Windows

patrickstar

Re: It will have the same limitations

Troll, but I'll bite in case just in case someone believes him!

Perfmon. I have a graph right here showing interface stats for a web server. Plus graphs for various aspects of CPU and memory usage including context switches and # of threads. Plus CLR JIT stats. And some other stuff too.

patrickstar

Re: Right?

If you are hitting a limit of 1024, it's in the C runtime and not the Win32 API or NT kernel. The actual limit is...much higher. I have a process on my Win box (leaking handles, fuck you HP) which currently has 483 211 open.

The usual way of doing async I/O on Windows is through overlapped I/O. This has semantics not-entirely-dissimilar from SIGIO. Since you can take SIGIO and make it behave like epoll and friends from the callers point of view on *ix (see any number of async I/O abstraction layers), surely you can do the same with overlapped I/O as well. Or am I overlooking something here?

patrickstar

Re: Does this mean multi-user support on console?

What are you asking for exactly - a text mode console with VTY support? A lot of non-Linux POSIX systems don't have that, including many of the classic UNIX systems (eg. Solaris/SPARC).

I'm assuming here you aren't unaware of the RUNAS command or any of the other ways of starting two command lines/shells/applications as different users on Windows and the question simply is "can I run two interactive things outside of the GUI and switch between them".

patrickstar

Re: Stealing VMS

It's referred to as "NT OS/2" in the original design documents atleast, eg:

Portable Systems Group - NT OS/2 System Startup Design Note

Author: Mark Lucovsky - Revision 1.2, July 26, 1990 - Original Draft May 31, 1990

but I don't know what the marketing name was.

That's also why I'm assuming NTOSKRNL refers to NT OS/2 as I haven't seen any references to "NT OS" anywhere (well, except for the name of the source tree!) - in the newer docs it's universally called Windows NT. And yes, "Portable Systems Group" was the original name of the NT team!

patrickstar

OS X does not use a BSD kernel. Again, OS X does not use a BSD kernel.

It's a Mach kernel (not BSD; unlike BSD, Mach is originally a proper microkernel although Apple skipped out on that part) based on NeXTstep (not BSD), with some BSD added to the mix. After all, Apple bought NeXT (and before that was looking at BeOS) when they needed something to replace MacOS Classic. Why would they go to that trouble and expense if all they got from it was free-as-in-speech-and-beer BSD code base with some customizations?

Hell, a not-insignificant part of OS X kernel code (percentages someone? no idea personally) is C++. When was the last time you saw C++ in kernel land in any BSD?

I think the whole "OS X is BSD based" thing comes from the userland, but I'm far from an OS X expert.

Kinda like Microsoft, say, providing a subsystem to run Linux applications and partnering up with someone to provide and package them, perhaps...

patrickstar

Cygwin is just a hackish emulation layer over the Win32 API. With mixed results due to fundamental semantic differences.

Not the same thing as a proper POSIX, Linux, etc. subsystem as I assume this is about - having that means they are just as real/"native" and part of the OS as Win32 is.

It might be worth pointing out that while Win32 is now the dominant subsystem on Windows, it didn't even exist until quite some time (years) into the development of what was then called NT OS/2.

Page: