On 17/05/13 00:48 AM, Adam Back wrote:
I saw someone mentioned on Ians blog that they had seen the HTTP requests
arrive too.  Looking I did also (these two are in http access log) the two
in parent article are in ssl access log as I mentioned.  Its not just SSL.

65.52.100.214 - - [16/May/2013:13:04:48 -0400] "HEAD
/Leghirs3cleQuiWruAg6fenfAryib7CajVisBeb8.php?user=foo&pass=yeahright
HTTP/1.1" 200 -
65.52.100.214 - - [16/May/2013:13:37:26 -0400] "HEAD
/Leghirs3cleQuiWruAg6fengyarrUg5blettOlyurc7.html HTTP/1.1" 200 -

The real question is how.  Is this happening on the server.  Or is it
happening in the client, reporting URLs to mothership.


Precise. As the Germans would say. Is there some form of universal backdoor built in, or is there a limited, hard-backed & anonymised code patch that just does URLs for spam monitoring?

And, what happens when they find a URL that is dodgy? Do they alert that user? Or is it just a general internal warning to their team? Tricky questions for the legal department -- having just watched a user lose their life savings to a ukrainian phishing attack ... they did ... precisely nothing?


And how dare they also.  Very double plus ungood, microsoft.  Shades of the
Lotus Notes OU=MiniTruth CN=BigBrother (actual strings contained in the
binary for lotus notes to describe the certificate backdooring their email
security).  http://cypherspace.org/adam/hacks/lotus-nsa-key.html


:)  So someone in the tech department left some clues.

I wonder what else microsoft have backdoored of their many products with
SSL
and other forms of encryption in them.  Maybe the OS itself.  People may
remember microsoft's own NSA key
http://cypherspace.org/adam/hacks/ms-nsa-key.html
- did they go the whole hog and just backdoor the OS?  They issued some
non-denial denials at the time.  But maybe its us who is being massively
naive here.  Crypto-geekery while they've been having a decade long massive
backdooring party.


The absence of information -- hard denials as you put it -- works to the benefit of the attacker. Anyone who suspects can be attacked in public as a conspiracy nut. Or, the common thing is that they can be told to prove their terrible accusations against a fine corporate citizen.

We should really be thinking the other way -- what is reasonable to assume is likely from the motives and past history of the actors, given their tendency to not confirm or deny what is asked of them? Perhaps this is the Israeli nuclear bomb question...



Another observation is that this appears to be a normal cycle, a sort of PLC for security products as it were.

A new security tool starts up with great claims and great proofs. Everyone swarms to it and it becomes part of the environment. The vendor maintains good security. For a while. A few sales, transfers, etc ... and the new owners don't understand the original context, but now have to squeeze the users for revenue to pay for the buyout. While fighting those fires, security seems to become more aligned with interests. Friends can help them... A few discoveries later, the mantra is "well, we always intended not to keep it secure in that way..."

Is it unreasonable for us to expect Skype to go another way? Are we asking too much?



iang



PS: PLC is "product life cycle"




Adam

On Thu, May 16, 2013 at 09:52:24PM +0200, Adam Back wrote:
To my surprise I see this two entries in the apache SSL log:

65.52.100.214 - - [16/May/2013:13:14:03 -0400] "HEAD
/CuArhuk2veg1owOtiTofAryib7CajVisBeb8.html HTTP/1.1" 200 -
65.52.100.214 - - [16/May/2013:14:08:52 -0400] "HEAD
/CuArhuk2veg1owOtiTofAyarrUg5blettOlyurc7.php?user=foo&pass=yeahright
HTTP/1.1" 200 -

I was using skype on ubuntu, my Ian on the other end was using MAC
OSX.  It
took about 45mins until the hit came so they must be batched.  (The gap
between the two requests is because I did some work on the web server
as the
SSL cert was expired and I didnt want that to prevent it working, nor
something more script like with cgi arguments as in the article).
_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to