Re: facebook spying on us?

2011-10-02 Thread Simon Leinen
 Data Center Knowledge posted about 20 minutes of very poorly shot
 video of Prineville.  They're Open Compute servers in 'triplet' racks.
[...]
 Their power supply (also open) runs across 2 legs of a 277/480 3-phase
 feed, which is usually what the substation supplies to your PDUs,
 which step it down further to 120/208.  It also takes -48, and each
 pair of triplets has a 48V float string that will run the 180 servers
 for about 45 seconds.

 It's a nice setup.  I plan to steal it.  :-)

That's what they want you to do - check out the specs on

http://opencompute.org/
-- 
Simon.



Re: Facebook insecure by design

2011-10-02 Thread Michael Thomas

William Allen Simpson wrote:

In accord with the recent thread, facebook spying on us?

We should also worry about other spying on us.  Without
some sort of rudimentary security, all that personally
identifiable information is exposed on our ISP networks,
over WiFi, etc.

Facebook claims to be able to run over TLS connections.
Not so much (see attached picture).

This wasn't an app, this is the simple default content of a
page accessed after a Google search.



I'm not sure why lack of TLS is considered to be problem with Facebook.
The man in the middle is the other side of the connection, tls or otherwise.

Mike



Re: Facebook insecure by design

2011-10-02 Thread Jimmy Hess
On Sun, Oct 2, 2011 at 10:38 AM, Michael Thomas m...@mtcc.com wrote:
 I'm not sure why lack of TLS is considered to be problem with Facebook.
 The man in the middle is the other side of the connection, tls or otherwise.

That's where the X509 certificate comes in.   A man in the middle
would not have the proper private key to impersonate the Facebook
server that the certificate was issued to.

Supporting TLS in their case is not good enough...  they would need to
force all connections to be over TLS, to achieve security against
MITM.

As soon as an app causes the end user to switch to a non-TLS
connection,  they are vulnerable.


 Mike
--
-JH



Re: Facebook insecure by design

2011-10-02 Thread William Allen Simpson

On 10/2/11 12:36 PM, Jimmy Hess wrote:

On Sun, Oct 2, 2011 at 10:38 AM, Michael Thomasm...@mtcc.com  wrote:

I'm not sure why lack of TLS is considered to be problem with Facebook.
The man in the middle is the other side of the connection, tls or otherwise.


That's where the X509 certificate comes in.   A man in the middle
would not have the proper private key to impersonate the Facebook
server that the certificate was issued to.


My understanding of his statement is that Facebook itself is the MITM,
collecting all our personal information.  Too true.



F.ROOT-SERVERS.NET moved to Beijing?

2011-10-02 Thread Janne Snabb
I happened to notice the following at three separate sites around
the US and one site in Europe:

$ dig +short +norec @F.ROOT-SERVERS.NET HOSTNAME.BIND CHAOS TXT
pek2a.f.root-servers.org

and:

$ dig +short +norec @F.ROOT-SERVERS.NET HOSTNAME.BIND CHAOS TXT
pek2b.f.root-servers.org

After running a couple of traceroutes it appears that he.net has a
route for F's anycast IPv6 address (2001:500:2f::f) towards Beijing.
According to https://www.isc.org/community/f-root/sites the Beijing
node should be a Local Node (without IPv6 but I suppose the list
is not up to date).

I believe this means that a lot of DNS queries from IPv6 enabled
sites in US and other countries are going to Beijing. I wonder if
this is intentional? Chinese government (CNNIC) seems to be in the
path.

All my sites seem to have he.net somewhere in the IPv6 connectivity
path. I wonder if this is specific to he.net or more wide-spread
routing anomaly?

I have notified he.net NOC and F-root @ ISC.

Best Regards,
--
Janne Snabb / EPIPE Communications
sn...@epipe.com - http://epipe.com/



Time Warner to centurylink/qwest

2011-10-02 Thread Philip Lavine
Can not reach Centurylink/qwest from time Warner. 


Re: Facebook insecure by design

2011-10-02 Thread Michael Thomas

William Allen Simpson wrote:

On 10/2/11 12:36 PM, Jimmy Hess wrote:

On Sun, Oct 2, 2011 at 10:38 AM, Michael Thomasm...@mtcc.com  wrote:

I'm not sure why lack of TLS is considered to be problem with Facebook.
The man in the middle is the other side of the connection, tls or 
otherwise.


That's where the X509 certificate comes in.   A man in the middle
would not have the proper private key to impersonate the Facebook
server that the certificate was issued to.


My understanding of his statement is that Facebook itself is the MITM,
collecting all our personal information.  Too true.


Bingo.

Mike



Re: F.ROOT-SERVERS.NET moved to Beijing?

2011-10-02 Thread Jimmy Hess
I see similar,  intermittedly

#  dig +short +norec @F.ROOT-SERVERS.NET HOSTNAME.BIND CHAOS TXT
pek2a.f.root-servers.org

#  dig +short +norec @F.ROOT-SERVERS.NET HOSTNAME.BIND CHAOS TXT
ord1b.f.root-servers.org



On Sun, Oct 2, 2011 at 12:40 PM, Janne Snabb sn...@epipe.com wrote:
 I happened to notice the following at three separate sites around
 the US and one site in Europe:

 $ dig +short +norec @F.ROOT-SERVERS.NET HOSTNAME.BIND CHAOS TXT
 pek2a.f.root-servers.org

 and:

 $ dig +short +norec @F.ROOT-SERVERS.NET HOSTNAME.BIND CHAOS TXT
 pek2b.f.root-servers.org

 After running a couple of traceroutes it appears that he.net has a
 route for F's anycast IPv6 address (2001:500:2f::f) towards Beijing.
 According to https://www.isc.org/community/f-root/sites the Beijing
 node should be a Local Node (without IPv6 but I suppose the list
 is not up to date).

 I believe this means that a lot of DNS queries from IPv6 enabled
 sites in US and other countries are going to Beijing. I wonder if
 this is intentional? Chinese government (CNNIC) seems to be in the
 path.

 All my sites seem to have he.net somewhere in the IPv6 connectivity
 path. I wonder if this is specific to he.net or more wide-spread
 routing anomaly?

 I have notified he.net NOC and F-root @ ISC.

 Best Regards,
 --
 Janne Snabb / EPIPE Communications
 sn...@epipe.com - http://epipe.com/





-- 
-JH



Re: F.ROOT-SERVERS.NET moved to Beijing?

2011-10-02 Thread Randy McAnally


On Sun, 2 Oct 2011 17:40:23 + (UTC), Janne Snabb wrote
 I happened to notice the following at three separate sites around
 the US and one site in Europe:


Getting palo alto from east coast.

 3  10gigabitethernet1-2.core1.atl1.he.net (2001:470:0:1b5::2)  8.166 ms 
8.135 ms  8.103 ms
 4  2001:470:0:ce::2 (2001:470:0:ce::2)  77.881 ms  77.866 ms  77.909 ms
 5  iana.r1.atl1.isc.org (2001:500:61:6::1)  77.885 ms  77.924 ms  77.896 ms
 6  int-0-5-0-1.r1.pao1.isc.org (2001:4f8:0:1::49:1)  76.846 ms  75.854 ms 
75.819 ms
 7  f.root-servers.net (2001:500:2f::f)  75.788 ms  75.756 ms  75.726 ms




Re: F.ROOT-SERVERS.NET moved to Beijing?

2011-10-02 Thread Leo Bicknell
In a message written on Sun, Oct 02, 2011 at 05:40:23PM +, Janne Snabb 
wrote:
 I happened to notice the following at three separate sites around
 the US and one site in Europe:

ISC has verified our PEK2 route was being leaked further than
intended, and for the moment we have pulled the route until we can
get confirmation from our partners that the problem has been resolved.
Service should be back to normal, but if anyone is still having
problems n...@isc.org will open a ticket.

-- 
   Leo Bicknell - bickn...@ufp.org - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/


pgpRdBBaSs4DH.pgp
Description: PGP signature


Re: F.ROOT-SERVERS.NET moved to Beijing?

2011-10-02 Thread Todd Underwood
leo, all,

in the past, name servers that operated inside of china were subject
to arbitrary rewriting or blocking of their results by the Great
Firewall.

this is obviously bad for Chinese citizens but it's *dramatically*
worse for people outside of china who end up reaching a root server in
china by mistake, no?  people who ostensibly live free of this kind of
interference and censorship are now subject to it by mistake.

a previous time this happened renesys did a good write up on it.

http://www.renesys.com/blog/2010/06/two-strikes-i-root.shtml

i guess my questions now are:

1) how long was this happening?
2) can any root server operator who serves data inside of china verify
that the data that they serve have not been rewritten by the great
firewall?
3) does ISC (or Insert Root Operator Here) have a plan for
monitoring route distribution to ensure that this doesn't happen again
(without prompt detection and mitigation)?

i'm not really singling out ISC here--this is a serious problem for
anyone who chooses to operate a root server node on untrustworthy or
malicious network infrastructure (which is one appropriate way of
thinking of a rewriting firewall from the perspective of a root server
operator).

cheers,

t

On Sun, Oct 2, 2011 at 3:08 PM, Leo Bicknell bickn...@ufp.org wrote:
 In a message written on Sun, Oct 02, 2011 at 05:40:23PM +, Janne Snabb 
 wrote:
 I happened to notice the following at three separate sites around
 the US and one site in Europe:

 ISC has verified our PEK2 route was being leaked further than
 intended, and for the moment we have pulled the route until we can
 get confirmation from our partners that the problem has been resolved.
 Service should be back to normal, but if anyone is still having
 problems n...@isc.org will open a ticket.

 --
       Leo Bicknell - bickn...@ufp.org - CCIE 3440
        PGP keys at http://www.ufp.org/~bicknell/




Re: Facebook insecure by design

2011-10-02 Thread Valdis . Kletnieks
On Sun, 02 Oct 2011 08:38:36 PDT, Michael Thomas said:

 I'm not sure why lack of TLS is considered to be problem with Facebook.
 The man in the middle is the other side of the connection, tls or otherwise.

Ooh.. subtle. :)


pgpOeyIJAJoCA.pgp
Description: PGP signature


Re: F.ROOT-SERVERS.NET moved to Beijing?

2011-10-02 Thread Valdis . Kletnieks
On Sun, 02 Oct 2011 17:30:37 EDT, Todd Underwood said:

 2) can any root server operator who serves data inside of china verify
 that the data that they serve have not been rewritten by the great
 firewall?

DNSSEC should help this issue dramatically.  This however could be problematic
if the Chinese govt (or any repressive regime) decides to ban the use of
technology that allows a user to identify when they're being repressed.

 3) does ISC (or Insert Root Operator Here) have a plan for
 monitoring route distribution to ensure that this doesn't happen again
 (without prompt detection and mitigation)?

Leaked routes happen  External monitors and looking glasses and filters and
communities are all things we should probably be doing more of, in order to
minimize routing bogosity.  But when all is said and done, there's no real way
to have a dynamic routing protocol like BGP and at the same time *guarantee*
that some chucklehead NOC monkey won't bollix things up.  At best, we'll be
able to get to less than N brown-paper-bag moments per Tier-[12] per annum for
some value of N.



pgpTn2GhNmX6A.pgp
Description: PGP signature


Re: F.ROOT-SERVERS.NET moved to Beijing?

2011-10-02 Thread Valdis . Kletnieks
On Sun, 02 Oct 2011 12:08:35 PDT, Leo Bicknell said:

 ISC has verified our PEK2 route was being leaked further than
 intended, and for the moment we have pulled the route until we can
 get confirmation from our partners that the problem has been resolved.

So Leo - you don't have to give us a full reveal of the root cause, but did
the phrase chuckleheaded NOC monkey enter at all into the saga? ;)


pgp1r11NJYNYc.pgp
Description: PGP signature


Re: F.ROOT-SERVERS.NET moved to Beijing?

2011-10-02 Thread Todd Underwood
valdis, all,

On Sun, Oct 2, 2011 at 6:02 PM,  valdis.kletni...@vt.edu wrote:
 On Sun, 02 Oct 2011 17:30:37 EDT, Todd Underwood said:

 2) can any root server operator who serves data inside of china verify
 that the data that they serve have not been rewritten by the great
 firewall?

 DNSSEC should help this issue dramatically.  This however could be problematic
 if the Chinese govt (or any repressive regime) decides to ban the use of
 technology that allows a user to identify when they're being repressed.

sure, but DNSSEC is still basically unused.


 3) does ISC (or Insert Root Operator Here) have a plan for
 monitoring route distribution to ensure that this doesn't happen again
 (without prompt detection and mitigation)?

 Leaked routes happen  External monitors and looking glasses and filters and
 communities are all things we should probably be doing more of, in order to
 minimize routing bogosity.  But when all is said and done, there's no real way
 to have a dynamic routing protocol like BGP and at the same time *guarantee*
 that some chucklehead NOC monkey won't bollix things up.  At best, we'll be
 able to get to less than N brown-paper-bag moments per Tier-[12] per annum 
 for
 some value of N.

yep.  this is a *great* argument *against* running critical
information services on known-malicious network infrastructure, right?

i.e.:  if you are sure you're going to be interfered with regularly
and you're positive you can't restrict the damage of that interference
narrowly to the people who were already suffering such interference,
perhaps you should choose to not locate your critical network
information resource on that network.

yes, i'm (again) suggesting that people take seriously not doing root
name service inside of china as long as the great firewall exists.

t



Re: Facebook insecure by design

2011-10-02 Thread Jimmy Hess
On Sun, Oct 2, 2011 at 4:53 PM,  valdis.kletni...@vt.edu wrote:
 On Sun, 02 Oct 2011 08:38:36 PDT, Michael Thomas said:
 I'm not sure why lack of TLS is considered to be problem with Facebook.
 The man in the middle is the other side of the connection, tls or otherwise.
 Ooh.. subtle. :)

Man in the Middle (MITM) is a technical term that refers to a rather
specific kind of attack.

In this case, I believe the proper term would be just The man.
[Or  Man at the Other End  (MATOE)];  you either trust Facebook with
info to send to
them or you don't, and network security is only for securing the
transportation of that information
you opt to send facebook.

Yes, if Alice sends Bob an encrypted message that Bob can read, and
Bob turns out to
be untrustworthy,  then  Bob can sell/re-use the information in an
abusive/unapproved way for
personal or economic profit.
--
-JH



Re: Facebook insecure by design

2011-10-02 Thread Joel jaeggli
On 10/2/11 15:25 , Jimmy Hess wrote:
 On Sun, Oct 2, 2011 at 4:53 PM,  valdis.kletni...@vt.edu wrote:
 On Sun, 02 Oct 2011 08:38:36 PDT, Michael Thomas said:
 I'm not sure why lack of TLS is considered to be problem with Facebook.
 The man in the middle is the other side of the connection, tls or otherwise.
 Ooh.. subtle. :)
 
 Man in the Middle (MITM) is a technical term that refers to a rather
 specific kind of attack.
 
 In this case, I believe the proper term would be just The man.
 [Or  Man at the Other End  (MATOE)];  you either trust Facebook with
 info to send to
 them or you don't, and network security is only for securing the
 transportation of that information
 you opt to send facebook.

alice sends charlie a message using bob's api, bob can observe and
probably monetize the contents.

 Yes, if Alice sends Bob an encrypted message that Bob can read, and
 Bob turns out to
 be untrustworthy,  then  Bob can sell/re-use the information in an
 abusive/unapproved way for
 personal or economic profit.

charlie is probably untrustworthy, bob is probably moreso (mostly
because bob has more to lose than charlie), alice isn't cognizant of the
implications of running charlie's app on bob's platform despite the
numerous disclaimers she blindly clicked through on the way there.



 --
 -JH
 




Re: Facebook insecure by design

2011-10-02 Thread Joel jaeggli
On 10/2/11 15:43 , Joel jaeggli wrote:
 On 10/2/11 15:25 , Jimmy Hess wrote:
 On Sun, Oct 2, 2011 at 4:53 PM,  valdis.kletni...@vt.edu wrote:
 On Sun, 02 Oct 2011 08:38:36 PDT, Michael Thomas said:
 I'm not sure why lack of TLS is considered to be problem with Facebook.
 The man in the middle is the other side of the connection, tls or 
 otherwise.
 Ooh.. subtle. :)

 Man in the Middle (MITM) is a technical term that refers to a rather
 specific kind of attack.

 In this case, I believe the proper term would be just The man.
 [Or  Man at the Other End  (MATOE)];  you either trust Facebook with
 info to send to
 them or you don't, and network security is only for securing the
 transportation of that information
 you opt to send facebook.
 
 alice sends charlie a message using bob's api, bob can observe and
 probably monetize the contents.
 
 Yes, if Alice sends Bob an encrypted message that Bob can read, and
 Bob turns out to
 be untrustworthy,  then  Bob can sell/re-use the information in an
 abusive/unapproved way for
 personal or economic profit.
 
 charlie is probably untrustworthy, bob is probably moreso (mostly
   ^
trustworthy
 because bob has more to lose than charlie), alice isn't cognizant of the
 implications of running charlie's app on bob's platform despite the
 numerous disclaimers she blindly clicked through on the way there.
 
 
 
 --
 -JH

 
 




Re: F.ROOT-SERVERS.NET moved to Beijing?

2011-10-02 Thread Leo Bicknell
In a message written on Sun, Oct 02, 2011 at 05:30:37PM -0400, Todd Underwood 
wrote:
 i guess my questions now are:
 
 1) how long was this happening?
 2) can any root server operator who serves data inside of china verify
 that the data that they serve have not been rewritten by the great
 firewall?
 3) does ISC (or Insert Root Operator Here) have a plan for
 monitoring route distribution to ensure that this doesn't happen again
 (without prompt detection and mitigation)?

I can't answer #1 with precision yet, but will attempt to get a
precise answer soon.

I'd like to partially address #2 and #3.  ISC can verify that the
responses sent from F-Root boxes are always the same, regardless
of which server returns the answer.  That is, there is no filtering
or rewriting on any ISC root servers.

We do know there are a number of locations around the world that
have various rewriting and blocking systems employed.  We have found
networks where a query sent to F-Root never reaches an ISC run
server.  As a root operator we hate this, and believe the best way
to solve the problem is DNSSEC.  Short of providing a method like
DNSSEC to verify the answer is legitimate, we know of no other
countermeasure.  There are in fact networks in the world that
impersonate all 13 root servers, and we don't know of a lever to
make them stop (short of local empowerment).

In the case of transparent re-writers or blockers between us and
the end users there is no practical way for us to detect that the
modifications are happening, and thus I don't think anyone could
answer your second question with precision.  DNSSEC will at least
let every user do the verification from their own vantage point,
which is part of why it is so important.

Regarding #3, ISC does monitor for leaked routes.  Unfortunately
these monitors are only as good as the vantage points they occupy,
and so with upwards of 40,000 ASN's I don't know of any way to cover
them all with any certianty.  In this case it was even harder, as
the leak (appears to have been) IPv6 only.  There are a lot fewer
IPv6 monitors, and folks are generally sloppy with their IPv6 configs
so there is more leaking.  The situation is improving rapidly.

 i'm not really singling out ISC here--this is a serious problem for
 anyone who chooses to operate a root server node on untrustworthy or
 malicious network infrastructure (which is one appropriate way of
 thinking of a rewriting firewall from the perspective of a root server
 operator).

I think the problem goes a lot further than root operators.  The
fact of the matter is that there are networks that tamper with your
packets.  From the benign NAT, to the full on transparent content
filter/blocker.  Most places that tamper with root queries also
tamper with lots of other things.  Without sort of reliable end to
end crypto you really have no way of knowing.

The root zone is signed.  You can enable DNSSEC validation in your
caching resolvers.  There are plugins for popular browsers that
attempt to do DNSSEC validation and show the results to the end
user in some pleasing way.  Much more work needs to be done in this
area, but the technology is usable today.  If you care about authentic
responses, use it.

Lastly, for some reason a ton of people always jump to the conclusion
that these sort of events are the plot of $insert_bad_guy.  I've
chased down many leaks of F-Root during my time, and 100% of them
to date have been an accident.  The clueless NOC monkey.  The poorly
written route map.  Someone not reading the documentation.  Even
if $insert_bad_guy wanted to hijack F-Root (or any other root),
doing it in this way is very visable and easy to work around.  It
just doesn't make sense to even try.

-- 
   Leo Bicknell - bickn...@ufp.org - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/


pgp23FDlmJN05.pgp
Description: PGP signature


Re: F.ROOT-SERVERS.NET moved to Beijing?

2011-10-02 Thread Jay Ashworth
- Original Message -
 From: Valdis Kletnieks valdis.kletni...@vt.edu

 DNSSEC should help this issue dramatically. This however could be problematic
 if the Chinese govt (or any repressive regime) decides to ban the use of
 technology that allows a user to identify when they're being repressed.

We won't be permitted to see the repression inherent in the system?

Cheers,
-- jr 'Run Away!' a
-- 
Jay R. Ashworth  Baylink   j...@baylink.com
Designer The Things I Think   RFC 2100
Ashworth  Associates http://baylink.pitas.com 2000 Land Rover DII
St Petersburg FL USA  http://photo.imageinc.us +1 727 647 1274



Re: F.ROOT-SERVERS.NET moved to Beijing?

2011-10-02 Thread Phil Dyer
On Sun, Oct 2, 2011 at 11:11 PM, Jay Ashworth j...@baylink.com wrote:
 - Original Message -
 From: Valdis Kletnieks valdis.kletni...@vt.edu

 DNSSEC should help this issue dramatically. This however could be problematic
 if the Chinese govt (or any repressive regime) decides to ban the use of
 technology that allows a user to identify when they're being repressed.

 We won't be permitted to see the repression inherent in the system?

help, help! I'm being repressed!

phil



Re: F.ROOT-SERVERS.NET moved to Beijing?

2011-10-02 Thread Jimmy Hess
On Sun, Oct 2, 2011 at 10:11 PM, Jay Ashworth j...@baylink.com wrote:
 DNSSEC should help this issue dramatically. This however could be problematic
 if the Chinese govt (or any repressive regime) decides to ban the use of
 technology that allows a user to identify when they're being repressed.
 We won't be permitted to see the repression inherent in the system?

You actually think China will be the first to ban DNSSEC?  Maybe,
but It will probably be banned first indirectly,  by governments
legislating requirements of SPs
that are incompatible with DNSSEC.

The repression is at home in the form of the US PROTECT IP  bill that
will provide
a framework for DNS authorities, domain registries, and ISPs/operators of
non-authoritative nameservers to be sent letters requiring them to modify DNS
responses for other organization's domains  based on allegations/suspicions.

--
-JH



Re: F.ROOT-SERVERS.NET moved to Beijing?

2011-10-02 Thread Randy Bush
china nukes 120,000 domains for going against the policy of the state.

oops!  that wasn't china, was it?

perhaps, we should postpone telling others what to do until our side of
the street is clean?

randy