Fw: [IP] Malware kills 154

2010-08-23 Thread Perry E. Metzger
Forwarded from Dave Farber's Interesting People list

Begin forwarded message:

 From: David Byrden farb...@byrden.com
 Date: August 22, 2010 5:28:55 PM EDT
 To: d...@farber.net
 Subject: Malware kills 154
 
 Authorities investigating the 2008 crash of Spanair flight 5022
 have discovered a central computer system used to monitor technical
 problems in the aircraft was infected with malware
 
 http://www.msnbc.msn.com/id/38790670/ns/technology_and_science-security/?gt1=43001
 
 David

-- 
Perry E. Metzgerpe...@piermont.com

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com


Re: Fw: [IP] Malware kills 154

2010-08-23 Thread Peter Gutmann
Perry E. Metzger pe...@piermont.com forwards:

 Authorities investigating the 2008 crash of Spanair flight 5022
 have discovered a central computer system used to monitor technical
 problems in the aircraft was infected with malware

 http://www.msnbc.msn.com/id/38790670/ns/technology_and_science-security/?gt1=43001

Sigh, yet another attempt to use the dog ate my homework of computer
problems, if their fly-by-wire was Windows XP then they had bigger things to
worry about than malware.

Peter.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com


Re: Fw: [IP] Malware kills 154

2010-08-23 Thread John Levine
 Authorities investigating the 2008 crash of Spanair flight 5022
 have discovered a central computer system used to monitor technical
 problems in the aircraft was infected with malware
 
 http://www.msnbc.msn.com/id/38790670/ns/technology_and_science-security/?gt1=43001

This was very poorly reported.  The malware was on a ground system that
wouldn't have provided realtime warnings of the configuration problem
that caused the plane to crash anyway.

R's,
John

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com


Re: [IP] Malware kills 154

2010-08-23 Thread Steven Bellovin

On Aug 23, 2010, at 11:50 30AM, John Levine wrote:

 Authorities investigating the 2008 crash of Spanair flight 5022
 have discovered a central computer system used to monitor technical
 problems in the aircraft was infected with malware
 
 http://www.msnbc.msn.com/id/38790670/ns/technology_and_science-security/?gt1=43001
 
 This was very poorly reported.  The malware was on a ground system that
 wouldn't have provided realtime warnings of the configuration problem
 that caused the plane to crash anyway.
 

And the articles I've seen do not say that the problem caused the crash.  
Rather, they say that a particular, important computer was infected with 
malware; I saw no language (including in the Google translation of the original 
article at 
http://www.elpais.com/articulo/espana/ordenador/Spanair/anotaba/fallos/aviones/tenia/virus/elpepiesp/20100820elpepinac_11/Tes,
 though the translation has some crucial infelicities) that said because of 
the malware, bad things happened.  It may be like the reactor computer with a 
virus during a large blackout -- yes, the computer was infected, but that 
wasn't what caused the problem.


--Steve Bellovin, http://www.cs.columbia.edu/~smb





-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com


Re: [IP] Malware kills 154

2010-08-23 Thread Steven Bellovin

On Aug 23, 2010, at 11:11 13AM, Peter Gutmann wrote:

 Perry E. Metzger pe...@piermont.com forwards:
 
 Authorities investigating the 2008 crash of Spanair flight 5022
 have discovered a central computer system used to monitor technical
 problems in the aircraft was infected with malware
 
 http://www.msnbc.msn.com/id/38790670/ns/technology_and_science-security/?gt1=43001
 
 Sigh, yet another attempt to use the dog ate my homework of computer
 problems, if their fly-by-wire was Windows XP then they had bigger things to
 worry about than malware.
 
To say nothing of what happens when you run a nuclear power plant on Windows: 
http://www.upi.com/News_Photos/Features/Irans-Bushehr-nuclear-power-plant/3693/2/
 (slightly OT, I realize, but too good to pass up).


--Steve Bellovin, http://www.cs.columbia.edu/~smb





-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com


Re: Fw: [IP] Malware kills 154

2010-08-23 Thread Thierry Moreau

Peter Gutmann wrote:

Perry E. Metzger pe...@piermont.com forwards:


Authorities investigating the 2008 crash of Spanair flight 5022
have discovered a central computer system used to monitor technical
problems in the aircraft was infected with malware

http://www.msnbc.msn.com/id/38790670/ns/technology_and_science-security/?gt1=43001


Sigh, yet another attempt to use the dog ate my homework of computer
problems, if their fly-by-wire was Windows XP then they had bigger things to
worry about than malware.



FYI, avionics firmware/software is subject to RTCA DO-178b certification 
and fly-by-wire will inevitably require a level A certification which 
is quite demanding (i mean *QUITE*DEMANDING*) for software development 
process certification. There is no chance that an XP-based 
application/system would ever meet even the lower certification levels 
(but for the lowest one which corresponds to passenger entertainment 
systems).


Commercial avionics certification looks like the most demanding among 
industrial sectors requiring software certification (public 
transportation, high energy incl. nuclear, medical devices, government 
IT security in some countries, electronic payments, lottery and casino 
systems).


--
- Thierry Moreau

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com


Re: towards https everywhere and strict transport security (was: Has there been a change in US banking regulations recently?)

2010-08-23 Thread bmanning
On Sun, Aug 22, 2010 at 11:51:01AM -0400, Anne  Lynn Wheeler wrote:
 On 08/22/2010 06:56 AM, Jakob Schlyter wrote:
 There are a lot of work going on in this area, including how to use secure 
 DNS to
 associate the key that appears in a TLS server's certificate with the the 
 intended
 domain name [1]. Adding HSTS to this mix does make sense and is something 
 that is
 discussed, e.g. on the keyassure mailing list [2].
 
 There is large vested interested in Certification Authority industry
 selling SSL domain name certificates. A secure DNS scenario is having
 a public key registered at the time the domain name is registered ...
 and then a different kind of TLS ... where the public key is returned
 in piggy-back with the domain name to ip-address mapping response.


for the conservative - they may want to verify the DNSSEC
trust chains for both the domain name and the IP address.

e.g. is it the same EV cert at the end of both validation
checks.

--bill

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com


Re: Fw: [IP] Malware kills 154

2010-08-23 Thread John Ioannidis

On 8/23/2010 5:17 PM, Thierry Moreau wrote:



Commercial avionics certification looks like the most demanding among
industrial sectors requiring software certification (public
transportation, high energy incl. nuclear, medical devices, government
IT security in some countries, electronic payments, lottery and casino
systems).



I can't resist pointing out that electronic voting systems are not part 
of that list :(


/ji

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com