Fwd: Re: NYT covers China cyberthreat

2013-02-27 Thread jjanu...@wd-tek.com
at 1:24 AM Subject: Re: NYT covers China cyberthreat On Tue, Feb 26, 2013 at 8:39 AM, Kyle Creyts kyle.cre...@gmail.com wrote: I think it is safe to say that finding a foothold inside of the United States from which to perform/proxy an attack is not the hardest thing in the world. I don't

Re: NYT covers China cyberthreat

2013-02-26 Thread Rich Kulawiec
On Thu, Feb 21, 2013 at 11:47:44AM -0600, Naslund, Steve wrote: [a number of very good points ] Geoblocking, like passive OS fingerprinting (another technique that reduces attack surface as measured along one axis but can be defeated by a reasonably clueful attacker), doesn't really solve

Re: NYT covers China cyberthreat

2013-02-26 Thread Kyle Creyts
I think it is safe to say that finding a foothold inside of the United States from which to perform/proxy an attack is not the hardest thing in the world. I don't understand why everyone expects that major corporations and diligent operators blocking certain countries' prefixes will help. That

Re: NYT covers China cyberthreat

2013-02-26 Thread Adele Thompson
On Tue, Feb 26, 2013 at 8:39 AM, Kyle Creyts kyle.cre...@gmail.com wrote: I think it is safe to say that finding a foothold inside of the United States from which to perform/proxy an attack is not the hardest thing in the world. I don't understand why everyone expects that major corporations

Re: NYT covers China cyberthreat

2013-02-22 Thread .
On 21 February 2013 21:58, Jack Bates jba...@brightok.net wrote: ... The A-team doesn't get caught and detailed. The purpose of the other teams is to detect easy targets, handle easy jobs, and create lots of noise for the A-team to hide in. Hacking has always had a lot in common with magic.

Re: NYT covers China cyberthreat

2013-02-22 Thread Michael Painter
- Original Message - From: valdis.kletni...@vt.edu To: Suresh Ramasubramanian ops.li...@gmail.com Cc: nanog@nanog.org Sent: Thursday, February 21, 2013 5:54 PM Subject: Re: NYT covers China cyberthreat And since it's Wacky Friday somewhere: http://arstechnica.com/security/2013/02/how

Re: NYT covers China cyberthreat

2013-02-21 Thread calin.chiorean
::This all seems to be noobie stuff. There's nothing technically cool ::to see here You mean the report or the activity? You seem upset that they are using M$ only(target and source). They steal data!!! From whom to steal? From a guru that spend minimum 8 hours a day in from of *nix? Why to

Re: NYT covers China cyberthreat

2013-02-21 Thread Kyle Creyts
The focus on platform here is ridiculous; can someone explain how platform of attacker or target is extremely relevant? Since when did people fail to see that we have plenty of inter-platform tools and services, and plenty of tools for either platform built with the express purpose of interaction

Re: NYT covers China cyberthreat

2013-02-21 Thread Stephen Sprunk
On 21-Feb-13 04:25, Kyle Creyts wrote: For another example of this, an acquaintance once told me about the process of getting internationally standardized technologies approved for deployment in China; the process that was described to me involved giving China the standards-based spec that

Re: NYT covers China cyberthreat

2013-02-21 Thread Miles Fidelman
Scott Weeks wrote: Be sure to read the source: intelreport.mandiant.com/Mandiant_APT1_Report.pdf Anybody happen to notice that the report sounds awfully like the scenario laid out in Tom Clancy's latest book, Threat Vector? -- In theory, there is no difference between theory and

Re: NYT covers China cyberthreat

2013-02-21 Thread Rich Kulawiec
On Thu, Feb 21, 2013 at 01:34:13AM +, Warren Bailey wrote: I can't help but wonder what would happen if US Corporations simply blocked all inbound Chinese traffic. Sure it would hurt their business, but imagine what the Chinese people would do in response. Would it hurt their business?

Re: Network security on multiple levels (was Re: NYT covers China cyberthreat)

2013-02-21 Thread Jack Bates
On 2/21/2013 12:03 AM, Scott Weeks wrote: I would sure be interested in hearing about hands-on operational experiences with encryptors. Recent experiences have left me with a sour taste in my mouth. blech! scott Agreed. I've generally skipped the line side and stuck with L3 side

Re: Network security on multiple levels (was Re: NYT covers China cyberthreat)

2013-02-21 Thread Christopher Morrow
On Thu, Feb 21, 2013 at 11:23 AM, Jack Bates jba...@brightok.net wrote: On 2/21/2013 12:03 AM, Scott Weeks wrote: I would sure be interested in hearing about hands-on operational experiences with encryptors. Recent experiences have left me with a sour taste in my mouth. blech! scott

Re: Network security on multiple levels (was Re: NYT covers China cyberthreat)

2013-02-21 Thread Warren Bailey
...@brightok.net Cc: nanog@nanog.org Subject: Re: Network security on multiple levels (was Re: NYT covers China cyberthreat) On Thu, Feb 21, 2013 at 11:23 AM, Jack Bates jba...@brightok.net wrote: On 2/21/2013 12:03 AM, Scott Weeks wrote: I would sure be interested in hearing about hands-on operational

RE: NYT covers China cyberthreat

2013-02-21 Thread Naslund, Steve
with them is. Remember Doctor Strangelove, what good is a doomsday bomb if you don't tell anyone about it ?!?!? Steven Naslund -Original Message- From: Rich Kulawiec [mailto:r...@gsp.org] Sent: Thursday, February 21, 2013 10:00 AM To: nanog@nanog.org Subject: Re: NYT covers China

Re: NYT covers China cyberthreat

2013-02-21 Thread Scott Weeks
--- calin.chior...@secdisk.net wrote: From: calin.chiorean calin.chior...@secdisk.net :: This all seems to be noobie stuff. There's nothing technically cool :: to see here You mean the report or the activity? The activity. You seem upset that they are using M$ only(target and source).

Re: NYT covers China cyberthreat

2013-02-21 Thread Miles Fidelman
Scott Weeks wrote: --- calin.chior...@secdisk.net wrote: You seem upset that they are using M$ only(target and source). I'm not upset. I'm pointing out what Steven Bellovin said in just a few words: This strongly suggests that it's not their A-team... This is a technical mailing list where

Re: NYT covers China cyberthreat

2013-02-21 Thread Scott Weeks
--- kyle.cre...@gmail.com wrote: From: Kyle Creyts kyle.cre...@gmail.com The focus on platform here is ridiculous; can someone explain how platform of attacker or target is extremely relevant? Since when did -- It implies their skillset. Here's

Re: NYT covers China cyberthreat

2013-02-21 Thread Steven Bellovin
On Feb 20, 2013, at 9:07 PM, Steven Bellovin s...@cs.columbia.edu wrote: On Feb 20, 2013, at 1:33 PM, valdis.kletni...@vt.edu wrote: On Wed, 20 Feb 2013 15:39:42 +0900, Randy Bush said: boys and girls, all the cyber-capable countries are cyber-culpable. you can bet that they are all

Re: NYT covers China cyberthreat

2013-02-21 Thread Jack Bates
On 2/21/2013 12:17 PM, Scott Weeks wrote: I'm not upset. I'm pointing out what Steven Bellovin said in just a few words: This strongly suggests that it's not their A-team... The A-team doesn't get caught and detailed. The purpose of the other teams is to detect easy targets, handle easy

Re: NYT covers China cyberthreat

2013-02-21 Thread Suresh Ramasubramanian
And so their bush league by itself was responsible for all the penetrations that mandiant says they did? Which shows that they don't have to be particularly smart, just a bit smarter than their average spear phish or other attack's victim. On Friday, February 22, 2013, Jack Bates wrote: On

Re: NYT covers China cyberthreat

2013-02-21 Thread Christopher Morrow
On Thu, Feb 21, 2013 at 3:58 PM, Jack Bates jba...@brightok.net wrote: The A-team doesn't get caught and detailed no, the A-team has BA Baraccus... he pities the fool who gets caught and detailed... the last thing BA detailed was his black van.

Re: NYT covers China cyberthreat

2013-02-21 Thread Valdis . Kletnieks
On Fri, 22 Feb 2013 06:11:21 +0530, Suresh Ramasubramanian said: And so their bush league by itself was responsible for all the penetrations that mandiant says they did? Which shows that they don't have to be particularly smart, just a bit smarter than their average spear phish or other

Re: NYT covers China cyberthreat

2013-02-20 Thread Scott Weeks
Be sure to read the source: intelreport.mandiant.com/Mandiant_APT1_Report.pdf I'm only part way through, but I find it hard to believe that only micro$loth computers are used as the attack OS. Maybe I haven't gotten far enough through report to find the part where they use the *nix boxes?

Re: NYT covers China cyberthreat

2013-02-20 Thread Scott Weeks
--- calin.chior...@secdisk.net wrote: From: calin.chiorean calin.chior...@secdisk.net snipped :: when all tools are available for windows os, you just have to compile them. sniped out the rest - They're not all available for m$. scott

Re: NYT covers China cyberthreat

2013-02-20 Thread Warren Bailey
They are when you have a college full of programmers. From my Android phone on T-Mobile. The first nationwide 4G network. Original message From: Scott Weeks sur...@mauigateway.com Date: 02/20/2013 12:23 AM (GMT-08:00) To: nanog@nanog.org Subject: Re: NYT covers China

Re: NYT covers China cyberthreat

2013-02-20 Thread Scott Weeks
I'm only part way through, but I find it hard to believe that only micro$loth computers are used as the attack OS. Maybe I --- calin.chior...@secdisk.net wrote: From: calin.chiorean calin.chior...@secdisk.net snipped :: when all tools are available for windows os, you just have to compile

Re: NYT covers China cyberthreat

2013-02-20 Thread Warren Bailey
Date: 02/20/2013 12:36 AM (GMT-08:00) To: Warren Bailey wbai...@satelliteintelligencegroup.com Cc: sur...@mauigateway.com,nanog@nanog.org Subject: Re: NYT covers China cyberthreat IMO, if we stick to the document and they are organized in military style, then a person who collect information

Re: NYT covers China cyberthreat

2013-02-20 Thread Suresh Ramasubramanian
Part of the entire 'chinese l337 hxx0r spy' 1st complex is apparently the local equivalent of a community college, where the passing out assignment is probably something on the lines of 'get me a dump of the dalai lama's email'. --srs (htc one x) On 20-Feb-2013 2:08 PM, Scott Weeks

Re: NYT covers China cyberthreat

2013-02-20 Thread Scott Weeks
--- calin.chior...@secdisk.net wrote: From: calin.chiorean calin.chior...@secdisk.net IMO, if we stick to the document and they are organized in military style, then a person who collect information, should focus only on that particular phase. That person is an operator, he or she should not

Re: NYT covers China cyberthreat

2013-02-20 Thread Scott Weeks
--- calin.chior...@secdisk.net wrote: From: calin.chiorean calin.chior...@secdisk.net It was just an example :-) to point out the scale of developers vs operators. You'd be surprised at how much better brains are than brawn on these things...

Re: NYT covers China cyberthreat

2013-02-20 Thread Randy Bush
Part of the entire 'chinese l337 hxx0r spy' 1st complex is apparently the local equivalent of a community college, where the passing out assignment is probably something on the lines of 'get me a dump of the dalai lama's email'. american education is behind in many things. this is but one.

Re: NYT covers China cyberthreat

2013-02-20 Thread Warren Bailey
covers China cyberthreat --- calin.chior...@secdisk.net wrote: From: calin.chiorean calin.chior...@secdisk.net It was just an example :-) to point out the scale of developers vs operators. You'd be surprised at how much better brains are than

Re: NYT covers China cyberthreat

2013-02-20 Thread Scott Weeks
--- calin.chior...@secdisk.net wrote: From: calin.chiorean calin.chior...@secdisk.net It was just an example :-) to point out the scale of developers vs operators. :: You'd be surprised at how much better brains are than brawn :: on these things...

Re: NYT covers China cyberthreat

2013-02-20 Thread David Barak
. Original message From: Zaid Ali Kahn z...@zaidali.com Date: 02/19/2013 10:44 PM (GMT-08:00) To: Kyle Creyts kyle.cre...@gmail.com Cc: nanog@nanog.org Subject: Re: NYT covers China cyberthreat We have done our part to China as well along with other countries in state sponsored hacking

Re: NYT covers China cyberthreat

2013-02-20 Thread calin.chiorean
If I didn't miss any part of the report, no *nix is mentioned. I'm a *nix fan, but why they (when I say they, I mean an attacker, not necessary the one in this document) should complicate their life, when all tools are available for windows os, you just have to compile them. Cheers, Calin

Re: NYT covers China cyberthreat

2013-02-20 Thread calin.chiorean
: NYT covers China cyberthreat --- calin.chior...@secdisk.net wrote: From: calin.chiorean calin.chior...@secdisk.net snipped :: when all tools are available for windows os, you just have to compile them. sniped out the rest

Re: NYT covers China cyberthreat

2013-02-20 Thread calin.chiorean
Date: 02/20/2013 12:36 AM (GMT-08:00) To: Warren Bailey wbai...@satelliteintelligencegroup.com Cc: sur...@mauigateway.com,nanog@nanog.org Subject: Re: NYT covers China cyberthreat IMO, if we stick to the document and they are organized in military style, then a person

Re: NYT covers China cyberthreat

2013-02-20 Thread .
This is a improvement over some russian spies, that have the passwords written down in a piece of paper. http://www.networkworld.com/news/2010/063010-russian-spy-ring.html?hpg1=bn One of the technical issues the ring faced was described by one suspect in a message to Moscow reporting on a

Network security on multiple levels (was Re: NYT covers China cyberthreat)

2013-02-20 Thread Jay Ashworth
- Original Message - From: Warren Bailey wbai...@satelliteintelligencegroup.com We as Americans have plenty of things we have done halfass.. I hope an Internet kill switch doesn't end up being one of them. Build your own private networks, you can't get rooted if someone can't knock.

Re: NYT covers China cyberthreat

2013-02-20 Thread Jay Ashworth
- Original Message - From: Randy Bush ra...@psg.com Part of the entire 'chinese l337 hxx0r spy' 1st complex is apparently the local equivalent of a community college, where the passing out assignment is probably something on the lines of 'get me a dump of the dalai lama's

Re: Network security on multiple levels (was Re: NYT covers China cyberthreat)

2013-02-20 Thread Warren Bailey
If you are doing DS0 splitting on the DACS, you'll see that on the other end (it's not like channelized CAS ds1's or PRI's are difficult to look at now) assuming you have access to that. If the DACS is an issue, buy the DACS and lock it up. I was on a .mil project that used old school Coastcom DI

Re: Network security on multiple levels (was Re: NYT covers China cyberthreat)

2013-02-20 Thread Cameron Byrne
On Wed, Feb 20, 2013 at 9:13 AM, Jay Ashworth j...@baylink.com wrote: - Original Message - From: Warren Bailey wbai...@satelliteintelligencegroup.com We as Americans have plenty of things we have done halfass.. I hope an Internet kill switch doesn't end up being one of them. Build

RE: Network security on multiple levels (was Re: NYT covers China cyberthreat)

2013-02-20 Thread Jamie Bowden
From: Warren Bailey [mailto:wbai...@satelliteintelligencegroup.com] If you are doing DS0 splitting on the DACS, you'll see that on the other end (it's not like channelized CAS ds1's or PRI's are difficult to look at now) assuming you have access to that. If the DACS is an issue, buy the

About private networks (Was Re: NYT covers China cyberthreat)

2013-02-20 Thread Alain Hebert
( Well I'm sure that there is a few hundrends of paper on this subject ) I have a few ideas but it involve: .Dark Fiber; . All devices at FIPS 140 level; . Tonnes of resin; . Wire mesh; . Fiber DB monitoring; . Cable Shield monitoring;

Re: Network security on multiple levels (was Re: NYT covers China cyberthreat)

2013-02-20 Thread Warren Bailey
I did not approach the inline encryption units on purpose. Obviously anything that leaves .mil land not riding something blessed by DISA is going to have something like a KG on both ends. Generally Satellite systems use TRANSEC, though in our line of work it's an extremely expensive add-on to an

Re: NYT covers China cyberthreat

2013-02-20 Thread Valdis . Kletnieks
On Wed, 20 Feb 2013 15:39:42 +0900, Randy Bush said: boys and girls, all the cyber-capable countries are cyber-culpable. you can bet that they are all snooping and attacking eachother, the united states no less than the rest. news at eleven. The scary part is that so many things got hacked

Re: Network security on multiple levels (was Re: NYT covers China cyberthreat)

2013-02-20 Thread Jon Lewis
On Wed, 20 Feb 2013, Jay Ashworth wrote: Well, Warren, I once had a discussion with someone about whether dedicated DS-1 to tie your SCADA network together were secure enough and they asked me: Does it run through a DACS? Where can you program the DACS from? See thread: nanog impossible

Re: Network security on multiple levels (was Re: NYT covers China cyberthreat)

2013-02-20 Thread Owen DeLong
Many DACS have provision for monitoring circuits and feeding the data off to a third circuit in an undetectable manner. The DACS question wasn't about DACS owned by the people using the circuit, it was about DACS inside the circuit provider. When you buy a DS1 that goes through more than one CO

Re: Network security on multiple levels (was Re: NYT covers China cyberthreat)

2013-02-20 Thread Jay Ashworth
- Original Message - From: Owen DeLong o...@delong.com Many DACS have provision for monitoring circuits and feeding the data off to a third circuit in an undetectable manner. The DACS question wasn't about DACS owned by the people using the circuit, it was about DACS inside the

Re: Network security on multiple levels (was Re: NYT covers China cyberthreat)

2013-02-20 Thread Warren Bailey
Isn't this a strong argument to deploy and operate a network independent of the traditional switch circuit provider space? On 2/20/13 11:22 AM, Jay Ashworth j...@baylink.com wrote: - Original Message - From: Owen DeLong o...@delong.com Many DACS have provision for monitoring circuits

Re: NYT covers China cyberthreat

2013-02-20 Thread Scott Weeks
--- valdis.kletni...@vt.edu wrote: On Wed, 20 Feb 2013 15:39:42 +0900, Randy Bush said: boys and girls, all the cyber-capable countries are cyber-culpable. you can bet that they are all snooping and attacking eachother, the united states no less than the rest. news at eleven. The scary

Re: Network security on multiple levels (was Re: NYT covers China cyberthreat)

2013-02-20 Thread Owen DeLong
If you have that option, I suppose that would be one way to solve it. I, rather, see it as a reason to: 1. Cryptographically secure links that may be carrying private data. 2. Rotate cryptographic keys (relatively) often on such links. YMMV, but I think encryption is a

Re: Network security on multiple levels (was Re: NYT covers China cyberthreat)

2013-02-20 Thread David Barak
--- On Wed, 2/20/13, Jay Ashworth j...@baylink.com wrote: - Original Message - From: Owen DeLong o...@delong.com The DACS question wasn't about DACS owned by the people using the circuit, it was about DACS inside the circuit provider. When you buy a DS1 that goes through more

Re: Network security on multiple levels (was Re: NYT covers China cyberthreat)

2013-02-20 Thread Jack Bates
On 2/20/2013 1:05 PM, Jon Lewis wrote: See thread: nanog impossible circuit Even your leased lines can have packets copied off or injected into them, apparently so easily it can be done by accident. This is especially true with pseudo-wire and mpls. Most of my equipment can filter based

Re: NYT covers China cyberthreat

2013-02-20 Thread Scott Weeks
--- valdis.kletni...@vt.edu wrote: The scary part is that so many things got hacked by a bunch of people who made the totally noob mistake of launching all their attacks from the same place This all seems to be noobie stuff. There's nothing

Re: NYT covers China cyberthreat

2013-02-20 Thread Suresh Ramasubramanian
Net net - what we have here is, so far, relatively low tech exploits with a huge element of brute force, and the only innovation being in the delivery mechanism - very well crafted spear phishes They don't particularly need to hide in a location where they're literally bulletproof (considering

Re: NYT covers China cyberthreat

2013-02-20 Thread Warren Bailey
Ramasubramanian ops.li...@gmail.com Date: 02/20/2013 5:22 PM (GMT-08:00) To: sur...@mauigateway.com Cc: nanog@nanog.org Subject: Re: NYT covers China cyberthreat Net net - what we have here is, so far, relatively low tech exploits with a huge element of brute force, and the only innovation being

Re: Network security on multiple levels (was Re: NYT covers China cyberthreat)

2013-02-20 Thread Steven Bellovin
On Feb 20, 2013, at 3:20 PM, Jack Bates jba...@brightok.net wrote: On 2/20/2013 1:05 PM, Jon Lewis wrote: See thread: nanog impossible circuit Even your leased lines can have packets copied off or injected into them, apparently so easily it can be done by accident. This is

Re: NYT covers China cyberthreat

2013-02-20 Thread Barry Shein
Failure to understand reality is not reality's fault. On February 20, 2013 at 09:10 calin.chior...@secdisk.net (calin.chiorean) wrote: If I didn't miss any part of the report, no *nix is mentioned. I'm a *nix fan, but why they (when I say they, I mean an attacker, not necessary the

Re: NYT covers China cyberthreat

2013-02-20 Thread Steven Bellovin
On Feb 20, 2013, at 1:33 PM, valdis.kletni...@vt.edu wrote: On Wed, 20 Feb 2013 15:39:42 +0900, Randy Bush said: boys and girls, all the cyber-capable countries are cyber-culpable. you can bet that they are all snooping and attacking eachother, the united states no less than the rest. news

Re: NYT covers China cyberthreat

2013-02-20 Thread Suresh Ramasubramanian
Very true. The objection is more that the exploits are aimed at civilian rather than (or, more accurately, as well as) military / government / beltway targets. Which makes the alleged chinese strategy rather more like financing jehadis to suicide bomb and shoot up hotels and train stations,

Re: Network security on multiple levels (was Re: NYT covers China cyberthreat)

2013-02-20 Thread Scott Weeks
--- s...@cs.columbia.edu wrote: From: Steven Bellovin s...@cs.columbia.edu An amazing percentage of private lines are pseudowires, and neither you nor your telco salesdroid can know or tell; even the real circuits are routed through DACS, ATM switches, and the like. This is what link

Re: NYT covers China cyberthreat

2013-02-20 Thread Richard Porter
When you really look at human behavior the thing that remains the same is core motives. The competition makes sense in that it is human nature to aggresse for resources. We are challenged in the fact that we 'want' to belong among the other five. This will never change but. What is really

Re: NYT covers China cyberthreat

2013-02-20 Thread Warren Bailey
The only spanking that has been going on nanog lately is Jay using his email to keep us up to date on current news. I am going to call it a night, and look for a SCUD fired from Florida in the morning. ;) On 2/20/13 11:29 PM, Richard Porter rich...@pedantictheory.com wrote: When you really

Re: NYT covers China cyberthreat

2013-02-20 Thread Suresh Ramasubramanian
On Thursday, February 21, 2013, Warren Bailey wrote: The only spanking that has been going on nanog lately is Jay using his email to keep us up to date on current news. I am going to call it a night, and look for a SCUD fired from Florida in the morning. ;) Nanog setting their list server up

Re: NYT covers China cyberthreat

2013-02-19 Thread Kyle Creyts
quite a bit of coverage lately from the media. http://online.wsj.com/article/SB10001424127887323764804578313101135258708.html http://www.bbc.co.uk/news/world-asia-pacific-21505803 http://www.npr.org/2013/02/19/172373133/report-links-cyber-attacks-on-u-s-to-chinas-military

Re: NYT covers China cyberthreat

2013-02-19 Thread Randy Bush
boys and girls, all the cyber-capable countries are cyber-culpable. you can bet that they are all snooping and attacking eachother, the united states no less than the rest. news at eleven. randy

Re: NYT covers China cyberthreat

2013-02-19 Thread Zaid Ali Kahn
We have done our part to China as well along with other countries in state sponsored hacking. This is more of news amusement rather than news worthy. Question here should be how much of this is another effort to get a kill switch type bill back. Zaid On Feb 19, 2013, at 10:10 PM, Kyle Creyts

Re: NYT covers China cyberthreat

2013-02-19 Thread Warren Bailey
/2013 10:44 PM (GMT-08:00) To: Kyle Creyts kyle.cre...@gmail.com Cc: nanog@nanog.org Subject: Re: NYT covers China cyberthreat We have done our part to China as well along with other countries in state sponsored hacking. This is more of news amusement rather than news worthy. Question here should