Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-04 Thread Rubens Kuhl Jr.
Yeap: http://www.ietf.org/internet-drafts/draft-ietf-tcpm-tcp-auth-opt-02.txt TCPM WGJ. Touch Internet Draft USC/ISI Obsoletes: 2385 A. Mankin

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-04 Thread Marshall Eubanks
There is a discussion of this going on in CFRG. https://www.irtf.org/mailman/listinfo/cfrg Regards Marshall On Jan 4, 2009, at 2:22 AM, Hank Nussbacher wrote: At 06:44 PM 03-01-09 +0100, Mikael Abrahamsson wrote: On Sat, 3 Jan 2009, Hank Nussbacher wrote: You mean like for BGP neighbors?

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-04 Thread Christopher Morrow
On Sun, Jan 4, 2009 at 11:40 AM, Christopher Morrow morrowc.li...@gmail.com wrote: On Sun, Jan 4, 2009 at 9:37 AM, Marshall Eubanks t...@multicasttech.com wrote: There is a discussion of this going on in CFRG. https://www.irtf.org/mailman/listinfo/cfrg sadly, and apropos I suppose,

Gaza telecommunication systems offline

2009-01-04 Thread Eric Brunner-Williams
This is sort of a rinse and repeat of the degradation of the Iraqi voice and data networks we annotated in March of 2003. The first is Ma'an (Turkish), the second is AP (American). Cell service is at the point of failure. Data is coming close to failure, and landline voice is problematic too.

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-04 Thread Florian Weimer
* Hank Nussbacher: Who is working on this? I don't find anything here: http://www.ietf.org/html.charters/idr-charter.html I think this belongs to the tcpm WG or the btns WG.

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-04 Thread Christopher Morrow
On Sun, Jan 4, 2009 at 9:37 AM, Marshall Eubanks t...@multicasttech.com wrote: There is a discussion of this going on in CFRG. https://www.irtf.org/mailman/listinfo/cfrg sadly, and apropos I suppose, www.irtf.org is serving up a *.ietf.org ssl cert :( and the archives require membership to

Re: Leap second tonight

2009-01-04 Thread Thomas Habets
On Thu, 1 Jan 2009, Simon Lockhart wrote: My Oracle boxes that rebooted were running RAC (version 10G R2), too. Another Solaris 10 box running the same version of Oracle, but not RAC, did not reboot. Looks rather like an Oracle 10 RAC bug. It's a known bug in Oracle 10. When the time is set

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-04 Thread Joe Greco
* Brian Keefer: My apologies if you were commenting on some other aspect, or if my understand is in some way flawed. I don't think so. There's a rule of thumb which is easy to remembe: Never revoke anything just because some weak algorithm is involved. The rationale is that that

Re: Security team successfully cracks SSL using 200 PS3's and MD5 flaw.

2009-01-04 Thread Kevin Oberman
Date: Sun, 04 Jan 2009 09:22:06 +0200 From: Hank Nussbacher h...@efes.iucc.ac.il At 06:44 PM 03-01-09 +0100, Mikael Abrahamsson wrote: On Sat, 3 Jan 2009, Hank Nussbacher wrote: You mean like for BGP neighbors? Wanna suggest an alternative? :-) Well, most likely MD5 is better than the

Sprint Leap Second

2009-01-04 Thread Marshall Eubanks
Has anyone seen evidence that Sprint's cellular network has not adopted the leap second yet ? (I have reports, but cannot check myself.) Marshall

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-04 Thread Brian Keefer
On Jan 4, 2009, at 12:05 PM, Joe Greco wrote: The opinions on whether or not it is necessary to replace certs seems to vary depending on whose opinion you're listening to, but a relatively safe rule of thumb for this sort of security issue is to take the path that is most likely to avoid

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-04 Thread Joe Greco
SSL is cracked, VeriSign to blame! was pretty much the top security story for several days. They had to do something to turn around the perception, despite accurate analysis and publications by organizations such as Microsoft. Perception is reality, and regardless of the technical

Re: Security team successfully cracks SSL using 200 PS3's and MD5

2009-01-04 Thread Valdis . Kletnieks
On Sun, 04 Jan 2009 15:58:34 CST, Joe Greco said: Technically the only thing necessary to prevent this attack has already been done, and that is to stop issuing certs signed with MD5 so that no one else can create a rogue CA via this means. Are we certain that existing certs

Re: Looking for verification that Google and Akamai have the geo-ip for 96.31.0.0/20 set correctly

2009-01-04 Thread Greg Skinner
On Sat, Jan 03, 2009 at 01:31:28AM -0500, Martin Hannigan wrote: Overall, geo location has turned out to be a somewhat valuable tool in terms of language, fraud, and localization. I think that it's important to continue to urge improvements in this technology, not divestment. I don't see how

RE: Looking for verification that Google and Akamai have the geo-ip for 96.31.0.0/20 set correctly

2009-01-04 Thread Skywing
Any security provided (I must assume that you speak of fraud prevention services) is the probablistic sort, of reducing, for example, aggregate (and not specific) losses. – S -Original Message- From: Greg Skinner g...@gds.best.vwh.net Sent: Sunday, January 04, 2009 15:52 To: Martin

Re: Sprint Leap Second

2009-01-04 Thread Jon Meek
A visual comparison of my Sprint phone and xclock with second hand on a synchronized workstation suggests that they have not yet implemented the leap second. Our single CDMA NTP clock did handle the leap second at the correct moment. However, that CDMA clock is West of Philadelphia and I am in

Ethical DDoS drone network

2009-01-04 Thread Jeffrey Lyon
Say for instance one wanted to create an ethical botnet, how would this be done in a manner that is legal, non-abusive toward other networks, and unquestionably used for legitimate internal security purposes? How does your company approach this dilemma? Our company for instance has always relied

Re: Looking for verification that Google and Akamai have the geo-ip for 96.31.0.0/20 set correctly

2009-01-04 Thread Martin Hannigan
On Sun, Jan 4, 2009 at 7:23 PM, Skywing skyw...@valhallalegends.com wrote: Any security provided (I must assume that you speak of fraud prevention services) is the probablistic sort, of reducing, for example, aggregate (and not specific) losses. Yes, probablistic in a wholistic fashion i.e.

Re: Ethical DDoS drone network

2009-01-04 Thread Zach
I would say to roll your own binary hardcoded to only hit 1 IP address, and have it held on a law enforcement approved network under the supervision of a qualified agent. 0.02 On Sun, Jan 4, 2009 at 8:06 PM, Jeffrey Lyon jeffrey.l...@blacklotus.netwrote: Say for instance one wanted to create an

Re: Ethical DDoS drone network

2009-01-04 Thread Paul Ferguson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Sun, Jan 4, 2009 at 6:06 PM, Jeffrey Lyon jeffrey.l...@blacklotus.net wrote: Say for instance one wanted to create an ethical botnet, how would this be done in a manner that is legal, non-abusive toward other networks, and unquestionably used

Re: Ethical DDoS drone network

2009-01-04 Thread deleskie
Super risky. This would be a 99% legal worry plus. Unless all the end points and networks they cross sign off on it the risk is beyond huge. -jim --Original Message-- From: Jeffrey Lyon Sender: To: na...@merit.edu Subject: Ethical DDoS drone network Sent: Jan 4, 2009 10:06 PM Say for

Re: Ethical DDoS drone network

2009-01-04 Thread macbroadcast
Am 05.01.2009 um 03:06 schrieb Jeffrey Lyon: Say for instance one wanted to create an ethical botnet, how would this be done in a manner that is legal, non-abusive toward other networks, and unquestionably used for legitimate internal security purposes? How does your company approach this

Re: Ethical DDoS drone network

2009-01-04 Thread Mark Foster
Refer earlier posts. End points ('drones') would have to be legitimate endpoints, not drones on random boxes. That eliminates legal liability client-side. If the traffic is non abusive then I don't see the risk for the network providers in the middle either. If it's clearly established that

Re: Ethical DDoS drone network

2009-01-04 Thread Justin M. Streiner
On Sun, 4 Jan 2009, Jeffrey Lyon wrote: Say for instance one wanted to create an ethical botnet, how would this be done in a manner that is legal, non-abusive toward other networks, and unquestionably used for legitimate internal security purposes? How does your company approach this dilemma?

Re: Ethical DDoS drone network

2009-01-04 Thread deleskie
If the drones send a few packets a seconds even say 1000's of pkts per second its value is not likely to be very meaningful, atleast no more so then building an on net resourse. To be meaningful you'd want/need something that could simulate a DDoS. Maybe my assumptions are way off base.

Re: Ethical DDoS drone network

2009-01-04 Thread John Kristoff
On Sun, 4 Jan 2009 21:06:34 -0500 Jeffrey Lyon jeffrey.l...@blacklotus.net wrote: Say for instance one wanted to create an ethical botnet, how would this be done in a manner that is legal, non-abusive toward other networks, and unquestionably used for legitimate internal security purposes?

Re: Ethical DDoS drone network

2009-01-04 Thread Gadi Evron
On Sun, 4 Jan 2009, John Kristoff wrote: On Sun, 4 Jan 2009 21:06:34 -0500 Jeffrey Lyon jeffrey.l...@blacklotus.net wrote: Say for instance one wanted to create an ethical botnet, how would this be done in a manner that is legal, non-abusive toward other networks, and unquestionably used for

Re: Ethical DDoS drone network

2009-01-04 Thread Zach
Agreed, Gadi. It wouldn't be an attack if it were ethical. Technically, that would be load testing or stress testing. Might I suggest this to help? http://www.opensourcetesting.org/performance.php On Sun, Jan 4, 2009 at 9:55 PM, Gadi Evron g...@linuxbox.org wrote: On Sun, 4 Jan 2009, John

Re: Ethical DDoS drone network

2009-01-04 Thread bmanning
On Sun, Jan 04, 2009 at 09:55:20PM -0600, Gadi Evron wrote: A legal botnet is a distributed system you own. A legal DDoS network doesn't exist. The question is set wrong, no? kind of depends on what the model is. a botnet for hire to red-team my network might be just the

Re: Ethical DDoS drone network

2009-01-04 Thread Patrick W. Gilmore
On Jan 4, 2009, at 9:18 PM, deles...@gmail.com wrote: Super risky. This would be a 99% legal worry plus. Unless all the end points and networks they cross sign off on it the risk is beyond huge. Since when do I need permission of networks they cross to send data from a machine I

Re: Ethical DDoS drone network

2009-01-04 Thread James Hess
On Sun, Jan 4, 2009 at 10:27 PM, bmann...@vacation.karoshi.com wrote: On Sun, Jan 04, 2009 at 09:55:20PM -0600, Gadi Evron wrote: A legal botnet is a distributed system you own. A legal DDoS network doesn't exist. The question is set wrong, no? kind of depends on what the model is. a

Re: Ethical DDoS drone network

2009-01-04 Thread Roland Dobbins
On Jan 5, 2009, at 2:08 PM, Patrick W. Gilmore wrote: You want to 'attack' yourself, I do not see any problems. And I see lots of possible benefits. This can be done internally using various traffic-generation and exploit-testing tools (plenty of open-source and commercial ones

Re: Ethical DDoS drone network

2009-01-04 Thread Patrick W. Gilmore
On Jan 5, 2009, at 1:33 AM, Roland Dobbins wrote: On Jan 5, 2009, at 2:08 PM, Patrick W. Gilmore wrote: You want to 'attack' yourself, I do not see any problems. And I see lots of possible benefits. This can be done internally using various traffic-generation and exploit-testing tools

Re: Ethical DDoS drone network

2009-01-04 Thread Gadi Evron
On Mon, 5 Jan 2009, Patrick W. Gilmore wrote: On Jan 5, 2009, at 1:33 AM, Roland Dobbins wrote: On Jan 5, 2009, at 2:08 PM, Patrick W. Gilmore wrote: You want to 'attack' yourself, I do not see any problems. And I see lots of possible benefits. This can be done internally using various

Re: What to do when your ISP off-shores tech support

2009-01-04 Thread Bill Stewart
Assuming that what you're getting from Verizon is copper and not FIOS, there should be a number of small to medium-sized ISPs that will provide you with Layer 3 Internet Service using that copper. It will cost you a few dollars a month more, but not a lot more, and you'll not only have more chance

Re: Ethical DDoS drone network

2009-01-04 Thread kris foster
On Jan 4, 2009, at 11:11 PM, Gadi Evron wrote: On Mon, 5 Jan 2009, Patrick W. Gilmore wrote: On Jan 5, 2009, at 1:33 AM, Roland Dobbins wrote: On Jan 5, 2009, at 2:08 PM, Patrick W. Gilmore wrote: I can think of several instances where it _must_ be external. For instance, as I said

Re: Ethical DDoS drone network

2009-01-04 Thread Roland Dobbins
On Jan 5, 2009, at 3:04 PM, Patrick W. Gilmore wrote: I can think of several instances where it _must_ be external. For instance, as I said before, knowing which intermediate networks are incapable of handling the additional load is useful information. AUPs are a big issue, here..