Re: Huawei on Mount Everest

2020-05-02 Thread Mark Rousell
On 01/05/2020 19:13, Eric Tykwinski wrote:
> how the hell are they going to get power up there for dependability.
> Solar power sure is a great option, but I was under the assumption
> that repairs will be hell to put it bluntly.
> Batteries in that cold of a climate is also a regular trip. which
> doesn’t seem feasible, unless there’s something I don’t know.

RTG of course. :-)

To be thrown down a crevasse when it is finished with...

-- 
Mark Rousell

PGP public key: http://www.signal100.com/markr/pgp
Key ID: C9C5C162
 
 
 



Re: idiot reponse

2020-02-26 Thread Mark Rousell
On 27/02/2020 00:30, Patrick Schultz wrote:
>
> I've also seen employees leaving companies and their addresses being
> rerouted to the support mailbox.
>

That's a very interesting point. I had not considered it as a possible
cause of this problem.


-- 
Mark Rousell



Re: idiot reponse

2020-02-26 Thread Mark Rousell
On 26/02/2020 16:24, Randy Bush wrote:
> act...@nanog.org seems to no longer exist.  how should i be whining
> about the following?
>
> From: Electric Forest Festival 
> Subject: Forest HQ Has Received Your Message: Re: Hi-Rise Building Fiber 
> Suggestions
> To: ra...@psg.com
> Date: Wed, 26 Feb 2020 16:15:25 +
>
>   Electric Forest 2020 will take place on June 25-28, 2020.   Forest HQ has 
> received your email. Help save precious resources by reviewing the 
> information below and looking up common questions in The Forest Frequently 
> Asked Questions: Experience.ElectricForestFestival.com  Please contact 
> Festival Ticketing Support at 855-279-6941 for all issue regarding your 
> purchase or for account troubleshooting.  Electric Forest is sold out. Lyte 
> is the only HQ endorsed way to get passes now that it’s sold out.  To know 
> when all things Electric Forest 2020 are happening sign up to the EF 
> Newsletter.  Happy Forest!  

This (or what it appears to be) is happening on an increasing number of
mail lists. It's not many but it's there I don't know who is behind it
or why, but it's an increasing annoyance.

This is a quick summary of what seems to be happening:
(1) A legitimate company's or organisation's helpdesk email address is
signed up to a mail list like this one.
(2) Every time someone posts to the list, they receive an automated
notification from the helpdesk.
(3) On mail lists where DMARC mitigation is in effect, the notification
comes back to the mail list.
(4) A consistent pattern is that the helpdesk staff seem utterly
incapable of unsubscribing themselves from the list. They always seem to
need to be unsubscribed by a list admin.

The key question to my mind is how do these helpdesks get signed up at
all? Presumably it's not the helpdesk staff themselves signing them up.
It would appear that someone, somewhere has found a vulnerability in
Mailman (as far as I can recall I've only seen this on Mailman lists)
and is intentionally signing up legitimate company helpdesks to mail lists.

Lists with an active admin/mod can fix the problem quickly by
unsubscribing the helpdesk.

Is it an attempted (rather feeble) DoS on the mail lists affected, on
the concept of a mail list, or on the companies affected? I don't know.
I can't see any real point to it. But it's happening.



-- 
Mark Rousell



Re: Thursday: Internet outage eastern Europe Iran and Turkey

2019-12-22 Thread Mark Rousell
On 22/12/2019 02:08, Christopher Morrow wrote:
> outages@ is that list I think?

For anyone looking for it: https://puck.nether.net/mailman/listinfo/outages

-- 
Mark Rousell



Re: PSA: change your fedex.com account logins

2019-06-01 Thread Mark Rousell
On 31/05/2019 16:02, Niels Bakker wrote:
> * r...@gsp.org (Rich Kulawiec) [Fri 31 May 2019, 16:18 CEST]:
> [...]
>> This is hardly surprising: many of them are spammers-for-hire, many of
>> them use invasive tracking/spyware, and none of them actually care in
>> the slightest about privacy or security -- after all, it's not *their*
>> data, why should they?
>
> Which is why we now have GDPR.  Care, or get fined.

Not quite so simple, though, is it. If you want to make a complaint then
you have to get your EU national data protection regulator interested.
Even the worst-leaking ESPs are unlikely to generate many complaints, I
suspect. And if they are located outside the EU with no direct business
presence within the EU then it requires the regulator to make approaches
to foreign governments who might or might not be willing to cooperate.

In the UK the data protection regulator is the ICO  and,
whilst it is perhaps one of the better UK regulatory agencies, I still
wouldn't hold out much hope of getting them to do anything like this
(where multiple levels of evidence would need to be collected) in
individual cases.

> Unfortunately it's not that easy; the few large remaining mail hosters
> at best have opaque procedures when it comes to accepting mail.

Sadly so but I think that if you have a decent and consistent volume
(and follow all the usual good hygiene requirements) then it should be
possible to get on their automated radar in a positive way. It seems to
me that it's small volume senders who have the real deliverability problems.

-- 
Mark Rousell



Re: EXERCISE: 2019 IAA Planetary Defence Conference - Day 5 Scenario

2019-05-08 Thread Mark Rousell
On 08/05/2019 02:44, Sean Donelan wrote:
> Of course, any fictional scenario is more likely to hit an ocean or
> miss the planet. But that makes for a dull exercise.

An ocean impact needn't be boring. It would potentially create
megatsunamis over a possibly wide area on multiple coasts. Even cities
away from coasts but on rivers could be affected.

A large ocean impactor could even damage undersea cables.

-- 
Mark Rousell



Re: bloomberg on supermicro: sky is falling

2018-10-04 Thread Mark Rousell
On 04/10/2018 22:28, Naslund, Steve wrote:
>
> Quite different really.  FIREWALK is really an intercept device to get
> data out of a firewalled or air gapped network.  The exploit Bloomberg
> describes would modify or alter data going across a server’s bus.  The
> big difference is the Bloomberg device needs command and control and a
> place to dump the tapped data to over the server’s network
> connection.  That device is not going to be able to do so out of any
> classified military network I have ever worked on.  Or anyone with a
> halfway decent firewall (which I would assume Apple and Amazon would
> have for the internal servers).  I think this article is unlikely to
> be true for the following reasons :
>
>  
>
> 1.   Separate chip is much more detectable physically than an
> altered chipset that is already on the board.
>
> 2.   Requires motherboard redesign to get access to power and
> buses needed (again easily detectable during any design mods “hey does
> anyone know what these are for?”)
>
> 3.   Does not have onboard communications so it will be sending
> data traffic on the network interfaces (will definitely trigger even
> the most rudimentary IDP systems).It relies on these backbone
> Internet companies and Intelligence agencies to have absolutely
> abysmal security on their networks to be at all useful.
>
> 4.   Parts would have to be brought into the plant, stored
> somewhere, and all the internal systems would need a trail of  where
> the part came from, how ordered it, where it is warehoused, loaded
> into pick/place, etc.  Much better to compromised an existing chips
> supply chain.
>

Whatever the truth here, I'm sure that the article as it is written
isn't telling us everything. There's more to this than meets the eye
including, quite possibly, the full facts about how data would be
exfiltrated and/or, perhaps, exactly what was done to the customers'
hardware.

> Does anyone think that someone somewhere is trying to kill
> Supermicro?  They sure have had a lots of bad news lately.
>

Who knows. Perhaps we are intended to come away with certain impressions.

-- 
Mark Rousell



Re: bloomberg on supermicro: sky is falling

2018-10-04 Thread Mark Rousell
On 04/10/2018 22:00, Naslund, Steve wrote:
> The other thing I am highly skeptical of is the suggestion of attempting to 
> tap sensitive intel agency systems this way.  Talking to a C server is 
> suicide from within their network.  How long do you think it would take them 
> to detect a reach out to the Internet from inside?  How are you going to get 
> the data from the outside back into their network?  You still have to defeat 
> their firewalls to do it.  If this was targeted to specialized video 
> processing server then would it not be unusual for them to be talking to some 
> random IP address on the Internet?

If I understand the article correctly, all the 'infected' systems were
built for outsourced service providers so not intended directly for the
most sensitive of systems. Still, I agree that network activity is
inevitably going to be seen in any modern competent network. In fact,
the article states that odd network traffic is how Apple found out about
the implants.

I have observed that a common trait in technically complex stories like
this is that we are not seeing the whole story. Key facts that cause
everything to make sense to technical readers are often left out, either
because those who have the information cannot release it (for safety or
security reasons) or because it's perceived as too complex for the
readership to understand. Sometimes these issues even result in
deliberate inaccuracies being introduced.

To put it another way: Considering that, if true, these were carefully
targeted attacks it is possible that there were other ways to exfiltrate
the target data that have been glossed over.

That said, even in highly complex or high cost plans, people sometimes
make basic errors. Misplaced decimal places, wrong units, etc. Perhaps
relaying on network access was another basic error.

-- 
Mark Rousell



Re: bloomberg on supermicro: sky is falling

2018-10-04 Thread Mark Rousell
On 04/10/2018 20:26, William Herrin wrote:
> On Thu, Oct 4, 2018 at 3:07 PM Denys Fedoryshchenko  wrote:
>> It would be better for them(AMZN, SMCI, AAPL)  to prove that these
>> events did not take place - in court.
> "Can't prove a negative."

You can in effect do so by suing for defamation. It's then up to the
person who has made allegedly defamatory claims to prove their claims.
If they can't prove their claims in court then the claims are, in
effect, proven to be false.

However, I'm not sure that Amazon, Apple or Supermicro have actually
been defamed by the article in question. In other words, there could be
nothing to sue for. The PLA and Chinese government would have been
defamed (if the claims are untrue) but that's a different matter. Any
lawyers wants to offer an opinion?

> The Bloomberg article described them as looking like 'signal
> conditioning couplers" on the motherboard. There is no such part on
> server boards but maybe they meant optoisolators or power conditioning
> capacitors. The former is a hard place to tweak the BMC from without a
> high probability of crashing it. The latter doesn't touch the data
> lines at all.

The mystery object in the pictures in the article seemed to me to (sort
of) resemble a surface mount power conditioning capacitor. Note that
there was no suggestion that the mystery objects were connected in place
of capacitors; the article merely claimed that they were visually
disguised. They would obviously have to connect to data lines somewhere
to do what is claimed.

> They also quoted someone describing such a hack as being "like
> witnessing a unicorn jumping over a rainbow." I agree.

It doesn't seem so unreasonable to me. If true, this is not a matter of
fitting the mystery components to random hardware and hoping that they
go somewhere useful. Instead, these were specific models of hardware
being manufactured for specific customers for use in specific
locations/roles. In other words, it was near-guaranteed that the
hardware (or at least some of it) would end up being used in a location
that carried 'interesting' target data. As such, this would be, if true,
an example of very carefully targetted espionage, not some random lucky
miracle.

-- 
Mark Rousell



Re: Whois vs GDPR, latest news

2018-05-21 Thread Mark Rousell
On 17/05/2018 19:03, Zbyněk Pospíchal wrote:
> Dne 17/05/2018 v 18:14 Sander Steffann napsal(a):
>> Hi,
>>
>> But this regulation increases essential liberty for individuals, so I don't 
>> understand your argument...
> No, it don't. It has two aspects:
>
> [...]

Very well said.

-- 
Mark Rousell



Re: Email security: PGP/GPG & S/MIME vulnerability drop imminent

2018-05-15 Thread Mark Rousell
On 15/05/2018 10:34, Rich Kulawiec wrote:
> On Mon, May 14, 2018 at 01:47:50PM +0530, Suresh Ramasubramanian wrote:
>> TL;DR = Don't use HTML email [snip]
> 
> That's enough right there.  HTML markup in email is used exclusively
> by three kinds of people: (1) ignorant newbies who don't know any
> better (2) ineducable morons who refuse to learn (3) spammers.
> There are no exceptions.
> 
> ---rsk

If only life were so simple.

I used to be a resolute user of plain text-only email. It was good
enough for me.

And then I realised how absurdly old fashioned this appeared to my
clients. I'd send them emails explaining what I was going to do or about
the new product or service, and it just looked boring and backward. I
realised that I could no longer stick to plain text: It was actually
harming my business.

The world has moved on and rich content everywhere is now a must. It's
no longer optional (although of course it depends on with whom one
communicates).

Yes, you can blame this on "ignorant newbies who don't know any better"
but bear in mind that they are now the vast majority of users. They are
the ones ultimately paying the bills and we have to adapt to their
preferences, and not them to us.



P.S. And I agree with Suresh in the previous message. It is true that
there is a real problem here (more with S/MIME than PGP/GPG in practice)
but it's being hyped up and overblown. The content does not fully
support the headlines.


-- 
Mark Rousell