Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Nalin
Sep 29, 2007

Hair Elf
Everybody who has Comcast has it deployed at home. For years now.

Adbot
ADBOT LOVES YOU

Samizdata
May 14, 2007

Nalin posted:

Everybody who has Comcast has it deployed at home. For years now.

Yeah, not on Comcast.

Anyway, my whole point was that if a poor guy with a bunch of aging kit like me could handle having it working with all his kit, then there was no reason for bigger orgs not to.

Paper Triangle
Jul 27, 2004

more dog than your dog
What would you guys say are the minimum requirements for verifying someone's ID over a telephone or live chat support systems before giving account info, rebooting servers, etc.? I can't seem to convince the people I work with that address + last 4 digits of CC# is insanely bad but maybe I'm the rear end in a top hat.

Apologies if this is opsec or something.

Thanks Ants
May 21, 2004

#essereFerrari


Have a method of generating a one-time support PIN from the admin control panel of your portal that verifies to phone agents that the person on the phone has access to the online account. If people lock themselves out of the online account and none of the recovery methods work then maybe the phone agents can call back one of a predetermined list of contact numbers stored on the account.

If it's gone really wrong then have the customer submit statements showing payments to you and some form of ID to reset access, with a grace period that includes sending notification emails to people listed on the account to let them know what's going to happen and how to flag it as fraudulent.

I think you have to treat people logged into the account as legit and then work to ensure that's as secure as possible rather than trying to bolt on another layer of verification if somebody opens a live chat. If people get into our AWS account then they can just delete all the services on our account, but that would be our own fault if we just used simple password verification, and I'd expect Amazon to be able to pick up on an attack on their authentication system.

Thanks Ants fucked around with this message at 13:34 on Mar 25, 2018

Paper Triangle
Jul 27, 2004

more dog than your dog
Thanks, it's nice to know I'm not low-grade freaking out over something everyone else agrees is adequate. Everything you described is basically what the last DC I worked at did, but this one just went from a NOC to a SOC and I feel like nobody has even thought this through. Kinda embarrassing.

Potato Salad
Oct 23, 2014

nobody cares


Paper Triangle posted:

What would you guys say are the minimum requirements for verifying someone's ID over a telephone or live chat support systems before giving account info, rebooting servers, etc.? I can't seem to convince the people I work with that address + last 4 digits of CC# is insanely bad but maybe I'm the rear end in a top hat.

Apologies if this is opsec or something.

Information security researchers have gone and done the math on comparative risk of authentication methods for you:
https://pages.nist.gov/800-63-3/sp800-63b.html

Paper Triangle
Jul 27, 2004

more dog than your dog

Thanks, this is what I needed to actually show people at work. I've been doing DC sales forever but now that I'm actually in a technical role I'm poo poo at like, figuring out what accepted industry standards/best practices for things are.

vanity slug
Jul 20, 2010

It's happening

https://www.theregister.co.uk/2018/03/23/tls_1_3_approved_ietf/

wargames
Mar 16, 2008

official yospos cat censor


News headline at some point.
"England bans all encryption in a despite fight to stop child porn"

Thanks Ants
May 21, 2004

#essereFerrari


Fashy right-wing governments and technology they don't understand just don't get on well

Boris Galerkin
Dec 17, 2011

I don't understand why I can't harass people online. Seriously, somebody please explain why I shouldn't be allowed to stalk others on social media!

I can’t wait to use it in 10 years when people finally implement it.

Boris Galerkin
Dec 17, 2011

I don't understand why I can't harass people online. Seriously, somebody please explain why I shouldn't be allowed to stalk others on social media!
All (some? most?) of Cambridge Analytica's code was discovered available on an unsecured private git repository.

https://www.upguard.com/breaches/aggregate-iq-part-one

quote:

On the night of March 20th, 2018, UpGuard Director of Cyber Risk Research Chris Vickery discovered a large data warehouse hosted on a subdomain of AIQ and using a custom version of popular code repository Gitlab, located at the web address gitlab.aggregateiq.com. Entering the URL, Gitlab prompts the user to register to see the contents - a free process which simply requires supplying an email address. Once registered, contents of the dozens of separate code repositories operated on the AggregateIQ Gitlab subdomain are entirely downloadable.

They just left the registration completely open for anybody :lol:

Potato Salad
Oct 23, 2014

nobody cares


Now that's something I'll admit I've never seen in court -- does a properly functioning registration process imply authorization to access data, especially on a site where data sharing is the MO?

Potato Salad
Oct 23, 2014

nobody cares


When I walk up to a door and someone asks me to register my email and gives me the key, was that reasonably-implied right to use?

Truga
May 4, 2014
Lipstick Apathy

Potato Salad posted:

Now that's something I'll admit I've never seen in court -- does a properly functioning registration process imply authorization to access data, especially on a site where data sharing is the MO?

if it doesn't, registering on amazon.com would be just as illegal.

Boris Galerkin
Dec 17, 2011

I don't understand why I can't harass people online. Seriously, somebody please explain why I shouldn't be allowed to stalk others on social media!

Truga posted:

if it doesn't, registering on amazon.com would be just as illegal.

I think a better comparison would be like if I was able to register an me@amazon.com email address by going to email.amazon.com or whatever, and then being able to see everybody's calendars and appointments and schedules.

Did I do anything wrong by going to email.amazon.com? No because it's a public facing website that anyone can visit.

Did I do anything wrong by registering an Amazon corporate account? No because it's not my fault that they didn't have proper security to ensure that I couldn't register.

Did I do anything wrong by looking up Bezo's calendar appointments? No because the account I registered had the proper permissions.

I dunno, it feels like it's entirely their fault for allowing me to register on a public facing website without checking for say my IP address (VPN) or checking that I was an actual employee.

wolrah
May 8, 2006
what?
On the flip side of that, didn't Google get in trouble for logging data transmitted on open WiFi networks their cars observed? Data that's literally being freely broadcast to anyone in the area?


I agree that if it's open, even unintentionally, that's the problem of those who wanted it closed and not those who accessed it. Unfortunately there are a lot of people, especially non-tech-savvy lawmakers, who will happily believe what a company tells them about how it's supposed to be private and only an evil hacker could discover that a company had a major software package exposed at <packagename>.<companyname>.<tld>

Proteus Jones
Feb 28, 2013



wolrah posted:

On the flip side of that, didn't Google get in trouble for logging data transmitted on open WiFi networks their cars observed? Data that's literally being freely broadcast to anyone in the area?

Was it actual legal trouble? Or just a conviction in the court of public opinion?

I remember the kerfuffle it caused, but not necessarily the outcome.

wolrah
May 8, 2006
what?

Proteus Jones posted:

Was it actual legal trouble? Or just a conviction in the court of public opinion?

I remember the kerfuffle it caused, but not necessarily the outcome.

Looked it up and they did get sued a bunch, a few class actions were merged, and they lost. They tried to take it to the Supreme Court but were denied.

https://www.wired.com/2014/04/threatlevel_0401_streetview/

Bunni-kat
May 25, 2010

Service Desk B-b-bunny...
How can-ca-caaaaan I
help-p-p-p you?
I think it's a situation of intent mattering. If you're on wifi, you're not intending for all your traffic to be broadcast, that's just how the technology was designed. Even if it's encrypted, it's still broadcast.

If someone puts up a repository, they had the option of making it private in many different ways, so as a third-party, you'd be safe to assume if you can access it through a standard registration then the owning party doesn't care.

wolrah
May 8, 2006
what?

Avenging_Mikon posted:

I think it's a situation of intent mattering. If you're on wifi, you're not intending for all your traffic to be broadcast, that's just how the technology was designed. Even if it's encrypted, it's still broadcast.
I don't think intent should matter for two reasons:

1. That basically then requires you assume it's private unless told otherwise. Go to your favorite restaurant and see "<restaurant> WiFi" SSID wide open? Unless there's a sign up saying "Free WiFi" or you're told by the server, you can't know their intent, they might have just made a mistake when setting up the device.

2. Idiots gonna idiot. Anyone who was using FRS/GMRS radios when they became a big thing has probably come across people who believe the CTCSS "privacy codes" actually provide any form of privacy and will whine about how you're on "their" channel. Those people had the intent to have a private conversation, and were even led to believe they could based on the marketing descriptions of the product's features. That still doesn't mean it'd be reasonable to charge someone who happened to be recording the FRS spectrum with wiretapping. The peak of CB radio was before my time but I've heard many stories of the same sorts of things happening then, where people would be having a "private" conversation broadcast openly over a huge distance. The fact that someone else assumed it was private when it really wasn't should not be relevant to the law. That's their mistake, not a wrongdoing of the person passively monitoring the airwaves.

quote:

If someone puts up a repository, they had the option of making it private in many different ways, so as a third-party, you'd be safe to assume if you can access it through a standard registration then the owning party doesn't care.

How does this differ from WiFi? They had the option of making it private in many different ways, so as a third party you'd be safe to assume if it's being broadcast to you in the clear then the transmitting party doesn't care.

Bunni-kat
May 25, 2010

Service Desk B-b-bunny...
How can-ca-caaaaan I
help-p-p-p you?

wolrah posted:

I don't think intent should matter for two reasons:

Good thing the law specifically takes intent into account, so you're wrong.

duz
Jul 11, 2005

Come on Ilhan, lets go bag us a shitpost


In actuality it's up to the prosecutor if they want to make an example out of someone or not, like most federal laws.

The Fool
Oct 16, 2003


See Aaron Swartz

wolrah
May 8, 2006
what?

Avenging_Mikon posted:

Good thing the law specifically takes intent into account, so you're wrong.

Good thing the law says this:

quote:

(g) It shall not be unlawful under this chapter or chapter 121 of this title for any person—
----(i) to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public;
https://www.law.cornell.edu/uscode/text/18/2511

In the Google case, the actual legal problem they had is that they also logged encrypted traffic. They obviously couldn't decode that traffic (well actually they probably could in most cases because they have a lot of CPU power and most wifi passwords suck, but that's another matter) but the courts decided that logging even the encrypted traffic was against the law. Had they only logged unencrypted traffic they'd have been fine. I don't disagree with that conclusion.

Intent does sort of still matter, but only when such intent is actually demonstrated. You could use WEP64 and it'd still be considered private according to the law even if it's trivially broken and not really private, kinda similarly to how CSS encryption on DVDs is still considered to "effectively control access to a work" under the DMCA. The law basically says "as long as you tried".

For the standard analogy to a business, it's the difference between having your doors wide open and having a screen door latched with one of those bent nail things. The actual security difference is basically zero, but the latter demonstrates intent to keep others out where the former does not.

Wiggly Wayne DDS
Sep 11, 2010



are you guys going to check where the countries the companies you are arguing the law about reside? or take into account the context of a criminal enterprise with an ongoing investigation being the potential victim?

Bunni-kat
May 25, 2010

Service Desk B-b-bunny...
How can-ca-caaaaan I
help-p-p-p you?

wolrah posted:

Good thing the law says this:

https://www.law.cornell.edu/uscode/text/18/2511

In the Google case, the actual legal problem they had is that they also logged encrypted traffic. They obviously couldn't decode that traffic (well actually they probably could in most cases because they have a lot of CPU power and most wifi passwords suck, but that's another matter) but the courts decided that logging even the encrypted traffic was against the law. Had they only logged unencrypted traffic they'd have been fine. I don't disagree with that conclusion.

Intent does sort of still matter, but only when such intent is actually demonstrated. You could use WEP64 and it'd still be considered private according to the law even if it's trivially broken and not really private, kinda similarly to how CSS encryption on DVDs is still considered to "effectively control access to a work" under the DMCA. The law basically says "as long as you tried".

For the standard analogy to a business, it's the difference between having your doors wide open and having a screen door latched with one of those bent nail things. The actual security difference is basically zero, but the latter demonstrates intent to keep others out where the former does not.

I like how you’ve constructed these elaborate posts when I said in my first post "even if you encrypted it, it’s still broadcast, so just broadcasting isn’t enough for someone to legally record it."

So you’re strawmanning really hard here to now say "you could even use wep." Learn to read.

CLAM DOWN
Feb 13, 2007




https://blog.frizk.net/2018/03/total-meltdown.html

quote:

Did you think Meltdown was bad? Unprivileged applications being able to read kernel memory at speeds possibly as high as megabytes per second was not a good thing.

Meet the Windows 7 Meltdown patch from January. It stopped Meltdown but opened up a vulnerability way worse ... It allowed any process to read the complete memory contents at gigabytes per second, oh - it was possible to write to arbitrary memory as well.

No fancy exploits were needed. Windows 7 already did the hard work of mapping in the required memory into every running process. Exploitation was just a matter of read and write to already mapped in-process virtual memory. No fancy APIs or syscalls required - just standard read and write!

:stare::stare::stare:

Zil
Jun 4, 2011

Satanically Summoned Citrus



That can only be intentional to get business off 7? Right? :stonklol:

xThrasheRx
Jul 12, 2005

Surrealistic


Merriam-Webster

dumpster fire
noun

Definition of dumpster fire
US, informal
: an utterly calamitous or mismanaged situation or occurrence : disaster

Kazinsal
Dec 13, 2011


Zil posted:

That can only be intentional to get business off 7? Right? :stonklol:

Genuinely would not be surprised.

gently caress I hope it works

Proteus Jones
Feb 28, 2013



Potato Salad
Oct 23, 2014

nobody cares


Where were you when tower 7 collapsed?

evil_bunnY
Apr 2, 2003

That’s a 500 IQ secfuck holy poo poo

Cup Runneth Over
Aug 8, 2009

She said life's
Too short to worry
Life's too long to wait
It's too short
Not to love everybody
Life's too long to hate


That's hilarious but it's already been patched (un)fortunately. Very small number of computers will ever be affected by it.

Kassad
Nov 12, 2005

It's about time.
What if that patch introduces an even bigger secfuck?

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

You can ask that about any patch, really.

CLAM DOWN
Feb 13, 2007




Cup Runneth Over posted:

That's hilarious but it's already been patched (un)fortunately. Very small number of computers will ever be affected by it.

Lol if you actually trust the subsequent patches for this just lol

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...

Kassad posted:

What if that patch introduces an even bigger secfuck?

What if your posts cause even worse posts?

Adbot
ADBOT LOVES YOU

Cup Runneth Over
Aug 8, 2009

She said life's
Too short to worry
Life's too long to wait
It's too short
Not to love everybody
Life's too long to hate


CLAM DOWN posted:

Lol if you actually trust the subsequent patches for this just lol

I trust the report that was linked on the vulnerability that says that the vulnerability has been patched

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply