Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug

Combat Pretzel posted:

My gripe is more that the US is throwing around political threats in the general direction of other sovereign entities (e.g. Europe), for daring to continue to consider Huawei equipment, while these assholes themselves are undermining our territory with their own spying bullshit.

The Uighur thing is a weird matter to bring up. Considering the US is otherwise also acting as the world's police, they're sure free to deal with it.

Oh no, I did not mean in no way that the US has clean hands, especially given the recent crypto scandal.

Adbot
ADBOT LOVES YOU

Wiggly Wayne DDS
Sep 11, 2010



Bonzo posted:

https://www.humblebundle.com/books/...iley_bookbundle

Decent collection of books and material if you are want to learn more about CyberSecurity and hacking. Pay $1 or whatever
ya p solid set of classics in there, the essentials haven't changed much but worth keeping the age of the material in mind

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug
Yeah thats a good bundle.

Diva Cupcake
Aug 15, 2005

Related, the 3rd edition of Security Engineering is online and free until he actually finishes it.

https://www.cl.cam.ac.uk/~rja14/book.html

evil_bunnY
Apr 2, 2003

22 Eargesplitten posted:

That reminds me, Algo's GitHub says "Does not claim to provide anonymity or censorship avoidance," why is that? Because your name is presumably going to be attached to the endpoint? Or is it just a CYA / statement that if the Mossad wants to steal your fansubs of the newest Magical Girl anime they will?
Because the transport layer is only a small part of the security problem.

22 Eargesplitten
Oct 10, 2010



Wiggly Wayne DDS posted:

ya p solid set of classics in there, the essentials haven't changed much but worth keeping the age of the material in mind

What's the required knowledge level to be able to understand those books? I've basically been bouncing around the junior IT generalist level for a few years now.

Wiggly Wayne DDS
Sep 11, 2010



22 Eargesplitten posted:

What's the required knowledge level to be able to understand those books? I've basically been bouncing around the junior IT generalist level for a few years now.
most of them are more concept/reference manuals than teaching material but you can still learn from them. there's going to be topics that you'll hit a wall on but there's a lot of specialist books in the collection. reversing and shellcoders are the ones that jump out as true classics, applied crypto is obviously very specialised but i remember that being a very pricey book on its own. malware analyst's book having the dvd makes it a rarity so if you want a guided environment that's a starting point.

even if you want to stay a generalist having a solid ground of the fundamental concepts in the specific fields is p useful for staying up to date. as i mentioned the books are p old but the systems are still in use and you have to start somewhere

Combat Pretzel
Jun 23, 2004

No, seriously... what kurds?!
Finally a proper use for a VPN, other than Netflix et al. My ISP and a peering partner hosed up, broke things and even after fixing it, it took hours for routes to propagate properly. Parts of the Internet weren't reachable. Tunneling to a server that was reachable let me continue to operate just fine.

Antigravitas
Dec 8, 2019

Die Rettung fuer die Landwirte:
Central IT sent a university-wide nastygram because someone's emotet-infected laptop was apparently roaming across campus and our network provider was seeing traffic to known C&C addresses at the edge. :cripes:

evil_bunnY
Apr 2, 2003

Antigravitas posted:

Central IT sent a university-wide nastygram because someone's emotet-infected laptop was apparently roaming across campus and our network provider was seeing traffic to known C&C addresses at the edge. :cripes:
Academia is a loving riot eh? It's so great knowing ~15 ways to own half the infra from outside, and a bunch more if you just get on the uni ethernet.

some kinda jackal
Feb 25, 2003

 
 
You mean no one is patching the 9,000 linux servers running various equipment from 1991 in half the labs on campus?

Up until like 2006 all computers on the networks at the uni I worked at had public IPs.

Good times.

Docjowles
Apr 9, 2009

Martytoof posted:

You mean no one is patching the 9,000 linux servers running various equipment from 1991 in half the labs on campus?

Up until like 2006 all computers on the networks at the uni I worked at had public IPs.

Good times.

I vaguely remember this about my alma mater circa 2000. Plug into the jack in your dorm room and bam, your Windows XP machine with file and printer sharing on by default and no firewall is naked on the public internet, lmao.

It's not even a particularly large or noteworthy school and checking ARIN they still have multiple public /16's plus misc other subnets allocated.

some kinda jackal
Feb 25, 2003

 
 
Yeah, we had a /16 too. I wish I could have gotten in on the ARIN allocations when the getting was good :twisted:

Sirotan
Oct 17, 2006

Sirotan is a seal.


Martytoof posted:

Up until like 2006 all computers on the networks at the uni I worked at had public IPs.

We have multiple /16's and everything that isn't a printer is on it. There appears to be 0 desire at central IT services to change this.

Mitigation plans for computers still on Win 7 recently were "put it on the private IP space" but besides an IPAM system there is literally no visibility into what has been stuck there. My particular unit is trying to change that for our networks but the rest of the university is just doing uh....nothing? :tif:

Sirotan fucked around with this message at 16:12 on Mar 4, 2020

Antigravitas
Dec 8, 2019

Die Rettung fuer die Landwirte:
Being on public IPs is perfectly fine. It was how the Internet was designed, it's not our fault everyone else is doing it wrong. gently caress NAT and the people who want it. You can pry our AS from our cold dead hands.

What isn't fine is that there is literally no way to force people to care after their poo poo. None. Null. Nischt. The people upstairs (who, ironically, don't have much going on upstairs, iygwim) have shown complete apathy to the issue and are more invested in trying to find ways to leak PII as much as possible and use every incompatible Adobe Acrobat feature they can find.

Everything is so fragmented that individual institutes are fending for themselves. Some institutes are tiny and simply don't have admins, so they are being run by students who are CLUELESS BEYOND BELIEF and what little knowledge they manage to scrape together vanishes as soon as they go.

wolrah
May 8, 2006
what?

Docjowles posted:

I vaguely remember this about my alma mater circa 2000. Plug into the jack in your dorm room and bam, your Windows XP machine with file and printer sharing on by default and no firewall is naked on the public internet, lmao.

It's not even a particularly large or noteworthy school and checking ARIN they still have multiple public /16's plus misc other subnets allocated.
Mine also gave us IPs from their /16, but most of the time there was a firewall that dropped all unsolicited inbound connections as well as outbound on a few specific ports. A lot of games and P2P apps were unusable most of the time because they'd see they weren't behind NAT and assumed they didn't need to do any firewall traversal. Every now and then though somehow the firewall would fail open and you could generally get a few hours of great gaming in before enough of the P2P crowd figured it out and obliterated the available bandwidth.

Antigravitas posted:

Being on public IPs is perfectly fine. It was how the Internet was designed, it's not our fault everyone else is doing it wrong. gently caress NAT and the people who want it. You can pry our AS from our cold dead hands.
Exactly. If you've got 'em, use 'em. NAT is a bodge, it's never desirable.

wolrah fucked around with this message at 16:47 on Mar 4, 2020

ChubbyThePhat
Dec 22, 2006

Who nico nico needs anyone else
The local University here also uses public IP space for each of the departments. Within the department is a private network and within the campus datacenter there is a private network, but all space between them is 100% public. Also each department has their entirely own network complete with different IT staff and what I will hazard to call "architecture".

Antigravitas
Dec 8, 2019

Die Rettung fuer die Landwirte:
That was also a fun realisation, that other institutes WEREN'T dropping inbound connections by default.

At some informal meeting someone was asking how everyone was dealing with ssh login attempts in their network, and whether everyone was downloading lists of IP addresses to add to ipfilter. And apparently the Windows clients have RDP enabled (for easy management of course).

Everyone involved acted like it was totally normal to have every device reachable from the outside. I felt like I was being gaslit for an hour… :catstare:

Potato Salad
Oct 23, 2014

nobody cares


Antigravitas posted:

Being on public IPs is perfectly fine. It was how the Internet was designed, it's not our fault everyone else is doing it wrong. gently caress NAT and the people who want it. You can pry our AS from our cold dead hands.

What isn't fine is that there is literally no way to force people to care after their poo poo. None. Null. Nischt. The people upstairs (who, ironically, don't have much going on upstairs, iygwim) have shown complete apathy to the issue and are more invested in trying to find ways to leak PII as much as possible and use every incompatible Adobe Acrobat feature they can find.

Everything is so fragmented that individual institutes are fending for themselves. Some institutes are tiny and simply don't have admins, so they are being run by students who are CLUELESS BEYOND BELIEF and what little knowledge they manage to scrape together vanishes as soon as they go.

It's pretty drat impressive that more people in your position don't flip and exploit the network for cryptocurrency after hours.

Combat Pretzel
Jun 23, 2004

No, seriously... what kurds?!
I always wonder whether that'll get noticed.

Back during the Bitcoin craze before the 20K USD peak, a friend of mine was toying with the idea of hiding an ASIC or two under the workbench of the workshop floor he's employed at. Those things were rated at 1300W per unit, resulting in more than 11MW per ASIC per year. I mean, it's a workshop with some medium sized machinery, but 11-22MW still.

evil_bunnY
Apr 2, 2003

Docjowles posted:

checking ARIN they still have multiple public /16's plus misc other subnets allocated.
This is really common tbh. Uni's were online real early and gobbled a bunch of space.


Antigravitas posted:

That was also a fun realisation, that other institutes WEREN'T dropping inbound connections by default.

At some informal meeting someone was asking how everyone was dealing with ssh login attempts in their network, and whether everyone was downloading lists of IP addresses to add to ipfilter. And apparently the Windows clients have RDP enabled (for easy management of course).

Everyone involved acted like it was totally normal to have every device reachable from the outside. I felt like I was being gaslit for an hour… :catstare:
aight remind me to never complain again lmao

Antigravitas
Dec 8, 2019

Die Rettung fuer die Landwirte:

Potato Salad posted:

It's pretty drat impressive that more people in your position don't flip and exploit the network for cryptocurrency after hours.

That's typically masters students using juiced up rigs bought with grant money with absent paren^Wprofessors.

If I were to do something like that, legality, ethics, and professional honour aside, I'd have to see some pretty drat good returns to offset the risk. That's definitely something I'd get fired for, and getting fired takes actual effort here.

And if someone were to do it on our systems they'd get found out quick. We collect performance metrics of all boxen managed by us and we know what a normal load curve looks like during a normal day.

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug
https://twitter.com/cosminim/status/1235692870050254850?s=20

Tmobile and Virgin Media both got hit.

And by "Hit" I mean exposed database.

CommieGIR fucked around with this message at 23:33 on Mar 5, 2020

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

Martytoof posted:

You mean no one is patching the 9,000 linux servers running various equipment from 1991 in half the labs on campus?

Up until like 2006 all computers on the networks at the uni I worked at had public IPs.

Good times.

running everything on public IP space owns. NATs aren't good security boundaries and just make poo poo harder to track down. there's a reason why ipv6 intends to do away with the practice

Antigravitas posted:

Being on public IPs is perfectly fine. It was how the Internet was designed, it's not our fault everyone else is doing it wrong. gently caress NAT and the people who want it. You can pry our AS from our cold dead hands.

What isn't fine is that there is literally no way to force people to care after their poo poo. None. Null. Nischt. The people upstairs (who, ironically, don't have much going on upstairs, iygwim) have shown complete apathy to the issue and are more invested in trying to find ways to leak PII as much as possible and use every incompatible Adobe Acrobat feature they can find.

Everything is so fragmented that individual institutes are fending for themselves. Some institutes are tiny and simply don't have admins, so they are being run by students who are CLUELESS BEYOND BELIEF and what little knowledge they manage to scrape together vanishes as soon as they go.
correct.

some kinda jackal
Feb 25, 2003

 
 
I mean, in theory I can't disagree and I certainly won't pick this as a hill to die on, but to be clear I'm talking about "running off public IPs" as in the "this network port here just routes in and out of the internet with no firewall port filtering" kind of "running off public IPs".

Given that virtually no one practices good hygiene, the scenario of everyone running off public IP space as was designed, you may as well be talking about a world where we have no concept of money and just go to work for spiritual fulfilment; They're both equally attainable :haw:

BlankSystemDaemon
Mar 13, 2009




NAT isn't a security boundary, at all.
Also, just because you have public IPs on all machines doesn't mean you can't have a central firewall.

peak debt
Mar 11, 2001
b& :(
Nap Ghost

D. Ebdrup posted:

NAT isn't a security boundary, at all.

Why not? It's functionally the same as a boundary firewall that blocks everything by default, and can only have one rule per port open.

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug
NAT, like VLANs, is not designed from the ground up as a security feature, but it certainly can provide security controls.

BlankSystemDaemon
Mar 13, 2009




peak debt posted:

Why not? It's functionally the same as a boundary firewall that blocks everything by default, and can only have one rule per port open.
Except that CPE and most consumer gear that people buy ships with UPnP, NAT-T and other forms of bypass that let people poke holes through NAT.

Powered Descent
Jul 13, 2008

We haven't had that spirit here since 1969.

CommieGIR posted:

NAT, like VLANs, is not designed from the ground up as a security feature, but it certainly can provide security controls.

Don't you understand, anything that's not an absolutely perfect magic bullet for every conceivable scenario is worthless

See also: VPNs, two-factor auth, password managers, tracking cookie blockers, the lock on your front door

BlankSystemDaemon
Mar 13, 2009




Ah yes, it is of course perfectly reasonable to use things not designed for security, such as chroot, docker, or NAT for security related solutions.
No problems will ever come of that, surely.

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug

D. Ebdrup posted:

Ah yes, it is of course perfectly reasonable to use things not designed for security, such as chroot, docker, or NAT for security related solutions.
No problems will ever come of that, surely.

Security Controls are not about perfection, they all have their issues. Which is why understanding their risks and creating mitigation for those risks is critical.

Most things used as or addressed by security controls are not designed for security.

CommieGIR fucked around with this message at 18:59 on Mar 6, 2020

Antigravitas
Dec 8, 2019

Die Rettung fuer die Landwirte:
NAT is a security risk, not a security mechanism. It makes your network harder to reason about and does not control access.

A Firewall is a perfect mechanism and, luckily, not an esoteric piece of equipment. You'd typically deploy and configure one along with NAT anyway because splitting NAT and firewall is even more insane and harder to reason about.

The zen state of networking is a firewall without any NAT. Everything is straightforward, no weird package mangling to keep in mind.

BlankSystemDaemon
Mar 13, 2009




Naturally, all software has bugs and even with high-quality software at "only" 1000 lines per bug (versus 100 lines per bug for average-quality), there's no escaping that fact.
My point is that if someone sets out to make something for security, they almost-universally tend to put a little more thought into the design than if it's something that they're just whipping together as a hack to accomplish a task.

Antigravitas
Dec 8, 2019

Die Rettung fuer die Landwirte:
I'm more worried about silly humans getting it wrong. I've seen my fair share of NAT problems caused by humans, because NAT is actually really complicated once you get into edge cases.

Fun fact: Warframe gets confused by certain types of NAT and exhibits subtle and not so subtle bugs as a result. If your NAT device does outbound port randomisation of outgoing connections the game's p2p networking will blow up.

BlankSystemDaemon
Mar 13, 2009




Antigravitas posted:

I'm more worried about silly humans getting it wrong. I've seen my fair share of NAT problems caused by humans, because NAT is actually really complicated once you get into edge cases.

Fun fact: Warframe gets confused by certain types of NAT and exhibits subtle and not so subtle bugs as a result. If your NAT device does outbound port randomisation of outgoing connections the game's p2p networking will blow up.
That sounds delightful :allears:

peak debt
Mar 11, 2001
b& :(
Nap Ghost

Antigravitas posted:

I'm more worried about silly humans getting it wrong. I've seen my fair share of NAT problems caused by humans, because NAT is actually really complicated once you get into edge cases.

Fun fact: Warframe gets confused by certain types of NAT and exhibits subtle and not so subtle bugs as a result. If your NAT device does outbound port randomisation of outgoing connections the game's p2p networking will blow up.

But a firewall would exhibit the same issues. An application running on the inside doesn't know what incoming connections are allowed, so as soon as it tries to build a p2p mesh it can run into issues.

Truga
May 4, 2014
Lipstick Apathy
a firewall does not need to be a router, but a router has to be a firewall, is the point here i think

BlankSystemDaemon
Mar 13, 2009




Truga posted:

a firewall does not need to be a router, but a router has to be a firewall, is the point here i think
Back in my day the DTE, router, firewall, switch, access point, and NAT or VPN concatenator all used to be separate devices. :corsair:

EDIT: Better yet, everything after the DTE was your responsibility, and if it broke you got to keep all the pieces.

BlankSystemDaemon fucked around with this message at 20:47 on Mar 6, 2020

Adbot
ADBOT LOVES YOU

Potato Salad
Oct 23, 2014

nobody cares


Antigravitas posted:


The zen state of networking is a firewall without any NAT. Everything is straightforward, no weird package mangling to keep in mind.

For performance, however,

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply