Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
I'm tired of seeing the phrase "don't roll your own crypto". Yeah it's good advice if I'm trying to make web 2.0 mobile next big apps or whatever, but it's really loving annoying when you're learning about cryptography and some pile of meat stuck to a mouse replies with, "don't you know better than to ask :smug:". It makes me think that the person who states it actually knows nothing about cryptography and is trying to cover up their personal insecurity with some cultist utterance.

It's about ethics in cryptography.

Adbot
ADBOT LOVES YOU

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
Right, perhaps not if you are producing a product, but it is good to have an understanding of its use. It's a matter of trust in that regard. I understand how RSA and AES and SHA work, but not when it comes to using ECDH or different padding or something. I trust those (and their implementations) by virtue of my understanding of them, and by knowing the situations of where they do start to unravel. But I've only ever had to implement ElGamal, and it was not fun and it would had been easier to use a proper one.

I dunno, I had an argument with some developers of some open source crypto application over not using the NIST curves or EC at all as the default scheme simply because none of us were actually well versed in how they work. They're faster, sure, but that's not the point ...

dougdrums fucked around with this message at 22:54 on Nov 20, 2015

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
For serious things I use a nonsense sentence, or a dumb joke I haven't told anyone, and remember it and the steps I use to manipulate it. Sometimes this involves Cyrillic or Chinese characters if allowed. I'm pretty sure that's the best any human can do.

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)

OSI bean dip posted:

Any basic understanding of prime numbers would be enough to not let you wonder about why these are the largest pairs. I am not going to explain what is wrong in this code because if you're asking this then you shouldn't dare think about writing such.

How can nerds be so smug.

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)

via posted:

Wrong thread, I'm sure. But this has been bothering me for at least 15 years. Why were dictionary/brute force attacks ever possible? What is the use in letting a client attempt 1,000,000 passwords? Why would it even let you try five?

People still brute force ssh servers, I guess people still use guessable ones.

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)

Mr Chips posted:

Can you explain the mathematics for the first bit for everyone else who's interested in understanding why?

This is Euclid's theorem. (In this case, Wikipedia probably has a simpler explanation, next to scanning a textbook.)

Also, small primes can be easily guessed, which is supposed to be the hard part about RSA.

M_Gargantua posted:

I was wondering something about the practical side of security for disk encryption. If I don't have FDE equipped drives is it more secure to use software based encryption on the whole drive and have encrypted containers on it or to have multiple logical volumes encrypted with different passwords.

My use is very mundane. Mostly I want to have my music on the same drive as everything else, but have everything on the drive encrypted. I want to get back to using encryption as a common part of my habits. So should I have the mundane items on a separate logical volume or is bundling it all together equally secure? Probably going to go with Veracrypt unless there's something glaring that I haven't turned up?

I don't think there's any reason not to just encrypt everything. I'm not sure what the windows equivalent is, but I've used the single group LVM/LUKS approach sarehu mentioned without any issues, and without doubting it. You only need one key, too. I also wouldn't trust the OS to not write something telling with multiple volumes mounted. Also it's easy to make sure that my swap partition/file is encrypted.

This is what I'm talking about : LVM on LUKS. You just leave the boot partition unencrypted. I think there's a way to finagle GRUB into using an encrypted kernel image and initramfs too, but I never tried.

dougdrums fucked around with this message at 16:15 on Nov 28, 2015

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
I wonder if the prevalence of online patient info sites increases or decreases breaches from misdelivery re healthcare.

Also never allow employees to use email.

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
You used to have to get those from a public site that used the same root ...

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
Yeah, a good part of commercial infosec is auditing and regulatory compliance, which is a field that you might not run into otherwise doing IT/dev. Check out PCI standards, and get familiar with the requirements of HIPAA, FERPA, etc.

Oh whoops you just mentioned this ... thought I'd just make note of it while I'm about. I learned about PCI from just reading the standards documents online, they're very helpfully written.

Vvv Oh yeah, http://csrc.nist.gov/publications/PubsSPs.html and specifically 800-30: http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf

dougdrums fucked around with this message at 20:22 on Aug 31, 2017

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
Yeah it's all incredibly dull. If I were to do this as my career forever I think I'd go into LE instead. I'm sure LE have their share of boring poo poo, but it still seems like a much more useful and interesting gig.

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)

Cowboy Mark posted:

Contracted out some work to a developer. I'm not sure they entirely understand how to use SSH, and then they were complaining they couldn't connect to our server to transfer some files.

A long while ago, I set up a dev environment on digital ocean for some subcontractors to work with. They had no sort of pki in place, and no real idea how to do it, so I cut them a working key under a new root, delivered it by hand, and showed them how to use it with putty.

3AM, I get a message from DO saying that the server is racking up abuse complaints. The only thought I had was that the subcontractor must be breached. Lo, that's how those dudes found out that they had been hosed for awhile.

I was glad we didn't give them direct access to our poo poo.

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)

Subjunctive posted:

Equifax laying off anyone related to security would be a really bad look.

I mean firing your CISO and poo poo is the standard course of action. That's pretty much their role from what I understand -- to be hired in order to be fired.

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
I check my mail like every other week, and there's never anything important. I literally use all of it as grill or fireplace kindling, unless it's completely covered in ink. In that case, I just shove it back into my post box.

Eventually the postman will get frustrated and remove it all, except for the one time my voter registration card had "please empty mailbox" written on it. He's the one stuffing it with junk ...

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
If you want full encryption, keep another one in a safe with otp codes.

E: There's a small chance that they've cooked up some scheme to obscure memory, and that's what's getting flagged. Perhaps its been modified by something else, too. Are you comfortable sharing the name of it?

Only registered members can see post attachments!

dougdrums fucked around with this message at 22:44 on Feb 12, 2019

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)

Methylethylaldehyde posted:

It's really hard to rm -rf your tapes when they're stored in a file cabinet across town.

Like, it should be a standard backup/disaster recovery scenario to ask "If an attacker found my keepass keyring and had root access to everything, and did an rm -rf, how would I recover from that?"

I would thank jesus that they didn't do the needful instead:
https://twitter.com/VFEmail/status/1095021927972909056?s=20

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
Yeah I had way to much time yesterday to read about it, and it seems the motive was to destroy some info after it was retrieved, without giving away what the target was. He said something to the effect of, "I don't know how they had the password to every vm." Of course they probably did not have the password/keys to every vm so whatever it was had to really be worth it.

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
That still qualifies as reachable from the internet though. I keep the backups for my business in a deposit box. I remeber one place where they just had a zip file on the dc and were like, "yeah of course we keep backups!"

I think some places have some confusion between backups in case you gently caress up some configuration and backups in case your poo poo gets wiped by an attacker/fire/mother nature.

dougdrums fucked around with this message at 12:42 on Feb 14, 2019

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
Have two of them (that is, configure a system for backups, and keep another version offline). Drop off a copy on my way home. Maybe use a third party too.

dougdrums fucked around with this message at 12:49 on Feb 14, 2019

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)

Subjunctive posted:

Drop off a server? (I like the “on my way home” backup rotation strategy for a mail provider’s data, though.)

Yeah no poo poo, I was clearly just giving an example for my case. You store a copy on media somewhere safe, regardless of scale. It's not exactly a novel concept.

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)

Subjunctive posted:

Sure, there are lots of ways to rotate media to distant storage. That’s not the same as the backup server that generates those media being unreachable from the internet transitively. (It also puts constraints on your restore options.)

You could write exactly the same tweet in the presence of a tape robot.

You still have the previous version if your backup server gets hosed. It's a redundancy. You have to assume (like in this case) that if it's hooked up, it's at risk.

You can keep a backup server live and restrict traffic, there's nothing wrong with that. You shouldn't stake your whole business on it being hosed though. The maersk/petya case is a good example.

dougdrums fucked around with this message at 13:14 on Feb 14, 2019

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
I agree it's not necessary to take it offline transitively. If transporting physical media is impractical, you should at least back it up with a third party.

Most places aren't google.

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
Fair enough, most of the people I used to work with were likely to gently caress something up, or they didn't have the resources to maintain it otherwise. Either way it reduces the risk of your business being burned to the ground in a few hours time. You can't eliminate it totally. If you've got the resources to maintain it, no reason not to. Hence why I [meant to say] "maybe".

Having offline media is still useful even if you don't make copies frequently.

dougdrums fucked around with this message at 13:35 on Feb 14, 2019

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
Yeah I think I've might of misread you in my morning state, The way I have mine set up personally is to make outbound ssh connections to the stuff I need backed up, and restrict it to those specific hosts. All inbound is dropped.

I might gently caress it up, or there's some other hereto unknown vulnerability, so I keep copies offline. I have no idea how many users they had.

dougdrums fucked around with this message at 13:53 on Feb 14, 2019

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
Are we talking about someone manually making a copy and then walking it over to an airgapped machine? Yeah that's dumb I'd agree. I think the confusion was when I said it shouldn't be connected to the internet, I meant there should be backups on physical media somewhere. In vfemail's case (which boasted the extra security as a feature), I don't think they had enough users to make it impractical, or they could do incremental backups or something. Just seems like they were playing with fire.

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
Oh yeah, like I would consider my backup server scheme above to be connected to the internet, regardless of how it's configured. I mean like physically connected, there's a non-zero chance of it communicating to and from the outside world, Bulgaria, 300 lb guy in new jersey, whatever.

Fwiw I did red team stuff and had plenty of people argue that I could not possibly had access to a host without internal help/abusing the scope because it was "not connected to the internet". It didn't matter because I did it from the parking lot anyways.

The point I was making with that tweet was that rm just unlinks files. I assumed that they already had total control of their stuff through some unknown exploit beforehand.

dougdrums fucked around with this message at 14:39 on Feb 14, 2019

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
I'm not sure what you're responding to, but 194.108.44.53:8161 is what's in the host header. ASCII numbers are themselves plus 0x30.

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
They blurred out the hex in the actual report. I like that it checks netstat for other specific ip's though, to kill the process. It's like they got a personal grudge w/ other rear end in a top hat miners. Also no worries, I'm certainly brain damaged from writing dsl compilers by now :pwn:

dougdrums fucked around with this message at 22:57 on Mar 1, 2019

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
That quote reminds me of when the local uni caught some people using a usb keylogger, and the FBI found out about it through a message broadcast on the uni's alert system. I'm almost certain most orgs are required to report breaches anyways, so why not get the help right away?

Should pull himself up by his own bootstrap.js imo

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
Every once in a while I'll do the ol:
code:
$ suod chown foo:bar baz
...
$ (password)
gently caress

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
If only bash did it too :arghfist:

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
S-box had a backdoor

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)

Virigoth posted:

This looks invasive as gently caress to run on a laptop (yes it is provided by my work) and when we get it installed I should halt doing anything but work on it.
Uh yeah. If you're working at a place where PCI and HITRUST compliance is necessary, "invasive as gently caress" is par for the course. I don't know what your product is, but this is a good thing. If they've been open in the past, why not trust them now?

Virigoth posted:

I'm glad it looks like a standard tool, and I don't do any weird illegal poo poo on my laptop anyway because I'm not a complete fuckup, but I always like to try to check / learn as much as I can about these things.
It's not so much about you doing weird illegal poo poo, as much as it's about weird illegal poo poo being done to you. Don't take it so personally.

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)

Internet Explorer posted:

Showing my ignorance here, does no one use Elastic Stack or does that not have specific enough tools for what InfoSec folks need?
I've been using elastic stack with packetbeat, but yeah I find myself writing a whole bunch of weird rear end yaml. I also don't have like TB of data to sift through, but I can see where maintaining this would get inconvenient. Probably showing the same ignorance here, but all I know is alienvault and some splunk, but gently caress alienvault and I'm too much of a cheapass for splunk.

dougdrums fucked around with this message at 05:19 on May 16, 2019

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
Yeah that's what I'm slowly finding out :( ELK is cool if I log stuff from an API that's already sorted out, and honestly it's pretty swanky for $0 (well, $0 plus the machinery). I'm just always chasing what I need to map out for this product it seems.

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)

Sickening posted:

bounty program is such poo poo.

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
Ya as unfortunate that it may be, I'll take it over the risk of being held up at the border where I'm a born citizen for christ sake.

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)
.

Only registered members can see post attachments!

Adbot
ADBOT LOVES YOU

dougdrums
Feb 25, 2005
CLIENT REQUESTED ELECTRONIC FUNDING RECEIPT (FUNDS NOW)

Nalin posted:

In reality you'll just get a pin number in a text message.
this is gonna actually happen to me in five years when i forget the password to my wifi enabled medicine cabinet

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply