BTW Dave...if I come up to your neck of the woods, I'll take you out to some 
place that you can recommend that serves good crab cakes, New England Clam 
Chowder and lobster.

See me comments ***

Walt/K5YFW
[EMAIL PROTECTED]

-----Original Message-----
From: digitalradio@yahoogroups.com [mailto:[EMAIL PROTECTED]
Sent: Thursday, August 24, 2006 2:13 PM
To: digitalradio@yahoogroups.com
Subject: [digitalradio] Re: PC-ALE Signal Detect Before Transmitting: An
Experiment


I understand that your proposed HF system would be entirely 
independent of the internet, Walt. My points are

1. If we could reliably distinguish attack payloads from valid 
payloads, we'd already be doing this on the internet -- where its 
easier to accomplish given the hierarchical routing structure. Our 
ability to detect attack payloads has significantly improved over 
time, but are far from 100% -- in part because we're chasing a moving 
target.


*** I would disagree because DNS, routers, switches, network management 
software, load balancing, firewall, filters all are virtually not seen by the 
human eye and sometimes when there is an "automatic" notification of a problem 
or new "hack" is used, its days before its known.  If you don't what the attack 
is going to look like, you have a hard time defending against it.  That's 
it...for every measure there is a counter-measure.  For every counter-measure 
there is a measure.  Its a FAST moving target.  And this is the reason I think 
a scaled down simple network would be less of a target.  The attacker would 
first have to get on the air, establish their credentials and be accepted to 
the network.  Even my encrypted signature mail folder on occasion gets SPAM.  
If I restrict my incoming E-Mail to only one known valid domain, I have no SPAM 
unless messages from my network control center are considered SPAM.  I wanna 
use the KISS theory.

2. Since we can't distinguish attack payloads from valid payloads, 
your HF-based system would be equally vulnerable. What would stop an 
attacker from injecting an attack payload into your system that when 
delivered to its destination exploits a buffer overrun in the 
operating system and installs a bot that can then be commanded by 
subsequently delivered messages? Since it relies on HF links, your 
proposed system requires large numbers of user-operated nodes to 
perform the routing and terminal functions; it would be trivial for 
an attacker to join this system, operate one or more nodes, and use 
them to inject his attack.

*** Its really to install a "bot" or any malware if your system is 90% text 
based.  Before MIME E-Mail, malware was unknown.  We take a GIANT leap 
backwards.  KISS. Hi Hi.

*** If you try to join my system and I can't authenticate your call sign, you 
ain't gettin in. With no hard feelings to non-U.S. amateur radio operators, I 
talking about only U.S. amateur radio operators.  Any "tribal" contacts would 
be between only specific authorized stations. (BTW "tribal" is the 
international politically correct name to be used for sovereign nation.)

3. I did not say that an attack on the internet would bring down your 
proposed HF-based system. I said that an attacker would be foolish to 
bring down the internet without simultaneously bringing down your 
backup system. This would be accomplished with independent but 
synchronized attacks.

*** Ok...understand and that is true but again we have made it more complicated 
to the enemy...and the society that enemy comes from is not know for a large 
scale amateur radio contingent or operational capability nor is their 
government know for its RF capability.  They are well known for their Internet 
capability.  Know your enemy.

4. My suggestion that internet backbone hubs be replicated and 
hardened was in response to your mentioning their vulnerability to 
physical attack. I made no claim that such hardening would render the 
internet less vulnerable to a cyber-attack.

*** Ok...understand.  I think the reason we haven't replicated them is because 
the threat of a cyber-attack is stronger than a physical attack.

A parallel email system implemented with the same software technology 
used in today's internet would provide no increase in protection from 
a committed attacker. None of the amateur protocols in use today were 
designed to resist intentional attack. Inspecting these applications 
with static analysis tools would likely reveal long lists of 
vulnerabilities.

*** Agree and I don't propose using current E-Mail software, amateur radio or 
commercial.  One other thing, and I know this is very controversial, but we can 
use encryption for network control and transmission control which the Internet 
as a whole doesn't do...except for VPNs.  And I might mention that there is 
some assumption by Internet gurus that some VPN circuits might well be able to 
withstand a cyber-attack.  I know the VPN that I run for my office use isn't 
even hackable by our network gurus.

The "redundancy from multiple identical systems" approach only works 
when you can deploy so many independent systems that an attacker 
cannot hope to disable them all, and is thus deterred from attacking 
any. This may work with strategic weapons, but no one remotely 
understands how to manage thousands of independent worldwide email 
systems.

*** Well if we have hundreds of independent RF networks that we can "patch 
together" if needed, we may well over come this problem.  I would have to 
disagree with you last statement that "no one remotely understands how to 
manage thousands of independent worldwide email systems." because this some of 
the very "stuff" that some of the ARRL HSMM WG members are talking about and 
that the organizations they work for are actually working on this.  What can be 
done with an ad hoc mesh network scaled down to an HF level I believe is 
workable especially if you are not really mobile.

I do believe there is a role for an RF-based email system that would 
complement the internet's email delivery system by supporting 
portable operation and by standing ready to compensate for local 
outages. The "boil the ocean" approach that you've been advocating 
can only delay the development and deployment of this far more 
practical application.

*** I believe that with forward looking local and regional level HF messaging 
systems (note I didn't say E-Mail), I think if we can't ""boil the ocean", we 
may be able to raise it to a temperature so that the foes don't want to enter 
it.

*** 73 for today (and the week) and CU Monday. -- Walt/K5YFW

   73,

      Dave, AA6YQ


--- In digitalradio@yahoogroups.com, "DuBose Walt Civ AETC CONS/LGCA" 
<[EMAIL PROTECTED]> wrote:
>
> $$$ Comments to comments.... Hi Hi.
> 
> Walt/K5YFW
> [EMAIL PROTECTED]
> 
> -----Original Message-----
> From: digitalradio@yahoogroups.com 
[mailto:[EMAIL PROTECTED]
> Sent: Thursday, August 24, 2006 12:06 PM
> To: digitalradio@yahoogroups.com
> Subject: [digitalradio] Re: PC-ALE Signal Detect Before 
Transmitting: An
> Experiment
> 
> 
> *** new AA6YQ comments below
> 
> --- In digitalradio@yahoogroups.com, "DuBose Walt Civ AETC 
CONS/LGCA" 
> <walt.dubose@> wrote:
> 
> >snip<
> 
> >>>Walt, what would make an HF-based system constucted by amateurs 
> invulnerable to cyber-attack? 
> 
> ### If you are NOT connected to the Internet and don't use 100% 
> Internet protocols, it would be almost impossible to attack the 
> network except at the RF level and if that is done 1) you and you 
> enemy lose use of the frequency and 2) you can be DFed and 
> your "jamming station/site" be "taken out."
> 
> ***Two comments:
> 
> 1. If you have new protocols that are invulnerable to cyber-attack, 
> it would be much more practical to deploy these on the existing 
> internet than to construct a backup network. 
> 
> $$$ I'm not talking about new protocols.  A cyber-attack on the 
Internet comes over a hard connection that everyone with Internet 
connectivity has access to.  
> 
> $$$ Using RF and non-internet protocols, specifically the Ethernet 
protocol(s) then you limit first the access to the network initially 
to those individuals who are already using HF data modes and then to 
those who will start using that method of communications...friend or 
foe.
> 
> $$$ Remember cyber-space is not RF.  We cannot run RF over an "hard 
wire" Internet network...RF just doesn't run on DSL, cable, WiFi like 
it does on HF using an antenna.  If you run Pactor III on 13cm it 
doesn't mean that a WiFi signal can "copy" your signal any more than 
a Pactor III modem connected to a 13cm receiver can copy a WiFi 
signal.
> 
> $$$ I suppose you could call Pactor III or MT63, etc. a protocol; 
but again, they don't run on the same media as the Internet.
> 
> $$$ Therefore use of RF (HF) data modes on a network that is not 
connected by any media to the Internet isolates it from current cyber-
attacks.  You must first build a message system and operate it before 
someone can attack it...and then they must be able to attack it with 
a high degree of anonymity.
> 
> 2. If it were possible to pinpoint the source of a cyber-attack in 
> realtime, the internet's routers could dump packets from that 
source  
> into the bit bucket. The problem is that attack payloads are very 
> difficult to distinguish from valid payloads. The use of RF links 
in 
> no way simplifies this problem, and could well make it harder.
> 
> $$$ Again you have missed the point.  The proposed system (as you 
call it) is NOT associated with or connected to the Internet by any 
media.   You can plug you RJ-45 Ethernet plug into my IC-746 mic jack 
all you want but it isn't going to modulate the rig.  If I don't 
connect my amateur radio station to the Internet, nothing on the 
Internet is going to hurt my transmissions.  I have eliminated 
anything on the Internet from "my" network.
> 
> >snip<
> 
> >>>Several times in this thread, I have agreed that overcoming 
local 
> internet outages would be a reasonable objective. Its your 
> insistence that we must cover for the loss of the entire internet 
> that remains completely unjustified.
> 
> ### No insistance that we must do anything.  I am only saying that 
it 
> is very possible according to "experts" that the Internet could be 
> attacked at the software level and rendered inoperatable.  Then 
> providing local Internet capability is of no great use if the local 
> area does not have connectivity outside the local area.  
> 
> ***Your proposed solution -- an independent message passing network 
> based on HF links -- would be every bit as vulnerable as the 
current 
> internet, as I've pointed out above. What attacker would be foolish 
> enough to reveal itself by bringing down the internet but leave its 
> backup running? We're not talking script kiddies here, Walt.
> 
> 
> $$$ Again you are missing the point...the network has NO connection 
to the Internet.  The Internet is irrelevant..  Nothing on the 
Internet affects the radio network.  Is that so hard to understand?
> 
> ### Local law enforcement and governments might not be able to 
> contact their state counterpart and states might no be able to 
> contact the federal government.  And in many cases, local 
governments 
> and law enforcement need contact at the federal level.  Thus there 
is 
> a need for the local area to connect to the entire Internet.  If 
the 
> Internet does not exist, how do a local area connect to the state 
of 
> federal government?
> 
> ***That's a fine question, Walt, but your proposed solution does 
not 
> answer it. If attackers bring down the internet, they will also 
bring 
> down its backup.
> 
> $$$ I don't see how that an attack on the Internet could possibly 
bring down the proposed network if the two are NOT connected in any 
way?  They could of course but the likely hood is not likely because 
as you say the "packets" that  cause the problem to the Internet 
resemble normal Internet packets.  We do not and should not and 
probably would not have the same packet structure as the Internet 
thus the bad guys would have to attack the Internet as well as the 
radio network with two different attacks and I don't see them making 
stealthier enough packets to do that on an RF network.
> 
> >snip<
> 
> >>>So are you suggesting that this amateur-built HF world-wide 
> messaging system should not employ software?
> 
> ### Not at all.  I am saying that it is the software that is 
attacked 
> not the hardware.  And that the software is attacked because it is 
> running on the Internet.  
> 
> ***The software on your proposed backup network would be equally 
> vulnerable to attack. RF links have no magical ability to separate 
> attack payloads from valid payloads.
> 
> Sure, any software is subject to compromise/attack, even smoke 
signal.  But if you are poised for a naval attack and you are 
attacked by air, then you have a real problem.  It works the same why 
here in reverse.  If know we are going to be attacked air, we defend 
by air and send our troops/warships out.  Then the enemy must defend 
itself against air and naval attack.  Military tactics 101.
> 
> 
> ### Speaking of hardware, if you are aware of the public documents 
on 
> the Internet that show the physical location of major backbone 
> hubs...physical connections, then you would realize that 21 well 
> placed and well times explosive events (attacks) on those physical 
> locations could disconnect the Internet for several days, perhaps 
> weeks, until the connections could be rerouted.
> 
> ***Yes. It would be far more practical and less expensive to 
mitigate 
> this risk by replicating these installations -- perhaps in hardened 
> sites -- than to assemble an HF-based backup network. Doing so 
would 
> would have the side benefit of increasing overall internet 
capacity; 
> in contrast, why would anyone use your proposed backup network if 
the 
> internet was running?
> 
> $$$ Perhaps so but it still required you to "harden" your 
software...and that is where the attack will most likely be as there 
is less of a risk factor to those who are attacking.
> 
> >snip<
> 
> >>>I agree that there's cause for concern, but I don't see how the 
> approach you're suggestion would come anywhere close to addressing 
> this problem.
> 
> ### It approaches the problem in that it can be a small part of the 
> solution.  THe DHS had envisioned using an amateur radio national 
> messaging system for delivery of critical loss of life and 
properity 
> messages to various NGOs (non-govermental organizations).  Where 
> information from one remote Zipcode could be delivered to another 
> Zipcode (large area not specifically individual Zipcodes) and then 
> the USPS would deliver the messages.
> 
> ***So in 24 hours, Walt, your rationale for a concerted effort to 
> build a worldwide HF message-passing system has gone from
> 
> "because we CAN do it"
> 
> to
> 
> "this will provide backup message-passing in the event of a cyber-
> attack that brings down the entire internet"
> 
> to
> 
> "it can be a small part of the solution".
> 
> If you're having trouble getting developers excited about this 
> mission, it should be obvious why.
> 
> $$$ My original position, NO not my position or plan, but that of 
DHS is/was to have amateur radio operators to take some of the 
messaging burden of messaging handling and my proposal for an HF data 
network long precedes my two year subscription to this reflector.
> 
> Walt/K5YFW







Need a Digital mode QSO? Connect to  Telnet://cluster.dynalias.org

Other areas of interest:

The MixW Reflector : http://groups.yahoo.com/group/themixwgroup/
DigiPol: http://groups.yahoo.com/group/Digipol  (band plan policy discussion)

 
Yahoo! Groups Links



 





Need a Digital mode QSO? Connect to  Telnet://cluster.dynalias.org

Other areas of interest:

The MixW Reflector : http://groups.yahoo.com/group/themixwgroup/
DigiPol: http://groups.yahoo.com/group/Digipol  (band plan policy discussion)

 
Yahoo! Groups Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/digitalradio/

<*> To unsubscribe from this group, send an email to:
    [EMAIL PROTECTED]

<*> Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/
 



Reply via email to