Re: [cta@hcsin.net: Re: CNN: 'Explores Possibility that Power Outage is Related to Internet Worm']

2003-08-17 Thread Sunder
As you probably know by now, there was no lightnight strike and the
failure did not start at Nigara.

As for our city's reptile of a Mayor he claimed power would be back on in
queens by 11pm.  It wasn't on until 6am Friday.  On Friday night there
were still areas that were down in lower Manhattan.

Certainly, I'd expect whatever FUD explanation to be most profitable to
the NeoCONS to be the eventual reason for the outage, so they can push
USPATRIOT V3.0.1 - the one where they add brown alert to the color scheme.


Of course CON-Ed would say "Blame Canada."  I expect nothing less.

Did anyone catch the Shrubbya interview? I think it was on CNNFN or MSNBC
or one of those neonews channels...  The one where he was busy sweating in
the sun's heat in his blue Armani dress shirt while, his face browned from
the sun, playing golf.  The one where he regurgitated what he had been
spoon fed by his PR guys?  At one instant he shrugged his shoulders as he
said it's an old grid, and it will need to be fixed, and then he went back
to golfing.  Showing how much he cares about the plight of the east coast.



More than likely I suspect the truth is that the grid is indeed outdated
and something simply couldn't handle the load.  Whenever politicians, and
bureaucrats are involved, the outcome is the same:


Chief Executive Asshole: "Why should we spend $X million to fix it?  It's
still running?"

Techie: "Because it's running at 95% capacity, and any small spike will
cause a big problem."

CEA: "But it's been fine for the last 20 years, I'd rather keep the cash
and give myself a bonus, and then lay off extraneous employees.  We can
outsource them to India."

Techie: "It's outdated, it will collapse."

CEA: "So what? When it does, if it does, we'll hit Uncle Sam for more
money, meanwhile I have another yacht to purchase.  In any case, it won't
likely collapse while I'm still here, and I'll retire soon enough, not my
problem... and don't let the door hit your ass on your way out.  I don't
want ass prints on my brand new gold plated door."





--Kaos-Keraunos-Kybernetos---
 + ^ + :25Kliters anthrax, 38K liters botulinum toxin, 500 tons of   /|\
  \|/  :sarin, mustard and VX gas, mobile bio-weapons labs, nukular /\|/\
<--*-->:weapons.. Reasons for war on Iraq - GWB 2003-01-28 speech.  \/|\/
  /|\  :Found to date: 0.  Cost of war: $800,000,000,000 USD.\|/
 + v + :   The look on Sadam's face - priceless!   
[EMAIL PROTECTED] http://www.sunder.net 

On Fri, 15 Aug 2003, John Young wrote:

> Are you suggesting the outage was caused by carbon filaments rocketed
> across transmission lines? If that was done at several points in the grid it 
> would account for the various finger-pointing to incidents which are claimed
> to have started the usual-suspect "cascade" of the usual-suspect "antiquated" 
> system that was "not supposed to fail but it did."



Re: Viral DNS Attack, DDos Idea

2003-08-17 Thread Tim May
On Sunday, August 17, 2003, at 08:19  AM, Major Variola (ret) wrote:
Evolved diseases don't kill their hosts.  Google is too useful
to redirect.  On the other hand, you can redirect an entire
TLD (eg .mil), albeit on one machine at a time. Try doing that
to one of The DNS Roots (pbut).
Many evolved diseases _DO_ kill their hosts. Look around.

It is true that there are tradeoffs in lethality, time to death, and 
virulence, and that a disease which kills too quickly and too many 
won't spread adequately, but quite clearly all of the diseases of the 
past were evolved (until recently, none were created) and yet they 
often killed their hosts.

--Tim May
"In the beginning of a change the patriot is a scarce man, and brave, 
and hated and scorned. When his cause succeeds, the timid join him, for 
then it costs nothing to be a patriot." -- Mark Twain



Re: Viral DNS Attack, DDos Idea

2003-08-17 Thread Major Variola (ret)
At 05:46 PM 8/15/03 -0700, Bill Stewart wrote:
>At 01:19 PM 08/15/2003 -0700, Major Variola (ret.) wrote:
>>Suppose malware appends a bogus entry to an infected machine's
>>/etc/hosts (or more likely, MSwindows' \windows\blahblah\hosts file).
>>(This constitutes a DNS attack on the appended domain name, exploiting

>>the local hosts' name-resolution prioritization.)
>>If the appended IP address points to the
>>same victim (66.66.66.66) on all the virus-infected machines,
>>and the appended (redirected) domain name is popular ("google.com"
>
>Cute, but sounds like a lot of work compared to other obvious attacks
>you could do if you're spreading a virus anyway.

Yes if you have virally owned a machine you can do much nastier.
But this attack has the advantage that its effects would not be
immediately recognized, nor could they be fixed in one spot
once detected.

Evolved diseases don't kill their hosts.  Google is too useful
to redirect.  On the other hand, you can redirect an entire
TLD (eg .mil), albeit on one machine at a time. Try doing that
to one of The DNS Roots (pbut).

>The more popular version of this attack is to try to hack DNS servers,
>or poison DNS requests, so that DNS requests for google report the
wrong thing.

Yes I've followed discussions about SecDNS etc before.

The cute part of the local hostsfile attack is that local machines
are *not* administered competently, whereas DNS servers
(and even ISP caches) are more likely tended better.

>One problem with hacking the hosts files is that
>different versions of Windows tend to put them in different places,
>though perhaps if you target XP and 2000 and ME and 98
>it's consistent enough to work.

OS detection is trivial once in.. as is file/path detection.  I bet a
javascript
program could do it, if the client security settings (ACLs) were poor.

>The real question is whether the bad guys would redirect to a victim,
>or to a fake web server run by them, so they could hand out
>bogus responses, such as redirects to various places around the web,
>potentially along with some advertising banners.

That's the virus author's choice, of course.  In fact, I first thought
of
the attack as a DNS-redirect on domain names ---intending on random
(or even localhost) misdirection.  Upon thinking about it, the
utility of all those 9AM Monday clicks became apparent.

Diagnosing the situation would be a bushel of fun in the first hours
either way.

>If it's a virtual server machine, though, you can't do that
>without disrupting all the clients on it, which is too bad;

Hadn't thought of virtual servers... "all your eggs in one basket" :-)

>If it's a router, that's a more interesting problem,

You're right, routers merely drop port 80 incoming,
any router DoS depends on sheer bandwidth --say
routing the NYTimes.com clicks to Podunk-BackwaterTimes.com

>because many routers have wimpy CPUs and do the routine work in ASICs -

ASICs are great except for exception handling, which is a vulnerability.

I was working on Intel's network processors earlier
this year.  Amazing chips--they have hardware support for everything you

do in an IP stack, buttloads of memory controllers, I/O up the kazoo,
and a dozen hardware-supported
thread contexts (hyperthreading) on each of a dozen high-clockrate RISC
engines.
But they all defer exception packet processing to the onboard ARM, which
might
alert the host system or at least log the exception by incrementing a
counter.  But the ARM is not as fast as the threads
and could perhaps be overwhelmed.  Perhaps the subject of a future
Gedanken Design Idea.

-

"When the rotary telephone first came out, people
said, 'You mean I have to dial seven numbers?' "



Re: paradoxes of randomness

2003-08-17 Thread Tim May
On Sunday, August 17, 2003, at 03:19  AM, Sarad AV wrote:

hi,

Okay- I need 5 bits to represent 32 coins.I count as
coin 0,coin 1,... coin 31.
If it is a perfectly random fair coin throwing
experiment,then 50 percent of them will be heads.
So I know that 16 of them will be heads.
I hope you are not saying that you think there will always be 16 heads 
and 16 tails!

Your comment below seems to suggest you think this is so. If so, you 
need to spend a lot of time thinking about probability.
What we do is i simply place all the 32 coins on the
table in a row or column.
I look at the first coin and determine if it is a head
or a tail. I repeat the same proccess till i count 16
heads. If I count 15 heads at coin 31, then I cant
reduce the entropy. How ever, if i count 16 heads at
coin 30,then I dont have to check that coin 31,I
already know its a tail,so I have less than 5 bits of
entropy.
How does knowing what has already come before tell you that coin 31 is 
a tail without your having to look at it to see?

It certainly sounds to me that you have a very weird, and very wrong, 
concept of probability.

--Tim May
"A democracy cannot exist as a permanent form of government. It can 
only exist until the voters discover that they can vote themselves 
money from the Public Treasury. From that moment on, the majority 
always votes for the candidate promising the most benefits from the 
Public Treasury with the result that a democracy always collapses over 
loose fiscal policy always followed by dictatorship." --Alexander 
Fraser Tyler



reliance that's scary

2003-08-17 Thread Major Variola (ret)
At 10:13 AM 8/16/03 -0400, Roy M. Silvernail wrote:
>
>Security, as Schneier says, is a process.  It's also a mindset, and I
think
>one either has the mindset or he doesn't.  And for those that don't
have it,
>it is *very* difficult to impart.

And you don't get any droid-demonstrable features for all your efforts.
Whereas being able to control  from a network has
gee-whiz sellability.

And the customer has a hard time imagining the attack -how are they
going to find the network, how are they going to guess the password.

I had the pleasure ca 1997 of figuring out how to browser-enable a
multiton
industrial machine (the kind with big red "stop" buttons, rotating
lights on it when it was operating, and stickers showing various forms
of dismemberment possible) once.  A password was the only
access control.  I hope anyone who installed this understood firewalling

and air gapping...

(Meanwhile, my garage door is "protected" merely by the number of
possibilities, 256)



Re: [cta@hcsin.net: Re: CNN: 'Explores Possibility that Power Outage is Related to Internet Worm']

2003-08-17 Thread Thomas Shaddack
On Fri, 15 Aug 2003, Harmon Seaver wrote:

>Somehow I have difficulty believing the these people could be so totally lame
> as to be running mission-critical stuff like this on windoze. Please say it
> isn't true.

The Microsoft salesmen know the coercive sales tactics. The clients'
well-being isn't in their interest; their interest is only a new sale.
Hence in their world Windows are suitable for just about everything. By
exploiting psychological tricks, they are able to convince less
technically capable personnel (eg, the management) about their system's
alleged superiority. Not that different from eg. car dealers.

A friend some time ago complained about having to ditch a Linux webserver
because his company managers did some special deal with Microsoft which
gave them substantially lower prices if they would run ALL systems
exclusively on Windows. But I forgot the details.

> Is the military also now dependant on windoze?

Some time ago there was a widely publicized incident with Windows NT
controlling a battleship. After a crash the ship had to be towed to the
port. From then it's known that NT is an acronym for Needs Towing.

> Bizarre, absolutely bizarre.

And somehow entirely unsurprising.

> And here I thought it was probably caused by people with potato guns
> firing tennis balls filled with concrete, attached to coils of wire cable,
> dropping them across the power lines and transformer stations.

The cable will vaporize at the moment the lightning from the power line
hits it, or it will be too heavy to be brought up by anything reasonable.
(You don't need even a full contact, getting it to the sparking distance
is enough.) That will trigger the breakers and switch the line off for few
seconds. But then the power will be switched on again. Then you need to
short it the second time. The wire you used will vaporize as well, but the
breakers won't switch back on for the second time, claim an error, and an
inspection of the power line is required to find the shortcut cause before
it can be switched back on, as the electronics then considers the short
circuit to be permanent. (I hope I am right here.) Also be aware about the
danger of the step voltage at the moment the lightning from the power line
hits the ground - you don't want to be anywhere too close, so you will
avoid the potato gun and resort to something safer, eg. a suitable rocket
engine.

In Colombia, the rebels routinely "dark" the cities by blowing up the high
voltage masts. If the mast is in a difficult-to-access place, it can take
days to build a replacement.

There are thousands of miles of power lines, good part of them in less
inhabited areas. It is extremely difficult to prevent this kind of attack.
To add insult to injury, the adversary can get ahold of the map of the
power transmission networks rather easily - they are in all kinds of
sources, from tourist maps to maps for pilots, and one can get fairly good
idea about the power feeds to a city by just driving around it with open
eyes. Underground lines exist, but are more expensive, so they are quite
unusual.

However, I'd bet that this affair was a plain old Murphy-based cascade
failure.


On another note, a nice reading about the world of energetics is Arthur
Hailey's "Overload".



Re: paradoxes of randomness

2003-08-17 Thread Sarad AV
hi,

Okay- I need 5 bits to represent 32 coins.I count as
coin 0,coin 1,... coin 31.
If it is a perfectly random fair coin throwing
experiment,then 50 percent of them will be heads.

So I know that 16 of them will be heads.

What we do is i simply place all the 32 coins on the
table in a row or column.
I look at the first coin and determine if it is a head
or a tail. I repeat the same proccess till i count 16
heads. If I count 15 heads at coin 31, then I cant
reduce the entropy. How ever, if i count 16 heads at
coin 30,then I dont have to check that coin 31,I
already know its a tail,so I have less than 5 bits of
entropy.

So if it is a perfectly random experiment,I wouldn't
get 16 heads before i look at coin 31,which is the
last coin and thats what you said-isn't it?

So how did chaitin get to compress the information
from k instances of the turing machine in

http://www.cs.umaine.edu/~chaitin/summer.html 

under the sub-section redundant?

he says-
"Is this K bits of mathematical information? K
instances of the halting problem will give us K bits
of Turing's number. Are these K bits independent
pieces of information? Well, the answer is no, they
never are. Why not? Because you don't really need to
know K yes/no answers, it's not really K full bits of
information. There's a lot less information. It can be
compressed. Why? "




If the input programs are truely random-there is no
redundancy and thats a contradiction to the claim in
the paper.

Thanks.

Regards Sarath.



>It's simple, if I am correct. The redundancy simply
> makes you care
> less about the specific instance you are looking at.
> 
> > To represent 32 coins-i need 5 bits of
> information.
> > Since the experiment is truely random-i know half
> of
> > them will be heads,so in this case using 5 bits of
> > information,i can determine all the coins that are
> > heads and that are tails.
> 
> Same deal, unless you are counting pairs, in which
> case you cannot
> distinguish between the members of a pair. You need
> an extra bit to
> tell a head from a tail.
> 
> > So-the question is what is the minimum number of
> bits
> > or entropy required to determine which all coins
> are
> > heads and which all coins are tails,is it 5 bits
> or 6
> > bits of information?
> 
> With 5 bits, you can count to 31, so you need 6.
> 
> Just my two tails.
> 

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com



Re: paradoxes of randomness

2003-08-17 Thread martin f krafft
also sprach Sarad AV <[EMAIL PROTECTED]> [2003.08.17.1219 +0200]:
> Okay- I need 5 bits to represent 32 coins.I count as
> coin 0,coin 1,... coin 31.

No, you can't count coin 0. Or how will you represent no coins?

I would appreciate if you wouldn't simply include the quoted message
in your reply. Either reply in its context, or delete it altogether.

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^."<*>"|tr "<*> mailto:"; [EMAIL PROTECTED]
 
invalid/expired pgp subkeys? use subkeys.pgp.net as keyserver!
 
"i have smoked pot. it is a stupid business, like masturbation."
 -- thomas pynchon (v)


pgp0.pgp
Description: PGP signature