[funsec] Transit of venus safety tip

2012-06-05 Thread Robert Slade
Many people around the world are hoping for clear skies to view the transit of 
Venus across the face of the sun, an event which will not occur again for more 
than a century. [1]

However, public safety officials are concerned that people may endanger their 
eyes by looking directly at the sun without eye protection.  Not only will they 
not be able to see any indications of the transit, but this can, of course, 
burn the retina of the eye, causing permanent damage, and possibly complete 
blindness.

However, I have confirmed that ordinary sunglasses are sufficient protection, 
as long as used correctly.

And the great thing is, this works no matter what "Venus transit" webcam you 
view, and no matter how brightly you have your monitor cranked up.


(In the spring, generally we would have at least some clear skies for viewing.  
However, typically Vancouver, it's pretty much completely overcast here for the 
entire run of the transit.)


[1] It's rather interesting that the transits occur in pairs, eight years 
apart, and then more than a century between the eight year pairs.

== 
rsl...@computercrime.org  sl...@victoria.tc.ca  rsl...@vcn.bc.ca
"If you do buy a computer, don't turn it on." - Richards' 2nd Law
= for back issues:
[Base URL] site http://victoria.tc.ca/techrev/
CISSP refs: [Base URL]mnbksccd.htm
Security Dict.: [Base URL]secgloss.htm
Book reviews:   [Base URL]mnbk.htm
    [Base URL]review.htm
Partial/recent: http://groups.yahoo.com/group/techbooks/
Review mailing list: send mail to techbooks-subscr...@egroups.com
http://blogs.securiteam.com/index.php/archives/author/p1/
http://blog.isc2.org/isc2_blog/slade/index.html http://twitter.com/rslade



___
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.


Re: [funsec] Obama Order Sped Up Wave of Cyberattacks Against Iran

2012-06-05 Thread Robert Slade
From: valdis.kletni...@vt.edu
Date: Tuesday, June 5, 2012 12:47 pm

> Also, a move of 10% of the navy over the next 8 years doesn't
> translate to "imminent".


You're thinking in the wrong time-frame: switch to "as fast as governmentally 
possible."

In that perspective, 8 years is "blindingly fast."

== 
rsl...@computercrime.org  sl...@victoria.tc.ca  rsl...@vcn.bc.ca
"If you do buy a computer, don't turn it on." - Richards' 2nd Law
= for back issues:
[Base URL] site http://victoria.tc.ca/techrev/
CISSP refs: [Base URL]mnbksccd.htm
Security Dict.: [Base URL]secgloss.htm
Book reviews:   [Base URL]mnbk.htm
    [Base URL]review.htm
Partial/recent: http://groups.yahoo.com/group/techbooks/
Review mailing list: send mail to techbooks-subscr...@egroups.com
http://blogs.securiteam.com/index.php/archives/author/p1/
http://blog.isc2.org/isc2_blog/slade/index.html http://twitter.com/rslade



___
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.


[funsec] Flaming certs

2012-06-05 Thread Robert Slade
Today is Tuesday for me, but it's not "second Tuesday," so it shouldn't be 
patch Tuesday.  But today my little netbook, which is set just to inform me 
when updates are available, informed me that it had updated, but I needed to 
reboot to complete the task, and, if I didn't do anything in the next little 
while it was going to reboot anyway.

Yesterday, of course, wasn't patch Tuesday, but all my machines set to "go 
ahead and update" all wanted to update on shutdown last night.

This is, of course, because of Flame (aka Flamer, aka sKyWIper) has an 
"infection" module that messes with Windows/Microsoft Update.  As I understand 
it, there is some weakness in the update process itself, but the major problem 
is that Flame "contains" and uses a fake Microsoft digital certificate.

You can get some, but not very much, information about this from Microsoft's 
Security Response Center blog:
http://blogs.technet.com/b/msrc/
http://blogs.technet.com/b/msrc/archive/2012/06/03/microsoft-releases-security-advisory-2718704.aspx
http://blogs.technet.com/b/msrc/archive/2012/06/04/security-advisory-2718704-update-to-phased-mitigation-strategy.aspx

You can get more detailed information from F-Secure: 
http://www.f-secure.com/weblog/archives/2377.html

It's easy to see that Microsoft is extremely concerned about this situation.  
Not necessarily because of Flame: Flame uses pretty old technology, only 
targets a select subset of systems, and doesn't even run on Win7 64-bit.  But 
the fake cert could be a major issue.  Once that cert is out in the open it can 
be used not only for Windows Update, but for "validating" all kinds of malware. 
 And, even though Flame only targets certain systems, and seems to be limited 
in geographic extent, I have pretty much no confidence at all that the blackhat 
community hasn't already got copies of it.  (The cert doesn't necessarily 
*have* to be contained in the Flame codebase, but the structure of the attack 
seems to imply that it is.)  So, the only safe bet is that the cert is "in the 
wild," and can be used at any time.

(Just before I go on with this, I might say that the authors of Flame, whoever 
they may be, did no particularly bad thing in packaging up a bunch of old 
trojans into one massive kit.  But putting that fake cert out there was simply 
asking for trouble, and it's kind of amazing that it hasn't been used in an 
attack beofre now.)

The first thing Microsoft is doing is patching MS software so that it doesn't 
trust that particular cert.  They aren't giving away a lot of detail, but I 
imagine that much midnight oil is being burned in Redmond redoing the 
validation process so that a fake cert is harder to use.  Stay tuned to your 
Windows Update channel for further developments.

However, in all of this, one has to wonder where the fake cert came from.  It 
is, of course, always possible to simply brute force a digital signature, 
particularly if you have a ton of validated MS software, and a supercomputer 
(or a huge botnet), and mount a birthday (collision) attack.  (And everyone is 
assuming that the authors of Flame have access to the resources of a 
nation-state.  Or two ...)  Now the easier way is simply to walk into the cert 
authority and ask for a couple of Microsoft certs.  (Which someone did one 
time.  And got away with it.)

But then, I was thinking.  In the not too distant past, we had a whole bunch of 
APT attacks (APT being an acronym standing for "we were lazy about our 
security, but it really isn't our fault because these attackers didn't play 
fair!") on cert authorities.  And the attacks got away with a bunch of valid 
certs.

OK, we think Flame is possibly as much a five years in the wild, and almost 
certainly two years.  But it is also likely that there were updates during the 
period in the wild, so it's hard to say, right off the top, which parts of it 
were out there for how long.

And I just kind of wonder ...

== 
rsl...@computercrime.org  sl...@victoria.tc.ca  rsl...@vcn.bc.ca
"If you do buy a computer, don't turn it on." - Richards' 2nd Law
= for back issues:
[Base URL] site http://victoria.tc.ca/techrev/
CISSP refs: [Base URL]mnbksccd.htm
Security Dict.: [Base URL]secgloss.htm
Book reviews:   [Base URL]mnbk.htm
    [Base URL]review.htm
Partial/recent: http://groups.yahoo.com/group/techbooks/
Review mailing list: send mail to techbooks-subscr...@egroups.com
http://blogs.securiteam.com/index.php/archives/author/p1/
http://blog.isc2.org/isc2_blog/slade/index.html http://twitter.com/rslade



___
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.


Re: [funsec] [Full-disclosure] Obama Order Sped Up Wave of Cyberattacks Against Iran

2012-06-05 Thread valdis . kletnieks
On Tue, 05 Jun 2012 16:20:04 -0300, "Marcio B. Jr." said:
>  really matters, that is, an imminent *real* war against China:

> http://www.bbc.co.uk/news/world-us-canada-18305750

One could equally well read that as "We're fed up and about to
pound North Korea even further back into the Stone Age".

Also, a move of 10% of the navy over the next 8 years doesn't
translate to "imminent".


pgpIJfKTw6GzX.pgp
Description: PGP signature
___
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.