Bruce Schneier comments the CA system is broken.
Category: Security & Privacy
-
The magical security unicorn.
The purpose of security software is to make other software more secure. This is what the security industry claims, sometime with legit arguments, sometime the industry tries to chase unrealistic ideals, as a recently linked article suggest.
And I couldn’t agree more. The security industry approaches the problem from the wrong end, most of the time. With keeping in mind the principles of security, Integrity, Availability and Authenticity, security software helps mitigate threats in the class of Vulnerabilities, Exploits and malicious software and payloads. Products available to purchase can be considered in classes of, Encryption (Integrity and Authenticity), for data in rest (disk encryption, file encryption) or for data in transit (VPN or protocol encryption). Backup is clearly saving Availability, but most companies in the security industry consider this a different topic. Then there are products to limit access, e.g. Network Layer Firewalls, which have a very distinct functionality. Up to here, things are very clear and deterministic. When it comes to Application Layer Firewalling, e.g. Web Application Firewalls things start to get fuzzy.
Products that aim to protect from any unknown threat, malware or payload, like Anti Virus, Anti Spam, Intrustion Prevention and even Vulnerability Scanners, provide information that is know already.
Now that a particular exploit is know, protection for it can be provided in two distinct locations: the vulnerable software can be patched to remove the problem. Or, what the security industry offers, have another piece of software in place that tries to protect from something that is known already. And with that, raising system complexity and opening another vector for vulnerability.
The sustainable approach is to invest in secure software and architecture, that has built in encryption, authentication and redundancy. This is something the security industry can provide as technology vendors, rather than chasing the magical unicorn.
-
Analysis of the GitHub DDoS.
NETRESEC took a closer look at the long lasting DDoS attacks on github.com. One of the few instances of this type of attack that even made it to mainstream media.
The article finds random web browsers from outside China are tricked into reloading two particular pages on github.com. Apparently, this happens by manipulating requests coming from users physically outside China to services in country hosted content at the border infrastructure.This is another example of why encryption is a good thing. General usage of SSL/TLS will prevent passive filtering infrastructure from manipulating traffic, and prevent such problems.
-
Europol chief warns on computer encryption.
Europol chief warns on computer encryption.
And No more cubes warns on Europol chief.
-
Github Under JS-Based "Greatfire" DDoS Attack, Allegedly From Chinese Government
Github is under attack from the Chinese Government, Slashdot writes.
via Github Under JS-Based “Greatfire” DDoS Attack, Allegedly From Chinese Government – Slashdot.
-
Rouge CAs and certificate pinning.
A intermediate CA, held by MSC Holdings, issued by CNNIC, the Chinese NIC, apparently issued certificates for unauthorized domains. The problem was detected by Google for their domains through pinned certificates in their browser.
Google Online Security Blog: Maintaining digital certificate security.
-
The issue with Crypto.
Encrypted email is still not popular, because this is so embarrassing:
-
Exploiting the DRAM rowhammer bug to gain kernel privileges
For the sake of having this here. Manipulating bits in memory is a big deal in multi-tenant virtualized and cloud environments, aka public cloud. Unfortunately this is a hardware issue and not something that a software patch will solve. Only new physical deployments can solve that problem. So rowhammer will be a nightmare for a while…
via Project Zero: Exploiting the DRAM rowhammer bug to gain kernel privileges.
-
Check if you trust the Superfish CA
Filippo Valsorda wrote a test to check whether your PC is vulnerable through the Superfish Malware, that Lenovo decided to preinstall on it’s devices.
Check here if you trust the Superfish CA.