Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

The one thing I've learned in the Network Security Business is----

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » General Discussion Donate to DU
 
trumad Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Sep-28-11 03:19 PM
Original message
The one thing I've learned in the Network Security Business is----
Edited on Wed Sep-28-11 03:23 PM by trumad
anything---and I mean anything, can eventually be hacked.

Diebold security is easy pickings for serious hackers.

I fully expect a show of force from hacktivists in the upcoming election.

Game on.

On edit: Folks are freaking that the 2012 election will be stolen by the Repubs.

I'm not so sure of that----if I were the Repubs, I'd be just as worried.
Printer Friendly | Permalink |  | Top
sam11111 Donating Member (638 posts) Send PM | Profile | Ignore Wed Sep-28-11 03:37 PM
Response to Original message
1. "backbone" level: why arent firewalls etc put on the backbones? expensive firewals from MIT and gov
Edited on Wed Sep-28-11 03:42 PM by sam11111
agencies could be put there as only a few wd be needed. Expensive ones would do much better job than norton, trendmicro etc.

I'm talking ten million dollar firewalls with thirty engineer staffs 24/7.

Do any other nations do anything like that?
Printer Friendly | Permalink |  | Top
 
trumad Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Sep-28-11 03:39 PM
Response to Reply #1
2. That's what makes it so easy...
the lack of protocol is alarming.
Printer Friendly | Permalink |  | Top
 
sam11111 Donating Member (638 posts) Send PM | Profile | Ignore Wed Sep-28-11 03:46 PM
Response to Reply #2
6. trumad....could they be on backbones? any nation doing it? tks nt
N
Printer Friendly | Permalink |  | Top
 
Llewlladdwr Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Sep-28-11 03:53 PM
Response to Reply #1
9. What do you mean by "the backbones"?
and how would firewalls placed there help?
Printer Friendly | Permalink |  | Top
 
sam11111 Donating Member (638 posts) Send PM | Profile | Ignore Wed Sep-28-11 04:24 PM
Response to Reply #9
15. hi...Bkbns are main pipes of the net. Much cheaper to put one $ ten million
ultra security Suite from MIT there,

than put such a s. S. on all of folks home laptops.

All the viruses that now get thru ur Norton wd be stopped at the bkbne.
Printer Friendly | Permalink |  | Top
 
Recursion Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Sep-28-11 03:54 PM
Response to Reply #1
10. Firewalls don't actually do all that much
The underlying protocol is either secure or not. If I don't trust somebody to secure a server, I don't trust him to secure the firewall in front of it either. (And why is it listening on ports you don't let through the firewall, anyways?)
Printer Friendly | Permalink |  | Top
 
sam11111 Donating Member (638 posts) Send PM | Profile | Ignore Wed Sep-28-11 04:02 PM
Response to Reply #10
12. Entire Security Suite + undrlyg Protocols on backbone is my meaning
Edited on Wed Sep-28-11 04:10 PM by sam11111
Whatever Norton does on ur laptop, I say

Shd be souped up and located on the few backbones

So the eighty million we small folk spend on Norton

SHOULD be...instead... Twenty million spent..total spent... for three ultra muscular firewalls from MIT
Paid for by backbone administrators or government.
Any nations do that?

Is corporate greed by Norton to blame for todays stupid model?
Printer Friendly | Permalink |  | Top
 
DisgustipatedinCA Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Sep-28-11 05:10 PM
Response to Reply #12
19. the answer to your question is: you can't write proper ACLs for such a firewall
Yes, firewalls can be made that operate at near-wire speed, and it's conceivable that you could put one in-line at the major peering points. But firewalls permit and deny traffic. In order to permit or deny traffic, you have to write rules. In Cisco-ese, these rules are in the form of what's called Access Control Lists. They'll say something like:
Permit the address 216.248.201.1 to get to the address 16.42.189.33 on port 80.
OK, that statement (revised into English for this thread) would permit one machine to attach to one other machine on a certain port (happens to be the www port, in this case, so the destination would be a webserver).

After this statement, everything else is denied. So no other address would be permitted to get to 16.42.189.33 on port 80. You could, of course, permit ALL traffic to get to that address on port 80, which is very likely what would be done on a firewall sitting close to that webserver (as opposed to a "backbone" firewall). In order to maintain an access list like this, you'd need to have the Verizon's and AT&T's of the world revising access lists millions of times per day. Incidentally, we'd be dealing with access lists larger than any ever written. This would also go a long way toward defeating the principle of net neutrality. The carriers are supposed to just open up and let the traffic through. What you're suggesting would give a lot of extra power to the principal ISP's in the US. AT&T, for example, could decide that they don't like an article written about their attempted merger with T-Mobile. Just access list that site, and no one will ever see it.

Anyway, in general terms, you want the firewall as close to the resources being protected as is feasible.
Printer Friendly | Permalink |  | Top
 
sam11111 Donating Member (638 posts) Send PM | Profile | Ignore Wed Sep-28-11 05:43 PM
Response to Reply #19
21. So..a Security Suite (firewall was my inept shorthnd for S.S.)cant be on Bkbne because it slows traf
traffic?

The long ACL problem is unclear...if I am only positing a watchout list identical to what Norton puts on my laptop in current practice arrangements...

Then the w. list shd be do-able. It wd not be custom to the end user and so need not be unique nor changing oft daily. Just containing the url's of hackers and the codes of malware.

True?

Appreciate your time on this!
Sam

Printer Friendly | Permalink |  | Top
 
DisgustipatedinCA Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Sep-28-11 07:11 PM
Response to Reply #21
29. Sorry...my answer was a little disjointed
I had just been saying that a firewall sitting on the backbone(s) of the Internet would be unwieldy, and would be in constant need of change, and that would be tough to do with something so large and constantly-changing.

As to the wider security suite, if I correctly understand what you're saying, I think it would slow traffic down a great deal. That is, there are definable bad things out there that could be mitigated at centralized points. In a corporate network, the kind of device that does this work is called an Intrusion Prevention System (IPS). IPS systems are sometimes built into firewalls, and sometimes they're standalone devices. These devices have to inspect traffic going through, and they have to do a pretty deep inspection inside of each packet to see what it contains and whether or not something malicious is inside the packet (packet being a small unit of data sent from one computer to another. this post I'm typing will take a few packets worth of data to get from my PC to DU's webserver). Inspecting each of these packets takes much more time than the inspection that a standard firewall performs (for those in the industry, I'm referring to Layer 3-4 inspection on a standard FW, vs. L7 for IPS).

The overarching idea behind Internet backbone connections is speed, speed, and more speed. Slowing traffic down is highly undesirable. Some of the WAN switches (the devices that move traffic over the backbone) cost a million plus dollars, and a great deal of that money goes toward making the device as fast as possible, as close to "wire speed" as possible. Doing intrusion prevention at this level would be very costly, but more importantly, I think it would significantly slow traffic in the very place where it needs to be the fastest.

One more footnote: by the same token that one person's terrorist is another person's freedom fighter, not all "malicious" traffic is malicious in all cases. What may be an abnormality on your system, and therefore a possible security threat, might be desirable or even required for my system to run. True, there are some exploits and signatures out there that are all bad all the time, no good use for them. But there are some traffic patterns that look like exploits, or possible exploits, that are actually valid traffic. This is another reason to get as close to the bone as possible, and as specific as possible, when tailoring a security suite, or intrusion prevention, for your particular environment.

For what it's worth, I think your question is a good one, and it's the kind of thinking that can lead carriers to revise their "best practices".

Thanks.
Printer Friendly | Permalink |  | Top
 
SpiralHawk Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Sep-28-11 03:40 PM
Response to Original message
3. Game on indeed
The winner will be the one with the most hactivists at work...
Printer Friendly | Permalink |  | Top
 
trumad Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Sep-28-11 03:41 PM
Response to Reply #3
4. There gonna do it just to do it...
It will be more of a game than political.

Tom Hartman cracked me up by wondering if Lady Gaga will win the presidency.
Printer Friendly | Permalink |  | Top
 
sinkingfeeling Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Sep-28-11 03:41 PM
Response to Original message
5. It really might help us get rid of the machines, if we had an all night back and forth switching of
vote totals. People could then actually 'see' that hackers were messing the vote up.
Printer Friendly | Permalink |  | Top
 
lunatica Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Sep-28-11 03:51 PM
Response to Original message
7. All in a day's work for Anonymous
I'm sure they'll think of it if they haven't already.

Upon second thought maybe they can hack the elections so completely that we won't have any other choice but to go back to paper votes.

Hmmmm...
Printer Friendly | Permalink |  | Top
 
Recursion Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Sep-28-11 03:52 PM
Response to Original message
8. The one thing I learned is that if it has an internet connection, users will view porn on it
But, yeah, yours is probably #2.
Printer Friendly | Permalink |  | Top
 
AndyTiedye Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Sep-28-11 04:01 PM
Response to Original message
11. The Repigs Have Much More Direct Access

x 27 = 270 Electoral Votes
Printer Friendly | Permalink |  | Top
 
sam11111 Donating Member (638 posts) Send PM | Profile | Ignore Wed Sep-28-11 04:14 PM
Response to Original message
13. "all hackable"...in theory why nothing hackproof?
Curious that's all. Not being contrary.
Printer Friendly | Permalink |  | Top
 
jberryhill Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Sep-28-11 04:18 PM
Response to Reply #13
14. Because programmable things are programmable

A machine doesn't know what it is supposed to be doing, so it doesn't know if it is being programmed, repaired, or hacked.
Printer Friendly | Permalink |  | Top
 
sam11111 Donating Member (638 posts) Send PM | Profile | Ignore Wed Sep-28-11 04:29 PM
Response to Reply #14
17. "no change allowed" code wd stop reprogmming? nt
Printer Friendly | Permalink |  | Top
 
saras Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Sep-28-11 05:33 PM
Response to Reply #17
20. No, you hack the "no change" code, or the thing that interprets it.
The more complicated the lock, the greater the odds that you can hack the mechanism of the lock itself. You can't always hack it for $26, but if you can afford modern test equipment, you can hack pretty much any electronics, including military chips designed to be hacker-proof, or to self-destruct if hacked.

Xboxes are a hell of a lot more secure than any of these voting machines, and they've been hacked, repeatedly. Piles and piles of security devices and protocols. All hacked.

And that's not even STARTING to use social engineering, the other half of hacking. Why hack a password when someone will tell it to you? Why reverse-engineer a device when you can talk someone out of a manual, or access to the website where the manual is stored?
Printer Friendly | Permalink |  | Top
 
sam11111 Donating Member (638 posts) Send PM | Profile | Ignore Wed Sep-28-11 05:51 PM
Response to Reply #20
22. TKS! level of abstraction i like was in your first sentence below the title
Can u use that level to answer my "backbone " Q. In re # one ?

Thank you!
Sam
Printer Friendly | Permalink |  | Top
 
YvonneCa Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Sep-28-11 04:25 PM
Response to Reply #13
16. Maybe they wanted them...
...hackable? ;)
Printer Friendly | Permalink |  | Top
 
gateley Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Sep-28-11 04:59 PM
Response to Original message
18. The Republicans can afford better hackers than we can. Just sayin'. nt
Printer Friendly | Permalink |  | Top
 
WinkyDink Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Sep-28-11 05:58 PM
Response to Original message
23. You'd "be just as worried" that Democrats will steal the 2012 election?????
Printer Friendly | Permalink |  | Top
 
deaniac21 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Sep-28-11 06:07 PM
Response to Original message
24. Every election in history has been won according to who counts
the vote. Doesn't matter if paper or electronic.
Printer Friendly | Permalink |  | Top
 
sam11111 Donating Member (638 posts) Send PM | Profile | Ignore Wed Sep-28-11 06:24 PM
Response to Reply #24
25. e. votes easier to steal en mass. Counters.."many eyes watching" fixes that problem
Evote stealing also less visible

Checklist: can u memorize it? Test next friday. LoL

 paper ballots,
hand counted,
precinct level,
many eyes,
election BOARD (never one sec. of state) , and

cash-free-campaigns.

-------------------------

This last point...cfc's: all media are required to give free space to candidates, in proportion to poll strength but with some extra given to small fringe candidates to "level things a bit".

IIRC this was/is done in Holland. Parties not allowed to spend ANY cash on ads. Ends the problem of PAC's and GOP advantage with billionaire cash.

Also; many eyes..I like having not only our people watch the counting but also foreign observers. Would get us some credibility overseas as "responsible adults".

Pls memorize these 6 points
Printer Friendly | Permalink |  | Top
 
deaniac21 Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Sep-30-11 02:22 PM
Response to Reply #25
31. Any electronic transaction leaves a trail to those who are experts
in operating systems, networking and programming.
Printer Friendly | Permalink |  | Top
 
crazyjoe Donating Member (921 posts) Send PM | Profile | Ignore Wed Sep-28-11 06:27 PM
Response to Original message
26. how would you know ahead of time what machines you may
need to hack? what states? what counties? You would need access to virtually thousands and thousands of machines? And you would need an accurate running total, wouldn't you?
You can just hack one machine and put 2 million votes on it.
The whole idea is stupid, it would require a gigantic organization of people, with ip's and passwords, and access, and ....ect.
And of course, of all the thousands of people you would need involved all over the country, not one of them would ever talk, and no concrete proof would ever be found.
Like i said, stupid.
Printer Friendly | Permalink |  | Top
 
sam11111 Donating Member (638 posts) Send PM | Profile | Ignore Wed Sep-28-11 06:55 PM
Response to Reply #26
27. not an expert but seem to recall..."votes tallied at regional levels and then wider level etc
So a secretkeeping group the size of Nixons "plumbers" might do.

Also....small elections doable even with the hurdles u cited.
Printer Friendly | Permalink |  | Top
 
sam11111 Donating Member (638 posts) Send PM | Profile | Ignore Wed Sep-28-11 07:04 PM
Response to Reply #27
28. GOP guys own the big emachine factories. they well may put code in the emachines to add 10% to GOP
Edited on Wed Sep-28-11 07:14 PM by sam11111
Vote totals while subbing that amt from Dems.

OR...OR the diebold makers could remote hack to help GOP. They would know all the IP's.

Emachines an ultra-awful idea. ALL types of vote machines make votetheft easier.

Aren't some Euro nations gone to paper? IIRC canada and France are paper now. ( See my checklist in a reply above. Re: 25 )
Printer Friendly | Permalink |  | Top
 
unc70 Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Sep-30-11 05:27 AM
Response to Original message
30. Not just "eventually" hackable, I now assume already hacked
For most things, "eventually" is measured in years or centuries, but on the internet it might just be a few days or weeks. It is technically impossible to "secure" the internet or any electronic system attached to it. You are only as secure as your least secure, most vulnerable point. Unfortunately, with millions of potential weak points in software, hardware, and people, the web of trust and authentication we all depend on has itself been hacked, no longer trustworthy.

In general, the more secure you think you are, the less secure you really are. There are whole categories of threats most people have never even heard about.

The distinction between clock time and internet time was obvious to most people as soon as the technology became available, but few quite understand that internet time is getting faster and faster. with consequences and changes to our lives coming too rapidly for us to comprehend or to respond. The half lives of any competitive advantages in the marketplace, in security, in product design or features, in productivity, or anything else are becoming shorter and shorter. Competitors must respond quickly to survive, at least by including as the new standard what had been a competitor's advantage. It is a wild ride for everyone and will only get wilder.

For most things, "eventually" is measured in years or centuries, but on the internet it might just be a few days or weeks. We all know that the impossible takes longer, but the inconceivable are what really scare me. To believe something is impossible, even if in error, means that it was thought about and maybe any consequences. We are totally unprepared for the inconceivable.

A series of "inconceivable" security lapses over recent months are very troubling. Hackers gained access to internal networks at RSA and VeriSign, related companies that provide the key technologies for encryption, digital signatures, and authentications. A later hack at DigiNotar resulted in the issuing of fraudulent CAs for microsoft.com, google.com, verisign.com and many others. When combined with DNS cache poisoning to redirect the user to the ip of the imposter site, and with that in place there are lots of ways to escalate the attacks with little risk of detection.

A growing risk comes from hardware devices and components that are pre-hacked when manufactured, assembled, or shipped. While malware on a digital picture frame might be detected by Norton and such, more sophisticated exploits hidden in disk drive firmware, add-on memory, graphics controllers, or even in a cable plug are very difficult to find. Even harder to detect a Trojan inserted during the design of a CPU chip that will be used widely, the Trojan remaining dormant unless it is used in the targeted environment or activated some other way.

I posted a lot several years ago about voting machines, opscan, etc. and why they are technically unsound and operationally a nightmare, and neither can ever meet criteria for security and trustworthiness needed for our elections. Suppose for a moment that by some miracle you have voting machine software that is perfect, flawless implementation, ideal design, bug free, open source, no issues at all. (I did say a miracle.) Even with this miracle, it is not enough.

The issues with ballot design, "programming", validation, testing when dealing with the complexities of special overlay districts (water, schools, municipalities, with multiple combinations all at one polling place), multi-seat contest, straight party with exceptions, instant runoff, initiatives, amendments, ... This requires a significant effort for each election by election officials in every county or district. Testing and validation is a larger effort if done properly. These tasks are roughly the same as those for systems currently in use.

The big problem is ensuring that the machines and all components are secure and remain so. That should begin with chips manufactured in a secure foundry and assembled in secure facilities. For the life of each voting machine, it must be secured and have the equivalent of the chain of custody for evidence. If not, should be grounds for spoiliation of evidence.

The recent Argonne Labs Vulnerability Assessment demonstrates their $10 alien hardware man-in-the-middle hack against Diebold. I think a slightly more complex bit of hardware would make it much easier for people to understand how great the threats really are. Use a cell phone chip for remote control through text messages containing commands like Find text, Replace text, etc. Lets you show people things like changing candidate names while they are "voting", and do it from anywhere.
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Tue Apr 23rd 2024, 04:42 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » General Discussion Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC