* Posts by James R Grinter

172 publicly visible posts • joined 5 Aug 2009

Page:

Security biz KnowBe4 hired fake North Korean techie, who got straight to work ... on evil

James R Grinter

Re: Inside man series

Which is why I was waiting for a sales pitch at the end of the first coverage of this story that I read.

It just seemed a bit too convenient.

NIST turns to IT consultants to clear National Vulnerability Database backlog

James R Grinter

Re: Opensource Security blog post: "Why are vulnerabilities out of control in 2024?"

Yes, but… there are also some signs of vulnerabilities being claimed for what are essentially just bugs (and I’m not referring to the impact of Linux CVEs - https://sigma-star.at/blog/2024/03/linux-kernel-cna/ - maybe the register could dig up some stats for the latter).

Anecdotally, in my own day job, we’ve seen two or three recently filed by a third party (not the software developers), without disclosing to the project, with no attempt at a PoC, and claiming “if you this function incorrect arguments then you get an exception”.

London's famous BT Tower will become a hotel after £275M sale

James R Grinter

Re: revolting restaurant more like

When I visited (2015? It was some anniversary or other, and there was a ballot to get the opportunity to visit and dine there), it was being run by Searcy.

Had a nice lunch, as we were slowly rotated.

Datacenter would spoil beautiful view ... of former industrial waste dump

James R Grinter

Even Beckton Ski Slope (nee Beckton Gas Works) doesn't really look like a ski slope now: these days it’s just the Beckton Alps, again.

Squid games: 35 security holes still unpatched in proxy after 2 years, now public

James R Grinter

In this HTTPS-first world…

What value is anyone still getting out of Squid?

We found it very useful 25+ (time flies…) years ago, but the internet is different now. If I were forward proxying, well, I would be surprised if there were any gains these days from caching. If I were reverse proxying then there are better, more modern technologies.

Huawei's UK tech eviction reportedly caused Sky to fall on mobile customers

James R Grinter

Re: Don't keep repeating a lie

Belkin acquired Linksys off Cisco back in 2013.

https://www.theregister.com/2013/01/25/belkin_buys_linksys/

Long-term support for Linux kernels is about to get a lot shorter

James R Grinter

It’s about Interface stability

Some of us- those who actually write or run applications- benefit from API stability, and (call me old fashioned) ABI stability.

That’s why the “enterprise” distributions are back-porting instead of continuously updating their kernel versions. Because everyone who isn’t just running a kernel for the sake of it wants to actually be doing something else with their computers.

Of course the resources to do that sustaining engineering effort are not trivial, it’s no great surprise some are pulling that work to behind closed doors. It’s just a shame that the options are being reduced just as commercially sponsored ones are disappearing from public access too.

Apple owes Brit iOS app devs millions from excessively high commission, lawsuit claims

James R Grinter

Re: As a small developer

Not to mention developer tools, libraries, operating system updates.

There’s a prevailing attitude (possibly because so much software *is* free at the point of access) that it must cost nothing to provide it.

Which is ironic when application developers are complaining about sharing any of their income with the app store providers.

I would expect to see any “third-party” app stores being obliged to pay royalties to the platform developers/owners, or else the app developers having to agree financial terms with same. Be careful what you wish for, etc.

CAN do attitude: How thieves steal cars using network bus

James R Grinter

Lucky it belonged to someone working in the security field

On the other hand, unlucky that they didn’t already know of the vulnerability.

UNIX co-creator Ken Thompson is a… what user now?

James R Grinter

Re: Not shocked

It acquired its OpenGroup Unix certification in 2007, a mere 6 years after public launch, Mac OS X having little technology in common with Mac OS 9 and earlier.

(though a bit longer than 6 years if you were to include the NeXTStep origins, but I’d argue that would be misleading because a lot of work was done by Apple specifically to be capable of passing the certification. Even then, they never attempted to deny its BSD underpinnings either).

Twitter algorithm to be open sourced 'next week,' says Musk

James R Grinter

Is it the algorithm that we are actually interested in?

Or is it the implicit bias in the training data?

Unix is dead. Long live Unix!

James R Grinter

Re: No "AIX vegans" I presume

Clever people those IBMers. It's easy to spot in any hex output, and if you ever see "0xdeadbeef" in your pointers then you know you've got something wrong.

(Someone has it that it's a play on being 'dead meat' if you end up with a pointer into unallocated memory. But I hadn't heard that before.)

India sets USB-C charging deadline for smartphones

James R Grinter

Standard USB-C cables?

Mine’s the 1m passive Thunderbolt 4 cable that I had to buy when a vendor-included TB-3 2m-ish cable meant the monitor continuously cutting in and out.

(Charging via PD was fine throughout though, so there’s that.)

UK bans Chinese CCTV cameras on 'sensitive' government sites

James R Grinter

Re: Doing it wrong

If we want to spit-ball possible risks, perhaps you aren’t trying to exfiltrate data, but infiltrate the physical location? What if you could flash a QR code that made the camera keep transmitting an old image, or just go off line for a bit, or something else carefully planned.

Don’t even need to have the camera on the Internet to ensure that regular software updates are applied, any of which could introduce new features, because your organisation security policy undoubtedly requires you to keep software up to date. Especially if they fix disclosed vulnerabilities.

Apple may have to cough up $1bn to Brits in latest iPhone Batterygate claim

James R Grinter

Users will complain about anything

I remember when one of my older phones would shutdown with a high percentage of charge left, and of course it turned out the battery was on the way out and could not meet the power demands.

I’m glad they started throttling, as shutting down is far more disruptive than going slow. Though the PMs involved should have thought about the “PR” and had it advise the user to get their battery replaced.

Europe's GDPR coincides with dramatic drop in Android apps

James R Grinter

Re: Fuck Google harder

Got to fund the development of the new releases, for existing phone owners, somehow.

Apple's grip on iOS browser engines disallowed under latest draft EU rules

James R Grinter

Err, Safari works fine for the user. If the experience was really sub-par Apple wouldn’t be selling us lots of iPhones. Just because it doesn’t implement every latest experimental feature does not make it bad.

I’d posit the restriction on rendering and script interpreters has its origins in preventing developers skirting the App Store rules by disallowing apps that can execute dynamically delivered code (and JIT, necessary for JavaScript performance, requires memory pages to be able to be modified and then marked executable - another feature undesirable for security reasons).

If I wanted a choice of dodgy apps I’d buy a different brand of phone ;-)

JavaScript survey: Most use React but satisfaction low

James R Grinter

Re: What do we want? Static typing!

It’s a problem a developer may not have, but you can bet the users will encounter it (unfortunately they won’t know that’s why the page is entirely blank or unresponsive).

NixOS and the changing face of Linux operating systems

James R Grinter

Re: Back to the past

Common to a number of London offices of investment banks and, as I understand it, all the fine work of the same person.

Docker Desktop no longer free for large companies: New 'Business' subscription is here

James R Grinter

Re: Curious target audience

A lot of dev teams, particularly those who use containerisation in production, will use Docker Desktop as a means to get the run-time Docker tools onto their developers’ machines, to stand up a local copy of their own software for development and debugging. Images for deployment would be built by CI systems (with Docker build, or kaniko, Buildah, etc)

But, as someone else said, it’s a hard task to sell software that is perceived as “free”. Docker Desktop will be a ground-up choice (development teams making their own lives easier) rather than a business-led choice (a technology that improves the bottom line), so if there’s little or no development tools budget - or it has already been allocated to IDEs - then Docker will be SOL.

(I personally wouldn’t begrudge paying for Docker Desktop for Mac if they’d integrate networking on macOS. Having to manually configure and run “tap” is a big annoyance)

SCO v. IBM settlement deal is done, but zombie case shuffles on elsewhere

James R Grinter

it’s been a long time since I was actively following this case, but as far as I know the entity calling itself SCO was always unwilling (unable?) to actually divulge this. It was always the nebulous umbrella term “Intellectual Property”.

Sysadmins: Why not simply verify there's no backdoor in every program you install, and thus avoid any cyber-drama?

James R Grinter

Re: Linux proves that doesn’t work

Back in the day, we systems programmers built almost every third-party tool ourselves from source. Even the C compiler. But we sure as hell weren’t reading and comprehending all the source, not even checking for common sources of mistakes (printf without format args, popen calls, etc), and you’ve only got to recall Ritchie’s seminal paper Reflections on Trusting Trust to see the elephant in the (GCC) room.

Software is necessarily more complex these days because capabilities are higher and we demand more, and that will almost always involve many more third party dependencies, which in turn may have more. That cat is not going back into the bag, because it’s just not feasible, or wise - trivial string padding routines aside - for a development team to rewrite all those themselves (crypto, maths, graphics, UI, kernel, etc).

The solution isn’t to ditch the “uncontrolled” open source dependencies, either, and go back to commercial (commercial C++ libraries were all the rage in the 90s and early 00s), because we’ve seen with SolarWinds, Kaseya and many others that if you’re a high value target you *will* get attacked and compromised at some point for leverage into other networks. You need to have in place methods to prevent, mitigate or detect it when the time comes.

You can forget your fancy ERP customisations because that's not how it works in the cloud, SAP's Oliver Betz tells users

James R Grinter

Re: Tenant isolation ?

At the end of the day, it’s the “configuration vs. customisation” debate. It’s the same thing that gets you stuck on an old release, unable to upgrade because you’ve tweaked it up the wazoo and no one who knows how it works is still working for you (or, those that are, know better than to want to get involved).

ServiceNow, with their SaaS workflow, were already having that challenge with customers over 10 years ago, and as far as I know (I’m no longer working in that orbit) they’ve addressed it by being more restrictive in what you can change/how you can change their stuff.

BBC makes switch to AWS, serverless for new website architecture, observers grumble about the HTML

James R Grinter

Re: Not all is well.

Serverless is essentially “I don’t have to patch the OS”.

Which is actually quite an attractive idea, tbh. One less thing to have to keep an eye on, if you’re confident your vendor has the capability. Gripes with AWS aside, I think we can agree that they do.

UK finds itself almost alone with centralized virus contact-tracing app that probably won't work well, asks for your location, may be illegal

James R Grinter

Re: Might want to check your facts...

My understanding, reading between the lines and knowing the APIs available, is that they’re both transmitting BLE messages and also registering to listen for them. You might know this as iBeacons.

You can listen for Beacons from your family in the background, the OS APIs make it easy and battery friendly.

You can’t transmit beacons in the background so easily, transmitting also requires more power.

James R Grinter

Re: Co-traveller

Cos that approach would obviously be acceptable in an AppStore submission, not to mention burning a 0-day.

James R Grinter

Re: Apple and Google have too much control

The world of malware shows why, with many billions more of mobile devices, there’s a need to treat things differently to how we historically did so on personal computers.

(On iPhone, I can prevent an app from having Bluetooth access even if it asks for it. Likewise Location. My Android phone stopped getting updates, but even it had some controls that let a user turn features off. If the App doesn’t then function, well that’s down to differing opinions of the app developer and you, the user. Not much you can do about that, if you cannot write your own or pay someone to do so.)

Auf wiedersehen, pet: UK Deutsche Bank contractors plan to leave rather than take 25% pay cut for IR35 – report

James R Grinter

Re: Change Manglement

It isn’t the usual description of IT Infrastructure Change Management, but who knows how the “business” IT has chosen to use the term.

Don't use natwest.co.uk for online banking, Natwest bank tells baffled customer

James R Grinter

ISTR NatWest’s forays into investment banking played a part in their downfall.

“ in 1997, NatWest Markets, the corporate and investment banking arm formed in 1992, revealed that a £50m loss had been discovered, revised to £90.5m after further investigations.”

Wikipedia also reminded me that they’d tried to do a merger with Legal & General, which went down like a lead balloon, and seems to have been the final straw.

All worked out well for RBS, in the end, eh? ;-).

Sophos was gearing up for a private life – then someone remembered the bike scheme

James R Grinter

Only thing Sophos ever quarantined on a Mac, for me, was an old, spam, mailbox file that apparently had some Word doc attachments containing Windows-only macro viruses. And that was on an external disk I was copying to another. ¯\_(ツ)_/¯

Surprise! Copying crummy code from Stack Overflow leads to vulnerable GitHub jobs

James R Grinter

Re: Chicken or Egg

Particularly as there are a lot of SERPs out there throwing up code samples from existing open source projects (and, sometimes their unit tests are the only place to find an API example.)

Just what we all needed, lactose-free 'beer' from northern hipsters – it's the Vegan Sorbet Sour

James R Grinter

Brodies’ Elizabethan

Was officially 22%, though when it was still being drunk a few years later it’s hard to say. It was very nice, though.

Stuart Howe, then of Sharps, did brew his Turbo Yeast Abomination from Hell, https://brewingreality.blogspot.com/2010/01/3-turbo-yeast-abomination-from-hell.html, I did get to try some but I don’t remember what it’s final gravity was.

Please stop regulating the dumb tubes, says Internet Society boss

James R Grinter

Re: IWF Handwringing

A lot of TLS web sites are hosted on shared services these days: think anything on AWS S3, for example.

There’s separate work going on to prevent them being enumeratable (i.e. to prevent the domain names being disclosed via the certificate when you connect to them)

This will lead to some suggesting the answer is to “man in the middle” every TLS connection, I’m sure.

James R Grinter

Isn’t PiHole just a DNS resolver that you configure, via DHCP or statically, as your device’s DNS server? It may then make those onward requests, for domains it deems “good”, over DoH but by that point it’s looking up only what it wants to anyway. Essentially it’s doing what some paternalistic ISPs servers are doing, only under your control.

DoH is about your privacy, stopping a middleman from snooping on what domains you are resolving under the guise of “it’s just metadata”) Also, about stopping those paternalistic ISPs from further meddling with your DNS lookups.

Don't make a FOSS: Apache Software Foundation Board bids farewell to co-founder and two big hitters

James R Grinter

Clearly the board exist to oversee the operation of the foundation and are not product managers of every single (or any, unless they happen to be) Apache Project (as you note, there a lot. More, if you include those in incubation).

Projects are managed by Project Management Committees (clever play on words, there), take it up with them - or join them!

It's now officially the WhackBook Pro: If the keyboards weren't bad enough, now MacBook Pro batts are a fire risk

James R Grinter

Re: This is not the Macbook Pro with the butterfly keyboard.

The Mid-2015 McBook Pro (the model involved in the recall) does not have the “butterfly” keyboard.

It was introduced on the lightweight MacBook of that era.

Uber JUMPs at chance to dump load of electric bikes across Islington

James R Grinter

Re: Chinese bikes already here

Ofo went ages ago. Any you see now are in the hands of local kids and scallies.

UK Ministry of Justice: Surprise! We tested out biometric tech in prisons and 'visitors' with drugs up their bums ran away

James R Grinter

Re: Is it just me ?

How automated are those gates? Anecdotes I’ve heard suggest they are very reliant upon humans looking at multiple screens.

HPE wants British ex-CFO to testify in UK Autonomy lawsuit before Uncle Sam sentences him

James R Grinter

Any readers ever worked for a customer of Autonomy?

I’ve always been curious - maybe I missed previous discussions - but I’ve personally never met anyone whose employer/ organisation was a customer. I have even worked for companies who have “one of everything” and they didn’t use it.

Any readers able to tell us anything about it?

You're on a Huawei to Hell, US Sec State Pompeo warns allies: Buy Beijing's boxes, no more intelligence for you

James R Grinter

Re: If everything's encrypted, what's the problem?

If you have the server private key then you can decrypt the captured TLS sessions (including at a later date, e.g. if you steal that key), *unless* they use a cipher scheme that implements perfect forward secrecy.

Then you can’t.

But you certainly can’t break TLS just by sniffing the packets as an independent observer, unless you can “break” the maths behind DH.

https://security.stackexchange.com/a/42350 has a pretty good explainer

Apple yoinks enterprise certs from Facebook, Google, killing internal apps, to show its power

James R Grinter

Re: "but it also treats mobile users like adults capable of making their own decisions"

Yup, and I’ve seen comments elsewhere on this debacle to the effect that one should be able to consent to what Facebook was doing (“if they pay me enough”, said someone)

But IMHO there’s no way they can obtain legitimate *informed* consent from an average user. With the installed root cert and a VPN Facebook were in a position to read *everything* between the phone and any other TLS protected service that wasn’t using certificate pinning (and probably break those that were), riding roughshod over security best practices, laws, and user agreements.

Requests for info, gag orders and takedowns fired at GitHub users hit an all-time high last year

James R Grinter

Not just source code

Not everything posted to github, gists, or pages, is code.

It’s quite possible for them to end up hosting dubious or illegal content, or just something that is objectionable to another.

Royal Bank of Scotland, Natwest fling new bank cards at folks after Ticketmaster hack

James R Grinter

Re: Ticketmaster should be financially responsible for card replacements

Indeed, they may well be getting a less favourable transaction fee now. Unfortunately we’ll end up paying it in “booking fees”.

(In my case it was my Amex card number that got stolen, but it only came to light after the subsequent BA incident. I haven’t flown with BA in years but it seems someone started testing the numbers they had to see which were still working... it’s good to get alerts on card transactions!)

Begone, Demon Internet: Vodafone to shutter old-school pioneer ISP

James R Grinter

Re: Wild West Days

Is that you, Fis?

Another greybeard has left us: Packet pioneer Larry Roberts dies at 81

James R Grinter

Small correction

It’s *Leonard* Klenrock.

Total Inability To Support User Phones: O2 fries, burning data for 32 million Brits

James R Grinter

Re: Other mobile operators around the world are also affected?

SoftBank did. Presumably they were running one of the old software versions too.

What the #!/%* is that rogue Raspberry Pi doing plugged into my company's server room, sysadmin despairs

James R Grinter

Re: easy pickings

Its actually a good procedure (or would be if they’d done it intentionally) - the returning person may not be doing the same job as before so giving a new account name can avoid giving access they used to have but no longer need.

Amazon tries to ruin infosec world's fastest-growing cottage industry (finding data-spaffing S3 storage buckets)

James R Grinter

About bloody time!

I think it isn’t truly appreciated just how easy it is for an authorised piece of software to upload an object - with an “everyone can read it” ACL - and completely undo any attempts to keep the bucket secure.

(Yes, you could craft a policy that blocked anything with open access from being created, but you couldn’t block everything already there.)

'The inmates have taken over the asylum': DNS godfather blasts DNS over HTTPS adoption

James R Grinter

Re: Paul Vixie is correct

The malware authors are gonna love this new feature, as a way of avoiding even their C&C lookups from being seen.

British Airways hack: Infosec experts finger third-party scripts on payment pages

James R Grinter

I've never lost out as a result of fraudulent transactions on any credit card and there have been a few over the years (I don't think I've ever had my debit card ripped off: I don't use it anywhere but ATMs.)

It's just the inconvenience of having to get cards replaced, but Amex were quick (reported Saturday, arrived Tuesday) on the last occurrence - which was probably the miscreants testing cards stolen via Ticketmaster but after the BA hack and publicity.

Page: