Slamming comes to Canada

(Ok, it’s been around for a long time. Sue me. :)

So after having received yet another telemarketing call about switching my local service away from Bell, I called Bell and asked if there were any checks and balances in place. You know, to prevent fraud. The kind of fraud the US has been dealing with for 25 years.

Short answer: no. They simply trust the other guy, and let them take your service away from Bell. There’s a CRTC mandate that the new company “formally obtain consent”:http://www.crtc.gc.ca/eng/INFO_SHT/t1023.htm#n6, but a) that can be in several different easy-to-forge formats, and b) apparently Bell doesn’t bother verifying consent except in disputes.

I’m not sure who the imbeciles are here (I suspect the CRTC, but it *could* be Bell Canada), but there’s one somewhere.

You’d think we’d at least attempt to learn from the mistakes of our neighbours to the south with all of these attempts at deregulation, but no. That would require that intelligence trump greed.

I’m appalled…

posted at 2:32 pm on Tuesday, July 05, 2005 in Rants, Security | Comments Off on Slamming comes to Canada

too much crap

Today I’m feeling like throwing in the towel on this web server business: there’s just too much crap to deal with.

A friend’s server was broken into and defaced last week by a script kiddy. I’ve been double-checking my box over the last few days, and I’m astonished at the amount of crap flowing in from the Internet. As a security professional I knew it was bad, but I was fooling myself; I didn’t know it was _this_ bad!!!

I monitor the site regularly, mainly to ensure that we’re not abusing bandwidth that is generously donated, but also to make sure everything is working, and to watch for obviously suspicious activity. In the last week a major portion of the traffic to this server has been:

* referrer spam (which doesn’t do anything for the spammer, since I don’t display referrers anywhere; it only abuses my bandwidth). About 15% of my bandwidth for the last _month_ has been referrer spam; they seem to breed faster than I can block them out!
* people trying comment spam on weblogs with no comments (and no comment script!). This includes attempts to invoke old security holes in Movable Type.
* people probing for security defects in software that I don’t even have installed.
* people probing for security defects in software that I _do_ have installed (fortunately that was password protected, so they didn’t get in :).
* probes for network sockets (both for software with vulnerabilities, and for software installed by hackers). This box is heavily firewalled (in both directions; blocking outbound traffic has saved my bacon more than once!), but I still see the logs.
* password guessing attempts (mainly via SSH, which has been locked down to a small number of IP addresses for months now, since the last major SSH vulnerability).

The promise of Open Source software was that more eyes staring at code would lead to fewer defects. I’m seeing the opposite; it seems that the rate of vulnerability annoucements, and resulting patches, is _increasing_. Just last week I just upgraded three packages here as a direct result of security announcements (and, as mentioned above, caught someone probing for one of them…)

The Internet has become the cesspool predicted in several recent science fiction novels (notably Peter Watt’s Behemoth, which specifically mentions automated virus / hacking activity). After three days of looking two closely at my logs I feel like pulling the plug. If it were just me using the server, I probably would…

posted at 10:57 am on Wednesday, February 02, 2005 in Personal, Rants, Security, Site News | Comments (1)
  1. Jeff K says:

    The Internet has always been a pigsty… and the pigs love it!

MT Plus Comment Spam Equals Dead Site

I’ve experience the problems described here: The Daily Whim: MT Plus Comment Spam Equals Dead Site

Several times we’ve woken up to a dead cfrq.net server, and (ignoring one disk crash) it’s always been runaway Movable Type comment scripts causing the system to thrash, until some important process gets killed because of the resulting out-of-memory condition. It invariably happens on a Saturday, which means we all get to wait until Monday morning for the server to get manually rebooted.

I’ve installed countermeasures in the past:
* I’ve renamed the comments script
* I close comments automatically after two weeks
* “Comment SPAM interlocking”:http://blog.cfrq.net/chk/archives/2003/10/14/comments-spam-interlock/

And still, I see a constant, steady stream of comment spam that gets posted, even to postings that are closed to comments!

So far my WordPress blog is getting fewer hits, but it’s only a matter of time until the spammers find that one…

*sigh.

posted at 5:54 pm on Tuesday, December 14, 2004 in Links, Miscellaneous, Security | Comments (1)
  1. ReidNews says:

    Comments have been disabled
    Due to a huge influx of comment spam, I have disabled comments on tnir. This affects all blogs hosted on tnir, including Luisa’s and David’s. If you try to post a ccomment, it will let you type it in, but when you click “post” it will give you some…

Nigerian Fraud Countries

Amateur radio operators keep track of all of the countries they’ve had contact with.

I’m going to start keeping a list of all the countries I’ve received Nigerian fraud (aka 419 spam) messages from.

* Nigeria
* Liberia
* Senegal
* Mauritius
* UK (London)
* Hong Kong (China) (20041110)
* Sierra Leone (20041110)
* Cote d’Ivoire (20041119)
* South Africa (20041120)
* Burkina Faso (20041124)
* Togo (20041124)
* Benin Republic (20041124)
* Korea (20041125)
* Brazil (20041231) (wow, that was a long gap!)
* South Africa (20050113)
* Russia (!!!) (20050114)
* Dubai (20050117)
* Senegal (20070717) (after another long gap…)
* Iran (!!!) (20080212)

I’m slowly collecting most of that part of Africa…

Update: it appears that these fraudsters are the only ones left trolling web pages for email addresses. My active campaign against bandwidth abusing spiders appears to be cutting down on the spam at the same time…

posted at 12:52 pm on Sunday, November 07, 2004 in Personal, Security | Comments Off on Nigerian Fraud Countries

Defense in Depth

I’ve visited lots of old fortresses in Canada, and a few in Europe, and I remember learning about defense in depth. This is the idea that your assets should be surrounded by multiple separate layers of defenses to make it harder for the barbarian hordes (or Americans :-) to break in. Ideally the defenses should be _different_, so that if a simple technique of defeating one is discovered, it doesn’t help against the others.

The forts I’ve visited are typically on a hill (so that you can see the enemy coming and prepare. But they’re also sunk into the hill, with sloping outer walls, to defend the inner walls against artillery. They’re surrounded by open fields (no trees or brush). The outer wall has gun emplacements, to mow down anyone trying to cross those fields. There is a deep trench between the inner and outer walls, deep enough that attackers must climb down, slowing them down. The inner walls are full of small, narrow windows to allow the defenders to shoot at anyone trying to cross the trench. The inner walls usually have towers that project into the trench, so that people trying to climb the inner walls aren’t hidden from defenders inside the walls; those attackers can be attacked from the towers. The important buildings inside the inner walls have their own defenses. And so on.

Of course, a few carefully placed shells from a battleship and the fort is history; but that’s progress for you.

Anyway, to make a long story short, here’s Robert Scoble’s “defense in depth strategy for Windows XP”:http://radio.weblogs.com/0001011/2004/08/22.html#a8128 – enjoy!

posted at 7:11 pm on Tuesday, August 24, 2004 in Security | Comments Off on Defense in Depth

Re: oops

So after looking at “the mail I accidentally misfiled”:http://blog.cfrq.net/chk/archives/2004/08/16/oops/ there were, in fact, about 150 spam (almost 50%).

pobox.com has completely revamped their spam filtering service since I last looked; I can now monitor rejections, forward messages to myself, and add whitelist entries, all through a fairly simple interface. I’ve switched it on; so far one spam has gotten through, with no false positives…

posted at 9:11 am on Tuesday, August 17, 2004 in Personal, Security | Comments (3)
  1. Reid says:

    Have you looked into Sender Policy Framework yet? I was thinking of doing that. Not sure if register.com will let me edit the appropriate bits of my DNS record though..

  2. Harald says:

    # dig cfrq.net txt

    cfrq.net. 3600 IN TXT "v=spf1 a mx a:CPE0020afa1901b-CM014210016169.cpe.net.cable.rogers.com ip4:24.156.198.121 -all"

  3. Reid says:

    I checked, and I can’t see any way to set the TXT field of my DNS record via register.com’s web interface. Well, maybe it’s time to move away from register.com.. hmm.

SPAM

Very strange.

I just came back from a weekend of camping to find one new message in my inbox, and zero messages in my spam and spamMaybe boxes.

I’ve checked all the logs, and everything _seems_ to be working properly…

posted at 11:01 pm on Sunday, August 15, 2004 in Personal, Security | Comments Off on SPAM

Active Directory

It is very easy to setup a self-contained network, with a Domain Controller, using Active Directory. Too easy, in fact; I’m on my third attempt :-).

I’m using cloned hard disk images under Microsoft Virtual PC, which caused my latest problem; Active Directory let me register a computer in the domain with the same name as the domain controller. Needless to say, _nothing_ worked after that. The reason this happened was because I tried to rename the image _and_ join the domain at the same time; Windows 2000 apparently joins the domain _first_, then attempts to rename the computer. This surprised me :-)

Fortunately, I had a master disk image, so it was trivial to restart from a fresh install and rebuild the domain controller (which, thanks to Microsoft’s wizards, is easy). But then I had to rebuild the two child domain controllers, since they refused to “demote” themselves when the domain master was unavailable.

Sadly, all of this is _time consuming_, even when the host is a P4 2.8 with 1Gb of memory and oodles of disk bandwidth…

posted at 9:32 pm on Thursday, August 12, 2004 in Personal, Science and Technology, Security | Comments (1)
  1. Reid says:

    It took me a moment to figure out what you meant by PIV. I thgouht it was some sort of PVC pipe variant for plumbing or something!

    I think P4 is easier to grok.. :)

passwords and PKI

“Densise Anthony”:http://www.dartmouth.edu/~socy/faculty/anthony.html doesn’t mention her security research on her “home page”:http://www.dartmouth.edu/~socy/faculty/anthony.html, but the “slides from her presentation”:http://www.dartmouth.edu/~deploypki/summit04/presentations/PKIUserBehavior.ppt are available on the “Dartmouth PKI Unlocked Summit and Workshop”:http://www.dartmouth.edu/~deploypki/summit04/proceedings.html page, which I found after a bit of Googling led me to the “Dartmouth PKI Lab Outreach Web Home”:http://www.dartmouth.edu/~deploypki/ page. There’s a bunch of good stuff buried in there, especially deployment tips, and the “Dartmouth OpenCA – LiveCD”:http://www.dartmouth.edu/%7Edeploypki/CA/InstallOpenCALiveCD.html looks especially interesting; I’m going to try it out in my testing lab soon.

posted at 9:44 am on Wednesday, August 11, 2004 in Security | Comments (4)
  1. Greg Wilson says:

    Your “testing lab”? Does that come complete with lightning rods, bubbling beakers, and an igor?

  2. Harald says:

    (laughter)

    Sadly, no. About the only exciting thing about my testing lab is that one of the computers isn’t under the desk, which caught the attention of the Health and Safety droids…

  3. Reid says:

    caught the attention of the Health and Safety droids…“??

    Okay, I sense an untold story here…

  4. Harald says:

    It’s simple, actually. One of my 9 desktops masquerading as servers is _not_ under a desk; it is instead sitting on the floor in front of all of the other computers under the desk. Despite the fact that this is not in a corridor or anything else vaguely resembling anything other than a _desk_, this is apparently a Class B Safety Hazard (insert ominous music here :-)

passwords in the news

I can’t find it now, but I remember reading recently about another “cross-discipline” team that discovered all sorts of interesting things, because each member of the team had a different way of looking at the data. Now a PKI research group has attached a sociologist to the team, and that is “starting to produce insight”:http://www.dartmouth.edu/~deploypki/summit04/presentations/PKIUserBehavior.ppt:

bq. A recent survey found that 75 percent of Dartmouth students have shared their network passwords. “They like having people who know their password,” explained “Denise Anthony”:http://www.dartmouth.edu/~socy/faculty/anthony.html, a sociologist who spoke at the PKI summit conference I attended earlier this month. “They like having someone who can check their e-mail for them or log them in to places where they’re supposed to be.”

bq. Professor Anthony’s talk was dramatically different and showed why it was a really smart move to attach a sociologist to Dartmouth’s PKI research group. As security technologists, we’re easily dazzled by our shiny cryptographic swords. But while we’re brandishing our swords, our users — like Indiana Jones in that famous scene from Raiders of the Lost Ark — might simply pull out their guns and shoot us. Better security protocols alone can’t thwart such game-changing behavior. We need to understand what motivates the behavior and figure out which carrots and sticks will influence it.

bq. It’s a given that most people take the path of least resistance. So, for example, two-thirds of Dartmouth students never change their passwords during their four years of enrollment. And most reuse their internal passwords for external sites such as The New York Times and Amazon.com. How do they perceive the risk associated with such behavior? According to Anthony, it’s a tragedy of the commons. The network is a collective resource, but people connected to the network feel that they’re consuming a private good. Their subjective view, she says, is this: “I’m in my office. I’m using my computer. It doesn’t feel like I’m part of a group. I don’t recognize how my behavior affects you.”

InfoWorld: Tragedy of the network commons

posted at 9:44 am on Wednesday, August 11, 2004 in Science and Technology, Security | Comments Off on passwords in the news

spam source

Ok, so it turns out that all (well, 125 of 126 :-) of the spam I’m getting these days is coming through my pobox.com address. The greylisting is working fine, in other words :-)

It’s been great having a portable email address, but now that I pay real money for my own domains, maybe it is time to switch over. I can do more accurate spam filtering on my personal server than they can on their shared servers Unfortunately, the massive spam volumes floating around these days are forcing us to these drastic measures. I’m beginning to believe the pessimists; e-mail is dying…

posted at 10:57 pm on Sunday, August 08, 2004 in General, Security, Site News | Comments (1)
  1. Re: oops
    So after looking at “the mail I accidentally misfiled”:http://blog.cfrq.net/chk/archives/2004/08/16/oops/ there were, in fact, about 150 spam (almost 50%).

    pobox.com has completely revamped their spam filtering service since I last looked; I can n…

greylist results revisited

So maybe I spoke too soon; in “greylist results”:http://blog.cfrq.net/chk/archives/2004/07/14/greylist-results/ I said that my spam volume had gone way down. Well, it has come back up again. I’ll have to write scripts to prove it, but I have a theory.

Machines owned by spammers are being used relatively infrequently, maybe to reduce the chances of getting detected and blacklisted? So the first time a spam host shows up, it gets greylisted. But if they show up again a day or a week later, they get past the greylist filter, because they’re now in the cache (but haven’t been expired yet).

Maybe a fix would be to put two cache timeouts in; the first would be for machines that have not yet successfully delivered a message i.e. by retrying the original delivery), and would be relatively short, probably less than a day. The second would be the existing long timeout for machines that have already passed the first test.

That would eliminate spam machines that only show up infrequently. I don’t know whether it is worth the effort, though.

On the plus side, greylisting _is_ still keeping out the virus traffic…

posted at 12:18 pm on Sunday, August 08, 2004 in Security, Site News | Comments Off on greylist results revisited

Mom brought Google to its knees

Mom brought Google to its knees (via “kuro5hin.org”:http://www.kuro5hin.org/).

bq. Fortunately for the internet, my mom’s on dialup. But unfortunately for the internet, your mom has cable. And your mom is just as obstinately ignorant as my mom. You might as well try to convince them to change their own oil as to keep their computers maintained.

In short: trying to teach Mom about computer security is a lost cause. Which leads to the obvious conclusion; we’re not going to fix the problem until we don’t have to teach Mom about computer security…

posted at 12:00 pm on Monday, August 02, 2004 in Security | Comments Off on Mom brought Google to its knees

Long-Distance Bluetooth Hacking

Heh.

| People who know radio technology | 1 |
| Bluetooth Security optimists | 0 |

Bluetooth proponents have been saying for a long time that Bluetooth security isn’t that big of a deal, because the range is so short. Now a group of enthusiasts has demonstrated that it is possible to setup a 1km, line-of-sight Bluetooth connection by modifying only one side of the connection:

Wi-Fi Toys

posted at 11:58 am on Monday, August 02, 2004 in Science and Technology, Security | Comments Off on Long-Distance Bluetooth Hacking

More Comment Spam

I’m not the only one:

* kasia in a nutshell: All the traffic spam that a website gets
* “Confessions of a G33k: Live capture comment spammer logs”:http://www.cleverhack.com/blog/archives/001274.html

and so on…

posted at 2:04 pm on Friday, June 04, 2004 in Security | Comments Off on More Comment Spam

comment spam

Some idiot script kiddy wiped out our bandwidth again today. He could have an automated tool, or he could be doing it manually. He’s trying to post comment spam to blog.org, but he’s repeatedly fetching pages over and over again (presumably to see if his comments are getting published or not).

The problem is that David’s pages are large (and getting larger all the time); an average of 200Kb each. So this spammer has single-handedly downloaded at least 70Mb of data today!

It’s one thing to try to abuse my server to get a site ranked higher in Google. It’s another thing entirely to waste _my_ bandwidth in the process!

64.57.64.0/19, 66.154.0.0/18, and 66.154.64.0/19 just made it into the blackhole list…

posted at 1:18 pm on Thursday, June 03, 2004 in Security, Site News | Comments (4)
  1. David Brake says:

    I was kept busy removing the comment spam this created on the other end today as well (unfortunately, the script kiddies are starting to randomise their IP addresses and choose from long lists of URLs so IP address or URL blocking is less effective). Makes me think the only long-term solution to comment spam may be one of these type in the numbers from an image plug-ins. Though apparently determined spammers are actually doing it by hand! AARGH!

  2. joy says:

    What about comment moderation in WP?

  3. Harald says:

    I’m using WP, and (as you can see) comment moderation is working.

    David’s still using MovableType, and his weblog is quite popular…

  4. I would recommend you setup some type of image number system so bots can’t spam!

Movable Type security problem with Draft entries

I’m astonished that this has not been fixed yet, given the huge problems lately with Movable Type and comment spam.

Joe Grossberg: MT Post Status Vulnerability

This explains why I’ve been getting comment notifications for old posts, even though I’m running an automatic “close comments after 2 weeks” script.

Proving once again that open source developers are not any better at security than everyone else :-)

posted at 10:29 am on Wednesday, April 07, 2004 in Security | Comments Off on Movable Type security problem with Draft entries

Debugging the VPN

So the first time I fired up the VPN client, the rules on the firewall allowed the ISAKMP negotiation, but not the ESP data. I fixed that and tried again. This time, the firewall no longer rejects packets, but doesn’t pass them through, either. Debugging ensues. Debugging is made extra challenging by the fact that the VPN client disallows split tunnelling, thus killing the SSH session to the firewall each time it is started. Lots of running tcpdump in the background is required.

Eventually I gave up and ate supper.

I tried again after supper. The VPN comes up perfectly; the spiffy intranet portal appears. Apparently something previously cached has been un-cached. However, the connection only lasts about 5 minutes, then dies. Debugging does not follow; it’s time to play Euchre.

The next evening arrives. I fire up tcpdumps and a script to monitor /proc/net/ip_conntrack, under the assumption that connection tracking isn’t working properly (leading to the 5 minute timeout). I start the VPN client. Everything works; no session timeouts, no firewall issues. Hours of rapturous intranet browsing follows. I also play with using SSH through the VPN, out the corporate firewall, and back to the home firewall :-).

While I’m happy that everything’s working, I could live without the whole “attempt to debug problems that later mysteriously vanish” thing…

posted at 3:06 pm on Saturday, November 22, 2003 in Security | Comments Off on Debugging the VPN

webserver traffic

I have a webserver at home that has two purposes:

# serve my start.html page to the various computers around the home network
# serve a Java SSH client for remote access when I am travelling

otherwise, it’s empty; there’s an index.html that redirects visitors to “www.cfrq.net”:http://www.cfrq.net/.

So in the spirit of “joy”:http://www.cleverhack.com/blog/ I offer one weeks worth of log entries:

bc. 64.210.196.197 – – [05/Oct/2003:08:00:28 -0400] “GET /robots.txt HTTP/1.0” 404 1044 “-” “Mozilla/4.0 (compatible; MSIE 5.0; Windows NT; Girafabo
t; girafabot at girafa dot com; http://www.girafa.com)”
64.210.196.197 – – [05/Oct/2003:08:00:30 -0400] “GET / HTTP/1.0” 200 346 “-” “Mozilla/4.0 (compatible; MSIE 5.0; Windows NT; Girafabot; girafabo
t at girafa dot com; http://www.girafa.com)”
202.62.124.246 – – [05/Oct/2003:08:57:23 -0400] “GET /scripts/nsiislog.dll” 404 1040 “-” “-”
195.199.113.93 – – [05/Oct/2003:09:11:20 -0400] “GET /scripts/..%255c%255c../winnt/system32/cmd.exe?/c+dir” 404 1040 “-” “-”
217.235.215.221 – – [05/Oct/2003:13:26:02 -0400] “GET /scripts/nsiislog.dll” 404 1040 “-” “-”
4.65.206.189 – – [06/Oct/2003:03:52:41 -0400] “GET /scripts/..%255c%255c../winnt/system32/cmd.exe?/c+dir” 404 1040 “-” “-”
130.39.12.96 – – [06/Oct/2003:09:36:03 -0400] “GET /scripts/nsiislog.dll” 404 1040 “-” “-”
129.16.97.149 – – [06/Oct/2003:10:07:45 -0400] “GET /scripts/nsiislog.dll” 404 1040 “-” “-”
202.63.163.46 – – [06/Oct/2003:16:26:29 -0400] “GET /scripts/nsiislog.dll” 404 1040 “-” “-”
218.103.70.82 – – [07/Oct/2003:05:04:48 -0400] “GET / HTTP/1.1” 400 298 “-” “-”
62.94.18.69 – – [07/Oct/2003:07:35:18 -0400] “GET /scripts/nsiislog.dll” 404 1040 “-” “-”
64.68.82.169 – – [07/Oct/2003:08:51:01 -0400] “GET /robots.txt HTTP/1.0” 404 1044 “-” “Googlebot/2.1 (+http://www.googlebot.com/bot.html)”
64.68.82.169 – – [07/Oct/2003:08:51:12 -0400] “GET / HTTP/1.0” 304 0 “-” “Googlebot/2.1 (+http://www.googlebot.com/bot.html)”
211.38.42.212 – – [07/Oct/2003:11:06:28 -0400] “GET / HTTP/1.1” 400 298 “-” “-”
80.50.49.231 – – [07/Oct/2003:16:09:35 -0400] “GET /sumthin HTTP/1.0” 404 1040 “-” “-”
211.233.37.239 – – [07/Oct/2003:19:40:15 -0400] “GET / HTTP/1.1” 400 298 “-” “-”
64.68.82.38 – – [08/Oct/2003:06:19:30 -0400] “GET / HTTP/1.0” 304 0 “-” “Googlebot/2.1 (+http://www.googlebot.com/bot.html)”
64.216.223.109 – – [09/Oct/2003:01:03:38 -0400] “POST http://64.216.223.109:25/ HTTP/1.1” 200 346 “-” “-”
67.97.3.89 – – [09/Oct/2003:12:21:16 -0400] “GET /sumthin HTTP/1.0” 404 1040 “-” “-”
64.68.82.167 – – [10/Oct/2003:10:43:21 -0400] “GET /robots.txt HTTP/1.0” 404 1044 “-” “Googlebot/2.1 (+http://www.googlebot.com/bot.html)”
64.68.82.167 – – [10/Oct/2003:10:43:28 -0400] “GET / HTTP/1.0” 304 0 “-” “Googlebot/2.1 (+http://www.googlebot.com/bot.html)”
206.98.253.78 – – [10/Oct/2003:20:43:37 -0400] “GET /sumthin HTTP/1.0” 404 1040 “-” “-”
213.206.74.231 – – [10/Oct/2003:23:29:19 -0400] “GET / HTTP/1.0” 200 346 “-” “-”
64.81.53.154 – – [11/Oct/2003:08:43:44 -0400] “GET /scripts/nsiislog.dll” 404 1040 “-” “-”
66.77.73.44 – – [11/Oct/2003:17:32:30 -0400] “GET /robots.txt HTTP/1.0” 404 1044 “-” “FAST-WebCrawler/3.8 (atw-crawler at fast dot no; http://fa
st.no/support/crawler.asp)”
12.247.47.7 – – [11/Oct/2003:19:11:29 -0400] “CONNECT 1.3.3.7:1337 HTTP/1.0” 405 964 “-” “-”

A little bit of search engine spider traffic, and a bunch of hack attempts. “Fascinating”, as Spock would say…

The “/sumthin fetch”:http://www.webmasterworld.com/forum11/2100.htm is apparently from a couple of trojans looking for 404 pages, because they often identify the webserver (and its weaknesses). “nsiislog.dll”:http://securityresponse.symantec.com/avcenter/security/Content/8035.html is a known buffer overflow. The POST to port 25 is a spammer looking for an open proxy, and the CONNECT 1.3.3.7:1337 is apparently a newer version of the same scanner (looking for the 405 error on the CONNECT, presumably).

As mentioned before, I run scripts that searches my logs for common hack attempts and blacklists (or RBLs) the source. Now I’ve got some new patterns to search for.

Coming on Monday: “automated comment spam blacklists”:http://www.jayallen.org/journey/2003/10/mtblacklist_monday_hell_or_high_water …

posted at 7:23 pm on Saturday, October 11, 2003 in Security | Comments Off on webserver traffic

Coventry Cathedral

Here’s an entry covering two of my favourite topics!

Today Sensity posted Coventry Cathedral. I love his photpgraphy! I don’t remember how I tripped over his photoblog; if I recall correctly, it was right around the time he built a new studio in the attic. Anyway, I’ve been reading (viewing?) it ever since.

“Coventry” is one of the classic stories of information warfare. To maintain secrecy, the Germans used a complicated machine called Enigma to encrypt their radio communications. They believed (with good reason) that Enigma was unbreakable. By the later part of 1940, the Allies _had_ cracked the code, thanks to the work of brilliant cryptologists at Bletchley Park. It is easy to argue that this project (codename Ultra) won us the war; it’s amazing what you can do when you know the enemy’s plans in advance.

Back to Coventry. On the night of November 14/15, 1940, German bombers substantially destroyed the city center of Coventry, including the 14th century cathedral. 545 civilians were killed; 4,865 were injured. The city’s infrastructure (buildings, gas mains, transit) was destroyed.

Thanks to Ultra, Churchill knew that the raid was coming, some say as early as November 12th. However, if the Allies had _acted_ on this knowledge, the Germans would have known that Enigma was broken, and changed their codes. In order to protect the secret of Ultra, Command chose not to defend Coventry. Many lives were lost, and a city destroyed.

It’s a good story, but it’s not true. The reality is both mundane and more plausible. The Allies knew a raid was coming, but they didn’t know exactly when, and had four different potential targets. The Germans used radio beams to guide the bombers to their targets; it was only shortly before the raid that the RAF determined that the beams intersected over Coventry. Jammers were sent out to disrupt the radio signals bit their equipment was incorrectly set. RAF fighters sent to intercept the bombers downed only _one_ plane (out of over 500). Some believe that this last point is what led to the myth; claiming that Coventry was destroyed to protect Ultra is better than admitting that the RAF completely failed to stop (or even slow down) the attack.

Still, the lesson is a valuable one. Intercepting enemy communcation (encrypted or not) is only part of the problem; the other part is hiding your interceptions from the enemy. If your opponent discovers that an important plan has been intercepted, he’s goign to change that plan (or worse, start deliberately feeding you false information).

posted at 12:09 am on Monday, September 29, 2003 in Random Thoughts, Security | Comments Off on Coventry Cathedral
« Previous PageNext Page »