Reflections on Brilliant Digital: Single Points of 0wnership 278
nweaver writes "Some reflection on Brilliant Digital's plans shows that they have inadvertently created a Single Point of 0wnership: a single machine or small group of machines which, if succesfully attacked, can be used to gain effective control of the Internet. The implications are rather scary: Even if you never touched KaZaA, your systems may be affected if someone manages to attack Brilliant Digital's update service. Who needs a Warhol Worm?".Updated by HeUnique: use these instructions to remove the Brilliant part.
Dumb..Very Dumb (Score:4, Insightful)
As long as I can get good download speed and have a large mp3 base what do I care?
Does this type of thinking occure elsewhere? I thought I worked with some bright people but they seem to think of their machines as black boxes and if they work great.
sigh.
Re:Dumb..Very Dumb (Score:3, Insightful)
_
WINDOWS USERS CLICK HERE! [paware.com]
Re:Dumb..Very Dumb (Score:3, Interesting)
Re:Dumb..Very Dumb (Score:4, Insightful)
This is true in the food and drug arena. This is true in war and politics. This is true in biotech. This is true with trends in child-rearing. Somehow and somewhere, we have lost the notion of "wisdom." Not only have we forgotten how to become more wise, we are also underestimating (and ignoring) the value of the wisdom of others.
Socially, we're losing a lot of ground because we don't want to think any more. It's disturbing not only to watch, but also because I feel those trends infecting me as well.
"I don't care how we get it, just give me what I want." That's the growing mentality. "Rights!? I don't care about rights, just fight the evil demons in our midst!"
Okay... I'm going a bit too deep, but as a nation (I can't really say much about Europe or other places... I'm ignorant because I lack direct observational experience in the area) we're really getting too apathetic. It has been a long time in developing but our nation-wide apathy and our lack of long-term vision is affecting a lot.
I truly doubt that the RIAA and the MPAA are considering the long-term affects of their actions. Are they really so arrogant to think that their children will be any less affected than our children? Or is it that they aren't considering children at all... only themselves? Apathy. Lack of long-term vision.
Hehehe... what does this have to do with Brilliant Digital's Single Point of Ownership? Clearly, they have a lack of wisdom and long-term vision. If you want to own or control a large body from a single point, that single point bears the responsibility of DEFENDING it.
Defense is a responsibility that people tend to think is something they should pass off to government and law enforcement. Where did that moronic notion come from?!
Re:Dumb..Very Dumb (Score:2, Interesting)
Another problem we have is the sheep mentality. The Liberal Democrats got far less seats than they should have because many 'supporters' voted Labour because "we have to make sure the Tories don't get back in power" did the fact that Labour still have a huge majority escape them? They could have safely voted Lib Dem and Labour would still have won easily. However, they wouldn't have such a powerful majority.
Re:Dumb..Very Dumb (Score:2)
This idea came from the government, because it doesn't want the people able to defend themselves.
Re:Dumb..Very Dumb (Score:5, Insightful)
An Assyrian tablet from ~2000BC was found with words to that effect (e.g. kids aren't worshipping our pagan gods as much as they used to, the air is getting rotten, etc). The same thing has been said and re-said millions of times since. But it's just not true.
People aren't really getting more ignorant: we're more educated than at anytime in the past. If you think it's bad now, imagine how it was last century. Do you think those textile workers were curious to know how the sewing machines really worked? No, we should try to fight our innate tendency to think everything is getting worse, because in fact by most measures the state of humanity is getting better and better.
Re:Dumb..Very Dumb (mod parent up!) (Score:3, Insightful)
We do tend to idealize the past beyond its reality. Still... apathy harms.
Re:Dumb..Very Dumb (Score:3, Interesting)
"The Earth is degenerating these days. Bribery and corruption abound. Children no longer mind their parents, every man wants to write a book, and it is evident that the end of the world is fast approaching." - Assyrian stone tablet, c.2800bc
- j
Re:Dumb..Very Dumb (Score:2)
My grandad, viewing Earth's worn cogs,
said things were going to the dogs;
His grandad in the Flemish bogs
said things were going to the dogs;
His grandad in his old skin togs
said things were going to the dogs;
There's one thing that I have to state-
The dogs have had a good long wait!
-Anonymous
Information overload (Score:4, Insightful)
Today everyone, no matter how smart, is submerged in a tide of information. The only way to survive and get anything out of it is to filter it. But how should one construct the filters???
Don't pat yourself on the back too hard, just because you understand computers. There's a lot more to this civilization than computers. And the rest is just as important.
All I've been able to do is demarcate a small area that I try to understand, and try to find other people that I trust to understand other areas for me. I don't know of a better method, even though that one is clearly flawed. Note that this is the same technique that almost all people adopt.
One of the critical flaws in the process is:
How does one choose trustworthy authorities? I sure don't have an answer. The best I can do is pick people that I don't know to be wrong for reasons that are unknown or unacceptable to me. This isn't great, but it's something. One of the good points about this system is that it distributes authority (I see centralized authority as inherently evil: consider that the central authority will have the same limitations [mentioned above] as anyone else, and the people that the central authority chooses to trust will have every motivation to give self-serving advice [as long as they aren't caught at it.])
Re:Information overload (Score:3, Insightful)
I like the idea of political duty. Think of it like jury duty, only longer. It basically states that random people will be picked to server as politicians (house menbers, senate members, etc.) for a period of time. They are then released and a new crop is picked. There are many problems with this, but there are many problems with the way things are done now.
If the policitial duty was truly random, the views of the population are more likely to be represented. Though it would take a lot of effort to ensure the process is random and is not corrupted.
Re:Dumb..Very Dumb (Score:3, Interesting)
That was an excellent comment. The idea of wisdom and vision you mentioned seems to me most easily summarized, however, in the concept of independence or autonomous living, which requires both wisdom and will.
Early in American history, Jefferson praised the independent spirit, especially as found in the character of American farmers who provided for themselves with inititative and spirit; these same sort of men fought for independence during the American revolution. Horkheimer, Adorno, Marcuse, and others in twentieth century America lamented the common man's decline of interest in autonomous life as administered existence began to provide a higher standard of living -- people in general would rather be taken care of and have comfort than have to think and act for themselves.
As another poster pointed out, we always tend to idealize the past; in this case, however, we see a clear regression. The average Joe is becoming less and less autonomous, more and more childlike, in response to the increased allure of a higher standard of living.
To be specific (and to avoid that offtopic mod), man once made music for himself -- he sang, he played instruments, he created. Then came written musical notation, which allowed him to copy others' inventions by playing or singing songs he may never have heard; still he was making the sounds himself. Next, recorded music allowed him to spin a record/pop in a cassette/play a CD or .mp3 without any act of creation or imagination. Kazaa (and Napster before it) made procuring these mass-produced commodities, no longer created artisans per se but produced by a recording/culture industry, even easier -- he didn't have to pay for them or even leave the comfort of his desk.
In return, he has sacrificed various freedoms, by which I mean his power over the music. First, he gave up the power of creativity; now, he gives up the power over his own computer's spare CPU cycles. Our user gets easier downloading, but he surrenders control over part of his computer and (possibly) renders himself open to attack by hackers. Taken collectively as a society of freeloaders, we may be risking a chunk of the internet for easy .mp3 pirating.
This is not wisdom, and it is not independence. Those who read Slashdot are likely not covered here -- Slashdot readers tend to be the ones who build their own boxen, who write their own code, who value privacy and who see the importance of doing for oneself. Slashdotters tend to be autonomous. The majority, however, are heteronomous: willing to surrender their independence and unwisely to make unknown risks for the sake of allegedly "better" living through false needs, such as 100-gigabyte hoards of Britney Spears and NSYNC .mp3's.
Meanwhile, the recording industry attempts to take from us the right to fair use of what we have bought legally. Between our own childishness and their greed, we risk our computers and whatever increased standard of living mass-produced music has brought us. Beautiful.
This is the progress of Jefferson's America: from our forefathers' earning with their blood the right of liberty, to surrendering freedoms so we can steal the latest Backstreet Boys hit. It almost makes me want to cheer for the RIAA -- hoping that if they win, they'll shoot themselves in the foot by forcing cheapskates like myself, and many others, to go make music instead of consuming it.
Not that ranting here is going to help things a bit -- the unwashed and .mp3-hoarding masses won't listen anyway, and most don't read Slashdot. I'm done venting now.
Re:Dumb..Very Dumb (Score:2)
Then I explain what can be done with an owned box, they nod, uninstall kazaa, and merrily doubleclick the next
Already Exists (Score:4, Insightful)
I noticed Need for Speed Porsche did this too.
These friendly autopatchers could all be hacked.
This is a serious risk with new subscription based services too.
Not on this scale... (Score:2, Insightful)
True, windowsupdate.microsoft.com is a big fat target too, but at least that was designed primarily with security in mind, and AFAIK it hasn't been hacked yet in the 4 years since it was introduced. Also, Windows Update will NOT install anything without your explicit consent. (Now, as for Windows Media... it says right in the EULA that MS reserves the right to update your codecs without your permission, at the very least...)
I stand corrected. (Score:2)
Re:Already Exists (Score:4, Informative)
On the other hand, how many people are running Kazaa in comparison (on Win95, for example)? A lot more. What is worrysome is the corporate user running Kazaa behind an improperly set firewall. If he is on a large pipe, that can spell trouble. Imagine that problem multiplied by the number of users running Kazaa. Can you say "imagine a Beowulf cluster of DoS zombies?"
Re:Already Exists (Score:2)
Re:Already Exists (Score:2)
Then change your home page and or options. Assuming you don't want it to. And, evidently, it doesn't auto install the updates or you'd presumably be running IE6.
Re:Already Exists (Score:2)
MS Windows isn't installed on millions of PCs? (Score:2)
They may not be mostly on high speed connections, but who cares, there are just so many of them it could cause HUGE messes.
Re:MS Windows isn't installed on millions of PCs? (Score:5, Funny)
The good side (Score:4, Funny)
Re:The good side (Score:2)
Distributed Computing on Kazaa (Score:2, Insightful)
Ok, not only would this concept be likely considered unwelcome even by casual Kazaa users, but think of all the other possibilities for an already heavily established (as those things go) P2P app like Kazaa...
In other words, they could try to get their users to share a distributed computing project working towards, say, the cure of a deadly disease or other medical project, then give ( or sell, which would be more likely) the results to whatever foundation would actually be able to use the data?
That way they could make money, a name for themselves, and generally the rest of humanity a bit happier.
Re:Distributed Computing on Kazaa (Score:2, Interesting)
Not trying to stray offtopic, but United Devices [ud.com] does something like this with cancer research.
Then again, _you_ download the client, and they don't sell the results to anyone; as i understand it they collaborate with the Dept. of Chemistry @ the University of Oxford.
Kazaa using this technology (with the consent of the user, of course
Number of aliens contacted by SETI@Home: 0
Good for them (Score:5, Funny)
1. Plant studip spamware on a gazillion computers worldwide
2. Head for a small island state somewhere in the middle of the Pacific Ocean and start blackmailing governments the world over by claiming to "0wn j00r 1nt4rw3b!". A gazillion children addicted to warez, pr0n and AIM complain to their respective parents, who demand action from their governments. Governments pay up.
3. Profit!
Then again, governments do have armies with guns and ships and stuff so things might get messy in the process. *shrug*
Re:Good for them (Score:5, Funny)
(dramatic pause)
Dr. Evil:
Number Two: Don't you think we should ask for more than a million dollars? A million dollars isn't that much money these days.
Dr. Evil: All right then...
(dramatic pause)
Dr. Evil:
(uncomfortable pause)
Number Two: Jon Katz alone makes over nine billion dollars a year.
Dr. Evil: Oh, really?
Dr. Evil: One-hundred billion dollars.
(pause)
Dr. Evil: OK, make it happen. Anything else?
Re:Good for them (Score:4, Funny)
start blackmailing governments the world over by claiming to "0wn j00r 1nt4rw3b!"
Or, in the immortal words of Jeff K. [somethingawful.com], "HAHAHHAHHAHAHHAHHAHAHAHAHAH HOW DO YUO LIEK THEM APPALS FELLOWS?!? GRABUALsA!!!!"
Re:Good for them (Score:2)
Damn the Emperor!
Cooperation is key (Score:2, Insightful)
I'd expect these companies to start adding stuff into their installation legalese with something to the effect of, "You agree not to reverse-engineer anything we might be doing with your computer. You agree to sit back and relax while we adjust the horizontal and vertical"..
Re:Cooperation is key (Score:3, Interesting)
I tend to look at our internet and our computing power on the level of 'health.'
Software designers should understand that they aren't just writing programs any more. We're not building new calculators with cool new functions. We're writing a great deal of software that interacts with a public network that affects the lives of everyone either directly or via the health of business and information exchange.
Business and commerce are now more tightly bound to our ability to exchange, gather and disburse information as a commodity.
I'll use Microsoft as an example but it's not limited to Microsoft... Cisco could easily be used as an example of a "responsible player" but I'm illustrating an "irresponsible player" at the moment.
Microsoft in putting out unstable software on the server side (and putting out clients that include servers to unaware owners) has severely affected the health of our public internet and I believe they should be held liable and responsible for their negligence on the matter. There is no law that says "you're a criminal if you write bad software" but there is law that says you are criminally responsible if, through negligence, have endangered public security. And in that respect, Microsoft should be held as criminally responsible for their negligence. And no amount of EULA protection should be allowed on this matter.
I suggest that Cisco wears a white hat in this simply because of reputation. They are not known for their security problems. They are not known for having 'viruses' or being vulnerable to attacks. Of course they are vulnerable. Of course they have bugs and weaknesses. But due to the fact that they are both huge and still manage to remain 'untargetted' is some indication that they are taking their public responsibility seriously and are successful at it.
If Microsoft behaved more like Cisco in that respect, I think the world would still be in love with Microsoft today though not nearly as appreciated because it's not in out nature to appreciate, but to find fault and hate.
Re:Cooperation is key (Score:2)
All in favor?
preview misleading... (Score:4, Insightful)
Re:preview misleading... (Score:3, Insightful)
Because of this, and the logistics inherent in updating the security on 20+ million PCs, and you get the MSIE / Outlook express situation.
The author's comment about "single point of ownership" is valid no matter what security is used on this.
Re:preview misleading... (Score:2)
Doesn't XP already do this? (Score:4, Interesting)
Re:Doesn't XP already do this? (Score:3, Informative)
Re:Doesn't XP already do this? (Score:2, Interesting)
Sleeze. (Score:4, Interesting)
I'm realistic... most people do not know or care of the difference, but they should.
So my question is...
What can we realistically do in order to force a bit more honesty in software providers?
Re:Sleeze. (Score:2)
Re:Sleeze. (Score:2)
I use free software almost exclusively, and use almost no zero cost commercial software, which seems to help, but is there anything people who need/want to use commercial software can do about this?
Re:Sleeze. (Score:2)
Lawyer's heaven (Score:2, Interesting)
No matter how many "We will not be held responsible" statements they have in their license agreement, they won't be held harmless from the damage done to a third party.
When you think about it, any program that automatically goes out and updates itself could be a problem if a blackhat is able to fool the client into installing the blackhat's update.
Re:Lawyer's heaven (Score:2)
That basically exempts the manufacturer from liability in situations just like this.
UCITA - just the start of scummy legislation that screwes us all over. The saving grace with UCITA is that it hass to pass through all the states. This makes lots more hands to grease, and thus the corps that would love to see us screwed, have a much harder time of it.
Cheers!
What can we conclude? (Score:5, Funny)
This is all to true. Therefore, given Brilliant digital's wicked corporate pedigree, we conclude that they must have a secret, sinister master plan that they're not telling us about.
They've been clever enough to use evil plans as a smokescreen - the plans they've described are just wicked enough that you might believe that they really are brilliant digital's brilliant evil plan. This means that the real evil plan must be extra... brilliant.
Basically, we can divide the possible real evil plans into three categories:
1) Defense related. They're going to hack into NORAD, and hold the world hostage from skull island. The fact that this is physically impossible (because NORAD isn't connected to the public 'net, and so on) never stops Dr. Evil, so it shouldn't be a hindrance for Brilliant Digital.
2) Biblical. Enumerate the billion secret names of god, conjure forth their lord and master, Satan himself. You all saw Warlock, right? Like that.
3) Astrononomical. I know that if I had the computing power of fiteen million consumer level CPU's at my disposal, I'd use it to pull the moon into the earth. 'nuff said.
Either way, we're talking countdown to doomsday, here, and only one man can stop them. I hope Brilliant Digital CEO Kevin Bermeister's mistress is played by Zhang Ziyi; she is so hot.
Re:What can we conclude? (Score:2)
Unfortunately, you're failing to account for the four star CO who decided he must have his e-mail access to his wife from inside the mountain, and ordered his IT officers to install it against their recommendation...
(Don't laugh too much; there are documented cases of serious military security breaches due to exactly this combination of rank and technical naivety.)
Congratulations to nweaver (Score:2)
Hmmm.. (Score:3, Interesting)
It would kill EVERY SPYWARE ON THE PLANET.
Re:Hmmm.. (Score:2)
The only thing this happening would cause is make some people commit suicide because they wouldn't be able to play Everquest anymore
Re:Hmmm.. (Score:2)
Here's how to uninstall (Score:2)
Re:Here's how to uninstall (Score:2)
No need to remove it
Same program, just all packaged up with NO crapware.
This all applies to Grokster as well (Score:3, Informative)
Re:This all applies to Grokster as well (Score:2)
This Brilliant tempest is giving Borland/Inprise/Borland a lot of press. I haven't heart of the BDE in years, but in the past week I've seen mention of it at least a dozen times.
What's really cool is the extent to which the instructions go to make sure you aren't deleting something useful.
Not just KaZaA! (Score:3, Interesting)
(Who'd use RHN over a modem line!?!?)
Seems like this also might be an excellent point from which to launch a big DDOS attack, no? How closely does RH watch their servers?
Re:Not just KaZaA! (Score:2)
<SARCASM>
Actually, what you are proposing is impossible. Everyone knows that all hackers and virus writers prefer to code in Visual Basic. They would have too much trouble trying to get Wine to run their virus so they could take over RHN, and they'd just give up.
Does that make you feel any better? I didn't think so. Hey, it was worth a try.
</SARCASM>
Re:Not just KaZaA! (Score:2)
As I understand it, it won't be easy to sneak a trojan into RHN, just by cracking RH's RHN servers, since all the RPMS are gpg
So installing Red Hat rpm's, even from "untrusted" mirrors, should be safe, provided that RH can keep their private key secret, and you actually verify the gpg signing (easy to do).
Seems like this also might be an excellent point from which to launch a big DDOS attack, no? How closely does RH watch their servers?
I do think that RH actually monitors their servers (and bandwith), but perhaps much more important, I am quite sure, that they will respond quickly, if people reported a DDoS attack from their IP-range.
IMHO a big part of the DDoS
A 2 hour DoS is nuisance, a 10 day DoS a disaster.
Re:Not just KaZaA! (Score:2)
1: Shitload of users (lots more then RHN and WinUpdate, etc.)
2: Likelyhood that there is no security authentication (dig sigs, etc).
Re:Not just KaZaA! (Score:2)
Expect more of this! (Score:5, Insightful)
Early 00's, the (slashdot) world is shocked by the fact that people don't care about installing spyware / trojaned software.
Be afraid, be very afraid.
Re:Expect more of this! (Score:2)
Re:Expect more of this! (Score:2)
Not to run around and shout the sky is falling or anything. This is potentially a major problem. When a company's business plan focuses on tricking the user to install their application, you know they care relatively little about security or the damage that they can do.
The sky is falling, the sky is falling. (Score:2)
Any competent programmer, familiar with several TCP/IP protocols, and TCP/IP programming, could easily bring the internet to a grinding halt. The fact that it hasn't happened in years (1988 with Robert Morris' infamous internet worm) is what astounds me.
Anti-Virus Programs (Score:2, Insightful)
I have seen TrendMicro's PC-Cillin d/l executables before.
So, while Brilliant Digital is out of line and while Weaver makes good points, the reality is that this threat has been around for a very long time.
For that matter, have you considered what might happen if someone 0wns the Akamai system?
Re:Anti-Virus Programs (Score:2)
Huh? What's an Anti-Virus scanner? Oh, a virus is that thing that can damage your computer if you are stupid and run everything as root or run an operating system that lacks any security mechanisms.
I guess I'm part of the 0% of
All I know is that if someone hijacks one of these networks, my computer and all my data will be fine.
Re:Anti-Virus Programs (Score:2)
You just have to be careful about what executables you run and don't do stupid shit like use outlook express, and you don't get Viruses / Adware.
Tim
Re:Anti-Virus Programs (Score:2)
Or you could click the link [datafellows.com] in my post and enjoy a free (as in beer) A/V scanner that might run in DOSEMU, and certainly does run in a DOS box of all windows I've tried it on (3.1-9x-NT-XP), and is updated quite often. This is one of the last true shareware programs I've seen on the net that's actually receiving updates (sad really that shareware turned into adware turned into spyware has now turned into trojanware).
Ximian Install and RedCarpet are the same (Score:4, Interesting)
Now I did issue the above command, but ensured that the DNS records were compliant and my local DNS server reported the same distant end IP as the authoritative one for the domain, but I doubt many folks do the same.
Also, when installing packages via RedCarpet (again, has to be done as root), what are the cryptographic signatures checked against? (Note: I haven't even researched this. Just typing off the top of my head...) I would hope that the proper response from GPG is hard-coded in the red-carpet binary...
Basically, I think that a lot of new update technologies are vulnerable to this - from windowsupdate.microsoft.com as mentioned in the article to more trusted (by this community, anyway) sites. Semi-automatic updating is great, but it still takes people at the keyboard to think before they do something. Not likely to see a widespread change in that mentality for some time to come.
Re:Ximian Install and RedCarpet are the same (Score:2)
The one you should be using for red carpet is
http://red-carpet.ximian.com/debian
as in: line in sources.list
deb http://red-carpet.ximian.com/debian stable main
apt-get update
apt-get install task-helix-core
apt-get install task-helix-gnome
apt-get install task-ximian-gnome
...depending on what you're after and what you have.
If you misspell the commands, nothing will happen except that it will tell you incorrect syntax (or that you're not root, you bastard). Just make sure the master list is correct.
Here, i'll even write you a shell script:
#!/bin/csh
set sources=`grep http://red-carpet.ximian.com/debian
if ("$sources"=0) then
echo "deb http://red-carpet.ximian.com/debian stable main" >>
endif
echo `apt-get update`
echo `apt-get install task-ximian-gnome`
echo "all done"
exit
###end of file
i'm not a criminal, but i play one on tv (Score:2, Interesting)
I say hit 'em, and hit 'em hard...let them know what we think.
To paraphrase Malcolm X,
We didnt land on your advertising, you crammed your advertising down our throats without asking, bitches
Solution to the Kazaa problem (Score:3, Insightful)
DON'T INSTALL IT TO BEGIN WITH.
tempest303, continuing his crusade to troll people that think fair use means never paying for media.
The guy is right. It's serious. (Score:5, Insightful)
There's no need to take over the Brilliant servers. An attacker should be able to do it all from any suitably modified Brilliant client.
If someone writes an effective Brillant-based attack, it might contaminate most of the clients in a very short period of time. And most of them woudn't even notice, until it was too late.
Brilliant isn't exactly a tech-savvy company, either. Their previous business was producing hip-hop videos. They have 18 employees. Plus one software consultant. (Read their SEC filing. [sec.gov]) They have no track record of producing secure systems. They make no claim that their product is secure against external takeover. And they don't have enough assets that if they screw up, they'll be able to pay for the damage.
If you have responsibility for any computers that do anything important, scan them all for this program immediately, remove it, and block it at your firewall.
It's possible that the Brilliant "projector" is so secure that it can't be used as a pathway for an attack. But without independent verification of its security, it has to be viewed as highly dangerous. All it takes is a buffer overflow and some carefully crafted "ad content" to use this as a virus distribution system.
Some of the same potential vulnerabilities apply to other peer-to-peer systems. Netnews/NNTP, for example. But Netnews is typically run on UNIX machines under its own userid, so even if an exploit in it exists, it can be contained within the Netnews world. And it's a mature system; the obvious holes were plugged long ago. Most of the other peer-to-peer systems, like Gnutella and Freenet, are pull-type systems; they only bring in content when the client asks for it in response to a user request. That slows down propagation and associates it with specific content, like an ordinary virus. But Brilliant, from their description of what they do, pushes automatically and peer to peer. That's much more dangerous.
Porn (Score:2)
Genius.
Re:Any comments? (Score:5, Insightful)
The difference is: we TRUST the owners of the root servers to keep their systems secure. The owner's of KaZaA don't have the same track record.
Re:Any comments? (Score:2, Funny)
But I thought they were on the FastTrack...nevermind.
Re:Any comments? (Score:5, Informative)
Story [slashdot.org]
For the "internet" to be greatly affected multiple root servers must be brought down.
"The DNS is built so that eight or more of the world's 13 master root servers would have to fail before ordinary Internet users started to see slowdowns, according to John Crain, manager of technical operations for the Internet Corporation for Assigned Names and Numbers (ICANN)."
Re:Any comments? (Score:2)
For the "internet" to be greatly affected multiple root servers must be brought down.
Or just one has to be hacked into and have the IP addresses rerouted. Really, do you think people check to make sure they're using https when they connect to "www.chase.com"?
Re:Any comments? (Score:2)
DON'T WORRY! If the DNS servers go donw, you can just fire up your friendly MSN Explorer on your Windows XP box, and serf on over to Netsol.com. Then select the tab names "Whois" and type in the wesite that you want - you the can ge the IP address of your favorite Microsoft website.
Re:Any comments? (Score:2, Informative)
no, no, no. You're missing the point.
If I compromise and poison D.ROOT-SERVERS.NET, it remains poisoned until the next push (twice daily). Anyone who does a DNS lookup, on average, refers to D.ROOT-SERVERS.NET once out of every 13 lookups, and therefore is subject to poisoning 1 out of 13 lookups. You'd never know, except when goatse shows up on your screen instead of microsoft.com ;)
There is no system in place (at least, publicly known) whereby the root servers (or other major internet sites) compare the root servers' databases. They are simply trusted as "correct."
Poisoning the master (A.ROOT-SERVERS.NET) would be even more disasterous, since, on the next push, it would corrupt the remaining 12.
Similar end games exist for poisoning the trusted certifying authorities (root CAs) for RSA certificates. In the end, you have to trust something, and that something needs to be secure.
Re:Any comments? (Score:2, Informative)
The A.ROOT is the master of them all. That's the one that they _really_ worry about, and the one referred to in that article (with all the security, etc.)
If it gets corrupted, even accidentally, the results would be disasterous. Although, I'm sure as soon as they realized it's been hosed, they'd cancel the next push (to the other root servers, keeping them "sane") and take the A.ROOT offline.
The A.ROOT is updated manually by Verisign engineers, after (I'm sure) meticulously checking the new database for errors. There's no room for a cronjob here. The database is generated on several other computers housed in that secure facility, compiling the changes from the various ICANN registrars around the world. Each registrar's changes are checked for consistency and compliance (the .au registrar can't change .com entries, etc.)
cheers.
Re:what nonsense (Score:2)
Re:what nonsense (Score:3, Informative)
The answer to this question is painfully simple: You are connected to and attempting to use the same network. Internet users, slashdot readers especially, should appreciate the effect that(tens/hundreds of) thousands of "other people" can have on such a network.
" You're telling me that if they get hacked, the entire Internet is at the mercy of the hackers. Why is that?"
Because, the actions of millions of compromised machines have the ability to bring internet traffic to a standstill. millions of boxes, spread throught the world all participating in a coordinated DoS attack, would be, as the article states, "unstoppable"
Re:what nonsense (Score:2, Insightful)
You are blatantly ignoring the context of "How does it affect me". The intended context is: Does it directly compromise my system and my data? The context you address is: Does it affect remote resources that I'm accustom to having access to?
The article summary implies the former: direct compromise of a system. ("Even if you never touched KaZaA, your systems may be affected if someone manages to attack Brilliant Digital's update service.") If it's actually implying the latter remote resource issue, then it's irresposible reporting.
And, I agree with the first poster. There's no evidence to suggest that assuming control of Kazaa machines gives access to non-Kazaa machines.
Re:what nonsense (Score:2, Interesting)
Re:what nonsense (Score:2)
I did. (For the lazy [berkeley.edu] .)
Pretty amazing. It's great to have relevant data like that, and I appreciate that he will not remove the page; however, it screams "script kiddie" to me -- detailed instructions on how to create the "protocol" and forms of attack for the worm writer, along with relevant source code.
The next step: write a worm which can travel back in time and infect computers prior to the worm existing.
(There was a great series of books starting with "Red Limit Freeway" (forgot the author) which had a "map cube" of the universe which only existed in a loop -- the (older) main character gave it to the (younger) main character. Neat plot device.)
(PS Cool /. fortune currently "If you can survive death, you can probably survive anything." Relevant both to time travel and to the "lifetime" of the worm.)
Re:what nonsense (Score:2)
Re:Idiocy upon Idiocy (Score:3, Interesting)
If this guy figured it out, don't you think there's at least a moderate chance, that some |33 h@x0r figured it out as well?
By going public, and as a neat bonus having
If they chose not to do anything, Brilliant can't claim, that they didn't know about it, if/when some |33 h@x0r hijacks 2 million computers and wreaks havoc on every single US government site just for fun, and they will (at the very least should) be held accountable as aiding and abetting terrorist activities, by not fixing the problems when they had the chance.
Security through obscurity is like not telling the world about AIDS. There's no cure for AIDS, so there's no need to tell people to be carefull, because that would not cure AIDS.
Re:Idiocy through obscurity (Score:2)
Then this guy announces that he's found the cluster and that the reward for hitting these servers is beyond that previously imagined by HaX0rs.
The
Are we just begging for the |33 to attack?
Quit wasting your time on Slashdot and get back to writing those IIS security patches.
Re:Alarmist: Servers down != Internet Down (Score:2)
if someone actually pulls this off, they more than likely wont attack individual websites, they will attack major providers, with millions of attacks, from IPs scattered around the globe, and more than likely from many many many ISPs
The server won't BE slashdotted (Score:2)
Re:The server won't BE slashdotted (Score:2)
I'm just so used to using add-filters and not surfing with pictures (Opera) that I just assumed, that it would get slashdotted.
"Everyone knows, when you make an assumption, you make an ass out of u and mption."
Re:Bah - hack Windows Update (Score:3, Informative)
Why would you expect that? Recall that Windows Update got infected with Code Red [theregister.co.uk], even though a security fix was available a month earlier...
Re:0, not O (Score:2)
Erm... It meant exactly what it said.
Actually, I thought it was quite amusing (in a poignant kinda way)...
Re:The post is a rant! (Score:3, Insightful)
Re:The post is a rant! (Score:2)
BTW- I wouldn't totally disagree with you, just curious. I know that I probably fullfill my own prophecy from time to time, but I didn't think I was describing myself each time I talk about other people.
Re:subject (Score:2, Interesting)
Brilliant here has (apparently?) done away with all three. They just do it (like Nike), and from the sound of the article, they are not even very secure about the way they do it.
The reassuring thing (for the moment) is that so far these tactics of behind-the-scenes trojans have been confined to leaf nodes - to my knowledge, no routers etc. have had this kind of shit happen to them. As long as the major routing backbones of the internet never become 0wned, there's a modicum of hope for restoring order to the network (banning IPs at the fringes of the backbones until they shape up?) should an emergency occur (banning IPs always scared me, so I don't necessarily like that solution, but it's the easiest and the one that jumped to mind first. I'm sure people more clever than I can think of better ones).
OTOH, 1M fringe nodes can, as the article says, be unstopable. If somebody were truly evil and wrote a decentralized worm (never called home, only talked with other copies of itself), it would be incredibly hard to stop such a beast, and the DDOS commands could be given in an anonymous, untrackable way (can anybody imagine the worms playing Dining Cryptographers? ^_^) [Dining Cryptographers would be anonymous as long as the line wasn't tapped. And I'm sure with some good encryption over the links, it'd be anonymous for all practical purposes anyway.]
Y'know, as bad as it'd be, I'd want to see such a worm (just it's source, I *swear* - I'm not about to go risking the internet's well-being - you have to admit it'd be an interesting read). Maybe the vx community has something similar as a proof of concept?
-Knots
Re:How? (Score:2)
The Brilliant client gets executable code downloaded from the Brilliant servers and download of the code is under the control of the servers, not the client. If someone got control of the Brilliant servers they could download code to your machine that either used your access or exploited a security hole to gain admin access and completely compromise your machine. It could then set up a server like Back Orifice and wait for orders.
Scenarios like that are one reason I refuse to install software that does things under the control of someone else's servers. I can control my machine and what I do, I can't control their servers and what they do, and if I don't have control I have no way of insuring that nothing happens that breaks security.
Re:For Their Own Good (Score:2)
I can understand your desire to demonstrate that quietly installing software like this will not be tolerated, but it's not really the Kazaa users' fault. All they've done is fail to read an EULA properly. If that were a crime, we'd all be in trouble...
Cheers,
Tim