Microsoft Worms Crash Ohio Nuke Plant, MD Trains 817
stieglmant writes "For everyone who thought the 'blackout of 2003' was bad, how about this, according to an article at SecurityFocus, and another article at The Register, 'The Slammer worm penetrated a private computer network at Ohio's Davis-Besse nuclear power plant in January and disabled a safety monitoring system for nearly five hours.'" Russell writes "Maryland MARC Train Service was shut down most of Wednesday morning due to what sounds like the MS-Blast worm or one of its variants. The local Baltimore news reports that the cause was a signal malfunction but CSX, whose communications system runs the tracks, has an article describing the shutdown as a result of 'a worm virus similar to those that have infected the systems of other major companies and agencies in recent days'. This indicates that the network that the train signaling stations are on is not protected by firewalls, at least to block ports 135 and 444 where the DCOM vulnerability is attacked. Wow, taken to the extreme, the exploitation of their systems could have caused a train collision and injury or death to hundreds of Maryland and Virginia commuters."
The network administrators... (Score:5, Insightful)
Re:The network administrators... (Score:5, Insightful)
Re:The network administrators... (Score:5, Interesting)
I thought Microsoft had the sense to accually say 'this is not what our product is for - get something custom'. If I worked at Microsoft, the last place I'd want our 'it-does-everything' operationg system doing would be managing the safety systems at a nuclear plant.
Does anyone know if Microsoft accually encourages this type of a deployment - if they dont, what moron decided to use it?
Re:The network administrators... (Score:5, Insightful)
Re:The network administrators... (Score:5, Insightful)
The systems shouldn't even have been allowed to mix even on a shared Ethernet. Microsoft belongs nowhere inside the perimeter of a nuclear facility. Period.
Idiots (Score:5, Insightful)
1) Do not place a vulnerable system on a critical network unless absolutely necessary.
2) When configuring a computer/server, always assume that you are hooking up to a hostile, unfiltered network.
If they'd applied these two rules to their network, routers, servers, etc., this likely wouldn't have happened. These are pretty basic ideas, folks. If you have a Windows box on the same network as a computer controlling nuclear saftey checks, you better have a damn good reason and you better check for patches weekly.
Re:The network administrators... (Score:4, Insightful)
They think they want 100% market penetration, but they also think they can get away without taking on the responsibility which that implies.
They're "encouraging" everyone to use MS products excusively, everywhere. When it gets to the point where everything is Microsoft and nobody knows anything else (which is what Microsoft is shooting for) how are they going to deny responsibility for stuff like this?
This might be compared to a concrete manufacturer coercing the market, becoming the sole supplier of concrete, but all along saying something like "you shouldn't use our product for pre-stressed bridge segments." Once they became the sole supplier for concrete, what the hell else are people who want to build bridges supposed to do?
Can a supplier reasonably be excused for making crappy product which kills someone because they said to use some other product, even though they themselves were the ones who drove all the other products out of the marketplace?
Re:The network administrators... (Score:5, Informative)
I've worked with VITAL control systems - train brake systems, landing gear, flight recorders, etc., and those systems are in a completely different space than PCs (or Suns, or IBM, etc). You're more likely to find Vertix Ada than you are MS C++ or any Java implementation. The likes of Sun, IBM, and Microsoft never even bid on the control systems I worked on.
Having said that, while the PC commercial vendor types like MS and Sun stay a far distance from control side (and rightly so), they definately bid on the monitor boxes. That SCADA may well be running a custom RTK, but the console that the operator back at base has in front of him could well be an XP system.
I've never used MS-based front ends myself, but I've written interfaces to OS/2-based consoles that talked to my onboard stuff, and I can't see any reason why a Win2K or XP front end would be any more or less contentious than an OS/2 one.
The problem is not the SCADA or braking system itself; it's the remote monitoring station. Often, those things are connected to the net to synch the atomic clocks, and sometimes for remote logging purposes. If *those* get compromised, the control systems may be affected, but they are not compromised. Which is to say, it's a major fscking PITA, but the brake system will still work on the train without remote intervention or monitoring; it's just not going to start again after it stops.
Re:The network administrators... (Score:5, Informative)
A complete flow chart exists that details all errors that can occur in the code and what the solutions are. Try doing that with Microsoft Windows or Linux. Sometimes the simple solutions are the best.
Small systems (Score:5, Informative)
8-bit processors still dominate the CPU market in terms of volume, and very nearly in terms of profitability. They are virtually never used as general-purpose computers anymore, but due to low cost of development, deployment and testing, they are ubiquitous in the control systems industry.
Companies like Atmel and Microchip are constantly devising new and better 8-bit microcontroller chips for this market. A lot of them are available in hardened grades for just these uses. A modern one will often bundle the entire machine onto a single chip, with as much IO and analog interfacing as you could ask for.
Reading the ENTIRE assembly dump of a 32K program is rather simple. A team of a dozen engineers can verify it in a matter of a couple months (I mean formal verification here, like you would do for a truly critical system, not just "give it a look over").
While truly using a BBC micro is a little obsolescant, the ideals that caused them to do so are sound.
Web Myth: WinNT Stops Ship (Score:5, Informative)
Yes, and find a lot of crap written by people who repeat a web myth. Now as far as people who were on the ship at the time or who actually wrote the software involved we get a different story. WinNT was not at fault. The truth is that a server app corrupted it's data, a client app tried to use that bad data, and the client app failed to control equipment. Can happen with any OS. Add to this the fact that the ship was a test platform not an operational ship and they were trying to break things.
"Others insist that NT was not the culprit. According to Lieutenant Commander Roderick Fraser, who was the chief engineer on board the ship at the time of the incident, the fault was with certain applications that were developed by CAE Electronics in Leesburg, Va. As Harvey McKelvey, former director of navy programs for CAE, admits, "If you want to put a stick in anybody's eye, it should be in ours." But McKelvey adds that the crash would not have happened if the navy had been using a production version of the CAE software, which he asserts has safeguards to prevent the type of failure that occurred."
http://www.sciam.com/1998/1198issue/1198techbus2.
"McKelvey writes that the failure, "was not the result of any system software or design deficiency but rather a decision to allow the ship to manipulate the software to stimulate [sic] machinery casualties for training purposes and the 'tuning' of propulsion machinery operating parameters. In the usual shipboard installation, this capability is not allowed.""
http://catless.ncl.ac.uk/Risks/20.37.html#subj1
Re:Web Myth: WinNT Stops Ship (Score:5, Informative)
Wether it was MS's fault or the App's fault that the ship was dead in the water was not part of this discussion. In fact, everything I've read said that this was an unhandled floating point exception, which is of course the problem of an application not the OS.
Enterprise/Mission-critical/Life-critical systems should not be doing floating point operations period. They introduce too many errors and inaccuracies. If you think you need floats, try adjusting your units.
-molo
Re:Web Myth: WinNT Stops Ship (Score:4, Interesting)
What a blanket statement. So it's impossible (or too difficult) to use floating point numbers correctly? You know this... how?
IANAM(athematician), but....
Using floats introduces innacuracy because there is rounding and because of the fundamental limit in accuracy of floats in terms of how many decimal places are represented on a computer. For some applications the number of possible significant digits is unacceptable because it is not accurate enough.
It is fairly common to represent units as integers either by using smaller numbers or by representing a decimal number as integers in the program and using integer math to do all teh calculations. This way you do not lose digits or have unnecessary rounding.
The funny thing is I remember reading about this technique being used in DOOM because for this critical application the innacuracy of floating point was unacceptable and the performance was unacceptably degraded by the floating point processors of the day. Now that we have multiGhz CPUs and more video ram than we know what to do with and deicated video processors I regularly hear about floating point performance being important which to me implies floats are being used in games now.
However I would not be surprosed if programs written for NASA and such where they need billions of decimal places and being off at all means people die or are lost in space forever some pretty sophisticated techniques are required in programs. I think the poster was implying that the calculations for the engine of a Naval ship might need similar treatment. It is certain that the programmers designing the software handling calculations used for the armaments (trajectories of shells and navigation systems for the missiles, etc) would do well to excercise such care. After all, what is more mission critical? DOOM? or a ship with hundreds of people on it in enemy terrirtory?
Re:The network administrators... (Score:5, Insightful)
Re:The network administrators... (Score:5, Funny)
"It looks like you are trying to prevent a meltdown!"
Re:The network administrators... (Score:5, Insightful)
Re:The network administrators... (Score:4, Informative)
Most likely this scenario was the same as the one at TI here in Dallas a few weeks ago. Some nimrod from marketing or somewhere in the company brought their laptop home, got it infected, and brought it back to infect the network. Fact is, admins can't control absolutely everything in their networks.
It's surprising to me that during this latest ballooning Microsoft crisis, Linux and Macintosh aren't getting more press. They can always step up and say "Ha Ha, this isn't happening to us."
Re:The network administrators... (Score:5, Insightful)
--- but imagine when they catch the clown who spread/made the virus...he/she might be locked up for a while...
Re:The network administrators... (Score:5, Insightful)
Sometimes that's not enough. At my university, the departmental firewall did just fine in blocking the virus, until somebody got their Windows laptop infected at home and brought it to work, behind the firewall. Once again proving that great network security can be easily defeated by poor physical security.
paranoia time (Score:5, Insightful)
it's possible the vulnerability arose through someone accessing internet e-mail. but wall street firms regularly blacklist internet e-mail sites. they do that b/c they're regulated to ensure that proprieties are kept and people aren't defrauded. a nuke though--we're talking more than just dollars and cents here.
it may not be fully the fault of the admins.
ed
Re:The network administrators... (Score:5, Funny)
Sometimes that's not enough. At my university, the departmental firewall did just fine in blocking the virus, until somebody got their Windows laptop infected at home and brought it to work, behind the firewall. Once again proving that great network security can be easily defeated by poor physical security.
Hard on the outside, soft & crunchy in the middle? The safety monitoring computer for a power system should be accessible only by floppy disk through a terminal in a locked room with pressure sensitive floors, a sound monitor, body heat detectors *AND* laser trip wires on all the ventilation grates. (The floppy disk should be run through a demagnitizer before and after each use.)
-a
Re:The network administrators... (Score:5, Funny)
Re:The network administrators... (Score:4, Funny)
I saw a documentary on that once. Apparently that's EXACTLY how the CIA headquarters mainframe at Langley is setup! OH wait, no, that was Mission Impossible. Forget it.
Re:The network administrators... (Score:3, Interesting)
There's plenty of blame to go around here boys. Make sure everyone gets some.
More Spin about patches (Score:4, Insightful)
With MS systems it's not just a matter of loading a patch, quite often they break something especially third party apps, fail to fix the problem they claim to fix, or open a new vulnerability.
If a model of car were found to be so defective -- bolts breaking, carbonmonixide in the passenger compartment, split drive shaft when you change gears, works with only one brand of gas, plays only approved radio stations, etc. -- no one would think to blame the user.
Re:The network administrators... (Score:5, Funny)
For when the laptop has that not so fresh feeling?
Re:The network administrators... (Score:5, Funny)
Re:The network administrators... (Score:5, Informative)
Blaster got past a lot of firewalls that way.
Re:The network administrators... (Score:5, Insightful)
Re:The network administrators... (Score:5, Funny)
The MARC network admin should be tied to the tracks a la dudly doright (sp?). Hope that signal to switch the tracks gets though...damn... That'll learn ya for hooking an operational network to the 'net'.
Same with the power plant. Your office is now located in side the containment building. Do you think they would pay more attention to the network security?
Re:The network administrators... (Score:5, Funny)
Re:The network administrators... (Score:5, Funny)
Re:The network administrators... (Score:4, Insightful)
It doesn't even necessarily take an indirect connection to the internet. If a virus is on a laptop that was connected to a public (or any infected network) like at home, then connected to a completely autonomous network, it can then infect that network.
Re:The network administrators... (Score:5, Insightful)
I would have suspected that there would be multiple layers of protection in front of critical systems like that. Even more, I would expect that safety regulations require these layers of protection. Of course, that would hurt the bottom line, so we can't have that happening :(
Re:The network administrators... (Score:5, Insightful)
The "typical" administration job is exactly what you'd expect -- you're understaffed, underpaid, your budget is abysmal, and you have a gaggle of retarded secretaries calling you up asking the *same questions* constantly because they're too lazy to use the help system!
Most of your day is spent putting out fires. Fixing critical systems before all hell breaks loose, keeping your web/nfs/mail/compute servers running when they have a load average of *5*, fixing viruses, fixing shitty HP machines because your boss wouldn't listen to you and buy a cheaper machine made of quality parts.
Luxuries like patching systems, and preemptive security measures are things there aren't time for.
So my question would be ... is their IT department critically underfunded and that CAUSED the problem, or was someone just lazy?
Re:The network administrators... (Score:3, Insightful)
Re:The network administrators... (Score:5, Insightful)
When it comes to your average office network, sure, you can give the "oh they brought in an infected laptop" excuse, but this is quite a bit different.
Re:The network administrators... (Score:5, Funny)
Full and total deregulation would have likely prevented this from happening.
Exactly (Score:5, Insightful)
CSXT has confronted increasingly sophisticated computer viruses, like ones that have penetrated some of the most secure sites in the country in recent days.
Sorry, but they're obviously not "some of the most secure sites in the country". If they were, they wouldn't have been penetrated like this. How can I say this? Because my company didn't get penetrated.
I'm afraid of sounding like a broken record here, because if anyone looks at my past posting history they'll see I've said exactly the same thing. However, the fact is we have mission-critical 24/7/365 servers running Windows (as well as Linux) that simply can not be vulnerable. So we secure them, and we protect them, and put in safeguards, and work together as a team if there is a particularly nasty threat out there...and we keep running. Funny, that.
Sod it; plenty of other posters will argue the point about patching, firewalling, etc., and a myriad of rabid MS-bashers will refute and insult. Let my small voice add merely this to the fray -- it doesn't have to be this way, even if you use Windows. All that is required is people who know what they're doing.
Re:Exactly (Score:5, Funny)
You expect far too much from humanity my friend.
Re:Exactly (Score:4, Insightful)
Wha the fuck ever. I've heard similar excuses all freaking week. "Viruses are getting smarter" , "Those hackers have no lives", etc etc. They miss the point that it's actually the OS's fault in the first place! The virus comes in through an exploitable service which runs by default. It's not like the virus tricked the user into executing it.
It's like me leaving the door to my house open, some thief comes in , cleans out my house and then I say
This ignorance won't stop until the media stops talking bullshit, tells the whole story and includes _all_ the parties at fault including MS, who well, basically sold me the house without doors!
Re:The network administrators... (Score:4, Insightful)
Network Administrator: We should get an outsourced firewall and a managed virus system. It will cost 45000 a year, but it will be worth it. We also need to start putting on patches on the servers.
CIO: Too much money. Just buy something from Best Buy. As for the servers, we cannot pay you overtime to put patches on them. Besides, Microsoft is a big company. There shouldn't be any real problems.
Network Administrator: But sir....
CIO: Just do it. I've got an MBA. I know what I'm talking about. If there is a problem, we'll just blame you.
Re:The network administrators... (Score:5, Insightful)
Taken to the extreme! (Score:4, Funny)
Then again, it probably won't.
Wow. (Score:3, Funny)
This could be big.
Thank God (Score:5, Funny)
What kind of engineer?? (Score:4, Funny)
Re:What kind of engineer?? (Score:3, Funny)
Sorry about the Java
Software Disclaimer (Score:5, Insightful)
Re:Software Disclaimer (Score:4, Insightful)
Re:Software Disclaimer (Score:5, Informative)
The Horror (Score:4, Informative)
Blackout not that bad. (Score:3, Funny)
Call me when that train is on a direct head on course with said power plant!
Now that is bad!
It's only a matter of time... (Score:5, Interesting)
Re:It's only a matter of time... (Score:5, Insightful)
Yes, and then software liability will be mandated by legislation and then everyone in the software industry will be trouble. Be careful what you wish for. If MS goes down for something like this, the whole software industry is in trouble. We don't make as much as doctors in this business, so we can't afford the malpractice/liability insurance.
Again, the question should be asked why were mission-critical systems connected directly to any network, other than connections to other mission-critical boxes?
What I don't get (Score:5, Insightful)
It doesn't make sense. Use a Unix/Linux machine, make sure it has only the access level needed from the outside (maybe sshd running, maybe), and keep the thing patched.
Why is this rocket science? Why do people who are building nuke plants and rail lines not know any better?
Sorry for going off on a rant, but damn it, somebody needs to say it.
Re:What I don't get (Score:5, Insightful)
How is this any different from;
Use a Windows 2000 machine, make sure it has only the access level needed from the outside (maybe sshd or something similar running, maybe), and keep the thing patched.
If there was a Linux/Unix worm running around, couldn't the exact same situation happen?
Re:What I don't get (Score:3, Informative)
It's not uncommon for industrial applications on Windows to require admistrator access to merely run. Any services you turn off, as a result, can be modified by the user or turned back on.
Re:What I don't get (Score:4, Insightful)
If there was a Linux/Unix worm running around, couldn't the exact same situation happen?
While I agree with you in principle, the problem I have with MS patches is that I have NO FSCKING CLUE what other areas of the OS are affected. At least if I see a patch for TFTP for Linux, I KNOW I don't need it.
My God Man, just running MS Terminal Services requires the MS Client, even though I run a Netware network!
Re:What I don't get (Score:4, Insightful)
Yup. But I havn't heard of them. I've heard of a couple viri/worms/trojans with windows that have taken out significant parts of the internet. My Linux/Solaris machines still get hit daily with code red, a 2 year old exploit.
If you were interviewing 2 people for a job, and one was a convicted violent self confessed felon, would you hire him over someone without a record?
Re:What I don't get (Score:5, Insightful)
Re:What I don't get (Score:4, Insightful)
If the critical system is on the same physical network as workstations other than the head-end, that could be a problem. Technician plugs his infected laptop into the networ for diagnostics or downloading data, and the network traffic kills the ability for the SCADA nodes to interact.
This is an easy mistake to make; all it takes is having multiple people need to share the same information, and a lack of money to provide dedicated physical layers for each function and proper gateways between the layers.
No firewall? Probably not. (Score:5, Insightful)
This indicates that the network that the train signaling stations are on is not protected by firewalls, at least to block ports 135 and 444 where the DCOM vulnerability is attacked.
Actually, I suspect that someone unwittingly plugged an infected laptop into the network inside of the firewall.
Re:No firewall? Probably not. (Score:4, Informative)
Didn't "crash" the plant (Score:5, Informative)
more info (Score:5, Insightful)
The Washington Post is reporting [washingtonpost.com] that the Slammer worm crashed the computerized display panel which monitors the most crucial safety indicators (coolant systems, core temperature sensors, and external radiation sensors) at Ohio's Davis-Besse nuclear power [doe.gov] plant in January. No serious problems occured, primarily because the plant has been offline for more than 1-1/2 years.
Davis-Besse is run by FirstEnergy [firstenergycorp.com], which many people feel may bear much of the responsibility [forbes.com] for last weeks power blackout.
This is not looking good... (Score:5, Funny)
2. Japan announces 30 year program to build intelligent robots
3. New Scientist reports self-healing robots a reality, can survive battle damage
4. Arnold announces "I will go to Sacramento and I will clean house".
All I can say is that I hope the next
John.
Someday hopefully reason will prevail... (Score:3, Insightful)
People are morons.
Speaking of the Blackout (Score:5, Interesting)
Laptops breach firewalls (Score:3)
David-Besse Plant Problems (Score:3, Informative)
Don't overreact (Score:4, Insightful)
Thats why trains have human engineers and brakes. It's why people should use good judgement and observation. If you approach an intersection, and see that the traffic lights in all directions are green, use your head and stop, because something's wrong. Of course this is impossible, theres a mechanical failsafe that will make all lights blink red if that happened - making a 4 way stop, similar mechanical fallbacks are employed in the railroads. This is all besides the point.
Techies tend to overestimate the role of technology in day to day life. MARC was shut down more because the clerks were having a hard time selling tickets, since they cant do simple math in their heads.
Fail Safe (Score:5, Interesting)
No. Taken to the extreme, this exploitation could cause the train system to stop. Which is what it did.
Ever since the Victorian era, trains are designed to stop if there's a failure. That's what "fail safe" means, not that it is "safe from failure" but that "when it fails, it is safe".
For a simple example [fraser.name], take a look at the _mechanical_ switching gear on the tracks behind my office. More modern electronic or computerised equipment is exactly the same in terms of how it reacts to failures.
Sometimes firewalls aren't enough. (Score:3, Informative)
As most people who had to fight this worm already know, a firewall doesn't do you a whole lot of good if you have users with laptops who plug in at home, then bring in their infected PCs and plug them into your internal network.
I'm not saying there aren't still ways to prevent the spread of worms, but an internal infection is in no way proof that there's no firewall. In many cases, it's just a clueless PHB who refuses to let the IT department lock down his laptop or install a personal firewall on it.
Security in Post 9-11 (Score:3, Insightful)
That was a bad conclusion (Score:5, Insightful)
That is a silly conclusion to come to. Presumably they're also implying the same about the power grid.
I have first-hand experience with Ontario Hydro's IT nework (now Hydro One's IT network ;) and I gotta say - they have firewalls up the wazoo. And this is the problem. They rely on border security. However, on networks as large as the ones being discussed, border security doesn't cut it. There are too many entry vectors. People reading email, people browsing the web, and oh my god people with laptops - the pain the pain.
So before you go thinking "they aren't even taking precautions that would have saved them! Fire them!" understand that it's *exactly* that attitude which caused the networks to go down in the first place - the common misconception the a firewall is a magic wand that will solve all their ills.
Border security does NOT cut it when you run insecure software on the inside, boys and girls. And you can take that to the bank.
In other news.... (Score:5, Funny)
Bugtraq had a similar thread... (Score:3, Interesting)
SSH tunnels on the local network? (Score:3, Interesting)
With Blaster, spyware, etc. that seems to be spreading, I've wondered about using SSH only on a machine. Everything has to tunnel through the SSH connection (web, email, X11, etc.) using SSH port forwarding. That way, every machine on the local network would only accept SSH traffic. Any worm that gets installed and runs would try infecting other machines behind the firewall, only to find that those machines won't listen to the worm. Would something like this work?
P.S. Obviously, using this in a Windows environment would be difficult. Maybe this would be another good justification for migrating to a *nix platform.
For train control, Fail Safe == Stop Working (Score:5, Insightful)
Train control has this luxury. Computer systems onboard airplanes do not... simply turning off jet engines in case of computer failure is not an appealing possibility.
Same thing in VA (Score:3, Interesting)
Security is transitive (Score:5, Insightful)
The Register article says "It began by penetrating the unsecured network of an unnamed Davis-Besse contractor, then squirmed through a T1 line bridging that network and Davis-Besse's corporate network. The T1 line, investigators later found, was one of multiple ingresses into Davis-Besse's business network that completely bypassed the plant's firewall, which was programmed to block the port Slammer used to spread".
I'd never let a client do that. From a business risk management point of view, you *might* allow a direct connection by a vendor, *if* you had a good contract requiring them to keep good security and be responsible for breaches, and *if* you had secured everything sensitive in your internal network. From a theoretical or technical point of view, you should never trust something you don't control.
Monitoring systems are just as safety-critical as control systems. After all, the feedback loop is part of a control system. Imagine an intruder changing the readings to show that reactivity was decreasing, core temperature was dropping, and coolant pressure was so high that relief valves should be opened. You'd have a Three Mile Island rerun. That system should never, NEVER have been exposed even indirectly to the Internet.
But then, Davis-Besse is the plant where someone thought the way to check for an air leak was to poke around with a lit candle near flammable insulation wrapping critical control cables (1975).
"Extreme" is the right word... (Score:5, Funny)
I think that's a little far-fetched, and almost amounts to fear-mongering. At best, it displays ignorance of how modern rail systems work. When the signals fail, the trains simply stop - engineers don't look at a broken signal and say "well, gee, I hope there's nobody in front of me, full speed ahead!" In fact, on most modern equipment the braking is automatic when signals fail. I don't know exactly how modern the system is in Maryland, but at the very least there would be a regulation that all trains come to a halt in the event of signal failure. They certainly would not go speeding around without knowing if there's another train occupying the same block.
Collisions can and do occur even when the signals are working properly - it takes time to stop a speeding train. But assuming positioning is all correct to begin with and everybody's following proper speed limits before the signals go out, there should be no problem stopping a train in time once the signals do fail.
Welcome to the new Federally mandated Palladium (Score:5, Insightful)
No. Unacceptable. (Score:4, Insightful)
Secondly, Microsoft CLEARLY spells out that their software is never to be used in this kind of implementation. Most software manufacturers do -- Sun, Apple, and most Linux distros IIRC.
Now, if this is a case of a critical service being overflowed from a remote location simply because it's connected to a public network, that's bad enough. To be running a consumer operating system on those critical services is simply unacceptable and probably worthy of execution. I don't care if the system was offline at the time -- this kind of thing should be definitely ringing warning bells. I hope whatever moron implemented this system gets fired.
From reading the article the services that went down had analog backups, but it's still unacceptable. Don't connect critical services to the fucking Internet.
Safe = not sexy. (Score:4, Interesting)
Re:Safe == not sexy. (Score:5, Informative)
I discovered the usefulness of this after setting a digital pressure control on a pilot plant wrong - nitrogen vented everywhere (which makes an incredibly loud noise), my supervisor went mad, but nothing broke
Train vulnerability (Score:4, Informative)
Halifax ATM machines (Score:4, Interesting)
I am amazed that the infection of the Halifax Bank ATM machines in the UK -- reported by someone here on Slashdot a few days ago -- did not reach the mainstream press in the UK.
I find it hard to believe that one of the best known banks in the UK has ATM machines that are exposed to the Internet in some way and can get infected by worms. Any UK journalists reading this - I'm sure your readers would be interested to know how insecure the Halifax computer network is.
who me (Score:5, Funny)
no way, no how. (Score:4, Informative)
railroad signaling systems being what they are, I'm certain that this could not have caused a collision. Railroad signal systems run on proprietary, failsafe software. Getting trains to bump into each other, in most systems, takes a computer glitch in code, or a specific series of commands to the signal system, plus a human overriding signal indications in the field.
in every signal system i've ever seen (quite a few across the country), the only thing that MS software/OS relates to is supervisory remote control and monitoring. The local signal logic (software or relay based) will not allow for unsafe train movements, even if accidentally commanded to do so, unless very specific conditions are met. Again, an Engineer passing a stop signal, for example, is usually one of the requirements.
Freight trains are to fear the most (Score:5, Insightful)
And it's not MARC's problem... they only run on CSX's tracks.
Time for a change. (Score:5, Insightful)
One life and death critical systems they should use proprietary hardware, OS and software.
Not any version of Windows, not any version of Linux, not Intel, not AMD, but something totally alien. Something that is designed from the ground up to be DIFFERENT and CLOSED that can not communicate with the outside world and the system that the outside world run on.
I'm talking about Air Traffic Control systems, Nuke plant controls, railroad traffic systems, hospitial systems, military systems, power systems, public utilities.
I mean NEW CPU's and a NEW OS and NEW software that is so different and so tightly closed that nothing can communicate with it but other systems of the same design.
With every other little dickweed with a Wally World emachine typing "1337" into google and downloading DIY virus labs, and these same little punks having access to the same networks that all the above mission critical systems communicate on, well, it's a disaster waiting to happen.
And when some script kiddie crashes a 747 full of people from his Wally World emachine on his mommies AOL account, what then? Or the same kiddie opens the floodgates on a dam and kills 200,000 people. Or a million people. Or makes a nuke plant go Chernobyl?
When burglars keep breaking into your safe every week and robbing you blind you would assume that it's time to get a better safe..
Before the world went insane and computerized every friggin thing from toasters to pay toilets to the power grid, this sort of thing was IMPOSSIBLE. Time to fix it folks..
Flame away..
Homer Simpson promoted to IT manager? (Score:5, Funny)
Simpson promoted
August 10, 2003
Springfield, Ohio
Springfield's own Homer Simpson was promoted to IT manager of Springfield's nuclear power plant today. Simpson promised that his first act would be to remove Unix from all of the power plant's computers. "Whoever heard of Unix anyway? I run Windows at home as do most Springfield residents. If it's good enough for playing games, it's good enough to run our nuclear power plant!", Simpson declared.
NEXT: Accidental Nuclear ICBM Missile Launch...? (Score:5, Interesting)
And then there are VPNs...fine for offices, but not critical infrastructure - critical systems should be on totally separate, dedicated private networks, period!
Among my biggest fears in regards to computer worms, etc somehow getting into a nuclear weapons system and causing nuclear missiles being launched - in particular nuclear based ICBMs which are less protected; Windows is used on some nuclear subs from what I've read - frightening!
CSX uses InCharge "service assurance manager" (Score:5, Interesting)
The infection resulted in a slowdown of major applications, including dispatching and signal systems. As a result, passenger and freight train traffic was halted immediately, including the morning commuter train service in the metropolitan Washington, D.C., area. Contrary to initial reports, the signal system for train operations was not the source of the problem. Rather, the virus disrupted the CSXT telecommunications network upon which certain systems rely, including signal, dispatching and other operating systems.
So what are they using to manage their network? They're using InCharge "Service Assurance Manager" [trainorders.com].
Any questions?
new headline (Score:4, Insightful)
Try again, (Score:5, Informative)
This indicates that the network that the train signaling stations are on is not protected by firewalls, at least to block ports 135 and 444 where the DCOM vulnerability is attacked.
It means no such thing. It is perfectly possible to have machine (such as a laptop) infected on the outside, then brought in and connected to the inter LAN, where it starts infecting machines it can reach.
And sicne when does port 444 have anything to do with it? Once exploited, the victim is running a command shell on port 4444.
Re:Is it going to take deaths to make MS liable? (Score:5, Insightful)
They'd probably cry, 'But we already released a fix! They didn't install this patch, and this patch, and this patch, and then recompiled.'
Don't blame the software companies for the "sh*t quality" of their software, as you say--blame the system administrator who didn't install the already-available fixes or patches. That by far is your guilty party right there.
Re:You may all be laughing about windows (Score:4, Funny)