Google Shares Its Security Secrets 106
Stony Stevenson writes "Google presents a big fat target for would-be hackers and attackers. At the RSA conference Google offered security professionals a look at its internal security systems. Scott Petry, director of Google's Enterprise and founder of security firm Postini, explained how the company handles constant pressure and scrutiny from attackers. In order to keep its products safe, Google has adopted a philosophy of 'security as a cultural value.' The program includes mandatory security training for developers, a set of in-house security libraries, and code reviews by both Google developers and outside security researchers."
More PHD Cowbell (Score:5, Funny)
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
Not terribly bright. The best security can be ensured by silently doing your best to protect it, and not making a big deal out of your success. That way, you're never a big target.
Re: (Score:3)
I suspect that Google was going to be a big target regardless of whether they kept quiet about their attempts or not...
Re:More PHD Cowbell (Score:5, Funny)
Good luck selling those tiny little ads!!
Re: (Score:3)
Re: (Score:3, Interesting)
Re: (Score:1)
http://finance.yahoo.com/q/bc?s=GOOG&t=6m [yahoo.com]
http://www.alleyinsider.com/2008/2/2008/2/google_disaster__comscore_reports_awful_january [alleyinsider.com]
The advantage of being an internet company (Score:3, Insightful)
I was going to say something smart about Microsoft, Mac etc, but then Google do have the advantage that they were founded on the internet, once the benefits but also the threats of networking computers had been fully understood.
I'd be surprised if any from-scratch operating system designed for internet-facing use today, didn't also have 'security as a culture'.
But hey, there's always Vista ;)
Re:The advantage of being an internet company (Score:4, Informative)
Re: (Score:3, Funny)
Re: (Score:1)
Re: (Score:2)
Seriously, I used to think that OpenBSD was the bees knees, but after struggling with a broken ports system and no supported upgrade path between major versions (the latter coupled with a short support cycle means that you're having to constantly install on new metal, test, deply, and decommission the old server), I'm just not interested any longer.
Maybe the situation ha
Re: (Score:2)
In OBSD's defence, they do contribute useful work. SSH and pf are great, and OBSD makes a fine software router and firewall on gigabit sized pipes and smaller. For general purpose server use, it'll work but there's better options.
Re: (Score:2)
Re: (Score:1)
Personally, I run Ubuntu, which I find to be quite flexible and easy enough for my non-techie wife to use on her machine. And it's good enough in the security department -- a competent sysadmin such as myself can easily secure the OS and network from most attacks. At the same time, a total n00b who does nothing more than keep his
Re: (Score:2, Interesting)
So, explain ... (Score:4, Insightful)
Re:So, explain ... (Score:5, Insightful)
If you are stuck on a Captcha or equivalent, spam people, pretend the Captcha is yours, and offer free porn to anyone who solves it.
Preventing this is virtually impossible.
Re: (Score:3, Interesting)
If you had a reasonable time limit in which to solve the captcha, it would certainly make it harder to farm out.
Of course, Google's captcha was broken algorithmicall
Re: (Score:2)
Not if the steps to get to the captcha are quick. For your idea to work the forms prior to the captcha would have to take a while to return, then the user is presented with a captcha that times out.
Could work at preventing captcha farming, but you are going to irritate your legit users.
Re: (Score:2)
There are other ideas that could go along with this. You could use Javascript to send kestrokes in the captcha text box back to the server, which could then use those keystrokes to determine how soon to expire the captcha. If the user types the first letter c
Re: (Score:2)
That makes it easier, not harder.
No need for a JS engine either.
For a target the size of Gmail just reverse engineer the JS and then reimplement it in to your bot.
Using machine readable things to make something which isnt supposed to be machine readable is...uhh... stupid.
Re: (Score:2)
my data on one of my web site that I manage might help ( I get posting spam issue all the time )
Captcha life in excess of 1 minute, the odds of it being a real users dies off rather dramatically, reloads typically happen 7 to 12 minutes later if they are real, reload happen within the 1 to 5 minute window are spammers of some sort.
captcha life of 20 seconds or less brought me more trouble and a huge amount of complaint mail. I'm right now leaving it at 45 second for 7 ch
Re: (Score:1)
reCAPTCHA [recaptcha.net] has a key system. It makes the user have private and public keys so that no one can simply take your CAPTCHA and use it on their site for others to solve for them. From the API Documentation:
"In order to use reCAPTCHA, you need a public/private API key pair. This key pair helps to prevent an attack where somebody hosts a reCAPTCHA on their website, collects answers from their visitors and submits the answers to your site."
Unless I understood you w
Re:So, explain ... (Score:5, Insightful)
Re: (Score:1)
Re: (Score:2)
Re: (Score:3, Insightful)
Re: (Score:1)
Re: (Score:2)
The e-mail isn't backscatter. Bounced messages have a delivery failure preamble. These are from a google host according to the header date.
The Usenet stuff isn't forged either. Messages reporting their origin from groups.google.com can be found in Google Groups. The path at that point doesn't appear to be forged. Google has it as having been posted from their system.
It's that darn preset target (Score:5, Funny)
Google presets a big fat target for would-be hackers and attackers.
Must be a new Google appliance. I'm glad it is preset, and does not need any end-user configuration.
In any case, I commute on the train with Google guys in NY. They use their laptops to work on the train, but have those little wireless security devices that generate random passwords for them when they want to log in, so their connection is fully encrypted.
Re:It's that darn preset target (Score:5, Insightful)
The only part of the connection that is "more secure" is the authentication phase, since they had to use two factors to log in (their token code and their password).
See Two-factor Authentication [wikipedia.org]
Re: (Score:1)
Re:It's that darn preset target (Score:4, Funny)
"Those who sacrifice security for liberty deserve neither, either." -- BlowChunx
Re: (Score:2)
Re: (Score:2)
The funny part of the post (yes, it is indeed funny) is that he used a famous quote from Franklin dealing with civil liberties, applied it to computers, and reversed it.
The way I see it, it means "if you are willing to sacrifice your security for ease of use [liberty], you deserve neither."
It goes along with the "
Re: (Score:2)
Re:It's that darn preset target (Score:5, Funny)
"Those who sacrifice security for liberty deserve neither, either." -- BlowChunx
Re: (Score:1)
Re: (Score:2)
Code Reviews and Coding Conventions (Score:5, Insightful)
A little thing to be sure... until you realize that it's one of many such rules, and they actually are followed.
Re: (Score:2)
Re: (Score:1)
Sorry, no. Rules like "don't use sprintf" don't produce quality or security. There is a difference between a culture of writing secure code and a culture of not writing non-secure code. The former can be successful, the latter is a constant exercise in patching and turd polishing.
You are saying that good coding will not save an insecure overarching design. This is obvious. Just as obvious is the fact that bad coding will ruin a secure design.
Enforcing the use of snprintf instead of sprintf helps prevents the latter from happening. Seems obvious, no? But somehow, plenty of other companies (hello Microsoft) still have problems with this stuff.
Re: (Score:3, Insightful)
However, the world isn't so simple... so Microsoft has to pay the price.
Re: (Score:2)
Microsoft has done this for decades, and thankfully
Re: (Score:3, Insightful)
True, to professionals in the field, it's often easy to be appalled at what we see as incompetence.
(And I'm not speaking to the management/sales, just the tech side of Microsoft)
But given the same goals, constraints and budgets, I bet that most assembled teams would produce software of no greater quality than what they have produced.
Hear me out.
1. Look at the SimCity ex
Re: (Score:3, Insightful)
I don't disagree that it's 'hard'. I disagree that there was no choice in going that route. They
Re: (Score:3, Informative)
Variations include having the code analysis tool throw "compiler" warnings, and make the compilation to consider warnings as errors and fail the build.
Once you start working in an environment th
Re:Code Reviews and Coding Conventions (Score:5, Informative)
Tools like PMD help with this .
We ended up getting bitten by bugs like unsynchronized access to static DateFormat object so we wrote used a PMD rule to fail our build if anyone does such a thing. We have other rules that curb the use of IOUtils.copy (instead of copyLarge).
I highly recommend using some sort of static analysis as part of your CI process
Because coders are lazy? (Score:1)
How many buffer overrun exploits have been found in other people's software because the coders are just lazy?
Very, very few. As very, very few coders also own the company their coding for.
Seriously, most of the security holes found in software are there because the company won't pay the coders to sit around securing the finished product once it seems to work. I've been on many project where we were told to even use mere QA time to instead add a new feature the client wanted. Were we being "lazy" because we didn't do all that work for them for free later, in our massive amounts of free time?
As long as software cus
Security secrets? (Score:5, Informative)
What is covered is some general security policy and philosophy.
And here I was, waiting to read all about GIDS and GFirewall. Thanks, ITNews, for instead educating be about archiving security logs for later review!
Re:Security secrets? (Score:4, Funny)
I guess Google shared some secrets, and that's the news. Not that we get to read the secrets. Still, this is Slashdot..
Re: (Score:2, Funny)
Fluff Acticle (Score:1, Informative)
Re: (Score:1, Funny)
Re: (Score:1, Funny)
Pathetic Article (Score:2, Funny)
Is there a page two I'm missing?
Re: (Score:2, Insightful)
I almost never RTFA here or elsewhere until I've read the first few comments. Its saved me so much time that I highly recommend it.
I understand Slashdot and other sites need to throw up news ever hour or so to keep us clicking their ads, but do they ever read this stuff to see if its worth posting?
Re: (Score:1)
Frankly, they haven't impressed me (Score:1, Interesting)
I admit, that guy was the worst of the bunch, but but I continue to be unimpressed by their security p
who are you to be impressed .. :) (Score:2)
Who did you represent at these conferences, what were the names of these 'Google security people'. It's not that I don't doubt your word or anything.
Who invented 'heap overflow '
Re: (Score:1)
malware infiltrates google searches (Score:4, Interesting)
This article at the San Francisco Chronicle [sfgate.com] doesn't tell me exactly what is going on, but apparently there is the potential for 7 of 10 search results to return malware.
My mother heard about this on the TV news, but the above was all I could find. Anyone else have any more detail?
Re: (Score:1)
It's like out-running a bear. (Score:3, Insightful)
The guy says, in case a bear attacks our camp during the night.
The other guy is skeptical. With sneakers or without, there's no way you can out-run a bear.
The guy replies, I don't need to out-run the bear. I just need to out-run you.
I suspect Google security is pretty much the same way, with a twist. Why try to hack Google, when I can use Google to find credit card numbers, unsecured plain text password files, servers running old, unpatched versions of vulnerable software, etc.
I'd think the hacker going after Google would be as popular as the kid who rats out the teacher who buys the kids beer.
Punch "gmail xss" into your search bar... (Score:2, Interesting)
Programmers don't care about security (Score:1, Interesting)
Re: (Score:1)
I find it interesting that people do not recognize the core value of Vista over XP (security).
I recognize that if I want the increased security of Vista over XP that I will need to buy a new PC. My current configuration is an Athlon XP2100, 512MB RAM, and Gforce 2 video card. I have never gotten my pc infected with malware and I've been running XP since it came out. And, with XP, I get the added bonus of being able to listen to an MP3 I've ripped from one of my CDs and not have my network transfers come to a screeching halt.
With Ubuntu HH due out this month, I'm seriously considering repaving my Ub
Re: (Score:2)
Re: (Score:1)
BTW, I work for a large corporation, with 10K+ desktops and they are in no hurry to migrate to Vista. IE 6 is still the supported browser and from what I've heard, some of our apps won't run on IE 7.
How many of us ping google? (Score:4, Insightful)
I still find it surprising that it ICMP_ECHO_REPLYs my ICMP_ECHO_REQUESTs. Why?
A lot of sites disable ping because, years ago, The Ping of Death could crash a server by sending maliciously-crafted ping packets.
And you can DOS a server by flooding it with pings.
I'd be interested to know just how many pings Google receives, and replies to each day.
And how many of those are maliciously encoded, only to be defeated by the ub3rh4x0r5 at Google.
Re: (Score:1)
Any competently run site is pingable. (Score:5, Informative)
I still find it surprising that it ICMP_ECHO_REPLYs my ICMP_ECHO_REQUESTs. Why?
Ping is a service we all should provide to our internal networks from individual hosts, and to the Internet at large at the network edge. Configure your routers to respond to pings for your hosts instead of passing them through the firewalls. Ping is how people who need to test their ability to reach your hosts or site can do so. It is a simple tool that consumes a minimal amount of bandwidth to get the job done.
Hmmm... where's BadAnalogyGuy when you need him? OK, look, blocking ping is like saying that you've seen a guy killed by an Isuzu truck, so you think you can prevent all fatal accidents by banning Isuzu trucks from the highway. In reality, all you will do is prevent beer deliveries to my house, since my beer distributor uses Isuzus. This will make me hate you, just like people hate clueless firewall admins who block ICMP. Or wait, you saw a guy get bludgeoned to death with a hammer so you will ban all hammers while allowing people with large wrenches, razor knives and screwdrivers to pass without comment. That was pretty bad I think.
Re: (Score:2, Funny)
Result of trying to ping slashdot.org:
$ ping slashdot.org
PING slashdot.org (66.35.250.150) 56(84) bytes of data.
--- slashdot.org ping statistics ---
9 packets transmitted, 0 received, 100% packet loss, time 8010ms
Re: (Score:2)
Re: (Score:3, Funny)
Hmmm... where's BadAnalogyGuy when you need him? OK, look, blocking ping is like saying that you've seen a guy killed by an Isuzu truck, so you think you can prevent all fatal accidents by banning Isuzu trucks from the highway.
Ooh, ooh, and turning off all ICMP, hence killing PMTU discovery, is like taking the number off your front door to stop your house getting burgled and then wondering why you aren't receiving as much snail mail as you used to.
Mod parent up!! (Score:2)
Re: (Score:1)
Re: (Score:1)
Ping of Death is history.
And you can flood them even if they are not responding, because a ping flood saturates network resources, not server resources. So not replying would not make a significant difference.
You could save some upstream bytes blocking ICMP responses, but I don't think that's a problem for them. And responding to pings is just playing fair on the network.
physical security (Score:3, Informative)
Also, the whole place is made out of floor to ceiling glass windows. Would be really simple to shoulder surf somebody's display through a telescopic lens or listen against a windows with a laser mic. There's a reason high security buildings tend to resemble windowless block houses. Hopefully, anybody with a window seat at the Googleplex never processes sensitive data.
That's kinda scary (Score:4, Interesting)
So I tried to get in touch with their postmaster group. Only they don't have one [postini.com]. And I tried to check their feedback loop [emaillabs.com]. Only they don't have one. As a shareholder, I even wrote to Investor Relations [google.com]. No response. In the process, I found out that they have a universally awful reputation among the mail delivery community.
In the end, all they could tell me was that their system decided my mail was spam because - I kid you not - their system had, previously, decided my mail was spam. Which, of course, increases my spamminess score. And so on, and so on, until we're all using the same shampoo.
So, to recap: The guy in charge of keeping Google secure, Scott Petry, is the guy who invented a system that bit-buckets your e-mail, with absolutely no accountability, no sanity checks, no industry best practices... because of guilt by association WITH YOURSELF.
Be afraid. Be very afraid.
Re: (Score:2)
NCC 1701G (Score:5, Funny)
The big secret? apparently google is developing a starship
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Google is setting a good example (Score:1)
Hacking Google = Credibility on the Streets (Score:2)
Quoted from the story:
If you have bad intentions and want to get a reputation, hacking Google is the best way to get credibility on the streets.
I don't know if you've ever been to West Oakland, but I seriously doubt that hacking Google is going to win me any credibility on the streets here.
... unless hacking Google gives you gold chains a bulletproof Buick.
Open redirectors (Score:2)
The most secure policy. (Score:1)